Table of Contents
Front Matter/Back Matter
Articles
On Identities in Modern Networks
Libor Polcak, Radek Hranick, and Tomas Martınek
File Detection on Network Traffic Using Approximate Matching
Frank Breitinger and Ibrahim Baggili
Accurate Modeling of the Siemens S7 SCADA Protocol for Intrusion Detection and Digital Forensics
Amit Kleinmann and Avishai Wool
Understanding Computer Forensics Requirements in China via the “Panda Burning Incense” Virus Case
Frank Law, K. P. Chow, and Y. H. Mai
Forensics of Software Copyright Infringement Crimes: The Modern POSAR Test Juxtaposed With The Dated AFC Test
Vinod P. Bhattathiripad
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync
Mark Scanlon, Jason Farina, Nhien A. Khac, and Tahar Kechadi
Fast RTP Detection and Codecs Classification in Internet Traffic
Petr Matousek, Ondrej Rysavy, and Martin Kmet
Developing a Conceptual Framework for Modeling Deviant Cyber Flash Mob: A Socio-Computational Approach Leveraging Hypergraph Constructs
Samer Al-khateeb and Nitin Agarwal
Audit: Automated Disk Investigation Toolkit
Umit Karabiyik and Sudhir Aggarwal
Exploring Forensic Implications of the Fusion Drive
Shruti Gupta and Marcus Rogers
An Efficient Similarity Digests Database Lookup – A Logarithmic Divide & Conquer Approach
Frank Breitinger, Christian Rathgeb, and Harald Baier
Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction
Changwei Liu, Anoop Singhal, and Duminda Wijesekera
Evidentiary Power and Propriety of Digital Identifiers and the Impact on Privacy Rights in the United States
Michael Losavio and Deborah Keeling
Effects of the Factory Reset on Mobile Devices
Riqui Schwamm and Neil C. Rowe
Testing Framework for Mobile Device Forensics Tools
Maxwell Anobah, Shahzad Saleem, and Oliver Popov
From the Editor-in-Chief
Ibrahim A. Baggili