000 | 04831nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-031-06365-7 | ||
003 | DE-He213 | ||
005 | 20240423125221.0 | ||
007 | cr nn 008mamaa | ||
008 | 220603s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031063657 _9978-3-031-06365-7 |
||
024 | 7 |
_a10.1007/978-3-031-06365-7 _2doi |
|
050 | 4 | _aQ334-342 | |
050 | 4 | _aTA347.A78 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aDigital Forensics and Cyber Crime _h[electronic resource] : _b12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings / _cedited by Pavel Gladyshev, Sanjay Goel, Joshua James, George Markowsky, Daryl Johnson. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXIII, 380 p. 152 illus., 117 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v441 |
|
505 | 0 | _aQuantifying Paging on Recoverable Data from Windows User-Space Modules -- Forensic Investigations of Google Meet and Microsoft Teams – Two Popular Conferencing Tools in the Pandemic -- On Exploring The Sub-Domain of Artificial Intelligence (AI) Model Forensics -- Auto-Parser: Android Auto & Apple CarPlay Forensics -- Find my IoT Device – An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows -- Accessing secure data on Android through application analysis -- Research On The Method Of Selecting The Optimal Feature Subset In Big Data For Energy Analysis Attack -- Cheating sensitive security quantum bit commitment with security distance function -- Towards Mitigation of Data Exfiltration Techniques using the MITRE ATT&CK Framework -- PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality -- No Pie in The Sky: The Digital Currency Fraud Website Detection -- Understanding the Brains and Brawn of IllicitStreaming App -- Fine-grained Obfuscation Scheme Recognition on Binary Code -- Backdoor Investigation and Incident Response: From Zero to Profit -- Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention -- Lightweight On-demand Honeypot Deployment for Cyber Deception -- Parcae: A Blockchain-Based PRF Service for Everyone -- A Hybrid Cloud Deployment Architecture For Privacypreserving Collaborative Genome-Wide Association Studies -- Understanding the Security of Deepfake Detection. | |
520 | _aThis book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2021, held in Singapore in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation. | ||
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aComputers. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aComputing Milieux. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData and Information Security. |
700 | 1 |
_aGladyshev, Pavel. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aGoel, Sanjay. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aJames, Joshua. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMarkowsky, George. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aJohnson, Daryl. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031063640 |
776 | 0 | 8 |
_iPrinted edition: _z9783031063664 |
830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v441 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-06365-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNS | ||
942 | _cSPRINGER | ||
999 |
_c175535 _d175535 |