


default search action
12th ICDF2C 2021: Virtual Event / Singapore
- Pavel Gladyshev, Sanjay Goel, Joshua James, George Markowsky, Daryl Johnson:

Digital Forensics and Cyber Crime - 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 441, Springer 2022, ISBN 978-3-031-06364-0 - Miguel Martín-Pérez

, Ricardo J. Rodríguez:
Quantifying Paging on Recoverable Data from Windows User-Space Modules. 1-19 - M. A. Hannan Bin Azhar

, Jake Timms, Benjamin Tilley:
Forensic Investigations of Google Meet and Microsoft Teams - Two Popular Conferencing Tools in the Pandemic. 20-34 - Tiffanie Edwards, Syria McCullough, Mohamed Nassar, Ibrahim M. Baggili

:
On Exploring the Sub-domain of Artificial Intelligence (AI) Model Forensics. 35-51 - Andrew Mahr, Robert Serafin, Cinthya Grajeda, Ibrahim M. Baggili

:
Auto-Parser: Android Auto and Apple CarPlay Forensics. 52-71 - Thomas Göbel, Frieder Uhlig, Harald Baier:

Find My IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows. 72-92 - Richard Buurke

, Nhien-An Le-Khac
:
Accessing Secure Data on Android Through Application Analysis. 93-108 - Xiaoyi Duan

, You Li
, Chengyuan Liu
, Xiuying Li, Wenfeng Liu, Guoqian Li:
Research on the Method of Selecting the Optimal Feature Subset in Big Data for Energy Analysis Attack. 109-126 - Weicong Huang

, Qisheng Guang, Dong Jiang, Lijun Chen:
Cheating Sensitive Security Quantum Bit Commitment with Security Distance Function. 127-138 - Michael Mundt, Harald Baier:

Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK Framework. 139-158 - Aikaterini Kanta

, Iwen Coisel
, Mark Scanlon
:
PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality. 159-175 - Haoran Ou, Yongyan Guo, Chaoyi Huang, Zhiying Zhao, Wenbo Guo, Yong Fang

, Cheng Huang:
No Pie in the Sky: The Digital Currency Fraud Website Detection. 176-193 - Kong Huang, Ke Zhang, Jiongyi Chen, Menghan Sun, Wei Sun, Di Tang, Kehuan Zhang:

Understanding the Brains and Brawn of Illicit Streaming App. 194-214 - Zhenzhou Tian, Hengchao Mao, Yaqian Huang, Jie Tian, Jinrui Li:

Fine-Grained Obfuscation Scheme Recognition on Binary Code. 215-228 - Anthony Cheuk Tung Lai, Ken Wai Kin Wong, Johnny Tsz Wun Wong, Austin Tsz Wai Lau, Alan Po Lun Ho, Shuai Wang, Jogesh Muppala:

Backdoor Investigation and Incident Response: From Zero to Profit. 229-247 - Na Li, Haoyu Zhang, Zhihui Hu, Guang Kou, Huadong Dai:

Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention. 248-264 - Zhenzhen Zhang, Henan Shi, Xinghao Jiang, Zhaohong Li, Jindou Liu:

A CNN-Based HEVC Video Steganalysis Against DCT/DST-Based Steganography. 265-276 - Milad Taleby Ahvanooey

, Mark Xuefang Zhu, Wojciech Mazurczyk, Max Kilger, Kim-Kwang Raymond Choo:
Do Dark Web and Cryptocurrencies Empower Cybercriminals? 277-293 - Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Charles A. Kamhoua:

Lightweight On-Demand Honeypot Deployment for Cyber Deception. 294-312 - Alexander Mühle, Andreas Grüner, Christoph Meinel:

Gotta Catch'em All! Improving P2P Network Crawling Strategies. 313-327 - Elizabeth Wyss, Drew Davidson:

Parcae: A Blockchain-Based PRF Service for Everyone. 328-341 - Fatima-Zahra Boujdad, David Niyitegeka, Reda Bellafqira, Gouenou Coatrieux, Emmanuelle Génin, Mario Südholt:

A Hybrid Cloud Deployment Architecture for Privacy-Preserving Collaborative Genome-Wide Association Studies. 342-359 - Xiaoyu Cao, Neil Zhenqiang Gong:

Understanding the Security of Deepfake Detection. 360-378

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














