Previous CFET Conferences

Cyberforensics is one of the fastest areas of growth within the computing discipline. Falling within the remit of our Centre for Cyberforensics, our well established CFET conference brings together international experts to discuss the many complex issues and challenges concerning cybercrime forensics, education and training. 

Day one:

  • Wiliam N. Crane, 'High tech crime training: a model outline and how it maps to academic programmes'.
  • Richard E. Overill, 'Integration of computer forensics into a forensic science programme'.
  • Paul Stephens, 'Cybercrime training versus computer forensics education'.
  • Alastair Irons, 'Should we be teaching computer ethics to computer forensics students?'
  • WenHao Wang, Kate Dingley, Carl Adams, 'Cybercrime: is computer ethics a weapon for preventing copyright infringement?'
  • Gary C. Kessler, 'Experiences and methodologies teaching hands-on cyberforensics skills online'. 
  • Kasun De zoysa, K.S. Goonatillake, Kenneth M. Thilakarathna, 'Cybercrime forensics experiences in a developing country'. 
  • Denis Edgar-Nevill, 'Research informed cybercrime education'. 
  • Righard Zwienenberg, 'Analysis of and extraction of forensic material from malicious code'.
  • David Bennet, Dave Lewis, 'Alice studies computing, bob takes computer forensics: a comparison of the pedagogy of cryptology education in two groups'.

Day two:

  • Adam Laurie, 'RFIDIOts!!! – practical RFID hacking (without soldering irons or patent attorneys)'.
  • Clare Bracey, 'Prosecuting low-level cybercrime in the UK'.
  • Bernd Carsten Stahl, 'A critical (legal) view of forensic computing'.
  • Liz Faulkner, Richard Henson, 'Investigating the use of and the impact of mobile technology in gathering and manipulating data and digital images in tackling fly-tipping in the Medway towns'.
  • Man Qi, Denis Edgar-Nevill, 'Footprints of cyber criminals'.
  • Manolya Kavakli, 'Virtual reality and interactive training for airport security'.
  • Reza Mousoli, 'Human trust and e-trust'.
  • Abhaya Induruwa, 'Managing the pedagogy of cybercrime forensics study at post graduate level: challenges and opportunities'.

Download abstracts for CFET 2007

Day one:

  • Nigel Jones, [keynote presentation].
  • Margaret Ross, Geoff Staples, Mark Udall, 'Cybercrime – awareness is protection'.
  • Gary C. Kessler, 'Extending the multidisciplinary learning experience in digital forensics using mock trials'.
  • Lynne Norris-Jones, 'An investigation into the social, legal and ethical issues associated with biometrics in the UK (practical application to computing programmes)'.
  • Paula Thomas, Christy Petersen, 'An investigation into the vulnerabilities of computer forensic processes as shown through an anti forensics tool'. 
  • Stuart Gibson, Christopher Solomon, Clifford Clark, 'New methodology in facial composite construction and the associated implications for facial ID training'.
  • Dave Childs, Paul Stephens, 'An analysis of the accuracy and usefulness of Vinetto, pasco and Mork.pl'.
  • Stephen Mason, [keynote presentation].
  • Rein Oja, Alan Davidson, 'A Swedish IT forensics course – expert opinions'.
  • Richard E. Overill, 'Development of a masters module in computer forensics and cybercrime'.
  • Iwan Kartiko, Manolya Kavakli, 'Virtual reality police training: how much visual information is too much?'
  • Kweku Oruro Koranteng, 'Cyber fraud in Ghana locally known in the Hausa language as 'sakawa': an ethnographic study of a popular slum community in Ghana-Nima'.
  • Kasun De Zoysa, Keerthi Goonathillake, Ravith Botejue, 'Developing a digital forensic framework for a third world country'. 
  • Paul Stephens, Gerald Stock, 'What can a computer forensics examiner learn from an ethical hacker?'
  • Denis Edgar-Nevill, 'Building the infrastructure to support HE computer forensics'.
  • Hamid Jahankhani, Amie Taal, Ian Mitchell, 'The importance of funding and training to manage and investigate computer crime'.
  • Man Qi, Yongquan Wang, Rongsheng Xu, 'Cybercrime legislations in China'.

Day two:

  • Edward P. Gibson, 'Computing "environment": it's more than binary code – it's about criminals!' [keynote presentation].
  • Abhaya Induruwa, 'Mobile phone forensic investigation: technical and legal challenges'. 
  • David Collins, 'XFT – a forensic toolkit for the original xbox game console'.
  • Zhijun Liu, et al, 'Digital evidence analysis in China'. 
  • David Bennett, Paul Stephens, 'Is property theft in crime investigation? Using OSS in cybercrime education'. 
  • Mick O'Brien, George R.S. Weir, 'Understanding digital certificates'.
  • Man Qi, Reza Mousoli, Denis Edgar-Nevill, 'The social effects of spam'. 
  • Righard Zwienenberg, 'Virtual environments have a prominent role in securing your organisation: case study on a DDoS attack'. 
  • F.W.J. van Geelkerken, 'Egregious use of Tor servers? Data retention, anonymity, and privacy on-line'.
  • Reza Mousoli, 'Comparison of Drupal and Joomla security functions for designing secure content management system'. 
  • Jun Zhang, Lina Wang, 'Case-oriented evidence mining in forensic computing: a case study'.
  • Zeming Yang, Rongsheng Xu, Man Qi, 'Intrusion forensics'. 
  • Rhongsheng Xu, 'Digital forensics research in China' [keynote presentation].

Download abstracts for CFET 2008

Day one:

  • Alastair Irons, David Sanders, 'Psychology of cybercrime'.
  • James Nicholl, Denis Edgar-Nevill, 'Weaknesses and possibilities to improve the copine scale'.
  • Margaret Ross, Geoff Staples, Mark Udall, 'Social networking and cybercrime'.
  • David Harley, 'The game of the name: malware naming and sympathetic magic'.
  • Gary Kessler, Denis Edgar-Nevill, 'Cybercrime forensics: two views from either side of the pond'.
  • Phil Beckett, 'Tracking the evolution of the IP thief'.
  • C. Chibelushi, T. Proctor, 'System management problems: an advantage to malware developers'. 
  • Robet Dube, 'How ethical are computer forensics?'
  • Sheona Anne Hollachan, 'The ethics of computer forensics'.
  • Maurice Calvert, 'A mock trial for computer forensics students'.
  • Geraint Williams, Carsten Maple, 'Development of a facility to aid the teaching of computer security and digital forensics at the University of Bedfordshire'.
  • Steve Marsh, Lynne Norris-Jones, 'Is finger vein authentication a preferred alternative to fingerprint scanning?'
  • Nasser S. Abouzakhar, Muhammed Bello Abdulazeez, 'A fingerprint matching model using unsupervised learning approach'.
  • Lawrence Munro, Dimitris Tsaptsinos, 'Experiences of using honeypots as a final year project'.
  • Man Qi, Reza Mousoli, 'Phishing and e-trust'.
  • Paul Owen, Paula Thomas, 'Analysis of the methodology used in digital forensic examinations – mobile devices vs. computer hard disk'.
  • Jonathan Crellin, Sevasti Karatzouni, 'Simulation in digital forensic education'.
  • Man Qi, Denis Edgar-Nevill, 'Lessons learned from Beijing for the London 2012 Olympics'.

Day two:

  • Yasantha N. Hettiarachchi, T.N.K. De Zoysa, Keerthi Goonethilake, 'FIT4D: a forensic investigation toolkit for a developing country'.
  • Paul Stephens, 'Teaching European law enforcement forensic scripting using Bash'.
  • Qin Zhou, Nigel Poole, 'Masterkey Linux for cybercrime forensics education and training'.
  • Abhaya Induruwa, Sarah Induruwa Fernando, 'Grid computing for fighting cybercrime'.
  • Austen Rainer, Peter Lane, James Malcolm, 'A fast copy detection tool for forensic analysis'.
  • Stephen McCombie, Paul Watters, 'Survey of Eastern European organised cybercrime'. 
  • Jens Kirschner, 'Closing the gap for open source image handling: acquisition, verification and loop-mount of e01-type images on Linux systems: converting e01 or dd images into bootable virtual machines'.
  • Milton Luoma, Vicki Luoma, 'Qualcomm vs. Broadcom: illustrating the need for a computer forensic expert'.
  • Kweku Oduro Koranteng, 'Cyber fraud in Ghana locally known in the Hausa language as 'sakawa': an ethnographic study of a popular slum community in Ghana-Nima'.

Download abstracts for CFET 2009

Day one:

  • Andrew Rennison, 'Forensic science quality standards: the past, present and future (focusing on computer forensics)' [keynote presentation].
  • Jassem I Al Mansoori, Graham Benmore, Margaret Ross, 'Combating cyber crime in the UAE'.
  • Man Qi, Yongquan Wang, 'Protecting intellectual property and computer software: legislation in China'.
  • Peter Komisarczuk, 'Honeyclients for teaching in cybercrime and forensics'.
  • Richard E. Overill, Jantje A. M. Silomon, 'Digital meta-forensics: quantifying the investigation'.
  • Ellen Moar, Andrew Wakelin, 'An investigation into forensic analysis of deniably encrypted drives'.
  • David Bennett, 'Assessing cryptology'.
  • Bill Buchanan, Richard MacFarlane, Robert Ludwiniak, 'Student perception of on-line lectures within a blended learning environment for security and digital forensics'.
  • Denis Edgar-Nevill, 'Cybercrime vs cyber-war'.
  • Yasantha N. Hettiarachchi, et al, 'A low cost forensic tool for analyzing huge data sets in digital investigations'.
  • Righard J. Zwienenberg, 'The exploit, the exploiter, the exploited...'
  • Christopher Hargreaves, Howard Chivers, 'A virtualisation based forensic computing research tool'.
  • Ron Tasker, 'The advantages and risks of live data collection'.
  • Michael Jones, Alexandra Otto, 'Integrating digital forensics in a crime scene investigation exercise'.
  • Lynne Norrie-Jones, 'Using biometric access control for forensic identification: benefit or bind?'
  • Nasser S. Abouzakhar, Praneeth Enjamuri, 'An enhanced Eigenfaces-based biometric forensic model'.
  • Ian Kennedy, 'Towards scientific malware analysis'.
  • David Harley, 'Antivirus testing and AMTSO: has anything changed?'
  • Cameron J. Shahab, 'Traffic analysis, anonymity, freedom and digital "cat and mouse" in cyberspace: a case study of China vs Iran'.
  • Abhaya Induruwa, 'Constantly evolving technological challenges in cybercrime forensic investigation'. 
  • Peter Wood, 'Think like a hacker – an ethical hacker's view of corporate security' [keynote presentation].

Day two:

  • Alastair Irons, 'The relationship between digital investigations and reduction in cybercrime'.
  • Andrew Hawkins, Denis Edgar-Nevill, 'Detection of information compromise committed by malicious insiders'.
  • Sarah Morris, Howard Chivers, 'A comparative study of the structure and behaviour of the operating system thumbnail caches used in Kubuntu and Ubuntu (9.10 and 10.04)'.
  • Fahad Mir, Dimitris Tsaptsinos, 'Developing a GUI interface to the MS log parser'.
  • Robet Dube, 'Open delegates discussion: cybercrime, digital forensics and the "cloud" (ethics, professional and legal issues)'.
  • David Harley, 'SODDImy and the trojan defence'.
  • Steve Edwards, 'ACPO good practice guide for digital evidence (ver 5)' [keynote presentation].
  • Clare Bracey, Denis Edgar-Nevill, 'Support for paedophile image viewers'.
  • Kate Andrade, Reza Mousoli, 'Social networking sites, privacy and personal digital security: a case study of Facebook and Bebo'.
  • Michael Jones, 'A digital forensics case generator'.
  • Georgios Chlapoutakis, et al, 'Using PFSense and commidity hardware as a medium interaction honey-net'.
  • Nasser S. Abouzakhar, Abu Bakar, 'A chi-square testing-based intrusion detection model'.
  • Man Qi, 'Machine learning based spam filtering: advantages and challenges'.
  • Xuan Huang, 'A model to support the authentication of mobile transaction'.
  • Karl Obayi, 'Problems with prosecuting computer crimes'.
  • Paul Douglas, Colin Myers, 'Criteria for successful MSc research projects in computer forensics'.
  • Harjinder Singh Lallie, 'The use of digital forensic case studies for teaching and assessment'.
  • Bill Buchanan, et al, 'Engaging students into digital forensics and cybercrime with challenging, ever-changing and stimulating environments'.
  • Stilianos Vidalis, Eric Llewellyn, Olga Angelopoulou, 'Educating digital forensic investigators at Newport'.

Download abstracts for CFET 2010

Day one:

  • Ian Sadler, 'Global coordination and the fight against cybercrime' [keynote presentation].
  • Clive Blackwell, 'Formally modelling attack patterns for forensic analysis'.
  • David Harley, Julia Canto, 'Man, myth, malware and multiscanning'.
  • Jonathan Patterson, Christopher Hargreaves, 'Automated identification and reconstruction of YouTube video access'.
  • Jasem Al Mansoori, Margaret Ross, Graham Benmore, 'Awareness and training as the key to combating cyber-crime by the UAE police forces'.
  • Sarah Morris, Howard Chivers, 'Forming a relationship between artefacts identified in thumbnail caches and the remaining data on a storage device'.
  • Paul Stephens, Alastair Irons, 'The challenges of live data forensics'.
  • Clive Blackwell, 'A network blackbox with plunk for forensic analysis'.
  • Waleed Halboob, Muhammad Abulaish, Khaled S. Alghathbar, 'Multi-levels privacy-preserving computer forensics investigation'.
  • Pavel Gladyshev, 'Cyberforensics and international police collaboration: trends and challenges' [keynote presentation].

Day two:

  • Hemamali Tennakoon, 'Cyber-terrorism: a new reign of terror'.
  • Denis Edgar-Nevill, 'Cyberwar'.
  • Neil Fowler Wright, 'DNS in computer forensics'.
  • Ed Day, 'Grid computing for large-scale mobile phone analysis'.
  • Righard J. Zwienenberg, 'The exploit, the exploiter, the exploited...'
  • Bill Buchannan, 'Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security' [keynote presentation].
  • Robet Dube, 'Cybercrime on VLEs visa vee the social networking and single-sign-on insecurities'.
  • Man Qi, 'Cyber safety in schools: issues and countermeasures'.
  • David Harley, 'The virtual tsunami: global disasters and security disasters'.
  • Susan Welford, Stuart Gibson, Andrew Payne, 'Digital image analysis for evidence: a MATLAB toolbox'.
  • Richard E. Overill, Jantje A. M. Silomon, 'Digital cosmo-forensics: the final frontier?'
  • Nigel Jones, [keynote presentation].

Download abstracts for CFET 2011

Day one:

  • Theo Derksen, Alwin Hilbrink, 'Training at the Dutch Police Academy and digital forensic training programme: new developments and involvement in ISEC and ECTEG' [keynote presentation].
  • Chris Hargreaves, 'Cross-drive analysis using automated digital forensic timelines'.
  • Susan Welford, Stuart Gibson, 'Do state-of-the-art forensic image processing techniques address the problem of poliing photographic data in the current file sharing culture?'
  • David Harley, Steve Burn, 'FUD and Blunder: tracking PC support scams'.
  • Righard J. Zwienenberg, 'BYOD: (B)rought (Y)our (O)wn (D)estruction?'
  • Mikael Lindstrom, 'The European Cybercrime Centre (EC3)' [keynote presentation].
  • George R. S. Weir, 'Textual analysis as a digital forensic tool'.
  • R. I. Ferguson, P. Leimich, R. Bagley, 'On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space'.
  • Denis Edgar-Nevill, 'ECENTRE – England's cybercrime centre of excellence network for training, research and education' [BCS AGM presentation].

Day two:

  • Tuan Phan Vuong, Diane Gan, 'A targeted malicious email (TME) attack tool'.
  • Anne David, 'An analysis of Hotmail artefacts in Firefox 9'.
  • Sarah Morris, 'Virtual crime: forensic artefacts from Second Life'.
  • Christie Oso, Diane Gan, 'A forensics approach to digital fingerprinting on Windows servers'.
  • Peter Salter, 'Making digital forensics work within the modern policing environment' [keynote presentation].
  • D Chadwick, et al, 'Intensive teaching of cyber security for mid-career physical security professionals with limited academic backgrounds'.
  • Georgios Chlapoutakis, 'From criminal to digital criminal profiling: advances in criminal profiling in the digital age'.
  • Peter Forster, 'The utilisation of the unified modelling language in digital forensic science'.
  • Abhaya Induruwa, Nathan Attoe, 'VoIP forensics'.
  • Clive Blackwell, 'towards a science of digital forensics'.
  • Harjinder Singh Lallie, 'A simple enterprise security architecture (SESA): towards a pedagogic architecture for teaching cyber security'.
  • Hemamali Tennakoon, 'A comprehensive methodology for profiling cyber-criminals'.
  • Gordon Russell, Robert Ludwiniak, 'A forensic image description language for generating test images'.
  • Man Qi, 'Social media in law enforcement: the role and issues'.
  • Nigel Jones, [keynote presentation].

Download abstracts for CFET 2012

 

Day one:

  • Michael Palmer, 'European Commission support for cybercrime forensics education and training' [keynote presentation].
  • Caitlin Toner, George R. S. Weir, 'Understanding the risks and benefits of Bring Your Own Device (BYOD)'.
  • Colin Beeke, Peter Komisarczuk, 'An initial study into BYOD, cloud and insider threats'.
  • Madeline Cheah, Lauchlan Wyndham-Birch, Robert Bird, 'What artefacts of evidentary value can be found when investigating multi-user virtual environments?'
  • Adrian Winkles, Mark Graham, Andrew Moore, 'Techniques for the detection and monitoring of malware behaviour within virtual cloud environments'.
  • Zareefa S Mustafa, Philip Nobles, 'A testbed for cloud based forensic investigation'.
  • Adrian Winkles, Andrew Moore, 'The all round cyber crime and security professional – circular teaching for the professional and the technical – experiences from the witness box'.
  • Fergus Toolan, et al, 'Deepthought: initial validation of a preliminary analysis forensic tool'.
  • Calum Findlay, Petra Leimich, 'An assessment of data leakage in Firefox under different conditions'.
  • Robert Bird, Madeline Cheah, 'Undertaking and activity led learning appraoch in the developmetn of an appropriate pedagogy in the field of digital forensics'.
  • Sarah Morris, 'Continued development of a Masters module on "forensic computing using Linux"'.
  • Man Qi, 'Employing neural networks for DDoS detection'.
  • Mark Graham, Adrian Winkles, 'An analysis of pre-infection detection techniques for Botnets and other malware'.
  • Righard Zwienenberg, Bruce Burrell, 'PUA – Potentially Unwanted Advice'.
  • Denis Edgar-Nevill, 'Education in the impossible fight against cybercrime'.

Day two:

  • Ed Day, 'Techniques available for pattern matchin in mobile phone forensics'.
  • Abhaya Induruwa, 'What do smart phones reveal about their owners' social identity?'
  • Righard J. Zwienenberg, 'The social media connection'.
  • Lily Rose Jenkins, Diane Gan, 'An investigation into privacy and identity theft using social media'.
  • Ray Genoe, Fergus Toolan, 'Programming for investigators: from zero to hero in four days'.
  • Harjinder Singh Lallie, Isabel Oritsematosan Otubu,Roma Manoj Gandhi, 'The efficacy of the Enron dataset for digital investigation training and education'. 
  • S. Comer, P. Leimich, 'A comparison of geo-tagging in mobile internet browsing applications on iOS and Android'.
  • Razvan-Ioan Dinita, et al, 'Use of Netflow/IPFix Botnet detection tools to determine placement for autonomous VMs'.
  • Robert Burls, Philip Nobles, 'Analysis of Feodo malware: a complimentary approach'.
  • Pulkit Vohra, Roma Gandhi, Harjinder Singh Lallie, 'The cyber security CSI effect in Bollywood'.
  • Charles Frewin, Sarah Morris, 'Forensic implications of portable operating systems'.
  • Jassem I Al Mansoori, Graham Benmore, Margaret Ross, 'A strategic human resource management model to develop a high performance work system for cyber crimes investigators within UAE police forces'. 
  • David Harley, 'Education and privacy: PIN and passphrase selection strategies'.
  • Nigel Jones, 'The legacy of 2Centre' [keynote presentation].

Download abstracts for CFET 2014

 

 

Connect with us

Last edited: 21/02/2020 10:44:00