標(biāo)題: Titlebook: Digital Forensics and Cyber Crime; 14th EAI Internation Sanjay Goel,Paulo Roberto Nunes de Souza Conference proceedings 2024 ICST Institute [打印本頁(yè)] 作者: 本義 時(shí)間: 2025-3-21 16:50
書(shū)目名稱(chēng)Digital Forensics and Cyber Crime影響因子(影響力)
書(shū)目名稱(chēng)Digital Forensics and Cyber Crime影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Digital Forensics and Cyber Crime網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Digital Forensics and Cyber Crime網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Digital Forensics and Cyber Crime被引頻次
書(shū)目名稱(chēng)Digital Forensics and Cyber Crime被引頻次學(xué)科排名
書(shū)目名稱(chēng)Digital Forensics and Cyber Crime年度引用
書(shū)目名稱(chēng)Digital Forensics and Cyber Crime年度引用學(xué)科排名
書(shū)目名稱(chēng)Digital Forensics and Cyber Crime讀者反饋
書(shū)目名稱(chēng)Digital Forensics and Cyber Crime讀者反饋學(xué)科排名
作者: 小故事 時(shí)間: 2025-3-21 23:57
Catch Me if?You Can: Analysis of?Digital Devices and Artifacts Used in?Murder Casesn. Guilty verdicts made up 64.15% of the examined cases and 98.11% of the evidence was deemed inculpatory, or evidence that proves guilt. This work seeks to provide a refined outlook as to how digital evidence is used when conducting a criminal investigation to ameliorate the efficiency of the digit作者: 滔滔不絕的人 時(shí)間: 2025-3-22 03:27
Enhancing Incident Management by?an?Improved Understanding of?Data Exfiltration: Definition, Evaluatt step we evaluate three frequently used methods for cyber threat intelligence: Microsoft Threat Modeling Tool, the Malware Information and Sharing Platform (MISP), and the MITRE Adversarial Tactics, Techniques and Common Knowledge (ATT &CK) framework. Our evaluation goal is to find out whether thes作者: affect 時(shí)間: 2025-3-22 08:16
Identify Users on Dating Applications: A Forensic Perspective lines of inquiry for investigators are limited in identifying the offender’s real identity. There has been no study in literature into what investigators could obtain from these apps to identify another user if you only had one account, such as an account from a victim of a crime. Therefore, in thi作者: 欺騙手段 時(shí)間: 2025-3-22 12:04
Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Modelritten Traditional Chinese from the most popular discussion forum in Hong Kong, namely, LIHKG, relating to local Government officials, then used the Bidirectional Encoder Representations from Transformers (BERT) model to identify opinion contents which achieve 98.7% accuracy, and generalized well in作者: CHASM 時(shí)間: 2025-3-22 13:35
A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysisss indicators, the algorithm improves its BCR values by 17.78%, 12.46%, 10.19%, 7.00%, 14.44%, 10.79%, 14.05%, 10.54%, 19.53%, 13.70%, 14.17%, and 10.26%, respectively, when compared with the two comparison algorithms in the face of 12.5° rotation, 0.7% noise addition, 50% simplification, 40% cuttin作者: CHASM 時(shí)間: 2025-3-22 19:09 作者: CHASE 時(shí)間: 2025-3-23 00:30
DEML: Data-Enhanced Meta-Learning Method for IoT APT Traffic Detectionperiments on a hybrid dataset where benign traffic comes from IoT-23 and APT traffic comes from Contagio. Experimental results show that our method outperforms the existing data enhancement methods. In addition, DEML achieves a detection accuracy of 99.35%, which is better than the baseline models i作者: 表示向下 時(shí)間: 2025-3-23 04:50
Finding Forensic Artefacts in?Long-Term Frequency Band Occupancy Measurements Using Statistics and?Mutliers. Furthermore, we created two datasets of long-term frequency band occupancy measurements that were used to evaluate our approach. We also evaluated our datasets with different machine learning techniques, which demonstrate that Random Forest has the highest classification accuracy and sensit作者: MITE 時(shí)間: 2025-3-23 08:53
IoT Malicious Traffic Detection Based on?Federated Learningl data for model training and testing, and the central server for model aggregation. The experimental results show that FlIMT achieves high detection accuracy on real data collected from IoT devices, and significantly lessens communication rounds.作者: 職業(yè) 時(shí)間: 2025-3-23 13:41
https://doi.org/10.1007/978-3-030-70370-7nets, and.2) a sophisticated tunneling attempt that appeared to originate from overseas..We propose that deployments of VVM honeypots will help understand potential attacker’s techniques and sophistication. VVM honeypots may also help defenders prepare for and manage real attacks against electronic 作者: Decibel 時(shí)間: 2025-3-23 15:45
Peter Panfilov,Alexander Suleykinn. Guilty verdicts made up 64.15% of the examined cases and 98.11% of the evidence was deemed inculpatory, or evidence that proves guilt. This work seeks to provide a refined outlook as to how digital evidence is used when conducting a criminal investigation to ameliorate the efficiency of the digit作者: strain 時(shí)間: 2025-3-23 19:58
Chapter 7 Data Science and Resiliencet step we evaluate three frequently used methods for cyber threat intelligence: Microsoft Threat Modeling Tool, the Malware Information and Sharing Platform (MISP), and the MITRE Adversarial Tactics, Techniques and Common Knowledge (ATT &CK) framework. Our evaluation goal is to find out whether thes作者: Inculcate 時(shí)間: 2025-3-23 23:39
Vladimir M. Roytman,Igor E. Lukashevich lines of inquiry for investigators are limited in identifying the offender’s real identity. There has been no study in literature into what investigators could obtain from these apps to identify another user if you only had one account, such as an account from a victim of a crime. Therefore, in thi作者: Goblet-Cells 時(shí)間: 2025-3-24 05:57 作者: 符合規(guī)定 時(shí)間: 2025-3-24 09:59
Zdenek Filip,Katerina Demnerovass indicators, the algorithm improves its BCR values by 17.78%, 12.46%, 10.19%, 7.00%, 14.44%, 10.79%, 14.05%, 10.54%, 19.53%, 13.70%, 14.17%, and 10.26%, respectively, when compared with the two comparison algorithms in the face of 12.5° rotation, 0.7% noise addition, 50% simplification, 40% cuttin作者: Frenetic 時(shí)間: 2025-3-24 10:40
Wei Wang,Francesco Di Maio,Enrico Zio feature points are selected as the feature areas for hidden data embedding. The hidden data is scrambled by the knight parade method to obtain the corresponding binary coded sequence. Finally, the hidden data is embedded by matching and modifying the parity sequence of the two significant bits with作者: Dna262 時(shí)間: 2025-3-24 18:20
https://doi.org/10.1007/978-981-99-8672-9periments on a hybrid dataset where benign traffic comes from IoT-23 and APT traffic comes from Contagio. Experimental results show that our method outperforms the existing data enhancement methods. In addition, DEML achieves a detection accuracy of 99.35%, which is better than the baseline models i作者: Keshan-disease 時(shí)間: 2025-3-24 20:33 作者: 尖叫 時(shí)間: 2025-3-25 01:34 作者: Entreaty 時(shí)間: 2025-3-25 05:14 作者: 裝勇敢地做 時(shí)間: 2025-3-25 10:16 作者: DRAFT 時(shí)間: 2025-3-25 14:44 作者: 和諧 時(shí)間: 2025-3-25 19:02 作者: 抗體 時(shí)間: 2025-3-25 20:13
Chapter 7 Data Science and Resilienceurity (BSI) annual report (.) on the state of Information Technology’s (IT) Security in Germany points to the worsening situation. A key result of the BSI is that cyber extortion attempts have become the number-one threat due to leading cyber-attacker collectives expanding their strategy. They exfil作者: Electrolysis 時(shí)間: 2025-3-26 02:51
Vladimir M. Roytman,Igor E. Lukashevichting applications, or ‘a(chǎn)pps’. Associated with this popularity is the increased scrutiny around these apps and what companies are doing to protect users’ private information. Dating apps are one of the riskiest, considering the users of these apps outline their innermost thoughts and desires, along w作者: 繼而發(fā)生 時(shí)間: 2025-3-26 05:27 作者: progestogen 時(shí)間: 2025-3-26 10:59
https://doi.org/10.1007/978-1-4020-8489-8 alt-tech social media, such as Parler or MeWe, Truth Social’s looser content moderation rules may encourage more extreme user-based content. This includes biased language- posts with racist, sexist, ableist, or other discriminatory intent- and calls for violence. Digital forensic analysis can be us作者: Breach 時(shí)間: 2025-3-26 13:16 作者: OTHER 時(shí)間: 2025-3-26 17:14
Resilience of Cyber-Physical Systems of them are single carriers with limited embedding information capacity, a multi-carrier information hiding algorithm based on hierarchical compression of 3D point cloud model is proposed. Firstly, the 3D model is pre-standardized, the minimum bounding box of the model is generated, and the slice o作者: 連鎖 時(shí)間: 2025-3-27 00:48 作者: 有效 時(shí)間: 2025-3-27 02:55
Wei Wang,Francesco Di Maio,Enrico Zioper proposes an information hiding algorithm based on multi-carrier fusion state partitioning of 3D models. Firstly, multiple three-dimensional vectors to be hidden are fused according to the radial distance between the center of each model and the inner tangential sphere, and then the inner tangent作者: Promotion 時(shí)間: 2025-3-27 08:37
Latin American Integration: A Brazilian Viewhrough data poisoning, which requires the attacker to have access to higher-level model training and can be easily exposed. However, vulnerabilities in code management for deep learning training make the code itself an extremely susceptible target for attacks. based on this, we propose a novel form 作者: 里程碑 時(shí)間: 2025-3-27 10:00 作者: 摻假 時(shí)間: 2025-3-27 15:11 作者: MUTE 時(shí)間: 2025-3-27 20:50 作者: wall-stress 時(shí)間: 2025-3-28 00:58 作者: 漂亮 時(shí)間: 2025-3-28 06:10
https://doi.org/10.1007/978-981-99-7996-7oncern for public security management recently. To combat massive cybercrime and conduct a clean Internet environment, graph-based semi-supervised cybercrime detection (GSCD) has gained increasing popularity recently for it can model complex relationships between network objects and provide node-lev作者: 巨碩 時(shí)間: 2025-3-28 08:08 作者: 肉體 時(shí)間: 2025-3-28 14:18 作者: 簡(jiǎn)略 時(shí)間: 2025-3-28 18:19 作者: 為寵愛(ài) 時(shí)間: 2025-3-28 22:43
1867-8211 al Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA,?during November 30, 2023..The?41?revised full papers presented in these proceedings were carefully reviewed and?selected from?105?submissions. The papers are organized in the following topical?sections:.Volume I:.Crime profil作者: 預(yù)感 時(shí)間: 2025-3-28 23:51
Conference proceedings 2024ere carefully reviewed and?selected from?105?submissions. The papers are organized in the following topical?sections:.Volume I:.Crime profile analysis and Fact checking,?Information hiding and?Machine learning..Volume II:?.Password, Authentication and Cryptography,?Vulnerabilities and?Cybersecurity and forensics..作者: Ingenuity 時(shí)間: 2025-3-29 05:44
https://doi.org/10.1007/978-1-4020-8489-8application metadata was discovered. Next, network traffic analysis using a desktop computer revealed plaintext usernames and passwords. A detailed depiction of the forensic analysis performed for this paper is presented to aid future investigators.作者: 放縱 時(shí)間: 2025-3-29 09:43 作者: 珍奇 時(shí)間: 2025-3-29 13:33
https://doi.org/10.1007/978-3-319-95597-1ransformation attacks and can achieve a Corr value of 0.729 in the face of a composite attack with 10% simplification, 0.5% noise and 10% shear. The algorithm’s invisibility, capacity, and its robustness against multiple attacks are improved.作者: judiciousness 時(shí)間: 2025-3-29 17:18
Latin American Integration: A Brazilian View performance and maintaining stealth. We not only validate the feasibility and effectiveness of CCBA in deep neural networks but also extend it successfully to graph neural networks and natural language processing, demonstrating promising results.作者: fidelity 時(shí)間: 2025-3-29 20:33
https://doi.org/10.1007/978-981-99-7996-7triggers to enforce the well-trained GSCD model to misclassify trigger-embedded crime data as the premeditated result. Extensive experiments on multiple detection models and open-source datasets reveal that the CBAG exhibits effective escape performance and evasiveness.作者: Vulnerable 時(shí)間: 2025-3-30 02:48
Retruth Reconnaissance: A Digital Forensic Analysis of?Truth Socialapplication metadata was discovered. Next, network traffic analysis using a desktop computer revealed plaintext usernames and passwords. A detailed depiction of the forensic analysis performed for this paper is presented to aid future investigators.作者: thyroid-hormone 時(shí)間: 2025-3-30 04:21
A Multi-carrier Information Hiding Algorithm Based on?Layered Compression of?3D Point Cloud Model layer area is compressed according to the secret information to complete the secret information hiding. The experimental results show that, compared with the comparison algorithm, the proposed algorithm is robust while maintaining invisibility in the face of a single attack.作者: LATE 時(shí)間: 2025-3-30 08:46 作者: Infelicity 時(shí)間: 2025-3-30 14:09 作者: 高興一回 時(shí)間: 2025-3-30 18:10 作者: linguistics 時(shí)間: 2025-3-30 22:20
Conference proceedings 2024cs and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA,?during November 30, 2023..The?41?revised full papers presented in these proceedings were carefully reviewed and?selected from?105?submissions. The papers are organized in the following topical?sections:.Volume I:.Crime profile analysis作者: 施魔法 時(shí)間: 2025-3-31 03:54
International Political Economy Series use of the HDF5 format to save trained models, aiming to uncover potential weaknesses via forensic analysis. Specifically, we investigate the injection and detection of foreign data in these packaged files using a custom tool external to TF2, leading to the development of a dedicated forensic analysis tool for TF2 ’s HDF5 model files.作者: clarify 時(shí)間: 2025-3-31 08:19
Decoding HDF5: Machine Learning File Forensics and?Data Injection use of the HDF5 format to save trained models, aiming to uncover potential weaknesses via forensic analysis. Specifically, we investigate the injection and detection of foreign data in these packaged files using a custom tool external to TF2, leading to the development of a dedicated forensic analysis tool for TF2 ’s HDF5 model files.作者: Preamble 時(shí)間: 2025-3-31 11:29