PAPERS
HOME    SCOPE    VENUE    COMMITTEE    GUIDELINES    AWARD    PAPERS     CONFERENCES
PUBLISHED PAPERS


FULL PROCEEDINGS

To download the full ICoFCS 2013 proceedings, click here.     


PAPERS

>>>
A Forensic Tool for Signature Authenticity Verification Through Digital Image Processing and Artificial
        Neural Networks.
        By: Deivison Pinheiro Franco, Felipe Dantas Barboza and Nágila Magalhães Cardoso
        DOI: 10.5769/C2013001 or http://dx/doi.org/10.5769/C2013001
        To see the abstract and to download the paper, click here.


>>>  A Remote biometric authentication protocol for on-line banking.
        By: Anongporn Salaiwarakul
        DOI: 10.5769/C2013002 or http://dx/doi.org/10.5769/C2013002
        To see the abstract and to download the paper, click here.


>>>  Cloud Computing Forensics - Best Practice and Challenges for Process Efficiency of Investigations and
        Digital Forensics
.
       
By: José Milagre and Marcelo Caiado
        DOI: 10.5769/C2013003 or http://dx/doi.org/10.5769/C2013003
        To see the abstract and to download the paper, click here.

>>>  Analyzing Targeted Attacks using Hadoop applied to Forensic Investigation.
        By: Parth Bhatt and Edgar Toshiro Yano
        DOI: 10.5769/C2013004 or http://dx/doi.org/10.5769/C2013004
        To see the abstract and to download the paper, click here.


>>>  Cybercrime Investigation Challenges for Gulf Cooperation Council Governments: A Survey  
        By: Nasser Alalwan, Ahmed Alzahrani, and Mohamed Sarrab
        DOI: 10.5769/C2013005 or http://dx/doi.org/10.5769/C2013005
        To see the abstract and to download the paper, click here.


>>>  Emprego da Engenharia Reversa para caracterização do modus operandi das máquinas caça-níqueis
        quanto à prática de jogo de azar ou outras fraudes

       
By: Cleverson Esteves da Silva, Galileu Batista de Souza and Ricardo Zelenovsky
        DOI: 10.5769/C2013006 or http://dx/doi.org/10.5769/C2013006
        To see the abstract and to download the paper, click here.


>>>  Greatest Eigenvalue Time Vector Approach for Blind Detection of Malicious Traffic      
        By: Danilo Fernandes Tenório, João Paulo C. L. da Costa, and Rafael Timóteo de Souza Júnior
        DOI: 10.5769/C2013007 or http://dx/doi.org/10.5769/C2013007
        To see the abstract and to download the paper, click here.


>>>  Investigação de Crimes Relacionados à Pedofilia Utilizando Metadados de Imagens
        By: João M. Ceron, Paulo César Herrmann Wanner, Lisandro Z. Granville, Bruno Werneck
        DOI: 10.5769/C2013008 or http://dx/doi.org/10.5769/C2013008
        To see the abstract and to download the paper, click here.



>>>  Making Sense of E-Government development in Saudi Arabia: A Qualitative Investigation
        By: Osama Alfarraj
        DOI: 10.5769/C2013009 or http://dx/doi.org/10.5769/C2013009
        To see the abstract and to download the paper, click here.


>>>  Computer Forensic Laboratory: Aims, Functionalities, Hardware and Software
        By: Paulo Quintiliano, João Paulo Carvalho Lustosa da Costa, Flávio Elias de Deus, and
              Rafael Timóteo de Sousa Júnior
        DOI: 10.5769/C2013010 or http://dx/doi.org/10.5769/C2013010
        To see the abstract and to download the paper, click here.


>>>  O princípio da autonomia da perícia oficial no âmbito da Lei 12.030/2009
        By: Paulo Quintiliano
        DOI: 10.5769/C2013011 or http://dx/doi.org/10.5769/C2013011
        To see the abstract and to download the paper, click here.






PAPERS SUBMISSION

ACCEPTED PAPERS

PUBLISHED PAPERS


AGENDA

BEST PAPER