About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
E-FORENSICS 2008
WKDD 2008
Other Years
E-FORENSICS 2008E-FORENSICS 2009E-FORENSICS 2010
Ethics and Malpractice Statement

    E-FORENSICS

    1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

    The birth of the Internet as a commercial entity and the development of increasingly sophisticated digital consumer technology has led to new opportunities for criminals and new challenges for law enforcement. Those same technologies also offer new tools for scientific investigation of evidence. …

    The birth of the Internet as a commercial entity and the development of increasingly sophisticated digital consumer technology has led to new opportunities for criminals and new challenges for law enforcement. Those same technologies also offer new tools for scientific investigation of evidence.

    In telecommunications, Voice over IP raises significant challenges for call intercept and route tracing. Information systems are becoming overwhelmingly large and the challenges of associating relevant information from one source with another require new sophisticated tools. And consumer multimedia devices, especially video and still cameras, are increasingly becoming the tools of choice to create potentially illegal content. At the same time, the scientific gathering and investigation of evidence at a crime scene is being pushed towards digital techniques, raising questions of the veracity and completeness of evidence.

    The aim of this conference is to bring together state of the art research contributions in the development of tools, protocols and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices. Investigative practice and requirements for presentation of evidence in court are to be considered key underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence.

    more »
    Editor(s): Matthew Sorell (University of Adelaide ) and Lang White (University of Adelaide)
    Publisher
    ACM
    ISBN
    978-963-9799-19-6
    Conference dates
    21st–23rd Jan 2008
    Location
    Adelaide, Australia
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 ICST

    Ordered by title or year
    Showing 11–20 of 33 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    • Explosive blast effects on latent fingerprints

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      V.A. Kuznetsov, Jadranka Sunde, Michael Thomas
    • FORWEB: File Fingerprinting for Automated Network Forensics Investigations

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      John Haggerty, David Llewellyn-Jones, Mark Taylor
    • Forensics for Korean Cell Phone

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Keonwoo Kim, Dowon Hong, Kyoil Chung
    • Forensics in cyber-space: the legal challenges

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Nigel Wilson
    • Hiding Skype VoIP Calls from Parametric Identification

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Mauro Migliardi, Roberto Podesta, Matteo Tebaldi, Massimo Maresca
    • High Speed Search for Large-Scale Digital Forensic Investigation

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Hyungkeun Jee, Jooyoung Lee, Dowon Hong
    • Image Tampering Detection Using Bayer Interpolation and JPEG Compression

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Marie-Charlotte Poilpre, Patrick Perrot, Hugues Talbot
    • Luminescence Analysis for Radiological and Nuclear Forensic Application

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Nigel A. Spooner, Barnaby W. Smith
    • Methods to identify spammers

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Tobias Eggendorfer
    • Optical flow image analysis of facial expressions of human emotion: forensic applications

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Carmen J. Duthoit, Tamara Sztynda, Sara K.L. Lal, Budi T. Jap, J.I. Agbinya
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL