About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
E-FORENSICS 2010
E-FORENSICSLAW 2010
Other Years
E-FORENSICS 2008E-FORENSICS 2009E-FORENSICS 2010
Ethics and Malpractice Statement
Back to LNICST

    E-FORENSICS

    Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

    This conference aims to bring together the research contributions in the development of tools and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices, and investigative practice and requirements for presentatio…

    This conference aims to bring together the research contributions in the development of tools and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices, and investigative practice and requirements for presentation of evidence in court are to be considered as the underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence.

    more »
    Editor(s): Xuejia Lai (Shanghai Jiao Tong University), Dawu Gu (Shanghai Jiao Tong University), Bo Jin (The 3rd Research Institute of Ministry of Public Security), Yongquan Wang (East China University of Political Science and Law) and Hui Li (Xidian University)
    Publisher
    Springer
    ISBN
    978-3-642-23602-0
    Series
    LNICST
    Conference dates
    11th–12th Nov 2010
    Location
    Shanghai, China
    Appeared in EUDL
    2012-10-10

    Copyright © 2012–2025 ICST

    Ordered by title or year
    Showing 11–20 of 25 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • Next
    • Last
    • Enhance Information Flow Tracking with Function Recognition

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Kan Zhou, Shiqiu Huang, Zhengwei Qi, Jian Gu, Beijun Shen
    • A Novel Inequality-Based Fragmented File Carving Technique

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Hwei-Ming Ying, Vrizlynn Thing
    • Research and Review on Computer Forensics

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Hong Guo, Bo Jin, Daoli Huang
    • On Achieving Encrypted File Recovery

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Xiaodong Lin, Chenxi Zhang, Theodora Dule
    • Attacks on BitTorrent – An Experimental Study

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Marti Ksionsk, Ping Ji, Weifeng Chen
    • A Stream Pattern Matching Method for Traffic Analysis

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Can Mo, Hui Li, Hui Zhu
    • An Efficient Searchable Encryption Scheme and Its Application in Network Forensics

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Xiaodong Lin, Rongxing Lu, Kevin Foxton, Xuemin Shen
    • Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Liping Ding, Jian Gu, Yongji Wang, Jingzheng Wu
    • Investigating the Implications of Virtualization for Digital Forensics

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Zheng Song, Bo Jin, Yinghong Zhu, Yongqing Sun
    • Network Connections Information Extraction of 64-Bit Windows 7 Memory Images

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Lianhai Wang, Lijuan Xu, Shuhui Zhang
    • First
    • Previous
    • 1
    • 2
    • 3
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL