ICDF2C 2015 Oct. 6, 2015 to Oct. 8, 2015, seoul,south korea

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Keynote 1: New Research on Cyber Underground Services Max Goncharov N/A
Digital forensics education: a multidisciplinary curriculum model Roy Campbell , Masooda Bashir , Imani Palmer , Elaine Wood , Stefan Nagy , Gabriela Garcia N/A
Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence Joshua I. James , Alleyn Conway , Pavel Gladyshev. N/A
Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-Block Based Features Vivek Kumar Singh , Pallav Pant , Ramesh Chandra Tripathi N/A
How Cuckoo Filter Can Improve Existing Approximate Matching Techniques Frank Breitinger , Vikas Gupta N/A
Forensically Sound Retrieval and Recovery of Images from GPU Memory Yulong Zhang , Raymond Hansen , Baijian Yang , Marcus Rogers N/A
Keynote 2: Collaboration between academia and law enforcement to fight cybercrime Dave Dampier N/A
Advanced Techniques for Reconstruction of Incomplete Network Data Petr Matousek , Ondrej Rysavy , Martin Kmet , Jan Pluskal , Vladimír Veselý , Filip Karpíšek , Martin Vymlátil N/A
Cyber Peacekeeping Joshua I. James , Nikolay Akatyev N/A
Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility Jason Farina , Mark Scanlon , M-tahar Kechadi , Conor Quinn N/A
A Survey of International Cooperation in Digital Investigations Pavel Gladyshev , Joshua I. James N/A
Awareness of Scam E-mails: An Exploratory Research Study – Part 2 Tejashree D. Datar , Marcus Rogers , Kelly Cole N/A
Forensic analysis using Amcache.hve Moonho Kim , Sangjin Lee N/A
Recycling Personal Data: The Potential of Data Reuse in Digital Forensics and the Use Limitation Principle Bart Custers N/A
Reliability Research about Evidence Acquisition Method of Apple Mac Device Sangjin Lee , Jisung Choi , Dohyun Kim N/A
Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-Psychological & Communication Perspectives Kathryn C. Seigfried-spellar , Ben Flores , Darrin Griffin N/A
Smartphone verification and user profiles linking across social networks by camera fingerprinting Flavio Bertini , Rajesh Sharma , Andrea Iannì , Danilo Montesi N/A
Analysis of the HIKVISION DVR File System Sangjin Lee , Jaehyeok Han , Doowon Jeong N/A