Bradley Schatz

Learn More
Readers will have access to the author's accompanying Web site with supporting materials that integrate many of the topics in the text. xiii Acknowledgments In the six years since the second edition of this text, I have worked with many brilliant digital investigators and I have taught hundreds of students. Together we tackled sophisticated network(More)
Network information systems reached the public consciousness this year as a result of the phenomenal growth in the use of the Internet. In particular, the software constituting NCSA (National Center for Supercomputing Applications) Mosaic and the World Wide Web have made global hypermedia a widespread reality for the first time. The technology underlying(More)
Within the theoretical framework of adaptive significance, it is often claimed that insects learn just what they are genetically programmed to learn. Consequently, because of the alleged lack of plasticity of their behaviour, many learning tests applied to insects are limited to very simple associative Stimulus-Response research paradigms. If the(More)
Recently the need for " digital evidence bags " – a common storage format for digital evidence – has been identified as a key requirement for enabling inter-organisational sharing of digital evidence, and interoperability between forensic analysis tools. Recent work has described an ontology based approach to correlation of event log based evidence, using(More)
Keywords: Memory forensics User space Windows XP Windows 7 Malware analysis a b s t r a c t Previous research into memory forensics has focused on understanding the structure and contents of the kernel space portions of physical memory, and mostly ignored the contents of the user space. This paper describes the results of a survey of user space virtual(More)
  • 1