About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
E-FORENSICS 2010
E-FORENSICSLAW 2010
Other Years
E-FORENSICS 2008E-FORENSICS 2009E-FORENSICS 2010
Ethics and Malpractice Statement

    E-FORENSICS

    Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

    This conference aims to bring together the research contributions in the development of tools and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices, and investigative practice and requirements for presentatio…

    This conference aims to bring together the research contributions in the development of tools and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices, and investigative practice and requirements for presentation of evidence in court are to be considered as the underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence.

    more »
    Editor(s): Xuejia Lai (Shanghai Jiao Tong University), Dawu Gu (Shanghai Jiao Tong University), Bo Jin (The 3rd Research Institute of Ministry of Public Security), Yongquan Wang (East China University of Political Science and Law) and Hui Li (Xidian University)
    Publisher
    Springer
    ISBN
    978-3-642-23602-0
    Series
    LNICST
    Conference dates
    11th–12th Nov 2010
    Location
    Shanghai, China
    Appeared in EUDL
    2012-10-10

    Copyright © 2012–2025 ICST

    Ordered by title or year
    Showing 21–25 of 25 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Yong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng
    • Text Content Filtering Based on Chinese Character Reconstruction from Radicals

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Wenlei He, Gongshen Liu, Jun Luo, Jiuchuan Lin
    • A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Zhenxing Lei, Theodora Dule, Xiaodong Lin
    • Behavior Clustering for Anomaly Detection

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Xudong Zhu, Hui Li, Zhijing Liu
    • On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Saif Al-Kuwari, Stephen Wolthusen
    • First
    • Previous
    • 1
    • 2
    • 3
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL