About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
E-FORENSICS 2010
E-FORENSICSLAW 2010
Other Years
E-FORENSICS 2008E-FORENSICS 2009E-FORENSICS 2010
Ethics and Malpractice Statement

    E-FORENSICS

    Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

    This conference aims to bring together the research contributions in the development of tools and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices, and investigative practice and requirements for presentatio…

    This conference aims to bring together the research contributions in the development of tools and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices, and investigative practice and requirements for presentation of evidence in court are to be considered as the underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence.

    more »
    Editor(s): Xuejia Lai (Shanghai Jiao Tong University), Dawu Gu (Shanghai Jiao Tong University), Bo Jin (The 3rd Research Institute of Ministry of Public Security), Yongquan Wang (East China University of Political Science and Law) and Hui Li (Xidian University)
    Publisher
    Springer
    ISBN
    978-3-642-23602-0
    Series
    LNICST
    Conference dates
    11th–12th Nov 2010
    Location
    Shanghai, China
    Appeared in EUDL
    2012-10-10

    Copyright © 2012–2025 ICST

    Ordered by title or year
    Showing 1–10 of 25 results
    Page size: 102550
    • 1
    • 2
    • 3
    • Next
    • Last
    • Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Liping Ding, Jian Gu, Yongji Wang, Jingzheng Wu
    • Data Recovery Based on Intelligent Pattern Matching

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      JunKai Yi, Shuo Tang, Hui Li
    • Fast in-Place File Carving for Digital Forensics

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Xinyan Zha, Sartaj Sahni
    • Investigating the Implications of Virtualization for Digital Forensics

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Zheng Song, Bo Jin, Yinghong Zhu, Yongqing Sun
    • Live Memory Acquisition through FireWire

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Lei Zhang, Lianhai Wang, Ruichao Zhang, Shuhui Zhang, Yang Zhou
    • Network Connections Information Extraction of 64-Bit Windows 7 Memory Images

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Lianhai Wang, Lijuan Xu, Shuhui Zhang
    • Study on Supervision of Integrity of Chain of Custody in Computer Forensics

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Yi Wang
    • Using Relationship-Building in Event Profiling for Digital Forensic Investigations

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Lynn Batten, Lei Pan
    • A Novel Inequality-Based Fragmented File Carving Technique

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Hwei-Ming Ying, Vrizlynn Thing
    • A Stream Pattern Matching Method for Traffic Analysis

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Can Mo, Hui Li, Hui Zhu
    • 1
    • 2
    • 3
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL