Subscribe to RSS Feed (Opens in New Window)
2014 | ||
Thursday, May 29th | ||
8:00 AM |
Digital Forensics, Security and Law Richmond, Virginia 8:00 AM |
|
---|---|---|
8:00 AM |
Digital Forensics, Security and Law Richmond, Virginia 8:00 AM |
|
8:40 AM |
Digital Forensics, Security and Law Richmond, Virginia 8:40 AM |
|
9:00 AM |
Computer Forensics for Accountants Grover S. Kearns, College of Business, University of South Florida St. Petersburg Richmond, Virginia 9:00 AM |
|
9:40 AM |
Masooda Bashir, Graduate School of Library and Information Science, Information Trust Institute, University of Illinois at Urbana-Champaign Richmond, Virginia 9:40 AM |
|
10:20 AM |
Digital Forensics, Security and Law Richmond, Virginia 10:20 AM |
|
10:40 AM |
Botnet Forensic Investigation Techniques and Cost Evaluation Brian Cusack, Junewon Park Digital Forensic Research Laboratories, Auckland University of Technology Richmond, Virginia 10:40 AM |
|
11:20 AM |
Visualizing Instant Messaging Author Writeprints for Forensic Analysis Angela Orebaugh, George Mason University Richmond, Virginia 11:20 AM |
|
12:00 PM |
Digital Forensics, Security and Law Richmond, Virginia 12:00 PM |
|
1:00 PM |
Application Of Toral Automorphisms to Preserve Confidentiality Principle in Video Live Streaming Enrique García-Carbajal, National Polytechnic Institute of Mexico Richmond, Virginia 1:00 PM |
|
1:40 PM |
Raymond A. Hansen, Dept. of Computer & Information Technology, Purdue University Richmond, Virginia 1:40 PM |
|
2:20 PM |
Digital Forensics, Security and Law Richmond, Virginia 2:20 PM |
|
2:40 PM |
Gary Warner, The University of Alabama at Birmingham Richmond, Virginia 2:40 PM |
|
3:10 PM |
Hot Zone Identification: Analyzing Effects of Data Sampling on SPAM Clustering Rasib Khan, Department of Computer and Information Sciences, University of Alabama at Birmingham Richmond, Virginia 3:10 PM |
|
4:00 PM |
Digital Forensics, Security and Law Richmond, Virginia 4:00 PM |