Search Results - "2011 Sixth International Conference on IT Security Incident Management and IT Forensics"
-
1
Security Aspects of Piecewise Hashing in Computer Forensics
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…Although hash functions are a well-known method in computer science to map arbitrary large data to bit strings of a fixed length, their use in computer…”
Get full text
Conference Proceeding -
2
Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…Digital forensics is one of the cornerstones to investigate criminal activities such as fraud, computer security breaches or the distribution of illegal…”
Get full text
Conference Proceeding -
3
Integrated Security Incident Management -- Concepts and Real-World Experiences
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…We present a holistic, process-oriented approach to ISO/IEC 27001 compliant security incident management that integrates multiple state-of-the-art security…”
Get full text
Conference Proceeding -
4
Usability of Forensics Tools: A User Study
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…Digital forensics has become a critical part of almost every investigation, and users of digital forensics tools are becoming more diverse in their backgrounds…”
Get full text
Conference Proceeding -
5
Automated Audit of Compliance and Security Controls
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…This paper gives an overview of the existing standards to describe security content. We discuss the challenges security organizations are facing and present…”
Get full text
Conference Proceeding -
6
Towards Forensic Data Flow Analysis of Business Process Logs
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…This paper presents RecIF, a forensic technique for the analysis of business process logs to detect illegal data flows. RecIF uses propagation graphs to…”
Get full text
Conference Proceeding -
7
Computational Documentation of IT Incidents as Support for Forensic Operations
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…This paper describes the development and prototypic implementation of a documentation system for IT incidents. A survey was conducted in order to obtain…”
Get full text
Conference Proceeding -
8
Use of Machine Learning Classification Techniques to Detect Atypical Behavior in Medical Applications
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…Health care informatics is growing at an incredible pace. Originally, health care organizations, like all other industries, used pen and paper to track medical…”
Get full text
Conference Proceeding -
9
A Common Scheme for Evaluation of Forensic Software
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…We introduce a first common evaluation scheme for forensic software. Therefore, we investigate potential attacks on forensic software to derive preliminary…”
Get full text
Conference Proceeding -
10
Towards a Rapid-Alert System for Security Incidents
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…Predicting security incidents and forecasting risk are two essential duties when designing an enterprise security system. Based on a quantitative risk…”
Get full text
Conference Proceeding -
11
Keynotes
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…Provides an abstract for each of the keynote presentations and may include a brief professional biography of each…”
Get full text
Conference Proceeding -
12
Preface
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…Presents the welcome message from the conference proceedings…”
Get full text
Conference Proceeding -
13
Workshops
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for…”
Get full text
Conference Proceeding -
14
Design and Implementation of a Documentation Tool for Interactive Commandline Sessions
Published in 2011 Sixth International Conference on IT Security Incident Management and IT Forensics (01-05-2011)“…In digital investigations it is important to document the examination of a computer system with as much detail as possible. Allthough never designed for…”
Get full text
Conference Proceeding