LEADER 05576nam 22007455 450 001 9911007460103321 005 20250524130232.0 010 $a3-031-89363-8 024 7 $a10.1007/978-3-031-89363-6 035 $a(CKB)39124576900041 035 $a(DE-He213)978-3-031-89363-6 035 $a(MiAaPQ)EBC32130307 035 $a(Au-PeEL)EBL32130307 035 $a(EXLCZ)9939124576900041 100 $a20250524d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Forensics and Cyber Crime $e15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9?10, 2024, Proceedings, Part I /$fedited by Sanjay Goel, Ersin Uzun, Mengjun Xie, Sumantra Sarkar 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XVII, 357 p. 121 illus., 102 illus. in color.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v613 311 08$a3-031-89362-X 327 $a -- Artificial Intelligence & Security. -- Hacking Mobile Biometrics with the Photograph of a Fingerprint. -- Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling. -- Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review. -- CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning. -- Multimedia Forensics. -- Toward Forensic-Friendly AI: Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness. -- The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router. -- ENF Match with Masking: a new method for searching with sparse signal. -- Lightweight Multi-Tier IDS for UAV Networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence. -- Intrusion Detection. -- Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model. -- APTChaser: Cyber Threat Attribution via Attack Technique Modeling. -- What Do We Know About the Psychology of Insider Threats?. -- A Digital Profiling Triage Model for Industrial Espionage. -- Intrusion and Fraud Detection. -- Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning. -- Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture. -- ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning. -- Large Language Models, Advances in Security and Forensics. -- Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails. -- SecureSem: Sensitive Text Classification based on Semantic Feature Optimization. -- The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI. -- Advances in Security and Forensics. -- Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review. -- Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project. 330 $aThe two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9?10, 2024. The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics. Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v613 606 $aData protection 606 $aApplication software 606 $aComputer systems 606 $aComputer networks 606 $aSoftware engineering 606 $aOperating systems (Computers) 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aComputer System Implementation 606 $aComputer Communication Networks 606 $aSoftware Engineering 606 $aOperating Systems 615 0$aData protection. 615 0$aApplication software. 615 0$aComputer systems. 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aOperating systems (Computers) 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aComputer System Implementation. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aOperating Systems. 676 $a005.8 702 $aGoel$b Sanjay$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aUzun$b Ersin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXie$b Mengjun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSarkar$b Sumantra$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911007460103321 996 $aDigital Forensics and Cyber Crime$92022607 997 $aUNINA