default search action
ICDF2C 2009: Albany, NY, USA
- Sanjay Goel:
Digital Forensics and Cyber Crime - First International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 31, Springer 2010, ISBN 978-3-642-11533-2
Part 1 / Accounting & Fraud
- Sriram Raghavan, S. V. Raghavan:
Digital Evidence Composition in Fraud Detection. 1-8
Part 2 / Multimedia & Handheld Device Forensics
- Mohammad Iftekhar Husain, Ramalingam Sridhar:
iForensics: Forensic Analysis of Instant Messaging on Smart Phones. 9-18 - Saif M. Al-Kuwari, Stephen D. Wolthusen:
A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks. 19-32 - Ibrahim M. Baggili, Ashwin Mohan, Marcus K. Rogers:
SMIRK: SMS Management and Information Retrieval Kit. 33-42 - Jong P. Yoon, Zhixiong Chen:
Localization and Detection of Vector Logo Image Plagiarism. 43-58 - Muhammad Yasin, Muhammad Arif Wahla, Firdous Kausar:
Analysis of Free Download Manager for Forensic Artefacts. 59-68 - Martin Steinebach, Mohamed El Ouariachi, Huajian Liu, Stefan Katzenbeisser:
On the Reliability of Cell Phone Camera Fingerprint Recognition. 69-76
Part 3 / Financial Crimes
- Nhien-An Le-Khac, Sammer Markos, Mohand Tahar Kechadi:
Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank. 77-84
Part 4 / Cyber Crime Investigations
- Joshua James, Pavel Gladyshev, Mohd Taufik Abdullah, Yuandong Zhu:
Analysis of Evidence Using Formal Event Reconstruction. 85-98 - Angela Orebaugh, Jeremy E. Allnutt:
Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations. 99-110 - Pritheega Magalingam, Azizah Bt Abdul Manaf, Rabiah Ahmad, Zuraimi Yahya:
Digital Evidence Retrieval and Forensic Analysis on Gambling Machine. 111-121
Part 5 / Forensics & Law
- Mark Scanlon, Mohand Tahar Kechadi:
Online Acquisition of Digital Forensic Evidence. 122-131 - Rebecca Mercuri:
Criminal Defense Challenges in Computer Forensics. 132-138
Part 6 / Cyber Security & Information Warfare
- Amin Ibrahim, Miguel Vargas Martin:
Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance. 139-150 - Duane Wilson, Michael K. Lavine:
A Discretionary Access Control Method for Preventing Data Exfiltration (DE) via Removable Devices. 151-160 - Frank Y. W. Law, Kam-Pui Chow, Pierre K. Y. Lai, Hayson Tse:
A Host-Based Approach to BotNet Investigation? 161-170
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.