Title |
Speakers |
Summary |
Topic Types |
Keynote 1: New Research on Cyber Underground Services |
Max Goncharov
|
N/A |
|
Digital forensics education: a multidisciplinary curriculum model |
Roy Campbell
,
Masooda Bashir
,
Imani Palmer
,
Elaine Wood
,
Stefan Nagy
,
Gabriela Garcia
|
N/A |
|
Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence |
Joshua I. James
,
Alleyn Conway
,
Pavel Gladyshev.
|
N/A |
|
Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-Block Based Features |
Vivek Kumar Singh
,
Pallav Pant
,
Ramesh Chandra Tripathi
|
N/A |
|
How Cuckoo Filter Can Improve Existing Approximate Matching Techniques |
Frank Breitinger
,
Vikas Gupta
|
N/A |
|
Forensically Sound Retrieval and Recovery of Images from GPU Memory |
Yulong Zhang
,
Raymond Hansen
,
Baijian Yang
,
Marcus Rogers
|
N/A |
|
Keynote 2: Collaboration between academia and law enforcement to fight cybercrime |
Dave Dampier
|
N/A |
|
Advanced Techniques for Reconstruction of Incomplete Network Data |
Petr Matousek
,
Ondrej Rysavy
,
Martin Kmet
,
Jan Pluskal
,
Vladimír Veselý
,
Filip Karpíšek
,
Martin Vymlátil
|
N/A |
|
Cyber Peacekeeping |
Joshua I. James
,
Nikolay Akatyev
|
N/A |
|
Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility |
Jason Farina
,
Mark Scanlon
,
M-tahar Kechadi
,
Conor Quinn
|
N/A |
|
A Survey of International Cooperation in Digital Investigations |
Pavel Gladyshev
,
Joshua I. James
|
N/A |
|
Awareness of Scam E-mails: An Exploratory Research Study – Part 2 |
Tejashree D. Datar
,
Marcus Rogers
,
Kelly Cole
|
N/A |
|
Forensic analysis using Amcache.hve |
Moonho Kim
,
Sangjin Lee
|
N/A |
|
Recycling Personal Data: The Potential of Data Reuse in Digital Forensics and the Use Limitation Principle |
Bart Custers
|
N/A |
|
Reliability Research about Evidence Acquisition Method of Apple Mac Device |
Sangjin Lee
,
Jisung Choi
,
Dohyun Kim
|
N/A |
|
Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-Psychological & Communication Perspectives |
Kathryn C. Seigfried-spellar
,
Ben Flores
,
Darrin Griffin
|
N/A |
|
Smartphone verification and user profiles linking across social networks by camera fingerprinting |
Flavio Bertini
,
Rajesh Sharma
,
Andrea Iannì
,
Danilo Montesi
|
N/A |
|
Analysis of the HIKVISION DVR File System |
Sangjin Lee
,
Jaehyeok Han
,
Doowon Jeong
|
N/A |
|