05395nam 22007455 450 991100746400332120250524130226.03-031-89360-310.1007/978-3-031-89360-5(CKB)39124577100041(DE-He213)978-3-031-89360-5(MiAaPQ)EBC32130294(Au-PeEL)EBL32130294(EXLCZ)993912457710004120250524d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierDigital Forensics and Cyber Crime 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9–10, 2024, Proceedings, Part II /edited by Sanjay Goel, Ersin Uzun, Mengjun Xie, Sumantra Sarkar1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (XVII, 359 p. 127 illus., 104 illus. in color.) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-822X ;6143-031-89359-X -- Security Analytics, Threat Intelligence, Multimedia Forensics. -- Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse. -- EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency. -- Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security. -- Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators. -- ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats. -- Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data. -- A Comprehensive Survey on Basic Safety Message Attacks and Their Detection. -- BGETC: An Encrypted Traffic Classification Method Based on BERT and GRU. -- AnGSL: Graph-Based Android Malware Detection Method. -- Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching. -- MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network. -- An IP Anti-Geolocation Method Based on Constructed Landmarks. -- Burst Sequence Based Graph Neural Network for Video Traffic Identification. -- KP-WF: Cross-domain Few-shot Website Fingerprinting. -- Generative AI, Emerging Threats. -- Pixel-level Face Correction Task for More Generalized Deepfake Detection. -- Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data. -- Driven to Evidence: The Digital Forensic Trail of Vehicles. -- Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing. -- Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack. -- Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals.The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9–10, 2024. The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics. Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-822X ;614Data protectionApplication softwareComputer systemsComputer networksSoftware engineeringOperating systems (Computers)Data and Information SecurityComputer and Information Systems ApplicationsComputer System ImplementationComputer Communication NetworksSoftware EngineeringOperating SystemsData protection.Application software.Computer systems.Computer networks.Software engineering.Operating systems (Computers)Data and Information Security.Computer and Information Systems Applications.Computer System Implementation.Computer Communication Networks.Software Engineering.Operating Systems.005.8Goel Sanjayedthttp://id.loc.gov/vocabulary/relators/edtUzun Ersinedthttp://id.loc.gov/vocabulary/relators/edtXie Mengjunedthttp://id.loc.gov/vocabulary/relators/edtSarkar Sumantraedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9911007464003321Digital Forensics and Cyber Crime2022607UNINA