Message from EAI President regarding COVID-19
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
E-FORENSICS 2008
WKDD 2008
Other Years
E-FORENSICS 2008E-FORENSICS 2009E-FORENSICS 2010
Ethics and Malpractice Statement

    E-FORENSICS

    1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

    The birth of the Internet as a commercial entity and the development of increasingly sophisticated digital consumer technology has led to new opportunities for criminals and new challenges for law enforcement. Those same technologies also offer new tools for scientific investigation of evidence. …

    The birth of the Internet as a commercial entity and the development of increasingly sophisticated digital consumer technology has led to new opportunities for criminals and new challenges for law enforcement. Those same technologies also offer new tools for scientific investigation of evidence.

    In telecommunications, Voice over IP raises significant challenges for call intercept and route tracing. Information systems are becoming overwhelmingly large and the challenges of associating relevant information from one source with another require new sophisticated tools. And consumer multimedia devices, especially video and still cameras, are increasingly becoming the tools of choice to create potentially illegal content. At the same time, the scientific gathering and investigation of evidence at a crime scene is being pushed towards digital techniques, raising questions of the veracity and completeness of evidence.

    The aim of this conference is to bring together state of the art research contributions in the development of tools, protocols and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices. Investigative practice and requirements for presentation of evidence in court are to be considered key underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence.

    more »
    Editor(s): Matthew Sorell (University of Adelaide ) and Lang White (University of Adelaide)
    Publisher
    ACM
    ISBN
    978-963-9799-19-6
    Conference dates
    21st–23rd Jan 2008
    Location
    Adelaide, Australia
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2023 ICST

    Ordered by title or year
    Showing 21–30 of 33 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    • Recovering data from USB Flash memory sticks that have been damaged or electronically erased

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      B. J. Phillips, C. D. Schmidt, D. R. Kelly
    • Recovery of Circumstantial Digital Evidence Leading to an Anton Piller Order: A Case Study

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Roland MacKenzie, Matthew Sorell
    • Reversible And Blind Database Watermarking Using Difference Expansion

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Gaurav Gupta, Josef Pieprzyk
    • SVD-Based Watermark with Quasi-One-Way Operation by Reducing a Singular Value Matrix Rank

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Kazuo Ohzeki, Masaru Sakurai
    • Searching in space and time: a system for forensic analysis of large video repositories

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Anton van den Hengel, Rhys Hill, Henry Detmold, Anthony Dick
    • Suspects' data hiding at remaining registry values of uninstalled programs

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Youngsoo Kim, Sangsu Lee, Dowon Hong
    • The Adaptability of Electronic Evidence Acquisition Guides for New Technologies

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Benjamin Turnbull
    • The Design of Framework for Detecting an Insider’s Leak of Confidential Information

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Eunju Beak, Yeog Kim, Jinwon Sung, Sangjin Lee
    • Timestamp evidence correlation by model based clock hypothesis testing

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Svein Yngvar Willassen
    • Using a Room Metaphor for E-Forensic Working Environments

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Sabine Cikic, Sabina Jeschke, Fritz Lehmann-Grube, Jan Sablatnig
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico