The cost of non-compliance: when policies fail
SIGUCCS '04 Proceedings of the 32nd annual ACM SIGUCCS conference on User services
Forensic course development: one year later
CITC5 '04 Proceedings of the 5th conference on Information technology education
Challenges in forensic computing
Communications of the ACM - The semantic e-business vision
Improving the computer forensic analysis process through visualization
Communications of the ACM - Next-generation cyber forensics
Forensic analysis of logs: Modeling and verification
Knowledge-Based Systems
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Computer Forensics and Culture
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
International Journal of Electronic Security and Digital Forensics
A Formal Approach for the Forensic Analysis of Logs
Proceedings of the 2006 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_06
From digital forensic report to Bayesian networkrepresentation
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Computer forensics curriculum in security education
2009 Information Security Curriculum Development Conference
Digital forensics on a virtual machine
Proceedings of the 49th Annual Southeast Regional Conference
Evolution of traditional digital forensics in virtualization
Proceedings of the 50th Annual Southeast Regional Conference
Trojan defence: A forensic view
Digital Investigation: The International Journal of Digital Forensics & Incident Response
International Journal of Internet Technology and Secured Transactions
Game-based forensics course for first year students
Proceedings of the 13th annual conference on Information technology education
Evolution of digital forensics in virtualization by using virtual machine introspection
Proceedings of the 51st ACM Southeast Conference
Hi-index | 0.00 |
Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography.