Digital Forensics and Cyber Crime
Springer International Publishing (Verlag)
978-3-031-89362-9 (ISBN)
The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9 10, 2024.
The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:
Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.
Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.
.- Artificial Intelligence & Security.
.- Hacking Mobile Biometrics with the Photograph of a Fingerprint.
.- Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling.
.- Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review.
.- CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning.
.- Multimedia Forensics.
.- Toward Forensic-Friendly AI: Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness.
.- The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router.
.- ENF Match with Masking: a new method for searching with sparse signal.
.- Lightweight Multi-Tier IDS for UAV Networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence.
.- Intrusion Detection.
.- Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model.
.- APTChaser: Cyber Threat Attribution via Attack Technique Modeling.
.- What Do We Know About the Psychology of Insider Threats?.
.- A Digital Profiling Triage Model for Industrial Espionage.
.- Intrusion and Fraud Detection.
.- Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning.
.- Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture.
.- ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning.
.- Large Language Models, Advances in Security and Forensics.
.- Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails.
.- SecureSem: Sensitive Text Classification based on Semantic Feature Optimization.
.- The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI.
.- Advances in Security and Forensics.
.- Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review.
.- Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project.
| Erscheinungsdatum | 27.05.2025 |
|---|---|
| Reihe/Serie | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Zusatzinfo | XVII, 357 p. 121 illus., 102 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Artificial Intelligence (AI) Security • emerging threats • fraud detection • generative AI • Intrusion Detection • Large Language Models • multimedia forensics • Security analytics • Threat intelligence |
| ISBN-10 | 3-031-89362-X / 303189362X |
| ISBN-13 | 978-3-031-89362-9 / 9783031893629 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich