Digital Forensics and Cyber Crime
Springer International Publishing (Verlag)
978-3-319-73696-9 (ISBN)
FindEvasion : An Effective Environment-sensitive Malware Detection System for the Cloud.- Real-time Forensics through Endpoint Visibility.- Locky ransomware, Al Capone and Brexit Deanonymization.- Finding and Rating Personal Names on Drives for Forensic Needs.- A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness.- Open Source Forensics for a Multi-platform Drone System.- A Novel File Carving Algorithm for EVTX Logs.- Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence.- Cyber Crime Investigation and Digital Forensics Triage.- Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector.- A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph.- Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees.- Approxis: a fast, robust, lightweight and approximate Disassembler considered inthe field of memory forensics.- Memory Forensics and the Macintosh OS X Operating System.- Sketch-based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation.- An Overview of the Usage of Default Passwords Hacking.- Automation of MitM Attack on Wi-Fi Networks.- SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle.- Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets.
| Erscheinungsdatum | 11.01.2018 |
|---|---|
| Reihe/Serie | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Zusatzinfo | X, 235 p. 83 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 382 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Applications • Artificial Intelligence • authentication • computer crime • computer operating systems • Computer Science • conference proceedings • cybercrime • digital forensics • Informatics • machine learning • Malware • network forensics • Personal Data • privacy • Research • security • Visualization |
| ISBN-10 | 3-319-73696-5 / 3319736965 |
| ISBN-13 | 978-3-319-73696-9 / 9783319736969 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich