Library Catalog

>>
Library Catalog
>
000 nam5i
001 2210080933955
003 DE-He213
005 20250321105307
007 cr nn 008mamaa
008 240402s2024 sz | s |||| 0|eng d
020 a97830315658099978-3-031-56580-9
024 a10.1007/978-3-031-56580-92doi
040 a221008
050 aQA76.9.A25
072 aUR2bicssc
072 aUTN2bicssc
072 aCOM0530002bisacsh
072 aUR2thema
072 aUTN2thema
082 a005.8223
245 00 aDigital Forensics and Cyber Crimeh[electronic resource] :b14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I /cedited by Sanjay Goel, Paulo Roberto Nunes de Souza.
250 a1st ed. 2024.
264 aCham :bSpringer Nature Switzerland :bImprint: Springer,c2024.
300 aXV, 325 p. 129 illus., 101 illus. in color.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
490 aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,x1867-822X ;v570
505 aCrime profile analysis and Fact checking -- A Canary in the Voting Booth: Attacks on a Virtual Voting Machine -- Catch Me if You Can: Analysis of Digital Devices Artifacts Used in Murder Cases -- Enhancing Incident Management by an improved Understanding of Data Exfiltration: Definition, Evaluation, Review -- Identify Users on Dating Applications: A Forensic Perspective -- Removing Noise (Opinion Messages) For Fake News De-tection In Discussion Forum Using BERT Model -- Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social -- Information hiding -- A Multi-Carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis -- A Multi-Carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model -- Point cloud model information hiding algorithm based on multi-scale transformation and composite operator -- An Information Hiding Algorithm Baed on Multi-Carrier Fusion State Partitioning of 3D Models -- Machine learning -- CCBA: Code Poisoning-based Clean-Label Covert Backdoor Attack against DNNs -- Decoding HDF5: Machine Learning File Forensics and Data Injection -- DEML: Data-enhanced Meta-Learning Method for IoT APT Traffic Detection -- Finding Forensic Artefacts in Long-term Frequency Band Occupancy Measurements using Statistics and Machine Learning -- IoT Malicious Traffic Detection based on Federated Learning -- Persistent Clean-label Backdoor on Graph-based Semi-supervised Cybercrime Detection -- Backdoor Learning on Siamese Networks using Physical Triggers: FaceNet as a Case Study -- Research on Feature Selection Algorithm of Energy Curve -- Power Analysis Attack Based on GA-based Ensemble Learning.
520 aThe two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023. The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections: Volume I: Crime profile analysis and Fact checking, Information hiding and Machine learning. Volume II: Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
650 aData protection.
650 aApplication software.
650 aComputer systems.
650 aComputer networks .
650 aSoftware engineering.
650 aOperating systems (Computers).
650 aData and Information Security.
650 aComputer and Information Systems Applications.
650 aComputer System Implementation.
650 aComputer Communication Networks.
650 aSoftware Engineering.
650 aOperating Systems.
700 aGoel, Sanjay.eeditor.0(orcid)0000-0002-7164-83951https://orcid.org/0000-0002-7164-83954edt4http://id.loc.gov/vocabulary/relators/edt
700 aNunes de Souza, Paulo Roberto.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9783031565793
776 iPrinted edition:z9783031565816
830 aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,x1867-822X ;v570
856 uhttps://doi.org/10.1007/978-3-031-56580-9
912 aZDB-2-SCS
912 aZDB-2-SXCS
912 aZDB-2-LNS
950 aComputer Science (SpringerNature-11645)
950 aComputer Science (R0) (SpringerNature-43710)
Digital Forensics and Cyber Crime[electronic resource] :14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I /edited by Sanjay Goel, Paulo Roberto Nunes de Souza
Material type
전자책
Title
Digital Forensics and Cyber Crime[electronic resource] :14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I /edited by Sanjay Goel, Paulo Roberto Nunes de Souza
Author's Name
판 사항
1st ed. 2024.
Physical Description
XV, 325 p 129 illus, 101 illus in color online resource.
Keyword
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023. The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections: Volume I: Crime profile analysis and Fact checking, Information hiding and Machine learning. Volume II: Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
내용주기
Crime profile analysis and Fact checking / A Canary in the Voting Booth: Attacks on a Virtual Voting Machine / Catch Me if You Can: Analysis of Digital Devices Artifacts Used in Murder Cases / Enhancing Incident Management by an improved Understanding of Data Exfiltration: Definition, Evaluation, Review / Identify Users on Dating Applications: A Forensic Perspective / Removing Noise (Opinion Messages) For Fake News De-tection In Discussion Forum Using BERT Model / Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social / Information hiding / A Multi-Carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis / A Multi-Carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model / Point cloud model information hiding algorithm based on multi-scale transformation and composite operator / An Information Hiding Algorithm Baed on Multi-Carrier Fusion State Partitioning of 3D Models / Machine learning / CCBA: Code Poisoning-based Clean-Label Covert Backdoor Attack against DNNs / Decoding HDF5: Machine Learning File Forensics and Data Injection / DEML: Data-enhanced Meta-Learning Method for IoT APT Traffic Detection / Finding Forensic Artefacts in Long-term Frequency Band Occupancy Measurements using Statistics and Machine Learning / IoT Malicious Traffic Detection based on Federated Learning / Persistent Clean-label Backdoor on Graph-based Semi-supervised Cybercrime Detection / Backdoor Learning on Siamese Networks using Physical Triggers: FaceNet as a Case Study / Research on Feature Selection Algorithm of Energy Curve / Power Analysis Attack Based on GA-based Ensemble Learning.
관련 URL

Holdings Information

RReservation
MMissing Book Request
CClosed Stack Request
IInter-Campus Loan
CPriority Cataloging
PPrint
Registration no. Call no. Location Mark Location Status Due for return Service
전자자료는 소장사항이 존재하지 않습니다

Book Overview

Full menu