Search Results - "2009 Fifth International Conference on IT Security Incident Management and IT Forensics"

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Overcast: Forensic Discovery in Cloud Environments by Wolthusen, S.D.

    “…While best practices and standards are emerging, supported by advances in research, for forensic investigations in individual computer systems and networks,…”
    Get full text
    Conference Proceeding
  2. 2

    Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges by Accorsi, R.

    “…While log data are being increasingly used as digital evidence in court, the extent to which existing secure logging protocols used to collect log data fulfill…”
    Get full text
    Conference Proceeding
  3. 3

    Workshop: Digital Discovery with Bootable CDs by Moll, R., Prokop, M., Morgenstern, H.

    “…Boot-CDs are a flexible and powerful method to assist in the whole forensic process from live examination to acquisition, searching and recovery. Linux was…”
    Get full text
    Conference Proceeding
  4. 4

    The Forensic Image Generator Generator (Forensig2) by Moch, C., Freiling, F.C.

    “…We describe a system that allows to produce file system images for training courses in forensic computing. The instructor can ldquoprogramrdquo certain user…”
    Get full text
    Conference Proceeding
  5. 5

    Preface

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  6. 6

    A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors by Schryen, G.

    “…While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the…”
    Get full text
    Conference Proceeding
  7. 7

    Self-Forensics Through Case Studies of Small-to-Medium Software Systems by Mokhov, S.A., Vassev, E.

    “…The notion and definition of self-forensics was introduced by Mokhov to encompass software and hardware capabilities for autonomic and other systems to record…”
    Get full text
    Conference Proceeding
  8. 8

    Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts by Yasin, M., Wahla, M.A., Kausar, F.

    “…Download accelerator plus (DAP) is one of the most popular download managers due to its free availability, download speed and versatility. This software…”
    Get full text
    Conference Proceeding
  9. 9

    Fast User Classifying to Establish Forensic Analysis Priorities by Grillo, A., Lentini, A., Me, G., Ottoni, M.

    “…In computer and common crimes, important evidence or clues are increasingly stored in the computers hard disks. The huge and increasing penetration of…”
    Get full text
    Conference Proceeding
  10. 10

    From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy by Altschaffel, R., Kiltz, S., Dittmann, J.

    “…Forensic investigations are usually conducted to solve crimes committed using IT systems as pertetrator and/or victim. However, depending on the size of IT…”
    Get full text
    Conference Proceeding
  11. 11

    Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination by Al-Salloum, Z.S., Wolthusen, S.D.

    “…Risk and vulnerability management is a critical task in maintaining any nontrivial network, but made increasingly difficult by the dynamic nature of…”
    Get full text
    Conference Proceeding
  12. 12

    Experiences with the NoAH Honeynet Testbed to Detect new Internet Worms by Kohlrausch, J.

    “…Recently, major advances have been made in the area of honeypot technologies. These include the development of very accurate and reliable detection methods for…”
    Get full text
    Conference Proceeding
  13. 13

    An Automated User Transparent Approach to log Web URLs for Forensic Analysis by Ahmed, M.K., Hussain, M., Raza, A.

    “…This paper presents an automated approach to record Web activity as the user connects to Internet. It includes monitoring and logging of Web URLs visited by…”
    Get full text
    Conference Proceeding
  14. 14

    Botnet Statistical Analysis Tool for Limited Resource Computer Emergency Response Team by Kaemarungsi, K., Yoskamtorn, N., Jirawannakool, K., Sanglerdsinlapachai, N., Luangingkasut, C.

    “…Botnet is recognized as one of the fastest growing threat to the Internet and most users do not aware that they were victimized. ThaiCERT is one of many…”
    Get full text
    Conference Proceeding
  15. 15

    Technique to Interrogate an Image of RAM by Wozar, M.

    “…Using Mr. Aaron Walters' Python script, nistpe.py, which generates hash values for sections within Microsoft Windows portable executables (PE), I will present…”
    Get full text
    Conference Proceeding