Digital Forensics and Cyber Crime

CHF 125.00
Auf Lager
SKU
MV1NAPHGPI0
Stock 1 Verfügbar
Geliefert zwischen Mi., 26.11.2025 und Do., 27.11.2025

Details

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 910, 2024.

The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:

Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.

Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.


Inhalt

.- Artificial Intelligence & Security.

.- Hacking Mobile Biometrics with the Photograph of a Fingerprint.

.- Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling.

.- Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review.

.- CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning.

.- Multimedia Forensics.

.- Toward Forensic-Friendly AI: Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness.

.- The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router.

.- ENF Match with Masking: a new method for searching with sparse signal.

.- Lightweight Multi-Tier IDS for UAV Networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence.

.- Intrusion Detection.

.- Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model.

.- APTChaser: Cyber Threat Attribution via Attack Technique Modeling.

.- What Do We Know About the Psychology of Insider Threats?.

.- A Digital Profiling Triage Model for Industrial Espionage.

.- Intrusion and Fraud Detection.

.- Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning.

.- Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture.

.- ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning.

.- Large Language Models, Advances in Security and Forensics.

.- Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails.

.- SecureSem: Sensitive Text Classification based on Semantic Feature Optimization.

.- The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI.

.- Advances in Security and Forensics.

.- Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review.

.- Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project.

Weitere Informationen

  • Allgemeine Informationen
    • GTIN 09783031893629
    • Genre Information Technology
    • Editor Sanjay Goel, Sumantra Sarkar, Mengjun Xie, Ersin Uzun
    • Lesemotiv Verstehen
    • Anzahl Seiten 376
    • Größe H235mm x B155mm x T21mm
    • Jahr 2025
    • EAN 9783031893629
    • Format Kartonierter Einband
    • ISBN 303189362X
    • Veröffentlichung 25.05.2025
    • Titel Digital Forensics and Cyber Crime
    • Untertitel 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part I
    • Gewicht 569g
    • Herausgeber Springer Nature Switzerland
    • Sprache Englisch

Bewertungen

Schreiben Sie eine Bewertung
Nur registrierte Benutzer können Bewertungen schreiben. Bitte loggen Sie sich ein oder erstellen Sie ein Konto.
Made with ♥ in Switzerland | ©2025 Avento by Gametime AG
Gametime AG | Hohlstrasse 216 | 8004 Zürich | Schweiz | UID: CHE-112.967.470