How to Quickly Process All Your Videos (And Audio) for Release in Amped FIVE

Michelle Coan: Okay. Hello everybody, and thank you all for joining us today in this session on how to quickly process all your videos and audio for release in Amped FIVE. My name is Michelle Coan and I’m a … Read more The post How t… Continue reading How to Quickly Process All Your Videos (And Audio) for Release in Amped FIVE

Evaluating Results from Automated Systems in Forensic Science

Welcome to this presentation on how to evaluate the results from automated system in forensic science. I’m Timothy Bollé, a PhD student at the University of Lausanne, and Eoghan Casey is my supervisor.

Automated systems are, including a … Continue reading Evaluating Results from Automated Systems in Forensic Science

Enhancing Traditional Forensic Investigations Using IoT Traces from Smart Buildings

Hello, and welcome to this presentation on enhancing traditional forensic investigations using IoT traces from smart buildings. We will look at how IoT devices and the traces generated can be useful to provide additional insight in classical fore… Continue reading Enhancing Traditional Forensic Investigations Using IoT Traces from Smart Buildings

Enhancing Traditional Forensic Investigations Using IoT Traces from Smart Buildings

Hello, and welcome to this presentation on enhancing traditional forensic investigations using IoT traces from smart buildings. We will look at how IoT devices and the traces generated can be useful to provide additional insight in classical fore… Continue reading Enhancing Traditional Forensic Investigations Using IoT Traces from Smart Buildings

Insider Threat Prediction Based on Unsupervised Anomaly Detection Scheme for Proactive Forensic Investigation

Hello everyone. Wei Yichen from the University of Hong Kong. Today I’m going to introduce our paper about insider threat prediction based on Unsupervised Anomaly Detection Scheme for Proactive Forensic Investigation.Let’s start with t… Continue reading Insider Threat Prediction Based on Unsupervised Anomaly Detection Scheme for Proactive Forensic Investigation

LogExtractor: Extracting Digital Evidence From Android Log Messages Via String & Taint Analysis

Hi, thanks for showing me. This is Christian Chao, a PhD from Iowa State University. Today, I’m going to present LogExtractor. This is joint work with Chen Shi and my advisor is professor Neil Zhenqiang Gong and professor Yong Guan. &hellip… Continue reading LogExtractor: Extracting Digital Evidence From Android Log Messages Via String & Taint Analysis

Comprehensive Statistical Analysis on the Crackability of Real-World Passwords

Hello everyone. My name is Aikaterini Kanta and I’m a PhD student with University College Dublin, and the European Commission’s Joint Research Centre. I’m here today at DFRWS APAC 2021 to present a comprehensive statistical analysis o… Continue reading Comprehensive Statistical Analysis on the Crackability of Real-World Passwords

The AFF4 Evidence Container: Why and What’s Next

Well, good day. My name is Bradley Schatz, I’m from Evimetry. Today I’m here, it’s my distinct pleasure to be here at the Magnet Virtual Summit to talk about the Advanced Forensic Format Container version four. That’s an evidence cont… Continue reading The AFF4 Evidence Container: Why and What’s Next