Muutke küpsiste eelistusi

E-raamat: Digital Forensics and Cyber Crime: 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II

  • Formaat - EPUB+DRM
  • Hind: 80,26 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.

The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:

Volume I:

Crime profile analysis and Fact checking, Information hiding and Machine learning.

Volume II: 

Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
Password, Authentication and Cryptography.- A Quantum Physics approach
for enabling Informationtheoretic Secure Communication Channels.- Learning
framework for guessing alphanumeric passwords on mobile phones based on user
context and fragment semantics.- Password Managers and Vault Application
Security and Forensics: Research Challenges and Future
Opportunities.- Lattice-based Secret Sharing Scheme (Chinese
Remainder Theorem).- A PUF based Audio Fingerprint Based for
Device Authentication and Tamper Location.- SHIELD: a Specialized Dataset for
Hybrid Blind Forensics of World Leaders.- Vulnerabilities.- Optir-SBERT:
Cross-architecture binary code similarity detection based on optimized LLVM
IR.- SdShield: Effectively Ensuring Heap Security via Shadow Page
Table.- Unraveling Network-based Pivoting Maneuvers: Empirical Insights and
Challenges.- XSS vulnerability test enhancement for Progressive Web
Applications.- Detection of Targeted Attacks using
Medium-Interaction Honeypot for Unmanned Aerial Vehicle.- Power Analysis
Attack Based on BS-XGboost Scheme.- Security Analysis of Google
Authenticator, Microsoft Authenticator, and Authy.- Cybersecurity and
forensics.- APTBert: Abstract Generation and Event Extraction from APT
Reports.- Assessing the Effectiveness of Deception-Based Cyber Defense with
CyberBattleSim.- DynVMDroid: Android App Protection via Code Disorder and
Dynamic Recovery.- Improvement of An Identity-Based Aggregate
Signature Protocol From Lattice.- A Measurement Study on Interprocess Code
Propagation of Malicious Software.- An Android Malware Detection Method Based
on Optimized Feature Extraction Using Graph Convolutional Network.- ForensiQ:
A Knowledge Graph Question Answering System for IoT Forensics.- Ive Got You,
Under MySkin: Biohacking Augmentation Implant Forensics.- Quantum Computing
Challenges and Impact on Cyber Security.