Fr. 123.00

Digital Forensics and Cyber Crime - 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part I

English, German · Paperback / Softback

Will be released 21.06.2025

Description

Read more

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9 10, 2024.
The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:
Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.
Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

List of contents

.- Artificial Intelligence & Security.
.- Hacking Mobile Biometrics with the Photograph of a Fingerprint.
.- Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling.
.- Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review.
.- CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning.
.- Multimedia Forensics. 
.- Toward Forensic-Friendly AI: Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness.
.- The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router.
.- ENF Match with Masking: a new method for searching with sparse signal.
.- Lightweight Multi-Tier IDS for UAV Networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence.
.- Intrusion Detection.
.- Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model.
.- APTChaser: Cyber Threat Attribution via Attack Technique Modeling.
.- What Do We Know About the Psychology of Insider Threats?.
.- A Digital Profiling Triage Model for Industrial Espionage.
.- Intrusion and Fraud Detection.
.- Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning.
.- Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture.
.- ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning.
.- Large Language Models, Advances in Security and Forensics.
.- Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails.
.- SecureSem: Sensitive Text Classification based on Semantic Feature Optimization.
.- The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI.
.- Advances in Security and Forensics.
.- Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review.
.- Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project.

Summary

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9–10, 2024.
The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:
Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.
Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.