Buch, Englisch, Band 31, 171 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 290 g
First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October 2, 2009, Revised Selected Papers
Buch, Englisch, Band 31, 171 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 290 g
ISBN: 978-3-642-11533-2
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Rechtswissenschaften Internationales Recht und Europarecht Internationales Recht Internationaler Gewerblicher Rechtsschutz, Medien-, IT- und Urheberrecht
- Rechtswissenschaften Ausländisches Recht Common Law (UK, USA, Australien u.a.)
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Rechtliche Aspekte der EDV
- Rechtswissenschaften Wirtschaftsrecht Medienrecht Telekommunikationsrecht, IT-Recht, Internetrecht
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Mustererkennung, Biometrik
- Rechtswissenschaften Strafrecht Kriminologie, Strafverfolgung
Weitere Infos & Material
Full and Short Papers.- Digital Evidence Composition in Fraud Detection.- iForensics: Forensic Analysis of Instant Messaging on Smart Phones.- A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks.- SMIRK: SMS Management and Information Retrieval Kit.- Localization and Detection of Vector Logo Image Plagiarism.- Analysis of Free Download Manager for Forensic Artefacts.- On the Reliability of Cell Phone Camera Fingerprint Recognition.- Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank.- Analysis of Evidence Using Formal Event Reconstruction.- Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations.- Digital Evidence Retrieval and Forensic Analysis on Gambling Machine.- Online Acquisition of Digital Forensic Evidence.- Criminal Defense Challenges in Computer Forensics.- Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance.- A Discretionary Access Control Method for Preventing Data Exfiltration (DE) via Removable Devices.- A Host-Based Approach to BotNet Investigation?.