Atjaunināt sīkdatņu piekrišanu

Digital Forensics and Cyber Crime: 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings 1st ed. 2023 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
Citas grāmatas par šo tēmu:
This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022.

The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.
Image Forensics.- Image-to-Image Translation Generative Adversarial
Networks for Video Source Camera Falsification.- Towards efficient on-site
CSAM triage by clustering images from a source point of view.- Can Image
Watermarking Efficiently Protect DeepLearning-Based Image Classifiers? A
Preliminary Security Analysis of an IP-Protecting Method.- Forensics
Analysis.- Digital Forensics Tool Evaluation on Deleted Files.- Forensic
Analysis of Webex on the iOS Platform.- Watch Your WeChat Wallet: Digital
Forensics Approach on WeChat Payments on Android.- Crypto Wallet Artifact
Detection on Android Devices using Advanced Machine Learning Techniques.-
SPREAD SPECTRUM ANALYSIS.- CSCD: A Cyber Security Community Detection Scheme
on Online Social Networks.- Shedding Light on Monopoly: Temporal Analysis of
Drug Trades.- Extracting Spread-Spectrum Hidden Data Based on Better Lattice
Decoding.- TRAFFIC ANALYSIS AND MONITORING.- MQTT Traffic Collection and
ForensicAnalysis Framework.- IoT Malicious Traffic Detection Based on FSKDE
and Federated DIOT-Pysyft.- Crime and Incident Watch for Smart Cities: A
Sensor-Based Approach.- Malware Analysis.- The Lightweight Botnet Detection
Model Based on the Improved UNet.- On the application of active learning to
handle data evolution in Android malware detection.- Volatility Custom
Profiling for Automated Hybrid ELF Malware Detection.- Security Risk
Management.- The Need for Biometric Anti-Spoofing Policies: The Case of
Etsy.- VPnet: A Vulnerability Prioritization Approach Using Pointer Network
and Deep Reinforcement Learning.- Are External Auditors Capable of Dealing
with Cybersecurity Risks?.- Deep Learning-based Detection of Cyberattacks
in Software-Defined Networks.- Deep Learning Based Network Intrusion
Detection System for Resource-Constrained Environments.- Poisoning-Attack
Detection using an Auto-Encoder for Deep Learning Models.- PRIVACY AND
SECURITY.- Attribute-based Proxy Re-encryption with Privacy Protection for
Message Dissemination in VANET.- PBPAFL: A Federated Learning Framework with
Hybrid Privacy Protection for Sensitive Data.- Cyber Crime undermines Data
Privacy efforts On the Balance between Data Privacy and
Security.- Automating the Flow of Data Between Digital Forensic Tools using
Apache NiFi.- Android Mobile Terminal Security Assessment Based on Analytical
Hierarchy Process (AHP).- A General Steganalysis Method of QR Codes.