Day one:
- Andrew Rennison, 'Forensic science quality standards: the past, present and future (focusing on computer forensics)' [keynote presentation].
- Jassem I Al Mansoori, Graham Benmore, Margaret Ross, 'Combating cyber crime in the UAE'.
- Man Qi, Yongquan Wang, 'Protecting intellectual property and computer software: legislation in China'.
- Peter Komisarczuk, 'Honeyclients for teaching in cybercrime and forensics'.
- Richard E. Overill, Jantje A. M. Silomon, 'Digital meta-forensics: quantifying the investigation'.
- Ellen Moar, Andrew Wakelin, 'An investigation into forensic analysis of deniably encrypted drives'.
- David Bennett, 'Assessing cryptology'.
- Bill Buchanan, Richard MacFarlane, Robert Ludwiniak, 'Student perception of on-line lectures within a blended learning environment for security and digital forensics'.
- Denis Edgar-Nevill, 'Cybercrime vs cyber-war'.
- Yasantha N. Hettiarachchi, et al, 'A low cost forensic tool for analyzing huge data sets in digital investigations'.
- Righard J. Zwienenberg, 'The exploit, the exploiter, the exploited...'
- Christopher Hargreaves, Howard Chivers, 'A virtualisation based forensic computing research tool'.
- Ron Tasker, 'The advantages and risks of live data collection'.
- Michael Jones, Alexandra Otto, 'Integrating digital forensics in a crime scene investigation exercise'.
- Lynne Norrie-Jones, 'Using biometric access control for forensic identification: benefit or bind?'
- Nasser S. Abouzakhar, Praneeth Enjamuri, 'An enhanced Eigenfaces-based biometric forensic model'.
- Ian Kennedy, 'Towards scientific malware analysis'.
- David Harley, 'Antivirus testing and AMTSO: has anything changed?'
- Cameron J. Shahab, 'Traffic analysis, anonymity, freedom and digital "cat and mouse" in cyberspace: a case study of China vs Iran'.
- Abhaya Induruwa, 'Constantly evolving technological challenges in cybercrime forensic investigation'.
- Peter Wood, 'Think like a hacker – an ethical hacker's view of corporate security' [keynote presentation].
Day two:
- Alastair Irons, 'The relationship between digital investigations and reduction in cybercrime'.
- Andrew Hawkins, Denis Edgar-Nevill, 'Detection of information compromise committed by malicious insiders'.
- Sarah Morris, Howard Chivers, 'A comparative study of the structure and behaviour of the operating system thumbnail caches used in Kubuntu and Ubuntu (9.10 and 10.04)'.
- Fahad Mir, Dimitris Tsaptsinos, 'Developing a GUI interface to the MS log parser'.
- Robet Dube, 'Open delegates discussion: cybercrime, digital forensics and the "cloud" (ethics, professional and legal issues)'.
- David Harley, 'SODDImy and the trojan defence'.
- Steve Edwards, 'ACPO good practice guide for digital evidence (ver 5)' [keynote presentation].
- Clare Bracey, Denis Edgar-Nevill, 'Support for paedophile image viewers'.
- Kate Andrade, Reza Mousoli, 'Social networking sites, privacy and personal digital security: a case study of Facebook and Bebo'.
- Michael Jones, 'A digital forensics case generator'.
- Georgios Chlapoutakis, et al, 'Using PFSense and commidity hardware as a medium interaction honey-net'.
- Nasser S. Abouzakhar, Abu Bakar, 'A chi-square testing-based intrusion detection model'.
- Man Qi, 'Machine learning based spam filtering: advantages and challenges'.
- Xuan Huang, 'A model to support the authentication of mobile transaction'.
- Karl Obayi, 'Problems with prosecuting computer crimes'.
- Paul Douglas, Colin Myers, 'Criteria for successful MSc research projects in computer forensics'.
- Harjinder Singh Lallie, 'The use of digital forensic case studies for teaching and assessment'.
- Bill Buchanan, et al, 'Engaging students into digital forensics and cybercrime with challenging, ever-changing and stimulating environments'.
- Stilianos Vidalis, Eric Llewellyn, Olga Angelopoulou, 'Educating digital forensic investigators at Newport'.
Download abstracts for CFET 2010