Digital Forensics and Cyber Crime

First International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers

Editors:

ISBN: 978-3-642-11533-2 (Print) 978-3-642-11534-9 (Online)

Table of contents (16 chapters)

  1. Front Matter

    Pages -

  2. Full and Short Papers

    1. Accounting & Fraud

      1. No Access

        Chapter

        Pages 1-8

        Digital Evidence Composition in Fraud Detection

      Multimedia & Handheld Device Forensics

      1. No Access

        Chapter

        Pages 9-18

        iForensics: Forensic Analysis of Instant Messaging on Smart Phones

      2. No Access

        Chapter

        Pages 19-32

        A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks

      3. No Access

        Chapter

        Pages 33-42

        SMIRK: SMS Management and Information Retrieval Kit

      4. No Access

        Chapter

        Pages 43-58

        Localization and Detection of Vector Logo Image Plagiarism

      5. No Access

        Chapter

        Pages 59-68

        Analysis of Free Download Manager for Forensic Artefacts

      6. No Access

        Chapter

        Pages 69-76

        On the Reliability of Cell Phone Camera Fingerprint Recognition

      Financial Crimes

      1. No Access

        Chapter

        Pages 77-84

        Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank

      Cyber Crime Investigations

      1. No Access

        Chapter

        Pages 85-98

        Analysis of Evidence Using Formal Event Reconstruction

      2. No Access

        Chapter

        Pages 99-110

        Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations

      3. No Access

        Chapter

        Pages 111-121

        Digital Evidence Retrieval and Forensic Analysis on Gambling Machine

      Forensics & Law

      1. No Access

        Chapter

        Pages 122-131

        Online Acquisition of Digital Forensic Evidence

      2. No Access

        Chapter

        Pages 132-138

        Criminal Defense Challenges in Computer Forensics

      Cyber Security & Information Warfare

      1. No Access

        Chapter

        Pages 139-150

        Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance

      2. No Access

        Chapter

        Pages 151-160

        A Discretionary Access Control Method for Preventing Data Exfiltration (DE) via Removable Devices

      3. No Access

        Chapter

        Pages 161-170

        A Host-Based Approach to BotNet Investigation?

  3. Back Matter

    Pages -