Atjaunināt sīkdatņu piekrišanu

Digital Forensics and Cyber Crime: 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings 1st ed. 2021 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
Citas grāmatas par šo tēmu:
This book constitutes the refereed proceedings of the 11th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2020, held in Boston, MA, in October 2020. Due to COVID-19 pandemic the conference was held virtually.

The 11 reviewed full papers and 4 short papers were selected from 35 submissions and are grouped in topical sections on digital forensics; cyber-physical system Forensics; event reconstruction in digital forensics; emerging topics in forensics; cybersecurity and digital forensics.

On Reliability of JA3 Hashes for Fingerprinting Mobile Applications.- Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations.- Evidence gathering in IoT criminal investigation Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor.- A Partial Approach to Intrusion Detection.- Efficient Fingerprint Matching for Forensic Event Reconstruction.- Modelling GOP structure effects on ENF-based video forensics.- Android Dumpsys Analysis to Indicate Driver Distraction.- Adapting to local conditions: Similarities and differences in anonymous online market between Chinese and English Speaking Communities.- Remote air-gap Live forensics.- A Digital Forensic Approach for Optimizing the Investigation of Hit-And-Run Accidents.- .- An Intelligence Criminal Tracker for Industrial Espionage: Applying Digital Data Acquired Onsite to Target Criminals.- Retracing the Flow of the Stream: Investigating Kodi Streaming Services.- Cybersecurity Methodology for Specialized Behavior Analysis.- Neural Representation Learning Based Binary Code Authorship Attribution.