Conferences related to Forensics

Back to Top

2019 IEEE IAS Electrical Safety Workshop (ESW)

Accelerate application of breakthrough improvements in human factors, technology, and managing systems that reduce risk of electrical injuries Stimulate innovation in overcoming barriers Change and advance the electrical safety culture to enable sustainable improvements in prevention of electrical accidents and injuries


2019 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2019, the 26th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2019 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2020 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


2019 International Conference on Robotics and Automation (ICRA)

Flagship conference of the robotics and automation society, a premiere international venue for international robotics researchers


ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

ICASSP is the world’s largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class presentations by internationally renowned speakers, cutting-edge session topics and provide a fantastic opportunity to network with like-minded professionals from around the world.


More Conferences

Periodicals related to Forensics

Back to Top

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


Fuzzy Systems, IEEE Transactions on

Theory and application of fuzzy systems with emphasis on engineering systems and scientific applications. (6) (IEEE Guide for Authors) Representative applications areas include:fuzzy estimation, prediction and control; approximate reasoning; intelligent systems design; machine learning; image processing and machine vision;pattern recognition, fuzzy neurocomputing; electronic and photonic implementation; medical computing applications; robotics and motion control; constraint propagation and optimization; civil, chemical and ...


Image Processing, IEEE Transactions on

Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.


More Periodicals

Most published Xplore authors for Forensics

Back to Top

Xplore Articles related to Forensics

Back to Top

The importance of standardization in biometric data for digital forensics

2017 International Conference on Computer Science and Engineering (UBMK), 2017

Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person ...


Live digital forensics in a virtual machine

2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010

Traditional computer forensics is performed towards physical machines, using a set of forensic tools to acquire disk images and memory dumps. But it is much more different to deal with virtual machines. Live forensics is used to acquire volatile data and improve efficiency, but how to perform live forensics on a subject system with virtual machines hosted in? This paper ...


Analysis of mobile phones in digital forensics

2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017

Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether ...


Proactive Digital Forensics: The Ever-Increasing Need for Standardization

2012 European Intelligence and Security Informatics Conference, 2012

Proactive digital forensics is a phase within the digital forensics lifecycle that deals with pre-incident preparation. Despite the increasing research on the pre-incident side of forensic investigations, little steps have been taken towards standardizing and regulating the process. This paper expresses the need for the standardization of the proactive forensics domain and argues that the first step towards the realization ...


National digital forensics framework for Bangladesh

2017 3rd International Conference on Electrical Information and Communication Technology (EICT), 2017

At recent time, cybercrime has increased significantly in the world and also in Bangladesh due to consequence of massive digitalization efforts in every sector. These types of offense require systematic probing in order to be revealed properly at the court of law. This research work proposed a comprehensive digital forensics framework to facilitate forensically ready common standard digital forensics to ...


More Xplore Articles

Educational Resources on Forensics

Back to Top

IEEE-USA E-Books

  • The importance of standardization in biometric data for digital forensics

    Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person have a large share in assessing cases in the field of digital forensics. In this paper, standardization process of biometric data is presented. At the same time, the standardization of biometric data has been examined in terms of digital forensics.

  • Live digital forensics in a virtual machine

    Traditional computer forensics is performed towards physical machines, using a set of forensic tools to acquire disk images and memory dumps. But it is much more different to deal with virtual machines. Live forensics is used to acquire volatile data and improve efficiency, but how to perform live forensics on a subject system with virtual machines hosted in? This paper discusses how virtual machines can be used both as forensic evidence and tools, proposes methods of how to collect data associated with virtual machines from the host system, and discusses methods and tools of how to boot the acquired subject system OS into a virtual machine.

  • Analysis of mobile phones in digital forensics

    Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether the crime is large or small. Among these devices, mobile phones take an important place in digital forensics because of their widely usages by every individual. The importance of examining of the data called as evidence in mobile phones has increased with advances in technology, operation capacity, storage capacity and functionality. In a forensics case, mobile phones must be examined by authorized persons and the data obtained from the device must be brought to standards that can be used forensically. In this study, examination and analysis of mobile phones in terms of digital forensics is evaluated. At the same time, data that can be obtained from mobile phones through a sample application has been investigated.

  • Proactive Digital Forensics: The Ever-Increasing Need for Standardization

    Proactive digital forensics is a phase within the digital forensics lifecycle that deals with pre-incident preparation. Despite the increasing research on the pre-incident side of forensic investigations, little steps have been taken towards standardizing and regulating the process. This paper expresses the need for the standardization of the proactive forensics domain and argues that the first step towards the realization of a unified standard is the identification and evaluation of current proactive initiatives.

  • National digital forensics framework for Bangladesh

    At recent time, cybercrime has increased significantly in the world and also in Bangladesh due to consequence of massive digitalization efforts in every sector. These types of offense require systematic probing in order to be revealed properly at the court of law. This research work proposed a comprehensive digital forensics framework to facilitate forensically ready common standard digital forensics to the investigators. The framework recommended proactive and reactive forensics to enable live and post forensics issues. The purpose of the proposed framework is to allow systematic postmortem of digital forensics. Moreover, it allows further investigations suggested during examination or analysis phase. An expert system is introduced into the framework to improve efficiency through inference engine. This assistive system included digital forensics case database as a history keeper to store all documentations and results of the accomplished forensics examination. The inference engine is expected to generate a priority list from the historical data by a proposed algorithm. In addition, the expert system is expected to guide examiners during forensics. Furthermore, dissemination of forensics outcomes anticipated automatically to the authorized investigators by this system. However, the proposed framework is based on theoretical approach which is expected to be evaluated and implemented using assistive expert system in the future.

  • Forensic reconstruction of executables from Windows 7 physical memory

    Memory Forensics becomes indispensable in Cyber Forensics Investigation as Random Access Memory or Physical Memory of a Computer holds crucial evidence which is nowhere available on Hard Disks or in other non-volatile storage media. This is because, nowadays most of the malwares are memory resident which leaves no footprints in Hard Disk storage. In this paper, a novel methodology is described for efficiently reconstructing executables from memory dumps acquired from ×86 and ×64 Windows 7 systems. This reconstruction process is challenging because different sections of the executables reside in different memory pages and thus in different locations in the acquired memory dump file. The reconstructed executables may provide crucial information in a cyber crime investigation, especially in the case of malware based crimes. The same methodology can be extended for recovering packed malware executables.

  • Evidence Data Collection with ANDROSICS Tool for Android Forensics

    With the rapidly growth of mobile technology, the lifestyle of people is becoming reliant on various mobile devices like smartphones, tablets and so on. By using these mobile devices, users can perform transactions such as purchasing goods, making bank transaction and paying for tickets and coupons. It may bring flexibility and convenience for communication, storing and sharing data, social media networks and entertainments. On the other side, criminals may commit the crimes by using Android devices. Therefore, the investigators need to prepare enough Android forensics tools for investigation and analysis. In this paper, we proposed the applicable tool (ANDROSICS) for Android forensics which emphasizes on evidence data collection process. This tool can support Live Forensics, Dead Forensics, Data Collection, Bypass Screen Lock, Imaging, Android Debug Bridge Utility, Virtual Keys and many forensic features.

  • The realization of digital forensics identification workflow audit and custody system

    Digital evidence gradually turns into a new type lawsuit evidence. The research on digital forensics technologies focus on evidence search, recovery and data analysis, while legality, authenticity and integrality of forensics process doesn't get supervised. In this paper, on the basis of forensic steps and process research, the author intends to illustrate modeling social auditing work and designing a system to monitor digital forensics verification workflow to solve the problem of chain of custody in the process of digital evidence acquisition, transfer, storage and analysis.

  • Face to Iris Area Ratio as a feature for children detection in digital forensics applications

    This paper presents a new geometrical feature based on iris geometry for automatic children detection in digital images. The proposed feature is based on simple geometrical measures of face elements and especially iris. Iris outer boundary is approximated as a circle and the proposed feature is defined using the iris area and the distance of iris from mouth line. This approach is compared with two similar geometrical features. Experimental results show the superiority of the proposed feature over the existing ones. The proposed feature is more robust compared to the existing features that use geometrical information from human faces and gives better classification results, useful to digital forensics applications.

  • Camera response function signature for digital forensics - Part II: Signature extraction

    Part I of this two-part paper proposed a robust way to detect local points on linear-isophote surface in an image. Only a subset of these points corresponds to linear surface in image irradiance and provides useful information about the camera response function (CRF). In Part II, we show that, for some images, this subset of linear points could constitute a very small portion of the candidate set and the remaining points are often considered as noise. Our previous approach was to eliminate the noise using a learning-based method. The learning-based method could only reduce the noise but not eliminate it completely. Hence, it fails when the proportion of linear points is too small. As a main contribution in Part II, we introduce the concept of edge profile and consider the candidate points as discrete samples of an edge profile. Instead of eliminating the unwanted candidate points as noise, we use them to instantiate the edge profiles. Assuming that every edge profile has a linear component in image irradiance, the interactions of the edge profiles in the space of linear geometric invariants may correspond to the linear part which is CRF-indicating. Such a model is shown to be sound and effective in both simulation images and real camera images.



Standards related to Forensics

Back to Top

No standards are currently tagged "Forensics"