Digital Forensics and Cyber Crime
Springer International Publishing (Verlag)
978-3-031-56582-3 (ISBN)
The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:
Volume I:
Crime profile analysis and Fact checking, Information hiding and Machine learning.
Volume II:
Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
Password, Authentication and Cryptography.- A Quantum Physics approach for enabling Informationtheoretic Secure Communication Channels.- Learning framework for guessing alphanumeric passwords on mobile phones based on user context and fragment semantics.- Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities.- Lattice-based Secret Sharing Scheme (Chinese Remainder Theorem).- A PUF based Audio Fingerprint Based for Device Authentication and Tamper Location.- SHIELD: a Specialized Dataset for Hybrid Blind Forensics of World Leaders.- Vulnerabilities.- Optir-SBERT: Cross-architecture binary code similarity detection based on optimized LLVM IR.- SdShield: Effectively Ensuring Heap Security via Shadow Page Table.- Unraveling Network-based Pivoting Maneuvers: Empirical Insights and Challenges.- XSS vulnerability test enhancement for Progressive Web Applications.- Detection of Targeted Attacks using Medium-Interaction Honeypot for Unmanned Aerial Vehicle.- Power Analysis Attack Based on BS-XGboost Scheme.- Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy.- Cybersecurity and forensics.- APTBert: Abstract Generation and Event Extraction from APT Reports.- Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim.- DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery.- Improvement of An Identity-Based Aggregate Signature Protocol From Lattice.- A Measurement Study on Interprocess Code Propagation of Malicious Software.- An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network.- ForensiQ: A Knowledge Graph Question Answering System for IoT Forensics.- I've Got You, Under MySkin: Biohacking Augmentation Implant Forensics.- Quantum Computing Challenges and Impact on Cyber Security.
Erscheinungsdatum | 03.04.2024 |
---|---|
Reihe/Serie | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Zusatzinfo | XVI, 347 p. 121 illus., 83 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Artificial Intelligence • computer crime • Computer Networks • Computer Science • Computer Security • cryptocurrency forensics • cryptography • digital forensics • Information Security • Intrusion Detection • IoT Forensics • multimedia forensics • Network Security • password cracking • Quantum Security |
ISBN-10 | 3-031-56582-7 / 3031565827 |
ISBN-13 | 978-3-031-56582-3 / 9783031565823 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich