About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
ICDF2C 2010
Other Years
ICDF2C 2009ICDF2C 2010ICDF2C 2011ICDF2C 2012ICDF2C 2013ICDF2C 2015ICDF2C 2017ICDF2C 2018
Ethics and Malpractice Statement

    ICDF2C

    Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers

    The Internet has made it easier to perpetrate traditional crimes by providing criminals an alternate avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues of illegal ac…

    The Internet has made it easier to perpetrate traditional crimes by providing criminals an alternate avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues of illegal activities are often buried in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence. The field of digital forensics is becoming very important for law enforcement, network security, and information assurance. This is a multidisciplinary area that encompasses multiple fields, including: law, computer science, finance, networking, data mining, and criminal justice. The applications of this technology are far reaching including: law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare. This conference brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. The conference is organized by the College of Information Technology at Zayed University with the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST). Authors are invited to submit original and unpublished papers to the International Conference on Digital Forensics. Accepted papers will appear in the conference proceedings and some papers will be selected for journal publication.

    more »
    Editor(s): Ibrahim Baggili (Zayed University)
    Publisher
    Springer
    ISBN
    978-3-642-19513-6
    Series
    LNICST
    Conference dates
    4th–6th Oct 2010
    Location
    Abu Dhabi, United Arab Emirates
    Appeared in EUDL
    2012-05-28

    Copyright © 2012–2025 ICST

    Ordered by title or year
    Showing 1–10 of 13 results
    Page size: 102550
    • 1
    • 2
    • Next
    • Last
    • An IP Traceback Model for Network Forensics

      Research Article in Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers

      Emmanuel Pilli, R. Joshi, Rajdeep Niyogi
    • Detecting Intermediary Hosts by TCP Latency Measurements

      Research Article in Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers

      Gurvinder Singh, Martin Eian, Svein Willassen, Stig Mjølsnes
    • Semantic Modelling of Digital Forensic Evidence

      Research Article in Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers

      Damir Kahvedžić, Tahar Kechadi
    • Towards More Secure Biometric Readers for Effective Digital Forensic Investigation

      Research Article in Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers

      Zouheir Trabelsi, Mohamed Al-Hemairy, Ibrahim Baggili, Saad Amin
    • A Simple Cost-Effective Framework for iPhone Forensic Analysis

      Research Article in Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers

      Mohammad Husain, Ibrahim Baggili, Ramalingam Sridhar
    • An Architecture for the Forensic Analysis of Windows System Artifacts

      Research Article in Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers

      Noor Hashim, Iain Sutherland
    • Dealing with the Problem of Cybercrime

      Research Article in Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers

      Ali Alkaabi, George Mohay, Adrian McCullagh, Nicholas Chantler
    • Protecting Digital Evidence Integrity by Using Smart Cards

      Research Article in Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers

      Shahzad Saleem, Oliver Popov
    • Reliable Acquisition of RAM Dumps from Intel-Based Apple Mac Computers over FireWire

      Research Article in Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers

      Pavel Gladyshev, Afrah Almansoori
    • Signature Based Detection of User Events for Post-mortem Forensic Analysis

      Research Article in Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers

      Joshua James, Pavel Gladyshev, Yuandong Zhu
    • 1
    • 2
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL