default search action
12th ICDF2C 2021: Virtual Event / Singapore
- Pavel Gladyshev, Sanjay Goel, Joshua James, George Markowsky, Daryl Johnson:
Digital Forensics and Cyber Crime - 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 441, Springer 2022, ISBN 978-3-031-06364-0 - Miguel Martín-Pérez, Ricardo J. Rodríguez:
Quantifying Paging on Recoverable Data from Windows User-Space Modules. 1-19 - M. A. Hannan Bin Azhar, Jake Timms, Benjamin Tilley:
Forensic Investigations of Google Meet and Microsoft Teams - Two Popular Conferencing Tools in the Pandemic. 20-34 - Tiffanie Edwards, Syria McCullough, Mohamed Nassar, Ibrahim M. Baggili:
On Exploring the Sub-domain of Artificial Intelligence (AI) Model Forensics. 35-51 - Andrew Mahr, Robert Serafin, Cinthya Grajeda, Ibrahim M. Baggili:
Auto-Parser: Android Auto and Apple CarPlay Forensics. 52-71 - Thomas Göbel, Frieder Uhlig, Harald Baier:
Find My IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows. 72-92 - Richard Buurke, Nhien-An Le-Khac:
Accessing Secure Data on Android Through Application Analysis. 93-108 - Xiaoyi Duan, You Li, Chengyuan Liu, Xiuying Li, Wenfeng Liu, Guoqian Li:
Research on the Method of Selecting the Optimal Feature Subset in Big Data for Energy Analysis Attack. 109-126 - Weicong Huang, Qisheng Guang, Dong Jiang, Lijun Chen:
Cheating Sensitive Security Quantum Bit Commitment with Security Distance Function. 127-138 - Michael Mundt, Harald Baier:
Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK Framework. 139-158 - Aikaterini Kanta, Iwen Coisel, Mark Scanlon:
PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality. 159-175 - Haoran Ou, Yongyan Guo, Chaoyi Huang, Zhiying Zhao, Wenbo Guo, Yong Fang, Cheng Huang:
No Pie in the Sky: The Digital Currency Fraud Website Detection. 176-193 - Kong Huang, Ke Zhang, Jiongyi Chen, Menghan Sun, Wei Sun, Di Tang, Kehuan Zhang:
Understanding the Brains and Brawn of Illicit Streaming App. 194-214 - Zhenzhou Tian, Hengchao Mao, Yaqian Huang, Jie Tian, Jinrui Li:
Fine-Grained Obfuscation Scheme Recognition on Binary Code. 215-228 - Anthony Cheuk Tung Lai, Ken Wai Kin Wong, Johnny Tsz Wun Wong, Austin Tsz Wai Lau, Alan Po Lun Ho, Shuai Wang, Jogesh Muppala:
Backdoor Investigation and Incident Response: From Zero to Profit. 229-247 - Na Li, Haoyu Zhang, Zhihui Hu, Guang Kou, Huadong Dai:
Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention. 248-264 - Zhenzhen Zhang, Henan Shi, Xinghao Jiang, Zhaohong Li, Jindou Liu:
A CNN-Based HEVC Video Steganalysis Against DCT/DST-Based Steganography. 265-276 - Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Max Kilger, Kim-Kwang Raymond Choo:
Do Dark Web and Cryptocurrencies Empower Cybercriminals? 277-293 - Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Charles A. Kamhoua:
Lightweight On-Demand Honeypot Deployment for Cyber Deception. 294-312 - Alexander Mühle, Andreas Grüner, Christoph Meinel:
Gotta Catch'em All! Improving P2P Network Crawling Strategies. 313-327 - Elizabeth Wyss, Drew Davidson:
Parcae: A Blockchain-Based PRF Service for Everyone. 328-341 - Fatima-Zahra Boujdad, David Niyitegeka, Reda Bellafqira, Gouenou Coatrieux, Emmanuelle Génin, Mario Südholt:
A Hybrid Cloud Deployment Architecture for Privacy-Preserving Collaborative Genome-Wide Association Studies. 342-359 - Xiaoyu Cao, Neil Zhenqiang Gong:
Understanding the Security of Deepfake Detection. 360-378
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.