About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
E-FORENSICS 2010
E-FORENSICSLAW 2010
Other Years
E-FORENSICS 2008E-FORENSICS 2009E-FORENSICS 2010
Ethics and Malpractice Statement
Back to LNICST

    E-FORENSICS

    Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

    This conference aims to bring together the research contributions in the development of tools and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices, and investigative practice and requirements for presentatio…

    This conference aims to bring together the research contributions in the development of tools and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices, and investigative practice and requirements for presentation of evidence in court are to be considered as the underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence.

    more »
    Editor(s): Xuejia Lai (Shanghai Jiao Tong University), Dawu Gu (Shanghai Jiao Tong University), Bo Jin (The 3rd Research Institute of Ministry of Public Security), Yongquan Wang (East China University of Political Science and Law) and Hui Li (Xidian University)
    Publisher
    Springer
    ISBN
    978-3-642-23602-0
    Series
    LNICST
    Conference dates
    11th–12th Nov 2010
    Location
    Shanghai, China
    Appeared in EUDL
    2012-10-10

    Copyright © 2012–2025 ICST

    Ordered by title or year
    Showing 1–10 of 25 results
    Page size: 102550
    • 1
    • 2
    • 3
    • Next
    • Last
    • A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Zhenxing Lei, Theodora Dule, Xiaodong Lin
    • On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Saif Al-Kuwari, Stephen Wolthusen
    • Behavior Clustering for Anomaly Detection

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Xudong Zhu, Hui Li, Zhijing Liu
    • A Privilege Separation Method for Security Commercial Transactions

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Yasha Chen, Jun Hu, Xinmao Gai, Yu Sun
    • Text Content Filtering Based on Chinese Character Reconstruction from Radicals

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Wenlei He, Gongshen Liu, Jun Luo, Jiuchuan Lin
    • Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Ning Ding, Dawu Gu, Zhiqiang Liu
    • Digital Signatures for e-Government - A Long-Term Security Architecture

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Przemysław Błaśkiewicz, Przemysław Kubiak, Mirosław Kutyłowski
    • RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Yong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng
    • Digital Forensic Analysis on Runtime Instruction Flow

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Juanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo
    • Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Lijuan Xu, Lianhai Wang, Lei Zhang, Zhigang Kong
    • 1
    • 2
    • 3
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL