Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings /
This book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017. The 18 full papers were selected from 50 submissions and are grouped in topical sections on malware and botnet, deano...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2018.
|
Έκδοση: | 1st ed. 2018. |
Σειρά: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
216 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- FindEvasion : An Effective Environment-sensitive Malware Detection System for the Cloud
- Real-time Forensics through Endpoint Visibility
- Locky ransomware, Al Capone and Brexit Deanonymization
- Finding and Rating Personal Names on Drives for Forensic Needs
- A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness
- Open Source Forensics for a Multi-platform Drone System
- A Novel File Carving Algorithm for EVTX Logs
- Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence
- Cyber Crime Investigation and Digital Forensics Triage
- Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector
- A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph
- Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees
- Approxis: a fast, robust, lightweight and approximate Disassembler considered in the field of memory forensics
- Memory Forensics and the Macintosh OS X Operating System
- Sketch-based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation
- An Overview of the Usage of Default Passwords Hacking
- Automation of MitM Attack on Wi-Fi Networks
- SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle
- Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets.