PAPERS
PUBLISHED PAPERS
FULL PROCEEDINGS
>> To download the full ICoFCS 2009 proceedings, click here.
PAPERS
>> Automated Malware Invariant Generation
By Rachid Rebiha, and Arnaldo V. Moura
DOI: 10.5769/C2009001 and http://dx.doi.org/10.5769/C2009001
To see the abstract and to download the paper, click here.
>> Extração de vestígios do Windows Live Messenger 2009
By Marcelo Medeiros, and Galileu Sousa
DOI: 10.5769/C2009002 and http://dx.doi.org/10.5769/C2009002
To see the abstract and to download the paper, click here.
>> Extração e Análise de Dados em Memória na Perícia Forense Computacional
By Gilson Silva, and Evandro Lorens
DOI: 10.5769/C2009003 and http://dx.doi.org/10.5769/C2009003
To see the abstract and to download the paper, click here.
>> Forense Computacional em Memória Principal
By Antônio Castro Júnior, Bruno Lisita, Thiago Moura, and Tiago Pinto
DOI: 10.5769/C2009004 and http://dx.doi.org/10.5769/C2009004
To see the abstract and to download the paper, click here.
>> A perícia forense e a questão dos documentos eletrônicos no Processo Civil brasileiro
By Caio Cesar Carvalho Lima
DOI: 10.5769/C2009005 and http://dx.doi.org/10.5769/C2009005
To see the abstract and to download the paper, click here.
>> Um modelo para as normas sobre certificação digital no Brasil
By Viviane Bertol, Rafael Timóteo de Sousa Jr, Laerte Peotta de Melo
DOI: 10.5769/C2009006 and http://dx.doi.org/10.5769/C2009006
To see the abstract and to download the paper, click here.
>> Projeto MAAOS - Mecanismo para monitoramento de Sistemas Operacionais e auditoria para detecção de
vestígios
By Vitor Costa, and George Fleury
DOI: 10.5769/C2009007 and http://dx.doi.org/10.5769/C2009007
To see the abstract and to download the paper, click here.
>> A Ciência das Redes no combate ao crime e na proteção da infraestrutura crítica para a sociedade
By Gustavo Cavalcante, Mamede Lima Marques
DOI: 10.5769/C2009008 and http://dx.doi.org/10.5769/C2009008
To see the abstract and to download the paper, click here.
>> Security Aspects and Future Trends of Social Networks
By Anchises de Paula
DOI: 10.5769/C2009009 and http://dx.doi.org/10.5769/C2009009
To see the abstract and to download the paper, click here.
>> Desafios da informática forense no cenário de Cloud Computing
By Carlos Eduardo Marins
DOI: 10.5769/C2009010 and http://dx.doi.org/10.5769/C2009010
To see the abstract and to download the paper, click here.
>> Arquitetura de agentes inteligentes no auxílio à perícia forense computacional
By Benedito Cristiano Petroni, and Pedro Luís Próspero Sanchez
DOI: 10.5769/C2009011 and http://dx.doi.org/10.5769/C2009011
To see the abstract and to download the paper, click here.
>> Análise teórica e prática da segurança de redes sem fio na cidade de São Paulo
By Wilson Leite da Silva Filho
DOI: 10.5769/C2009012 and http://dx.doi.org/10.5769/C2009012
To see the abstract and to download the paper, click here.
>> Fraudes digitais - análise de pixels
By Carlos Alberto Goldani, Daniel Weber, Evandro Della Vecchia Pereira
DOI: 10.5769/C2009013 and http://dx.doi.org/10.5769/C2009013
To see the abstract and to download the paper, click here.
>> EspiaMule e Wyoming ToolKit: ferramentas de repressão à exploração sexual infanto-juvenil em redes
Peer-to-Peer
By Jorge Ricardo Souza de Oliveira, Edmar Edilton da Silva
DOI: 10.5769/C2009014 and http://dx.doi.org/10.5769/C2009014
To see the abstract and to download the paper, click here.
>> Identificação de autoria e materialidade em crimes de abuso sexual de criança/adolescente a partir da análise de
arquivos multimídia
By Pedro Monteiro da Silva Eleutério, Marcio Pereira Machado
DOI: 10.5769/C2009015 and http://dx.doi.org/10.5769/C2009015
To see the abstract and to download the paper, click here.