000 04831nam a22006495i 4500
001 978-3-031-06365-7
003 DE-He213
005 20240423125221.0
007 cr nn 008mamaa
008 220603s2022 sz | s |||| 0|eng d
020 _a9783031063657
_9978-3-031-06365-7
024 7 _a10.1007/978-3-031-06365-7
_2doi
050 4 _aQ334-342
050 4 _aTA347.A78
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
245 1 0 _aDigital Forensics and Cyber Crime
_h[electronic resource] :
_b12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings /
_cedited by Pavel Gladyshev, Sanjay Goel, Joshua James, George Markowsky, Daryl Johnson.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXIII, 380 p. 152 illus., 117 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-822X ;
_v441
505 0 _aQuantifying Paging on Recoverable Data from Windows User-Space Modules -- Forensic Investigations of Google Meet and Microsoft Teams – Two Popular Conferencing Tools in the Pandemic -- On Exploring The Sub-Domain of Artificial Intelligence (AI) Model Forensics -- Auto-Parser: Android Auto & Apple CarPlay Forensics -- Find my IoT Device – An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows -- Accessing secure data on Android through application analysis -- Research On The Method Of Selecting The Optimal Feature Subset In Big Data For Energy Analysis Attack -- Cheating sensitive security quantum bit commitment with security distance function -- Towards Mitigation of Data Exfiltration Techniques using the MITRE ATT&CK Framework -- PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality -- No Pie in The Sky: The Digital Currency Fraud Website Detection -- Understanding the Brains and Brawn of IllicitStreaming App -- Fine-grained Obfuscation Scheme Recognition on Binary Code -- Backdoor Investigation and Incident Response: From Zero to Profit -- Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention -- Lightweight On-demand Honeypot Deployment for Cyber Deception -- Parcae: A Blockchain-Based PRF Service for Everyone -- A Hybrid Cloud Deployment Architecture For Privacypreserving Collaborative Genome-Wide Association Studies -- Understanding the Security of Deepfake Detection.
520 _aThis book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2021, held in Singapore in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation.
650 0 _aArtificial intelligence.
650 0 _aApplication software.
650 0 _aComputers.
650 0 _aComputer networks .
650 0 _aData protection.
650 1 4 _aArtificial Intelligence.
650 2 4 _aComputer and Information Systems Applications.
650 2 4 _aComputing Milieux.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData and Information Security.
700 1 _aGladyshev, Pavel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aGoel, Sanjay.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aJames, Joshua.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMarkowsky, George.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aJohnson, Daryl.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031063640
776 0 8 _iPrinted edition:
_z9783031063664
830 0 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-822X ;
_v441
856 4 0 _uhttps://doi.org/10.1007/978-3-031-06365-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNS
942 _cSPRINGER
999 _c175535
_d175535