Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format, library, and tools / Simson Garfinkel
Voice over IP : privacy and forensic implications / Jill Slay, Matthew Simon
Volatile memory collection and analysis for windows mission-critical computer systems / Antonio Savoldi, Paolo Gubian
Evidentiary implications of potential security weaknesses in forensic software / Chris Ridder
Combating internet-based crime
Methods to identify spammers / Tobias Eggendorfer
Spam image clustering for identifying common sources of unsolicited emails / Chengcui Zhang, Xin Chen, Wei-Bang Chen, Lin Yang, Gary Warner
A model based approach to timestamp evidence interpretation / Svein Willassen
Conducting forensic investigations of cyber attacks on automobile in-vehicle networks / Dennis Nilsson, Ulf Larson
Dealing with multiple truths in online virtual worlds / Jan Sablatnig, Fritz Lehmann-Grube, Sven Grottke, Sabine Cikic
Content protection through the use of extrinsic data
Locally square distortion and batch steganographic capacity / Andrew Ker
Efficient forensic analysis for anonymous attack in secure content distribution / Hongxia Jin
Protection of digital mammograms on pacss using data hiding techniques / Chang-Tsun Li, Yue Li, Chia-Hung Wei
Reversible and blind database watermarking using difference expansion / Gaurav Gupta, Josef Pieprzyk
Medical images authentication through repetitive index modulation based watermarking / Chang-Tsun Li, Yue Li
Application of pattern recognition and signal processing techniques to digital forecsics
Unexpected artifacts in a digital photograph / Matthew Sorell
Conditions for effective detection and identification of primary quantization of re-quantized jpeg images / Matthew Sorell
Dynamic structural statistical model based online signature verification / Yan Chen, Xiaoqing Ding, Patrick Wang
Efficient image matching using local invariant features for copy detection / H.R. Chennamma, Lalitha Rangarajan, M.S. Rao
Reliable motion detection, location and audit in surveillance video / Amirsaman Poursoltanmohammadi, Matthew Sorell
Cancellable biometrics for on-line signature recognition / Emanuele Maiorana, Patrizio Campisi, Alessandro Neri.