This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022.
The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.
Reihe
Auflage
Sprache
Verlagsort
Verlagsgruppe
Springer International Publishing
Illustrationen
142
150 farbige Abbildungen, 142 s/w Abbildungen
XIII, 486 p. 292 illus., 150 illus. in color.
Dateigröße
ISBN-13
978-3-031-36574-4 (9783031365744)
DOI
10.1007/978-3-031-36574-4
Schweitzer Klassifikation
Image Forensics.- Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification.- Towards efficient on-site CSAM triage by clustering images from a source point of view.- Can Image Watermarking Efficiently Protect DeepLearning-Based Image Classifiers? - A Preliminary Security Analysis of an IP-Protecting Method.- Forensics Analysis.- Digital Forensics Tool Evaluation on Deleted Files.- Forensic Analysis of Webex on the iOS Platform.- Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android.- Crypto Wallet Artifact Detection on Android Devices using Advanced Machine Learning Techniques.- SPREAD SPECTRUM ANALYSIS.- CSCD: A Cyber Security Community Detection Scheme on Online Social Networks.- Shedding Light on Monopoly: Temporal Analysis of Drug Trades.- Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding.- TRAFFIC ANALYSIS AND MONITORING.- MQTT Traffic Collection and ForensicAnalysis Framework.- IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft.- Crime and Incident Watch for Smart Cities: A Sensor-Based Approach.- Malware Analysis.- The Lightweight Botnet Detection Model Based on the Improved UNet.- On the application of active learning to handle data evolution in Android malware detection.- Volatility Custom Profiling for Automated Hybrid ELF Malware Detection.- Security Risk Management.- The Need for Biometric Anti-Spoofing Policies: The Case of Etsy.- VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning.- Are External Auditors Capable of Dealing with Cybersecurity Risks?.- Deep Learning-based Detection of Cyberattacks in Software-Defined Networks.- Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments.- Poisoning-Attack Detection using an Auto-Encoder for Deep Learning Models.- PRIVACY AND SECURITY.- Attribute-based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET.- PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data.- Cyber Crime undermines Data Privacy efforts - On the Balance between Data Privacy and Security.- Automating the Flow of Data Between Digital Forensic Tools using Apache NiFi.- Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP).- A General Steganalysis Method of QR Codes.