Subscribe to RSS Feed (Opens in New Window)
2013 | ||
Tuesday, June 11th | ||
8:00 AM |
Digital Forensics, Security and Law Richmond, Virginia 8:00 AM |
|
---|---|---|
8:00 AM |
Digital Forensics, Security and Law Richmond, Virginia 8:00 AM |
|
8:30 AM |
Digital Forensics, Security and Law Richmond, Virginia 8:30 AM |
|
8:45 AM |
Jake Kouns, Director of Cyber Security and Technology Risks Underwriting for Markel Corporation Richmond, Virginia 8:45 AM |
|
9:30 AM |
Money Laundering Detection Framework to Link the Disparate and Evolving Schemes Murad Mehmet, Department of Computer Science, Volgenau School of Engineering, George Mason University Richmond, Virginia 9:30 AM |
|
10:10 AM |
Digital Forensics, Security and Law Richmond, Virginia 10:10 AM |
|
10:25 AM |
System-Generated Digital Forensic Evidence in Graphic Design Applications Enos Mabuto, University of Pretoria, South Africa Richmond, Virginia 10:25 AM |
|
11:05 AM |
Significance of Semantic Reconciliation in Digital Forensics Nickson M. Karie, Department of Computer Science, Kabarak University Richmond, Virginia 11:05 AM |
|
11:50 AM |
Digital Forensics, Security and Law Richmond, Virginia 11:50 AM |
|
12:50 PM |
Daniel Ryan, lawyer, businessman, and educator: Certification of Forensics Professionals, USA Richmond, Virginia 12:50 PM |
|
1:35 PM |
An Image Forensic Scheme with Robust and Fragile Watermarking for Business Documents Sai Ho Kwok, Department of Information Systems, Business Statistics and Operations Management, The Hong Kong, University of Science and Technology Richmond, Virginia 1:35 PM |
|
2:15 PM |
Digital Forensics, Security and Law Richmond, Virginia 2:15 PM |
|
2:30 PM |
Journey into Windows 8 Recovery Artifacts W. K. Johnson, KPMG, USA Richmond, Virginia 2:30 PM |
|
3:10 PM |
A Thematic Review of User Compliance with Information Security Policies Literature David Sikolia, Ph.D. Candidate, Department of Management Science and Information Systems, Oklahoma State University Richmond, Virginia 3:10 PM |
|
3:50 PM |
First Glance: An Introductory Analysis of Network Forensics of Tor Raymond Hansen, Department of Computer and Information Technology, Purdue University Richmond, Virginia 3:50 PM |