Search Results - "2011 Sixth International Conference on IT Security Incident Management and IT Forensics"

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Security Aspects of Piecewise Hashing in Computer Forensics by Baier, H., Breitinger, F.

    “…Although hash functions are a well-known method in computer science to map arbitrary large data to bit strings of a fixed length, their use in computer…”
    Get full text
    Conference Proceeding
  2. 2

    Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art by Poisel, R., Tjoa, S.

    “…Digital forensics is one of the cornerstones to investigate criminal activities such as fraud, computer security breaches or the distribution of illegal…”
    Get full text
    Conference Proceeding
  3. 3

    Integrated Security Incident Management -- Concepts and Real-World Experiences by Metzger, S., Hommel, W., Reiser, H.

    “…We present a holistic, process-oriented approach to ISO/IEC 27001 compliant security incident management that integrates multiple state-of-the-art security…”
    Get full text
    Conference Proceeding
  4. 4

    Usability of Forensics Tools: A User Study by Hibshi, H., Vidas, T., Cranor, L.

    “…Digital forensics has become a critical part of almost every investigation, and users of digital forensics tools are becoming more diverse in their backgrounds…”
    Get full text
    Conference Proceeding
  5. 5

    Automated Audit of Compliance and Security Controls by Koschorreck, G.

    “…This paper gives an overview of the existing standards to describe security content. We discuss the challenges security organizations are facing and present…”
    Get full text
    Conference Proceeding
  6. 6

    Towards Forensic Data Flow Analysis of Business Process Logs by Accorsi, R., Wonnemann, C., Stocker, T.

    “…This paper presents RecIF, a forensic technique for the analysis of business process logs to detect illegal data flows. RecIF uses propagation graphs to…”
    Get full text
    Conference Proceeding
  7. 7

    Computational Documentation of IT Incidents as Support for Forensic Operations by Kurowski, S., Frings, S.

    “…This paper describes the development and prototypic implementation of a documentation system for IT incidents. A survey was conducted in order to obtain…”
    Get full text
    Conference Proceeding
  8. 8

    Use of Machine Learning Classification Techniques to Detect Atypical Behavior in Medical Applications by Ziemniak, T.

    “…Health care informatics is growing at an incredible pace. Originally, health care organizations, like all other industries, used pen and paper to track medical…”
    Get full text
    Conference Proceeding
  9. 9

    A Common Scheme for Evaluation of Forensic Software by Hildebrandt, M., Kiltz, S., Dittmann, J.

    “…We introduce a first common evaluation scheme for forensic software. Therefore, we investigate potential attacks on forensic software to derive preliminary…”
    Get full text
    Conference Proceeding
  10. 10

    Towards a Rapid-Alert System for Security Incidents by Rass, S.

    “…Predicting security incidents and forecasting risk are two essential duties when designing an enterprise security system. Based on a quantitative risk…”
    Get full text
    Conference Proceeding
  11. 11

    Keynotes

    “…Provides an abstract for each of the keynote presentations and may include a brief professional biography of each…”
    Get full text
    Conference Proceeding
  12. 12

    Preface

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  13. 13

    Workshops

    “…Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for…”
    Get full text
    Conference Proceeding
  14. 14

    Design and Implementation of a Documentation Tool for Interactive Commandline Sessions by Dewald, A., Freiling, F. C., Weber, T.

    “…In digital investigations it is important to document the examination of a computer system with as much detail as possible. Allthough never designed for…”
    Get full text
    Conference Proceeding