Buch, Englisch, 325 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 522 g
14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I
Buch, Englisch, 325 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 522 g
ISBN: 978-3-031-56579-3
Verlag: Springer Nature Switzerland
The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:
Volume I:
Crime profile analysis and Fact checking, Information hiding and Machine learning.
Volume II:
Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Betriebssysteme
- Mathematik | Informatik EDV | Informatik Angewandte Informatik
- Mathematik | Informatik EDV | Informatik Informatik Rechnerarchitektur
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
Weitere Infos & Material
Crime profile analysis and Fact checking.- A Canary in the Voting Booth: Attacks on a Virtual Voting Machine.- Catch Me if You Can: Analysis of Digital Devices Artifacts Used in Murder Cases.- Enhancing Incident Management by an improved Understanding of Data Exfiltration: Definition, Evaluation, Review.- Identify Users on Dating Applications: A Forensic Perspective.- Removing Noise (Opinion Messages) For Fake News De-tection In Discussion Forum Using BERT Model.- Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social.- Information hiding.- A Multi-Carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis.- A Multi-Carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model.- Point cloud model information hiding algorithm based on multi-scale transformation and composite operator.- An Information Hiding Algorithm Baed on Multi-Carrier Fusion State Partitioning of 3D Models.- Machine learning.- CCBA: Code Poisoning-based Clean-Label Covert Backdoor Attack against DNNs.- Decoding HDF5: Machine Learning File Forensics and Data Injection.- DEML: Data-enhanced Meta-Learning Method for IoT APT Traffic Detection.- Finding Forensic Artefacts in Long-term Frequency Band Occupancy Measurements using Statistics and Machine Learning.- IoT Malicious Traffic Detection based on Federated Learning.- Persistent Clean-label Backdoor on Graph-based Semi-supervised Cybercrime Detection.- Backdoor Learning on Siamese Networks using Physical Triggers: FaceNet as a Case Study.- Research on Feature Selection Algorithm of Energy Curve.- Power Analysis Attack Based on GA-based Ensemble Learning.