default search action
11th ICDF2C 2020: Boston, MA, USA
- Sanjay Goel, Pavel Gladyshev, Daryl Johnson, Makan Pourzandi, Suryadipta Majumdar:
Digital Forensics and Cyber Crime - 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 351, Springer 2021, ISBN 978-3-030-68733-5 - Petr Matousek, Ivana Burgetova, Ondrej Rysavý, Malombe Victor:
On Reliability of JA3 Hashes for Fingerprinting Mobile Applications. 1-22 - Marcel Busch, Florian Nicolai, Fabian Fleischer, Christian Rückert, Christoph Safferling, Felix C. Freiling:
Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations. 23-43 - François Bouchaud, Thomas Vantroys, Gilles Grimaud:
Evidence Gathering in IoT Criminal Investigation. 44-61 - Jiaqi Shi, Gang Wang, Ming Su, Xiaoguang Liu:
Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor. 62-77 - John Sheppard:
A Partial Approach to Intrusion Detection. 78-97 - Tobias Latzo:
Efficient Fingerprint Matching for Forensic Event Reconstruction. 98-120 - Pasquale Ferrara, Gerard Draper-Gil, Ignacio Sanchez, Henrik Junklewitz, Laurent Beslay:
Modelling GOP Structure Effects on ENF-Based Video Forensics. 121-138 - Lukas Bortnik, Arturs Lavrenovs:
Android Dumpsys Analysis to Indicate Driver Distraction. 139-163 - Gengqian Zhou, Jianwei Zhuge:
Adapting to Local Conditions: Similarities and Differences in Anonymous Online Market Between Chinese and English Speaking Communities. 164-181 - Tom Van der Mussele, Babak Habibnia, Pavel Gladyshev:
Remote Air-Gap Live Forensics. 182-203 - Marian Waltereit, Maximilian Uphoff, Peter Zdankin, Viktor Matkovic, Torben Weis:
A Digital Forensic Approach for Optimizing the Investigation of Hit-and-Run Accidents. 204-223 - Jieun Dokko, Michael Shin, Soo Young Park:
An Intelligence Criminal Tracker for Industrial Espionage - Applying Digital Data Acquired Onsite to Target Criminals. 224-230 - Samuel Todd Bromley, John Sheppard, Mark Scanlon, Nhien-An Le-Khac:
Retracing the Flow of the Stream: Investigating Kodi Streaming Services. 231-236 - Edgar Padilla, Jaime C. Acosta, Christopher D. Kiekintveld:
Cybersecurity Methodology for Specialized Behavior Analysis. 237-243 - Zhongmin Wang, Zhen Feng, Zhenzhou Tian:
Neural Representation Learning Based Binary Code Authorship Attribution. 244-249
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.