Subscribe to RSS Feed (Opens in New Window)
2016 | ||
Wednesday, May 25th | ||
8:00 AM |
Digital Forensics, Security and Law Daytona Beach, Florida 8:00 AM |
|
---|---|---|
8:00 AM |
Digital Forensics, Security and Law Daytona Beach, Florida 8:00 AM |
|
9:00 AM |
Inferring Previously Uninstalled Applications from Residual Partial Artifacts Jim Jones, George Mason University, Fairfax, Virginia, United States Daytona Beach, Florida 9:00 AM |
|
9:00 AM |
One-Time Pad Encryption Steganography System Michael J. Pelosi Daytona Beach, Florida 9:00 AM |
|
10:00 AM |
Digital Forensics, Security and Law Daytona Beach, Florida 10:00 AM |
|
10:30 AM |
Forensic Analysis of Smartphone Applications for Privacy Leakage Diana Hintea, Coventry University, School of Computing, Electronics and Maths Daytona Beach, Florida 10:30 AM |
|
10:30 AM |
Malware in the Mobile Device Android Environment Diana Hintea, Coventry University, School of Computing, Electronics and Maths Daytona Beach, Florida 10:30 AM |
|
12:00 PM |
Digital Forensics, Security and Law Daytona Beach, Florida 12:00 PM |
|
1:00 PM |
Forensics Analysis of Privacy of Portable Web Browsers Ahmad Ghafarian, Department of Computer Science and Information Systems, Mike Cottrell College of Business Daytona Beach, Florida 1:00 PM |
|
1:00 PM |
Reverse Engineering a Nit That Unmasks Tor Users Matthew Miller, University of Nebraska at Kearney Daytona Beach, Florida 1:00 PM |
|
3:00 PM |
Digital Forensics, Security and Law Daytona Beach, Florida 3:00 PM |