


default search action
2. e-Forensics 2009: Adelaide, Australia
- Matthew Sorell:

Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 8, Springer 2009, ISBN 978-3-642-02311-8 - Fariborz Mahmoudi, Mohsen Mirzashaeri, Ehsan Shahamatnia, Saed Faridnia:

A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network. 1-9 - Heikki Kokkinen, Janne Nöyränen:

Forensics for Detecting P2P Network Originated MP3 Files on the User Device. 10-18 - Fariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri:

Image Encryption Using Chaotic Signal and Max-Heap Tree. 19-28 - Niall McGrath, Pavel Gladyshev

, M. Tahar Kechadi
, Joe Carthy:
Investigating Encrypted Material. 29-35 - Benjamin P. Turnbull

, Grant Osborne, Matthew Simon:
Legal and Technical Implications of Collecting Wireless Data as an Evidence Source. 36-41 - M. L. Dennis Wong

, Antionette W.-T. Goh, Hong Siang Chua:
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt. 42-53 - Lei Pan

, Lynn Margaret Batten:
Robust Correctness Testing for Digital Forensic Tools. 54-64 - Kosta Haltis, Lee Andersson, Matthew Sorell

, Russell S. A. Brinkworth
:
Surveillance Applications of Biologically-Inspired Smart Cameras. 65-76 - Jill Slay

, Elena Sitnikova
:
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems. 77-82 - Sriram Raghavan, Andrew J. Clark, George M. Mohay:

FIA: An Open Forensic Integration Architecture for Composing Digital Evidence. 83-94 - Roberto Caldelli

, Irene Amerini
, Francesco Picchioni:
Distinguishing between Camera and Scanned Images by Means of Frequency Analysis. 95-101 - Pasi Fränti, Juhani Saastamoinen, Ismo Kärkkäinen, Tomi Kinnunen, Ville Hautamäki

, Ilja Sidoroff
:
Developing Speaker Recognition System: From Prototype to Practical Application. 102-115 - Trupti Shiralkar, Michael K. Lavine, Benjamin P. Turnbull

:
A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC. 116-121 - Xue-Guang Wang, Zhen-Chuan Chai:

A Provable Security Scheme of ID-Based Threshold Decryption. 122-129 - Simon Knight, Simon Moschou, Matthew Sorell

:
Analysis of Sensor Photo Response Non-Uniformity in RAW Images. 130-141 - Timothy Neville, Matthew Sorell

:
Audit Log for Forensic Photography. 142-152 - Chang-Tsun Li

, Yue Li:
Authenticating Medical Images through Repetitive Index Modulation Based Watermarking. 153-159 - Heum Park, SunHo Cho, Hyuk-Chul Kwon:

Cyber Forensics Ontology for Cyber Criminal Investigation. 160-165 - Yue Li, Chang-Tsun Li

:
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis. 166-172 - Chang-Tsun Li

:
Detection of Block Artifacts for Digital Forensic Analysis. 173-178 - Patrick Perrot, Mathieu Morel, Joseph Razik, Gérard Chollet

:
Vocal Forgery in Forensic Sciences. 179-185
International Workshop on e-Forensics Law
- Milton H. Luoma, Vicki Miller Luoma:

Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights. 186-194 - Clare Sullivan:

Digital Identity - The Legal Person?. 195-211 - Sabine Cikic, Fritz Lehmann-Grube, Jan Sablatnig:

Surveillance and Datenschutz in Virtual Environments. 212-219

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














