LEADER 01251nam 2200253la 450 001 9910482091803321 005 20221108093242.0 035 $a(UK-CbPIL)2090321621 035 $a(CKB)5500000000088254 035 $a(EXLCZ)995500000000088254 100 $a20210618d1639 uy | 101 0 $adut 135 $aurcn||||a|bb| 200 10$aTooneel vande mannelicke acht-baerheyt aengewesen. In de voor-sprake, teghen-sprake en wt-sprake gedaen over de weygheringhe van de coninginne Vasthi, aen de gesanten des Conincks Assuerus. Tot verbeteringhe van de huys-ghebreken deser eeuwe. Door I. Cats$b[electronic resource] 210 $a[s.l.] $c[s.n.]$d1639 215 $aOnline resource (XXXVI, 122 P, 12°) 300 $aReproduction of original in Koninklijke Bibliotheek, Nationale bibliotheek van Nederland. 700 $aCats$b Jacob$f1577-1660.$0677702 801 0$bUk-CbPIL 801 1$bUk-CbPIL 906 $aBOOK 912 $a9910482091803321 996 $aTooneel vande mannelicke acht-baerheyt aengewesen. In de voor-sprake, teghen-sprake en wt-sprake gedaen over de weygheringhe van de coninginne Vasthi, aen de gesanten des Conincks Assuerus. Tot verbeteringhe van de huys-ghebreken deser eeuwe. Door I. Cats$92231818 997 $aUNINA LEADER 06084nam 22008535 450 001 9910734889303321 005 20250528120524.0 010 $a9783031365744 010 $a3031365747 024 7 $a10.1007/978-3-031-36574-4 035 $a(MiAaPQ)EBC30649897 035 $a(Au-PeEL)EBL30649897 035 $a(DE-He213)978-3-031-36574-4 035 $a(PPN)272251712 035 $a(CKB)27601181800041 035 $a(EXLCZ)9927601181800041 100 $a20230715d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Forensics and Cyber Crime $e13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings /$fedited by Sanjay Goel, Pavel Gladyshev, Akatyev Nikolay, George Markowsky, Daryl Johnson 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (488 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v508 311 08$aPrint version: Goel, Sanjay Digital Forensics and Cyber Crime Cham : Springer,c2023 9783031365737 320 $aIncludes bibliographical references and index. 327 $aImage Forensics -- Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification -- Towards efficient on-site CSAM triage by clustering images from a source point of view -- Can Image Watermarking Efficiently Protect DeepLearning-Based Image Classifiers? ? A Preliminary Security Analysis of an IP-Protecting Method -- Forensics Analysis -- Digital Forensics Tool Evaluation on Deleted Files -- Forensic Analysis of Webex on the iOS Platform -- Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android -- Crypto Wallet Artifact Detection on Android Devices using Advanced Machine Learning Techniques -- SPREAD SPECTRUM ANALYSIS -- CSCD: A Cyber Security Community Detection Scheme on Online Social Networks -- Shedding Light on Monopoly: Temporal Analysis of Drug Trades -- Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding -- TRAFFIC ANALYSIS AND MONITORING -- MQTT Traffic Collection and ForensicAnalysis Framework -- IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft -- Crime and Incident Watch for Smart Cities: A Sensor-Based Approach -- Malware Analysis -- The Lightweight Botnet Detection Model Based on the Improved UNet -- On the application of active learning to handle data evolution in Android malware detection -- Volatility Custom Profiling for Automated Hybrid ELF Malware Detection -- Security Risk Management -- The Need for Biometric Anti-Spoofing Policies: The Case of Etsy -- VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning -- Are External Auditors Capable of Dealing with Cybersecurity Risks? -- Deep Learning-based Detection of Cyberattacks in Software-Defined Networks -- Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments -- Poisoning-Attack Detection using an Auto-Encoder for Deep Learning Models -- PRIVACY AND SECURITY -- Attribute-based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET -- PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data -- Cyber Crime undermines Data Privacy efforts ? On the Balance between Data Privacy and Security -- Automating the Flow of Data Between Digital Forensic Tools using Apache NiFi -- Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP) -- A General Steganalysis Method of QR Codes. 330 $aThis book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022. The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v508 606 $aArtificial intelligence 606 $aApplication software 606 $aComputers 606 $aComputer networks 606 $aData protection 606 $aArtificial Intelligence 606 $aComputer and Information Systems Applications 606 $aComputing Milieux 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aDelictes informàtics$2thub 606 $aControl d'accés als ordinadors$2thub 606 $aSeguretat informàtica$2thub 606 $aIntel·ligència artificial$2thub 606 $aProtecció de dades$2thub 608 $aCongressos$2thub 608 $aLlibres electrònics$2thub 615 0$aArtificial intelligence. 615 0$aApplication software. 615 0$aComputers. 615 0$aComputer networks. 615 0$aData protection. 615 14$aArtificial Intelligence. 615 24$aComputer and Information Systems Applications. 615 24$aComputing Milieux. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 615 7$aDelictes informàtics 615 7$aControl d'accés als ordinadors 615 7$aSeguretat informàtica. 615 7$aIntel·ligència artificial 615 7$aProtecció de dades 676 $a363.25968 676 $a363.25968 702 $aGoel$b Sanjay$f1964- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910734889303321 996 $aDigital Forensics and Cyber Crime$92022607 997 $aUNINA