About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
E-FORENSICS 2008
WKDD 2008
Other Years
E-FORENSICS 2008E-FORENSICS 2009E-FORENSICS 2010
Ethics and Malpractice Statement

    E-FORENSICS

    1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

    The birth of the Internet as a commercial entity and the development of increasingly sophisticated digital consumer technology has led to new opportunities for criminals and new challenges for law enforcement. Those same technologies also offer new tools for scientific investigation of evidence. …

    The birth of the Internet as a commercial entity and the development of increasingly sophisticated digital consumer technology has led to new opportunities for criminals and new challenges for law enforcement. Those same technologies also offer new tools for scientific investigation of evidence.

    In telecommunications, Voice over IP raises significant challenges for call intercept and route tracing. Information systems are becoming overwhelmingly large and the challenges of associating relevant information from one source with another require new sophisticated tools. And consumer multimedia devices, especially video and still cameras, are increasingly becoming the tools of choice to create potentially illegal content. At the same time, the scientific gathering and investigation of evidence at a crime scene is being pushed towards digital techniques, raising questions of the veracity and completeness of evidence.

    The aim of this conference is to bring together state of the art research contributions in the development of tools, protocols and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices. Investigative practice and requirements for presentation of evidence in court are to be considered key underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence.

    more »
    Editor(s): Matthew Sorell (University of Adelaide ) and Lang White (University of Adelaide)
    Publisher
    ACM
    ISBN
    978-963-9799-19-6
    Conference dates
    21st–23rd Jan 2008
    Location
    Adelaide, Australia
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 ICST

    Ordered by title or year
    Showing 31–33 of 33 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • Video Motion Detection Beyond Reasonable Doubt

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Zhuo Xiao, Amirsaman Poursoltanmohammad, Matthew Sorell
    • Voice over IP Forensics.

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Jill Slay, Matthew Simon
    • Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols

      Research Article in 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

      Halil Ibrahim BULBUL, Ihsan BATMAZ, Mesut OZEL
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL