04520nam 22006975 450 991029929370332120251225201939.03-319-73697-310.1007/978-3-319-73697-6(CKB)4100000001794995(DE-He213)978-3-319-73697-6(MiAaPQ)EBC6283636(MiAaPQ)EBC5588805(Au-PeEL)EBL5588805(OCoLC)1021187949(PPN)223956244(EXLCZ)99410000000179499520180105d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierDigital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings /edited by Petr Matoušek, Martin Schmiedecker1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (X, 235 p. 83 illus.) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-822X ;2163-319-73696-5 Includes bibliographical references and index.FindEvasion : An Effective Environment-sensitive Malware Detection System for the Cloud -- Real-time Forensics through Endpoint Visibility -- Locky ransomware, Al Capone and Brexit Deanonymization -- Finding and Rating Personal Names on Drives for Forensic Needs -- A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness -- Open Source Forensics for a Multi-platform Drone System -- A Novel File Carving Algorithm for EVTX Logs -- Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence -- Cyber Crime Investigation and Digital Forensics Triage -- Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector -- A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph --  Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees -- Approxis: a fast, robust, lightweight and approximate Disassembler considered inthe field of memory forensics -- Memory Forensics and the Macintosh OS X Operating System -- Sketch-based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation -- An Overview of the Usage of Default Passwords Hacking -- Automation of MitM Attack on Wi-Fi Networks -- SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle -- Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets.This book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017. The 18 full papers were selected from 50 submissions and are grouped in topical sections on malware and botnet, deanonymization, digital forensics tools, cybercrime investigation and digital forensics triage, digital forensics tools testing and validation, hacking.Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-822X ;216Data protectionComputersLaw and legislationInformation technologyLaw and legislationComputers and civilizationElectronic data processingManagementData and Information SecurityLegal Aspects of ComputingComputers and SocietyIT OperationsData protection.ComputersLaw and legislation.Information technologyLaw and legislation.Computers and civilization.Electronic data processingManagement.Data and Information Security.Legal Aspects of Computing.Computers and Society.IT Operations.363.25968Matoušek Petredthttp://id.loc.gov/vocabulary/relators/edtSchmiedecker Martinedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910299293703321Digital Forensics and Cyber Crime2022607UNINA