The Locator -- [(title = "Fingerprints")]

173 records matched your query       


Record 32 | Previous Record | MARC Display | Next Record | Search Results
Author:
International Conference on Digital Forensics and Cyber Crime (4th : 2012 : Lafayette, Ind.)
Title:
Digital forensics and cyber crime : 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012 : revised selected papers / Marcus Rogers, Kathryn C. Seigfried-Spellar (eds).
Publisher:
Springer,
Copyright Date:
2013
Description:
xiii, 327 pages : illustrations ; 24 cm.
Subject:
Computer crimes--Congresses.--Congresses.
Computer security--Congresses.
Other Authors:
Rogers, Marcus K. http://id.loc.gov/authorities/names/n2010076014
Seigfried-Spellar, Kathryn C. http://id.loc.gov/authorities/names/n2014045202
Notes:
Includes bibliographical references and index.
Contents:
New Developments in Digital Forensics. Cloud Computing Reference Architecture and Its Forensic Implications: A Preliminary Analysis / Litska Strikwerda -- Cloud Forensic Maturity Model / Keyun Ruan and Joe Carthy -- Identifying Remnants of Evidence in the Cloud / Jeremy Koppen [and others] -- Malware. On Improving Authorship Attribution of Source Code / Matthew F. Tennyson -- Behavioral. Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes / Ahmed F. Shosha [and others] -- Measuring the Preference of Image Content for Self-reported Consumers of Child Pornography / Kathryn C. Seigfried-Spellar -- Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study / Ibrahim Baggili [and others] -- Law. When Should Virtual Cybercrime Be Brought under the Scope of the Criminal Law? / Litska Strikwerda -- New Developments in Digital Forensics.
ANTS ROAD: A New Tool for SQLite Data Recovery on Android Devices / Mohamed Al Marzougy, Ibrahim Baggili and Andrew Marrington -- Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern / Abdallah Mohamed and Roman V. Yampolskiy -- Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2 / Frank Breitinger and Harald Baier -- Investigating File Encrypted Material Using NTFS $logfile / Niall McGrath and Pavel Gladyshev -- Finding Data in DNA: Computer Forensic Investigations of Living Organisms / Marc B. Beck, Eric C. Rouchka and Roman V. Yampolskiy -- On the Completeness of Reconstructed Data for Database Forensics / Oluwasola Mary Adedayo and Martin S. Olivier -- Mobile Device Forensics. BlackBerry PlayBook Backup Forensic Analysis / Mohamed Al Marzougy, Ibrahim Baggili and Andrew Marrington -- ANTS ROAD: A New Tool for SQLite Data Recovery on Android Devices /
Kwaku Kyei [and others]. A Review and Comparative Study of Digital Forensic Investigation Models / Shahzad Saleem, Oliver Popov and Oheneba Kwame Appiah-Kubi -- Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints / Christer Idland, Thomas Jelle and Stig F. MjĂžlsnes -- Cybercrime Investigations. BREDOLAB: Shopping in the Cybercrime Underworld / Daan de Graaf, Ahmed F. Shosha and Pavel Gladyshev -- A Review and Comparative Study of Digital Forensic Investigation Models / Kwaku Kyei [and others].
Series:
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering, 1867-8211 ; 114
ISBN:
9783642398902
3642398901
OCLC:
(OCoLC)858089201
Locations:
OVUX522 -- University of Iowa Libraries (Iowa City)

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.