This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference, ICDF2C 2009, held September 30 - October 2, 2009, in Albany, NY, USA.
Digital forensics and cyber crime is a multidisciplinary area that requires expertise in several areas including law, computer science, finance networking, data mining and criminal justice.
The 16 papers present the whole gamut of multimedia and handheld device forensics, financial crimes, cyber crime investigations, forensics and law, cyber security and information warfare.
This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference, ICDF2C 2009, held September 3...
This volume contains the proceedings of the First International ICST Conference on Digital Business (DigiBiz 2009), hosted by City University London in London, UK. This annual event had the main objective to stimulate and disseminate research results and experimentation on future Digital Business to a wider multidisciplinary forum that would allow the participants to cross the boundaries between research and business. The scientific offering in e-business, e-commerce, and ICT in general is quite broad and spans many different research themes, involving several communities and me- odologies....
This volume contains the proceedings of the First International ICST Conference on Digital Business (DigiBiz 2009), hosted by City University London i...
ISDF 2009, the First International Conference on Information Security and Digital Forensics, was held at City University London during September 7-8, 2009. The c- ference was organized as a meeting point for leading national and international - perts of information security and digital forensics. The conference was rewarding in many ways; ISDF 2009 was an exciting and vibrant event, with 4 keynote talks, 25 invited talks and 18 full-paper presentations and those attending had the opportunity to meet and talk with many distinguished people who are responsible for shaping the area of...
ISDF 2009, the First International Conference on Information Security and Digital Forensics, was held at City University London during September 7-8, ...
The First International ICST Conference on Sensor Systems and Software (S-cube 2009) was held during 7-8 September in Pisa, Italy. This new international conference was dedicated to addressing the research challenges facing system dev- opment and software support for systems based on wireless sensor networks (WSNs) that have the potential to impact society in many ways. Currently, wireless sensor networks introduce innovative and interesting application scenarios that may support a large amount of different applications including environmental monitoring, disaster prevention, building...
The First International ICST Conference on Sensor Systems and Software (S-cube 2009) was held during 7-8 September in Pisa, Italy. This new internatio...
The First ICST International Workshop on Security in Emerging Wireless Commu- cation and Networking Systems (SEWCN 2009) was held in Athens, Greece, Sept- ber 14, in conjunction with SecureComm 2009. SEWCN 2009 was sponsored by the Institute for Computer Sciences, Social-Informatics and Telecommunications En- neering (ICST). The Workshop Chairs were Qijun Gu from Texas State University- San Marcos, USA, and Wanyu Zang from Western Illinois University, USA. The workshop invited 20 researchers from academia and industry around the world in the areas of networking and security to form the...
The First ICST International Workshop on Security in Emerging Wireless Commu- cation and Networking Systems (SEWCN 2009) was held in Athens, Greece, S...
These proceedings contain the papers presented at the Third International ICST C- ference on Autonomic Computing and Communication Systems, Autonomics 2009, held at the Cyprus University of Technology, Limassol, Cyprus, during September 9-11, 2009. As for the previous editions of the conference, this year too the primary goal of the event was to allow people working in the areas of communication, design, progr- ming, use and fundamental limits of autonomics pervasive systems to meet and - change their ideas and experiences in the aforementioned issues. In maintaining the tradition of...
These proceedings contain the papers presented at the Third International ICST C- ference on Autonomic Computing and Communication Systems, Autonomics...
The First International ICST Conference on Communications Infrastructure, Systems and Applications in Europe (EuropeComm 2009) was held August 11-13, 2009, in London. EuropeComm 2009 brought together decision makers from the EU comm- sion, top researchers and industry executives to discuss the directions of communi- tions research and development in Europe. The event also attracted academia and industry representatives, as well as government officials to discuss the current dev- opments and future trends in technology, applications and services in the communi- tions field. Organizing this...
The First International ICST Conference on Communications Infrastructure, Systems and Applications in Europe (EuropeComm 2009) was held August 11-13, ...
We welcome you to the First International Conference on Arts and Technology (ArtsIT 2009), hosted by CSIE of the National Ilan University and co-organized by the National Science Council, ICST, College of EECS at National Ilan University, Software Simulation Society in Taiwan, ISAC, TCA, NCHC, CREATE-NET, and Institute for Information Industry. ArtsIT2009 was held in Yilan, Taiwan, during September 24-25, 2009. The conference comprised the following themes: - New Media Technologies (Evolutionary systems that create arts or display art works, such as tracking sensors, wearable computers, mixed...
We welcome you to the First International Conference on Arts and Technology (ArtsIT 2009), hosted by CSIE of the National Ilan University and co-organ...
Ad hoc networks refer to the wireless networking paradigm that covers a variety of network forms for specific purposes, such as mobile ad hoc networks, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks. The various forms of ad hoc networks promise a broad scope of applications in civilian, commercial, and military areas, which have led to significant new research problems and challenges, and have attracted great efforts from academia, industry, and government. This unique networking paradigm neces- tates re-examination of...
Ad hoc networks refer to the wireless networking paradigm that covers a variety of network forms for specific purposes, such as mobile ad hoc networks...
With the rapid growth of the Internet as well as the increasing demand for broadband services, access networks have been receiving growing investments in recent years. This has led to a massive network deployment with the goal of eliminating the ba- width bottleneck between end-users and the network core. Today many diverse te- nologies are being used to provide broadband access to end users. The architecture and performance of the access segment (local loop, wired and wireless access n- works, and even home networks) are getting increasing attention for ensuring quality of service of diverse...
With the rapid growth of the Internet as well as the increasing demand for broadband services, access networks have been receiving growing investments...