Articles
A Two-Stage Model for Social Network Investigations in Digital Forensics
Anne David, Sarah Morris, and Gareth Appleby-Thomas
Cryptography, Passwords, Privacy, and the Fifth Amendment
Gary C. Kessler and Ann M. Phillips
Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools
Ian M. Kennedy, Blaine Price, and Arosha Bandara
A FORENSIC FIRST LOOK AT A POS DEVICE: SEARCHING FOR PCI DSS DATA STORAGE VIOLATIONS
Stephen Larson, James Jones, and Jim Swauger
Backup and Recovery Mechanisms of Cassandra Database: A Review
Karina Bohora, Amol Bothe, Damini Sheth, Rupali Chopade, and V. K. Pachghare
Identification of LSB image Steganography using Cover Image Comparisons
Michael Pelosi and Chuck Easttom