2. e-Forensics 2009:
Adelaide,
Australia
Matthew Sorell (Ed.):
Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 8 Springer 2009, ISBN 978-3-642-02311-8
- Fariborz Mahmoudi, Mohsen Mirzashaeri, Ehsan Shahamatnia, Saed Faridnia:
A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network.
1-9
- Heikki Kokkinen, Janne Nöyränen:
Forensics for Detecting P2P Network Originated MP3 Files on the User Device.
10-18
- Fariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri:
Image Encryption Using Chaotic Signal and Max-Heap Tree.
19-28
- Niall McGrath, Pavel Gladyshev, M. Tahar Kechadi, Joe Carthy:
Investigating Encrypted Material.
29-35
- Benjamin Turnbull, Grant Osborne, Matthew Simon:
Legal and Technical Implications of Collecting Wireless Data as an Evidence Source.
36-41
- M. L. Dennis Wong, Antionette W.-T. Goh, Hong Siang Chua:
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt.
42-53
- Lei Pan, Lynn Margaret Batten:
Robust Correctness Testing for Digital Forensic Tools.
54-64
- Kosta Haltis, Lee Andersson, Matthew Sorell, Russell S. A. Brinkworth:
Surveillance Applications of Biologically-Inspired Smart Cameras.
65-76
- Jill Slay, Elena Sitnikova:
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems.
77-82
- Sriram Raghavan, Andrew Clark, George M. Mohay:
FIA: An Open Forensic Integration Architecture for Composing Digital Evidence.
83-94
- Roberto Caldelli, Irene Amerini, Francesco Picchioni:
Distinguishing between Camera and Scanned Images by Means of Frequency Analysis.
95-101
- Pasi Fränti, Juhani Saastamoinen, Ismo Kärkkäinen, Tomi Kinnunen, Ville Hautamäki, Ilja Sidoroff:
Developing Speaker Recognition System: From Prototype to Practical Application.
102-115
- Trupti Shiralkar, Michael Lavine, Benjamin Turnbull:
A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC.
116-121
- Xue-Guang Wang, Zhen-Chuan Chai:
A Provable Security Scheme of ID-Based Threshold Decryption.
122-129
- Simon Knight, Simon Moschou, Matthew Sorell:
Analysis of Sensor Photo Response Non-Uniformity in RAW Images.
130-141
- Timothy Neville, Matthew Sorell:
Audit Log for Forensic Photography.
142-152
- Chang-Tsun Li, Yue Li:
Authenticating Medical Images through Repetitive Index Modulation Based Watermarking.
153-159
- Heum Park, SunHo Cho, Hyuk-Chul Kwon:
Cyber Forensics Ontology for Cyber Criminal Investigation.
160-165
- Yue Li, Chang-Tsun Li:
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis.
166-172
- Chang-Tsun Li:
Detection of Block Artifacts for Digital Forensic Analysis.
173-178
- Patrick Perrot, Mathieu Morel, Joseph Razik, Gérard Chollet:
Vocal Forgery in Forensic Sciences.
179-185
International Workshop on e-Forensics Law
Copyright © Tue Mar 16 00:22:54 2010
by Michael Ley (ley@uni-trier.de)