Quantifying Paging on Recoverable Data from Windows User-Space Modules.- Forensic Investigations of Google Meet and Microsoft Teams - Two Popular Conferencing Tools in the Pandemic.- On Exploring The Sub-Domain of Artificial Intelligence Model Forensics.- Auto-Parser: Android Auto & Apple CarPlay Forensics.- Find my IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows.- Accessing secure data on Android through application analysis.- Research On The Method Of Selecting The Optimal Feature Subset In Big Data For Energy Analysis Attack.- Cheating sensitive security quantum bit commitment with security distance function.- Towards Mitigation of Data Exfiltration Techniques using the MITRE ATT&CK Framework.- PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality.- No Pie in The Sky: The Digital Currency Fraud Website Detection.- Understanding the Brains and Brawn of IllicitStreaming App.- Fine-grained Obfuscation Scheme Recognition on Binary Code.- Backdoor Investigation and Incident Response: From Zero to Profit.- Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention.- Lightweight On-demand Honeypot Deployment for Cyber Deception.- Parcae: A Blockchain-Based PRF Service for Everyone.- A Hybrid Cloud Deployment Architecture For Privacypreserving Collaborative Genome-Wide Association Studies.- Understanding the Security of Deepfake Detection.
Pages
396
Format
Paperback
Release
June 27, 2022
ISBN 13
9783031063640
Digital Forensics and Cyber Crime: 12th Eai International Conference, Icdf2c 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings
Quantifying Paging on Recoverable Data from Windows User-Space Modules.- Forensic Investigations of Google Meet and Microsoft Teams - Two Popular Conferencing Tools in the Pandemic.- On Exploring The Sub-Domain of Artificial Intelligence Model Forensics.- Auto-Parser: Android Auto & Apple CarPlay Forensics.- Find my IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows.- Accessing secure data on Android through application analysis.- Research On The Method Of Selecting The Optimal Feature Subset In Big Data For Energy Analysis Attack.- Cheating sensitive security quantum bit commitment with security distance function.- Towards Mitigation of Data Exfiltration Techniques using the MITRE ATT&CK Framework.- PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality.- No Pie in The Sky: The Digital Currency Fraud Website Detection.- Understanding the Brains and Brawn of IllicitStreaming App.- Fine-grained Obfuscation Scheme Recognition on Binary Code.- Backdoor Investigation and Incident Response: From Zero to Profit.- Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention.- Lightweight On-demand Honeypot Deployment for Cyber Deception.- Parcae: A Blockchain-Based PRF Service for Everyone.- A Hybrid Cloud Deployment Architecture For Privacypreserving Collaborative Genome-Wide Association Studies.- Understanding the Security of Deepfake Detection.