Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:conf/icdf2c:"
@proceedings{DBLP:conf/icdf2c/2023-1, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-56580-9}, doi = {10.1007/978-3-031-56580-9}, isbn = {978-3-031-56579-3}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2023-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2023-2, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-56583-0}, doi = {10.1007/978-3-031-56583-0}, isbn = {978-3-031-56582-3}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2023-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/0006WZ23, author = {Zhiqiang Wang and Zhuoyue Wang and Ying Zhang}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {283--299}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_19}, doi = {10.1007/978-3-031-56583-0\_19}, timestamp = {Fri, 19 Apr 2024 14:44:37 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/0006WZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BrownB23, author = {Joseph Brown and Ibrahim Baggili}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Retruth Reconnaissance: {A} Digital Forensic Analysis of Truth Social}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {96--113}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_6}, doi = {10.1007/978-3-031-56580-9\_6}, timestamp = {Fri, 19 Apr 2024 14:40:31 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BrownB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/CviticP23, author = {Ivan Cvitic and Dragan Perakovic}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {3--22}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_1}, doi = {10.1007/978-3-031-56583-0\_1}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/CviticP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/DongY0023, author = {Songshou Dong and Yanqing Yao and Yihua Zhou and Yuguang Yang}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Improvement of an Identity-Based Aggregate Signature Protocol from Lattice}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {258--263}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_17}, doi = {10.1007/978-3-031-56583-0\_17}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/DongY0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/DongYZ023, author = {Songshou Dong and Yanqing Yao and Yihua Zhou and Yuguang Yang}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {54--62}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_4}, doi = {10.1007/978-3-031-56583-0\_4}, timestamp = {Sun, 21 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/DongYZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/DuanHWGTWH23, author = {Xiaoyi Duan and Ye Huang and Yuting Wang and Yu Gu and Jianmin Tong and Zunyang Wang and Ronglei Hu}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Power Analysis Attack Based on GA-Based Ensemble Learning}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {308--322}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_19}, doi = {10.1007/978-3-031-56580-9\_19}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/DuanHWGTWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/FanHWNYCD23, author = {Xiaohong Fan and Ye Huang and Xue Wang and Ziran Nie and Zhenyang Yu and Xuhui Cheng and Xiaoyi Duan}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Research on Feature Selection Algorithm of Energy Curve}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {293--307}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_18}, doi = {10.1007/978-3-031-56580-9\_18}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/FanHWNYCD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/FengHZY23, author = {Weimiao Feng and Rui Hu and Cong Zhou and Lei Yu}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {244--257}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_16}, doi = {10.1007/978-3-031-56583-0\_16}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/FengHZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HadiCAARL23, author = {Hassan Jalil Hadi and Yue Cao and Mohammed Ali Alshara and Naveed Ahmad and Muhammad Saqib Riaz and Jun Li}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Quantum Computing Challenges and Impact on Cyber Security}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {333--343}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_22}, doi = {10.1007/978-3-031-56583-0\_22}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HadiCAARL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HongLGXZ23, author = {Quan Hong and Jiaqi Li and Xizhong Guo and Pan Xie and Lidong Zhai}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {224--243}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_15}, doi = {10.1007/978-3-031-56583-0\_15}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HongLGXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HuNYYHZ023, author = {Jia Hu and Weina Niu and Qingjun Yuan and Lingfeng Yao and Junpeng He and Yanfeng Zhang and Xiaosong Zhang}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {{DEML:} Data-Enhanced Meta-Learning Method for IoT {APT} Traffic Detection}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {212--226}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_13}, doi = {10.1007/978-3-031-56580-9\_13}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HuNYYHZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HusakYKKB23, author = {Martin Hus{\'{a}}k and Shanchieh Jay Yang and Joseph Khoury and Dorde Klisura and Elias Bou{-}Harb}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {132--151}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_9}, doi = {10.1007/978-3-031-56583-0\_9}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HusakYKKB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/IpLLY23, author = {Cheuk Yu Ip and Fu Kay Frankie Li and Yi Anson Lam and Siu Ming Yiu}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using {BERT} Model}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {78--95}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_5}, doi = {10.1007/978-3-031-56580-9\_5}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/IpLLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JamilHL0AHSW23, author = {Abdul Majid Jamil and Hassan Jalil Hadi and Sifan Li and Yue Cao and Naveed Ahmed and Faisal Bashir Hussain and Chakkaphong Suthaputchakun and Xinyuan Wang}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {164--185}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_11}, doi = {10.1007/978-3-031-56583-0\_11}, timestamp = {Sat, 20 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/JamilHL0AHSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JankuraCBR23, author = {John Jankura and Hannah Catallo{-}Stooks and Ibrahim M. Baggili and Golden Richard}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Catch Me if You Can: Analysis of Digital Devices and Artifacts Used in Murder Cases}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {19--32}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_2}, doi = {10.1007/978-3-031-56580-9\_2}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/JankuraCBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JenkeLPB23, author = {Thorsten Jenke and Simon Liessem and Elmar Padilla and Lilli Bruckschen}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {A Measurement Study on Interprocess Code Propagation of Malicious Software}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {264--282}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_18}, doi = {10.1007/978-3-031-56583-0\_18}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/JenkeLPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Li23, author = {Yiran Li}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Power Analysis Attack Based on BS-XGboost Scheme}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {186--196}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_12}, doi = {10.1007/978-3-031-56583-0\_12}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LinLCWCMYZY23, author = {Qingran Lin and Xiang Li and Beilin Chu and Renying Wang and Xianhao Chen and Yuzhe Mao and Zhen Yang and Linna Zhou and Weike You}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {{SHIELD:} {A} Specialized Dataset for Hybrid Blind Forensics of World Leaders}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {79--91}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_6}, doi = {10.1007/978-3-031-56583-0\_6}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LinLCWCMYZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LuDLTWU23, author = {Zhi Lu and Haochen Dou and Songfeng Lu and Xueming Tang and Junjun Wu and Samir Mohammed Umran}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {A {PUF} Based Audio Fingerprint Based for Device Authentication and Tamper Location}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {63--78}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_5}, doi = {10.1007/978-3-031-56583-0\_5}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LuDLTWU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MaddenSGPS23, author = {Michael Madden and Dan Szafaran and Philomena Gray and Justin Pelletier and Ted Selker}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {A Canary in the Voting Booth: Attacks on a Virtual Voting Machine}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {3--18}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_1}, doi = {10.1007/978-3-031-56580-9\_1}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MaddenSGPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MundtB23, author = {Michael Mundt and Harald Baier}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, Review}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {33--57}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_3}, doi = {10.1007/978-3-031-56580-9\_3}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MundtB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/NashC23, author = {Aleck Nash and Kim{-}Kwang Raymond Choo}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {31--53}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_3}, doi = {10.1007/978-3-031-56583-0\_3}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/NashC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/NashSGC23, author = {Aleck Nash and Hudan Studiawan and George Grispos and Kim{-}Kwang Raymond Choo}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {197--206}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_13}, doi = {10.1007/978-3-031-56583-0\_13}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/NashSGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/NassifO23, author = {Lilian Noronha Nassif and Jonny Silva de Oliveira}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Learning Framework for Guessing Alphanumeric Passwords on Mobile Phones Based on User Context and Fragment Semantics}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {23--30}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_2}, doi = {10.1007/978-3-031-56583-0\_2}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/NassifO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/PangSGL23, author = {Zeshan Pang and Yuyuan Sun and Shasha Guo and Yuliang Lu}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Backdoor Learning on Siamese Networks Using Physical Triggers: FaceNet as a Case Study}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {279--292}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_17}, doi = {10.1007/978-3-031-56580-9\_17}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/PangSGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/RenGCC23, author = {Shuai Ren and Hao Gong and Huirong Cheng and Zejing Cheng}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Point Cloud Model Information Hiding Algorithm Based on Multi-scale Transformation and Composite Operator}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {146--161}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_9}, doi = {10.1007/978-3-031-56580-9\_9}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/RenGCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/RenLL23, author = {Shuai Ren and Bo Li and Shengxia Liu}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {An Information Hiding Algorithm Based on Multi-carrier Fusion State Partitioning of 3D Models}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {162--175}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_10}, doi = {10.1007/978-3-031-56580-9\_10}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/RenLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/RenLLGF23, author = {Shuai Ren and Yuxiao Li and Bo Li and Hao Gong and Qiuyu Feng}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {A Multi-carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {132--145}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_8}, doi = {10.1007/978-3-031-56580-9\_8}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/RenLLGF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/RenMF23, author = {Shuai Ren and Liming Ma and Qiuyu Feng}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {117--131}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_7}, doi = {10.1007/978-3-031-56580-9\_7}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/RenMF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SeidenBA23, author = {Steven Seiden and Ibrahim M. Baggili and Aisha I. Ali{-}Gombe}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {I've Got You, Under My Skin: Biohacking Augmentation Implant Forensics}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {315--332}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_21}, doi = {10.1007/978-3-031-56583-0\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/SeidenBA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ShenZLDHL0W23, author = {Yi Shen and Yuhan Zhang and Yuwei Li and Wanmeng Ding and Miao Hu and Yang Li and Cheng Huang and Jie Wang}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {IoT Malicious Traffic Detection Based on Federated Learning}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {249--263}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_15}, doi = {10.1007/978-3-031-56580-9\_15}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ShenZLDHL0W23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ShiHZL23, author = {Linong Shi and Chuanping Hu and Yan Zhuang and Yan Lu}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {SdShield: Effectively Ensuring Heap Security via Shadow Page Table}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {114--131}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_8}, doi = {10.1007/978-3-031-56583-0\_8}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ShiHZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SomersSHL23, author = {Bart Somers and Asanka P. Sayakkara and Darren R. Hayes and Nhien{-}An Le{-}Khac}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Finding Forensic Artefacts in Long-Term Frequency Band Occupancy Measurements Using Statistics and Machine Learning}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {227--248}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_14}, doi = {10.1007/978-3-031-56580-9\_14}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/SomersSHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/StenzelL23, author = {Paul Stenzel and Nhien{-}An Le{-}Khac}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Identify Users on Dating Applications: {A} Forensic Perspective}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {58--77}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_4}, doi = {10.1007/978-3-031-56580-9\_4}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/StenzelL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/VallesBC23, author = {Josep Pegueroles Valles and Sebastien Kanj Bongard and Arnau Estebanell Castellv{\'{\i}}}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {{XSS} Vulnerability Test Enhancement for Progressive Web Applications}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {152--163}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_10}, doi = {10.1007/978-3-031-56583-0\_10}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/VallesBC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/WalkerBW23, author = {Clinton Walker and Ibrahim Baggili and Hao Wang}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Decoding {HDF5:} Machine Learning File Forensics and Data Injection}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {193--211}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_12}, doi = {10.1007/978-3-031-56580-9\_12}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/WalkerBW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/YanYWLP23, author = {Yintong Yan and Lu Yu and Taiyan Wang and Yuwei Li and Zulie Pan}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Optir-SBERT: Cross-Architecture Binary Code Similarity Detection Based on Optimized {LLVM} {IR}}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {95--113}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_7}, doi = {10.1007/978-3-031-56583-0\_7}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/YanYWLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/YangLH23, author = {Xiao Yang and Gaolei Li and Meng Han}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Persistent Clean-Label Backdoor on Graph-Based Semi-supervised Cybercrime Detection}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {264--278}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_16}, doi = {10.1007/978-3-031-56580-9\_16}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/YangLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/YangLHY23, author = {Xubo Yang and Linsen Li and Cunqing Hua and Changhao Yao}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {{CCBA:} Code Poisoning-Based Clean-Label Covert Backdoor Attack Against DNNs}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {570}, pages = {179--192}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56580-9\_11}, doi = {10.1007/978-3-031-56580-9\_11}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/YangLHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ZhangX23, author = {Ruipeng Zhang and Mengjun Xie}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {ForensiQ: {A} Knowledge Graph Question Answering System for IoT Forensics}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {300--314}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_20}, doi = {10.1007/978-3-031-56583-0\_20}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ZhangX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Zhou0WZ23, author = {Chenxin Zhou and Cheng Huang and Yanghao Wang and Zheng Zuo}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {APTBert: Abstract Generation and Event Extraction from {APT} Reports}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {209--223}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_14}, doi = {10.1007/978-3-031-56583-0\_14}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Zhou0WZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2022, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-36574-4}, doi = {10.1007/978-3-031-36574-4}, isbn = {978-3-031-36573-7}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BhattaraiVSKA22, author = {Abhishek Bhattarai and Maryna Veksler and Hadi Sahin and Ahmet Kurt and Kemal Akkaya}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Crypto Wallet Artifact Detection on Android Devices Using Advanced Machine Learning Techniques}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {111--132}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_7}, doi = {10.1007/978-3-031-36574-4\_7}, timestamp = {Mon, 17 Jul 2023 16:28:01 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BhattaraiVSKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ChanYMLELRP22, author = {Raymond H. Chan and Wye Kaye Yan and Jung Man Ma and Kai Mun Loh and Greger Chen Zhi En and Malcolm Y. H. Low and Habib Rehman and Thong Chee Phua}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {{MQTT} Traffic Collection and Forensic Analysis Framework}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {185--202}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_11}, doi = {10.1007/978-3-031-36574-4\_11}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ChanYMLELRP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ChenCWYL22, author = {Jia Chen and Kunlin Chen and Yongjie Wang and Xuehu Yan and Longlong Li}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {A General Steganalysis Method of {QR} Codes}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {472--483}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_28}, doi = {10.1007/978-3-031-36574-4\_28}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ChenCWYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/DolejskaVPK22, author = {Daniel Dolejska and Vladim{\'{\i}}r Vesel{\'{y}} and Jan Pluskal and Michal Koutensk{\'{y}}}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Shedding Light on Monopoly: Temporal Analysis of Drug Trades}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {151--168}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_9}, doi = {10.1007/978-3-031-36574-4\_9}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/DolejskaVPK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/DuNG22, author = {Xiaoyu Du and Francis N. Nwebonyi and Pavel Gladyshev}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Automating the Flow of Data Between Digital Forensic Tools Using Apache NiFi}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {435--452}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_26}, doi = {10.1007/978-3-031-36574-4\_26}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/DuNG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Guerra-Manzanares22, author = {Alejandro Guerra{-}Manzanares and Hayretdin Bahsi}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {On the Application of Active Learning to Handle Data Evolution in Android Malware Detection}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {256--273}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_15}, doi = {10.1007/978-3-031-36574-4\_15}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Guerra-Manzanares22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HuSCL22, author = {Zhiyuan Hu and Linghang Shi and Huijun Chen and Jinghui Lu}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process {(AHP)}}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {453--471}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_27}, doi = {10.1007/978-3-031-36574-4\_27}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HuSCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JozaniZKDA22, author = {Mohsen M. Jozani and Gianluca Zanella and Maxium Khanov and Gokila Dorai and Esra Akbas}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {The Need for Biometric Anti-spoofing Policies: The Case of Etsy}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {295--306}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_17}, doi = {10.1007/978-3-031-36574-4\_17}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/JozaniZKDA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/KlierB22, author = {Samantha Klier and Harald Baier}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Towards Efficient On-Site {CSAM} Triage by Clustering Images from a Source Point of View}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {19--33}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_2}, doi = {10.1007/978-3-031-36574-4\_2}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/KlierB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LiGW22, author = {Yueqi Li and Sanjay Goel and Kevin J. Williams}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Are External Auditors Capable of Dealing with Cybersecurity Risks?}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {326--340}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_19}, doi = {10.1007/978-3-031-36574-4\_19}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LiGW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LiZLFLC22, author = {Chengjie Li and Yunchun Zhang and Zixuan Li and Fan Feng and Zikun Liao and Xiaohui Cui}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {The Lightweight Botnet Detection Model Based on the Improved UNet}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {241--255}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_14}, doi = {10.1007/978-3-031-36574-4\_14}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LiZLFLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LiuYWX22, author = {Qiuming Liu and Zhexin Yao and Zhen Wu and Zeyao Xu}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Attribute-Based Proxy Re-encryption with Privacy Protection for Message Dissemination in {VANET}}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {387--402}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_23}, doi = {10.1007/978-3-031-36574-4\_23}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LiuYWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MirsadeghiBI22, author = {Seyed Mohammad Hadi Mirsadeghi and Hayretdin Bahsi and Wissem Inbouli}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Deep Learning-Based Detection of Cyberattacks in Software-Defined Networks}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {341--354}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_20}, doi = {10.1007/978-3-031-36574-4\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/MirsadeghiBI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MoadineCB22, author = {Anass El Moadine and Gouenou Coatrieux and Reda Bellafqira}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Poisoning-Attack Detection Using an Auto-encoder for Deep Learning Models}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {368--384}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_22}, doi = {10.1007/978-3-031-36574-4\_22}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MoadineCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MundtB22, author = {Michael Mundt and Harald Baier}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Cyber Crime Undermines Data Privacy Efforts - On the Balance Between Data Privacy and Security}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {417--434}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_25}, doi = {10.1007/978-3-031-36574-4\_25}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MundtB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/NwebonyiDG22, author = {Francis N. Nwebonyi and Xiaoyu Du and Pavel Gladyshev}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Crime and Incident Watch for Smart Cities: {A} Sensor-Based Approach}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {222--238}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_13}, doi = {10.1007/978-3-031-36574-4\_13}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/NwebonyiDG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/RizviSM022, author = {Syed Rizvi and Mark Scanlon and Jimmy McGibney and John Sheppard}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {355--367}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_21}, doi = {10.1007/978-3-031-36574-4\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/RizviSM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ShengYLZ22, author = {Zhoushi Sheng and Bo Yu and Chen Liang and Yongyi Zhang}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {VPnet: {A} Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {307--325}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_18}, doi = {10.1007/978-3-031-36574-4\_18}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ShengYLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/StankovicK22, author = {Milos Stankovic and Tahir M. Khan}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Digital Forensics Tool Evaluation on Deleted Files}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {61--83}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_4}, doi = {10.1007/978-3-031-36574-4\_4}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/StankovicK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/VarshneyKHS22, author = {Rahul Varshney and Nitesh Kumar and Anand Handa and Sandeep Kumar Shukla}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Volatility Custom Profiling for Automated Hybrid {ELF} Malware Detection}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {274--291}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_16}, doi = {10.1007/978-3-031-36574-4\_16}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/VarshneyKHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/VekslerCA22, author = {Maryna Veksler and Clara Caspard and Kemal Akkaya}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {3--18}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_1}, doi = {10.1007/978-3-031-36574-4\_1}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/VekslerCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/XieWZSY22, author = {Jia{-}Hui Xie and Di Wu and Bo{-}Hao Zhang and Hai Su and Huan Yang}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Can Image Watermarking Efficiently Protect Deep-Learning-Based Image Classifiers? - {A} Preliminary Security Analysis of an IP-Protecting Method}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {34--57}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_3}, doi = {10.1007/978-3-031-36574-4\_3}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/XieWZSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/YangCL22, author = {Fan Yang and Hao Cheng and Shanxiang Lyu}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {169--182}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_10}, doi = {10.1007/978-3-031-36574-4\_10}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/YangCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/YaoTZFLS22, author = {Ruichu Yao and Kunsheng Tang and Yongshi Zhu and Bingbing Fan and Tian Luo and Yide Song}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {{PBPAFL:} {A} Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {403--416}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_24}, doi = {10.1007/978-3-031-36574-4\_24}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/YaoTZFLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ZengYWCLH22, author = {Yutong Zeng and Honghao Yu and Tiejun Wu and Yong Chen and Xing Lan and Cheng Huang}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {{CSCD:} {A} Cyber Security Community Detection Scheme on Online Social Networks}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {135--150}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_8}, doi = {10.1007/978-3-031-36574-4\_8}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ZengYWCLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ZhangZCZ22, author = {Ke Zhang and Guanghua Zhang and Zhenguo Chen and Xiaojun Zuo}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {IoT Malicious Traffic Detection Based on {FSKDE} and Federated DIOT-Pysyft}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {203--221}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_12}, doi = {10.1007/978-3-031-36574-4\_12}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ZhangZCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ZhouK22, author = {Jiaxuan Zhou and Umit Karabiyik}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Forensic Analysis of Webex on the iOS Platform}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {84--96}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_5}, doi = {10.1007/978-3-031-36574-4\_5}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ZhouK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ZhouK22a, author = {Jiaxuan Zhou and Umit Karabiyik}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {97--110}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_6}, doi = {10.1007/978-3-031-36574-4\_6}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ZhouK22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2021, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06365-7}, doi = {10.1007/978-3-031-06365-7}, isbn = {978-3-031-06364-0}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/AcostaBKK21, author = {Jaime C. Acosta and Anjon Basak and Christopher Kiekintveld and Charles A. Kamhoua}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Lightweight On-Demand Honeypot Deployment for Cyber Deception}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {294--312}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_18}, doi = {10.1007/978-3-031-06365-7\_18}, timestamp = {Fri, 19 Apr 2024 14:54:06 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/AcostaBKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/AhvanooeyZMKC21, author = {Milad Taleby Ahvanooey and Mark Xuefang Zhu and Wojciech Mazurczyk and Max Kilger and Kim{-}Kwang Raymond Choo}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Do Dark Web and Cryptocurrencies Empower Cybercriminals?}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {277--293}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_17}, doi = {10.1007/978-3-031-06365-7\_17}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/AhvanooeyZMKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/AzharTT21, author = {M. A. Hannan Bin Azhar and Jake Timms and Benjamin Tilley}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Forensic Investigations of Google Meet and Microsoft Teams - Two Popular Conferencing Tools in the Pandemic}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {20--34}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_2}, doi = {10.1007/978-3-031-06365-7\_2}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/AzharTT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BoujdadNBCGS21, author = {Fatima{-}Zahra Boujdad and David Niyitegeka and Reda Bellafqira and Gouenou Coatrieux and Emmanuelle G{\'{e}}nin and Mario S{\"{u}}dholt}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {A Hybrid Cloud Deployment Architecture for Privacy-Preserving Collaborative Genome-Wide Association Studies}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {342--359}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_21}, doi = {10.1007/978-3-031-06365-7\_21}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BoujdadNBCGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BuurkeL21, author = {Richard Buurke and Nhien{-}An Le{-}Khac}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Accessing Secure Data on Android Through Application Analysis}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {93--108}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_6}, doi = {10.1007/978-3-031-06365-7\_6}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BuurkeL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/CaoG21, author = {Xiaoyu Cao and Neil Zhenqiang Gong}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Understanding the Security of Deepfake Detection}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {360--378}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_22}, doi = {10.1007/978-3-031-06365-7\_22}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/CaoG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/DuanLLLLL21, author = {Xiaoyi Duan and You Li and Chengyuan Liu and Xiuying Li and Wenfeng Liu and Guoqian Li}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Research on the Method of Selecting the Optimal Feature Subset in Big Data for Energy Analysis Attack}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {109--126}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_7}, doi = {10.1007/978-3-031-06365-7\_7}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/DuanLLLLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/EdwardsMNB21, author = {Tiffanie Edwards and Syria McCullough and Mohamed Nassar and Ibrahim M. Baggili}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {On Exploring the Sub-domain of Artificial Intelligence {(AI)} Model Forensics}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {35--51}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_3}, doi = {10.1007/978-3-031-06365-7\_3}, timestamp = {Tue, 23 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/EdwardsMNB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/GobelUB21, author = {Thomas G{\"{o}}bel and Frieder Uhlig and Harald Baier}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Find My IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {72--92}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_5}, doi = {10.1007/978-3-031-06365-7\_5}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/GobelUB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HuangGJ021, author = {Weicong Huang and Qisheng Guang and Dong Jiang and Lijun Chen}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Cheating Sensitive Security Quantum Bit Commitment with Security Distance Function}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {127--138}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_8}, doi = {10.1007/978-3-031-06365-7\_8}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HuangGJ021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HuangZCSSTZ21, author = {Kong Huang and Ke Zhang and Jiongyi Chen and Menghan Sun and Wei Sun and Di Tang and Kehuan Zhang}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Understanding the Brains and Brawn of Illicit Streaming App}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {194--214}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_12}, doi = {10.1007/978-3-031-06365-7\_12}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HuangZCSSTZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/KantaCS21, author = {Aikaterini Kanta and Iwen Coisel and Mark Scanlon}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {{PCWQ:} {A} Framework for Evaluating Password Cracking Wordlist Quality}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {159--175}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_10}, doi = {10.1007/978-3-031-06365-7\_10}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/KantaCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LaiWWLHWM21, author = {Anthony Cheuk Tung Lai and Ken Wai Kin Wong and Johnny Tsz Wun Wong and Austin Tsz Wai Lau and Alan Po Lun Ho and Shuai Wang and Jogesh Muppala}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Backdoor Investigation and Incident Response: From Zero to Profit}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {229--247}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_14}, doi = {10.1007/978-3-031-06365-7\_14}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LaiWWLHWM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LiZHKD21, author = {Na Li and Haoyu Zhang and Zhihui Hu and Guang Kou and Huadong Dai}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {248--264}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_15}, doi = {10.1007/978-3-031-06365-7\_15}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LiZHKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MahrSGB21, author = {Andrew Mahr and Robert Serafin and Cinthya Grajeda and Ibrahim M. Baggili}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Auto-Parser: Android Auto and Apple CarPlay Forensics}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {52--71}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_4}, doi = {10.1007/978-3-031-06365-7\_4}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MahrSGB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Martin-PerezR21, author = {Miguel Mart{\'{\i}}n{-}P{\'{e}}rez and Ricardo J. Rodr{\'{\i}}guez}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Quantifying Paging on Recoverable Data from Windows User-Space Modules}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {1--19}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_1}, doi = {10.1007/978-3-031-06365-7\_1}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Martin-PerezR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MuhleGM21, author = {Alexander M{\"{u}}hle and Andreas Gr{\"{u}}ner and Christoph Meinel}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Gotta Catch'em All! Improving {P2P} Network Crawling Strategies}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {313--327}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_19}, doi = {10.1007/978-3-031-06365-7\_19}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MuhleGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MundtB21, author = {Michael Mundt and Harald Baier}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Towards Mitigation of Data Exfiltration Techniques Using the {MITRE} ATT{\&}CK Framework}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {139--158}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_9}, doi = {10.1007/978-3-031-06365-7\_9}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MundtB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/OuGHZ00021, author = {Haoran Ou and Yongyan Guo and Chaoyi Huang and Zhiying Zhao and Wenbo Guo and Yong Fang and Cheng Huang}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {No Pie in the Sky: The Digital Currency Fraud Website Detection}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {176--193}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_11}, doi = {10.1007/978-3-031-06365-7\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/OuGHZ00021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/TianMHTL21, author = {Zhenzhou Tian and Hengchao Mao and Yaqian Huang and Jie Tian and Jinrui Li}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Fine-Grained Obfuscation Scheme Recognition on Binary Code}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {215--228}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_13}, doi = {10.1007/978-3-031-06365-7\_13}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/TianMHTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/WyssD21, author = {Elizabeth Wyss and Drew Davidson}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Parcae: {A} Blockchain-Based {PRF} Service for Everyone}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {328--341}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_20}, doi = {10.1007/978-3-031-06365-7\_20}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/WyssD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ZhangSJLL21, author = {Zhenzhen Zhang and Henan Shi and Xinghao Jiang and Zhaohong Li and Jindou Liu}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {A CNN-Based {HEVC} Video Steganalysis Against DCT/DST-Based Steganography}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {265--276}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_16}, doi = {10.1007/978-3-031-06365-7\_16}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ZhangSJLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2020, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-68734-2}, doi = {10.1007/978-3-030-68734-2}, isbn = {978-3-030-68733-5}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/000220, author = {John Sheppard}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {A Partial Approach to Intrusion Detection}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {78--97}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_5}, doi = {10.1007/978-3-030-68734-2\_5}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/000220.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BortnikL20, author = {Lukas Bortnik and Arturs Lavrenovs}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Android Dumpsys Analysis to Indicate Driver Distraction}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {139--163}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_8}, doi = {10.1007/978-3-030-68734-2\_8}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BortnikL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BouchaudVG20, author = {Fran{\c{c}}ois Bouchaud and Thomas Vantroys and Gilles Grimaud}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Evidence Gathering in IoT Criminal Investigation}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {44--61}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_3}, doi = {10.1007/978-3-030-68734-2\_3}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BouchaudVG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Bromley0SL20, author = {Samuel Todd Bromley and John Sheppard and Mark Scanlon and Nhien{-}An Le{-}Khac}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Retracing the Flow of the Stream: Investigating Kodi Streaming Services}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {231--236}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_13}, doi = {10.1007/978-3-030-68734-2\_13}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Bromley0SL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BuschNFRSF20, author = {Marcel Busch and Florian Nicolai and Fabian Fleischer and Christian R{\"{u}}ckert and Christoph Safferling and Felix C. Freiling}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {23--43}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_2}, doi = {10.1007/978-3-030-68734-2\_2}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BuschNFRSF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/DokkoSP20, author = {Jieun Dokko and Michael Shin and Soo Young Park}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {An Intelligence Criminal Tracker for Industrial Espionage - Applying Digital Data Acquired Onsite to Target Criminals}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {224--230}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_12}, doi = {10.1007/978-3-030-68734-2\_12}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/DokkoSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/FerraraDSJB20, author = {Pasquale Ferrara and Gerard Draper{-}Gil and Ignacio Sanchez and Henrik Junklewitz and Laurent Beslay}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Modelling {GOP} Structure Effects on ENF-Based Video Forensics}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {121--138}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_7}, doi = {10.1007/978-3-030-68734-2\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/FerraraDSJB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Latzo20, author = {Tobias Latzo}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Efficient Fingerprint Matching for Forensic Event Reconstruction}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {98--120}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_6}, doi = {10.1007/978-3-030-68734-2\_6}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Latzo20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MatousekBRV20, author = {Petr Matousek and Ivana Burgetova and Ondrej Rysav{\'{y}} and Malombe Victor}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {On Reliability of {JA3} Hashes for Fingerprinting Mobile Applications}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {1--22}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_1}, doi = {10.1007/978-3-030-68734-2\_1}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MatousekBRV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MusseleHG20, author = {Tom Van der Mussele and Babak Habibnia and Pavel Gladyshev}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Remote Air-Gap Live Forensics}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {182--203}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_10}, doi = {10.1007/978-3-030-68734-2\_10}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MusseleHG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/PadillaAK20, author = {Edgar Padilla and Jaime C. Acosta and Christopher D. Kiekintveld}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Cybersecurity Methodology for Specialized Behavior Analysis}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {237--243}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_14}, doi = {10.1007/978-3-030-68734-2\_14}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/PadillaAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ShiWSL20, author = {Jiaqi Shi and Gang Wang and Ming Su and Xiaoguang Liu}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {62--77}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_4}, doi = {10.1007/978-3-030-68734-2\_4}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ShiWSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/WaltereitUZMW20, author = {Marian Waltereit and Maximilian Uphoff and Peter Zdankin and Viktor Matkovic and Torben Weis}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {A Digital Forensic Approach for Optimizing the Investigation of Hit-and-Run Accidents}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {204--223}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_11}, doi = {10.1007/978-3-030-68734-2\_11}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/WaltereitUZMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/WangFT20, author = {Zhongmin Wang and Zhen Feng and Zhenzhou Tian}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Neural Representation Learning Based Binary Code Authorship Attribution}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {244--249}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_15}, doi = {10.1007/978-3-030-68734-2\_15}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/WangFT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ZhouZ20, author = {Gengqian Zhou and Jianwei Zhuge}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Adapting to Local Conditions: Similarities and Differences in Anonymous Online Market Between Chinese and English Speaking Communities}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {164--181}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_9}, doi = {10.1007/978-3-030-68734-2\_9}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ZhouZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2018, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-05487-8}, doi = {10.1007/978-3-030-05487-8}, isbn = {978-3-030-05486-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/AL-MaksousyW18, author = {Hassan Hadi Latheeth Al{-}Maksousy and Michele C. Weigle}, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {Hybrid Intrusion Detection System for Worm Attacks Based on Their Network Behavior}, booktitle = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, pages = {225--234}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05487-8\_12}, doi = {10.1007/978-3-030-05487-8\_12}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/AL-MaksousyW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/DokkoS18, author = {Jieun Dokko and Michael Shin}, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {A Digital Forensic Investigation and Verification Model for Industrial Espionage}, booktitle = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, pages = {128--146}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05487-8\_7}, doi = {10.1007/978-3-030-05487-8\_7}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/DokkoS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/GobelB18, author = {Thomas G{\"{o}}bel and Harald Baier}, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {fishy - {A} Framework for Implementing Filesystem-Based Data Hiding Techniques}, booktitle = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, pages = {23--42}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05487-8\_2}, doi = {10.1007/978-3-030-05487-8\_2}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/GobelB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HaighBB18, author = {Trevor Haigh and Frank Breitinger and Ibrahim M. Baggili}, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {If {I} Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept}, booktitle = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, pages = {45--65}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05487-8\_3}, doi = {10.1007/978-3-030-05487-8\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HaighBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LieblerB18, author = {Lorenz Liebler and Harald Baier}, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving}, booktitle = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, pages = {3--22}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05487-8\_1}, doi = {10.1007/978-3-030-05487-8\_1}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LieblerB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Rowe18, author = {Neil C. Rowe}, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {Associating Drives Based on Their Artifact and Metadata Distributions}, booktitle = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, pages = {165--182}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05487-8\_9}, doi = {10.1007/978-3-030-05487-8\_9}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Rowe18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SchelkophPO18, author = {Daniel J. Schelkoph and Gilbert L. Peterson and James S. Okolica}, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {Digital Forensics Event Graph Reconstruction}, booktitle = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, pages = {185--203}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05487-8\_10}, doi = {10.1007/978-3-030-05487-8\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/SchelkophPO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SchmickerBB18, author = {Robert Schmicker and Frank Breitinger and Ibrahim M. Baggili}, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {AndroParse - An Android Feature Extraction Framework and Dataset}, booktitle = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, pages = {66--88}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05487-8\_4}, doi = {10.1007/978-3-030-05487-8\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/SchmickerBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ShenCZ18, author = {Jaryn Shen and Kim{-}Kwang Raymond Choo and Qingkai Zeng}, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {Multi-item Passphrases: {A} Self-adaptive Approach Against Offline Guessing Attacks}, booktitle = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, pages = {204--221}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05487-8\_11}, doi = {10.1007/978-3-030-05487-8\_11}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/ShenCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SinghIV18, author = {Avinash Singh and Adeyemi R. Ikuesan and Hein S. Venter}, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {Digital Forensic Readiness Framework for Ransomware Investigation}, booktitle = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, pages = {91--105}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05487-8\_5}, doi = {10.1007/978-3-030-05487-8\_5}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/SinghIV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Tabuyo-BenitoBP18, author = {Raquel Tabuyo{-}Benito and Hayretdin Bahsi and Pedro Peris{-}Lopez}, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {Forensics Analysis of an On-line Game over Steam Platform}, booktitle = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, pages = {106--127}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05487-8\_6}, doi = {10.1007/978-3-030-05487-8\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Tabuyo-BenitoBP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/VieyraSL18, author = {John Vieyra and Mark Scanlon and Nhien{-}An Le{-}Khac}, editor = {Frank Breitinger and Ibrahim M. Baggili}, title = {Solid State Drive Forensics: Where Do We Stand?}, booktitle = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference, {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {259}, pages = {149--164}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05487-8\_8}, doi = {10.1007/978-3-030-05487-8\_8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/VieyraSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2017, editor = {Petr Matousek and Martin Schmiedecker}, title = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-73697-6}, doi = {10.1007/978-3-319-73697-6}, isbn = {978-3-319-73696-9}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BarmpatsalouCMS17, author = {Konstantia Barmpatsalou and Tiago Cruz and Edmundo Monteiro and Paulo Sim{\~{o}}es}, editor = {Petr Matousek and Martin Schmiedecker}, title = {Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic Evidence}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {106--114}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_8}, doi = {10.1007/978-3-319-73697-6\_8}, timestamp = {Fri, 12 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/BarmpatsalouCMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BartonA17, author = {Thomas Edward Allen Barton and M. A. Hannan Bin Azhar}, editor = {Petr Matousek and Martin Schmiedecker}, title = {Open Source Forensics for a Multi-platform Drone System}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {83--96}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_6}, doi = {10.1007/978-3-319-73697-6\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BartonA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ErnsbergerIVZ17, author = {Dominik Ernsberger and Adeyemi Richard Ikuesan and Hein S. Venter and Alf Zugenmaier}, editor = {Petr Matousek and Martin Schmiedecker}, title = {A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {64--79}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_5}, doi = {10.1007/978-3-319-73697-6\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ErnsbergerIVZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Homem17, author = {Irvin Homem}, editor = {Petr Matousek and Martin Schmiedecker}, title = {Coriander: {A} Toolset for Generating Realistic Android Digital Evidence Datasets}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {228--233}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_18}, doi = {10.1007/978-3-319-73697-6\_18}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Homem17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/IqbalEA17, author = {Asif Iqbal and Mathias Ekstedt and Hanan Alobaidli}, editor = {Petr Matousek and Martin Schmiedecker}, title = {Digital Forensic Readiness in Critical Infrastructures: {A} Case of Substation Automation in the Power Sector}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {117--129}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_9}, doi = {10.1007/978-3-319-73697-6\_9}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/IqbalEA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JiaZHZT17, author = {Xiaoqi Jia and Guangzhe Zhou and Qingjia Huang and Weijuan Zhang and Donghai Tian}, editor = {Petr Matousek and Martin Schmiedecker}, title = {FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {3--17}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_1}, doi = {10.1007/978-3-319-73697-6\_1}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/JiaZHZT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JiangCCLLY17, author = {Jianguo Jiang and Jiuming Chen and Kim{-}Kwang Raymond Choo and Chao Liu and Kunying Liu and Min Yu}, editor = {Petr Matousek and Martin Schmiedecker}, title = {A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {130--143}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_10}, doi = {10.1007/978-3-319-73697-6\_10}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/JiangCCLLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/KiesebergNSSW17, author = {Peter Kieseberg and Sebastian Neuner and Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl}, editor = {Petr Matousek and Martin Schmiedecker}, title = {Real-Time Forensics Through Endpoint Visibility}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {18--32}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_2}, doi = {10.1007/978-3-319-73697-6\_2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/KiesebergNSSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/KnieriemZLBB17, author = {Brandon Knieriem and Xiaolu Zhang and Philip Levine and Frank Breitinger and Ibrahim M. Baggili}, editor = {Petr Matousek and Martin Schmiedecker}, title = {An Overview of the Usage of Default Passwords}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {195--203}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_15}, doi = {10.1007/978-3-319-73697-6\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/KnieriemZLBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LeopardRM17, author = {Charles B. Leopard and Neil C. Rowe and Michael R. McCarrin}, editor = {Petr Matousek and Martin Schmiedecker}, title = {Memory Forensics and the Macintosh {OS} {X} Operating System}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {175--180}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_13}, doi = {10.1007/978-3-319-73697-6\_13}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LeopardRM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LieblerB17, author = {Lorenz Liebler and Harald Baier}, editor = {Petr Matousek and Martin Schmiedecker}, title = {Approxis: {A} Fast, Robust, Lightweight and Approximate Disassembler Considered in the Field of Memory Forensics}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {158--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_12}, doi = {10.1007/978-3-319-73697-6\_12}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LieblerB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LillisBS17, author = {David Lillis and Frank Breitinger and Mark Scanlon}, editor = {Petr Matousek and Martin Schmiedecker}, title = {Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {144--157}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_11}, doi = {10.1007/978-3-319-73697-6\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LillisBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MacRaeF17, author = {John MacRae and Virginia N. L. Franqueira}, editor = {Petr Matousek and Martin Schmiedecker}, title = {On Locky Ransomware, Al Capone and Brexit}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {33--45}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_3}, doi = {10.1007/978-3-319-73697-6\_3}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MacRaeF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/RenZLFZS17, author = {Pu Ren and Mingquan Zhou and Jin Liu and Yachun Fan and Wenshuo Zhao and Wuyang Shui}, editor = {Petr Matousek and Martin Schmiedecker}, title = {Sketch-Based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {181--194}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_14}, doi = {10.1007/978-3-319-73697-6\_14}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/RenZLFZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Rowe17, author = {Neil C. Rowe}, editor = {Petr Matousek and Martin Schmiedecker}, title = {Finding and Rating Personal Names on Drives for Forensic Needs}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {49--63}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_4}, doi = {10.1007/978-3-319-73697-6\_4}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Rowe17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/VondracekPR17, author = {Martin Vondr{\'{a}}cek and Jan Pluskal and Ondrej Rysav{\'{y}}}, editor = {Petr Matousek and Martin Schmiedecker}, title = {Automation of MitM Attack on Wi-Fi Networks}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {207--220}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_16}, doi = {10.1007/978-3-319-73697-6\_16}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/VondracekPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/XinSYW17, author = {Wu Xin and Qingni Shen and Yahui Yang and Zhonghai Wu}, editor = {Petr Matousek and Martin Schmiedecker}, title = {SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {221--227}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_17}, doi = {10.1007/978-3-319-73697-6\_17}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/XinSYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/XuS0QWSGY17, author = {Ming Xu and Jinkai Sun and Ning Zheng and Tong Qiao and Yiming Wu and Kai Shi and Haidong Ge and Tao Yang}, editor = {Petr Matousek and Martin Schmiedecker}, title = {A Novel File Carving Algorithm for {EVTX} Logs}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {97--105}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_7}, doi = {10.1007/978-3-319-73697-6\_7}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/XuS0QWSGY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Al-khateebCABB16, author = {Samer Al{-}khateeb and Kevin J. Conlan and Nitin Agarwal and Ibrahim M. Baggili and Frank Breitinger}, title = {Exploring Deviant Hacker Networks {(DHN)} On Social Media Platforms}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {7--20}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1375}, doi = {10.15394/JDFSL.2016.1375}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Al-khateebCABB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/GunestasB16, author = {Murat Gunestas and Zeki Bilgin}, title = {Log Analysis Using Temporal Logic and Reconstruction Approach: Web Server Case}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {35--58}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1377}, doi = {10.15394/JDFSL.2016.1377}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/GunestasB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/HarichandranBB16, author = {Vikram S. Harichandran and Frank Breitinger and Ibrahim M. Baggili}, title = {Bytewise Approximate Matching: The Good, The Bad, and The Unknown}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {59--78}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1379}, doi = {10.15394/JDFSL.2016.1379}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/HarichandranBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JeongBKL16, author = {Doowon Jeong and Frank Breitinger and Hari Kang and Sangjin Lee}, title = {Towards Syntactic Approximate Matching - {A} Pre-Processing Experiment}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {97--110}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1381}, doi = {10.15394/JDFSL.2016.1381}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JeongBKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JulliandTN16, author = {Thibault Julliand and Hugues Talbot and Vincent Nozick}, title = {Countering Noise-based Splicing Detection Using Noise Density Transfer}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {111--122}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1382}, doi = {10.15394/JDFSL.2016.1382}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JulliandTN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LeeJEK16, author = {Kibin Lee and Joshua I. James and Tekachew Gobena Ejeta and Hyoung Joong Kim}, title = {Electronic Voting Service Using Block-Chain}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {123--136}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1383}, doi = {10.15394/JDFSL.2016.1383}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LeeJEK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MatousekHHR16, author = {Petr Matousek and Radek Hranicky and Martin Holkovic and Ondrej Rysav{\'{y}}}, title = {On Efficiency of Distributed Password Recovery}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {79--96}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1380}, doi = {10.15394/JDFSL.2016.1380}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MatousekHHR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MohammedCL16, author = {Hussam Jasim Mohammed and Nathan Luke Clarke and Fudong Li}, title = {An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {137--152}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1384}, doi = {10.15394/JDFSL.2016.1384}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MohammedCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RoweSMG16, author = {Neil C. Rowe and Riqui Schwamm and Michael McCarrin and Ralucca Gera}, title = {Making Sense of Email Addresses on Drives}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {153--174}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1385}, doi = {10.15394/JDFSL.2016.1385}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RoweSMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SinghCS16, author = {Monika Singh and Donghoon Chang and Somitra Kumar Sanadhya}, title = {Security Analysis of mvHash-B Similarity Hashing}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {21--34}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1376}, doi = {10.15394/JDFSL.2016.1376}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SinghCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ThompsonH16, author = {Marcus Thompson and Raymond Hansen}, title = {Verification of Recovered Digital Evidence on the Amazon Kindle}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {175--192}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1386}, doi = {10.15394/JDFSL.2016.1386}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ThompsonH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/AkatyevJ15, author = {Nikolay Akatyev and Joshua I. James}, editor = {Joshua I. James and Frank Breitinger}, title = {Cyber Peacekeeping}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {126--139}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_10}, doi = {10.1007/978-3-319-25512-5\_10}, timestamp = {Thu, 14 Oct 2021 10:05:19 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/AkatyevJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/AlvarezB15, author = {Karolina Alvarez and Masooda N. Bashir}, editor = {Joshua I. James and Frank Breitinger}, title = {Exploring the Effectiveness of Digital Forensics Tools on the Sony PlayStation Vita}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {200--206}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_14}, doi = {10.1007/978-3-319-25512-5\_14}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/AlvarezB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BertiniSIM15, author = {Flavio Bertini and Rajesh Sharma and Andrea Ianni and Danilo Montesi}, editor = {Joshua I. James and Frank Breitinger}, title = {Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {176--186}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_12}, doi = {10.1007/978-3-319-25512-5\_12}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/BertiniSIM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ColeDR15, author = {Kelly A. Cole and Tejashree Datar and Marcus K. Rogers}, editor = {Joshua I. James and Frank Breitinger}, title = {Awareness of Scam E-Mails: An Exploratory Research Study - Part 2}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {115--125}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_9}, doi = {10.1007/978-3-319-25512-5\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ColeDR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ConwayJG15, author = {Alleyn Conway and Joshua I. James and Pavel Gladyshev}, editor = {Joshua I. James and Frank Breitinger}, title = {Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {16--26}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_2}, doi = {10.1007/978-3-319-25512-5\_2}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ConwayJG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/GuptaB15, author = {Vikas Gupta and Frank Breitinger}, editor = {Joshua I. James and Frank Breitinger}, title = {How Cuckoo Filter Can Improve Existing Approximate Matching Techniques}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {39--52}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_4}, doi = {10.1007/978-3-319-25512-5\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/GuptaB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HanJL15, author = {Jaehyeok Han and Doowon Jeong and Sangjin Lee}, editor = {Joshua I. James and Frank Breitinger}, title = {Analysis of the {HIKVISION} {DVR} File System}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {189--199}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_13}, doi = {10.1007/978-3-319-25512-5\_13}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HanJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JamesG15, author = {Joshua I. James and Pavel Gladyshev}, editor = {Joshua I. James and Frank Breitinger}, title = {A Survey of International Cooperation in Digital Investigations}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {103--114}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_8}, doi = {10.1007/978-3-319-25512-5\_8}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/JamesG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MatousekPRVKKV15, author = {Petr Matousek and Jan Pluskal and Ondrej Rysav{\'{y}} and Vladim{\'{\i}}r Vesel{\'{y}} and Martin Kmet and Filip Karp{\'{\i}}sek and Martin Vyml{\'{a}}til}, editor = {Joshua I. James and Frank Breitinger}, title = {Advanced Techniques for Reconstruction of Incomplete Network Data}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {69--84}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_6}, doi = {10.1007/978-3-319-25512-5\_6}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MatousekPRVKKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/PalmerWNGBC15, author = {Imani Palmer and Elaine Wood and Stefan Nagy and Gabriela Garc{\'{\i}}a and Masooda N. Bashir and Roy H. Campbell}, editor = {Joshua I. James and Frank Breitinger}, title = {Digital Forensics Education: {A} Multidisciplinary Curriculum Model}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {3--15}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_1}, doi = {10.1007/978-3-319-25512-5\_1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/PalmerWNGBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/QuinnSFK15, author = {Conor Quinn and Mark Scanlon and Jason Farina and M. Tahar Kechadi}, editor = {Joshua I. James and Frank Breitinger}, title = {Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {85--99}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_7}, doi = {10.1007/978-3-319-25512-5\_7}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/QuinnSFK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Seigfried-Spellar15, author = {Kathryn C. Seigfried{-}Spellar and Ben M. Flores and Darrin J. Griffin}, editor = {Joshua I. James and Frank Breitinger}, title = {Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-psychological and Communication Perspectives}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {143--175}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_11}, doi = {10.1007/978-3-319-25512-5\_11}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Seigfried-Spellar15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SinghPT15, author = {Vivek Kumar Singh and Pallav Pant and Ramesh Chandra Tripathi}, editor = {Joshua I. James and Frank Breitinger}, title = {Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {29--38}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_3}, doi = {10.1007/978-3-319-25512-5\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/SinghPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ZhangYRH15, author = {Yulong Zhang and Baijian Yang and Marcus K. Rogers and Raymond A. Hansen}, editor = {Joshua I. James and Frank Breitinger}, title = {Forensically Sound Retrieval and Recovery of Images from {GPU} Memory}, booktitle = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, pages = {53--66}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5\_5}, doi = {10.1007/978-3-319-25512-5\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ZhangYRH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2015, editor = {Joshua I. James and Frank Breitinger}, title = {Digital Forensics and Cyber Crime - 7th International Conference, {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {157}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25512-5}, doi = {10.1007/978-3-319-25512-5}, isbn = {978-3-319-25511-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2013, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14289-0}, doi = {10.1007/978-3-319-14289-0}, isbn = {978-3-319-14288-3}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/0003OMB13, author = {Asif Iqbal and Hanan Al Obaidli and Andrew Marrington and Ibrahim M. Baggili}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Amazon Kindle Fire {HD} Forensics}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {39--50}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_4}, doi = {10.1007/978-3-319-14289-0\_4}, timestamp = {Mon, 16 Sep 2019 15:25:59 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/0003OMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BreitingerL0BRS13, author = {Frank Breitinger and Huajian Liu and Christian Winter and Harald Baier and Alexey Rybalchenko and Martin Steinebach}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Towards a Process Model for Hash Functions in Digital Forensics}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {170--186}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_12}, doi = {10.1007/978-3-319-14289-0\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BreitingerL0BRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BrennanUG13, author = {Fergal Brennan and Martins Udris and Pavel Gladyshev}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {An Automated Link Analysis Solution Applied to Digital Forensic Investigations}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {189--206}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_13}, doi = {10.1007/978-3-319-14289-0\_13}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BrennanUG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/DoyoddorjR13, author = {Munkhbaatar Doyoddorj and Kyung Hyune Rhee}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Robust Copy-Move Forgery Detection Based on Dual-Transform}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {3--16}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_1}, doi = {10.1007/978-3-319-14289-0\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/DoyoddorjR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/GoelM13, author = {Prachi Goel and Babu M. Mehtre}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Forensic Artifacts of the flareGet Download Manager}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {30--38}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_3}, doi = {10.1007/978-3-319-14289-0\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/GoelM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/GuptaM13, author = {Deepak Gupta and Babu M. Mehtre}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {247--251}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_17}, doi = {10.1007/978-3-319-14289-0\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/GuptaM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JamesLG13, author = {Joshua I. James and Alejandra Lopez{-}Fernandez and Pavel Gladyshev}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {147--169}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_11}, doi = {10.1007/978-3-319-14289-0\_11}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/JamesLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JamesSG13, author = {Joshua I. James and Ahmed F. Shosha and Pavel Gladyshev}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Determining Training Needs for Cloud Infrastructure Investigations Using {I-STRIDE}}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {223--236}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_15}, doi = {10.1007/978-3-319-14289-0\_15}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/JamesSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LambertzUG13, author = {Martin Lambertz and Rafael Uetz and Elmar Gerhards{-}Padilla}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Resurrection: {A} Carver for Fragmented Files}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {51--66}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_5}, doi = {10.1007/978-3-319-14289-0\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LambertzUG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MarcoKF13, author = {Lucia De Marco and M. Tahar Kechadi and Filomena Ferrucci}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Cloud Forensic Readiness: Foundations}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {237--244}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_16}, doi = {10.1007/978-3-319-14289-0\_16}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MarcoKF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MarringtonIB13, author = {Andrew Marrington and Farkhund Iqbal and Ibrahim M. Baggili}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Computer Profiling for Preliminary Forensic Examination}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {207--220}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_14}, doi = {10.1007/978-3-319-14289-0\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/MarringtonIB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Peshin13, author = {Esti Peshin}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Regulating Social Network Services for Lawful Interception}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {119--129}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_9}, doi = {10.1007/978-3-319-14289-0\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Peshin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/PoiselRT13, author = {Rainer Poisel and Marlies Rybnicek and Simon Tjoa}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Taxonomy of Data Fragment Classification Techniques}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {67--85}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_6}, doi = {10.1007/978-3-319-14289-0\_6}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/PoiselRT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Rowe13, author = {Neil C. Rowe}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Identifying Forensically Uninteresting Files Using a Large Corpus}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {86--101}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_7}, doi = {10.1007/978-3-319-14289-0\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Rowe13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SteinebachLY13, author = {Martin Steinebach and Huajian Liu and York Yannikos}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {FaceHash: Face Detection and Robust Hashing}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {102--115}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_8}, doi = {10.1007/978-3-319-14289-0\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/SteinebachLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SubairBDT13, author = {P. Shabana Subair and C. Balan and S. Dija and K. L. Thomas}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Forensic Decryption of {FAT} BitLocker Volumes}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {17--29}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_2}, doi = {10.1007/978-3-319-14289-0\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/SubairBDT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Watney13, author = {Murdoch Watney}, editor = {Pavel Gladyshev and Andrew Marrington and Ibrahim M. Baggili}, title = {Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: {A} Synopsis}, booktitle = {Digital Forensics and Cyber Crime - Fifth International Conference, {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {132}, pages = {130--143}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-14289-0\_10}, doi = {10.1007/978-3-319-14289-0\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/Watney13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2012, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39891-9}, doi = {10.1007/978-3-642-39891-9}, isbn = {978-3-642-39890-2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/AdedayoO12, author = {Oluwasola Mary Adedayo and Martin S. Olivier}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {On the Completeness of Reconstructed Data for Database Forensics}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {220--238}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_14}, doi = {10.1007/978-3-642-39891-9\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/AdedayoO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/AouadKR12, author = {Lamine M. Aouad and M. Tahar Kechadi and Roberto Di Russo}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {{ANTS} {ROAD:} {A} New Tool for SQLite Data Recovery on Android Devices}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {253--263}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_16}, doi = {10.1007/978-3-642-39891-9\_16}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/AouadKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BaggiliBAM12, author = {Ibrahim M. Baggili and Afrah BaAbdallah and Deena Al{-}Safi and Andrew Marrington}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {144--157}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_9}, doi = {10.1007/978-3-642-39891-9\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BaggiliBAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BaggiliSJZ12, author = {Ibrahim M. Baggili and Moza Al Shamlan and Bedoor Al Jabri and Ayesha Al Zaabi}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {91--108}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_7}, doi = {10.1007/978-3-642-39891-9\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BaggiliSJZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BeckRY12, author = {Marc Beck and Eric C. Rouchka and Roman V. Yampolskiy}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Finding Data in {DNA:} Computer Forensic Investigations of Living Organisms}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {204--219}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_13}, doi = {10.1007/978-3-642-39891-9\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BeckRY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BreitingerB12, author = {Frank Breitinger and Harald Baier}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {167--182}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_11}, doi = {10.1007/978-3-642-39891-9\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BreitingerB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/GraafSG12, author = {Daan de Graaf and Ahmed F. Shosha and Pavel Gladyshev}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {{BREDOLAB:} Shopping in the Cybercrime Underworld}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {302--313}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_19}, doi = {10.1007/978-3-642-39891-9\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/GraafSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/IdlandJM12, author = {Christer Idland and Thomas Jelle and Stig Fr. Mj{\o}lsnes}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Detection of Masqueraded Wireless Access Using 802.11 {MAC} Layer Fingerprints}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {283--301}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_18}, doi = {10.1007/978-3-642-39891-9\_18}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/IdlandJM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/KoppenGBDKMW12, author = {Jeremy Koppen and Gerald Gent and Kevin Bryan and Lisa Cingiser DiPippo and Jillian Kramer and Marquita Moreland and Victor Fay Wolfe}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Identifying Remnants of Evidence in the Cloud}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {42--57}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_3}, doi = {10.1007/978-3-642-39891-9\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/KoppenGBDKMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/KyeiZLR12, author = {Kwaku Kyei and Pavol Zavarsky and Dale Lindskog and Ron Ruhl}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {A Review and Comparative Study of Digital Forensic Investigation Models}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {314--327}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_20}, doi = {10.1007/978-3-642-39891-9\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/KyeiZLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MarzougyBM12, author = {Mohamed Al Marzougy and Ibrahim M. Baggili and Andrew Marrington}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {BlackBerry PlayBook Backup Forensic Analysis}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {239--252}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_15}, doi = {10.1007/978-3-642-39891-9\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MarzougyBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/McGrathG12, author = {Niall McGrath and Pavel Gladyshev}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Investigating File Encrypted Material Using {NTFS} {\textdollar}logfile}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {183--203}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_12}, doi = {10.1007/978-3-642-39891-9\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/McGrathG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MohamedY12, author = {Abdallah A. Mohamed and Roman V. Yampolskiy}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {158--166}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_10}, doi = {10.1007/978-3-642-39891-9\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MohamedY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/RuanC12, author = {Keyun Ruan and Joe Carthy}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Cloud Computing Reference Architecture and Its Forensic Implications: {A} Preliminary Analysis}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {1--21}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_1}, doi = {10.1007/978-3-642-39891-9\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/RuanC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/RuanC12a, author = {Keyun Ruan and Joe Carthy}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Cloud Forensic Maturity Model}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {22--41}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_2}, doi = {10.1007/978-3-642-39891-9\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/RuanC12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SaleemPA12, author = {Shahzad Saleem and Oliver Popov and Oheneba Kwame Appiah{-}Kubi}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {264--282}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_17}, doi = {10.1007/978-3-642-39891-9\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/SaleemPA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Seigfried-Spellar12, author = {Kathryn C. Seigfried{-}Spellar}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Measuring the Preference of Image Content for Self-reported Consumers of Child Pornography}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {81--90}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_6}, doi = {10.1007/978-3-642-39891-9\_6}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Seigfried-Spellar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ShoshaJHLG12, author = {Ahmed F. Shosha and Joshua I. James and Alan Hannaway and Chen{-}Ching Liu and Pavel Gladyshev}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {66--80}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_5}, doi = {10.1007/978-3-642-39891-9\_5}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/ShoshaJHLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Strikwerda12, author = {Litska Strikwerda}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {When Should Virtual Cybercrime Be Brought under the Scope of the Criminal Law?}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {109--143}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_8}, doi = {10.1007/978-3-642-39891-9\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Strikwerda12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Tennyson12, author = {Matthew F. Tennyson}, editor = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {On Improving Authorship Attribution of Source Code}, booktitle = {Digital Forensics and Cyber Crime - 4th International Conference, {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {114}, pages = {58--65}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-39891-9\_4}, doi = {10.1007/978-3-642-39891-9\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Tennyson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2011, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35515-8}, doi = {10.1007/978-3-642-35515-8}, isbn = {978-3-642-35514-1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Barnett11, author = {Alexander G. Barnett}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {The Forensic Value of the Windows 7 Jump List}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {197--210}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_17}, doi = {10.1007/978-3-642-35515-8\_17}, timestamp = {Wed, 24 May 2017 08:28:31 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Barnett11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Blackwell11, author = {Clive Blackwell}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {A Forensic Framework for Incident Analysis Applied to the Insider Threat}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {268--281}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_22}, doi = {10.1007/978-3-642-35515-8\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Blackwell11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BreitingerB11, author = {Frank Breitinger and Harald Baier}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Performance Issues About Context-Triggered Piecewise Hashing}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {141--155}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_12}, doi = {10.1007/978-3-642-35515-8\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BreitingerB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ChoR11, author = {Gyu{-}Sang Cho and Marcus K. Rogers}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Finding Forensic Information on Creating a Folder in {\textdollar}LogFile of {NTFS}}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {211--225}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_18}, doi = {10.1007/978-3-642-35515-8\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ChoR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ColeSM11, author = {Kelly A. Cole and Ramindu L. Silva and Richard P. Mislan}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {All Bot Net: {A} Need for Smartphone {P2P} Awareness}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {36--46}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_4}, doi = {10.1007/978-3-642-35515-8\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ColeSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/KatzMRS11, author = {Eric Katz and Richard Mislan and Marcus K. Rogers and Anthony Smith}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Results of Field Testing Mobile Phone Shielding Devices}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {47--61}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_5}, doi = {10.1007/978-3-642-35515-8\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/KatzMRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/KeaneO11, author = {Anthony Keane and Stephen O'Shaughnessy}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Tracking User Activity on Personal Computers}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {188--196}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_16}, doi = {10.1007/978-3-642-35515-8\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/KeaneO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/KumarTT11, author = {S. Satheesh Kumar and Bibin Thomas and K. L. Thomas}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {An Agent Based Tool for Windows Mobile Forensics}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {77--88}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_7}, doi = {10.1007/978-3-642-35515-8\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/KumarTT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LevendoskiDR11, author = {Matthew Levendoski and Tejashree Datar and Marcus K. Rogers}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Yahoo! Messenger Forensics on Windows Vista and Windows 7}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {172--179}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_14}, doi = {10.1007/978-3-642-35515-8\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LevendoskiDR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Lohrum11, author = {Mark Lohrum}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Forensic Extractions of Data from the Nokia {N900}}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {89--103}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_8}, doi = {10.1007/978-3-642-35515-8\_8}, timestamp = {Thu, 30 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Lohrum11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Lohrum11a, author = {Mark Lohrum}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Forensic Extractions of Data from the Nokia {N900}}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {253--267}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_21}, doi = {10.1007/978-3-642-35515-8\_21}, timestamp = {Thu, 30 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Lohrum11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Lyle11, author = {James R. Lyle}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {A Strategy for Testing Metadata Based Deleted File Recovery Tools}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {104--114}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_9}, doi = {10.1007/978-3-642-35515-8\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Lyle11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MochF11, author = {Christian Moch and Felix C. Freiling}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Evaluating the Forensic Image Generator Generator}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {238--252}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_20}, doi = {10.1007/978-3-642-35515-8\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MochF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MokhovPD11, author = {Serguei A. Mokhov and Joey Paquet and Mourad Debbabi}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Reasoning About a Simulated Printer Case Investigation with Forensic Lucid}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {282--296}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_23}, doi = {10.1007/978-3-642-35515-8\_23}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MokhovPD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Murphy11, author = {Cynthia A. Murphy}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {The Role of Perception in Age Estimation}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {1--16}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_1}, doi = {10.1007/978-3-642-35515-8\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Murphy11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Peshin11, author = {Esti Peshin}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Law Enforcement 2.0: Regulating the Lawful Interception of Social Media}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {33--35}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_3}, doi = {10.1007/978-3-642-35515-8\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Peshin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/RoweG11, author = {Neil C. Rowe and Simson L. Garfinkel}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {115--130}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_10}, doi = {10.1007/978-3-642-35515-8\_10}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/RoweG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SchaeferHS11, author = {Thomas Schaefer and Hans H{\"{o}}fken and Marko Schuba}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Windows Phone 7 from a Digital Forensics' Perspective}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {62--76}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_6}, doi = {10.1007/978-3-642-35515-8\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/SchaeferHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Seigfried-SpellarBR11, author = {Kathryn C. Seigfried{-}Spellar and Gary R. Bertoline and Marcus K. Rogers}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Internet Child Pornography, {U.S.} Sentencing Guidelines, and the Role of Internet Service Providers}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {17--32}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_2}, doi = {10.1007/978-3-642-35515-8\_2}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Seigfried-SpellarBR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ShoshaJG11, author = {Ahmed F. Shosha and Joshua James and Pavel Gladyshev}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {A Novel Methodology for Malware Intrusion Attack Path Reconstruction}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {131--140}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_11}, doi = {10.1007/978-3-642-35515-8\_11}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ShoshaJG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Steinebach11, author = {Martin Steinebach}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Robust Hashing for Efficient Forensic Analysis of Image Sets}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {180--187}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_15}, doi = {10.1007/978-3-642-35515-8\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Steinebach11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ThorpeRRGBF11, author = {Sean S. E. Thorpe and Indrakshi Ray and Indrajit Ray and Tyrone Grandison and Abbie Barbir and Robert B. France}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {156--171}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_13}, doi = {10.1007/978-3-642-35515-8\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ThorpeRRGBF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/YasuhiraNK11, author = {Toshinobu Yasuhira and Kazuhiro Nishimura and Tomofumi Koida}, editor = {Pavel Gladyshev and Marcus K. Rogers}, title = {Rescuing Digital Data from Submerged {HDD}}, booktitle = {Digital Forensics and Cyber Crime - Third International {ICST} Conference, {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {88}, pages = {226--237}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35515-8\_19}, doi = {10.1007/978-3-642-35515-8\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/YasuhiraNK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2010, editor = {Ibrahim M. Baggili}, title = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19513-6}, doi = {10.1007/978-3-642-19513-6}, isbn = {978-3-642-19512-9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/AlkaabiMMC10, author = {Ali Alkaabi and George M. Mohay and Adrian McCullagh and Nicholas Chantler}, editor = {Ibrahim M. Baggili}, title = {Dealing with the Problem of Cybercrime}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {1--18}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_1}, doi = {10.1007/978-3-642-19513-6\_1}, timestamp = {Wed, 24 May 2017 08:28:31 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/AlkaabiMMC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BabooB10, author = {S. Santhosh Baboo and P. Vinod Bhattathiripad}, editor = {Ibrahim M. Baggili}, title = {Software Piracy Forensics: The Need for Further Developing {AFC}}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {19--26}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_2}, doi = {10.1007/978-3-642-19513-6\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BabooB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BarikiHB10, author = {Hamda Bariki and Mariam Hashmi and Ibrahim M. Baggili}, editor = {Ibrahim M. Baggili}, title = {Defining a Standard for Reporting Digital Evidence Items in Computer Forensic Tools}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {78--95}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_7}, doi = {10.1007/978-3-642-19513-6\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BarikiHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/GladyshevA10, author = {Pavel Gladyshev and Afrah Almansoori}, editor = {Ibrahim M. Baggili}, title = {Reliable Acquisition of {RAM} Dumps from Intel-Based Apple Mac Computers over FireWire}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {55--64}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_5}, doi = {10.1007/978-3-642-19513-6\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/GladyshevA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HashimS10, author = {Noor Hashim and Iain Sutherland}, editor = {Ibrahim M. Baggili}, title = {An Architecture for the Forensic Analysis of Windows System Artifacts}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {120--128}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_10}, doi = {10.1007/978-3-642-19513-6\_10}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HashimS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HusainBS10, author = {Mohammad Iftekhar Husain and Ibrahim M. Baggili and Ramalingam Sridhar}, editor = {Ibrahim M. Baggili}, title = {A Simple Cost-Effective Framework for iPhone Forensic Analysis}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {27--37}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_3}, doi = {10.1007/978-3-642-19513-6\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HusainBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JamesGZ10, author = {Joshua James and Pavel Gladyshev and Yuandong Zhu}, editor = {Ibrahim M. Baggili}, title = {Signature Based Detection of User Events for Post-mortem Forensic Analysis}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {96--109}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_8}, doi = {10.1007/978-3-642-19513-6\_8}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/JamesGZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/KahvedzicK10, author = {Damir Kahvedzic and M. Tahar Kechadi}, editor = {Ibrahim M. Baggili}, title = {Semantic Modelling of Digital Forensic Evidence}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {149--156}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_13}, doi = {10.1007/978-3-642-19513-6\_13}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/KahvedzicK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/PilliJN10, author = {Emmanuel S. Pilli and Ramesh Chandra Joshi and Rajdeep Niyogi}, editor = {Ibrahim M. Baggili}, title = {An {IP} Traceback Model for Network Forensics}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {129--136}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_11}, doi = {10.1007/978-3-642-19513-6\_11}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/PilliJN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/PovarB10, author = {Digambar Povar and V. K. Bhadran}, editor = {Ibrahim M. Baggili}, title = {Forensic Data Carving}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {137--148}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_12}, doi = {10.1007/978-3-642-19513-6\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/PovarB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SaleemP10, author = {Shahzad Saleem and Oliver Popov}, editor = {Ibrahim M. Baggili}, title = {Protecting Digital Evidence Integrity by Using Smart Cards}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {110--119}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_9}, doi = {10.1007/978-3-642-19513-6\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/SaleemP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SinghEWM10, author = {Gurvinder Singh and Martin Eian and Svein Yngvar Willassen and Stig Fr. Mj{\o}lsnes}, editor = {Ibrahim M. Baggili}, title = {Detecting Intermediary Hosts by {TCP} Latency Measurements}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {38--54}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_4}, doi = {10.1007/978-3-642-19513-6\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/SinghEWM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/TrabelsiABA10, author = {Zouheir Trabelsi and Mohamed Al{-}Hemairy and Ibrahim M. Baggili and Saad Ali Amin}, editor = {Ibrahim M. Baggili}, title = {Towards More Secure Biometric Readers for Effective Digital Forensic Investigation}, booktitle = {Digital Forensics and Cyber Crime - Second International {ICST} Conference, {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {53}, pages = {65--77}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19513-6\_6}, doi = {10.1007/978-3-642-19513-6\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/TrabelsiABA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2009, editor = {Sanjay Goel}, title = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11534-9}, doi = {10.1007/978-3-642-11534-9}, isbn = {978-3-642-11533-2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Al-KuwariW09, author = {Saif M. Al{-}Kuwari and Stephen D. Wolthusen}, editor = {Sanjay Goel}, title = {A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {19--32}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_3}, doi = {10.1007/978-3-642-11534-9\_3}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Al-KuwariW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BaggiliMR09, author = {Ibrahim M. Baggili and Ashwin Mohan and Marcus K. Rogers}, editor = {Sanjay Goel}, title = {{SMIRK:} {SMS} Management and Information Retrieval Kit}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {33--42}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_4}, doi = {10.1007/978-3-642-11534-9\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BaggiliMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HusainS09, author = {Mohammad Iftekhar Husain and Ramalingam Sridhar}, editor = {Sanjay Goel}, title = {iForensics: Forensic Analysis of Instant Messaging on Smart Phones}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {9--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_2}, doi = {10.1007/978-3-642-11534-9\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HusainS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/IbrahimM09, author = {Amin Ibrahim and Miguel Vargas Martin}, editor = {Sanjay Goel}, title = {Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {139--150}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_14}, doi = {10.1007/978-3-642-11534-9\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/IbrahimM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JamesGAZ09, author = {Joshua James and Pavel Gladyshev and Mohd Taufik Abdullah and Yuandong Zhu}, editor = {Sanjay Goel}, title = {Analysis of Evidence Using Formal Event Reconstruction}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {85--98}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_9}, doi = {10.1007/978-3-642-11534-9\_9}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/JamesGAZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LawCLT09, author = {Frank Y. W. Law and Kam{-}Pui Chow and Pierre K. Y. Lai and Hayson Tse}, editor = {Sanjay Goel}, title = {A Host-Based Approach to BotNet Investigation?}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {161--170}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_16}, doi = {10.1007/978-3-642-11534-9\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LawCLT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Le-KhacMK09, author = {Nhien{-}An Le{-}Khac and Sammer Markos and Mohand Tahar Kechadi}, editor = {Sanjay Goel}, title = {Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {77--84}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_8}, doi = {10.1007/978-3-642-11534-9\_8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Le-KhacMK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MagalingamMAY09, author = {Pritheega Magalingam and Azizah Bt Abdul Manaf and Rabiah Ahmad and Zuraimi Yahya}, editor = {Sanjay Goel}, title = {Digital Evidence Retrieval and Forensic Analysis on Gambling Machine}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {111--121}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_11}, doi = {10.1007/978-3-642-11534-9\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MagalingamMAY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Mercuri09, author = {Rebecca Mercuri}, editor = {Sanjay Goel}, title = {Criminal Defense Challenges in Computer Forensics}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {132--138}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_13}, doi = {10.1007/978-3-642-11534-9\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Mercuri09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/OrebaughA09, author = {Angela Orebaugh and Jeremy E. Allnutt}, editor = {Sanjay Goel}, title = {Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {99--110}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_10}, doi = {10.1007/978-3-642-11534-9\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/OrebaughA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/RaghavanR09, author = {Sriram Raghavan and S. V. Raghavan}, editor = {Sanjay Goel}, title = {Digital Evidence Composition in Fraud Detection}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {1--8}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_1}, doi = {10.1007/978-3-642-11534-9\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/RaghavanR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ScanlonK09, author = {Mark Scanlon and Mohand Tahar Kechadi}, editor = {Sanjay Goel}, title = {Online Acquisition of Digital Forensic Evidence}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {122--131}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_12}, doi = {10.1007/978-3-642-11534-9\_12}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ScanlonK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/SteinebachOLK09, author = {Martin Steinebach and Mohamed El Ouariachi and Huajian Liu and Stefan Katzenbeisser}, editor = {Sanjay Goel}, title = {On the Reliability of Cell Phone Camera Fingerprint Recognition}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {69--76}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_7}, doi = {10.1007/978-3-642-11534-9\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/SteinebachOLK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/WilsonL09, author = {Duane Wilson and Michael K. Lavine}, editor = {Sanjay Goel}, title = {A Discretionary Access Control Method for Preventing Data Exfiltration {(DE)} via Removable Devices}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {151--160}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_15}, doi = {10.1007/978-3-642-11534-9\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/WilsonL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/YasinWK09, author = {Muhammad Yasin and Muhammad Arif Wahla and Firdous Kausar}, editor = {Sanjay Goel}, title = {Analysis of Free Download Manager for Forensic Artefacts}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {59--68}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_6}, doi = {10.1007/978-3-642-11534-9\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/YasinWK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/YoonC09, author = {Jong P. Yoon and Zhixiong Chen}, editor = {Sanjay Goel}, title = {Localization and Detection of Vector Logo Image Plagiarism}, booktitle = {Digital Forensics and Cyber Crime - First International {ICST} Conference, {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {31}, pages = {43--58}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11534-9\_5}, doi = {10.1007/978-3-642-11534-9\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/YoonC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.