default search action
13th ICDF2C 2022: Boston, MA, USA
- Sanjay Goel, Pavel Gladyshev, Akatyev Nikolay, George Markowsky, Daryl Johnson:
Digital Forensics and Cyber Crime - 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 508, Springer 2023, ISBN 978-3-031-36573-7
Image Forensics
- Maryna Veksler, Clara Caspard, Kemal Akkaya:
Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification. 3-18 - Samantha Klier, Harald Baier:
Towards Efficient On-Site CSAM Triage by Clustering Images from a Source Point of View. 19-33 - Jia-Hui Xie, Di Wu, Bo-Hao Zhang, Hai Su, Huan Yang:
Can Image Watermarking Efficiently Protect Deep-Learning-Based Image Classifiers? - A Preliminary Security Analysis of an IP-Protecting Method. 34-57
Forensic Analysis and Artifact Detection
- Milos Stankovic, Tahir M. Khan:
Digital Forensics Tool Evaluation on Deleted Files. 61-83 - Jiaxuan Zhou, Umit Karabiyik:
Forensic Analysis of Webex on the iOS Platform. 84-96 - Jiaxuan Zhou, Umit Karabiyik:
Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android. 97-110 - Abhishek Bhattarai, Maryna Veksler, Hadi Sahin, Ahmet Kurt, Kemal Akkaya:
Crypto Wallet Artifact Detection on Android Devices Using Advanced Machine Learning Techniques. 111-132
Spread Spectrum Analysis
- Yutong Zeng, Honghao Yu, Tiejun Wu, Yong Chen, Xing Lan, Cheng Huang:
CSCD: A Cyber Security Community Detection Scheme on Online Social Networks. 135-150 - Daniel Dolejska, Vladimír Veselý, Jan Pluskal, Michal Koutenský:
Shedding Light on Monopoly: Temporal Analysis of Drug Trades. 151-168 - Fan Yang, Hao Cheng, Shanxiang Lyu:
Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding. 169-182
Traffic Analysis and Monitoring
- Raymond H. Chan, Wye Kaye Yan, Jung Man Ma, Kai Mun Loh, Greger Chen Zhi En, Malcolm Y. H. Low, Habib Rehman, Thong Chee Phua:
MQTT Traffic Collection and Forensic Analysis Framework. 185-202 - Ke Zhang, Guanghua Zhang, Zhenguo Chen, Xiaojun Zuo:
IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft. 203-221 - Francis N. Nwebonyi, Xiaoyu Du, Pavel Gladyshev:
Crime and Incident Watch for Smart Cities: A Sensor-Based Approach. 222-238
Malware Analysis
- Chengjie Li, Yunchun Zhang, Zixuan Li, Fan Feng, Zikun Liao, Xiaohui Cui:
The Lightweight Botnet Detection Model Based on the Improved UNet. 241-255 - Alejandro Guerra-Manzanares, Hayretdin Bahsi:
On the Application of Active Learning to Handle Data Evolution in Android Malware Detection. 256-273 - Rahul Varshney, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla:
Volatility Custom Profiling for Automated Hybrid ELF Malware Detection. 274-291
Security Risk Management
- Mohsen M. Jozani, Gianluca Zanella, Maxium Khanov, Gokila Dorai, Esra Akbas:
The Need for Biometric Anti-spoofing Policies: The Case of Etsy. 295-306 - Zhoushi Sheng, Bo Yu, Chen Liang, Yongyi Zhang:
VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning. 307-325 - Yueqi Li, Sanjay Goel, Kevin J. Williams:
Are External Auditors Capable of Dealing with Cybersecurity Risks? 326-340 - Seyed Mohammad Hadi Mirsadeghi, Hayretdin Bahsi, Wissem Inbouli:
Deep Learning-Based Detection of Cyberattacks in Software-Defined Networks. 341-354 - Syed Rizvi, Mark Scanlon, Jimmy McGibney, John Sheppard:
Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments. 355-367 - Anass El Moadine, Gouenou Coatrieux, Reda Bellafqira:
Poisoning-Attack Detection Using an Auto-encoder for Deep Learning Models. 368-384
Privacy and Security
- Qiuming Liu, Zhexin Yao, Zhen Wu, Zeyao Xu:
Attribute-Based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET. 387-402 - Ruichu Yao, Kunsheng Tang, Yongshi Zhu, Bingbing Fan, Tian Luo, Yide Song:
PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data. 403-416 - Michael Mundt, Harald Baier:
Cyber Crime Undermines Data Privacy Efforts - On the Balance Between Data Privacy and Security. 417-434 - Xiaoyu Du, Francis N. Nwebonyi, Pavel Gladyshev:
Automating the Flow of Data Between Digital Forensic Tools Using Apache NiFi. 435-452 - Zhiyuan Hu, Linghang Shi, Huijun Chen, Jinghui Lu:
Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP). 453-471 - Jia Chen, Kunlin Chen, Yongjie Wang, Xuehu Yan, Longlong Li:
A General Steganalysis Method of QR Codes. 472-483
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.