Title :
Proceedings of the 2012 Third Cybercrime and Trustworthy Computing Workshop (CTC 2012)
Abstract :
The following topics are dealt with: trustworthy computing; data security protection mechanism; IRC messages; Skype forensics; forensic authorship analysis; malicious code detection; malware expert; prudent fraud detection; sexually explicit language neutralising strategies; and information flow security.
Keywords :
security of data; trusted computing; IRC messages; Skype forensics; data security protection mechanism; forensic authorship analysis; information flow security; malicious code detection; malware expert; prudent fraud detection; sexually explicit language neutralising strategies; trustworthy computing;
Conference_Titel :
Cybercrime and Trustworthy Computing Workshop (CTC), 2012 Third
Conference_Location :
Ballarat, VIC
Print_ISBN :
978-1-4673-6460-7