Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Advances in Digital Forensics X - 10th IFIP WG 11.9 International Conference, Vienna, Austria,

Advances in Digital Forensics X

10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers

Peterson, Gilbert, Shenoi, Sujeet (Eds.)

2014, XX, 335 p. 67 illus.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


(net) price for USA

ISBN 978-3-662-44952-3

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase

learn more about Springer eBooks

add to marked items


Hardcover version

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-662-44951-6

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days

add to marked items

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics X describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: - Internet Crime Investigations; - Forensic Techniques; - Mobile Device Forensics; - Forensic Tools and Training. This book is the 10th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-two edited papers from the 10th Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Vienna, Austria in the winter of 2014. Advances in Digital Forensics X is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Content Level » Research

Keywords » applied computing - computer forensics - credit card fraud - database forensics - distributed systems - network forensics - smartphones

Related subjects » Business Information Systems - General Issues - Information Systems and Applications - Security and Cryptology

Table of contents 

Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection.- Using Fraud Trees to Analyze Internet Credit Card Fraud.- Automated Analysis of Underground Marketplaces.- An Exploratory Profiling Study of Online Auction Fraudsters.- Web User Profiling Based on Browsing Behavior Analysis.- Validation Rules for Enhanced Foxy P2P Network Investigations.- Windows Event Forensic Process.- Schema Reconstruction in Database Forensics.- Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus.- Similarity Hashing Based on Levenshtein Distance.- Using Approximate Matching to Reduce the Volume of Digital Data.- Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion.- Breaking the Closed-World Assumption in Stylometric Authorship Attribution.- Preserving Dates and Timestamps for Incident Handling in Android Smartphones.- An Open Source Toolkit for iOS Filesystem Forensics.- Smartphones as Distributed Witnesses for Digital Forensics.- Smartphone Message Sentiment Analysis.- Forensic Analysis of the TomTom Navigation Application.- Performance of a Logical Five-Phase, Multithreaded, Bootable Triage Tool.- Towards Fully Automated Digital Alibis with Social Interactions.- Data Corpora for Digital Forensics Education and Research.- Educating the Next Generation of Cyberforensic Professionals.

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Systems and Data Security.