Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ifip11-9/df2017.bht:"
@inproceedings{DBLP:conf/ifip11-9/Antwi-BoasiakoV17, author = {Albert Antwi{-}Boasiako and Hein S. Venter}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {A Model for Digital Evidence Admissibility Assessment}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {23--38}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_2}, doi = {10.1007/978-3-319-67208-3\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/Antwi-BoasiakoV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/BeebeLY17, author = {Nicole Beebe and Lishu Liu and Zi Ye}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Insider Threat Detection Using Time-Series-Based Raw Disk Forensic Analysis}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {149--167}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_9}, doi = {10.1007/978-3-319-67208-3\_9}, timestamp = {Thu, 07 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/BeebeLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/ChhabraGGG17, author = {Saheb Chhabra and Garima Gupta and Monika Gupta and Gaurav Gupta}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Detecting Fraudulent Bank Checks}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {245--266}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_14}, doi = {10.1007/978-3-319-67208-3\_14}, timestamp = {Thu, 07 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/ChhabraGGG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/ChinX17, author = {Tommy Chin and Kaiqi Xiong}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {A Forensic Methodology for Software-Defined Network Switches}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {97--110}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_6}, doi = {10.1007/978-3-319-67208-3\_6}, timestamp = {Thu, 07 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/ChinX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/FangLXJYYWHL17, author = {Junbin Fang and Sijin Li and Guikai Xi and Zoe Lin Jiang and Siu{-}Ming Yiu and Liyang Yu and Xuan Wang and Qi Han and Qiong Li}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Semantic Video Carving Using Perceptual Hashing and Optical Flow}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {223--244}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_13}, doi = {10.1007/978-3-319-67208-3\_13}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/FangLXJYYWHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/GoodP17, author = {Ryan Good and Gilbert L. Peterson}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Automated Collection and Correlation of File Provenance Information}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {269--284}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_15}, doi = {10.1007/978-3-319-67208-3\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/GoodP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/GrimmettSS17, author = {Zachary Grimmett and Jason Staggs and Sujeet Shenoi}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Categorizing Mobile Device Malware Based on System Side-Effects}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {203--219}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_12}, doi = {10.1007/978-3-319-67208-3\_12}, timestamp = {Thu, 07 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/GrimmettSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/HoelzM17, author = {Bruno W. P. Hoelz and Marcelo Maues}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Anti-Forensic Threat Modeling}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {169--183}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_10}, doi = {10.1007/978-3-319-67208-3\_10}, timestamp = {Thu, 07 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/HoelzM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/HoushmandA17, author = {Shiva Houshmand and Sudhir Aggarwal}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Using Personal Information in Targeted Grammar-Based Probabilistic Password Attacks}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {285--303}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_16}, doi = {10.1007/978-3-319-67208-3\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/HoushmandA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/LiuSW17, author = {Changwei Liu and Anoop Singhal and Duminda Wijesekera}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Identifying Evidence for Cloud Forensic Analysis}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {111--130}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_7}, doi = {10.1007/978-3-319-67208-3\_7}, timestamp = {Thu, 07 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/LiuSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/MorrisonRXS17, author = {Logan Morrison and Huw Read and Konstantinos Xynos and Iain Sutherland}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Forensic Evaluation of an Amazon Fire {TV} Stick}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {63--79}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_4}, doi = {10.1007/978-3-319-67208-3\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/MorrisonRXS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/MosliLYP17, author = {Rayan Mosli and Rui Li and Bo Yuan and Yin Pan}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {A Behavior-Based Approach for Malware Detection}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {187--201}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_11}, doi = {10.1007/978-3-319-67208-3\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/MosliLYP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/OyelamiO17, author = {Oluwasayo Oyelami and Martin Olivier}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Establishing Findings in Digital Forensic Examinations: {A} Case Study Method}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {3--21}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_1}, doi = {10.1007/978-3-319-67208-3\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/OyelamiO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/PiatkivskyiAN17, author = {Dmytro Piatkivskyi and Stefan Axelsson and Mariusz Nowostawski}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Digital Forensic Implications of Collusion Attacks on the Lightning Network}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {133--147}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_8}, doi = {10.1007/978-3-319-67208-3\_8}, timestamp = {Thu, 07 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/PiatkivskyiAN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/PieterseOH17, author = {Heloise Pieterse and Martin S. Olivier and Renier van Heerden}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Evaluating the Authenticity of Smartphone Evidence}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {41--61}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_3}, doi = {10.1007/978-3-319-67208-3\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/PieterseOH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/YauC17, author = {Ken Yau and Kam{-}Pui Chow}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Detecting Anomalous Programmable Logic Controller Events Using Machine Learning}, booktitle = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, pages = {81--94}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3\_5}, doi = {10.1007/978-3-319-67208-3\_5}, timestamp = {Thu, 07 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/YauC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip11-9/2017, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Advances in Digital Forensics {XIII} - 13th {IFIP} {WG} 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {511}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67208-3}, doi = {10.1007/978-3-319-67208-3}, isbn = {978-3-319-67207-6}, timestamp = {Thu, 07 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.