Atjaunināt sīkdatņu piekrišanu

E-grāmata: Digital Forensics and Cyber Crime: 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II

  • Formāts - EPUB+DRM
  • Cena: 77,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.

The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:

Volume I:

Crime profile analysis and Fact checking, Information hiding and Machine learning.

Volume II: 

Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
Password, Authentication and Cryptography.- A Quantum Physics approach
for enabling Informationtheoretic Secure Communication Channels.- Learning
framework for guessing alphanumeric passwords on mobile phones based on user
context and fragment semantics.- Password Managers and Vault Application
Security and Forensics: Research Challenges and Future
Opportunities.- Lattice-based Secret Sharing Scheme (Chinese
Remainder Theorem).- A PUF based Audio Fingerprint Based for
Device Authentication and Tamper Location.- SHIELD: a Specialized Dataset for
Hybrid Blind Forensics of World Leaders.- Vulnerabilities.- Optir-SBERT:
Cross-architecture binary code similarity detection based on optimized LLVM
IR.- SdShield: Effectively Ensuring Heap Security via Shadow Page
Table.- Unraveling Network-based Pivoting Maneuvers: Empirical Insights and
Challenges.- XSS vulnerability test enhancement for Progressive Web
Applications.- Detection of Targeted Attacks using
Medium-Interaction Honeypot for Unmanned Aerial Vehicle.- Power Analysis
Attack Based on BS-XGboost Scheme.- Security Analysis of Google
Authenticator, Microsoft Authenticator, and Authy.- Cybersecurity and
forensics.- APTBert: Abstract Generation and Event Extraction from APT
Reports.- Assessing the Effectiveness of Deception-Based Cyber Defense with
CyberBattleSim.- DynVMDroid: Android App Protection via Code Disorder and
Dynamic Recovery.- Improvement of An Identity-Based Aggregate
Signature Protocol From Lattice.- A Measurement Study on Interprocess Code
Propagation of Malicious Software.- An Android Malware Detection Method Based
on Optimized Feature Extraction Using Graph Convolutional Network.- ForensiQ:
A Knowledge Graph Question Answering System for IoT Forensics.- Ive Got You,
Under MySkin: Biohacking Augmentation Implant Forensics.- Quantum Computing
Challenges and Impact on Cyber Security.