Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Digital Forensics and Cyber Crime -

Digital Forensics and Cyber Crime

15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9–10, 2024, Proceedings, Part II
Buch | Softcover
XVII, 359 Seiten
2025
Springer International Publishing (Verlag)
978-3-031-89359-9 (ISBN)
CHF 89,85 inkl. MwSt

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9 10, 2024.

The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:

Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.

Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

.- Security Analytics, Threat Intelligence, Multimedia Forensics.

.- Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse.

.- EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency.

.- Auto-TFCE: Automatic Tra ic Feature Code Extraction Method and Its Application in Cyber Security.

.- Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators.

.- ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats.

.- Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data.

.- A Comprehensive Survey on Basic Safety Message Attacks and Their Detection.

.- BGETC: An Encrypted Tra ic Classification Method Based on BERT and GRU.

.- AnGSL: Graph-Based Android Malware Detection Method.

.- Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching.

.- MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network.

.- An IP Anti-Geolocation Method Based on Constructed Landmarks.

.- Burst Sequence Based Graph Neural Network for Video Tra ic Identification.

.- KP-WF: Cross-domain Few-shot Website Fingerprinting.

.- Generative AI, Emerging Threats. 

.- Pixel-level Face Correction Task for More Generalized Deepfake Detection.

.- Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data.

.- Driven to Evidence: The Digital Forensic Trail of Vehicles.

.- Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing.

.- Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack.

.-  Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals.

Erscheinungsdatum
Reihe/Serie Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Zusatzinfo XVII, 359 p. 127 illus., 104 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Artificial Intelligence (AI) Security • emerging threats • fraud detection • generative AI • Intrusion Detection • Large Language Models • multimedia forensics • Security analytics • Threat intelligence
ISBN-10 3-031-89359-X / 303189359X
ISBN-13 978-3-031-89359-9 / 9783031893599
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95