Conferences related to Forensics

Back to Top

2017 10th International Symposium on Image and Signal Processing and Analysis (ISPA)

The scope of the conference are theory and applications of signal processing, signal analysis, image processing, and image analysis.


2017 12th International Conference on Computer Science and Education (ICCSE)

Annual Topics• Big Data • Cloud Computing • Robotics• Internet of Things • Recommendation System• Web Applications• Telemedicine• Massive Open Online CoursesComputer Science• Artificial Intelligence• Software Engineering• Database Technology • Computer Graphics• Computer Application • Control Technology• Systems Engineering • Communication TechnologyEngineering Education• Education Reform and Innovation• Engineering Education Mode• Curricula and Courseware Design • Engineering Training• Life-long Education• Computer Education for Special GroupCross Disciplinary• Mechatronics• Automation• Bio-inspired Engineering

  • 2016 11th International Conference on Computer Science & Education (ICCSE)

    Since 2006, the International Conference on Computer Science and Education (ICCSE) has been held in Xiamen, Wuhan, Kaifeng, Nanning, Hefei, Singapore, Melbourne, Colombo, Vancouver, and Cambridge for ten sessions.The 11th International Conference on Computer Science & Education (ICCSE 2016) will be held in Nagoya University, Nagoya, Japan at August 23-26, 2016, and organized by National Research Council of Computer Education in Colleges & Universities, China (CRC-CE), and technically co-sponsored by the IEEE Nagoya Section.Many internationally renowned experts and IEEE Fellows from the fields of computer, education and control have made brilliant speeches. The visitants and participants include many experts, academics, scientists, technicians and engineers from many well-known domestic and foreign institutions of higher learning, researches and enterprises. These make the conference become a good platform for internationally academic communication.

  • 2015 10th International Conference on Computer Science & Education (ICCSE)

    IEEE CCSE 2015 Topics of interest include:Annual Selected Topics-- Big Data-- Cloud Computing-- Robotics-- Internet of Things-- Recommendation System-- Web Applications-- Telemedicine-- Massive Open Online CoursesComputer Science-- Artificial Intelligence-- Software Engineering-- Database Technology-- Computer Graphics-- Computer Application-- Control Technology-- Systems Engineering-- Communication TechnologyEngineering Education-- Education Reform and Innovation-- Engineering Education Mode-- Curricula and Courseware Design-- Engineering Training-- Life-long Education-- Computer Education for Special GroupInterdisciplinary-- Mechatronics-- Automation-- Bio-inspired Engineering-- Energy Efficiency-- Uncertainty Quantification

  • 2014 9th International Conference on Computer Science & Education (ICCSE)

    ICCSE is an annual conference, to provide more chances for communication of researchers and educators.

  • 2013 8th International Conference on Computer Science & Education (ICCSE)

    Annual selected topics including cloud computing, internet of things, big data, recommendation system, green communication and web application etc. It also covers the topics of interaction between engineering education and computer science.

  • 2012 7th International Conference on Computer Science & Education (ICCSE 2012)

    Annual selected topics including cloud computing, internet of things, recommendation system, green communication and web application etc. It also covers the topics of interaction between engineering education and computer science.

  • 2011 6th International Conference on Computer Science & Education (ICCSE 2011)

    Computer Science: Database Technology, Artificial Intelligence, Computer Architecture, Software Engineering, Computer Graphics, Computer Application, Control Technology, Systems Engineering, Network Technology, Communication Technology, Web Applications. Computer Education.

  • 2010 5th International Conference on Computer Science & Education (ICCSE 2010)

    The main areas addressed by the conference included: (1)Computer Science: Database Technology, Artificial Intelligence, Computer architecture, Software engineering, Computer Graphics, Computer Application , Control Technology, Systems Engineering, Network Technology, Communication Technology 2) Computer Education.

  • 2009 4th International Conference on Computer Science & Education (ICCSE 2009)

    The main areas addressed by the conference included: (1)Computer Science: Database Technology, Artificial Intelligence, Computer architecture, Software engineering, Computer Graphics, Computer Application , Control Technology, Systems Engineering, Network Technology, Communication Technology 2) Computer Education.


2017 12th System of Systems Engineering Conference (SoSE)

Internet of Things as System of Systems

  • 2016 11th System of Systems Engineering Conference (SoSE)

    IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the Eleventhth International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, maritime, energy, environment, healthcare, and transportation. The conference theme is "SoSE and Cyber Physical Systems (CPS), from academia to application and back" We welcome papers on theories, methodologies, and applications of SoSE and CPS in science, technology, industry, and education. Particularly those that deal with the interaction between research institutes, industry, funding and policy makers. What can we do to stimulate both knowledge creation and economic value? Papers should be five to six pages in length, in standard two-column IEEE Conference Proceedings format.

  • 2015 10th System of Systems Engineering Conference (SoSE)

    IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the Sixth International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is “SoSE Controls, Modeling, and Simulation” three areas of significant investment within the public and private sectors as well as being significant initiatives areas of IEEE. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.

  • 2014 9th International Conference on System of Systems Engineering (SOSE)

    Sociotechnical Aspects of SoSE; The Nexus between Complex Systems Concepts and SoSE; SoSE Application Domains and Case Studies; Open Cloud Computing; SoSE Approaches, Tools, Methods and Processes; SoSE modelling, simulation & and analysis; Entrepreneurship.

  • 2013 8th International Conference on System of Systems Engineering (SoSE)

    IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the 8th International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is

  • 2012 7th International Conference on System of Systems Engineering (SoSE)

    The conference theme is SoSE in cooperative and competitive distributed decision making in complex dynamic systems , focusing on SoSE control and simulation methodologies to support decisions in different application fields, among others transport, energy, industrial and environmental risk management. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.

  • 2011 6th International Conference on System of Systems Engineering (SoSE)

    the Sixth International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is SoSE in Cloud Computing, Smart Grid, and Cyber Security, three areas of significant investment within the public and private sectors as well

  • 2010 5th International Conference on System of Systems Engineering (SoSE)

    The 5th International Conference on System of Systems Engineering (SoSE) covers engineering fields such as control, computing, communication, information technology and the applications to manufacturing, defense, national and homeland security, aerospace, aeronautics, energy, environment, transport.

  • 2009 IEEE International Conference on System of Systems Engineering (SoSE)

    SYSTEM OF SYSTEMS, ARCHITECHTURE, MODLEING, SIMULATION, EMERGENCE, ENGINEERING, CONTROL, APPLICATION IN DEFENSE, ENERGY, SECURITY, SPACE, AERONAUTICS, MANUFACTURING, EARTH OBSERVATION, WATER RESOURCES, ETC.

  • 2008 IEEE International Conference on System of Systems Engineering (SoSE)

    Various concepts and fundamental theories and applications of system of systems and SoS Engineering will be discussed in this meeting. This is the 3rd of its sereis.

  • 2007 IEEE International Conference on System of Systems Engineering (SoSE)

  • 2006 IEEE/SMC International Conference on System of Systems Engineering (SoSE)


2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)

The conference focuses on all areas of machine learning and its applications in medicine, biology, industry, manufacturing, security, education, virtual environments, game playing big data, deep learning, and problem solving.


2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)

• Adaptive computing (and agents) for enhanced collaboration • Adaptive and reconfigurable service-oriented and component-based applications and architectures • Convergence of distributed clouds grids and their management • Collaborative modeling & simulation • Capacity driven processes and services for cyber physical society • Collaborative software processes • Future internet services and applications • Formal verification of service based systems • Management of dynamic networked enterprises • System of systems for logistics • Validating software for critical systems • Modeling the collaborative web knowledge


More Conferences

Periodicals related to Forensics

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Fuzzy Systems, IEEE Transactions on

Theory and application of fuzzy systems with emphasis on engineering systems and scientific applications. (6) (IEEE Guide for Authors) Representative applications areas include:fuzzy estimation, prediction and control; approximate reasoning; intelligent systems design; machine learning; image processing and machine vision;pattern recognition, fuzzy neurocomputing; electronic and photonic implementation; medical computing applications; robotics and motion control; constraint propagation and optimization; civil, chemical and ...


Image Processing, IEEE Transactions on

Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Instrumentation & Measurement Magazine, IEEE

Applications-oriented material in the field of instrumentation and measurement.


More Periodicals


Xplore Articles related to Forensics

Back to Top

Temporally Robust Software Features for Authorship Attribution

Steven Burrows; Alexandra L. Uitdenbogerd; Andrew Turpin 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Authorship attribution is used to determine the creator of works among many candidates, playing a vital role in software forensics, authorship disputes and academic integrity investigations. The evolving coding style of individuals may degrade the performance of systems that attribute authorship of source code, and has not been previously studied. This paper uses a collection of six programming assignments with ...


Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography

Chunfang Yang; Fenlin Liu; Xiangyang Luo; Ying Zeng IEEE Transactions on Information Forensics and Security, 2013

For analyzing the multiple least-significant bits (MLSB) steganography, a pixel group trace model is presented. Based on this model and some statistical characteristics of images, two quantitative steganalysis methods are proposed for two typical MLSB steganography paradigms. The pixel group trace model simulates the MLSB embedding by exclusive or operation, and traces the transition relationship among the possible structures of ...


A Collaborative DDoS Defence Framework Using Network Function Virtualization

Bahman Rashidi; Carol Fung; Elisa Bertino IEEE Transactions on Information Forensics and Security, 2017

High-profile and often destructive distributed denial of service (DDoS) attacks continue to be one of the top security concerns as the DDoS attacks volumes are increasing constantly. Among them, the SYN Flood attack is the most common type. Conventional DDoS defense solutions may not be preferable, since they demand highly capable hardware resources, which induce high cost and long deployment ...


Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff

Ruochi Zhang; Parv Venkitasubramaniam IEEE Transactions on Information Forensics and Security, 2017

The problem of false data injection through compromised cyber links to a physical control system modeled by linear quadratic Gaussian dynamics is studied in this paper. The control input stream is compromised by an attacker who modifies the (cyber) control signals transmitted with the objective of increasing the quadratic cost incurred by the (physical) controller whilst maintaining a degree of ...


Contrast Enhancement-Based Forensics in Digital Images

Gang Cao; Yao Zhao; Rongrong Ni; Xuelong Li IEEE Transactions on Information Forensics and Security, 2014

As a retouching manipulation, contrast enhancement is typically used to adjust the global brightness and contrast of digital images. Malicious users may also perform contrast enhancement locally for creating a realistic composite image. As such it is significant to detect contrast enhancement blindly for verifying the originality and authenticity of the digital images. In this paper, we propose two novel ...


More Xplore Articles

Educational Resources on Forensics

Back to Top

eLearning

Temporally Robust Software Features for Authorship Attribution

Steven Burrows; Alexandra L. Uitdenbogerd; Andrew Turpin 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Authorship attribution is used to determine the creator of works among many candidates, playing a vital role in software forensics, authorship disputes and academic integrity investigations. The evolving coding style of individuals may degrade the performance of systems that attribute authorship of source code, and has not been previously studied. This paper uses a collection of six programming assignments with ...


Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography

Chunfang Yang; Fenlin Liu; Xiangyang Luo; Ying Zeng IEEE Transactions on Information Forensics and Security, 2013

For analyzing the multiple least-significant bits (MLSB) steganography, a pixel group trace model is presented. Based on this model and some statistical characteristics of images, two quantitative steganalysis methods are proposed for two typical MLSB steganography paradigms. The pixel group trace model simulates the MLSB embedding by exclusive or operation, and traces the transition relationship among the possible structures of ...


A Collaborative DDoS Defence Framework Using Network Function Virtualization

Bahman Rashidi; Carol Fung; Elisa Bertino IEEE Transactions on Information Forensics and Security, 2017

High-profile and often destructive distributed denial of service (DDoS) attacks continue to be one of the top security concerns as the DDoS attacks volumes are increasing constantly. Among them, the SYN Flood attack is the most common type. Conventional DDoS defense solutions may not be preferable, since they demand highly capable hardware resources, which induce high cost and long deployment ...


Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff

Ruochi Zhang; Parv Venkitasubramaniam IEEE Transactions on Information Forensics and Security, 2017

The problem of false data injection through compromised cyber links to a physical control system modeled by linear quadratic Gaussian dynamics is studied in this paper. The control input stream is compromised by an attacker who modifies the (cyber) control signals transmitted with the objective of increasing the quadratic cost incurred by the (physical) controller whilst maintaining a degree of ...


Contrast Enhancement-Based Forensics in Digital Images

Gang Cao; Yao Zhao; Rongrong Ni; Xuelong Li IEEE Transactions on Information Forensics and Security, 2014

As a retouching manipulation, contrast enhancement is typically used to adjust the global brightness and contrast of digital images. Malicious users may also perform contrast enhancement locally for creating a realistic composite image. As such it is significant to detect contrast enhancement blindly for verifying the originality and authenticity of the digital images. In this paper, we propose two novel ...


More eLearning Resources

IEEE-USA E-Books

  • Digital Image Forensics with Statistical Analysis

    A large number of forensic methods have been developed in the past decade to answer a broad range of forensic questions. Most image forensic tools can be divided into only two simple categories: semantics-based detection and non- semantics-based detection. This chapter first focuses on the non-semantics- based detection techniques as majority of existing image forensic tools fall into this category. The non-semantics-based detection tools mostly rely on the modelling of statistical patterns of the image using signal-level information. The chapter introduces several recently developed techniques to address two critical topics in the field of multimedia security: detecting region duplication and exposing splicing forgery. It talks about a method for reliable detection of duplicated image regions and an effective image splicing detection algorithm. More realistic case studies for these two techniques are demonstrated. These techniques are further extended to expose forgeries in audio and video signal.

  • Other Cellular Network Types

    The Third Generation Partnership Project 2 (3GPP2) inherited responsibility for CDMA2000 from Qualcomm and is now the umbrella organisation covering cdmaOne (IS‐95) and the various iterations of CDMA2000. This chapter focuses on cdmaOne, and provides in depth information regarding CDMA2000. CDMA2000, also known as IS2000, was originally developed by ANSI and Qualcomm as a 3G evolution of their 2G cdmaOne (IS95) technology. The original IS‐2000/CDMA2000 standard offered an evolution path for existing 2G IS‐95/cdmaOne networks which, initially, reused the same channel structures as the 2G system. There are many types of cellular network in use around the world. The network types detailed here account for well over 90% of current active user connections and therefore represent the bulk of network types that are surveyed for forensic purposes, but there is always a chance that a surveyor will be required to take measurements of less common network types.

  • Camera-Based Image Forgery Detection

    Recently, an increased number of studies in image authentication and image forgery detection have appeared that are based on indicators arising from the acquisition process of the data, namely due to the inherent characteristics of the camera used to produce the image. This chapter focuses on different aspects of image forgery based on effects and cues found in the image that are due to the acquisition process. These aspects include: image authentication, image forgery detection and image signature. These studies are termed as camera-based image forgery detection methods. The chapter describes the camera structure and the three major components: optics, sensors and imaging pipeline. For each component, its basic mechanism, its role in the acquisition process and its effects on the final acquired image are detailed. The chapter presents a specific camera-based image forgery technique as a case study for the approaches.

  • OPERATIONAL MANAGEMENT OF SECURITY

    In this final chapter, we provide an overview of modern network and infrastructure management as a context for the management of deployed security mechanisms. In this review we discuss the need for management mechanisms specific to the management of security at all layers within the Telecommunications Management Network (TMN). We then progress to a discussion of operational security, necessary mechanisms, including forensics, third- party access reviews, and certification. We conclude our treatment of security management with consideration of how to withdraw equipment from service without exposing information to unauthorized access. The third aspect of security management considered is that of compliance. Compliance links back to security policies and requirements that must be adhered to by operations and management personnel.

  • Forensic Radio Surveys

    Forensic radio surveys are most often performed in support of historical cell site analysis (and so are intended to determine where a mobile device could have been when certain calls were made), but may also be performed to gather intelligence as part of 'live' events such as kidnaps (and so are intended to determine the current location of a mobile device). Cell coverage surveys are intended to determine the extent of serving coverage of a particular cell in a way that allows the approximate 'footprint' of the cell to be mapped. Idle Mode surveys attempt to capture the radio environment as observed by a mobile device 'at rest'. Cell site analysis and forensic radio surveys may be new and untested disciplines in some parts of the world, but in other countries, such as the United Kingdom, these techniques have been in development and use for over 15 years.

  • Advanced Multimedia File Carving

    This chapter discusses the state of the art in multimedia file carving. Combining common file carving approaches with content identification results in advanced multimedia file carving. In this context, advanced means that the file carving strategy offers more assistance than the sole collection of evidence data. First, the chapter presents a brief introduction of storage technology aspects relevant for file carving, for example storage devices and file systems. File carving is a general method to enable accessing data lost to the file system. The chapter introduces the more general binary data file carving, and explains file carving designed specifically for multimedia. File carving describes the process of extracting file fragments from a byte stream such as a disk or volume image without file system information. This technique is used to recover data from unallocated space on hard disk storage. The chapter explains consequences of multimedia file characteristics for file carving.

  • Image and Video Processing History Recovery

    This chapter describes the most useful traces used for image and video processing history recovery, and the main forensic techniques that are based on them. The important traces are those relying on specific properties of the encoding process. However, coding artifacts are rarely the only trace of processing. Editing operations, like resizing and colour enhancement, are commonly applied to both images and video. First, the chapter introduces the existing approaches used in the forensic literature to reveal the presence of coding and editing artifacts. Then, it explains how to employ such tools to recover several parameters characterizing the processing history. The chapter presents two case studies, showing possible applications of processing history recovery to tamper detection. It shows how the illustrated forensic techniques can be applied in realistic settings to partly recover the processing history, and how this information can provide useful hints about the authenticity of the analysed media.

  • Microphone Forensics

    In this chapter, microphone forensic investigations specify selected components of (complex) audio signal composition as the patterns to be detected, identified or verified by forensic methods. Such patterns are primarily the characteristics of the sensor, hence the name microphone forensics, but also include characteristics of the environment or processing operations used to modify the recordings. The chapter provides general guidelines for microphone registration. To demonstrate how a typical microphone forensic analysis can be done using statistical pattern recognition, new practical investigations are performed here. An implementation of the statistical pattern recognition pipeline relying on the established data mining suite Waikato Environment for Knowledge Analysis (WEKA) and the author's own general-purpose audio feature extractor are presented and applied to the four investigation tasks specified. Finally, the chapter summarizes some challenges in microphone forensics identified by the investigations described here as well as general challenges to this field.

  • Forensic Camera Model Identification

    This chapter presents an overview of the state of the art of technical means to achieve camera model identification. It starts with an introduction to forensic source identification. The chapter deals with a specific case of digital camera model identification. It comments on suitable image datasets for setting up practical algorithms, the foundations, and focuses on problems that arise in identification scenarios with unknown camera models. The chapter explains the connections between camera model identification and device identification. It talks about the open set camera model identification that poses an inherent challenge to the widely used multi-class support vector machines (SVMs), as they always assign a test sample to one of the trained classes. The role of model-specific characteristics in device-level identification is discussed. As forensic camera model identification finds applications in practical investigations, a more explicit treatment of the different types of artifact interdependencies will gain more relevance.

  • Cell Site Analysis

    Cell site analysis (or cell tower tracking as it is sometimes known in the United States) attempts to provide evidence of where a mobile phone may have been located when certain calls were made. It is a useful tool for investigators and is based on a combination of network‐provided Call Detail Record (CDR) data and forensic radio survey results. Forensic radio surveys can be commissioned to provide more detailed information about the coverage provided by individual cells or at specific locations. The use of cell site analysis by law enforcement agencies has presented them with a powerful investigative tool, but the uncertainty involved in reaching conclusions based on cell site evidence leaves it vulnerable to challenge from the defence in a case.



Standards related to Forensics

Back to Top

No standards are currently tagged "Forensics"


Jobs related to Forensics

Back to Top