Description |
xii,, 170 pages : illustrations ; 24 cm |
Series |
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 31 |
|
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 31
|
Contents |
Accounting & fraud. Digital evidence composition in fraud detection / Sriram Raghavan and S.V. Raghavan -- Multimedia & handheld device forensics. iForensics : forensic analysis of instant messaging on smart phones / Mohammad Iftekhar Husain and Ramalingam Sridhar -- A survey of forensic localization and tracking mechanisms in short-range and cellular networks / Saif Al-Kuwari and Stephen D. Wolthusen -- SMIRK : SMS management and information retrieval kit / Ibrahim Baggili, Ashwin Mohan, and Marcus Rogers -- Localization and detection of vector logo image plagiarism / Jong P. Yoon and Zhixiong Chen -- Analysis of Free Download Manager for forensic artefacts / Muhammad Yasin, Muhammad Arif Wahla, and Firdous Kausar -- On the reliability of cell phone camera fingerprint recognition / Martin Steinebach, Mohamed El Ouariachi, Huajian Liu, and Stefan Ketzenbeisser -- Financial crimes. Towards a new data mining-based approach for anti-money laundering in an international investment bank / Nhien-An Le-Khac, Sammer Markos, and Mohand-Tahar Kechadi -- Cyber crime investigations. Analysis of evidence using formal event reconstruction / Joshua James, Pavel Gladyshev, Mohd Taufik Abdullah, and Yuandong Zhu -- Data mining instant messaging communications to perform author identification for cybercrime investigations / Angela Orebaugh and Dr. Jeremy Allnutt -- Digital evidence retrieval and forensic analysis on gambling machine / Pritheega Magalingam, Azizah Abdul Manaf, Rabiah Ahmad, and Zuraimi Yahya -- Forensics & law. Online acquisition of digital forensic evidence / Mark Scanlon and Mohand-Tahar Kechadi -- Criminal defense challenges in computer forensics / Rebecca Mercuri -- Cyber security & information warfare. Detecting and preventing the electronic transmission of illicit images and its network performance / Amin Ibrahim and Miguel Vargas Martin -- A discretionary access control method for preventing data exfiltration (DE) via removable devices / Duane Wilson and Michael K. Lavine -- A host-based approach to BotNet investigation? / Frank Y.W. Law, K.P. Chow, Pierre K.Y. Lai, and Hayson K.S. Tse |
Summary |
ICST is a non-profit society that aims to promote research and development in information and communication technologies and their advancement in business engineering and other fields of applications. -- |
|
The LNICST series constitutes the publication platform for conferences, symposia and workshops sponsored by the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST). -- |
|
The type of material published includes proceedings (published in time for the respective event) as well as post-workshop proceedings (consisting of thoroughly revised and/or extended full papers). --Book Jacket |
Notes |
International conference proceedings |
Bibliography |
Includes bibliographic references and index |
Notes |
Print version record |
Subject |
Computer crimes -- Congresses.
|
|
Computer crimes -- Investigation -- Congresses.
|
|
Computer networks -- Access control -- Congresses.
|
|
Computer networks -- Security measures -- Congresses.
|
|
Computer security -- Congresses.
|
|
Digital forensic science -- Congresses.
|
Genre/Form |
Conference papers and proceedings.
|
Author |
Goel, Sanjay.
|
|
SpringerLink (Online service)
|
LC no. |
2009942350 |
ISBN |
9783642115332 |
|