• Neu

Goel / Uzun / Xie Digital Forensics and Cyber Crime

15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9–10, 2024, Proceedings, Part II
Erscheinungsjahr 2025
ISBN: 978-3-031-89360-5
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9–10, 2024, Proceedings, Part II

E-Book, Englisch, 359 Seiten

Reihe: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

ISBN: 978-3-031-89360-5
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9–10, 2024.

The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:

Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.

Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

Goel / Uzun / Xie Digital Forensics and Cyber Crime jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- Security Analytics, Threat Intelligence, Multimedia Forensics.

.- Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse.

.- EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency.

.- Auto-TFCE: Automatic Tra?ic Feature Code Extraction Method and Its Application in Cyber Security.

.- Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators.

.- ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats.

.- Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data.

.- A Comprehensive Survey on Basic Safety Message Attacks and Their Detection.

.- BGETC: An Encrypted Tra?ic Classification Method Based on BERT and GRU.

.- AnGSL: Graph-Based Android Malware Detection Method.

.- Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching.

.- MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network.

.- An IP Anti-Geolocation Method Based on Constructed Landmarks.

.- Burst Sequence Based Graph Neural Network for Video Tra?ic Identification.

.- KP-WF: Cross-domain Few-shot Website Fingerprinting.

.- Generative AI, Emerging Threats. 

.- Pixel-level Face Correction Task for More Generalized Deepfake Detection.

.- Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data.

.- Driven to Evidence: The Digital Forensic Trail of Vehicles.

.- Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing.

.- Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack.

.-  Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.