


default search action
ICDF2C 2015: Seoul, South Korea
- Joshua I. James
, Frank Breitinger
:
Digital Forensics and Cyber Crime - 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 157, Springer 2015, ISBN 978-3-319-25511-8
Digital Forensics Education
- Imani Palmer, Elaine Wood, Stefan Nagy, Gabriela García, Masooda N. Bashir
, Roy H. Campbell:
Digital Forensics Education: A Multidisciplinary Curriculum Model. 3-15 - Alleyn Conway, Joshua I. James
, Pavel Gladyshev
:
Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence. 16-26
Computational Forensics
- Vivek Kumar Singh, Pallav Pant, Ramesh Chandra Tripathi:
Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features. 29-38 - Vikas Gupta, Frank Breitinger
:
How Cuckoo Filter Can Improve Existing Approximate Matching Techniques. 39-52 - Yulong Zhang, Baijian Yang
, Marcus K. Rogers, Raymond A. Hansen:
Forensically Sound Retrieval and Recovery of Images from GPU Memory. 53-66
Network and Cloud Forensics
- Petr Matousek
, Jan Pluskal
, Ondrej Rysavý, Vladimír Veselý
, Martin Kmet, Filip Karpísek, Martin Vymlátil:
Advanced Techniques for Reconstruction of Incomplete Network Data. 69-84 - Conor Quinn, Mark Scanlon
, Jason Farina, M. Tahar Kechadi
:
Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility. 85-99
Cooperation in Digital Investigations
- Joshua I. James
, Pavel Gladyshev
:
A Survey of International Cooperation in Digital Investigations. 103-114 - Kelly A. Cole, Tejashree Datar, Marcus K. Rogers:
Awareness of Scam E-Mails: An Exploratory Research Study - Part 2. 115-125 - Nikolay Akatyev, Joshua I. James
:
Cyber Peacekeeping. 126-139
Social Media Investigations
- Kathryn C. Seigfried-Spellar
, Ben M. Flores, Darrin J. Griffin:
Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-psychological and Communication Perspectives. 143-175 - Flavio Bertini
, Rajesh Sharma, Andrea Ianni, Danilo Montesi
:
Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting. 176-186
Computer and Device Forensics
- Jaehyeok Han, Doowon Jeong, Sangjin Lee:
Analysis of the HIKVISION DVR File System. 189-199 - Karolina Alvarez, Masooda N. Bashir
:
Exploring the Effectiveness of Digital Forensics Tools on the Sony PlayStation Vita. 200-206

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.