Username: Password:
Calendar eventCalendar
Fri 16 Mar 2018
Sat 17 Mar 2018
Sun 18 Mar 2018
Mon 19 Mar 2018
Tue 20 Mar 2018
Wed 21 Mar 2018
Thu 22 Mar 2018
View next topic
View previous topic

Post new topicReply to topic View previous topicEmail to a Friend.List users that have viewed this topicSave this Topic as filePrintable versionLog in to check your private messagesView next topic
Author Message

Joined: 21 Feb 2007
Posts: 316

PostPosted: Fri Feb 13, 2009 11:19 am  Post subject:  TOC of International Journal of Digital Crime and ...
13 Feb 2009
Reply with quoteBottom of PageBack to top

TOC of International Journal of Digital Crime and Forensics (IJDCF)

The contents of the latest issue of:

International Journal of Digital Crime and Forensics (IJDCF)

Official Publication of the Information Resources Management Association
Volume 1, Issue 2, April-June 2009

Published: Quarterly in Print and Electronically

ISSN: 1941-6210 EISSN: 1941-6229

Published by IGI Publishing, Hershey-New York, USA

Editor-in-Chief: Chang-Tsun Li, University of Warwick, UK

Special Issue: Selected Papers from E-Forensics 2008

Selected Papers from e-Forensics 2008: The First International
Conference on Forensic Applications and Techniques in
Telecommunications, Information and Multimedia

Matthew Sorell, General Chair, e-Forensics 2008

This article discusses the e-forensics conference that attracted a
specialist crowd of seventy digital forensics researchers and
practitioners from around the world to hear over thirty papers on a
diverse range of digital forensic topics. One of the aims of the
conference was to recognize that digital evidence gathering and analysis
now goes well beyond conventional data security, audit trails, and data
recovery. Digital still and video cameras, mobile phones, and combined
units are now ubiquitous and have wide applications in both crime and
law enforcement. The Internet offers new opportunities both to commit
crimes and to combine efforts to solve crime across international borders.

A Model Based Approach to Timestamp Evidence Interpretation

Svein Yngvar Willassen, Norwegian University of Science and Technology,

In this article, timestamps play an important role in digital
investigations since they are necessary for the correlation of evidence
from different sources. The use of timestamps as evidence can be
questionable due to the reference to a clock with unknown adjustment.
This article addresses this problem by taking a hypothesis based
approach to timestamp investigation. Historical clock settings can be
formulated as a clock hypothesis. This hypothesis can be tested for
consistency with timestamp evidence by constructing a model of actions
affecting timestamps in the investigated system.

To obtain a copy of the entire article, click on the link below.

Conditions for Effective Detection and Identification of Primary
Quantisation of Re-Quantized JPEG Images

Matthew James Sorell, University of Adelaide, Australia

This article explores the conditions under which primary quantization
coefficients can be identified and used for image source identification.
The choice of quantization table in a JPEG image has previously been
shown to be an effective discriminator of digital image cameras by
manufacturer and model series. When a photograph is recompressed for
transmission or storage, the image undergoes a secondary stage of
quantization. The author indentifies primary quantization artifacts in
the image coefficients and forensic applications that include matching a
small range of potential source cameras to an image.

To obtain a copy of the entire article, click on the link below.

Conducting Forensic Investigations of Cyber Attacks on Automobile
In-Vehicle Networks

Dennis K. Nilsson, Chalmers University of Technology, Sweden
Ulf E. Larson, Chalmers University of Technology, Sweden

In this article, the authors discuss how to perform a digital forensic
investigation of an in-vehicle network. An analysis of the current
features of the network is performed, and an attacker model is
developed. Based on the attacker model and a set of generally accepted
forensic investigation principles, the authors derive a list of
requirements for detection, data collection, and event reconstruction.
The authors then use the Integrated Digital Investigation Process
proposed by Carrier and Spafford (2004) as a template to illustrate how
derived requirements affect an investigation.

To obtain a copy of the entire article, click on the link below.

Reversible and Blind Database Watermarking Using Difference Expansion

Gaurav Gupta, Macquarie University, Australia
Josef Pieprzyk, Macquarie University, Australia

This article discusses how significant research was recently discovered
in the field of database watermarking; however, there has not been
sufficient attention given to the requirement of providing reversibility
and blindness at the same time. This model has several disadvantages
over reversible and blind watermarking. The authors propose a
watermarking scheme to overcome disadvantages and include advantages of
model scheme.

To obtain a copy of the entire article, click on the link below.

Methods to Identify Spammers

Tobias Eggendorfer, Universität der Bundeswehr München, Germany

This paper discusses several methods to identify spammers and
unsolicited commercial e-mail. Unsolicited commercial e-mail has become
a major threat for e-mail communication. Although the degree of
sophistication of spam filters has increased over time, such filters
still produce high rates of false positives and false negatives, thereby
reducing the reliability of e-mail and introducing communication risks
on their own. Due to more and more complex filtering methods
implemented, the hardware requirements for mail servers are increasing.
The author pinpoints that mail filtering has reached its limits and
seeks for more preventive solutions to fight spam.

To obtain a copy of the entire article, click on the link below.


Dealing with Multiple Truths in Online Virtual Worlds

Jan Sablatnig, Technische Universität Berlin, Germany
Fritz Lehmann-Grube, Technische Universität Berlin, Germany
Sven Grottke, University of Stuttgart, Germany
Sabine Cikic, Technische Universität Berlin, Germany

This article discusses how virtual environments and online games are
becoming a major market force. At the same time, the virtual property
contained in these environments is being traded for real money and
attaining a real value. The legal issues involved with this virtual
property have not yet been decided; they will have to be soon. It is
foreseeable that the next generation of very large virtual worlds will
carry the possibility of multiple truths existing at the same time.
Under such circumstances, it will be impossible to physically protect
virtual property. In order to protect virtual property, virtual
environment systems will have to conform to certain requirements. The
authors analyze requirements in order to either prevent cheating or to
prove a digital offence has transpired.

To obtain a copy of the entire article, click on the link below.

For full copies of the above articles, check for this issue of the
International Journal of Digital Crime and Forensics (IJDCF) in your
institution's library. This journal is also included in the IGI Global
aggregated "InfoSci-Journals" database:


Mission of IJDCF:

The mission of the International Journal of Digital Crime and Forensics
(IJDCF) is to provide and foster a forum for advancing research and
development of the theory and practice of digital crime prevention and
forensics. It addresses a broad range of digital crimes and forensic
disciplines that use electronic devices and software for crime
prevention and investigation. The journal informs a broad
cross-sectional and multi-disciplinary readership ranging from the
academic and professional research communities, to industry consultants
and practitioners. IJDCF publishes a balanced mix of high quality
theoretical and empirical research articles, case studies, book reviews,
tutorials, and editorials.

Coverage of IJDCF:

Topics to be discussed in this journal include (but are not limited to)
the following:
Computational approaches to digital crime preventions
Computer virology
Crime scene imaging
Criminal investigative criteria and standard of procedure on computer crime
Cryptological techniques and tools for crime investigation
Data carving and recovery
Digital document examination
Digital evidence
Digital signal processing techniques for crime investigations
Identity theft and biometrics
Information warfare
Machine learning, data mining, and information retrieval for crime
prevention and forensics
Malicious codes
Network access control and intrusion detection
Policy, standards, protocols, accreditation, certification, and ethical
issues related to digital crime and forensics
Practical case studies and reports, legislative developments, and
limitations, law enforcement
Small digital device forensics (cell phones, smartphone, PDAs,
audio/video devices, cameras, flash drives, gaming devices, GPS devices,
Steganography and steganalysis
Terrorism knowledge portals and databases
Terrorism related analytical methodologies and software tools
Terrorist incident chronology databases
Watermarking for digital forensics

Interested authors should consult the journal's manuscript submission
guidelines at

All inquiries and submissions should be sent to:
Editor-in-Chief: Chang-Tsun Li at


   OfflinePersonal Gallery of yficiciView user's profileSend private message
Display posts from previous:      
Post new topicReply to topic View previous topicEmail to a Friend.List users that have viewed this topicSave this Topic as filePrintable versionLog in to check your private messagesView next topic

View next topic
View previous topic
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum