Muutke küpsiste eelistusi

Digital Forensics and Cyber Crime: 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings 1st ed. 2023 [Pehme köide]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Pehme köide
  • Hind: 95,02 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 111,79 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022.

The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.
Image Forensics.- Image-to-Image Translation Generative Adversarial
Networks for Video Source Camera Falsification.- Towards efficient on-site
CSAM triage by clustering images from a source point of view.- Can Image
Watermarking Efficiently Protect DeepLearning-Based Image Classifiers? A
Preliminary Security Analysis of an IP-Protecting Method.- Forensics
Analysis.- Digital Forensics Tool Evaluation on Deleted Files.- Forensic
Analysis of Webex on the iOS Platform.- Watch Your WeChat Wallet: Digital
Forensics Approach on WeChat Payments on Android.- Crypto Wallet Artifact
Detection on Android Devices using Advanced Machine Learning Techniques.-
SPREAD SPECTRUM ANALYSIS.- CSCD: A Cyber Security Community Detection Scheme
on Online Social Networks.- Shedding Light on Monopoly: Temporal Analysis of
Drug Trades.- Extracting Spread-Spectrum Hidden Data Based on Better Lattice
Decoding.- TRAFFIC ANALYSIS AND MONITORING.- MQTT Traffic Collection and
ForensicAnalysis Framework.- IoT Malicious Traffic Detection Based on FSKDE
and Federated DIOT-Pysyft.- Crime and Incident Watch for Smart Cities: A
Sensor-Based Approach.- Malware Analysis.- The Lightweight Botnet Detection
Model Based on the Improved UNet.- On the application of active learning to
handle data evolution in Android malware detection.- Volatility Custom
Profiling for Automated Hybrid ELF Malware Detection.- Security Risk
Management.- The Need for Biometric Anti-Spoofing Policies: The Case of
Etsy.- VPnet: A Vulnerability Prioritization Approach Using Pointer Network
and Deep Reinforcement Learning.- Are External Auditors Capable of Dealing
with Cybersecurity Risks?.- Deep Learning-based Detection of Cyberattacks
in Software-Defined Networks.- Deep Learning Based Network Intrusion
Detection System for Resource-Constrained Environments.- Poisoning-Attack
Detection using an Auto-Encoder for Deep Learning Models.- PRIVACY AND
SECURITY.- Attribute-based Proxy Re-encryption with Privacy Protection for
Message Dissemination in VANET.- PBPAFL: A Federated Learning Framework with
Hybrid Privacy Protection for Sensitive Data.- Cyber Crime undermines Data
Privacy efforts On the Balance between Data Privacy and
Security.- Automating the Flow of Data Between Digital Forensic Tools using
Apache NiFi.- Android Mobile Terminal Security Assessment Based on Analytical
Hierarchy Process (AHP).- A General Steganalysis Method of QR Codes.