Australian Digital Forensics Conference

Australian Digital Forensics Conference

 

Follow

Submissions from 2007

PDF

Steganalysis in Computer Forensics, Ahmed Ibrahim

PDF

Can SDV Technology be Utilised in a Smartphone to Prevent Forensic Analysis?, Peter James

PDF

Anti-Forensics and the Digital Investigator, Gary C. Kessler

PDF

Tracing USB Device artefacts on Windows XP operating system for forensic purpose, Victor Chileshe Luo

PDF

Multi-Step Scenario Matching Based on Unification, Soroto Panichprecha, George Mohay, and Andrew Clark

PDF

An approach in identifying and tracing back spoofed IP packets to their sources, Krishnun Sansurooah

PDF

An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah

PDF

ADSL Router Forensics Part 1: An introduction to a new source of electronic evidence, Patryk Szewczyk

PDF

An examination of the Asus WL-HDD 2.5 as a Nepenthes malware collector, Patryk Szewczyk

PDF

Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks, Craig Valli and Andrew Woodward

PDF

An Overview of ADSL Homed Nepenthes Honeypots In Western Australia, Craig Valli and Aaron Wooten

PDF

Profiling Through a Digital Mobile Device, Lee Fueng Yap and Andy Jones

Submissions from 2006

PDF

Mobile Handset Forensic Evidence: a challenge for Law Enforcement, Marwan Al-Zarouni

PDF

A Methodology for the Examination of the Effectiveness of Secure Erasure Tools Running On Windows XP - Research in Progress, Anthony Hadfield, Michael Ahern, Leo Sell, and Andrew Woodward

PDF

Freeware Live Forensics tools evaluation and operation tips, Ricci Ieong

PDF

Enterprise Computer Forensics: A defensive and offensive strategy to fight computer crime, Fahmid Imtiaz

PDF

Honeypots: How do you know when you are inside one?, Simon Innes and Craig Valli

PDF

A Fuzzy Approach For Detecting Anomalous Behaviour in E-mail Traffic, Mark JynHuey Lim, Michael Negnevitsky, and Jacky Hartnett

PDF

Enhancing the Forensic ICQ Logfile Extraction Tool, Kim Morfitt

PDF

Structural Analysis of the Log Files of the ICQ Client Version 2003b, Kim Morfitt

PDF

Taxonomy of computer forensics methodologies and procedures for digital evidence seizure., Krishnun Sansurooah

PDF

A digital forensic practitioner's guide to giving evidence in a court of law, Shayne Sherman

PDF

Voice over IP: Forensic Computing Implications, Matthew Simon and Jill Slay

PDF

Personal Firewalls - Testing Robustness, Patryk Szewczyk and Craig Valli

PDF

Forensic Analysis of the Contents of Nokia Mobile Phones, B. Williamson, P. Apeldoorn, B. Cheam, and M. McDonald

PDF

Validation of Forensic Computing Software Utilizing Black Box Testing Techniques, Tom Wilsdon and Jill Slay

PDF

BitLocker - the end of digital forensics?, Andrew Woodward

PDF

LIARS - Laptop Inspector and Recovery System, Andrew Woodward

PDF

Leading hackers down the garden path, Suen Yek