Cargando…

Digital Forensics and Cyber Crime First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October 2, 2009, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference, ICDF2C 2009, held September 30 - October 2, 2009, in Albany, NY, USA. Digital forensics and cyber crime is a multidisciplinary area that requires expertise in several areas including...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Goel, Sanjay (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 31
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Full and Short Papers
  • Digital Evidence Composition in Fraud Detection
  • iForensics: Forensic Analysis of Instant Messaging on Smart Phones
  • A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks
  • SMIRK: SMS Management and Information Retrieval Kit
  • Localization and Detection of Vector Logo Image Plagiarism
  • Analysis of Free Download Manager for Forensic Artefacts
  • On the Reliability of Cell Phone Camera Fingerprint Recognition
  • Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank
  • Analysis of Evidence Using Formal Event Reconstruction
  • Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations
  • Digital Evidence Retrieval and Forensic Analysis on Gambling Machine
  • Online Acquisition of Digital Forensic Evidence
  • Criminal Defense Challenges in Computer Forensics
  • Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance
  • A Discretionary Access Control Method for Preventing Data Exfiltration (DE) via Removable Devices
  • A Host-Based Approach to BotNet Investigation?.