Buch, Englisch, 486 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 750 g
13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings
Buch, Englisch, 486 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 750 g
ISBN: 978-3-031-36573-7
Verlag: Springer Nature Switzerland
The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
- Mathematik | Informatik EDV | Informatik Angewandte Informatik
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
Weitere Infos & Material
Image Forensics.- Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification.- Towards efficient on-site CSAM triage by clustering images from a source point of view.- Can Image Watermarking Efficiently Protect DeepLearning-Based Image Classifiers? – A Preliminary Security Analysis of an IP-Protecting Method.- Forensics Analysis.- Digital Forensics Tool Evaluation on Deleted Files.- Forensic Analysis of Webex on the iOS Platform.- Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android.- Crypto Wallet Artifact Detection on Android Devices using Advanced Machine Learning Techniques.- SPREAD SPECTRUM ANALYSIS.- CSCD: A Cyber Security Community Detection Scheme on Online Social Networks.- Shedding Light on Monopoly: Temporal Analysis of Drug Trades.- Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding.- TRAFFIC ANALYSIS AND MONITORING.- MQTT Traffic Collection and ForensicAnalysis Framework.- IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft.- Crime and Incident Watch for Smart Cities: A Sensor-Based Approach.- Malware Analysis.- The Lightweight Botnet Detection Model Based on the Improved UNet.- On the application of active learning to handle data evolution in Android malware detection.- Volatility Custom Profiling for Automated Hybrid ELF Malware Detection.- Security Risk Management.- The Need for Biometric Anti-Spoofing Policies: The Case of Etsy.- VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning.- Are External Auditors Capable of Dealing with Cybersecurity Risks?.- Deep Learning-based Detection of Cyberattacks in Software-Defined Networks.- Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments.- Poisoning-Attack Detection using an Auto-Encoder for Deep Learning Models.- PRIVACY AND SECURITY.- Attribute-based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET.- PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data.- Cyber Crime undermines Data Privacy efforts – On the Balance between Data Privacy and Security.- Automating the Flow of Data Between Digital Forensic Tools using Apache NiFi.- Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP).- A General Steganalysis Method of QR Codes.