Atjaunināt sīkdatņu piekrišanu

Digital Forensics and Cyber Crime: 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II 2024 ed. [Mīkstie vāki]

  • Mīkstie vāki
  • Cena: 73,68 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 86,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.

The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:

Volume I:

Crime profile analysis and Fact checking, Information hiding and Machine learning.

Volume II: 

Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
Password, Authentication and Cryptography.- A Quantum Physics approach
for enabling Informationtheoretic Secure Communication Channels.- Learning
framework for guessing alphanumeric passwords on mobile phones based on user
context and fragment semantics.- Password Managers and Vault Application
Security and Forensics: Research Challenges and Future
Opportunities.- Lattice-based Secret Sharing Scheme (Chinese
Remainder Theorem).- A PUF based Audio Fingerprint Based for
Device Authentication and Tamper Location.- SHIELD: a Specialized Dataset for
Hybrid Blind Forensics of World Leaders.- Vulnerabilities.- Optir-SBERT:
Cross-architecture binary code similarity detection based on optimized LLVM
IR.- SdShield: Effectively Ensuring Heap Security via Shadow Page
Table.- Unraveling Network-based Pivoting Maneuvers: Empirical Insights and
Challenges.- XSS vulnerability test enhancement for Progressive Web
Applications.- Detection of Targeted Attacks using
Medium-Interaction Honeypot for Unmanned Aerial Vehicle.- Power Analysis
Attack Based on BS-XGboost Scheme.- Security Analysis of Google
Authenticator, Microsoft Authenticator, and Authy.- Cybersecurity and
forensics.- APTBert: Abstract Generation and Event Extraction from APT
Reports.- Assessing the Effectiveness of Deception-Based Cyber Defense with
CyberBattleSim.- DynVMDroid: Android App Protection via Code Disorder and
Dynamic Recovery.- Improvement of An Identity-Based Aggregate
Signature Protocol From Lattice.- A Measurement Study on Interprocess Code
Propagation of Malicious Software.- An Android Malware Detection Method Based
on Optimized Feature Extraction Using Graph Convolutional Network.- ForensiQ:
A Knowledge Graph Question Answering System for IoT Forensics.- Ive Got You,
Under MySkin: Biohacking Augmentation Implant Forensics.- Quantum Computing
Challenges and Impact on Cyber Security.