About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
E-FORENSICS 2008
WKDD 2008
Other Years
E-FORENSICS 2008E-FORENSICS 2009E-FORENSICS 2010
Ethics and Malpractice Statement

    E-FORENSICS

    1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

    The birth of the Internet as a commercial entity and the development of increasingly sophisticated digital consumer technology has led to new opportunities for criminals and new challenges for law enforcement. Those same technologies also offer new tools for scientific investigation of evidence. …

    The birth of the Internet as a commercial entity and the development of increasingly sophisticated digital consumer technology has led to new opportunities for criminals and new challenges for law enforcement. Those same technologies also offer new tools for scientific investigation of evidence.

    In telecommunications, Voice over IP raises significant challenges for call intercept and route tracing. Information systems are becoming overwhelmingly large and the challenges of associating relevant information from one source with another require new sophisticated tools. And consumer multimedia devices, especially video and still cameras, are increasingly becoming the tools of choice to create potentially illegal content. At the same time, the scientific gathering and investigation of evidence at a crime scene is being pushed towards digital techniques, raising questions of the veracity and completeness of evidence.

    The aim of this conference is to bring together state of the art research contributions in the development of tools, protocols and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices. Investigative practice and requirements for presentation of evidence in court are to be considered key underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence.

    more »
    Editor(s): Matthew Sorell (University of Adelaide ) and Lang White (University of Adelaide)
    Publisher
    ACM
    ISBN
    978-963-9799-19-6
    Conference dates
    21st–23rd Jan 2008
    Location
    Adelaide, Australia
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 ICST

    Ordered by title or year
    Showing 1–10 of 33 results
    Page size: 102550
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    • Video Motion Detection Beyond Reasonable Doubt

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Zhuo Xiao, Amirsaman Poursoltanmohammad, Matthew Sorell
    • Explosive blast effects on latent fingerprints

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      V.A. Kuznetsov, Jadranka Sunde, Michael Thomas
    • Searching in space and time: a system for forensic analysis of large video repositories

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Anton van den Hengel, Rhys Hill, Henry Detmold, Anthony Dick
    • Analysis of a Zero Location based Authentication Scheme for Biomedical Images

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Antionette W.-T. Goh, M. L. Dennis Wong, Raphael C.-W. Phan
    • SVD-Based Watermark with Quasi-One-Way Operation by Reducing a Singular Value Matrix Rank

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Kazuo Ohzeki, Masaru Sakurai
    • Hiding Skype VoIP Calls from Parametric Identification

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Mauro Migliardi, Roberto Podesta, Matteo Tebaldi, Massimo Maresca
    • Recovering data from USB Flash memory sticks that have been damaged or electronically erased

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      B. J. Phillips, C. D. Schmidt, D. R. Kelly
    • Conditions for Effective Detection and Identification of Primary Quantization of Re-Quantized JPEG Images

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Matthew James Sorell
    • FORWEB: File Fingerprinting for Automated Network Forensics Investigations

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      John Haggerty, David Llewellyn-Jones, Mark Taylor
    • Recovery of Circumstantial Digital Evidence Leading to an Anton Piller Order: A Case Study

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Roland MacKenzie, Matthew Sorell
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL