About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
E-FORENSICS 2008
WKDD 2008
Other Years
E-FORENSICS 2008E-FORENSICS 2009E-FORENSICS 2010
Ethics and Malpractice Statement

    E-FORENSICS

    1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

    The birth of the Internet as a commercial entity and the development of increasingly sophisticated digital consumer technology has led to new opportunities for criminals and new challenges for law enforcement. Those same technologies also offer new tools for scientific investigation of evidence. …

    The birth of the Internet as a commercial entity and the development of increasingly sophisticated digital consumer technology has led to new opportunities for criminals and new challenges for law enforcement. Those same technologies also offer new tools for scientific investigation of evidence.

    In telecommunications, Voice over IP raises significant challenges for call intercept and route tracing. Information systems are becoming overwhelmingly large and the challenges of associating relevant information from one source with another require new sophisticated tools. And consumer multimedia devices, especially video and still cameras, are increasingly becoming the tools of choice to create potentially illegal content. At the same time, the scientific gathering and investigation of evidence at a crime scene is being pushed towards digital techniques, raising questions of the veracity and completeness of evidence.

    The aim of this conference is to bring together state of the art research contributions in the development of tools, protocols and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices. Investigative practice and requirements for presentation of evidence in court are to be considered key underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence.

    more »
    Editor(s): Matthew Sorell (University of Adelaide ) and Lang White (University of Adelaide)
    Publisher
    ACM
    ISBN
    978-963-9799-19-6
    Conference dates
    21st–23rd Jan 2008
    Location
    Adelaide, Australia
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 ICST

    Ordered by title or year
    Showing 1–10 of 33 results
    Page size: 102550
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    • A New RST-Invariant Watermarking Scheme Based on Texture Features

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Shipu Zheng, Yuesheng Zhu, Xing Wang
    • Abduction and Legal Reasoning

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Giada Maggenti, Andrea Bracciali, Paolo Mancarella
    • Advanced Jpeg Carving

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Michael I. Cohen
    • Analysis of a Zero Location based Authentication Scheme for Biomedical Images

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Antionette W.-T. Goh, M. L. Dennis Wong, Raphael C.-W. Phan
    • Automatic Voice Activity Detection in Different Speech Applications

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Marko Tuononen, Rosa Gonzalez Hautamaki, Pasi Fränti
    • Cheat-Prevention and -Analysis in Online Virtual Worlds

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Sabine Cikic, Sven Grottke, Fritz Lehmann-Grube, Jan Sablatnig
    • Conditions for Effective Detection and Identification of Primary Quantization of Re-Quantized JPEG Images

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Matthew James Sorell
    • Conducting forensic investigations of cyber attacks on automobile in-vehicle networks

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Dennis K. Nilsson, Ulf E. Larson
    • DatatraceDNA®: a novel authentic technology for forensic detections and identifications

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Xinshi Luo, Sivakumar Balakrishnan, Peter Osvath, Gerry Swiegers
    • Document forensics based on steganographic anti-counterfeiting markings and mobile architectures

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      F. P. Beekhof, S. Voloshynovskiy, O. Koval, R. VIllan, E. Topak
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL