{"title":"Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features","authors":"V. Singh, P. Pant, R. Tripathi","doi":"10.1007/978-3-319-25512-5_3","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_3","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116292656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Matoušek, J. Pluskal, O. Ryšavý, V. Veselý, M. Kmet, F. Karpísek, Martin Vymlátil
{"title":"Advanced Techniques for Reconstruction of Incomplete Network Data","authors":"P. Matoušek, J. Pluskal, O. Ryšavý, V. Veselý, M. Kmet, F. Karpísek, Martin Vymlátil","doi":"10.1007/978-3-319-25512-5_6","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_6","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Palmer, E. Wood, Stefan Nagy, Gabriela García, Masooda N. Bashir, Roy H. Campbell
{"title":"Digital Forensics Education: A Multidisciplinary Curriculum Model","authors":"I. Palmer, E. Wood, Stefan Nagy, Gabriela García, Masooda N. Bashir, Roy H. Campbell","doi":"10.1007/978-3-319-25512-5_1","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_1","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126205923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Effectiveness of Digital Forensics Tools on the Sony PlayStation Vita","authors":"Karolina Alvarez, Masooda N. Bashir","doi":"10.1007/978-3-319-25512-5_14","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_14","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Conor Quinn, M. Scanlon, Jason Farina, Mohand Tahar Kechadi
{"title":"Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility","authors":"Conor Quinn, M. Scanlon, Jason Farina, Mohand Tahar Kechadi","doi":"10.1007/978-3-319-25512-5_7","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_7","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of International Cooperation in Digital Investigations","authors":"Joshua James, P. Gladyshev","doi":"10.1007/978-3-319-25512-5_8","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_8","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129377966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Flavio Bertini, Rajesh Sharma, A. Ianni, D. Montesi
{"title":"Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting","authors":"Flavio Bertini, Rajesh Sharma, A. Ianni, D. Montesi","doi":"10.1007/978-3-319-25512-5_12","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_12","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128748096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kathryn C. Seigfried-Spellar, Ben M. Flores, Darrin J. Griffin
{"title":"Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-psychological and Communication Perspectives","authors":"Kathryn C. Seigfried-Spellar, Ben M. Flores, Darrin J. Griffin","doi":"10.1007/978-3-319-25512-5_11","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_11","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124520106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}