Quick Links: --- Thursday's Agenda --- Friday's Agenda --- Presentations ---
Subscribe to RSS Feed (Opens in New Window)
ADFSL |
||
ADFSL |
||
2018 | ||
Thursday, May 17th | ||
8:45 AM |
Igor Korkin 8:45 AM - 9:20 AM |
|
9:20 AM |
Detection and Recovery of Anti-Forensic (VAULT) Applications on Android Devices Michaila Duncan, Sam Houston State University 9:20 AM - 9:55 AM |
|
10:40 AM |
Unmanned Aerial Vehicle Forensic Investigation Process: DJI Phantom 3 Drone As a Case Study Alan Roder 10:40 AM - 11:15 AM |
|
11:15 AM |
Live GPU Forensics: The Process of Recovering Video Frames from NVIDIA GPU Yazeed M. Albabtain, Purdue University 11:15 AM - 11:50 AM |
|
1:35 PM |
Forensic Analysis of the exFAT Artifacts Yves Vandermeer, Norwegian Police University College 1:35 PM - 2:10 PM |
|
2:45 PM |
Non-Use of a Mobile Phone During Conducting Crime Can Also Be Evidential Vinod Polpaya Bhattathiripad Ph D, GJ Software Forensics 2:45 PM - 3:20 PM |
|
3:20 PM |
Jayaprakash Govindaraj, Indraprastha Institute of Information Technology, New Delhi, India 3:20 PM - 3:55 PM |
|
3:55 PM |
DF 2.0: Designing an automated, privacy preserving, and efficient digital forensic framework Robin Verma, Indraprastha Institute of Information Technology Delhi 3:55 PM - 4:30 PM |
|
Friday, May 18th | ||
8:45 AM |
Exploring the Use of Graph Databases to Catalog Artifacts for Client Forensics Rose Shumba 8:45 AM - 9:20 AM |
|
9:20 AM |
Positive Identification of LSB Image Steganography Using Cover Image Comparisons Michael Pelosi, East Central University, Ada Oklahoma 9:20 AM - 9:55 AM |
|
10:40 AM |
Knowledge Expiration in Security Awareness Training Tianjian Zhang 10:40 AM - 11:15 AM |
|
11:15 AM |
Analysis of Data Erasure Capability on SSHD Drives for Data Recovery Andrew Blyth, Technology Research Centre, DPG 11:15 AM - 11:50 AM |
|
1:00 PM |
A Survey of Lawyers’ Cyber Security Practises in Western Australia Craig Valli, Edith Cowan University 1:00 PM - 1:35 PM |