000 03889nam a22005535i 4500
001 978-3-642-11534-9
003 DE-He213
005 20140220084531.0
007 cr nn 008mamaa
008 100301s2010 gw | s |||| 0|eng d
020 _a9783642115349
_9978-3-642-11534-9
024 7 _a10.1007/978-3-642-11534-9
_2doi
050 4 _aQA76.9.D343
072 7 _aUNF
_2bicssc
072 7 _aUYQE
_2bicssc
072 7 _aCOM021030
_2bisacsh
082 0 4 _a006.312
_223
100 1 _aGoel, Sanjay.
_eeditor.
245 1 0 _aDigital Forensics and Cyber Crime
_h[electronic resource] :
_bFirst International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers /
_cedited by Sanjay Goel.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXII, 171p. 74 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-8211 ;
_v31
505 0 _aFull and Short Papers -- Digital Evidence Composition in Fraud Detection -- iForensics: Forensic Analysis of Instant Messaging on Smart Phones -- A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks -- SMIRK: SMS Management and Information Retrieval Kit -- Localization and Detection of Vector Logo Image Plagiarism -- Analysis of Free Download Manager for Forensic Artefacts -- On the Reliability of Cell Phone Camera Fingerprint Recognition -- Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank -- Analysis of Evidence Using Formal Event Reconstruction -- Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations -- Digital Evidence Retrieval and Forensic Analysis on Gambling Machine -- Online Acquisition of Digital Forensic Evidence -- Criminal Defense Challenges in Computer Forensics -- Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance -- A Discretionary Access Control Method for Preventing Data Exfiltration (DE) via Removable Devices -- A Host-Based Approach to BotNet Investigation?.
520 _aThis book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference, ICDF2C 2009, held September 30 - October 2, 2009, in Albany, NY, USA. Digital forensics and cyber crime is a multidisciplinary area that requires expertise in several areas including law, computer science, finance networking, data mining and criminal justice. The 16 papers present the whole gamut of multimedia and handheld device forensics, financial crimes, cyber crime investigations, forensics and law, cyber security and information warfare.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData mining.
650 0 _aComputer vision.
650 0 _aBiometrics.
650 0 _aComputers
_xLaw and legislation.
650 1 4 _aComputer Science.
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aComputers and Society.
650 2 4 _aLegal Aspects of Computing.
650 2 4 _aBiometrics.
650 2 4 _aComputer Imaging, Vision, Pattern Recognition and Graphics.
650 2 4 _aComputer Communication Networks.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642115332
830 0 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-8211 ;
_v31
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-11534-9
912 _aZDB-2-SCS
999 _c111875
_d111875