Accepted authors and papers:
- Radek Hranicky, Martin Holkovic, Petr Matousek and Ondrej Rysavy. On Efficiency of Distributed Password Recovery
- Doowon Jeong, Frank Breitinger, Hari Kang and Sangjin Lee. Towards syntactic approximate matching - A pre-processing experiment
- Hussam Mohammed, Nathan Clarke and Fudong Li. An automated approach for digital forensic analysis of heterogeneous Big Data
- Thibault Julliand, Vincent Nozick and Hugues Talbot. Countering noise-based splicing detection using noise density transfer
- Donghoon Chang, Somitra Sanadhya and Monika Singh. Security Analysis of mvHash-B Similarity Hashing
- Gibin Lee, Joshua I. James and Hyoungjoong Kim. Electronic Voting Service Using Block-chain
- Neil Rowe, Riqui Schwamm, Michael McCarrin and Ralucca Gera. Making Sense of Email Addresses on Drives
- Murat Gunestas and Zeki Bilgin. Log analysis using temporal logic and reconstruction approach: Web server case
- Vikram Harichandran, Frank Breitinger and Ibrahim Baggili. Bytewise Approximate Matching: The Good, The Bad, and The Unknown
- Samer Al-Khateeb, Kevin J Conlan, Nitin Agarwal, Ibrahim Baggili and Frank Breitinger. Exploring Deviant Hacker Networks (DHN) On Social Media Platforms
- Marcus Thompson and Raymond Hansen. Verification of recovered digital evidence on the Amazon Kindle