Subscribe to RSS Feed (Opens in New Window)
2014 | ||
Wednesday, May 28th | ||
8:00 AM |
Digital Forensics, Security and Law Richmond, Virginia 8:00 AM |
|
---|---|---|
8:00 AM |
Digital Forensics, Security and Law Richmond, Virginia 8:00 AM |
|
8:50 AM |
Glenn S. Dardick, Director of the ADFSL Richmond, Virginia 8:50 AM |
|
9:10 AM |
Mark Pollitt, Digital Forensics at the Crossroads Richmond, Virginia 9:10 AM |
|
9:40 AM |
Awareness of Scam E-mails: An Exploratory Research Study Tejashree D. Datar, Computer and Information Technology Department, Purdue University Richmond, Virginia 9:40 AM |
|
10:20 AM |
Digital Forensics, Security and Law Richmond, Virginia 10:20 AM |
|
10:40 AM |
Why Penetration Testing is a Limited Use Choice for Sound Cyber Security Practice Craig Valli, Security Research Institute, Edith Cowan University Richmond, Virginia 10:40 AM |
|
11:20 AM |
LiFE (Logical iOSForensics Examiner): An Open Source iOSBackup Forensics Examination Tool Ibrahim Baggili, ECECS Department, UNHcFREG, Tagliatela College of Engineering Richmond, Virginia 11:20 AM |
|
12:00 PM |
Digital Forensics, Security and Law Richmond, Virginia 12:00 PM |
|
1:00 PM |
Using Internet Artifacts to Profile a Child Pornography Suspect Marcus K. Rogers, Department of Computer Information & Technology, Purdue University Richmond, Virginia 1:00 PM |
|
1:40 PM |
Internet Addiction to Child Pornography Rachel Sitarz, Knoy Hall of Technology, Purdue University Richmond, Virginia 1:40 PM |
|
2:20 PM |
Digital Forensics, Security and Law Richmond, Virginia 2:20 PM |
|
2:40 PM |
Generation and Handling of Hard Drive Duplicates as Piece of Evidence T. Kemmerich, University College Gjøvik Richmond, Virginia 2:40 PM |
|
3:20 PM |
Emilio R. Mumba, Department of Computer Science, University of Pretoria Richmond, Virginia 3:20 PM |
|
4:00 PM |
The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision John W. Bagby, Professor of Information Sciences & Technology, The Pennsylvania State University Richmond, Virginia 4:00 PM |
|
4:40 PM |
Applying Memory Forensics to Rootkit Detection Igor Korkin, National Research Nuclear University, Moscow Engineering Physics Institute Richmond, Virginia 4:40 PM |