Subscribe to RSS Feed (Opens in New Window)
| 2016 | ||
| Wednesday, May 25th | ||
| 8:00 AM |
Digital Forensics, Security and Law Daytona Beach, Florida 8:00 AM |
|
|---|---|---|
| 8:00 AM |
Digital Forensics, Security and Law Daytona Beach, Florida 8:00 AM |
|
| 9:00 AM |
Inferring Previously Uninstalled Applications from Residual Partial Artifacts Jim Jones, George Mason University, Fairfax, Virginia, United States Daytona Beach, Florida 9:00 AM |
|
| 9:00 AM |
One-Time Pad Encryption Steganography System Michael J. Pelosi Daytona Beach, Florida 9:00 AM |
|
| 10:00 AM |
Digital Forensics, Security and Law Daytona Beach, Florida 10:00 AM |
|
| 10:30 AM |
Forensic Analysis of Smartphone Applications for Privacy Leakage Diana Hintea, Coventry University, School of Computing, Electronics and Maths Daytona Beach, Florida 10:30 AM |
|
| 10:30 AM |
Malware in the Mobile Device Android Environment Diana Hintea, Coventry University, School of Computing, Electronics and Maths Daytona Beach, Florida 10:30 AM |
|
| 12:00 PM |
Digital Forensics, Security and Law Daytona Beach, Florida 12:00 PM |
|
| 1:00 PM |
Forensics Analysis of Privacy of Portable Web Browsers Ahmad Ghafarian, Department of Computer Science and Information Systems, Mike Cottrell College of Business Daytona Beach, Florida 1:00 PM |
|
| 1:00 PM |
Reverse Engineering a Nit That Unmasks Tor Users Matthew Miller, University of Nebraska at Kearney Daytona Beach, Florida 1:00 PM |
|
| 3:00 PM |
Digital Forensics, Security and Law Daytona Beach, Florida 3:00 PM |
|