Digital Forensics and Cyber Crime First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October 2, 2009, Revised Selected Papers / edited by Sanjay Goel.

This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference, ICDF2C 2009, held September 30 - October 2, 2009, in Albany, NY, USA. Digital forensics and cyber crime is a multidisciplinary area that requires expertise in several areas including...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Goel, Sanjay (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edition:1st ed. 2010.
Series:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 31
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Full and Short Papers
  • Digital Evidence Composition in Fraud Detection
  • iForensics: Forensic Analysis of Instant Messaging on Smart Phones
  • A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks
  • SMIRK: SMS Management and Information Retrieval Kit
  • Localization and Detection of Vector Logo Image Plagiarism
  • Analysis of Free Download Manager for Forensic Artefacts
  • On the Reliability of Cell Phone Camera Fingerprint Recognition
  • Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank
  • Analysis of Evidence Using Formal Event Reconstruction
  • Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations
  • Digital Evidence Retrieval and Forensic Analysis on Gambling Machine
  • Online Acquisition of Digital Forensic Evidence
  • Criminal Defense Challenges in Computer Forensics
  • Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance
  • A Discretionary Access Control Method for Preventing Data Exfiltration (DE) via Removable Devices
  • A Host-Based Approach to BotNet Investigation?.