| Paper | Author |
| Techniques and Tools for Recovering and Analyzing Data from Volatile Memory | Amari, Kristine |
| Mobile Device Forensics | Martin, Andrew |
| A Forensic Primer for Usenet Evidence | Lachniet, Mark |
| Mac OS X Malware Analysis | Yonts, Joel |
| Data carving Concepts | Merola, Antonio |
| Ex-Tip: An Extensible Timeline Analysis Framework in Perl | Cloppert, Michael |
| Reverse Engineering the Microsoft exFAT File System | Shullich, Robert |
| Logic Models for Computer Forensics | Garrett, Jim |
| Google Desktop Search as an Analysis Tool | Poldervaart, Chris |
| Taking advantage of Ext3 journaling file system in a forensic investigation | Narvaez, Gregorio |
| A Forensic Investigation Plan and Cookbook | King, Gerald |
| Analysis of a serial based digital voice recorder | Wright, Craig |
| Analysis of a seized USB Flashdrive | Yuen, Cheuk Wai |
| Unspoken Truths - Forensic Analysis of an Unknown Binary | Velocci, Louie |
| Forensic Analysis of a SQL Server 2005 Database Server | Fowler, Kevvie |
| Forensic Analysis of a Compromised Intranet Server | Obialero, Roberto |
| Discovery Of A Rootkit: A simple scan leads to a complex solution | Melvin, John |
| Lessons from a Linux Compromise | Ritchie, John |
| CC Terminals, Inc.Forensic Examination Report: Examination of a USB Hard Drive | Duckworth, Brent |
| Forensic Analysis of a Compromised NT Server(Phishing) | Velazquez, Andres |
| CC Terminals Computer Forensics Analysis Report | Do, George |
| Analysis of a USB Flashdrive | Chablais, Christian |
| Forensic Analysis of a USB Flash Drive | Bennie, Norrie |
| Examining an Unknown Image & Analysis of a compromised Honeypot | Ramli, Farina |
| Forensic Examination of USB Data storage artifact | Reardon, Ben |
| Forensic analysis of a provided image | Pereira, Rudolph |
| Analysis of an unknown USB JumpDrive image | Hiew, Roger |
| Forensic Analysis on a compromised Windows 2000 system | Ng, George |
| Forensic Analysis: Leila Conlay versus Robert Lawrence, Harassment Case | Carpenter, Matthew |
| Forensic Investigation of USB Flashdrive Image for CC Terminals | Diggs, Rhonda |
| Forensic Analysis of a Misused System | Shettler, David |
| Forensic analysis of a Fedora Core 3 Notebook | Halm, Michael |
| Steganography for spies and spybots for hackers | Christensen, Andrew |
| ANALYSIS OF AN IMAGE PROVIDED FROM THE GIAC WEBSITE | Reyes Mu�oz, Juan Carlos |
| Forensic with Open-Source Tools and Platform: USB Flash Drive Image Forensic Analysis | Ong, Leonard |
| CC Terminals Harassment Case | Farrington, Dean |
| Computer forensics investigation - Image file analysis | Spellane, Michael |
| Careless Crackers kill Computers | O'Brien, Conall |
| Camouflaged and Attacked? | Marasky, Bertha |
| Analysis of WinHex | Dillinger, Jessica |
| Analyze an Unknown Image and Perform Forensic Tool Validation | Watson, Patricia |
| Forensic Analysis of Camouflage and Validation of X-Ways Forensics Tool | Aylor, Michael |
| Forensic Image Analysis of a USB Flashdrive | Heerwagen, Howard |
| Forensic analysis of a seized USB Flashdrive image | Doyle, Ben |
| Analysis of an unknown disk | Simsic, Jure |
| Report on the Forensic Analysis of a recovered Floppy Disk | Armstrong, Steve |
| Analysis of a FAT16 formatted image using Linux, TSK and Autopsy | Hansen, Ove |
| Oracle Database Forensics using LogMiner | Wright, Paul |
| Infected or Owned? | Chuvakin, Anton |
| Analysis of a 64MB Lexar Media USB JumpDrive | Chen, Joseph |
| Spanish-Forensic Analysis of a Windows 98b system | Ruiz, Oscar |
| Forensic Analysis on a Windows 2000 Server | Cassidy, Regis |
| Forensic Analysis of an Apple iBook G4 | Partida, Alberto |
| NTLast as a Forensic Tool | Grime, Richard |
| Analyze an image and Perform Forensic | Pecorella, Francisco |
| Evaluaton of a Zero-Day Worm Variant at a Health Clinic | Taylor, Jonathan |
| Analyze an Unknown Image and Forensic Tool Validation: Sterilize | Becker, Steven |
| Analysis of a Windows XP Professional compromised system | Santander, Manuel |
| Analysis of a Commercial Keylogger installed on multiple systems | Namuth, Merlin |
| HONORS-Analysis of a USB Flashdrive Image | Siles, Raul |
| Analysis of a USB Flashdrive Image | Wenchel, Kevin |
| A Touch of Superiority in Linux | Griffin, Slade |
| Forensic Analysis of a Windows 2000 Server | Ghavalas, Byrne |
| Forensic analysis of a Windows XP SP1 | Ferrill, Rob |
| Forensic analysis of a honeypot RedHat Linux 6.2 | Read, Mark |
| Compromise analysis of a University SGI Indy workstation running IRIX | Russel, Chris |
| Forensic analysis of a compromised Solaris server | Shepherd, Russell |
| Analysis on a compromised RedHat 8.0 machine | Deline, Jessica |
| Analysis on a compromised Linux RedHat 8.0 Honeypot | Bryner, Jeff |
| Forensic analysis of a Windows 98 system | Shenk, Jerry |
| Forensic Analysis on a Windows 2000 system | Hayday, John |
| Forensic Investigation of a Hacked Redhat 7.1 System | Khedekar, Nihar |
| Perform Forensic Analysis on a Red Hat Linux release 7.1.2 Server | Pawar, Pramod |
| Forensic Analysis of a Red Hat Linux release 7.1 Server | VK, Vijaykumar |
| Use of SSH as a forensic tool | Bro, Layne |
| Forensic Analysis on a compromised Windows 2000 Honeypot | Hewitt, Peter |
| Forensic Tool Validation of Compromised Computer Inventory System | Perry, James |
| How not to use a rootkit | Wilson, Michael |
| Analysis of a Red Hat Honeypot | Shewmaker, James |
| Forensic Analysis on a compromised Linux Web Server | Malone, Jeri |
| Forensic Analysis of a Sun Ultra System | Chmielarski, Tom |
| Forensic Validity of Netcat | Worman, Michael |
| Forensic Analysis on a Windows 2000 Pro Workstation | Cragg, David |
| Forensic Analysis on acquired EBay Hard Drives | Bunnell, Richard |
| Forensic Analysis on a Linux IPNET challenge syste | Rinaldi, Alfredo |
| Forensic Analysis of a Windows 2000 Web Server | Liu, Yi-Chung |
| Evaluation of The Forensic Toolkit | Kamoshida, Akiteru |
| Forensic Analysis of an EBay acquired Drive | Wesemann, Daniel |
| Analysis of a Compromised Honeypot-VMware/Linux7.3 | Hall, Stephen |
| Becoming a Forensic Investigator/Use of Forensic Toolkit | Maher, Mark |
| Forensic analysis of a Windows 2000 computer literacy training and software development device | Richard, Golden |
| Sys Admins and Hackers/Analysis of a hacked system | Fresen, Lars |
| Forensic Analysis of a Windows 2000 server with IIS and Oracle | Binde, Beth |
| Romanian Winter-Forensic Analysis of a Linux system | Ladstaetter, Garnot |
| Forensic Analysis of a compromised Sun Ultra 5 workstation | Madzelan, Carl |
| Forensic analysis of a compromised Linux RedHat 7.3 system | Miller, Kevin |
| Analysis of a Linux Honeypot | Hudak, Tyler |
| Forensic Analysis Procedures of a Compromised system using Encase | McGurk, Jeffrey |
| Analysis of tar2d2 as a Forensic Tool | Adelstein, Frank |
| Forensic analysis of a Compromised Red Hat 7.2 Web Server | Walker, Martin |
| Forensic analysis of a Compromised Windows 2000 workstation | Fraser, Charles |
| Forensic Examination of a home firewall and network services system | Carlson, Brian |
| Evaluation of Crocwareis Mount Image Pro as a Forensic Tool | Tower-Pierce, Hugh |
| Forensic Tool Evaluation-Pasco | Larabee, Rick |
| Forensic Tool Evaluation-MiTeC Registry File Viewer | Fiscus, Kevin |
| Hidden Data Is Evidence Too/Metadata Assistant tool Evaluation | Pelcher, Bob |
| Compromised Redhat Linux 7.2 Honeypot Analysis | Anderson, Jason |
| Forensic analysis/process for a Windows 2000 SP2 Pro with IIS installed | Callahan, Jennie |
| Trash and Treasure-Computer Forensics and Public Domain Data (Bmap Tool Analysis) | Scott, Michael |
| Evaluation of Forensics SF-5000u as forensic Hardware | Hickey, Steven |
| Hackers and Trackers(Linux Forensic Analysis) | Scott, Andy |
| Review of Foundstone Vision as a forensic tool | Bingham, Bil |
| Forensic Analysis of a RedHat 7.1 Server with Apache Web Server | Sierra, Aaron |
| Analysis of a Suspect Red Hat 6.2 Linux Server | Venere, Guilherme |
| Forensics under Brazilian Legislation(HoneyPot evaluation) | Piccolini, Jacomo |
| Piping a Shell in a ICMP Tunnel-A Forensic Study of Malicious Code | Noakes, Robert |
| Analysis of an IRC-bot compromised Microsoft Windows system | Kolde, Jennifer |
| Eavaluation of Linux ext2 file system debugger/debugfs for forensic use | Harvey, Michael |
| Evaluation of Windows Forensic Toolchest | McDougal, Monty |
| An Endeavor Down the Forensic Highway(Windows 2000 Professional) | Westphal, Kristy |
| Forensic Analysis of a Honeypot Redhat 6.2 system | Olensky, Sven |
| Forensic Analysis of a Compromised Windows NT4 workstation | Hammill, Adrian |
| Analysis of a Windows 2000 corporate web server | Cordeschi, Carlo |
| Forensic event with a Microsoft Windows 2000 Server | Nolin, Norbert |
| Validaton of icat and ils for Forensic Use | Gabler, David |
| Safe at Home? | Perez, David |
| Evaluation of a Honeypot Windows 2000 Server with an IIS Web/FTP Server | Pearlstein, Kenneth |
| Forensic Tool Validation, and Legal Issues of Incident Handling | Vera, Christopher |
| Forensic Analysis and process of a Mandrake Linux 9.1 system | Da Cruz, Dennis |
| Binary Analysis, Forensics and Legal Issues | Wyman, Michael |
| Analyses of Italian Malware, Romanian Rootkits, and United States Computer Law | Ford, Michael |
| Forensic Analysis of a Compromised System | Lee, Richard |
| Analysis of a compromised RedHat 6.2 web server running Apache | Filmer, Bradley |
| If it quacks like a duck, is it really a duck? | Hall, Andrew |
| Forensic Analysis of Shared Workstation | Kerr, Michael |
| Ironically , Some Targets Are Harder Than Others | Clarkson, Michael |
| Legal Issues of Computer Incident Handling | Psaila, Helen |
| Forensics and Incident Response : Three Investigations | Hutson, Brian |
| Digging covert tunnels Analysis of an unknown binary | Murr, Michael |
| Computer Forensic Analysis of an Unknown Binary and The Complete Computer Forensic Investigation of a Hard Drive | Capellini, Brian |
| An Exercise In Practical Computer Forensic Analysis | Campaign, Adam |
| Forensic Analysis of a MUD Gaming/Development Server | Banghart, John |
| Forensic Investigation, Analysis, Documentation, and Law | Prentner, Karl |
| Forensic Analysis of Suplused system hard drives | Bellamy, Jr., William |
| Analyzing a Binary File and File Partitions for Forensic Evidence | Butler, James |
| Open Source Forensic Analysis - Windows 2000 Server - | Arnes, Andre |
| Forensic Analysis of Another Honeypot | Lisman, Jarrad |
| Forensic Analysis Think pad 600 laptop running Windows 2000 server | Bowers, Brad |
| Analysis of a Suspect Red Hat Linux 7.2 System Running Apache v1.3.22 | Lee, Christopher |
| EasyRecovery Professional (ER Pro) | Khalid, Kamarul Baharin |
| A Proposal for a Binary Comparison Technique | Lamastra, Gerardo |
| Forensic Analysis of dual bootable Operating System (OS) running a default Red Hat 6.2 Linux server installation and Windows 98 | Othman, Mohd Shukri |
| Analysis of a Software Write Blocker - That Works? | Chevalier, Suzanne |
| Forensic Analysis of an unfamiliar Windows 2000 system | Kurasiewicz, Jeff |
| An Examination of a Compromised Solaris Honeypot, an Unknown Binary, and the Legal Issues Surrounding Incident Investigations | Mccauley, Robert |
| Analysis of LOKI2, Using mtree as a Forensic Tool, and Sharing Data with Law Enforcement | Korty, Andrew |
| Forensic Studies in the Digital World | de Jong, Mark |
| System Analysis of a Compromised Windows 2000 Professional System | Stuart, Robin |
| Loki & the Honeypot: Forensic Analyses | Geiger, Matthew |
| Use of sg_dd for Computer Forensics | Stone, Michael |
| Forensic Analysis of a Discarded University Computer System | Craiger, Philip |
| Analysis of a Suspect Windows 2000 Server SP3 Running IIS | Faber, Sid |
| Forensic analysis of a compromised RedHat Linux 7.0 system | Cunningham, Jacob |
| Analysis of a Compromised Honeypot on a Cable Modem | Schlereth, Matthew |
| Validation of Norton Ghost 2003 | Brozycki, John |
| Validation of NTLast v3.0 | Dolak, John |
| Analysis of a Suspect Red Hat Linux 6.2 System | Strubinger, Ray |
| Analysis of a Suspect Windows 95 SR2 System | Filiberto, James |
| Validation of TASK v1.50 fsstat and dstat | Ginski, Richard |
| A Search for the Origin of a September 2001 Bomb Threat | Curd, Bill |
| Validation of The Coroner's Toolkit v1.11 mactime | Dalton, Matthew |
| Validation of GNU tar v1.13.19 & v1.13.25 and GNU cpio v2.4.2 & v2.5 | Calabrese, Chris |
| Analysis of a Compromised Windows NT 4.0 Server Running MS SQL Server 7.0 | Lukacs, Steven |
| Validation of GNU strings v2.11.90.0.8 | Desai, Neil |
| Validation of Process Accounting Records | Clausing, Jim |
| Analysis of a Honeypot running Red Hat Linux 6.2 | Murphy, Keven |
| Analysis and Comparison of Red Hat Linux 6.2 Honeypots With & Without LIDS-enabled Kernels | Owen, Greg |
| Analysis of a Suspect Red Hat Linux 6.2 System | Van Riper, Ryan |
| Analysis of a Compromised Red Hat Linux 7.2 System | Pierce, Jerry |
| Analysis of an Unknown Red Hat Linux 7.3 System | Pedersen, Stephen |
| Analysis of an Unknown Mac OS X Public Beta System Using Mac OS X 10.2 | Miller, Roland |
| Validation of ISObuster v1.0 | Dietz, Steven |
| Analysis of a Suspect Windows XP Professional System | Wagner, Dave |
| Analysis of a Potentially Misused Windows 95 System | Leibolt, Gregory |
| Validation of Restorer 2000 Pro v1.1 (Build 110621) | Brooker, Denis |
| Validation of a Modified UNIX "script" Command to Monitor Shell Sessions | Barnett, Ryan |
| Analysis of a Suspect Red Hat Linux 6.1 System | Fung, James
|
| Analysis of a Virus Infected Windows 98 SE System | Hayler, Richard |
0 意見: