Vai al contenuto principale della pagina
| Titolo: |
Digital Forensics and Cyber Crime : 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9–10, 2024, Proceedings, Part I / / edited by Sanjay Goel, Ersin Uzun, Mengjun Xie, Sumantra Sarkar
|
| Pubblicazione: | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Edizione: | 1st ed. 2025. |
| Descrizione fisica: | 1 online resource (XVII, 357 p. 121 illus., 102 illus. in color.) |
| Disciplina: | 005.8 |
| Soggetto topico: | Data protection |
| Application software | |
| Computer systems | |
| Computer networks | |
| Software engineering | |
| Operating systems (Computers) | |
| Data and Information Security | |
| Computer and Information Systems Applications | |
| Computer System Implementation | |
| Computer Communication Networks | |
| Software Engineering | |
| Operating Systems | |
| Persona (resp. second.): | GoelSanjay |
| UzunErsin | |
| XieMengjun | |
| SarkarSumantra | |
| Nota di contenuto: | -- Artificial Intelligence & Security. -- Hacking Mobile Biometrics with the Photograph of a Fingerprint. -- Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling. -- Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review. -- CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning. -- Multimedia Forensics. -- Toward Forensic-Friendly AI: Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness. -- The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router. -- ENF Match with Masking: a new method for searching with sparse signal. -- Lightweight Multi-Tier IDS for UAV Networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence. -- Intrusion Detection. -- Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model. -- APTChaser: Cyber Threat Attribution via Attack Technique Modeling. -- What Do We Know About the Psychology of Insider Threats?. -- A Digital Profiling Triage Model for Industrial Espionage. -- Intrusion and Fraud Detection. -- Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning. -- Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture. -- ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning. -- Large Language Models, Advances in Security and Forensics. -- Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails. -- SecureSem: Sensitive Text Classification based on Semantic Feature Optimization. -- The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI. -- Advances in Security and Forensics. -- Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review. -- Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project. |
| Sommario/riassunto: | The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9–10, 2024. The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics. Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats. |
| Titolo autorizzato: | Digital Forensics and Cyber Crime ![]() |
| ISBN: | 3-031-89363-8 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9911007460103321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |