9.00
Registration
9.15 Welcome
9.20 Keynote:
Tony Neate (Get Safe Online), Internet Security:
Changing the behaviour of people who don't care....!
10.00 Sarah Morris (Cranfield
University) and Howard Chivers (University of York),
Thumbnail Cache File Fragment Identification using a Bayesian Network
Ross Paterson and Petra Leimich (University of Abertay
Dundee), An investigation into PL/SQL Injection
11.15 Coffee
11.30 Michelle Govan
(Glasgow Caledonian University), Forensic Droplets and Puddles from the Cloud
Olga Angelopoulou
(University of Derby) and Stilianos Vidalis (University of Staffordshire), Towards 'Crime
Specific' Digital Investigation Frameworks
George R S Weir and
Richard Connor (University of Strathclyde), The
importance of image similarity for criminal investigation
13.15 Lunch
14.00 Tom Coppock and Diane Gan (University
of Greenwich), Forensic Investigation into Mac OS X Volatile Memory
Harjinder Lallie and
Tim Chen (University of Warwick), GeoTract: Issues in
Pattern Matching Geospatial Data on Digital Storage Systems
Michelle Govan (Glasgow
Caledonian University), Temporal Analysis of an iMessage
Communication Exchange
15.45 Coffee
16.00 Keynote: Matthew
Williams (Cardiff Centre for Crime, Law & Justice), Multi-Agency
Partnerships in eCrime Reduction: Mapping
the Network Cooperation Space
Anne David and
Christopher Hargreaves (Cranfield University),
Detecting Tor Vidalia Bundle installation
17.10 Close
19.00 Conference
Gala Dinner
9.00 Registration
9.15 Gavin Hales, Ian
Ferguson and Jacqueline Archibald (University of Abertay
Dundee), On the use of hyperbolic visualization to
assist digital forensic analysis
10.00 Tameem Chowdhury (University of
South Wales), Stilianos Vidalis
(University of Stafford) and Christopher Tubb
(University of South Wales), Proactively Defending Computing Infrastructures
through the Implementation of Live Forensic Capture in Corporate Network
Security
Man Qi. Clear Up Grey
Areas (Canterbury Christ Church University), Cybercrime Legislation Progress in
China
11.15 Coffee
11.30 Steven Toes and Majdi Owda (Manchester
Metropolitan University),Template-Based Information
Extraction System for Detection of Events on Twitter
Vítor J. Sá (Catholic University of Portugal), Sérgio T. de Magalhães (Catholic
University of Portugal) and Henrique D. Santos (University of Minho),
Feasibility Study of a Multimodal Biometric Authentication Solution Based on
Pointer Dynamics and Skin Conductivity
Nikolaos Sarantinos
& A. Al-Nemrat (University of East London), Using
Statistical Sampling Methodology to investigate child pornography cases
13.15 Lunch
14.00 Mark Graham and
Adrian Winckles (Anglia Ruskin University), A benchmarking performance analysis of SRTP against IPsec
for securing VoIP in the LAN
Fletcher Bayley and Diane Gan (University
of Greenwich), Forensic Analysis of Digital Attack Tool Artifacts
15.15 Coffee
15.30 Adrian Winckles and Alexander Pedersen (Anglia Ruskin University),
Analyzing Botnet Component Structures to Trace a P2P
Botnet Botmaster
16.10 Plenary discussion
16.40 End