Digital Forensics and Cyber Crime: 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, cartea 508
Editat de Sanjay Goel, Pavel Gladyshev, Akatyev Nikolay, George Markowsky, Daryl Johnsonen Limba Engleză Paperback – 16 iul 2023
The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.
Din seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- 20% Preț: 327.12 lei
- Preț: 401.24 lei
- 20% Preț: 329.58 lei
- 20% Preț: 327.12 lei
- 20% Preț: 329.58 lei
- 20% Preț: 339.66 lei
- 20% Preț: 333.72 lei
- 20% Preț: 325.80 lei
- 20% Preț: 329.58 lei
- 18% Preț: 969.44 lei
- 20% Preț: 596.46 lei
- 20% Preț: 673.17 lei
- 20% Preț: 327.95 lei
- 20% Preț: 451.70 lei
- 20% Preț: 660.81 lei
- 20% Preț: 332.06 lei
- 20% Preț: 348.57 lei
- 20% Preț: 342.65 lei
- 20% Preț: 668.22 lei
- 20% Preț: 341.95 lei
- 20% Preț: 341.15 lei
- Preț: 384.70 lei
- 20% Preț: 670.70 lei
- 5% Preț: 299.06 lei
- 20% Preț: 327.29 lei
- 20% Preț: 326.46 lei
- 20% Preț: 416.63 lei
- 20% Preț: 331.74 lei
- 20% Preț: 336.54 lei
- 20% Preț: 410.85 lei
- 20% Preț: 341.30 lei
- 20% Preț: 336.21 lei
- 20% Preț: 332.71 lei
- 20% Preț: 339.47 lei
- 20% Preț: 336.54 lei
- 20% Preț: 297.00 lei
- 20% Preț: 409.87 lei
- 20% Preț: 334.71 lei
- 20% Preț: 681.61 lei
- 20% Preț: 325.95 lei
- 20% Preț: 329.58 lei
- 5% Preț: 328.95 lei
- 20% Preț: 334.86 lei
- 20% Preț: 326.64 lei
- 20% Preț: 304.10 lei
- 20% Preț: 299.95 lei
- 20% Preț: 297.81 lei
- 20% Preț: 300.32 lei
- 20% Preț: 299.95 lei
- 20% Preț: 304.26 lei
Preț: 598.61 lei
Preț vechi: 748.25 lei
-20% Nou
Puncte Express: 898
Preț estimativ în valută:
114.55€ • 118.87$ • 95.75£
114.55€ • 118.87$ • 95.75£
Carte tipărită la comandă
Livrare economică 15-29 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031365737
ISBN-10: 3031365739
Ilustrații: XIII, 486 p. 292 illus., 150 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.69 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
ISBN-10: 3031365739
Ilustrații: XIII, 486 p. 292 illus., 150 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.69 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
Cuprins
Image Forensics.- Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification.- Towards efficient on-site CSAM triage by clustering images from a source point of view.- Can Image Watermarking Efficiently Protect DeepLearning-Based Image Classifiers? – A Preliminary Security Analysis of an IP-Protecting Method.- Forensics Analysis.- Digital Forensics Tool Evaluation on Deleted Files.- Forensic Analysis of Webex on the iOS Platform.- Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android.- Crypto Wallet Artifact Detection on Android Devices using Advanced Machine Learning Techniques.- SPREAD SPECTRUM ANALYSIS.- CSCD: A Cyber Security Community Detection Scheme on Online Social Networks.- Shedding Light on Monopoly: Temporal Analysis of Drug Trades.- Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding.- TRAFFIC ANALYSIS AND MONITORING.- MQTT Traffic Collection and ForensicAnalysis Framework.- IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft.- Crime and Incident Watch for Smart Cities: A Sensor-Based Approach.- Malware Analysis.- The Lightweight Botnet Detection Model Based on the Improved UNet.- On the application of active learning to handle data evolution in Android malware detection.- Volatility Custom Profiling for Automated Hybrid ELF Malware Detection.- Security Risk Management.- The Need for Biometric Anti-Spoofing Policies: The Case of Etsy.- VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning.- Are External Auditors Capable of Dealing with Cybersecurity Risks?.- Deep Learning-based Detection of Cyberattacks in Software-Defined Networks.- Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments.- Poisoning-Attack Detection using an Auto-Encoder for Deep Learning Models.- PRIVACY AND SECURITY.- Attribute-based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET.- PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data.- Cyber Crime undermines Data Privacy efforts – On the Balance between Data Privacy and Security.- Automating the Flow of Data Between Digital Forensic Tools using Apache NiFi.- Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP).- A General Steganalysis Method of QR Codes.