libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

gladyshev pavel (curatore); goel sanjay (curatore); james joshua (curatore); markowsky george (curatore); johnson daryl (curatore) - digital forensics and cyber crime
Zoom

Digital Forensics and Cyber Crime 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings

; ; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
91,98 €
NICEPRICE
87,38 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 06/2022
Edizione: 1st ed. 2022





Trama

This book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2021, held in Singapore in December 2021. Due to COVID-19 pandemic the conference was held virtually.

The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation.





Sommario

Quantifying Paging on Recoverable Data from Windows User-Space Modules.- Forensic Investigations of Google Meet and Microsoft Teams – Two Popular Conferencing Tools in the Pandemic.- On Exploring The Sub-Domain of Artificial Intelligence (AI) Model Forensics.- Auto-Parser: Android Auto & Apple CarPlay Forensics.- Find my IoT Device – An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows.- Accessing secure data on Android through application analysis.- Research On The Method Of Selecting The Optimal Feature Subset In Big Data For Energy Analysis Attack.- Cheating sensitive security quantum bit commitment with security distance function.- Towards Mitigation of Data Exfiltration Techniques using the MITRE ATT&CK Framework.- PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality.- No Pie in The Sky: The Digital Currency Fraud Website Detection.- Understanding the Brains and Brawn of IllicitStreaming App.- Fine-grained Obfuscation Scheme Recognition on Binary Code.- Backdoor Investigation and Incident Response: From Zero to Profit.- Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention.- Lightweight On-demand Honeypot Deployment for Cyber Deception.- Parcae: A Blockchain-Based PRF Service for Everyone.- A Hybrid Cloud Deployment Architecture For Privacypreserving Collaborative Genome-Wide Association Studies.- Understanding the Security of Deepfake Detection.











Altre Informazioni

ISBN:

9783031063640

Condizione: Nuovo
Collana: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XIII, 380 p. 152 illus., 117 illus. in color.
Pagine Arabe: 380
Pagine Romane: xiii


Dicono di noi