This event is endorsed
and organized by

7th EAI International Conference on Digital Forensics & Cyber Crime

October 6–8, 2015 | Seoul, South Korea

All accepted papers and posters (extended abstracts) are published in:

James, J.I. & Breitinger, F. eds., 2015. [Digital Forensics and Cyber Crime](https://www.springer.com/gp/book/9783319255118). Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Available at: http://dx.doi.org/10.1007/978-3-319-25512-5.

Accepted Papers

  • **[Digital forensics education: a multidisciplinary curriculum model](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_1)**
    • Imani Palmer, Stefan Nagy, Gabriela Garcia, Elaine Wood, Lizanne Destefano, Roy Campbell and Masooda Bashir.
  • **[Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_2)**
    • Alleyn Conway, Joshua I. James and Pavel Gladyshev.
  • **[Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-Block Based Features](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_3)**
    • Vivek Kumar Singh, Pallav Pant and Ramesh Chandra Tripathi.
  • **[How Cuckoo filter can improve existing approximate matching](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_4)**
    • Vikas Gupta and Frank Breitinger.
  • **[Forensically Sound Retrieval and Recovery of Images from GPU Memory](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_5)**
    • Yulong Zhang, Baijian Yang and Marcus Rogers.
  • **[Advanced Techniques for Reconstruction of Incomplete Network Data](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_6)**
    • Petr Matousek, Jan Pluskal, Ondrej Rysavy, Vladimir Vesely, Martin Kmet, Filip Karpíšek and Martin Vymlátil.
  • **[Cyber Peacekeeping](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_10)**
    • Nikolay Akatyev and Joshua I. James.
  • **[Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_7)**
    • Conor Quinn, Mark Scanlon, Jason Farina and M-Tahar Kechadi.
  • **[A Survey of International Cooperation in Digital Investigations](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_8)**
    • Joshua I. James and Pavel Gladyshev.
  • **[Awareness of Scam E-mails: An Exploratory Research Study (Part 2)](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_9)**
    • Tejashree Datar, Kelly Cole and Marcus Rogers.
  • **[Case Study of Authur Pendragon Cyber Threat: Socio-Psychological &](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_11) [Communication Studies Perspectives](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_11)**
    • Kathryn Seigfried-Spellar, Ben Flores and Darrin Griffin.
  • **[Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_12)**
    • Flavio Bertini, Rajesh Sharma, Andrea Iannì and Danilo Montesi.
  • **[Analysis of a HIKVISION DVR File System](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_13)**
    • Jaehyeok Han, Doowon Jeong and Sangjin Lee.
  • **[Exploring the Effectiveness of Digital Forensics Tools on the Sony](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_14) [PlayStation Vita](http://link.springer.com/chapter/10.1007/978-3-319-25512-5_14)**
    • Karolina Alvarez and Masooda Bashir.

Accepted Posters

  • **Recycling Personal Data: The Potential of Data Reuse in Digital Forensics and the Use Limitation Principle**
    • Bart Custers.
  • **Forensic analysis of Amcache.hve**
    • Moon-Ho Kim, Ji-Sung Choi and Sang-Jin Lee.
  • **Reliability Research about Evidence Acquisition method of Mac Device**
    • Jisung Choi, Dohyun Kim and Sangjin Lee.