|
|
|
|
LEADER |
03990nam a2200553 4500 |
001 |
978-3-030-05487-8 |
003 |
DE-He213 |
005 |
20191027123101.0 |
007 |
cr nn 008mamaa |
008 |
181229s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030054878
|9 978-3-030-05487-8
|
024 |
7 |
|
|a 10.1007/978-3-030-05487-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q334-342
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a COM004000
|2 bisacsh
|
072 |
|
7 |
|a UYQ
|2 thema
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
1 |
0 |
|a Digital Forensics and Cyber Crime
|h [electronic resource] :
|b 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings /
|c edited by Frank Breitinger, Ibrahim Baggili.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a X, 235 p. 317 illus., 31 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 259
|
505 |
0 |
|
|a On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving -- fishy - A Framework for Implementing Filesystem-based Data Hiding Techniques -- If I Had a Million Cryptos: Cryptowallet Application Analysis and A Trojan Proof-of-Concept -- AndroParse - An Android Feature Extraction -- Digital Forensic Readiness Framework for Ransomware Investigation -- Forensics Analysis of an On-line Game over Steam Platform -- A Digital Forensic Investigation and Verification Model for Industria l Espionage -- Hard Drives and Digital Forensics -- Solid State Drive Forensics: Where Do We Stand? -- Associating Drives Based on Their Artifact and Metadata Distributions -- Digital Forensics Event Graph Reconstruction -- Multi-Item Passphrases: A Self-Adaptive Approach -- Against Offline Guessing Attacks -- Hybrid Intrusion Detection System for Worm Attacks Based on Their Network Behavior.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018. The 11 reviewed full papers and 1 short paper were selected from 33 submissions and are grouped in topical sections on carving and data hiding, android, forensic readiness, hard drives and digital forensics, artefact correlation.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
|
0 |
|a Software engineering.
|
650 |
1 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
650 |
2 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|0 http://scigraph.springernature.com/things/product-market-codes/I24059
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14002
|
700 |
1 |
|
|a Breitinger, Frank.
|e editor.
|0 (orcid)0000-0001-5261-4600
|1 https://orcid.org/0000-0001-5261-4600
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Baggili, Ibrahim.
|e editor.
|0 (orcid)0000-0002-9574-9537
|1 https://orcid.org/0000-0002-9574-9537
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030054861
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030054885
|
830 |
|
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 259
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-05487-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNS
|
950 |
|
|
|a Computer Science (Springer-11645)
|