Digital Forensics and Cyber Crime: First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October 2, 2009, Revised Selected Papers
Springer Science & Business Media, Jan 13, 2010 - Computers - 171 pages
The First International Conference on Digital Forensics and Cyber Crime (ICDF2C) was held in Albany from September 30 to October 2, 2009. The field of digital for- sics is growing rapidly with implications for several fields including law enforcement, network security, disaster recovery and accounting. This is a multidisciplinary area that requires expertise in several areas including, law, computer science, finance, networking, data mining, and criminal justice. This conference brought together pr- titioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. All the conference sessions were very well attended with vigorous discussions and strong audience interest. The conference featured an excellent program comprising high-quality paper pr- entations and invited speakers from all around the world. The first day featured a plenary session including George Philip, President of University at Albany, Harry Corbit, Suprintendent of New York State Police, and William Pelgrin, Director of New York State Office of Cyber Security and Critical Infrastructure Coordination. An outstanding keynote was provided by Miklos Vasarhelyi on continuous auditing. This was followed by two parallel sessions on accounting fraud /financial crime, and m- timedia and handheld forensics. The second day of the conference featured a mesm- izing keynote talk by Nitesh Dhanjani from Ernst and Young that focused on psyc- logical profiling based on open source intelligence from social network analysis. The third day of the conference featured both basic and advanced tutorials on open source forensics.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
Digital Forensics and Cyber Crime: First International ICST Conference ...
Limited preview - 2010
accuracy algorithm application approach authorship analysis basic shape Bot-infected machine BotNet C&C server camera cellular child pornography classification community of interest Computer Forensics Computer Sciences copied correlation covert channels cyber data mining database Dataset descriptor detection device diﬀerent digital evidence Digital Forensic Digital Investigation distance downloaded files E-OTD EPROM exfiltration file system finite state machine forensic analysis forensic investigators forensic tools function gaming machine Google Google Talk hard drive hash ICDF2C identify IEEE instant messaging Internet iPhone JPEG localization log files logo images logo plagiarism malware memory method Mobile packet password performance RAFT Client RAFT system RGB color space SLWE SMS messages Social-Informatics and Telecommunications stored stroke-width="5 suspect computer target techniques Telecommunications Engineering 2010 tion tracking transactions vector Windows registry Wireless Wireshark writeprint Yahoo