default search action
2. e-Forensics 2009: Adelaide, Australia
- Matthew Sorell:
Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 8, Springer 2009, ISBN 978-3-642-02311-8 - Fariborz Mahmoudi, Mohsen Mirzashaeri, Ehsan Shahamatnia, Saed Faridnia:
A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network. 1-9 - Heikki Kokkinen, Janne Nöyränen:
Forensics for Detecting P2P Network Originated MP3 Files on the User Device. 10-18 - Fariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri:
Image Encryption Using Chaotic Signal and Max-Heap Tree. 19-28 - Niall McGrath, Pavel Gladyshev, M. Tahar Kechadi, Joe Carthy:
Investigating Encrypted Material. 29-35 - Benjamin P. Turnbull, Grant Osborne, Matthew Simon:
Legal and Technical Implications of Collecting Wireless Data as an Evidence Source. 36-41 - M. L. Dennis Wong, Antionette W.-T. Goh, Hong Siang Chua:
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt. 42-53 - Lei Pan, Lynn Margaret Batten:
Robust Correctness Testing for Digital Forensic Tools. 54-64 - Kosta Haltis, Lee Andersson, Matthew Sorell, Russell S. A. Brinkworth:
Surveillance Applications of Biologically-Inspired Smart Cameras. 65-76 - Jill Slay, Elena Sitnikova:
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems. 77-82 - Sriram Raghavan, Andrew J. Clark, George M. Mohay:
FIA: An Open Forensic Integration Architecture for Composing Digital Evidence. 83-94 - Roberto Caldelli, Irene Amerini, Francesco Picchioni:
Distinguishing between Camera and Scanned Images by Means of Frequency Analysis. 95-101 - Pasi Fränti, Juhani Saastamoinen, Ismo Kärkkäinen, Tomi Kinnunen, Ville Hautamäki, Ilja Sidoroff:
Developing Speaker Recognition System: From Prototype to Practical Application. 102-115 - Trupti Shiralkar, Michael K. Lavine, Benjamin P. Turnbull:
A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC. 116-121 - Xue-Guang Wang, Zhen-Chuan Chai:
A Provable Security Scheme of ID-Based Threshold Decryption. 122-129 - Simon Knight, Simon Moschou, Matthew Sorell:
Analysis of Sensor Photo Response Non-Uniformity in RAW Images. 130-141 - Timothy Neville, Matthew Sorell:
Audit Log for Forensic Photography. 142-152 - Chang-Tsun Li, Yue Li:
Authenticating Medical Images through Repetitive Index Modulation Based Watermarking. 153-159 - Heum Park, SunHo Cho, Hyuk-Chul Kwon:
Cyber Forensics Ontology for Cyber Criminal Investigation. 160-165 - Yue Li, Chang-Tsun Li:
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis. 166-172 - Chang-Tsun Li:
Detection of Block Artifacts for Digital Forensic Analysis. 173-178 - Patrick Perrot, Mathieu Morel, Joseph Razik, Gérard Chollet:
Vocal Forgery in Forensic Sciences. 179-185
International Workshop on e-Forensics Law
- Milton H. Luoma, Vicki Miller Luoma:
Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights. 186-194 - Clare Sullivan:
Digital Identity - The Legal Person?. 195-211 - Sabine Cikic, Fritz Lehmann-Grube, Jan Sablatnig:
Surveillance and Datenschutz in Virtual Environments. 212-219
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.