


default search action
ICDF2C 2009: Albany, NY, USA
- Sanjay Goel:

Digital Forensics and Cyber Crime - First International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 31, Springer 2010, ISBN 978-3-642-11533-2
Part 1 / Accounting & Fraud
- Sriram Raghavan, S. V. Raghavan:

Digital Evidence Composition in Fraud Detection. 1-8
Part 2 / Multimedia & Handheld Device Forensics
- Mohammad Iftekhar Husain, Ramalingam Sridhar:

iForensics: Forensic Analysis of Instant Messaging on Smart Phones. 9-18 - Saif M. Al-Kuwari

, Stephen D. Wolthusen:
A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks. 19-32 - Ibrahim M. Baggili

, Ashwin Mohan, Marcus K. Rogers
:
SMIRK: SMS Management and Information Retrieval Kit. 33-42 - Jong P. Yoon, Zhixiong Chen:

Localization and Detection of Vector Logo Image Plagiarism. 43-58 - Muhammad Yasin, Muhammad Arif Wahla, Firdous Kausar

:
Analysis of Free Download Manager for Forensic Artefacts. 59-68 - Martin Steinebach, Mohamed El Ouariachi, Huajian Liu, Stefan Katzenbeisser:

On the Reliability of Cell Phone Camera Fingerprint Recognition. 69-76
Part 3 / Financial Crimes
- Nhien-An Le-Khac

, Sammer Markos, Mohand Tahar Kechadi
:
Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank. 77-84
Part 4 / Cyber Crime Investigations
- Joshua James

, Pavel Gladyshev
, Mohd Taufik Abdullah, Yuandong Zhu:
Analysis of Evidence Using Formal Event Reconstruction. 85-98 - Angela Orebaugh, Jeremy E. Allnutt:

Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations. 99-110 - Pritheega Magalingam

, Azizah Bt Abdul Manaf, Rabiah Ahmad, Zuraimi Yahya:
Digital Evidence Retrieval and Forensic Analysis on Gambling Machine. 111-121
Part 5 / Forensics & Law
- Mark Scanlon

, Mohand Tahar Kechadi
:
Online Acquisition of Digital Forensic Evidence. 122-131 - Rebecca Mercuri:

Criminal Defense Challenges in Computer Forensics. 132-138
Part 6 / Cyber Security & Information Warfare
- Amin Ibrahim, Miguel Vargas Martin:

Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance. 139-150 - Duane Wilson, Michael K. Lavine:

A Discretionary Access Control Method for Preventing Data Exfiltration (DE) via Removable Devices. 151-160 - Frank Y. W. Law, Kam-Pui Chow, Pierre K. Y. Lai, Hayson Tse:

A Host-Based Approach to BotNet Investigation? 161-170

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














