Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9–10, 2024, Proceedings, Part II

Author:   Sanjay Goel ,  Ersin Uzun ,  Mengjun Xie ,  Sumantra Sarkar
Publisher:   Springer International Publishing AG
Volume:   614
ISBN:  

9783031893599


Pages:   359
Publication Date:   25 May 2025
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $142.29 Quantity:  
Add to Cart

Share |

Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9–10, 2024, Proceedings, Part II


Overview

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9–10, 2024. The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics. Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

Full Product Details

Author:   Sanjay Goel ,  Ersin Uzun ,  Mengjun Xie ,  Sumantra Sarkar
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Volume:   614
ISBN:  

9783031893599


ISBN 10:   303189359
Pages:   359
Publication Date:   25 May 2025
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

.- Security Analytics, Threat Intelligence, Multimedia Forensics. .- Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse. .- EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency. .- Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security. .- Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators. .- ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats. .- Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data. .- A Comprehensive Survey on Basic Safety Message Attacks and Their Detection. .- BGETC: An Encrypted Traffic Classification Method Based on BERT and GRU. .- AnGSL: Graph-Based Android Malware Detection Method. .- Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching. .- MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network. .- An IP Anti-Geolocation Method Based on Constructed Landmarks. .- Burst Sequence Based Graph Neural Network for Video Traffic Identification. .- KP-WF: Cross-domain Few-shot Website Fingerprinting. .- Generative AI, Emerging Threats.  .- Pixel-level Face Correction Task for More Generalized Deepfake Detection. .- Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data. .- Driven to Evidence: The Digital Forensic Trail of Vehicles. .- Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing. .- Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack. .-  Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List