Swiss Army Knife

 

Education Level: Intermediate

4411 - Applying Graph Theory to Digital Forensics Investigations

Monday, September 25
11:00 AM - 12:00 PM

This talk is the culmination of two years of research on how to use graph theory to model digital crimes/breaches and to gain a clear understanding of the facts in a digital investigation. This methodology allows cybercrime investigators to mathematically model a crime and to then evaluate the elements of that crime. A rudimentary version of this was presented at a 2016 security conference in Dallas and published in last November's Forensic Examiner. The method has been expanded and refined with further research, and the very latest developments in this field will be presented in this talk. This is cutting-edge research in applications of mathematics to digital forensics.

The presentation will enable attendees with even a moderate mathematical background to apply this research to digital investigations.

Learning Objectives:

Chuck Easttom

Computer Scientist
CEC LLC

Chuck Easttom has 25-plus years of computer science experience. He holds two masters degrees and more than 40 industry certifications. He is the author of 21 computer science books and 30 articles. He is also an inventor with nine computer science patents. He is a frequent speaker at computer security conferences all over the world. Additionally, Chuck is an associate member of the American Academy of Forensic Sciences and a frequent expert witness in computer-related cases.

Presentation(s):

Send Email for Chuck Easttom


Assets

4411 - Applying Graph Theory to Digital Forensics Investigations

MP3 Audio Slides Video

Attendees who have favorited this

Please enter your access key

The asset you are trying to access is locked. Please enter your access key to unlock.

Send Email for Applying Graph Theory to Digital Forensics Investigations