Conferences related to Forensics

Back to Top

2014 IEEE Symposium on Security and Privacy (SP)

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)

Today new technologies and new applications will not be widely adopted until it can be demonstrated that the security of the underlying ICT infrastructure and the privacy of information being processed are both protected. Only then will users trust and therefore use these innovations and then, and only then, will the developers and society as a whole reap the benefits of the innovation. Without breakthroughs in Privacy, Security and Trust (PST) technology the "bad guys" will continue to thwart our best efforts to convince the public that cyber space is a safe place to do business. The annual Privacy, Security and Trust research conference has quickly established itself as a leading forum for the presentation and discussion of the latest challenges and solutions covering a wide range of PST topics. The PST conference is unique in its broad approach including examining the issues from both the research and practiceperspectives, encouraging multidisciplinary research, and fosterin

  • 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)

    The annual Privacy, Security and Trust research conference has quickly established itself as a leading forum for the presentation and discussion of the latest challenges and solutions covering a wide range of PST topics. The PST conference is unique in its broad approach including examining the issues from both the research and practice perspectives, encouraging multidisciplinary research, and fostering collaboration between academe, the private sector and government. PST-2012 will be a valuable place for IEEE members to present papers and meet with one another to discuss their work.

  • 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST)

    PST2011 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. PST2011 will include an Innovation Day featuring workshops and tutorials followed by two days of high-quality research papers.

  • 2010 Eighth Annual International Conference on Privacy, Security and Trust (PST)

    PST2010 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation.


2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)

The conference covers theory, design and application of computer networks and distributed computing and information systems.


2013 IEEE International Conference on Multimedia and Expo (ICME)

To promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2012 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE Societies. It exchanges the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2011 IEEE International Conference on Multimedia and Expo (ICME)

    Speech, audio, image, video, text processing Signal processing for media integration 3D visualization, animation and virtual reality Multi-modal multimedia computing systems and human-machine interaction Multimedia communications and networking Multimedia security and privacy Multimedia databases and digital libraries Multimedia applications and services Media content analysis and search Hardware and software for multimedia systems Multimedia standards and related issues Multimedia qu

  • 2010 IEEE International Conference on Multimedia and Expo (ICME)

    A flagship multimedia conference sponsored by four IEEE societies, ICME serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2009 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.


2013 International Carnahan Conference on Security Technology (ICCST)

This international conference is a forum for all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainability. The ICCST facilitates the exchange of ideas and information.

  • 2012 IEEE International Carnahan Conference on Security Technology (ICCST)

    Research, development, and user aspects of security technology, including principles of operation, applications, and user experiences.

  • 2011 International Carnahan Conference on Security Technology (ICCST)

    This annual conference is the world s longest -running, international technical symposium on security technology. This conference is a forum for collaboration on all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainment. The ICCST facilitates the exchange of ideas and sharing of information on both new and existing technology and systems. Conference participants are encouraged to consider the impact of their work on society. The ICCST provides a foundation for support to authorities and agencies responsible for security, safety and law enforcement in the use of available and future technology.

  • 2010 IEEE International Carnahan Conference on Security Technology (ICCST)

    The ICCST is a forum for researchers and practitioners in both new and existing security technology, providing an interchange of knowledge through paper presentations and publication of proceedings that have been selected by the ICCST organizing committee.

  • 2009 International Carnahan Conference on Security Technology (ICCST)

    Conference is directed toward research and development and user aspects of electronic security technology.

  • 2008 International Carnahan Conference on Security Technology (ICCST)

    The ICCST is directed toward the research and development aspects of electronic security technology, including the operational testing of the technology. It establishes a forum for the exchange of ideas and dissemination of information on both new and existing technology. Conference participants are stimulated to consider the impact of their work on society. The Conference is an interchange of knowledge through the presentation of learned papers that have been selected by the ICCST organizing committee.

  • 2007 IEEE International Carnahan Conference on Security Technology (ICCST)

  • 2006 IEEE International Carnahan Conference on Security Technology (ICCST)


More Conferences

Periodicals related to Forensics

Back to Top

Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Selected Areas in Communications, IEEE Journal on

All telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space, and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; communication theory; and wireless communications.




Xplore Articles related to Forensics

Back to Top

List of Reviewers

IEEE Transactions on Information Forensics and Security, 2016

Presents a list of reviewers who contributed to the IEEE Transactions on Information Forensics and Security between September 2015 and September 2016.


DNA's lasting imprint

B. Lehr IEEE Potentials, 1989

The use of DNA typing for the examination of forensic casework and the establishment of paternity is discussed. A description is given of DNA-based identification testing procedures, most of which involve the use of restriction endonucleases, DNA probes, and Southern blot hybridization. Restriction endonucleases are enzymes that cleave a person's DNA, at specific recognition sites, into a reproducible pattern of ...


Research of an E-mail forensic and analysis system based on visualization

Fanlin Meng; Shunxiang Wu; Junbin Yang; Genzhen Yu 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA), 2009

Nowadays, E-mail communication has been abused for numerous illegitimate purposes such as E-mail spamming, terrorist attack, business fraud, etc. As a result, to analysis the rich personal information hidden in E-mail is significant for investigation and evidence collection. In this paper, an investigation and analysis system aiming to Email was presented, which supports a variety of data sources including the ...


Video codec identification extending the idempotency property

P. Bestagini; S. Milani; M. Tagliasacchi; S. Tubaro European Workshop on Visual Information Processing (EUVIP), 2013

Video codec identification is an important task when it comes to prove the authenticity of video content. Indeed, video sequences are usually available in compressed format since the very acquisition. Therefore, being able to detect the adopted coding architecture reveals information about both the possible presence of alterations, and video origin. The paper presents two detectors that permit to identify ...


Table of contents

2009 Fifth International Conference on IT Security Incident Management and IT Forensics, 2009

Presents the table of contents of the proceedings.


More Xplore Articles

Educational Resources on Forensics

Back to Top

eLearning

List of Reviewers

IEEE Transactions on Information Forensics and Security, 2016

Presents a list of reviewers who contributed to the IEEE Transactions on Information Forensics and Security between September 2015 and September 2016.


DNA's lasting imprint

B. Lehr IEEE Potentials, 1989

The use of DNA typing for the examination of forensic casework and the establishment of paternity is discussed. A description is given of DNA-based identification testing procedures, most of which involve the use of restriction endonucleases, DNA probes, and Southern blot hybridization. Restriction endonucleases are enzymes that cleave a person's DNA, at specific recognition sites, into a reproducible pattern of ...


Research of an E-mail forensic and analysis system based on visualization

Fanlin Meng; Shunxiang Wu; Junbin Yang; Genzhen Yu 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA), 2009

Nowadays, E-mail communication has been abused for numerous illegitimate purposes such as E-mail spamming, terrorist attack, business fraud, etc. As a result, to analysis the rich personal information hidden in E-mail is significant for investigation and evidence collection. In this paper, an investigation and analysis system aiming to Email was presented, which supports a variety of data sources including the ...


Video codec identification extending the idempotency property

P. Bestagini; S. Milani; M. Tagliasacchi; S. Tubaro European Workshop on Visual Information Processing (EUVIP), 2013

Video codec identification is an important task when it comes to prove the authenticity of video content. Indeed, video sequences are usually available in compressed format since the very acquisition. Therefore, being able to detect the adopted coding architecture reveals information about both the possible presence of alterations, and video origin. The paper presents two detectors that permit to identify ...


Table of contents

2009 Fifth International Conference on IT Security Incident Management and IT Forensics, 2009

Presents the table of contents of the proceedings.


More eLearning Resources

IEEE-USA E-Books

  • No title

    <p><i>Digital forensic science</i>, or <i>digital forensics</i>, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of reconstructing the relevant sequence of events that have led to the currently observable state of a target IT system or (digital) artifacts.</p><p>Over the last three decades, the importance of digital evidence has grown in lockstep with the fast societal adoption of information technology, which has resulted in the continuous accumulation of data at an exponential rate. Simultaneously, there has been a rapid growth in network connectivity and the complexity of IT systems, leading to more complex behavior that needs to be investigated.</p><p>The goal of this book is to provide a systematic <i>technical</i> overview of digital forensic tech iques, primarily from the point of view of computer science. This allows us to put the field in the broader perspective of a host of related areas and gain better insight into the computational challenges facing forensics, as well as draw inspiration for addressing them. This is needed as some of the challenges faced by digital forensics, such as cloud computing, require <i>qualitatively</i> different approaches; the sheer volume of data to be examined also requires new means of processing it.</p>

  • Digital Forensics Laboratories in Operation

    This chapter looks at the operational side of digital forensics of multimedia data and devices in real-world digital forensics laboratories, especially those run by law enforcement. It provides insights about the operational aspect of digital forensic services and practices on multimedia data and devices. The chapter describes how multimedia data and devices are handled at the Met's Digital and Electronics Forensic Service (DEFS), with a particular focus on the DEFS's Audio-Video Laboratory (AV Lab) which is the main forensic laboratory handling multimedia data and devices. It describes different aspects of digital forensic practices on multimedia data and devices at the Digital Forensics Team of Surrey Police (UK) and at the Shanghai Stars Digital Forensic Center (China), respectively. It then talks about the three digital forensics laboratories, and compares digital forensics practices of the three laboratories to show common features and major differences.

  • A Machine Learning-Based Approach to Digital Triage

    Dealing with machine learning-based digital triage, this chapter presents a framework for selective pre-examination and statistical classification of digital data sources that may be deployed both on the crime scene and at Digital Forensic Laboratory (DFLs). This framework provides investigators with quick actionable intelligence on the crime scene when time is a critical factor. It also protects a suspect's privacy where excessive search and seizure of data is not allowed by the legal system. The framework presents two main advantages with respect to most examination techniques in use today as it requires limited manual intervention and produces measurable and reproducible error rates. The chapter presents an overview about the history and state-of- the-art research on digital triage. The chapter presents a case study on mobile phones classification in court cases of child pornography exchange. It concludes with a discussion on the challenges and future directions for the digital forensics community.

  • Camera-Based Image Forgery Detection

    Recently, an increased number of studies in image authentication and image forgery detection have appeared that are based on indicators arising from the acquisition process of the data, namely due to the inherent characteristics of the camera used to produce the image. This chapter focuses on different aspects of image forgery based on effects and cues found in the image that are due to the acquisition process. These aspects include: image authentication, image forgery detection and image signature. These studies are termed as camera-based image forgery detection methods. The chapter describes the camera structure and the three major components: optics, sensors and imaging pipeline. For each component, its basic mechanism, its role in the acquisition process and its effects on the final acquired image are detailed. The chapter presents a specific camera-based image forgery technique as a case study for the approaches.

  • Photogrammetry in Digital Forensics

    In forensics usually close-range photogrammetry is used where two types of photogrammetry can be distinguished: photogrammetry using controlled images and photogrammetry using uncontrolled images. Photogrammetry using two or more controlled photographs is a common technique, and a lot of software is available to perform this. This chapter begins with a discussion on lens distortion. Before photogrammetry is conducted one should have an idea about the imperfections caused by lens distortion to the image. The chapter describes different methods of photogrammetry available for forensic investigations. For photogrammetry in forensic investigations several techniques based on close range photogrammetry are available: projective geometry; space resection and multi-image photogrammetry; and reverse projection. Independent of the method used measurement errors will be made. The chapter ends with a discussion on 3D modelling and scenario testing including case examples.

  • SECURING MANAGEMENT AND MANAGING SECURITY

    This chapter provides an overview of modern network and infrastructure management as a context to the management of deployed security mechanisms. It discusses the need for management to stay involved in security management activities. This is followed by a discussion of operational security, necessary mechanisms, including forensics, third-party access reviews, and certification. The chapter then examines security management with consideration of how to withdraw equipment from service without exposing information to unauthorized access. It also considers the need for compliance relative to security policies that must be adhered to by operations and management personnel. An operational security compliance program exists to ensure that all those business requirements, policy statements, and specific security dictates are being complied with. The chapter concludes with consideration of activities related to security when developing or purchasing functions, subsystems, or complete solutions.

  • Anti-Forensics of Multimedia Data and Countermeasures

    This chapter focuses on the specific case of anti-forensics of image and video content. It first reviews the anti-forensic techniques proposed in the literature so far. Next, the chapter analyzes one particular example, namely, the antiforensics of JPEG compression fingerprints. It shows how this anti- forensic technique can be detected with anti-forensic countermeasures. It presents a simple and effective anti-forensic technique to eliminate statistical fingerprints of JPEG compression, which is by far the most popular coding tool for images. The chapter now focuses on the JPEG compression technique, and discusses its side effects in terms of visible noise on the tampered image. Finally, it explains how anti-forensic techniques can be evaluated with respect to forensic detectors, and illustrates how the interplay between the forger and the forensic analyst can be cast in a game- theoretical framework.

  • On Forensic Use of Biometrics

    Forensic science largely concerns the analysis of crime. The science of biometrics has developed approaches that are used to automatically identify individuals by personal characteristics. Biometric techniques have primarily been used to assure identity. The main steps of a biometric recognition approach include: acquisition of the biometric data, localization and alignment of the data, feature extraction, and matching. This chapter concentrates on two case studies discussing the forensic possibilities of face and ear as biometrics. It introduces the manual and computer-aided forensic face recognition. The chapter discusses the disparities between the behaviour of the current automatic face recognition systems and that which is needed for forensic application, and outlines the current progress towards addressing the challenges existing in face recognition. An emerging biometric ear is examined. There is a rich variety of approaches for ear biometrics and these are steeped in pattern recognition and computer vision.

  • Front Matter

    The prelims comprise: Half-Title Page Title Page Copyright Page Dedication Page Table of Contents List of Contributors Foreword Preface Acknowledgements

  • Standards and Best Practices in Digital and Multimedia Forensics

    One of the main goals of digital forensics is to produce digital evidence admissible to the court, which requires that the digital forensic process or techniques used are not flawed in such a way that the evidence or intelligence generated can be questioned. This chapter provides a comprehensive review of important international, regional and national standards relevant to digital forensics and electronic evidence in general, as well as many best practice guides produced by different bodies. Two standards made by ASTM International are reviewed. Policies for handling customer complaints, document control and disclosure of information are also mentioned. Training, education and certification of digital forensics examiners and any personnel working on cases involving digital and multimedia evidence are important for digital and multimedia forensics because of the need to ensure legal admissibility of evidence. Best practice guides on accreditation of digital forensics laboratories are also discussed.



Standards related to Forensics

Back to Top

No standards are currently tagged "Forensics"