EUROPE'S LEADING FORENSICS EXHIBITION AND CONFERENCE

DIGITAL FORENSICS | LABORATORY EQUIPMENT | SCENE OF CRIME | FORENSIC ANALYTICS

Seminar Agenda

Seminar Agenda

Loading
09:30
  1. While forensic tools are slowly catching up to support analysis of Apple’s new APFS file system, most are incapable of handling devices with APFS encryption enabled. This talk will give a technical an ...
09:55
  1. WhatsApp is without doubt the most popular messenger in the world with over 1.5 billion users globally. Thus, extracting complete evidence from WhatsApp Messenger is essential for any investigation. I ...
10:20
  1. The Thermal Energy Analyser (TEA) is well-suited to the analysis of trace levels of nitrogen-containing explosives. GC/TEA has been routinely used as a work-horse in forensic laboratories around the w ...
10:45
  1. The popularity of drones or UAVs (unmanned aerial vehicles) has grown substantially over the last few years. Not only are drones used for personal fun, they have been used to deliver packages and even ...
11:10
  1. Police Officers, PCSO's, Press Offices, CID, and Major Investigation Teams all need to review and assess videos and images. They also now need to ensure compliance with the Forensic Science Regulator’ ...
11:35
  1. Efficient, non-contact data capture can be achieved rapidly whilst offering very high accuracies. The demand for both is not mutually exclusive. This, together with proven workflows alongside with tri ...
12:00
  1. Drones have become a major concern for law enforcement agencies around the globe. They have been used to disrupt air travel, transport contraband into prisons, and to launch attacks. In December, dron ...
12:25
  1. Any high fatality event presents extreme challenges for responding Civilian emergency and, Military Services. In the worst case scenario, disaster planning and emergency preparedness requires the prov ...
12:50
  1. • Building your forensic lab • Successful phones unlocking • Software and hardware attacks beyond commercial products • Physical analysis, recovering deleted data • Optimal workflow and using multiple ...
13:15
  1. In this talk, we present an overview of the entire iOS forensic workflow. We'll give recommendations for properly seizing, transporting and storing iOS devices, and discuss approaches, methods and too ...
14:05
  1. The talk proposes a comprehensive approach to the management of corporate IT infrastructures through a forensic readiness plan lowered into Italian reality. Such a proactive approach, also regarding c ...
14:30
  1. Amped Software's flagship product goes from strength to strength, and is now used by many UK forces, and close to 90 other countries worldwide. The power of Amped FIVE does not lie in a single functio ...
14:55
  1. David Toy will introduce the first in a new generation of “Triage First” digital forensics techniques, making use of block level hashing and statistical sampling to find evidence fast.  He will go on ...
15:20
  1. Rapid DNA technology emerged over a decade ago as a way of confirming a suspect’s identity while still in custody. First-generation rapid DNA systems were capable of generating full DNA profiles in un ...
15:45
  1. Cell towers investigation is a perspective that investigators cannot underestimate in this day. Being aware of the implications between the theoretical, namely the approximation of coverage given by t ...
09:55
  1. Between March 2017 and 2018 there were nearly 43,000 recorded incidents of knife and sharp object crime in England and Wales, the highest number of recorded offences since 2011. A staggering 285 peopl ...
10:21
  1. The Challenge of the DigForASP COST Action consists in creating a Network for exploring the potential of the application of Artificial Intelligence and Automated Reasoning in the Digital Forensics fie ...
10:40
  1. This paper summarizes the digital forensic challenges in central non-EU countries, specifically Serbia, Bosnia and Herzegovina, Macedonia, and Montenegro. The data for this presentation was collected ...
11:00
  1. This talk is focused on the development of a mechanism to identify crime hot-spots in Hungary with the help of (Discrete) Bacterial Memetic Algorithm, fuzzy rule based system and wavelet transform, ba ...
11:40
  1. In this talk we summarize the main goals of the work group on prototypes and platforms inside the COST action “DigForASP” mostly focused on the application of Automated Reasoning for Digital Forensics ...
12:00
  1. Dr. John Nolan will be presenting a case for the use of drop science in spectroscopy – more particularly in applications in Forensics and Raman analysis. Notable benefits are: Samples are often very s ...
14:31
  1. It can be reasonable to assume the adoption of Answer Set Programming (ASP) to encode the knowledge about the underlying investigative case: in fact, this knowledge (collected by investigators) can of ...
14:50
  1. Fuzzy sets and fuzzy logic were introduced by Lotfi Zadeh in the sixties, as a mathematic framework for modeling uncertainty, imprecise and incomplete data in information systems. This theory has been ...
15:10
  1. The goal of this talk is to provide an introduction to measures of inconsistency under fuzzy answer set programming. On the one hand, fuzzy answer set programming is a suitable theoretical framework t ...
15:30
  1. Vadalog is a logical language that extends the Datalog reasoning language with various features useful for reasoning over knowledge graph. Vadalog was carefully designed to work even on very large dat ...

Supporting Partners

SUPPORTED BY

 

CONTENT PARTNER