This book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2021, held in Singapore in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation.…mehr
This book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2021, held in Singapore in December 2021. Due to COVID-19 pandemic the conference was held virtually.
The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation.
Produktdetails
Produktdetails
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
Quantifying Paging on Recoverable Data from Windows User-Space Modules.- Forensic Investigations of Google Meet and Microsoft Teams - Two Popular Conferencing Tools in the Pandemic.- On Exploring The Sub-Domain of Artificial Intelligence (AI) Model Forensics.- Auto-Parser: Android Auto & Apple CarPlay Forensics.- Find my IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows.- Accessing secure data on Android through application analysis.- Research On The Method Of Selecting The Optimal Feature Subset In Big Data For Energy Analysis Attack.- Cheating sensitive security quantum bit commitment with security distance function.- Towards Mitigation of Data Exfiltration Techniques using the MITRE ATT&CK Framework.- PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality.- No Pie in The Sky: The Digital Currency Fraud Website Detection.- Understanding the Brains and Brawn of IllicitStreaming App.- Fine-grained Obfuscation Scheme Recognition on Binary Code.- Backdoor Investigation and Incident Response: From Zero to Profit.- Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention.- Lightweight On-demand Honeypot Deployment for Cyber Deception.- Parcae: A Blockchain-Based PRF Service for Everyone.- A Hybrid Cloud Deployment Architecture For Privacypreserving Collaborative Genome-Wide Association Studies.- Understanding the Security of Deepfake Detection.
Quantifying Paging on Recoverable Data from Windows User-Space Modules.- Forensic Investigations of Google Meet and Microsoft Teams - Two Popular Conferencing Tools in the Pandemic.- On Exploring The Sub-Domain of Artificial Intelligence (AI) Model Forensics.- Auto-Parser: Android Auto & Apple CarPlay Forensics.- Find my IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows.- Accessing secure data on Android through application analysis.- Research On The Method Of Selecting The Optimal Feature Subset In Big Data For Energy Analysis Attack.- Cheating sensitive security quantum bit commitment with security distance function.- Towards Mitigation of Data Exfiltration Techniques using the MITRE ATT&CK Framework.- PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality.- No Pie in The Sky: The Digital Currency Fraud Website Detection.- Understanding the Brains and Brawn of IllicitStreaming App.- Fine-grained Obfuscation Scheme Recognition on Binary Code.- Backdoor Investigation and Incident Response: From Zero to Profit.- Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention.- Lightweight On-demand Honeypot Deployment for Cyber Deception.- Parcae: A Blockchain-Based PRF Service for Everyone.- A Hybrid Cloud Deployment Architecture For Privacypreserving Collaborative Genome-Wide Association Studies.- Understanding the Security of Deepfake Detection.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497