000 | 04295nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-030-68734-2 | ||
003 | DE-He213 | ||
005 | 20240423125415.0 | ||
007 | cr nn 008mamaa | ||
008 | 210206s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030687342 _9978-3-030-68734-2 |
||
024 | 7 |
_a10.1007/978-3-030-68734-2 _2doi |
|
050 | 4 | _aQ334-342 | |
050 | 4 | _aTA347.A78 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aDigital Forensics and Cyber Crime _h[electronic resource] : _b11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings / _cedited by Sanjay Goel, Pavel Gladyshev, Daryl Johnson, Makan Pourzandi, Suryadipta Majumdar. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXII, 251 p. 109 illus., 76 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v351 |
|
505 | 0 | _aOn Reliability of JA3 Hashes for Fingerprinting Mobile Applications -- Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations -- Evidence gathering in IoT criminal investigation Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor -- A Partial Approach to Intrusion Detection -- Efficient Fingerprint Matching for Forensic Event Reconstruction -- Modelling GOP structure effects on ENF-based video forensics -- Android Dumpsys Analysis to Indicate Driver Distraction -- Adapting to local conditions: Similarities and differences in anonymous online market between Chinese and English Speaking Communities -- Remote air-gap Live forensics -- A Digital Forensic Approach for Optimizing the Investigation of Hit-And-Run Accidents -- -- An Intelligence Criminal Tracker for Industrial Espionage: Applying Digital Data Acquired Onsite to Target Criminals -- Retracing the Flow of the Stream: Investigating Kodi Streaming Services -- Cybersecurity Methodology for Specialized Behavior Analysis -- Neural Representation Learning Based Binary Code Authorship Attribution. | |
520 | _aThis book constitutes the refereed proceedings of the 11th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2020, held in Boston, MA, in October 2020. Due to COVID-19 pandemic the conference was held virtually. The 11 reviewed full papers and 4 short papers were selected from 35 submissions and are grouped in topical sections on digital forensics; cyber-physical system Forensics; event reconstruction in digital forensics; emerging topics in forensics; cybersecurity and digital forensics. | ||
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aData and Information Security. |
700 | 1 |
_aGoel, Sanjay. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aGladyshev, Pavel. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aJohnson, Daryl. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPourzandi, Makan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMajumdar, Suryadipta. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030687335 |
776 | 0 | 8 |
_iPrinted edition: _z9783030687359 |
830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v351 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-68734-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNS | ||
942 | _cSPRINGER | ||
999 |
_c177585 _d177585 |