Atjaunināt sīkdatņu piekrišanu

E-grāmata: Digital Forensics and Cyber Crime: 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts - EPUB+DRM
  • Cena: 94,58 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022.

The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.
Image Forensics.- Image-to-Image Translation Generative Adversarial
Networks for Video Source Camera Falsification.- Towards efficient on-site
CSAM triage by clustering images from a source point of view.- Can Image
Watermarking Efficiently Protect DeepLearning-Based Image Classifiers? A
Preliminary Security Analysis of an IP-Protecting Method.- Forensics
Analysis.- Digital Forensics Tool Evaluation on Deleted Files.- Forensic
Analysis of Webex on the iOS Platform.- Watch Your WeChat Wallet: Digital
Forensics Approach on WeChat Payments on Android.- Crypto Wallet Artifact
Detection on Android Devices using Advanced Machine Learning Techniques.-
SPREAD SPECTRUM ANALYSIS.- CSCD: A Cyber Security Community Detection Scheme
on Online Social Networks.- Shedding Light on Monopoly: Temporal Analysis of
Drug Trades.- Extracting Spread-Spectrum Hidden Data Based on Better Lattice
Decoding.- TRAFFIC ANALYSIS AND MONITORING.- MQTT Traffic Collection and
ForensicAnalysis Framework.- IoT Malicious Traffic Detection Based on FSKDE
and Federated DIOT-Pysyft.- Crime and Incident Watch for Smart Cities: A
Sensor-Based Approach.- Malware Analysis.- The Lightweight Botnet Detection
Model Based on the Improved UNet.- On the application of active learning to
handle data evolution in Android malware detection.- Volatility Custom
Profiling for Automated Hybrid ELF Malware Detection.- Security Risk
Management.- The Need for Biometric Anti-Spoofing Policies: The Case of
Etsy.- VPnet: A Vulnerability Prioritization Approach Using Pointer Network
and Deep Reinforcement Learning.- Are External Auditors Capable of Dealing
with Cybersecurity Risks?.- Deep Learning-based Detection of Cyberattacks
in Software-Defined Networks.- Deep Learning Based Network Intrusion
Detection System for Resource-Constrained Environments.- Poisoning-Attack
Detection using an Auto-Encoder for Deep Learning Models.- PRIVACY AND
SECURITY.- Attribute-based Proxy Re-encryption with Privacy Protection for
Message Dissemination in VANET.- PBPAFL: A Federated Learning Framework with
Hybrid Privacy Protection for Sensitive Data.- Cyber Crime undermines Data
Privacy efforts On the Balance between Data Privacy and
Security.- Automating the Flow of Data Between Digital Forensic Tools using
Apache NiFi.- Android Mobile Terminal Security Assessment Based on Analytical
Hierarchy Process (AHP).- A General Steganalysis Method of QR Codes.