PAPERS
PUBLISHED PAPERS
FULL PROCEEDINGS
To download the full ICoFCS 2013 proceedings, click here.
PAPERS
>>> A Forensic Tool for Signature Authenticity Verification Through Digital Image Processing and Artificial
Neural Networks.
By: Deivison Pinheiro Franco, Felipe Dantas Barboza and Nágila Magalhães Cardoso
DOI: 10.5769/C2013001 or http://dx/doi.org/10.5769/C2013001
To see the abstract and to download the paper, click here.
>>> A Remote biometric authentication protocol for on-line banking.
By: Anongporn Salaiwarakul
DOI: 10.5769/C2013002 or http://dx/doi.org/10.5769/C2013002
To see the abstract and to download the paper, click here.
>>> Cloud Computing Forensics - Best Practice and Challenges for Process Efficiency of Investigations and
Digital Forensics.
By: José Milagre and Marcelo Caiado
DOI: 10.5769/C2013003 or http://dx/doi.org/10.5769/C2013003
To see the abstract and to download the paper, click here.
>>> Analyzing Targeted Attacks using Hadoop applied to Forensic Investigation.
By: Parth Bhatt and Edgar Toshiro Yano
DOI: 10.5769/C2013004 or http://dx/doi.org/10.5769/C2013004
To see the abstract and to download the paper, click here.
>>> Cybercrime Investigation Challenges for Gulf Cooperation Council Governments: A Survey
By: Nasser Alalwan, Ahmed Alzahrani, and Mohamed Sarrab
DOI: 10.5769/C2013005 or http://dx/doi.org/10.5769/C2013005
To see the abstract and to download the paper, click here.
>>> Emprego da Engenharia Reversa para caracterização do modus operandi das máquinas caça-níqueis
quanto à prática de jogo de azar ou outras fraudes
By: Cleverson Esteves da Silva, Galileu Batista de Souza and Ricardo Zelenovsky
DOI: 10.5769/C2013006 or http://dx/doi.org/10.5769/C2013006
To see the abstract and to download the paper, click here.
>>> Greatest Eigenvalue Time Vector Approach for Blind Detection of Malicious Traffic
By: Danilo Fernandes Tenório, João Paulo C. L. da Costa, and Rafael Timóteo de Souza Júnior
DOI: 10.5769/C2013007 or http://dx/doi.org/10.5769/C2013007
To see the abstract and to download the paper, click here.
>>> Investigação de Crimes Relacionados à Pedofilia Utilizando Metadados de Imagens
By: João M. Ceron, Paulo César Herrmann Wanner, Lisandro Z. Granville, Bruno Werneck
DOI: 10.5769/C2013008 or http://dx/doi.org/10.5769/C2013008
To see the abstract and to download the paper, click here.
>>> Making Sense of E-Government development in Saudi Arabia: A Qualitative Investigation
By: Osama Alfarraj
DOI: 10.5769/C2013009 or http://dx/doi.org/10.5769/C2013009
To see the abstract and to download the paper, click here.
>>> Computer Forensic Laboratory: Aims, Functionalities, Hardware and Software
By: Paulo Quintiliano, João Paulo Carvalho Lustosa da Costa, Flávio Elias de Deus, and
Rafael Timóteo de Sousa Júnior
DOI: 10.5769/C2013010 or http://dx/doi.org/10.5769/C2013010
To see the abstract and to download the paper, click here.
>>> O princípio da autonomia da perícia oficial no âmbito da Lei 12.030/2009
By: Paulo Quintiliano
DOI: 10.5769/C2013011 or http://dx/doi.org/10.5769/C2013011
To see the abstract and to download the paper, click here.