This book constitutes the refereed proceedings of the 11th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2020, held in Boston, MA, in October 2020. Due to COVID-19 pandemic the conference was held virtually. The 11 reviewed full papers and 4 short papers were selected from 35 submissions and are grouped in topical sections on digital forensics; cyber-physical system Forensics; event reconstruction in digital forensics; emerging topics in forensics; cybersecurity and digital forensics.
This book constitutes the refereed proceedings of the 11th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2020, held in Boston, MA, in October 2020. Due to COVID-19 pandemic the conference was held virtually.
The 11 reviewed full papers and 4 short papers were selected from 35 submissions and are grouped in topical sections on digital forensics; cyber-physical system Forensics; event reconstruction in digital forensics; emerging topics in forensics; cybersecurity and digital forensics.
Produktdetails
Produktdetails
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
On Reliability of JA3 Hashes for Fingerprinting Mobile Applications.- Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations.- Evidence gathering in IoT criminal investigation Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor.- A Partial Approach to Intrusion Detection.- Efficient Fingerprint Matching for Forensic Event Reconstruction.- Modelling GOP structure effects on ENF-based video forensics.- Android Dumpsys Analysis to Indicate Driver Distraction.- Adapting to local conditions: Similarities and differences in anonymous online market between Chinese and English Speaking Communities.- Remote air-gap Live forensics.- A Digital Forensic Approach for Optimizing the Investigation of Hit-And-Run Accidents.- .- An Intelligence Criminal Tracker for Industrial Espionage: Applying Digital Data Acquired Onsite to Target Criminals.- Retracing the Flow of the Stream: Investigating Kodi Streaming Services.- Cybersecurity Methodology for Specialized Behavior Analysis.- Neural Representation Learning Based Binary Code Authorship Attribution.
On Reliability of JA3 Hashes for Fingerprinting Mobile Applications.- Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations.- Evidence gathering in IoT criminal investigation Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor.- A Partial Approach to Intrusion Detection.- Efficient Fingerprint Matching for Forensic Event Reconstruction.- Modelling GOP structure effects on ENF-based video forensics.- Android Dumpsys Analysis to Indicate Driver Distraction.- Adapting to local conditions: Similarities and differences in anonymous online market between Chinese and English Speaking Communities.- Remote air-gap Live forensics.- A Digital Forensic Approach for Optimizing the Investigation of Hit-And-Run Accidents.- .- An Intelligence Criminal Tracker for Industrial Espionage: Applying Digital Data Acquired Onsite to Target Criminals.- Retracing the Flow of the Stream: Investigating Kodi Streaming Services.- Cybersecurity Methodology for Specialized Behavior Analysis.- Neural Representation Learning Based Binary Code Authorship Attribution.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497