Search Results - "2009 Fifth International Conference on IT Security Incident Management and IT Forensics"
-
1
Overcast: Forensic Discovery in Cloud Environments
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…While best practices and standards are emerging, supported by advances in research, for forensic investigations in individual computer systems and networks,…”
Get full text
Conference Proceeding -
2
Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…While log data are being increasingly used as digital evidence in court, the extent to which existing secure logging protocols used to collect log data fulfill…”
Get full text
Conference Proceeding -
3
Workshop: Digital Discovery with Bootable CDs
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…Boot-CDs are a flexible and powerful method to assist in the whole forensic process from live examination to acquisition, searching and recovery. Linux was…”
Get full text
Conference Proceeding -
4
The Forensic Image Generator Generator (Forensig2)
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…We describe a system that allows to produce file system images for training courses in forensic computing. The instructor can ldquoprogramrdquo certain user…”
Get full text
Conference Proceeding -
5
Preface
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…Presents the welcome message from the conference proceedings…”
Get full text
Conference Proceeding -
6
A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-01-2009)“…While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the…”
Get full text
Conference Proceeding -
7
Self-Forensics Through Case Studies of Small-to-Medium Software Systems
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…The notion and definition of self-forensics was introduced by Mokhov to encompass software and hardware capabilities for autonomic and other systems to record…”
Get full text
Conference Proceeding -
8
Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…Download accelerator plus (DAP) is one of the most popular download managers due to its free availability, download speed and versatility. This software…”
Get full text
Conference Proceeding -
9
Fast User Classifying to Establish Forensic Analysis Priorities
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…In computer and common crimes, important evidence or clues are increasingly stored in the computers hard disks. The huge and increasing penetration of…”
Get full text
Conference Proceeding -
10
From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…Forensic investigations are usually conducted to solve crimes committed using IT systems as pertetrator and/or victim. However, depending on the size of IT…”
Get full text
Conference Proceeding -
11
Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…Risk and vulnerability management is a critical task in maintaining any nontrivial network, but made increasingly difficult by the dynamic nature of…”
Get full text
Conference Proceeding -
12
Experiences with the NoAH Honeynet Testbed to Detect new Internet Worms
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…Recently, major advances have been made in the area of honeypot technologies. These include the development of very accurate and reliable detection methods for…”
Get full text
Conference Proceeding -
13
An Automated User Transparent Approach to log Web URLs for Forensic Analysis
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…This paper presents an automated approach to record Web activity as the user connects to Internet. It includes monitoring and logging of Web URLs visited by…”
Get full text
Conference Proceeding -
14
Botnet Statistical Analysis Tool for Limited Resource Computer Emergency Response Team
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…Botnet is recognized as one of the fastest growing threat to the Internet and most users do not aware that they were victimized. ThaiCERT is one of many…”
Get full text
Conference Proceeding -
15
Technique to Interrogate an Image of RAM
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…Using Mr. Aaron Walters' Python script, nistpe.py, which generates hash values for sections within Microsoft Windows portable executables (PE), I will present…”
Get full text
Conference Proceeding