| 紀錄類型: |
書目-電子資源
: Monograph/item
|
| 正題名/作者: |
Digital forensics and cyber crime/ edited by Sanjay Goel ... [et al.]. |
| 其他題名: |
15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024 : proceedings. |
| 其他題名: |
ICDF2C 2024 |
| 其他作者: |
Goel, Sanjay. |
| 團體作者: |
International Conference on Digital Forensics and Cyber Crime |
| 出版者: |
Cham :Springer Nature Switzerland : : 2025., |
| 面頁冊數: |
xvii, 359 p. :ill. (some col.), digital ;24 cm. |
| 內容註: |
Security Analytics, Threat Intelligence, Multimedia Forensics. -- Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse. -- EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency. -- Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security. -- Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators. -- ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats. -- Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data. -- A Comprehensive Survey on Basic Safety Message Attacks and Their Detection. -- BGETC: An Encrypted Traffic Classification Method Based on BERT and GRU. -- AnGSL: Graph-Based Android Malware Detection Method. -- Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching. -- MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network. -- An IP Anti-Geolocation Method Based on Constructed Landmarks. -- Burst Sequence Based Graph Neural Network for Video Traffic Identification. -- KP-WF: Cross-domain Few-shot Website Fingerprinting. -- Generative AI, Emerging Threats. -- Pixel-level Face Correction Task for More Generalized Deepfake Detection. -- Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data. -- Driven to Evidence: The Digital Forensic Trail of Vehicles. -- Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing. -- Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack. -- Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals. |
| Contained By: |
Springer Nature eBook |
| 標題: |
Computer crimes - Congresses. - Investigation - |
| 電子資源: |
https://doi.org/10.1007/978-3-031-89360-5 |
| ISBN: |
9783031893605 |