LEADER 03833nam 22006735 450 001 9910337854203321 005 20251225190507.0 010 $a3-030-05487-X 024 7 $a10.1007/978-3-030-05487-8 035 $a(CKB)4100000007334948 035 $a(DE-He213)978-3-030-05487-8 035 $a(MiAaPQ)EBC5927521 035 $a(PPN)232964815 035 $a(EXLCZ)994100000007334948 100 $a20181229d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Forensics and Cyber Crime $e10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10?12, 2018, Proceedings /$fedited by Frank Breitinger, Ibrahim Baggili 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (X, 235 p. 317 illus., 31 illus. in color.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v259 300 $aIncludes index. 311 08$a3-030-05486-1 327 $aOn Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving -- fishy - A Framework for Implementing Filesystem-based Data Hiding Techniques -- If I Had a Million Cryptos: Cryptowallet Application Analysis and A Trojan Proof-of-Concept -- AndroParse - An Android Feature Extraction -- Digital Forensic Readiness Framework for Ransomware Investigation -- Forensics Analysis of an On-line Game over Steam Platform -- A Digital Forensic Investigation and Verification Model for Industria l Espionage -- Hard Drives and Digital Forensics -- Solid State Drive Forensics: Where Do We Stand? -- Associating Drives Based on Their Artifact and Metadata Distributions -- Digital Forensics Event Graph Reconstruction -- Multi-Item Passphrases: A Self-Adaptive Approach -- Against Offline Guessing Attacks -- Hybrid Intrusion Detection System for Worm Attacks Based on Their Network Behavior. 330 $aThis book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018. The 11 reviewed full papers and 1 short paper were selected from 33 submissions and are grouped in topical sections on carving and data hiding, android, forensic readiness, hard drives and digital forensics, artefact correlation. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v259 606 $aArtificial intelligence 606 $aData protection 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aSoftware engineering 606 $aArtificial Intelligence 606 $aData and Information Security 606 $aLegal Aspects of Computing 606 $aSoftware Engineering 615 0$aArtificial intelligence. 615 0$aData protection. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aSoftware engineering. 615 14$aArtificial Intelligence. 615 24$aData and Information Security. 615 24$aLegal Aspects of Computing. 615 24$aSoftware Engineering. 676 $a363.25968 676 $a005.8 702 $aBreitinger$b Frank$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBaggili$b Ibrahim$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337854203321 996 $aDigital Forensics and Cyber Crime$92022607 997 $aUNINA