標(biāo)題: Titlebook: Digital Forensics and Cyber Crime; 12th EAI Internation Pavel Gladyshev,Sanjay Goel,Daryl Johnson Conference proceedings 2022 ICST Institut [打印本頁] 作者: 無法修復(fù) 時(shí)間: 2025-3-21 19:41
書目名稱Digital Forensics and Cyber Crime影響因子(影響力)
書目名稱Digital Forensics and Cyber Crime影響因子(影響力)學(xué)科排名
書目名稱Digital Forensics and Cyber Crime網(wǎng)絡(luò)公開度
書目名稱Digital Forensics and Cyber Crime網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Digital Forensics and Cyber Crime被引頻次
書目名稱Digital Forensics and Cyber Crime被引頻次學(xué)科排名
書目名稱Digital Forensics and Cyber Crime年度引用
書目名稱Digital Forensics and Cyber Crime年度引用學(xué)科排名
書目名稱Digital Forensics and Cyber Crime讀者反饋
書目名稱Digital Forensics and Cyber Crime讀者反饋學(xué)科排名
作者: 不溶解 時(shí)間: 2025-3-21 20:37
Victoria N. Hutchison,Simo Hostikka code obfuscation. The accuracy for the task of identifying whether the code is obfuscated reaches 98.6%, while the accuracy for the task of identifying the specific obfuscation algorithm performed reaches 97.6%.作者: 淡紫色花 時(shí)間: 2025-3-22 03:13
Victoria N. Hutchison,Simo Hostikkaer, we propose an incident response methodology matrix called BackDoor Incident Response Model (BDIRM) to handle incidents with backdoor effectively, thereby accelerating to eradicate the risk and impact of backdoor against organizations.作者: enflame 時(shí)間: 2025-3-22 08:05 作者: mosque 時(shí)間: 2025-3-22 10:07
Auto-Parser: Android Auto and Apple CarPlay Forensics,uced by these applications and propose a proof of concept open source tool to assist investigators in automatically extracting relevant artifacts from Android Auto and Apple CarPlay as well as other day-to-day essential applications.作者: crease 時(shí)間: 2025-3-22 13:02 作者: crease 時(shí)間: 2025-3-22 18:10
Backdoor Investigation and Incident Response: From Zero to Profit,er, we propose an incident response methodology matrix called BackDoor Incident Response Model (BDIRM) to handle incidents with backdoor effectively, thereby accelerating to eradicate the risk and impact of backdoor against organizations.作者: 傻 時(shí)間: 2025-3-23 00:31
,Gotta Catch’em All! Improving P2P Network Crawling Strategies,snapshot is reduced on average by 9% due to increased hit-rates during network crawling. While we show our improvements at the example of a new Bitcoin crawler, proven concepts can be transferred to other P2P networks as well.作者: Vertical 時(shí)間: 2025-3-23 03:40 作者: 不適 時(shí)間: 2025-3-23 08:50
Meeting Material and Physical Needs,e feature extraction part, a steganalysis residual block module and a squeeze-and-excitation (SE) block are designed to improve the network’s representation ability. In comparison to the existing steganalysis methods, experimental results show that the proposed network performs better to detect DCT/DST-based HEVC steganography.作者: 教育學(xué) 時(shí)間: 2025-3-23 11:52
A CNN-Based HEVC Video Steganalysis Against DCT/DST-Based Steganography,e feature extraction part, a steganalysis residual block module and a squeeze-and-excitation (SE) block are designed to improve the network’s representation ability. In comparison to the existing steganalysis methods, experimental results show that the proposed network performs better to detect DCT/DST-based HEVC steganography.作者: 典型 時(shí)間: 2025-3-23 14:03 作者: septicemia 時(shí)間: 2025-3-23 19:04
Conference proceedings 2022sent digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation..作者: Charlatan 時(shí)間: 2025-3-23 23:38
Ingestion Exposures in Residences paper, we present a novel modular framework to measure the quality of input wordlists according to several interconnecting metrics. Furthermore, we have conducted a preliminary analysis where we assess different input wordlists to showcase the framework’s evaluation process.作者: 類型 時(shí)間: 2025-3-24 05:23 作者: 從容 時(shí)間: 2025-3-24 09:29
,PCWQ: A Framework for?Evaluating Password Cracking Wordlist Quality, paper, we present a novel modular framework to measure the quality of input wordlists according to several interconnecting metrics. Furthermore, we have conducted a preliminary analysis where we assess different input wordlists to showcase the framework’s evaluation process.作者: albuminuria 時(shí)間: 2025-3-24 11:31 作者: 不給啤 時(shí)間: 2025-3-24 15:22
1867-8211 n security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation..978-3-031-06364-0978-3-031-06365-7Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: indenture 時(shí)間: 2025-3-24 21:54
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/d/image/279322.jpg作者: OFF 時(shí)間: 2025-3-24 23:20
Knowledge Transfer in Reshoringides solely in memory. During this process, the current state of system memory is acquired and saved to a file denoted as ., which is then analyzed with dedicated software for evidence. Although a memory dump contains large amounts of data for analysis, its content can be inaccurate and incomplete d作者: Cantankerous 時(shí)間: 2025-3-25 05:32 作者: 微枝末節(jié) 時(shí)間: 2025-3-25 08:03
Julia Johnson,Sheena Rolph,Randall Smiths paper, we pave the way towards further exploring a sub-domain of AI forensics, namely AI model forensics, and introduce AI model ballistics as a subfield inspired by forensic ballistics. AI model forensics studies the forensic investigation process, including where available evidence can be collec作者: dearth 時(shí)間: 2025-3-25 13:52 作者: 顯而易見 時(shí)間: 2025-3-25 18:41 作者: Charitable 時(shí)間: 2025-3-25 22:08
‘Policing’, Power and Perceptionsevice investigations. However, with the advance of encryption techniques applied by default in mobile operating systems, data access is more restrictive. Investigators normally do not have administrative control over the device, which requires them to employ various techniques to acquire system data作者: 符合規(guī)定 時(shí)間: 2025-3-26 03:23
‘Policing’, Power and Perceptionsre points is an important factor that affects the machine learning model, how to choose the optimal feature subset is a key factor related to the success or failure of energy analysis attack. AES algorithm emphasizes to increase the complexity of encrypted data by a large number of encryption rounds作者: 影響深遠(yuǎn) 時(shí)間: 2025-3-26 07:26
Scott Baker,Jeffrey Driver,David McCallumment protocol by introducing security distance function. Theoretical analysis shows that our protocol can guarantee the qubit commitment process is secure and has better performance than existing protocols in robustness. Since our protocol is simpler and more practical, it is feasible with current t作者: miscreant 時(shí)間: 2025-3-26 11:48 作者: 陳腐的人 時(shí)間: 2025-3-26 13:48 作者: Expediency 時(shí)間: 2025-3-26 16:52
Scott Baker,Jeffrey Driver,David McCallumo took place. One of the most common ways is to induce victims to invest. As a result criminals can obtain a large number of profits through fraud. Cybercriminals usually design the layout of digital currency fraud websites to be similar to normal digital currency websites. Use some words related to作者: receptors 時(shí)間: 2025-3-26 23:16 作者: 四牛在彎曲 時(shí)間: 2025-3-27 03:18
Victoria N. Hutchison,Simo Hostikkaysts from performing reverse analysis. This paper proposes a new method of extracting from functions their reduced shortest paths (RSP), through path search and abstraction, to identify functions in a more fine-grained manner. The method of deep representation learning is utilized to identify whethe作者: 西瓜 時(shí)間: 2025-3-27 08:35
Victoria N. Hutchison,Simo Hostikkaing transaction to win the game. The attacker compromises the database occasionally without explicit footprints, basically this company has just engaged enterprise-grade firewall and anti-virus software but its anti-virus control failed to detect the existence of a backdoor file. After 4-month of in作者: 被告 時(shí)間: 2025-3-27 13:06
Smoke Alarms and the Human Responsel analysis. Most existing vulnerability detection methods rely on manual designed vulnerability features, which is costly and leads to high false positive rates. Pre-trained models for programming language have been used to gain dramatic improvements to code-related tasks, which considers syntactic-作者: 殺死 時(shí)間: 2025-3-27 14:22
Meeting Material and Physical Needs,nst Discrete Cosine/Sine Transform (DCT/DST) based steganography for High Efficiency Video Coding (HEVC) video is proposed. The distortion of DCT/DST-based HEVC steganography and the impact on pixel value of HEVC videos is firstly analyzed. Based on the analysis, a convolutional neural network (CNN)作者: Exposition 時(shí)間: 2025-3-27 19:16 作者: 畏縮 時(shí)間: 2025-3-28 00:37
Larry K. Brendtro,William Wasmund collect information that can lead to the understanding of an attacker’s strategy and intent. Several trade-offs must be considered when employing honeypots. Systems and services in a honeypot must be relevant and attractive to an adversary and the computing and manpower costs must fit within the fu作者: 親屬 時(shí)間: 2025-3-28 04:13
Individual and Group Psychotherapydependant on the crawlers’ speed as the network can be described as a moving target. In this paper, we present improvements based on the example of a newly developed Bitcoin crawler that can be utilised to reduce resource usage/requirements of crawlers and therefore speed up capturing network snapsh作者: Firefly 時(shí)間: 2025-3-28 07:01
Digital Forensics and Cyber Crime978-3-031-06365-7Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 合同 時(shí)間: 2025-3-28 10:53
Scott Baker,Jeffrey Driver,David McCallumment protocol by introducing security distance function. Theoretical analysis shows that our protocol can guarantee the qubit commitment process is secure and has better performance than existing protocols in robustness. Since our protocol is simpler and more practical, it is feasible with current technologies.作者: Paraplegia 時(shí)間: 2025-3-28 17:46 作者: Cpap155 時(shí)間: 2025-3-28 21:19
978-3-031-06364-0ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2022作者: GEM 時(shí)間: 2025-3-29 00:29
,Cheating Sensitive Security Quantum Bit Commitment with?Security Distance Function,ment protocol by introducing security distance function. Theoretical analysis shows that our protocol can guarantee the qubit commitment process is secure and has better performance than existing protocols in robustness. Since our protocol is simpler and more practical, it is feasible with current technologies.作者: 左右連貫 時(shí)間: 2025-3-29 04:38 作者: arabesque 時(shí)間: 2025-3-29 09:47 作者: impaction 時(shí)間: 2025-3-29 11:28 作者: LEVER 時(shí)間: 2025-3-29 17:56 作者: 不規(guī)則 時(shí)間: 2025-3-29 20:58
,Find My IoT Device – An Efficient and?Effective Approximate Matching Algorithm to?Identify IoT Trafse, and hence cheap. However, their profitability comes with the difficulty to patch them. Moreover, the IoT topology is often not well documented, too. Thus IoT devices form a popular attack vector in networks. Due to the widespread missing documentation vulnerable IoT network components must be qu作者: Lipoprotein(A) 時(shí)間: 2025-3-30 01:14 作者: 詞匯表 時(shí)間: 2025-3-30 07:53
Research on the Method of Selecting the Optimal Feature Subset in Big Data for Energy Analysis Attare points is an important factor that affects the machine learning model, how to choose the optimal feature subset is a key factor related to the success or failure of energy analysis attack. AES algorithm emphasizes to increase the complexity of encrypted data by a large number of encryption rounds作者: Perceive 時(shí)間: 2025-3-30 10:39 作者: helper-T-cells 時(shí)間: 2025-3-30 14:38 作者: Presbycusis 時(shí)間: 2025-3-30 17:22
,PCWQ: A Framework for?Evaluating Password Cracking Wordlist Quality,onger, safer passwords and elevated the sophistication of the password cracking methods chosen by their adversaries. In this constantly moving landscape, the use of wordlists to create smarter password cracking candidates begs the question of whether there is a way to assess which is better. In this作者: 扔掉掐死你 時(shí)間: 2025-3-31 00:16
,No Pie in?the?Sky: The Digital Currency Fraud Website Detection,o took place. One of the most common ways is to induce victims to invest. As a result criminals can obtain a large number of profits through fraud. Cybercriminals usually design the layout of digital currency fraud websites to be similar to normal digital currency websites. Use some words related to作者: 態(tài)度暖昧 時(shí)間: 2025-3-31 02:34
,Understanding the?Brains and?Brawn of?Illicit Streaming App,-protected contents, including movies, live soccer matches, basketball games, dramas, etc., have been taken by “content pirates” and redistributed through the Internet. In the last few years, illegal IPTV providers in the form of an illicit streaming app running on smartphones, smart TVs, and illici作者: kidney 時(shí)間: 2025-3-31 08:05
,Fine-Grained Obfuscation Scheme Recognition on?Binary Code,ysts from performing reverse analysis. This paper proposes a new method of extracting from functions their reduced shortest paths (RSP), through path search and abstraction, to identify functions in a more fine-grained manner. The method of deep representation learning is utilized to identify whethe作者: CRASS 時(shí)間: 2025-3-31 12:38
Backdoor Investigation and Incident Response: From Zero to Profit,ing transaction to win the game. The attacker compromises the database occasionally without explicit footprints, basically this company has just engaged enterprise-grade firewall and anti-virus software but its anti-virus control failed to detect the existence of a backdoor file. After 4-month of in作者: Inferior 時(shí)間: 2025-3-31 14:21
,Automated Software Vulnerability Detection via?Pre-trained Context Encoder and?Self Attention,l analysis. Most existing vulnerability detection methods rely on manual designed vulnerability features, which is costly and leads to high false positive rates. Pre-trained models for programming language have been used to gain dramatic improvements to code-related tasks, which considers syntactic-作者: candle 時(shí)間: 2025-3-31 20:33 作者: CHAFE 時(shí)間: 2025-3-31 22:48
,Do Dark Web and?Cryptocurrencies Empower Cybercriminals?,in determining the identities of dark website owners and the tracing of the associated transactions compounds the challenges of investigating dark web activities. In this study, we explore how cryptocurrencies have been involved in cybercriminal activities on the dark web and the factors that drive 作者: ANNUL 時(shí)間: 2025-4-1 05:22 作者: 最高峰 時(shí)間: 2025-4-1 08:32
,Gotta Catch’em All! Improving P2P Network Crawling Strategies,dependant on the crawlers’ speed as the network can be described as a moving target. In this paper, we present improvements based on the example of a newly developed Bitcoin crawler that can be utilised to reduce resource usage/requirements of crawlers and therefore speed up capturing network snapsh作者: 閃光你我 時(shí)間: 2025-4-1 11:28
,Quantifying Paging on?Recoverable Data from?Windows User-Space Modules,mic library, or driver) that was loaded as part of the kernel or a user-mode process. We show that this ratio is particularly low in shared dynamic library modules, as opposed to executable modules. We also discuss the issues of memory forensics that can affect scanning for malicious evidences in pa