03833nam 22006735 450 991033785420332120251225190507.03-030-05487-X10.1007/978-3-030-05487-8(CKB)4100000007334948(DE-He213)978-3-030-05487-8(MiAaPQ)EBC5927521(PPN)232964815(EXLCZ)99410000000733494820181229d2019 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierDigital Forensics and Cyber Crime 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings /edited by Frank Breitinger, Ibrahim Baggili1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (X, 235 p. 317 illus., 31 illus. in color.) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-822X ;259Includes index.3-030-05486-1 On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving -- fishy - A Framework for Implementing Filesystem-based Data Hiding Techniques -- If I Had a Million Cryptos: Cryptowallet Application Analysis and A Trojan Proof-of-Concept -- AndroParse - An Android Feature Extraction -- Digital Forensic Readiness Framework for Ransomware Investigation -- Forensics Analysis of an On-line Game over Steam Platform -- A Digital Forensic Investigation and Verification Model for Industria l Espionage -- Hard Drives and Digital Forensics -- Solid State Drive Forensics: Where Do We Stand? -- Associating Drives Based on Their Artifact and Metadata Distributions -- Digital Forensics Event Graph Reconstruction -- Multi-Item Passphrases: A Self-Adaptive Approach -- Against Offline Guessing Attacks -- Hybrid Intrusion Detection System for Worm Attacks Based on Their Network Behavior.This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018. The 11 reviewed full papers and 1 short paper were selected from 33 submissions and are grouped in topical sections on carving and data hiding, android, forensic readiness, hard drives and digital forensics, artefact correlation.Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-822X ;259Artificial intelligenceData protectionComputersLaw and legislationInformation technologyLaw and legislationSoftware engineeringArtificial IntelligenceData and Information SecurityLegal Aspects of ComputingSoftware EngineeringArtificial intelligence.Data protection.ComputersLaw and legislation.Information technologyLaw and legislation.Software engineering.Artificial Intelligence.Data and Information Security.Legal Aspects of Computing.Software Engineering.363.25968005.8Breitinger Frankedthttp://id.loc.gov/vocabulary/relators/edtBaggili Ibrahimedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910337854203321Digital Forensics and Cyber Crime2022607UNINA