
The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9 10, 2024.
The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:
Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.
Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.
Inhaltsverzeichnis
. - Security Analytics, Threat Intelligence, Multimedia Forensics.
. - Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse.
. - EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency.
. - Auto-TFCE: Automatic Tra ic Feature Code Extraction Method and Its Application in Cyber Security.
. - Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators.
. - ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats.
. - Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data.
. - A Comprehensive Survey on Basic Safety Message Attacks and Their Detection.
. - BGETC: An Encrypted Tra ic Classification Method Based on BERT and GRU.
. - AnGSL: Graph-Based Android Malware Detection Method.
. - Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching.
. - MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network.
. - An IP Anti-Geolocation Method Based on Constructed Landmarks.
. - Burst Sequence Based Graph Neural Network for Video Tra ic Identification.
. - KP-WF: Cross-domain Few-shot Website Fingerprinting.
. - Generative AI, Emerging Threats.
. - Pixel-level Face Correction Task for More Generalized Deepfake Detection.
. - Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data.
. - Driven to Evidence: The Digital Forensic Trail of Vehicles.
. - Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing.
. - Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack.
. - Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals.
Es wurden noch keine Bewertungen abgegeben. Schreiben Sie die erste Bewertung zu "Digital Forensics and Cyber Crime" und helfen Sie damit anderen bei der Kaufentscheidung.