


default search action
ICDF2C 2015: Seoul, South Korea
- Joshua I. James

, Frank Breitinger
:
Digital Forensics and Cyber Crime - 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 157, Springer 2015, ISBN 978-3-319-25511-8
Digital Forensics Education
- Imani Palmer, Elaine Wood, Stefan Nagy, Gabriela García, Masooda N. Bashir

, Roy H. Campbell:
Digital Forensics Education: A Multidisciplinary Curriculum Model. 3-15 - Alleyn Conway, Joshua I. James

, Pavel Gladyshev
:
Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence. 16-26
Computational Forensics
- Vivek Kumar Singh, Pallav Pant, Ramesh Chandra Tripathi:

Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features. 29-38 - Vikas Gupta, Frank Breitinger

:
How Cuckoo Filter Can Improve Existing Approximate Matching Techniques. 39-52 - Yulong Zhang, Baijian Yang

, Marcus K. Rogers
, Raymond A. Hansen:
Forensically Sound Retrieval and Recovery of Images from GPU Memory. 53-66
Network and Cloud Forensics
- Petr Matousek

, Jan Pluskal
, Ondrej Rysavý, Vladimír Veselý
, Martin Kmet, Filip Karpísek, Martin Vymlátil:
Advanced Techniques for Reconstruction of Incomplete Network Data. 69-84 - Conor Quinn, Mark Scanlon

, Jason Farina, M. Tahar Kechadi
:
Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility. 85-99
Cooperation in Digital Investigations
- Joshua I. James

, Pavel Gladyshev
:
A Survey of International Cooperation in Digital Investigations. 103-114 - Kelly A. Cole, Tejashree Datar, Marcus K. Rogers

:
Awareness of Scam E-Mails: An Exploratory Research Study - Part 2. 115-125 - Nikolay Akatyev, Joshua I. James

:
Cyber Peacekeeping. 126-139
Social Media Investigations
- Kathryn C. Seigfried-Spellar

, Ben M. Flores, Darrin J. Griffin:
Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-psychological and Communication Perspectives. 143-175 - Flavio Bertini

, Rajesh Sharma, Andrea Ianni, Danilo Montesi
:
Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting. 176-186
Computer and Device Forensics
- Jaehyeok Han, Doowon Jeong, Sangjin Lee:

Analysis of the HIKVISION DVR File System. 189-199 - Karolina Alvarez, Masooda N. Bashir

:
Exploring the Effectiveness of Digital Forensics Tools on the Sony PlayStation Vita. 200-206

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














