default search action
14th ICDF2C 2023: New York City, NY, USA
- Sanjay Goel, Paulo Roberto Nunes de Souza:
Digital Forensics and Cyber Crime - 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 571, Springer 2024, ISBN 978-3-031-56582-3
Password, Authentication and Cryptography
- Ivan Cvitic, Dragan Perakovic:
A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels. 3-22 - Lilian Noronha Nassif, Jonny Silva de Oliveira:
Learning Framework for Guessing Alphanumeric Passwords on Mobile Phones Based on User Context and Fragment Semantics. 23-30 - Aleck Nash, Kim-Kwang Raymond Choo:
Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities. 31-53 - Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang:
Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem). 54-62 - Zhi Lu, Haochen Dou, Songfeng Lu, Xueming Tang, Junjun Wu, Samir Mohammed Umran:
A PUF Based Audio Fingerprint Based for Device Authentication and Tamper Location. 63-78 - Qingran Lin, Xiang Li, Beilin Chu, Renying Wang, Xianhao Chen, Yuzhe Mao, Zhen Yang, Linna Zhou, Weike You:
SHIELD: A Specialized Dataset for Hybrid Blind Forensics of World Leaders. 79-91
Vulnerabilities
- Yintong Yan, Lu Yu, Taiyan Wang, Yuwei Li, Zulie Pan:
Optir-SBERT: Cross-Architecture Binary Code Similarity Detection Based on Optimized LLVM IR. 95-113 - Linong Shi, Chuanping Hu, Yan Zhuang, Yan Lu:
SdShield: Effectively Ensuring Heap Security via Shadow Page Table. 114-131 - Martin Husák, Shanchieh Jay Yang, Joseph Khoury, Dorde Klisura, Elias Bou-Harb:
Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges. 132-151 - Josep Pegueroles Valles, Sebastien Kanj Bongard, Arnau Estebanell Castellví:
XSS Vulnerability Test Enhancement for Progressive Web Applications. 152-163 - Abdul Majid Jamil, Hassan Jalil Hadi, Sifan Li, Yue Cao, Naveed Ahmed, Faisal Bashir Hussain, Chakkaphong Suthaputchakun, Xinyuan Wang:
Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle. 164-185 - Yiran Li:
Power Analysis Attack Based on BS-XGboost Scheme. 186-196 - Aleck Nash, Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo:
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy. 197-206
Cybersecurity and Forensics
- Chenxin Zhou, Cheng Huang, Yanghao Wang, Zheng Zuo:
APTBert: Abstract Generation and Event Extraction from APT Reports. 209-223 - Quan Hong, Jiaqi Li, Xizhong Guo, Pan Xie, Lidong Zhai:
Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim. 224-243 - Weimiao Feng, Rui Hu, Cong Zhou, Lei Yu:
DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery. 244-257 - Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang:
Improvement of an Identity-Based Aggregate Signature Protocol from Lattice. 258-263 - Thorsten Jenke, Simon Liessem, Elmar Padilla, Lilli Bruckschen:
A Measurement Study on Interprocess Code Propagation of Malicious Software. 264-282 - Zhiqiang Wang, Zhuoyue Wang, Ying Zhang:
An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network. 283-299 - Ruipeng Zhang, Mengjun Xie:
ForensiQ: A Knowledge Graph Question Answering System for IoT Forensics. 300-314 - Steven Seiden, Ibrahim M. Baggili, Aisha I. Ali-Gombe:
I've Got You, Under My Skin: Biohacking Augmentation Implant Forensics. 315-332 - Hassan Jalil Hadi, Yue Cao, Mohammed Ali Alshara, Naveed Ahmad, Muhammad Saqib Riaz, Jun Li:
Quantum Computing Challenges and Impact on Cyber Security. 333-343
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.