Chris Hargreaves : Publications
Book chapters
-
[1]
Digital Forensics Education
Christopher Hargreaves
In Williams‚ Cassella and Maskell, editors, Forensic Science Education and Training. Wiley. 2017.
Details about Digital Forensics Education | BibTeX data for Digital Forensics Education
Journal papers
-
[1]
Forensic data recovery from the Windows Search Database
Howard Chivers and Christopher Hargreaves
In Digital Investigation. Vol. 9. No. SUPPL. Pages S69–S79. 2012.
Details about Forensic data recovery from the Windows Search Database | BibTeX data for Forensic data recovery from the Windows Search Database
-
[2]
An automated timeline reconstruction approach for digital forensic investigations
Christopher Hargreaves and Jonathan Patterson
In Digital Investigation. Vol. 9. No. SUPPL. Pages 69–79. 2012.
Details about An automated timeline reconstruction approach for digital forensic investigations | BibTeX data for An automated timeline reconstruction approach for digital forensic investigations
-
[3]
Using a software exploit to image RAM on an embedded system
Joseph Rabaiotti and Christopher Hargreaves
In Digital Investigation. Vol. 6. No. 3−4. Pages 95–103. 2010.
Details about Using a software exploit to image RAM on an embedded system | BibTeX data for Using a software exploit to image RAM on an embedded system
-
[4]
Windows Vista and digital investigations
Christopher Hargreaves‚ Howard Chivers and Titheridge David
In Digital Investigation. Vol. 5. No. 1−2. Pages 34–48. 2008.
Details about Windows Vista and digital investigations | BibTeX data for Windows Vista and digital investigations
Conference papers
-
[1]
Visualisation of allocated and unallocated data blocks in digital forensics
Christopher Hargreaves
In Proceedings of the European Information Security Multi−Conference. Pages 133–143. 2013.
Details about Visualisation of allocated and unallocated data blocks in digital forensics | BibTeX data for Visualisation of allocated and unallocated data blocks in digital forensics
-
[2]
Detecting Tor Vidalia Bundle Installation
Anne David and Christopher Hargreaves
In International Conference on Cybercrime‚ Security and Digital Forensics. 2013.
Details about Detecting Tor Vidalia Bundle Installation | BibTeX data for Detecting Tor Vidalia Bundle Installation
-
[3]
An analysis of Hotmail artefacts in Firefox
Anne David and Christopher Hargreaves
In 6th Cybercrime Forensics Education and Training. 2012.
Details about An analysis of Hotmail artefacts in Firefox | BibTeX data for An analysis of Hotmail artefacts in Firefox
-
[4]
The Potential for cross−drive analysis using automated digital forensic timelines
Jonathan Patterson and Christopher Hargreaves
In 6th Cybercrime Forensics Education and Training. 2012.
Details about The Potential for cross−drive analysis using automated digital forensic timelines | BibTeX data for The Potential for cross−drive analysis using automated digital forensic timelines
-
[5]
Automated identification and reconstruction of YouTube video access
Jonathan Patterson and Christopher Hargreaves
In 5th Cybercrime Forensics Education and Training. 2011.
Details about Automated identification and reconstruction of YouTube video access | BibTeX data for Automated identification and reconstruction of YouTube video access
-
[6]
A Virtualisation based forensic computing research tool
Christopher Hargreaves and Howard Chivers
In 4th Cybercrime Forensics Education and Training. 2010.
Details about A Virtualisation based forensic computing research tool | BibTeX data for A Virtualisation based forensic computing research tool
-
[7]
Detecting hidden encrypted volumes
Christopher Hargreaves and Howard Chivers
In Communications and Multimedia Security : 11th IFIP TC 6/TC 11 International Conference‚ CMS 2010. 2010.
Details about Detecting hidden encrypted volumes | BibTeX data for Detecting hidden encrypted volumes
-
[8]
Establishing context when investigating a suspect's internet usage
Christopher Hargreaves
In 3rd Cybercrime Forensics Education & Training. 2009.
Details about Establishing context when investigating a suspect's internet usage | BibTeX data for Establishing context when investigating a suspect's internet usage
-
[9]
Recovery of Encryption Keys from Memory Using a Linear Scan
Christopher Hargreaves and Howard Chivers
In International Workshop on Digital Forensics (WSDF'08) as part of The Third International Conference on Availability‚ Reliability and Security (ARES 2008). 2008.
Details about Recovery of Encryption Keys from Memory Using a Linear Scan | BibTeX data for Recovery of Encryption Keys from Memory Using a Linear Scan
-
[10]
Avoiding live imaging of large encrypted volumes by recovering keys from memory.
Christopher Hargreaves and Howard Chivers
In Advanced in Digital Forensics and Security. Liverpool. 2008.
Details about Avoiding live imaging of large encrypted volumes by recovering keys from memory. | BibTeX data for Avoiding live imaging of large encrypted volumes by recovering keys from memory.
-
[11]
Potential Impacts of Windows Vista on Digital Investigations
Christopher Hargreaves and Howard Chivers
In Advanced in Computer Security and Forensics. 2007.
Details about Potential Impacts of Windows Vista on Digital Investigations | BibTeX data for Potential Impacts of Windows Vista on Digital Investigations
-
[12]
A PDA−Based Live Forensic Tool
Christopher Hargreaves‚ Howard Chivers and Iain Sutherland
In Proceedings from 1st Advances in Computer Security and Forensics. 2006.
Details about A PDA−Based Live Forensic Tool | BibTeX data for A PDA−Based Live Forensic Tool