1 option
Digital Forensics and Cyber Crime : 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings / edited by Pavel Gladyshev, Sanjay Goel, Joshua James, George Markowsky, Daryl Johnson.
- Format:
- Book
- Series:
- Computer Science (SpringerNature-11645)
- Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering 1867-822X ; 441
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1867-822X ; 441
- Language:
- English
- Subjects (All):
- Artificial intelligence.
- Application software.
- Computers.
- Computer networks.
- Data protection.
- Artificial Intelligence.
- Computer and Information Systems Applications.
- Computing Milieux.
- Computer Communication Networks.
- Data and Information Security.
- Local Subjects:
- Artificial Intelligence.
- Computer and Information Systems Applications.
- Computing Milieux.
- Computer Communication Networks.
- Data and Information Security.
- Physical Description:
- 1 online resource (XIII, 380 pages) : 152 illustrations, 117 illustrations in color.
- Edition:
- 1st ed. 2022.
- Contained In:
- Springer Nature eBook
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2022.
- System Details:
- text file PDF
- Summary:
- This book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2021, held in Singapore in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation.
- Contents:
- Quantifying Paging on Recoverable Data from Windows User-Space Modules
- Forensic Investigations of Google Meet and Microsoft Teams - Two Popular Conferencing Tools in the Pandemic
- On Exploring The Sub-Domain of Artificial Intelligence (AI) Model Forensics
- Auto-Parser: Android Auto and Apple CarPlay Forensics
- Find my IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows
- Accessing secure data on Android through application analysis
- Research On The Method Of Selecting The Optimal Feature Subset In Big Data For Energy Analysis Attack
- Cheating sensitive security quantum bit commitment with security distance function
- Towards Mitigation of Data Exfiltration Techniques using the MITRE ATT&CK Framework
- PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality
- No Pie in The Sky: The Digital Currency Fraud Website Detection
- Understanding the Brains and Brawn of IllicitStreaming App
- Fine-grained Obfuscation Scheme Recognition on Binary Code
- Backdoor Investigation and Incident Response: From Zero to Profit
- Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention
- Lightweight On-demand Honeypot Deployment for Cyber Deception
- Parcae: A Blockchain-Based PRF Service for Everyone
- A Hybrid Cloud Deployment Architecture For Privacypreserving Collaborative Genome-Wide Association Studies
- Understanding the Security of Deepfake Detection.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-031-06365-7
- 9783031063657
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.