03366oam 2200493 450 99646452010331620210630143520.03-030-68734-110.1007/978-3-030-68734-2(CKB)4100000011751957(DE-He213)978-3-030-68734-2(MiAaPQ)EBC6473605(PPN)253859646(EXLCZ)99410000001175195720210630d2021 uy 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierDigital forensics and cyber crime 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, proceedings /Editor, Sanjay Goel [and four others]1st ed. 2021.Cham, Switzerland :Springer,[2021]©20211 online resource (XII, 251 p. 109 illus., 76 illus. in color.) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-8211 ;351Includes index.3-030-68733-3 On Reliability of JA3 Hashes for Fingerprinting Mobile Applications -- Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations -- Evidence gathering in IoT criminal investigation Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor -- A Partial Approach to Intrusion Detection -- Efficient Fingerprint Matching for Forensic Event Reconstruction -- Modelling GOP structure effects on ENF-based video forensics -- Android Dumpsys Analysis to Indicate Driver Distraction -- Adapting to local conditions: Similarities and differences in anonymous online market between Chinese and English Speaking Communities -- Remote air-gap Live forensics -- A Digital Forensic Approach for Optimizing the Investigation of Hit-And-Run Accidents -- -- An Intelligence Criminal Tracker for Industrial Espionage: Applying Digital Data Acquired Onsite to Target Criminals -- Retracing the Flow of the Stream: Investigating Kodi Streaming Services -- Cybersecurity Methodology for Specialized Behavior Analysis -- Neural Representation Learning Based Binary Code Authorship Attribution.This book constitutes the refereed proceedings of the 11th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2020, held in Boston, MA, in October 2020. Due to COVID-19 pandemic the conference was held virtually. The 11 reviewed full papers and 4 short papers were selected from 35 submissions and are grouped in topical sections on digital forensics; cyber-physical system Forensics; event reconstruction in digital forensics; emerging topics in forensics; cybersecurity and digital forensics.Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-8211 ;351SecurityArtificial intelligenceSecurity.Artificial intelligence.060Goel Sanjay1964-MiAaPQMiAaPQUtOrBLWBOOK996464520103316Digital Forensics and Cyber Crime2022607UNISA01102nam 2200325Ka 450 991069589200332120070504142347.0(CKB)5470000002372867(OCoLC)123988718(EXLCZ)99547000000237286720070504d2004 ua 0engtxtrdacontentcrdamediacrrdacarrierManufacturing operations[electronic resource] control weaknesses and poor management oversight in the Mint's purchase card program[Washington, D.C.] :Office of Inspector General, Dept. of the Treasury,[2004]46 pages digital, PDF fileAudit report ;OIG-04-029Title from title screen (viewed on May 4, 2007)."March 2, 2004."Manufacturing operations Government purchase cardsUnited StatesGovernment purchase cardsGPOGPOBOOK9910695892003321Manufacturing operations3435642UNINA