Conferences related to Forensics

Back to Top

2019 IEEE IAS Electrical Safety Workshop (ESW)

Accelerate application of breakthrough improvements in human factors, technology, and managing systems that reduce risk of electrical injuries Stimulate innovation in overcoming barriers Change and advance the electrical safety culture to enable sustainable improvements in prevention of electrical accidents and injuries


2019 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2019, the 26th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2019 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2020 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


2019 International Conference on Robotics and Automation (ICRA)

Flagship conference of the robotics and automation society, a premiere international venue for international robotics researchers


ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

ICASSP is the world’s largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class presentations by internationally renowned speakers, cutting-edge session topics and provide a fantastic opportunity to network with like-minded professionals from around the world.


More Conferences

Periodicals related to Forensics

Back to Top

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


Fuzzy Systems, IEEE Transactions on

Theory and application of fuzzy systems with emphasis on engineering systems and scientific applications. (6) (IEEE Guide for Authors) Representative applications areas include:fuzzy estimation, prediction and control; approximate reasoning; intelligent systems design; machine learning; image processing and machine vision;pattern recognition, fuzzy neurocomputing; electronic and photonic implementation; medical computing applications; robotics and motion control; constraint propagation and optimization; civil, chemical and ...


Image Processing, IEEE Transactions on

Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.


More Periodicals

Most published Xplore authors for Forensics

Back to Top

Xplore Articles related to Forensics

Back to Top

The importance of standardization in biometric data for digital forensics

[{u'author_order': 1, u'affiliation': u'Department of Digital Forensics Engineering, Technology Faculty, Firat University, Elazig', u'authorUrl': u'https://ieeexplore.ieee.org/author/37086233973', u'full_name': u'Semih Ulupinar', u'id': 37086233973}, {u'author_order': 2, u'affiliation': u'Department of Digital Forensics Engineering, Technology Faculty, Firat University, Elazig', u'authorUrl': u'https://ieeexplore.ieee.org/author/38192179500', u'full_name': u'Sengul Dogan', u'id': 38192179500}, {u'author_order': 3, u'affiliation': u'Department of Digital Forensics Engineering, Technology Faculty, Firat University, Elazig', u'authorUrl': u'https://ieeexplore.ieee.org/author/37085626938', u'full_name': u'Erhan Akbal', u'id': 37085626938}, {u'author_order': 4, u'affiliation': u'Department of Digital Forensics Engineering, Technology Faculty, Firat University, Elazig', u'authorUrl': u'https://ieeexplore.ieee.org/author/37085619803', u'full_name': u'Turker Tuncer', u'id': 37085619803}] 2017 International Conference on Computer Science and Engineering (UBMK), 2017

Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person ...


Live digital forensics in a virtual machine

[{u'author_order': 1, u'affiliation': u'Laboratory of Computer Forensics, Shandong Computer Science Center, Jinan, China', u'authorUrl': u'https://ieeexplore.ieee.org/author/37599400500', u'full_name': u'Lei Zhang', u'id': 37599400500}, {u'author_order': 2, u'affiliation': u'Qingdao Technological University, China', u'authorUrl': u'https://ieeexplore.ieee.org/author/37537299600', u'full_name': u'Dong Zhang', u'id': 37537299600}, {u'author_order': 3, u'affiliation': u'Laboratory of Computer Forensics, Shandong Computer Science Center, Jinan, China', u'authorUrl': u'https://ieeexplore.ieee.org/author/37406753800', u'full_name': u'Lianhai Wang', u'id': 37406753800}] 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010

Traditional computer forensics is performed towards physical machines, using a set of forensic tools to acquire disk images and memory dumps. But it is much more different to deal with virtual machines. Live forensics is used to acquire volatile data and improve efficiency, but how to perform live forensics on a subject system with virtual machines hosted in? This paper ...


Analysis of mobile phones in digital forensics

[{u'author_order': 1, u'affiliation': u'Department of Digital Forensics Engineering, Firat University, Elazig, Turkey', u'authorUrl': u'https://ieeexplore.ieee.org/author/38192179500', u'full_name': u'Sengul Dogan', u'id': 38192179500}, {u'author_order': 2, u'affiliation': u'Department of Digital Forensics Engineering, Firat University, Elazig, Turkey', u'authorUrl': u'https://ieeexplore.ieee.org/author/37085626938', u'full_name': u'Erhan Akbal', u'id': 37085626938}] 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017

Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether ...


Proactive Digital Forensics: The Ever-Increasing Need for Standardization

[{u'author_order': 1, u'authorUrl': u'https://ieeexplore.ieee.org/author/38014924900', u'full_name': u'Antonis Mouhtaropoulos', u'id': 38014924900}, {u'author_order': 2, u'authorUrl': u'https://ieeexplore.ieee.org/author/37278180500', u'full_name': u'Chang-Tsun Li', u'id': 37278180500}, {u'author_order': 3, u'authorUrl': u'https://ieeexplore.ieee.org/author/38029036100', u'full_name': u'Marthie Grobler', u'id': 38029036100}] 2012 European Intelligence and Security Informatics Conference, 2012

Proactive digital forensics is a phase within the digital forensics lifecycle that deals with pre-incident preparation. Despite the increasing research on the pre-incident side of forensic investigations, little steps have been taken towards standardizing and regulating the process. This paper expresses the need for the standardization of the proactive forensics domain and argues that the first step towards the realization ...


National digital forensics framework for Bangladesh

[{u'author_order': 1, u'affiliation': u'Bangladesh University of Professionals, Bangladesh', u'full_name': u'Mohammad Mahfuzul Haque'}, {u'author_order': 2, u'affiliation': u'Daffodil International University, Bangladesh', u'full_name': u'Syed Akther Hossain'}] 2017 3rd International Conference on Electrical Information and Communication Technology (EICT), 2017

At recent time, cybercrime has increased significantly in the world and also in Bangladesh due to consequence of massive digitalization efforts in every sector. These types of offense require systematic probing in order to be revealed properly at the court of law. This research work proposed a comprehensive digital forensics framework to facilitate forensically ready common standard digital forensics to ...


More Xplore Articles

Educational Resources on Forensics

Back to Top

eLearning

No eLearning Articles are currently tagged "Forensics"

IEEE-USA E-Books

  • CHAPTER 7 On the Digital Forensics of Heavy Truck Electronic Control Modules by James Johnson, Jeremy Daily, and Andrew Kongs

    None

  • Photogrammetry in Digital Forensics

    In forensics usually close-range photogrammetry is used where two types of photogrammetry can be distinguished: photogrammetry using controlled images and photogrammetry using uncontrolled images. Photogrammetry using two or more controlled photographs is a common technique, and a lot of software is available to perform this. This chapter begins with a discussion on lens distortion. Before photogrammetry is conducted one should have an idea about the imperfections caused by lens distortion to the image. The chapter describes different methods of photogrammetry available for forensic investigations. For photogrammetry in forensic investigations several techniques based on close range photogrammetry are available: projective geometry; space resection and multi-image photogrammetry; and reverse projection. Independent of the method used measurement errors will be made. The chapter ends with a discussion on 3D modelling and scenario testing including case examples.

  • Standards and Best Practices in Digital and Multimedia Forensics

    One of the main goals of digital forensics is to produce digital evidence admissible to the court, which requires that the digital forensic process or techniques used are not flawed in such a way that the evidence or intelligence generated can be questioned. This chapter provides a comprehensive review of important international, regional and national standards relevant to digital forensics and electronic evidence in general, as well as many best practice guides produced by different bodies. Two standards made by ASTM International are reviewed. Policies for handling customer complaints, document control and disclosure of information are also mentioned. Training, education and certification of digital forensics examiners and any personnel working on cases involving digital and multimedia evidence are important for digital and multimedia forensics because of the need to ensure legal admissibility of evidence. Best practice guides on accreditation of digital forensics laboratories are also discussed.

  • Multimedia Analytics for Image Collection Forensics

    This chapter focuses on techniques suited for forensic analysis of large image collections. In digital forensics an investigator is often tasked to analyze a data source containing large numbers of images and their metadata sometimes reaching into the millions. Apart from the content of the images there is a lot of information present in the metadata. The chapter considers the specifics of datasets and tasks in the forensic field. Two fields underlying multimedia analytics namely multimedia analysis and visual analytics are explained. The principles from those fields provide the basis for describing two-example multimedia analytics systems. The ChronoBrowser is used as a multimedia analytics system developed for forensic analysis. The chapter shows how different visual analytics processes are instantiated within ChronoBrowser. The MediaTable is considered as example of a concept based multimedia analytics system. The chapter presents a scenario to show how multimedia analytics can aid forensic investigators.

  • Digital Forensics Laboratories in Operation

    This chapter looks at the operational side of digital forensics of multimedia data and devices in real-world digital forensics laboratories, especially those run by law enforcement. It provides insights about the operational aspect of digital forensic services and practices on multimedia data and devices. The chapter describes how multimedia data and devices are handled at the Met's Digital and Electronics Forensic Service (DEFS), with a particular focus on the DEFS's Audio-Video Laboratory (AV Lab) which is the main forensic laboratory handling multimedia data and devices. It describes different aspects of digital forensic practices on multimedia data and devices at the Digital Forensics Team of Surrey Police (UK) and at the Shanghai Stars Digital Forensic Center (China), respectively. It then talks about the three digital forensics laboratories, and compares digital forensics practices of the three laboratories to show common features and major differences.

  • Printer and Scanner Forensics

    This chapter exhibits the technologies on device source identification and document forgery detection. It presents three examples on printer identification, scanner identification and document forgery detection for details. First, the chapter provides an overview of printer and scanner forensics and compares print forensics and digital image forensics. Next, it presents the difference between laser printers and inkjet printers, as well as a flowchart of printer forensics and forensic algorithms that are based on hardware defects and intrinsic character features. The chapter then shows algorithms used for scanner forensics and a flowchart of scanner forensics. Algorithms for photocopier forensics are discussed. The chapter further introduces some tampering methods and presents flowcharts and algorithms for detecting document forgery. It provides three sample algorithms: for printer forensics, scanner forensics and tampering detection. It finally illustrates details of the algorithms that should clarify how the algorithms work.

  • Microphone Forensics

    In this chapter, microphone forensic investigations specify selected components of (complex) audio signal composition as the patterns to be detected, identified or verified by forensic methods. Such patterns are primarily the characteristics of the sensor, hence the name microphone forensics, but also include characteristics of the environment or processing operations used to modify the recordings. The chapter provides general guidelines for microphone registration. To demonstrate how a typical microphone forensic analysis can be done using statistical pattern recognition, new practical investigations are performed here. An implementation of the statistical pattern recognition pipeline relying on the established data mining suite Waikato Environment for Knowledge Analysis (WEKA) and the author's own general-purpose audio feature extractor are presented and applied to the four investigation tasks specified. Finally, the chapter summarizes some challenges in microphone forensics identified by the investigations described here as well as general challenges to this field.

  • Anti-Forensics of Multimedia Data and Countermeasures

    This chapter focuses on the specific case of anti-forensics of image and video content. It first reviews the anti-forensic techniques proposed in the literature so far. Next, the chapter analyzes one particular example, namely, the antiforensics of JPEG compression fingerprints. It shows how this anti- forensic technique can be detected with anti-forensic countermeasures. It presents a simple and effective anti-forensic technique to eliminate statistical fingerprints of JPEG compression, which is by far the most popular coding tool for images. The chapter now focuses on the JPEG compression technique, and discusses its side effects in terms of visible noise on the tampered image. Finally, it explains how anti-forensic techniques can be evaluated with respect to forensic detectors, and illustrates how the interplay between the forger and the forensic analyst can be cast in a game- theoretical framework.

  • Digital Image Forensics with Statistical Analysis

    A large number of forensic methods have been developed in the past decade to answer a broad range of forensic questions. Most image forensic tools can be divided into only two simple categories: semantics-based detection and non- semantics-based detection. This chapter first focuses on the non-semantics- based detection techniques as majority of existing image forensic tools fall into this category. The non-semantics-based detection tools mostly rely on the modelling of statistical patterns of the image using signal-level information. The chapter introduces several recently developed techniques to address two critical topics in the field of multimedia security: detecting region duplication and exposing splicing forgery. It talks about a method for reliable detection of duplicated image regions and an effective image splicing detection algorithm. More realistic case studies for these two techniques are demonstrated. These techniques are further extended to expose forgeries in audio and video signal.

  • Cloud Forensics

    Cloud forensics is a special branch of digital forensics, which is required to establish facts about incidents that are actively or passively related to clouds. However, today's cloud computing architectures often lack support for forensic investigations because many of the assumptions that are taken for granted in traditional digital forensics do not apply to clouds. Hence, the existing digital forensics tools cannot cope with the dynamic and black-box nature of clouds. This chapter discusses the challenges of cloud forensics, discusses existing techniques to support reliable forensics, and explores the open problems in this area.



Standards related to Forensics

Back to Top

No standards are currently tagged "Forensics"


Jobs related to Forensics

Back to Top