Digital Forensics and Cyber Crime: 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, cartea 570
Editat de Sanjay Goel, Paulo Roberto Nunes de Souzaen Limba Engleză Paperback – 17 iun 2024
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.
The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:
Volume I:
Crime profile analysis and Fact checking, Information hiding and Machine learning.
Volume II:
Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (2) | 496.99 lei 6-8 săpt. | |
Springer Nature Switzerland – 17 iun 2024 | 496.99 lei 6-8 săpt. | |
Springer Nature Switzerland – 15 apr 2024 | 497.94 lei 6-8 săpt. |
Din seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- 20% Preț: 135.45 lei
- 20% Preț: 321.64 lei
- Preț: 394.53 lei
- 20% Preț: 324.07 lei
- 20% Preț: 321.64 lei
- 20% Preț: 324.07 lei
- 20% Preț: 333.97 lei
- 20% Preț: 328.14 lei
- 20% Preț: 320.36 lei
- 20% Preț: 324.07 lei
- 18% Preț: 953.11 lei
- 20% Preț: 586.43 lei
- 20% Preț: 661.83 lei
- 20% Preț: 322.46 lei
- 20% Preț: 451.70 lei
- 20% Preț: 649.68 lei
- 20% Preț: 326.50 lei
- 20% Preț: 342.73 lei
- 20% Preț: 336.90 lei
- 20% Preț: 656.96 lei
- 20% Preț: 336.22 lei
- 20% Preț: 335.43 lei
- Preț: 378.25 lei
- 20% Preț: 659.39 lei
- 5% Preț: 294.07 lei
- 20% Preț: 321.81 lei
- 20% Preț: 321.00 lei
- 20% Preț: 409.65 lei
- 20% Preț: 326.17 lei
- 20% Preț: 403.97 lei
- 20% Preț: 335.57 lei
- 20% Preț: 330.57 lei
- 20% Preț: 327.15 lei
- 20% Preț: 333.78 lei
- 20% Preț: 330.90 lei
- 20% Preț: 292.05 lei
- 20% Preț: 402.99 lei
- 20% Preț: 329.11 lei
- 20% Preț: 670.13 lei
- 20% Preț: 320.49 lei
- 20% Preț: 324.07 lei
- 5% Preț: 323.46 lei
- 20% Preț: 329.25 lei
- 20% Preț: 321.17 lei
- 20% Preț: 299.02 lei
- 20% Preț: 294.95 lei
- 20% Preț: 292.85 lei
- 20% Preț: 295.30 lei
- 20% Preț: 294.95 lei
- 20% Preț: 299.17 lei
Preț: 496.99 lei
Preț vechi: 621.23 lei
-20% Nou
Puncte Express: 745
Preț estimativ în valută:
95.11€ • 99.09$ • 79.08£
95.11€ • 99.09$ • 79.08£
Carte tipărită la comandă
Livrare economică 10-24 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031565793
ISBN-10: 3031565797
Ilustrații: XV, 325 p. 129 illus., 101 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.48 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
ISBN-10: 3031565797
Ilustrații: XV, 325 p. 129 illus., 101 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.48 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
Cuprins
Crime profile analysis and Fact checking.- A Canary in the Voting Booth: Attacks on a Virtual Voting Machine.- Catch Me if You Can: Analysis of Digital Devices Artifacts Used in Murder Cases.- Enhancing Incident Management by an improved Understanding of Data Exfiltration: Definition, Evaluation, Review.- Identify Users on Dating Applications: A Forensic Perspective.- Removing Noise (Opinion Messages) For Fake News De-tection In Discussion Forum Using BERT Model.- Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social.- Information hiding.- A Multi-Carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis.- A Multi-Carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model.- Point cloud model information hiding algorithm based on multi-scale transformation and composite operator.- An Information Hiding Algorithm Baed on Multi-Carrier Fusion State Partitioning of 3D Models.- Machine learning.- CCBA: Code Poisoning-based Clean-Label Covert Backdoor Attack against DNNs.- Decoding HDF5: Machine Learning File Forensics and Data Injection.- DEML: Data-enhanced Meta-Learning Method for IoT APT Traffic Detection.- Finding Forensic Artefacts in Long-term Frequency Band Occupancy Measurements using Statistics and Machine Learning.- IoT Malicious Traffic Detection based on Federated Learning.- Persistent Clean-label Backdoor on Graph-based Semi-supervised Cybercrime Detection.- Backdoor Learning on Siamese Networks using Physical Triggers: FaceNet as a Case Study.- Research on Feature Selection Algorithm of Energy Curve.- Power Analysis Attack Based on GA-based Ensemble Learning.