000 | 03740nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-030-05487-8 | ||
003 | DE-He213 | ||
005 | 20240423125218.0 | ||
007 | cr nn 008mamaa | ||
008 | 181229s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030054878 _9978-3-030-05487-8 |
||
024 | 7 |
_a10.1007/978-3-030-05487-8 _2doi |
|
050 | 4 | _aQ334-342 | |
050 | 4 | _aTA347.A78 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aDigital Forensics and Cyber Crime _h[electronic resource] : _b10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings / _cedited by Frank Breitinger, Ibrahim Baggili. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aX, 235 p. 317 illus., 31 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v259 |
|
505 | 0 | _aOn Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving -- fishy - A Framework for Implementing Filesystem-based Data Hiding Techniques -- If I Had a Million Cryptos: Cryptowallet Application Analysis and A Trojan Proof-of-Concept -- AndroParse - An Android Feature Extraction -- Digital Forensic Readiness Framework for Ransomware Investigation -- Forensics Analysis of an On-line Game over Steam Platform -- A Digital Forensic Investigation and Verification Model for Industria l Espionage -- Hard Drives and Digital Forensics -- Solid State Drive Forensics: Where Do We Stand? -- Associating Drives Based on Their Artifact and Metadata Distributions -- Digital Forensics Event Graph Reconstruction -- Multi-Item Passphrases: A Self-Adaptive Approach -- Against Offline Guessing Attacks -- Hybrid Intrusion Detection System for Worm Attacks Based on Their Network Behavior. | |
520 | _aThis book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018. The 11 reviewed full papers and 1 short paper were selected from 33 submissions and are grouped in topical sections on carving and data hiding, android, forensic readiness, hard drives and digital forensics, artefact correlation. | ||
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aData protection. | |
650 | 0 |
_aComputers _xLaw and legislation. |
|
650 | 0 |
_aInformation technology _xLaw and legislation. |
|
650 | 0 | _aSoftware engineering. | |
650 | 1 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aLegal Aspects of Computing. |
650 | 2 | 4 | _aSoftware Engineering. |
700 | 1 |
_aBreitinger, Frank. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aBaggili, Ibrahim. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030054861 |
776 | 0 | 8 |
_iPrinted edition: _z9783030054885 |
830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v259 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-05487-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNS | ||
942 | _cSPRINGER | ||
999 |
_c175478 _d175478 |