Fr. 84.00

Digital Forensics and Cyber Crime - 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II

Anglais · Livre de poche

Expédition généralement dans un délai de 6 à 7 semaines

Description

En savoir plus

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9 10, 2024.
The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:
Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.
Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

Table des matières

.- Security Analytics, Threat Intelligence, Multimedia Forensics.
.- Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse.
.- EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency.
.- Auto-TFCE: Automatic Tra ic Feature Code Extraction Method and Its Application in Cyber Security.
.- Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators.
.- ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats.
.- Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data.
.- A Comprehensive Survey on Basic Safety Message Attacks and Their Detection.
.- BGETC: An Encrypted Tra ic Classification Method Based on BERT and GRU.
.- AnGSL: Graph-Based Android Malware Detection Method.
.- Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching.
.- MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network.
.- An IP Anti-Geolocation Method Based on Constructed Landmarks.
.- Burst Sequence Based Graph Neural Network for Video Tra ic Identification.
.- KP-WF: Cross-domain Few-shot Website Fingerprinting.
.- Generative AI, Emerging Threats. 
.- Pixel-level Face Correction Task for More Generalized Deepfake Detection.
.- Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data.
.- Driven to Evidence: The Digital Forensic Trail of Vehicles.
.- Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing.
.- Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack.
.-  Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals.

Résumé

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9–10, 2024.
The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:
Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.
Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

Commentaires des clients

Aucune analyse n'a été rédigée sur cet article pour le moment. Sois le premier à donner ton avis et aide les autres utilisateurs à prendre leur décision d'achat.

Écris un commentaire

Super ou nul ? Donne ton propre avis.

Pour les messages à CeDe.ch, veuillez utiliser le formulaire de contact.

Il faut impérativement remplir les champs de saisie marqués d'une *.

En soumettant ce formulaire, tu acceptes notre déclaration de protection des données.