Search dblp for Publications

export results for "stream:conf/icdf2c:"

 download as .bib file

@proceedings{DBLP:conf/icdf2c/2023-1,
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-56580-9},
  doi          = {10.1007/978-3-031-56580-9},
  isbn         = {978-3-031-56579-3},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2023-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2023-2,
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-56583-0},
  doi          = {10.1007/978-3-031-56583-0},
  isbn         = {978-3-031-56582-3},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2023-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/0006WZ23,
  author       = {Zhiqiang Wang and
                  Zhuoyue Wang and
                  Ying Zhang},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {An Android Malware Detection Method Based on Optimized Feature Extraction
                  Using Graph Convolutional Network},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {283--299},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_19},
  doi          = {10.1007/978-3-031-56583-0\_19},
  timestamp    = {Fri, 19 Apr 2024 14:44:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/0006WZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BrownB23,
  author       = {Joseph Brown and
                  Ibrahim Baggili},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Retruth Reconnaissance: {A} Digital Forensic Analysis of Truth Social},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {96--113},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_6},
  doi          = {10.1007/978-3-031-56580-9\_6},
  timestamp    = {Fri, 19 Apr 2024 14:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BrownB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/CviticP23,
  author       = {Ivan Cvitic and
                  Dragan Perakovic},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {A Quantum Physics Approach for Enabling Information-Theoretic Secure
                  Communication Channels},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_1},
  doi          = {10.1007/978-3-031-56583-0\_1},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/CviticP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/DongY0023,
  author       = {Songshou Dong and
                  Yanqing Yao and
                  Yihua Zhou and
                  Yuguang Yang},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Improvement of an Identity-Based Aggregate Signature Protocol from
                  Lattice},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {258--263},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_17},
  doi          = {10.1007/978-3-031-56583-0\_17},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/DongY0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/DongYZ023,
  author       = {Songshou Dong and
                  Yanqing Yao and
                  Yihua Zhou and
                  Yuguang Yang},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {54--62},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_4},
  doi          = {10.1007/978-3-031-56583-0\_4},
  timestamp    = {Sun, 21 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/DongYZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/DuanHWGTWH23,
  author       = {Xiaoyi Duan and
                  Ye Huang and
                  Yuting Wang and
                  Yu Gu and
                  Jianmin Tong and
                  Zunyang Wang and
                  Ronglei Hu},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Power Analysis Attack Based on GA-Based Ensemble Learning},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {308--322},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_19},
  doi          = {10.1007/978-3-031-56580-9\_19},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/DuanHWGTWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/FanHWNYCD23,
  author       = {Xiaohong Fan and
                  Ye Huang and
                  Xue Wang and
                  Ziran Nie and
                  Zhenyang Yu and
                  Xuhui Cheng and
                  Xiaoyi Duan},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Research on Feature Selection Algorithm of Energy Curve},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {293--307},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_18},
  doi          = {10.1007/978-3-031-56580-9\_18},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/FanHWNYCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/FengHZY23,
  author       = {Weimiao Feng and
                  Rui Hu and
                  Cong Zhou and
                  Lei Yu},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {244--257},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_16},
  doi          = {10.1007/978-3-031-56583-0\_16},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/FengHZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HadiCAARL23,
  author       = {Hassan Jalil Hadi and
                  Yue Cao and
                  Mohammed Ali Alshara and
                  Naveed Ahmad and
                  Muhammad Saqib Riaz and
                  Jun Li},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Quantum Computing Challenges and Impact on Cyber Security},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {333--343},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_22},
  doi          = {10.1007/978-3-031-56583-0\_22},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HadiCAARL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HongLGXZ23,
  author       = {Quan Hong and
                  Jiaqi Li and
                  Xizhong Guo and
                  Pan Xie and
                  Lidong Zhai},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Assessing the Effectiveness of Deception-Based Cyber Defense with
                  CyberBattleSim},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {224--243},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_15},
  doi          = {10.1007/978-3-031-56583-0\_15},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HongLGXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HuNYYHZ023,
  author       = {Jia Hu and
                  Weina Niu and
                  Qingjun Yuan and
                  Lingfeng Yao and
                  Junpeng He and
                  Yanfeng Zhang and
                  Xiaosong Zhang},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {{DEML:} Data-Enhanced Meta-Learning Method for IoT {APT} Traffic Detection},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {212--226},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_13},
  doi          = {10.1007/978-3-031-56580-9\_13},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HuNYYHZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HusakYKKB23,
  author       = {Martin Hus{\'{a}}k and
                  Shanchieh Jay Yang and
                  Joseph Khoury and
                  Dorde Klisura and
                  Elias Bou{-}Harb},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and
                  Challenges},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {132--151},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_9},
  doi          = {10.1007/978-3-031-56583-0\_9},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HusakYKKB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/IpLLY23,
  author       = {Cheuk Yu Ip and
                  Fu Kay Frankie Li and
                  Yi Anson Lam and
                  Siu Ming Yiu},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Removing Noise (Opinion Messages) for Fake News Detection in Discussion
                  Forum Using {BERT} Model},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {78--95},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_5},
  doi          = {10.1007/978-3-031-56580-9\_5},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/IpLLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JamilHL0AHSW23,
  author       = {Abdul Majid Jamil and
                  Hassan Jalil Hadi and
                  Sifan Li and
                  Yue Cao and
                  Naveed Ahmed and
                  Faisal Bashir Hussain and
                  Chakkaphong Suthaputchakun and
                  Xinyuan Wang},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Detection of Targeted Attacks Using Medium-Interaction Honeypot for
                  Unmanned Aerial Vehicle},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {164--185},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_11},
  doi          = {10.1007/978-3-031-56583-0\_11},
  timestamp    = {Sat, 20 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JamilHL0AHSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JankuraCBR23,
  author       = {John Jankura and
                  Hannah Catallo{-}Stooks and
                  Ibrahim M. Baggili and
                  Golden Richard},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Catch Me if You Can: Analysis of Digital Devices and Artifacts Used
                  in Murder Cases},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {19--32},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_2},
  doi          = {10.1007/978-3-031-56580-9\_2},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JankuraCBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JenkeLPB23,
  author       = {Thorsten Jenke and
                  Simon Liessem and
                  Elmar Padilla and
                  Lilli Bruckschen},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {A Measurement Study on Interprocess Code Propagation of Malicious
                  Software},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {264--282},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_18},
  doi          = {10.1007/978-3-031-56583-0\_18},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JenkeLPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Li23,
  author       = {Yiran Li},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Power Analysis Attack Based on BS-XGboost Scheme},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {186--196},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_12},
  doi          = {10.1007/978-3-031-56583-0\_12},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LinLCWCMYZY23,
  author       = {Qingran Lin and
                  Xiang Li and
                  Beilin Chu and
                  Renying Wang and
                  Xianhao Chen and
                  Yuzhe Mao and
                  Zhen Yang and
                  Linna Zhou and
                  Weike You},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {{SHIELD:} {A} Specialized Dataset for Hybrid Blind Forensics of World
                  Leaders},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {79--91},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_6},
  doi          = {10.1007/978-3-031-56583-0\_6},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LinLCWCMYZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LuDLTWU23,
  author       = {Zhi Lu and
                  Haochen Dou and
                  Songfeng Lu and
                  Xueming Tang and
                  Junjun Wu and
                  Samir Mohammed Umran},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {A {PUF} Based Audio Fingerprint Based for Device Authentication and
                  Tamper Location},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_5},
  doi          = {10.1007/978-3-031-56583-0\_5},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LuDLTWU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MaddenSGPS23,
  author       = {Michael Madden and
                  Dan Szafaran and
                  Philomena Gray and
                  Justin Pelletier and
                  Ted Selker},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {A Canary in the Voting Booth: Attacks on a Virtual Voting Machine},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_1},
  doi          = {10.1007/978-3-031-56580-9\_1},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MaddenSGPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MundtB23,
  author       = {Michael Mundt and
                  Harald Baier},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Enhancing Incident Management by an Improved Understanding of Data
                  Exfiltration: Definition, Evaluation, Review},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {33--57},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_3},
  doi          = {10.1007/978-3-031-56580-9\_3},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MundtB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/NashC23,
  author       = {Aleck Nash and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Password Managers and Vault Application Security and Forensics: Research
                  Challenges and Future Opportunities},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {31--53},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_3},
  doi          = {10.1007/978-3-031-56583-0\_3},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/NashC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/NashSGC23,
  author       = {Aleck Nash and
                  Hudan Studiawan and
                  George Grispos and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Security Analysis of Google Authenticator, Microsoft Authenticator,
                  and Authy},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {197--206},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_13},
  doi          = {10.1007/978-3-031-56583-0\_13},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/NashSGC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/NassifO23,
  author       = {Lilian Noronha Nassif and
                  Jonny Silva de Oliveira},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Learning Framework for Guessing Alphanumeric Passwords on Mobile Phones
                  Based on User Context and Fragment Semantics},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {23--30},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_2},
  doi          = {10.1007/978-3-031-56583-0\_2},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/NassifO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/PangSGL23,
  author       = {Zeshan Pang and
                  Yuyuan Sun and
                  Shasha Guo and
                  Yuliang Lu},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Backdoor Learning on Siamese Networks Using Physical Triggers: FaceNet
                  as a Case Study},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {279--292},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_17},
  doi          = {10.1007/978-3-031-56580-9\_17},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/PangSGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/RenGCC23,
  author       = {Shuai Ren and
                  Hao Gong and
                  Huirong Cheng and
                  Zejing Cheng},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Point Cloud Model Information Hiding Algorithm Based on Multi-scale
                  Transformation and Composite Operator},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {146--161},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_9},
  doi          = {10.1007/978-3-031-56580-9\_9},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/RenGCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/RenLL23,
  author       = {Shuai Ren and
                  Bo Li and
                  Shengxia Liu},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {An Information Hiding Algorithm Based on Multi-carrier Fusion State
                  Partitioning of 3D Models},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {162--175},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_10},
  doi          = {10.1007/978-3-031-56580-9\_10},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/RenLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/RenLLGF23,
  author       = {Shuai Ren and
                  Yuxiao Li and
                  Bo Li and
                  Hao Gong and
                  Qiuyu Feng},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {A Multi-carrier Information Hiding Algorithm Based on Layered Compression
                  of 3D Point Cloud Model},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {132--145},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_8},
  doi          = {10.1007/978-3-031-56580-9\_8},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/RenLLGF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/RenMF23,
  author       = {Shuai Ren and
                  Liming Ma and
                  Qiuyu Feng},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model
                  Spectrum Analysis},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {117--131},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_7},
  doi          = {10.1007/978-3-031-56580-9\_7},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/RenMF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SeidenBA23,
  author       = {Steven Seiden and
                  Ibrahim M. Baggili and
                  Aisha I. Ali{-}Gombe},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {I've Got You, Under My Skin: Biohacking Augmentation Implant Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {315--332},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_21},
  doi          = {10.1007/978-3-031-56583-0\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SeidenBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ShenZLDHL0W23,
  author       = {Yi Shen and
                  Yuhan Zhang and
                  Yuwei Li and
                  Wanmeng Ding and
                  Miao Hu and
                  Yang Li and
                  Cheng Huang and
                  Jie Wang},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {IoT Malicious Traffic Detection Based on Federated Learning},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {249--263},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_15},
  doi          = {10.1007/978-3-031-56580-9\_15},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ShenZLDHL0W23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ShiHZL23,
  author       = {Linong Shi and
                  Chuanping Hu and
                  Yan Zhuang and
                  Yan Lu},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {SdShield: Effectively Ensuring Heap Security via Shadow Page Table},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {114--131},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_8},
  doi          = {10.1007/978-3-031-56583-0\_8},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ShiHZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SomersSHL23,
  author       = {Bart Somers and
                  Asanka P. Sayakkara and
                  Darren R. Hayes and
                  Nhien{-}An Le{-}Khac},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Finding Forensic Artefacts in Long-Term Frequency Band Occupancy Measurements
                  Using Statistics and Machine Learning},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {227--248},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_14},
  doi          = {10.1007/978-3-031-56580-9\_14},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SomersSHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/StenzelL23,
  author       = {Paul Stenzel and
                  Nhien{-}An Le{-}Khac},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Identify Users on Dating Applications: {A} Forensic Perspective},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {58--77},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_4},
  doi          = {10.1007/978-3-031-56580-9\_4},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/StenzelL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/VallesBC23,
  author       = {Josep Pegueroles Valles and
                  Sebastien Kanj Bongard and
                  Arnau Estebanell Castellv{\'{\i}}},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {{XSS} Vulnerability Test Enhancement for Progressive Web Applications},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {152--163},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_10},
  doi          = {10.1007/978-3-031-56583-0\_10},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/VallesBC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/WalkerBW23,
  author       = {Clinton Walker and
                  Ibrahim Baggili and
                  Hao Wang},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Decoding {HDF5:} Machine Learning File Forensics and Data Injection},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {193--211},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_12},
  doi          = {10.1007/978-3-031-56580-9\_12},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/WalkerBW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/YanYWLP23,
  author       = {Yintong Yan and
                  Lu Yu and
                  Taiyan Wang and
                  Yuwei Li and
                  Zulie Pan},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Optir-SBERT: Cross-Architecture Binary Code Similarity Detection Based
                  on Optimized {LLVM} {IR}},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {95--113},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_7},
  doi          = {10.1007/978-3-031-56583-0\_7},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/YanYWLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/YangLH23,
  author       = {Xiao Yang and
                  Gaolei Li and
                  Meng Han},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Persistent Clean-Label Backdoor on Graph-Based Semi-supervised Cybercrime
                  Detection},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {264--278},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_16},
  doi          = {10.1007/978-3-031-56580-9\_16},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/YangLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/YangLHY23,
  author       = {Xubo Yang and
                  Linsen Li and
                  Cunqing Hua and
                  Changhao Yao},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {{CCBA:} Code Poisoning-Based Clean-Label Covert Backdoor Attack Against
                  DNNs},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {570},
  pages        = {179--192},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56580-9\_11},
  doi          = {10.1007/978-3-031-56580-9\_11},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/YangLHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ZhangX23,
  author       = {Ruipeng Zhang and
                  Mengjun Xie},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {ForensiQ: {A} Knowledge Graph Question Answering System for IoT Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {300--314},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_20},
  doi          = {10.1007/978-3-031-56583-0\_20},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ZhangX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Zhou0WZ23,
  author       = {Chenxin Zhou and
                  Cheng Huang and
                  Yanghao Wang and
                  Zheng Zuo},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {APTBert: Abstract Generation and Event Extraction from {APT} Reports},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {209--223},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_14},
  doi          = {10.1007/978-3-031-56583-0\_14},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Zhou0WZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2022,
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-36574-4},
  doi          = {10.1007/978-3-031-36574-4},
  isbn         = {978-3-031-36573-7},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BhattaraiVSKA22,
  author       = {Abhishek Bhattarai and
                  Maryna Veksler and
                  Hadi Sahin and
                  Ahmet Kurt and
                  Kemal Akkaya},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Crypto Wallet Artifact Detection on Android Devices Using Advanced
                  Machine Learning Techniques},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {111--132},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_7},
  doi          = {10.1007/978-3-031-36574-4\_7},
  timestamp    = {Mon, 17 Jul 2023 16:28:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BhattaraiVSKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ChanYMLELRP22,
  author       = {Raymond H. Chan and
                  Wye Kaye Yan and
                  Jung Man Ma and
                  Kai Mun Loh and
                  Greger Chen Zhi En and
                  Malcolm Y. H. Low and
                  Habib Rehman and
                  Thong Chee Phua},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {{MQTT} Traffic Collection and Forensic Analysis Framework},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {185--202},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_11},
  doi          = {10.1007/978-3-031-36574-4\_11},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ChanYMLELRP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ChenCWYL22,
  author       = {Jia Chen and
                  Kunlin Chen and
                  Yongjie Wang and
                  Xuehu Yan and
                  Longlong Li},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {A General Steganalysis Method of {QR} Codes},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {472--483},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_28},
  doi          = {10.1007/978-3-031-36574-4\_28},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ChenCWYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/DolejskaVPK22,
  author       = {Daniel Dolejska and
                  Vladim{\'{\i}}r Vesel{\'{y}} and
                  Jan Pluskal and
                  Michal Koutensk{\'{y}}},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Shedding Light on Monopoly: Temporal Analysis of Drug Trades},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {151--168},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_9},
  doi          = {10.1007/978-3-031-36574-4\_9},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/DolejskaVPK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/DuNG22,
  author       = {Xiaoyu Du and
                  Francis N. Nwebonyi and
                  Pavel Gladyshev},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Automating the Flow of Data Between Digital Forensic Tools Using Apache
                  NiFi},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {435--452},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_26},
  doi          = {10.1007/978-3-031-36574-4\_26},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/DuNG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Guerra-Manzanares22,
  author       = {Alejandro Guerra{-}Manzanares and
                  Hayretdin Bahsi},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {On the Application of Active Learning to Handle Data Evolution in
                  Android Malware Detection},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {256--273},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_15},
  doi          = {10.1007/978-3-031-36574-4\_15},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Guerra-Manzanares22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HuSCL22,
  author       = {Zhiyuan Hu and
                  Linghang Shi and
                  Huijun Chen and
                  Jinghui Lu},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Android Mobile Terminal Security Assessment Based on Analytical Hierarchy
                  Process {(AHP)}},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {453--471},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_27},
  doi          = {10.1007/978-3-031-36574-4\_27},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HuSCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JozaniZKDA22,
  author       = {Mohsen M. Jozani and
                  Gianluca Zanella and
                  Maxium Khanov and
                  Gokila Dorai and
                  Esra Akbas},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {The Need for Biometric Anti-spoofing Policies: The Case of Etsy},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {295--306},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_17},
  doi          = {10.1007/978-3-031-36574-4\_17},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JozaniZKDA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/KlierB22,
  author       = {Samantha Klier and
                  Harald Baier},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Towards Efficient On-Site {CSAM} Triage by Clustering Images from
                  a Source Point of View},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_2},
  doi          = {10.1007/978-3-031-36574-4\_2},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/KlierB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LiGW22,
  author       = {Yueqi Li and
                  Sanjay Goel and
                  Kevin J. Williams},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Are External Auditors Capable of Dealing with Cybersecurity Risks?},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {326--340},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_19},
  doi          = {10.1007/978-3-031-36574-4\_19},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LiGW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LiZLFLC22,
  author       = {Chengjie Li and
                  Yunchun Zhang and
                  Zixuan Li and
                  Fan Feng and
                  Zikun Liao and
                  Xiaohui Cui},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {The Lightweight Botnet Detection Model Based on the Improved UNet},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {241--255},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_14},
  doi          = {10.1007/978-3-031-36574-4\_14},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LiZLFLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LiuYWX22,
  author       = {Qiuming Liu and
                  Zhexin Yao and
                  Zhen Wu and
                  Zeyao Xu},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Attribute-Based Proxy Re-encryption with Privacy Protection for Message
                  Dissemination in {VANET}},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {387--402},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_23},
  doi          = {10.1007/978-3-031-36574-4\_23},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LiuYWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MirsadeghiBI22,
  author       = {Seyed Mohammad Hadi Mirsadeghi and
                  Hayretdin Bahsi and
                  Wissem Inbouli},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Deep Learning-Based Detection of Cyberattacks in Software-Defined
                  Networks},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {341--354},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_20},
  doi          = {10.1007/978-3-031-36574-4\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MirsadeghiBI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MoadineCB22,
  author       = {Anass El Moadine and
                  Gouenou Coatrieux and
                  Reda Bellafqira},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Poisoning-Attack Detection Using an Auto-encoder for Deep Learning
                  Models},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {368--384},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_22},
  doi          = {10.1007/978-3-031-36574-4\_22},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MoadineCB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MundtB22,
  author       = {Michael Mundt and
                  Harald Baier},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Cyber Crime Undermines Data Privacy Efforts - On the Balance Between
                  Data Privacy and Security},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {417--434},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_25},
  doi          = {10.1007/978-3-031-36574-4\_25},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MundtB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/NwebonyiDG22,
  author       = {Francis N. Nwebonyi and
                  Xiaoyu Du and
                  Pavel Gladyshev},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Crime and Incident Watch for Smart Cities: {A} Sensor-Based Approach},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {222--238},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_13},
  doi          = {10.1007/978-3-031-36574-4\_13},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/NwebonyiDG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/RizviSM022,
  author       = {Syed Rizvi and
                  Mark Scanlon and
                  Jimmy McGibney and
                  John Sheppard},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Deep Learning Based Network Intrusion Detection System for Resource-Constrained
                  Environments},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {355--367},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_21},
  doi          = {10.1007/978-3-031-36574-4\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/RizviSM022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ShengYLZ22,
  author       = {Zhoushi Sheng and
                  Bo Yu and
                  Chen Liang and
                  Yongyi Zhang},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {VPnet: {A} Vulnerability Prioritization Approach Using Pointer Network
                  and Deep Reinforcement Learning},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {307--325},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_18},
  doi          = {10.1007/978-3-031-36574-4\_18},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ShengYLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/StankovicK22,
  author       = {Milos Stankovic and
                  Tahir M. Khan},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Digital Forensics Tool Evaluation on Deleted Files},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {61--83},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_4},
  doi          = {10.1007/978-3-031-36574-4\_4},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/StankovicK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/VarshneyKHS22,
  author       = {Rahul Varshney and
                  Nitesh Kumar and
                  Anand Handa and
                  Sandeep Kumar Shukla},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Volatility Custom Profiling for Automated Hybrid {ELF} Malware Detection},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {274--291},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_16},
  doi          = {10.1007/978-3-031-36574-4\_16},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/VarshneyKHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/VekslerCA22,
  author       = {Maryna Veksler and
                  Clara Caspard and
                  Kemal Akkaya},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Image-to-Image Translation Generative Adversarial Networks for Video
                  Source Camera Falsification},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_1},
  doi          = {10.1007/978-3-031-36574-4\_1},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/VekslerCA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/XieWZSY22,
  author       = {Jia{-}Hui Xie and
                  Di Wu and
                  Bo{-}Hao Zhang and
                  Hai Su and
                  Huan Yang},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Can Image Watermarking Efficiently Protect Deep-Learning-Based Image
                  Classifiers? - {A} Preliminary Security Analysis of an IP-Protecting
                  Method},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {34--57},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_3},
  doi          = {10.1007/978-3-031-36574-4\_3},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/XieWZSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/YangCL22,
  author       = {Fan Yang and
                  Hao Cheng and
                  Shanxiang Lyu},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {169--182},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_10},
  doi          = {10.1007/978-3-031-36574-4\_10},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/YangCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/YaoTZFLS22,
  author       = {Ruichu Yao and
                  Kunsheng Tang and
                  Yongshi Zhu and
                  Bingbing Fan and
                  Tian Luo and
                  Yide Song},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {{PBPAFL:} {A} Federated Learning Framework with Hybrid Privacy Protection
                  for Sensitive Data},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {403--416},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_24},
  doi          = {10.1007/978-3-031-36574-4\_24},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/YaoTZFLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ZengYWCLH22,
  author       = {Yutong Zeng and
                  Honghao Yu and
                  Tiejun Wu and
                  Yong Chen and
                  Xing Lan and
                  Cheng Huang},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {{CSCD:} {A} Cyber Security Community Detection Scheme on Online Social
                  Networks},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {135--150},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_8},
  doi          = {10.1007/978-3-031-36574-4\_8},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ZengYWCLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ZhangZCZ22,
  author       = {Ke Zhang and
                  Guanghua Zhang and
                  Zhenguo Chen and
                  Xiaojun Zuo},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {IoT Malicious Traffic Detection Based on {FSKDE} and Federated DIOT-Pysyft},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {203--221},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_12},
  doi          = {10.1007/978-3-031-36574-4\_12},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ZhangZCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ZhouK22,
  author       = {Jiaxuan Zhou and
                  Umit Karabiyik},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Forensic Analysis of Webex on the iOS Platform},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_5},
  doi          = {10.1007/978-3-031-36574-4\_5},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ZhouK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ZhouK22a,
  author       = {Jiaxuan Zhou and
                  Umit Karabiyik},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments
                  on Android},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {97--110},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_6},
  doi          = {10.1007/978-3-031-36574-4\_6},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ZhouK22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2021,
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06365-7},
  doi          = {10.1007/978-3-031-06365-7},
  isbn         = {978-3-031-06364-0},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/AcostaBKK21,
  author       = {Jaime C. Acosta and
                  Anjon Basak and
                  Christopher Kiekintveld and
                  Charles A. Kamhoua},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Lightweight On-Demand Honeypot Deployment for Cyber Deception},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {294--312},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_18},
  doi          = {10.1007/978-3-031-06365-7\_18},
  timestamp    = {Fri, 19 Apr 2024 14:54:06 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/AcostaBKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/AhvanooeyZMKC21,
  author       = {Milad Taleby Ahvanooey and
                  Mark Xuefang Zhu and
                  Wojciech Mazurczyk and
                  Max Kilger and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Do Dark Web and Cryptocurrencies Empower Cybercriminals?},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {277--293},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_17},
  doi          = {10.1007/978-3-031-06365-7\_17},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/AhvanooeyZMKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/AzharTT21,
  author       = {M. A. Hannan Bin Azhar and
                  Jake Timms and
                  Benjamin Tilley},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Forensic Investigations of Google Meet and Microsoft Teams - Two Popular
                  Conferencing Tools in the Pandemic},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {20--34},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_2},
  doi          = {10.1007/978-3-031-06365-7\_2},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/AzharTT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BoujdadNBCGS21,
  author       = {Fatima{-}Zahra Boujdad and
                  David Niyitegeka and
                  Reda Bellafqira and
                  Gouenou Coatrieux and
                  Emmanuelle G{\'{e}}nin and
                  Mario S{\"{u}}dholt},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {A Hybrid Cloud Deployment Architecture for Privacy-Preserving Collaborative
                  Genome-Wide Association Studies},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {342--359},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_21},
  doi          = {10.1007/978-3-031-06365-7\_21},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BoujdadNBCGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BuurkeL21,
  author       = {Richard Buurke and
                  Nhien{-}An Le{-}Khac},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Accessing Secure Data on Android Through Application Analysis},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {93--108},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_6},
  doi          = {10.1007/978-3-031-06365-7\_6},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BuurkeL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/CaoG21,
  author       = {Xiaoyu Cao and
                  Neil Zhenqiang Gong},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Understanding the Security of Deepfake Detection},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {360--378},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_22},
  doi          = {10.1007/978-3-031-06365-7\_22},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/CaoG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/DuanLLLLL21,
  author       = {Xiaoyi Duan and
                  You Li and
                  Chengyuan Liu and
                  Xiuying Li and
                  Wenfeng Liu and
                  Guoqian Li},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Research on the Method of Selecting the Optimal Feature Subset in
                  Big Data for Energy Analysis Attack},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {109--126},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_7},
  doi          = {10.1007/978-3-031-06365-7\_7},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/DuanLLLLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/EdwardsMNB21,
  author       = {Tiffanie Edwards and
                  Syria McCullough and
                  Mohamed Nassar and
                  Ibrahim M. Baggili},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {On Exploring the Sub-domain of Artificial Intelligence {(AI)} Model
                  Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {35--51},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_3},
  doi          = {10.1007/978-3-031-06365-7\_3},
  timestamp    = {Tue, 23 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/EdwardsMNB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/GobelUB21,
  author       = {Thomas G{\"{o}}bel and
                  Frieder Uhlig and
                  Harald Baier},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Find My IoT Device - An Efficient and Effective Approximate Matching
                  Algorithm to Identify IoT Traffic Flows},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {72--92},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_5},
  doi          = {10.1007/978-3-031-06365-7\_5},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/GobelUB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HuangGJ021,
  author       = {Weicong Huang and
                  Qisheng Guang and
                  Dong Jiang and
                  Lijun Chen},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Cheating Sensitive Security Quantum Bit Commitment with Security Distance
                  Function},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {127--138},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_8},
  doi          = {10.1007/978-3-031-06365-7\_8},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HuangGJ021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HuangZCSSTZ21,
  author       = {Kong Huang and
                  Ke Zhang and
                  Jiongyi Chen and
                  Menghan Sun and
                  Wei Sun and
                  Di Tang and
                  Kehuan Zhang},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Understanding the Brains and Brawn of Illicit Streaming App},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {194--214},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_12},
  doi          = {10.1007/978-3-031-06365-7\_12},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HuangZCSSTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/KantaCS21,
  author       = {Aikaterini Kanta and
                  Iwen Coisel and
                  Mark Scanlon},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {{PCWQ:} {A} Framework for Evaluating Password Cracking Wordlist Quality},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {159--175},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_10},
  doi          = {10.1007/978-3-031-06365-7\_10},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/KantaCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LaiWWLHWM21,
  author       = {Anthony Cheuk Tung Lai and
                  Ken Wai Kin Wong and
                  Johnny Tsz Wun Wong and
                  Austin Tsz Wai Lau and
                  Alan Po Lun Ho and
                  Shuai Wang and
                  Jogesh Muppala},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Backdoor Investigation and Incident Response: From Zero to Profit},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {229--247},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_14},
  doi          = {10.1007/978-3-031-06365-7\_14},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LaiWWLHWM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LiZHKD21,
  author       = {Na Li and
                  Haoyu Zhang and
                  Zhihui Hu and
                  Guang Kou and
                  Huadong Dai},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Automated Software Vulnerability Detection via Pre-trained Context
                  Encoder and Self Attention},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {248--264},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_15},
  doi          = {10.1007/978-3-031-06365-7\_15},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LiZHKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MahrSGB21,
  author       = {Andrew Mahr and
                  Robert Serafin and
                  Cinthya Grajeda and
                  Ibrahim M. Baggili},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Auto-Parser: Android Auto and Apple CarPlay Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {52--71},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_4},
  doi          = {10.1007/978-3-031-06365-7\_4},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MahrSGB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Martin-PerezR21,
  author       = {Miguel Mart{\'{\i}}n{-}P{\'{e}}rez and
                  Ricardo J. Rodr{\'{\i}}guez},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Quantifying Paging on Recoverable Data from Windows User-Space Modules},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_1},
  doi          = {10.1007/978-3-031-06365-7\_1},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Martin-PerezR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MuhleGM21,
  author       = {Alexander M{\"{u}}hle and
                  Andreas Gr{\"{u}}ner and
                  Christoph Meinel},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Gotta Catch'em All! Improving {P2P} Network Crawling Strategies},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {313--327},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_19},
  doi          = {10.1007/978-3-031-06365-7\_19},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MuhleGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MundtB21,
  author       = {Michael Mundt and
                  Harald Baier},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Towards Mitigation of Data Exfiltration Techniques Using the {MITRE}
                  ATT{\&}CK Framework},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {139--158},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_9},
  doi          = {10.1007/978-3-031-06365-7\_9},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MundtB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/OuGHZ00021,
  author       = {Haoran Ou and
                  Yongyan Guo and
                  Chaoyi Huang and
                  Zhiying Zhao and
                  Wenbo Guo and
                  Yong Fang and
                  Cheng Huang},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {No Pie in the Sky: The Digital Currency Fraud Website Detection},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {176--193},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_11},
  doi          = {10.1007/978-3-031-06365-7\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/OuGHZ00021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/TianMHTL21,
  author       = {Zhenzhou Tian and
                  Hengchao Mao and
                  Yaqian Huang and
                  Jie Tian and
                  Jinrui Li},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Fine-Grained Obfuscation Scheme Recognition on Binary Code},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {215--228},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_13},
  doi          = {10.1007/978-3-031-06365-7\_13},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/TianMHTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/WyssD21,
  author       = {Elizabeth Wyss and
                  Drew Davidson},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Parcae: {A} Blockchain-Based {PRF} Service for Everyone},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {328--341},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_20},
  doi          = {10.1007/978-3-031-06365-7\_20},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/WyssD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ZhangSJLL21,
  author       = {Zhenzhen Zhang and
                  Henan Shi and
                  Xinghao Jiang and
                  Zhaohong Li and
                  Jindou Liu},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {A CNN-Based {HEVC} Video Steganalysis Against DCT/DST-Based Steganography},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {265--276},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_16},
  doi          = {10.1007/978-3-031-06365-7\_16},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ZhangSJLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2020,
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-68734-2},
  doi          = {10.1007/978-3-030-68734-2},
  isbn         = {978-3-030-68733-5},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/000220,
  author       = {John Sheppard},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {A Partial Approach to Intrusion Detection},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {78--97},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_5},
  doi          = {10.1007/978-3-030-68734-2\_5},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/000220.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BortnikL20,
  author       = {Lukas Bortnik and
                  Arturs Lavrenovs},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Android Dumpsys Analysis to Indicate Driver Distraction},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {139--163},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_8},
  doi          = {10.1007/978-3-030-68734-2\_8},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BortnikL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BouchaudVG20,
  author       = {Fran{\c{c}}ois Bouchaud and
                  Thomas Vantroys and
                  Gilles Grimaud},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Evidence Gathering in IoT Criminal Investigation},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {44--61},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_3},
  doi          = {10.1007/978-3-030-68734-2\_3},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BouchaudVG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Bromley0SL20,
  author       = {Samuel Todd Bromley and
                  John Sheppard and
                  Mark Scanlon and
                  Nhien{-}An Le{-}Khac},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Retracing the Flow of the Stream: Investigating Kodi Streaming Services},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {231--236},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_13},
  doi          = {10.1007/978-3-030-68734-2\_13},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Bromley0SL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BuschNFRSF20,
  author       = {Marcel Busch and
                  Florian Nicolai and
                  Fabian Fleischer and
                  Christian R{\"{u}}ckert and
                  Christoph Safferling and
                  Felix C. Freiling},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Make Remote Forensic Investigations Forensic Again: Increasing the
                  Evidential Value of Remote Forensic Investigations},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_2},
  doi          = {10.1007/978-3-030-68734-2\_2},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BuschNFRSF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/DokkoSP20,
  author       = {Jieun Dokko and
                  Michael Shin and
                  Soo Young Park},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {An Intelligence Criminal Tracker for Industrial Espionage - Applying
                  Digital Data Acquired Onsite to Target Criminals},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {224--230},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_12},
  doi          = {10.1007/978-3-030-68734-2\_12},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/DokkoSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/FerraraDSJB20,
  author       = {Pasquale Ferrara and
                  Gerard Draper{-}Gil and
                  Ignacio Sanchez and
                  Henrik Junklewitz and
                  Laurent Beslay},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Modelling {GOP} Structure Effects on ENF-Based Video Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {121--138},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_7},
  doi          = {10.1007/978-3-030-68734-2\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/FerraraDSJB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Latzo20,
  author       = {Tobias Latzo},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Efficient Fingerprint Matching for Forensic Event Reconstruction},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {98--120},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_6},
  doi          = {10.1007/978-3-030-68734-2\_6},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Latzo20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MatousekBRV20,
  author       = {Petr Matousek and
                  Ivana Burgetova and
                  Ondrej Rysav{\'{y}} and
                  Malombe Victor},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {On Reliability of {JA3} Hashes for Fingerprinting Mobile Applications},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_1},
  doi          = {10.1007/978-3-030-68734-2\_1},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MatousekBRV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MusseleHG20,
  author       = {Tom Van der Mussele and
                  Babak Habibnia and
                  Pavel Gladyshev},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Remote Air-Gap Live Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {182--203},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_10},
  doi          = {10.1007/978-3-030-68734-2\_10},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MusseleHG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/PadillaAK20,
  author       = {Edgar Padilla and
                  Jaime C. Acosta and
                  Christopher D. Kiekintveld},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Cybersecurity Methodology for Specialized Behavior Analysis},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {237--243},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_14},
  doi          = {10.1007/978-3-030-68734-2\_14},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/PadillaAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ShiWSL20,
  author       = {Jiaqi Shi and
                  Gang Wang and
                  Ming Su and
                  Xiaoguang Liu},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Effective Medical Image Copy-Move Forgery Localization Based on Texture
                  Descriptor},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {62--77},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_4},
  doi          = {10.1007/978-3-030-68734-2\_4},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ShiWSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/WaltereitUZMW20,
  author       = {Marian Waltereit and
                  Maximilian Uphoff and
                  Peter Zdankin and
                  Viktor Matkovic and
                  Torben Weis},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {A Digital Forensic Approach for Optimizing the Investigation of Hit-and-Run
                  Accidents},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {204--223},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_11},
  doi          = {10.1007/978-3-030-68734-2\_11},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/WaltereitUZMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/WangFT20,
  author       = {Zhongmin Wang and
                  Zhen Feng and
                  Zhenzhou Tian},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Neural Representation Learning Based Binary Code Authorship Attribution},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {244--249},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_15},
  doi          = {10.1007/978-3-030-68734-2\_15},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/WangFT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ZhouZ20,
  author       = {Gengqian Zhou and
                  Jianwei Zhuge},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Adapting to Local Conditions: Similarities and Differences in Anonymous
                  Online Market Between Chinese and English Speaking Communities},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_9},
  doi          = {10.1007/978-3-030-68734-2\_9},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ZhouZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2018,
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-05487-8},
  doi          = {10.1007/978-3-030-05487-8},
  isbn         = {978-3-030-05486-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/AL-MaksousyW18,
  author       = {Hassan Hadi Latheeth Al{-}Maksousy and
                  Michele C. Weigle},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Hybrid Intrusion Detection System for Worm Attacks Based on Their
                  Network Behavior},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {225--234},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_12},
  doi          = {10.1007/978-3-030-05487-8\_12},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/AL-MaksousyW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/DokkoS18,
  author       = {Jieun Dokko and
                  Michael Shin},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {A Digital Forensic Investigation and Verification Model for Industrial
                  Espionage},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {128--146},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_7},
  doi          = {10.1007/978-3-030-05487-8\_7},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/DokkoS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/GobelB18,
  author       = {Thomas G{\"{o}}bel and
                  Harald Baier},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {fishy - {A} Framework for Implementing Filesystem-Based Data Hiding
                  Techniques},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_2},
  doi          = {10.1007/978-3-030-05487-8\_2},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/GobelB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HaighBB18,
  author       = {Trevor Haigh and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {If {I} Had a Million Cryptos: Cryptowallet Application Analysis and
                  a Trojan Proof-of-Concept},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {45--65},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_3},
  doi          = {10.1007/978-3-030-05487-8\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HaighBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LieblerB18,
  author       = {Lorenz Liebler and
                  Harald Baier},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {On Efficiency and Effectiveness of Linear Function Detection Approaches
                  for Memory Carving},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_1},
  doi          = {10.1007/978-3-030-05487-8\_1},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LieblerB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Rowe18,
  author       = {Neil C. Rowe},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Associating Drives Based on Their Artifact and Metadata Distributions},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {165--182},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_9},
  doi          = {10.1007/978-3-030-05487-8\_9},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Rowe18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SchelkophPO18,
  author       = {Daniel J. Schelkoph and
                  Gilbert L. Peterson and
                  James S. Okolica},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Digital Forensics Event Graph Reconstruction},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {185--203},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_10},
  doi          = {10.1007/978-3-030-05487-8\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SchelkophPO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SchmickerBB18,
  author       = {Robert Schmicker and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {AndroParse - An Android Feature Extraction Framework and Dataset},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {66--88},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_4},
  doi          = {10.1007/978-3-030-05487-8\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SchmickerBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ShenCZ18,
  author       = {Jaryn Shen and
                  Kim{-}Kwang Raymond Choo and
                  Qingkai Zeng},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Multi-item Passphrases: {A} Self-adaptive Approach Against Offline
                  Guessing Attacks},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {204--221},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_11},
  doi          = {10.1007/978-3-030-05487-8\_11},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ShenCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SinghIV18,
  author       = {Avinash Singh and
                  Adeyemi R. Ikuesan and
                  Hein S. Venter},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Digital Forensic Readiness Framework for Ransomware Investigation},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {91--105},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_5},
  doi          = {10.1007/978-3-030-05487-8\_5},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SinghIV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Tabuyo-BenitoBP18,
  author       = {Raquel Tabuyo{-}Benito and
                  Hayretdin Bahsi and
                  Pedro Peris{-}Lopez},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Forensics Analysis of an On-line Game over Steam Platform},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {106--127},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_6},
  doi          = {10.1007/978-3-030-05487-8\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Tabuyo-BenitoBP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/VieyraSL18,
  author       = {John Vieyra and
                  Mark Scanlon and
                  Nhien{-}An Le{-}Khac},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Solid State Drive Forensics: Where Do We Stand?},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {149--164},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_8},
  doi          = {10.1007/978-3-030-05487-8\_8},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/VieyraSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2017,
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-73697-6},
  doi          = {10.1007/978-3-319-73697-6},
  isbn         = {978-3-319-73696-9},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BarmpatsalouCMS17,
  author       = {Konstantia Barmpatsalou and
                  Tiago Cruz and
                  Edmundo Monteiro and
                  Paulo Sim{\~{o}}es},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic
                  Evidence},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {106--114},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_8},
  doi          = {10.1007/978-3-319-73697-6\_8},
  timestamp    = {Fri, 12 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BarmpatsalouCMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BartonA17,
  author       = {Thomas Edward Allen Barton and
                  M. A. Hannan Bin Azhar},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Open Source Forensics for a Multi-platform Drone System},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {83--96},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_6},
  doi          = {10.1007/978-3-319-73697-6\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BartonA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ErnsbergerIVZ17,
  author       = {Dominik Ernsberger and
                  Adeyemi Richard Ikuesan and
                  Hein S. Venter and
                  Alf Zugenmaier},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {A Web-Based Mouse Dynamics Visualization Tool for User Attribution
                  in Digital Forensic Readiness},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {64--79},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_5},
  doi          = {10.1007/978-3-319-73697-6\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ErnsbergerIVZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Homem17,
  author       = {Irvin Homem},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Coriander: {A} Toolset for Generating Realistic Android Digital Evidence
                  Datasets},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {228--233},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_18},
  doi          = {10.1007/978-3-319-73697-6\_18},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Homem17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/IqbalEA17,
  author       = {Asif Iqbal and
                  Mathias Ekstedt and
                  Hanan Alobaidli},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Digital Forensic Readiness in Critical Infrastructures: {A} Case of
                  Substation Automation in the Power Sector},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {117--129},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_9},
  doi          = {10.1007/978-3-319-73697-6\_9},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/IqbalEA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JiaZHZT17,
  author       = {Xiaoqi Jia and
                  Guangzhe Zhou and
                  Qingjia Huang and
                  Weijuan Zhang and
                  Donghai Tian},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {FindEvasion: An Effective Environment-Sensitive Malware Detection
                  System for the Cloud},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_1},
  doi          = {10.1007/978-3-319-73697-6\_1},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JiaZHZT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JiangCCLLY17,
  author       = {Jianguo Jiang and
                  Jiuming Chen and
                  Kim{-}Kwang Raymond Choo and
                  Chao Liu and
                  Kunying Liu and
                  Min Yu},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {A Visualization Scheme for Network Forensics Based on Attribute Oriented
                  Induction Based Frequent Item Mining and Hyper Graph},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {130--143},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_10},
  doi          = {10.1007/978-3-319-73697-6\_10},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JiangCCLLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/KiesebergNSSW17,
  author       = {Peter Kieseberg and
                  Sebastian Neuner and
                  Sebastian Schrittwieser and
                  Martin Schmiedecker and
                  Edgar R. Weippl},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Real-Time Forensics Through Endpoint Visibility},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {18--32},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_2},
  doi          = {10.1007/978-3-319-73697-6\_2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/KiesebergNSSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/KnieriemZLBB17,
  author       = {Brandon Knieriem and
                  Xiaolu Zhang and
                  Philip Levine and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {An Overview of the Usage of Default Passwords},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {195--203},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_15},
  doi          = {10.1007/978-3-319-73697-6\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/KnieriemZLBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LeopardRM17,
  author       = {Charles B. Leopard and
                  Neil C. Rowe and
                  Michael R. McCarrin},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Memory Forensics and the Macintosh {OS} {X} Operating System},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {175--180},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_13},
  doi          = {10.1007/978-3-319-73697-6\_13},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LeopardRM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LieblerB17,
  author       = {Lorenz Liebler and
                  Harald Baier},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Approxis: {A} Fast, Robust, Lightweight and Approximate Disassembler
                  Considered in the Field of Memory Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {158--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_12},
  doi          = {10.1007/978-3-319-73697-6\_12},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LieblerB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LillisBS17,
  author       = {David Lillis and
                  Frank Breitinger and
                  Mark Scanlon},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter
                  Trees},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {144--157},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_11},
  doi          = {10.1007/978-3-319-73697-6\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LillisBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MacRaeF17,
  author       = {John MacRae and
                  Virginia N. L. Franqueira},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {On Locky Ransomware, Al Capone and Brexit},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {33--45},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_3},
  doi          = {10.1007/978-3-319-73697-6\_3},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MacRaeF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/RenZLFZS17,
  author       = {Pu Ren and
                  Mingquan Zhou and
                  Jin Liu and
                  Yachun Fan and
                  Wenshuo Zhao and
                  Wuyang Shui},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Sketch-Based Modeling and Immersive Display Techniques for Indoor
                  Crime Scene Presentation},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {181--194},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_14},
  doi          = {10.1007/978-3-319-73697-6\_14},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/RenZLFZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Rowe17,
  author       = {Neil C. Rowe},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Finding and Rating Personal Names on Drives for Forensic Needs},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {49--63},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_4},
  doi          = {10.1007/978-3-319-73697-6\_4},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Rowe17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/VondracekPR17,
  author       = {Martin Vondr{\'{a}}cek and
                  Jan Pluskal and
                  Ondrej Rysav{\'{y}}},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {Automation of MitM Attack on Wi-Fi Networks},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {207--220},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_16},
  doi          = {10.1007/978-3-319-73697-6\_16},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/VondracekPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/XinSYW17,
  author       = {Wu Xin and
                  Qingni Shen and
                  Yahui Yang and
                  Zhonghai Wu},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {221--227},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_17},
  doi          = {10.1007/978-3-319-73697-6\_17},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/XinSYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/XuS0QWSGY17,
  author       = {Ming Xu and
                  Jinkai Sun and
                  Ning Zheng and
                  Tong Qiao and
                  Yiming Wu and
                  Kai Shi and
                  Haidong Ge and
                  Tao Yang},
  editor       = {Petr Matousek and
                  Martin Schmiedecker},
  title        = {A Novel File Carving Algorithm for {EVTX} Logs},
  booktitle    = {Digital Forensics and Cyber Crime - 9th International Conference,
                  {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {216},
  pages        = {97--105},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73697-6\_7},
  doi          = {10.1007/978-3-319-73697-6\_7},
  timestamp    = {Thu, 05 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/XuS0QWSGY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Al-khateebCABB16,
  author       = {Samer Al{-}khateeb and
                  Kevin J. Conlan and
                  Nitin Agarwal and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {Exploring Deviant Hacker Networks {(DHN)} On Social Media Platforms},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {7--20},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1375},
  doi          = {10.15394/JDFSL.2016.1375},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Al-khateebCABB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GunestasB16,
  author       = {Murat Gunestas and
                  Zeki Bilgin},
  title        = {Log Analysis Using Temporal Logic and Reconstruction Approach: Web
                  Server Case},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {35--58},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1377},
  doi          = {10.15394/JDFSL.2016.1377},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GunestasB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/HarichandranBB16,
  author       = {Vikram S. Harichandran and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Bytewise Approximate Matching: The Good, The Bad, and The Unknown},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {59--78},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1379},
  doi          = {10.15394/JDFSL.2016.1379},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/HarichandranBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JeongBKL16,
  author       = {Doowon Jeong and
                  Frank Breitinger and
                  Hari Kang and
                  Sangjin Lee},
  title        = {Towards Syntactic Approximate Matching - {A} Pre-Processing Experiment},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {97--110},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1381},
  doi          = {10.15394/JDFSL.2016.1381},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JeongBKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JulliandTN16,
  author       = {Thibault Julliand and
                  Hugues Talbot and
                  Vincent Nozick},
  title        = {Countering Noise-based Splicing Detection Using Noise Density Transfer},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {111--122},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1382},
  doi          = {10.15394/JDFSL.2016.1382},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JulliandTN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LeeJEK16,
  author       = {Kibin Lee and
                  Joshua I. James and
                  Tekachew Gobena Ejeta and
                  Hyoung Joong Kim},
  title        = {Electronic Voting Service Using Block-Chain},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {123--136},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1383},
  doi          = {10.15394/JDFSL.2016.1383},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LeeJEK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MatousekHHR16,
  author       = {Petr Matousek and
                  Radek Hranicky and
                  Martin Holkovic and
                  Ondrej Rysav{\'{y}}},
  title        = {On Efficiency of Distributed Password Recovery},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {79--96},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1380},
  doi          = {10.15394/JDFSL.2016.1380},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MatousekHHR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MohammedCL16,
  author       = {Hussam Jasim Mohammed and
                  Nathan Luke Clarke and
                  Fudong Li},
  title        = {An Automated Approach for Digital Forensic Analysis of Heterogeneous
                  Big Data},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {137--152},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1384},
  doi          = {10.15394/JDFSL.2016.1384},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MohammedCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RoweSMG16,
  author       = {Neil C. Rowe and
                  Riqui Schwamm and
                  Michael McCarrin and
                  Ralucca Gera},
  title        = {Making Sense of Email Addresses on Drives},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {153--174},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1385},
  doi          = {10.15394/JDFSL.2016.1385},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RoweSMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SinghCS16,
  author       = {Monika Singh and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {Security Analysis of mvHash-B Similarity Hashing},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {21--34},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1376},
  doi          = {10.15394/JDFSL.2016.1376},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SinghCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ThompsonH16,
  author       = {Marcus Thompson and
                  Raymond Hansen},
  title        = {Verification of Recovered Digital Evidence on the Amazon Kindle},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {175--192},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1386},
  doi          = {10.15394/JDFSL.2016.1386},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ThompsonH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/AkatyevJ15,
  author       = {Nikolay Akatyev and
                  Joshua I. James},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Cyber Peacekeeping},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {126--139},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_10},
  doi          = {10.1007/978-3-319-25512-5\_10},
  timestamp    = {Thu, 14 Oct 2021 10:05:19 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/AkatyevJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/AlvarezB15,
  author       = {Karolina Alvarez and
                  Masooda N. Bashir},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Exploring the Effectiveness of Digital Forensics Tools on the Sony
                  PlayStation Vita},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {200--206},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_14},
  doi          = {10.1007/978-3-319-25512-5\_14},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/AlvarezB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BertiniSIM15,
  author       = {Flavio Bertini and
                  Rajesh Sharma and
                  Andrea Ianni and
                  Danilo Montesi},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Smartphone Verification and User Profiles Linking Across Social Networks
                  by Camera Fingerprinting},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {176--186},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_12},
  doi          = {10.1007/978-3-319-25512-5\_12},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BertiniSIM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ColeDR15,
  author       = {Kelly A. Cole and
                  Tejashree Datar and
                  Marcus K. Rogers},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Awareness of Scam E-Mails: An Exploratory Research Study - Part 2},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {115--125},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_9},
  doi          = {10.1007/978-3-319-25512-5\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ColeDR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ConwayJG15,
  author       = {Alleyn Conway and
                  Joshua I. James and
                  Pavel Gladyshev},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Development and Initial User Evaluation of a Virtual Crime Scene Simulator
                  Including Digital Evidence},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {16--26},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_2},
  doi          = {10.1007/978-3-319-25512-5\_2},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ConwayJG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/GuptaB15,
  author       = {Vikas Gupta and
                  Frank Breitinger},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {How Cuckoo Filter Can Improve Existing Approximate Matching Techniques},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {39--52},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_4},
  doi          = {10.1007/978-3-319-25512-5\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/GuptaB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HanJL15,
  author       = {Jaehyeok Han and
                  Doowon Jeong and
                  Sangjin Lee},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Analysis of the {HIKVISION} {DVR} File System},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {189--199},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_13},
  doi          = {10.1007/978-3-319-25512-5\_13},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HanJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JamesG15,
  author       = {Joshua I. James and
                  Pavel Gladyshev},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {A Survey of International Cooperation in Digital Investigations},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {103--114},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_8},
  doi          = {10.1007/978-3-319-25512-5\_8},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JamesG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MatousekPRVKKV15,
  author       = {Petr Matousek and
                  Jan Pluskal and
                  Ondrej Rysav{\'{y}} and
                  Vladim{\'{\i}}r Vesel{\'{y}} and
                  Martin Kmet and
                  Filip Karp{\'{\i}}sek and
                  Martin Vyml{\'{a}}til},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Advanced Techniques for Reconstruction of Incomplete Network Data},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_6},
  doi          = {10.1007/978-3-319-25512-5\_6},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MatousekPRVKKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/PalmerWNGBC15,
  author       = {Imani Palmer and
                  Elaine Wood and
                  Stefan Nagy and
                  Gabriela Garc{\'{\i}}a and
                  Masooda N. Bashir and
                  Roy H. Campbell},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Digital Forensics Education: {A} Multidisciplinary Curriculum Model},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_1},
  doi          = {10.1007/978-3-319-25512-5\_1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/PalmerWNGBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/QuinnSFK15,
  author       = {Conor Quinn and
                  Mark Scanlon and
                  Jason Farina and
                  M. Tahar Kechadi},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Forensic Analysis and Remote Evidence Recovery from Syncthing: An
                  Open Source Decentralised File Synchronisation Utility},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {85--99},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_7},
  doi          = {10.1007/978-3-319-25512-5\_7},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/QuinnSFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Seigfried-Spellar15,
  author       = {Kathryn C. Seigfried{-}Spellar and
                  Ben M. Flores and
                  Darrin J. Griffin},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-psychological
                  and Communication Perspectives},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {143--175},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_11},
  doi          = {10.1007/978-3-319-25512-5\_11},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Seigfried-Spellar15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SinghPT15,
  author       = {Vivek Kumar Singh and
                  Pallav Pant and
                  Ramesh Chandra Tripathi},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Detection of Frame Duplication Type of Forgery in Digital Video Using
                  Sub-block Based Features},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {29--38},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_3},
  doi          = {10.1007/978-3-319-25512-5\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SinghPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ZhangYRH15,
  author       = {Yulong Zhang and
                  Baijian Yang and
                  Marcus K. Rogers and
                  Raymond A. Hansen},
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Forensically Sound Retrieval and Recovery of Images from {GPU} Memory},
  booktitle    = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  pages        = {53--66},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5\_5},
  doi          = {10.1007/978-3-319-25512-5\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ZhangYRH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2015,
  editor       = {Joshua I. James and
                  Frank Breitinger},
  title        = {Digital Forensics and Cyber Crime - 7th International Conference,
                  {ICDF2C} 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {157},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25512-5},
  doi          = {10.1007/978-3-319-25512-5},
  isbn         = {978-3-319-25511-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2013,
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14289-0},
  doi          = {10.1007/978-3-319-14289-0},
  isbn         = {978-3-319-14288-3},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/0003OMB13,
  author       = {Asif Iqbal and
                  Hanan Al Obaidli and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Amazon Kindle Fire {HD} Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_4},
  doi          = {10.1007/978-3-319-14289-0\_4},
  timestamp    = {Mon, 16 Sep 2019 15:25:59 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/0003OMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BreitingerL0BRS13,
  author       = {Frank Breitinger and
                  Huajian Liu and
                  Christian Winter and
                  Harald Baier and
                  Alexey Rybalchenko and
                  Martin Steinebach},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Towards a Process Model for Hash Functions in Digital Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {170--186},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_12},
  doi          = {10.1007/978-3-319-14289-0\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BreitingerL0BRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BrennanUG13,
  author       = {Fergal Brennan and
                  Martins Udris and
                  Pavel Gladyshev},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {An Automated Link Analysis Solution Applied to Digital Forensic Investigations},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {189--206},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_13},
  doi          = {10.1007/978-3-319-14289-0\_13},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BrennanUG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/DoyoddorjR13,
  author       = {Munkhbaatar Doyoddorj and
                  Kyung Hyune Rhee},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Robust Copy-Move Forgery Detection Based on Dual-Transform},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_1},
  doi          = {10.1007/978-3-319-14289-0\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/DoyoddorjR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/GoelM13,
  author       = {Prachi Goel and
                  Babu M. Mehtre},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Forensic Artifacts of the flareGet Download Manager},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {30--38},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_3},
  doi          = {10.1007/978-3-319-14289-0\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/GoelM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/GuptaM13,
  author       = {Deepak Gupta and
                  Babu M. Mehtre},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {247--251},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_17},
  doi          = {10.1007/978-3-319-14289-0\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/GuptaM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JamesLG13,
  author       = {Joshua I. James and
                  Alejandra Lopez{-}Fernandez and
                  Pavel Gladyshev},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Measuring Accuracy of Automated Parsing and Categorization Tools and
                  Processes in Digital Investigations},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {147--169},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_11},
  doi          = {10.1007/978-3-319-14289-0\_11},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JamesLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JamesSG13,
  author       = {Joshua I. James and
                  Ahmed F. Shosha and
                  Pavel Gladyshev},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Determining Training Needs for Cloud Infrastructure Investigations
                  Using {I-STRIDE}},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {223--236},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_15},
  doi          = {10.1007/978-3-319-14289-0\_15},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JamesSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LambertzUG13,
  author       = {Martin Lambertz and
                  Rafael Uetz and
                  Elmar Gerhards{-}Padilla},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Resurrection: {A} Carver for Fragmented Files},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {51--66},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_5},
  doi          = {10.1007/978-3-319-14289-0\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LambertzUG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MarcoKF13,
  author       = {Lucia De Marco and
                  M. Tahar Kechadi and
                  Filomena Ferrucci},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Cloud Forensic Readiness: Foundations},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {237--244},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_16},
  doi          = {10.1007/978-3-319-14289-0\_16},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MarcoKF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MarringtonIB13,
  author       = {Andrew Marrington and
                  Farkhund Iqbal and
                  Ibrahim M. Baggili},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Computer Profiling for Preliminary Forensic Examination},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {207--220},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_14},
  doi          = {10.1007/978-3-319-14289-0\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MarringtonIB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Peshin13,
  author       = {Esti Peshin},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Regulating Social Network Services for Lawful Interception},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {119--129},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_9},
  doi          = {10.1007/978-3-319-14289-0\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Peshin13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/PoiselRT13,
  author       = {Rainer Poisel and
                  Marlies Rybnicek and
                  Simon Tjoa},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Taxonomy of Data Fragment Classification Techniques},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {67--85},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_6},
  doi          = {10.1007/978-3-319-14289-0\_6},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/PoiselRT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Rowe13,
  author       = {Neil C. Rowe},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Identifying Forensically Uninteresting Files Using a Large Corpus},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {86--101},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_7},
  doi          = {10.1007/978-3-319-14289-0\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Rowe13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SteinebachLY13,
  author       = {Martin Steinebach and
                  Huajian Liu and
                  York Yannikos},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {FaceHash: Face Detection and Robust Hashing},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {102--115},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_8},
  doi          = {10.1007/978-3-319-14289-0\_8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SteinebachLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SubairBDT13,
  author       = {P. Shabana Subair and
                  C. Balan and
                  S. Dija and
                  K. L. Thomas},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Forensic Decryption of {FAT} BitLocker Volumes},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {17--29},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_2},
  doi          = {10.1007/978-3-319-14289-0\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SubairBDT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Watney13,
  author       = {Murdoch Watney},
  editor       = {Pavel Gladyshev and
                  Andrew Marrington and
                  Ibrahim M. Baggili},
  title        = {Determining When Conduct in Cyberspace Constitutes Cyber Warfare in
                  Terms of the International Law and Tallinn Manual on the International
                  Law Applicable to Cyber Warfare: {A} Synopsis},
  booktitle    = {Digital Forensics and Cyber Crime - Fifth International Conference,
                  {ICDF2C} 2013, Moscow, Russia, September 26-27, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {132},
  pages        = {130--143},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-14289-0\_10},
  doi          = {10.1007/978-3-319-14289-0\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Watney13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2012,
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39891-9},
  doi          = {10.1007/978-3-642-39891-9},
  isbn         = {978-3-642-39890-2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/AdedayoO12,
  author       = {Oluwasola Mary Adedayo and
                  Martin S. Olivier},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {On the Completeness of Reconstructed Data for Database Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {220--238},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_14},
  doi          = {10.1007/978-3-642-39891-9\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/AdedayoO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/AouadKR12,
  author       = {Lamine M. Aouad and
                  M. Tahar Kechadi and
                  Roberto Di Russo},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {{ANTS} {ROAD:} {A} New Tool for SQLite Data Recovery on Android Devices},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {253--263},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_16},
  doi          = {10.1007/978-3-642-39891-9\_16},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/AouadKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BaggiliBAM12,
  author       = {Ibrahim M. Baggili and
                  Afrah BaAbdallah and
                  Deena Al{-}Safi and
                  Andrew Marrington},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Research Trends in Digital Forensic Science: An Empirical Analysis
                  of Published Research},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {144--157},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_9},
  doi          = {10.1007/978-3-642-39891-9\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BaggiliBAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BaggiliSJZ12,
  author       = {Ibrahim M. Baggili and
                  Moza Al Shamlan and
                  Bedoor Al Jabri and
                  Ayesha Al Zaabi},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory
                  Study},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_7},
  doi          = {10.1007/978-3-642-39891-9\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BaggiliSJZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BeckRY12,
  author       = {Marc Beck and
                  Eric C. Rouchka and
                  Roman V. Yampolskiy},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Finding Data in {DNA:} Computer Forensic Investigations of Living
                  Organisms},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {204--219},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_13},
  doi          = {10.1007/978-3-642-39891-9\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BeckRY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BreitingerB12,
  author       = {Frank Breitinger and
                  Harald Baier},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Similarity Preserving Hashing: Eligible Properties and a New Algorithm
                  MRSH-v2},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {167--182},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_11},
  doi          = {10.1007/978-3-642-39891-9\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BreitingerB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/GraafSG12,
  author       = {Daan de Graaf and
                  Ahmed F. Shosha and
                  Pavel Gladyshev},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {{BREDOLAB:} Shopping in the Cybercrime Underworld},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {302--313},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_19},
  doi          = {10.1007/978-3-642-39891-9\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/GraafSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/IdlandJM12,
  author       = {Christer Idland and
                  Thomas Jelle and
                  Stig Fr. Mj{\o}lsnes},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Detection of Masqueraded Wireless Access Using 802.11 {MAC} Layer
                  Fingerprints},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {283--301},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_18},
  doi          = {10.1007/978-3-642-39891-9\_18},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/IdlandJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/KoppenGBDKMW12,
  author       = {Jeremy Koppen and
                  Gerald Gent and
                  Kevin Bryan and
                  Lisa Cingiser DiPippo and
                  Jillian Kramer and
                  Marquita Moreland and
                  Victor Fay Wolfe},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Identifying Remnants of Evidence in the Cloud},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {42--57},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_3},
  doi          = {10.1007/978-3-642-39891-9\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/KoppenGBDKMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/KyeiZLR12,
  author       = {Kwaku Kyei and
                  Pavol Zavarsky and
                  Dale Lindskog and
                  Ron Ruhl},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {A Review and Comparative Study of Digital Forensic Investigation Models},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {314--327},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_20},
  doi          = {10.1007/978-3-642-39891-9\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/KyeiZLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MarzougyBM12,
  author       = {Mohamed Al Marzougy and
                  Ibrahim M. Baggili and
                  Andrew Marrington},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {BlackBerry PlayBook Backup Forensic Analysis},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {239--252},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_15},
  doi          = {10.1007/978-3-642-39891-9\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MarzougyBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/McGrathG12,
  author       = {Niall McGrath and
                  Pavel Gladyshev},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Investigating File Encrypted Material Using {NTFS} {\textdollar}logfile},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {183--203},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_12},
  doi          = {10.1007/978-3-642-39891-9\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/McGrathG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MohamedY12,
  author       = {Abdallah A. Mohamed and
                  Roman V. Yampolskiy},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Face Recognition Based on Wavelet Transform and Adaptive Local Binary
                  Pattern},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {158--166},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_10},
  doi          = {10.1007/978-3-642-39891-9\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MohamedY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/RuanC12,
  author       = {Keyun Ruan and
                  Joe Carthy},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Cloud Computing Reference Architecture and Its Forensic Implications:
                  {A} Preliminary Analysis},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_1},
  doi          = {10.1007/978-3-642-39891-9\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/RuanC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/RuanC12a,
  author       = {Keyun Ruan and
                  Joe Carthy},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Cloud Forensic Maturity Model},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {22--41},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_2},
  doi          = {10.1007/978-3-642-39891-9\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/RuanC12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SaleemPA12,
  author       = {Shahzad Saleem and
                  Oliver Popov and
                  Oheneba Kwame Appiah{-}Kubi},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative
                  Analysis},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {264--282},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_17},
  doi          = {10.1007/978-3-642-39891-9\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SaleemPA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Seigfried-Spellar12,
  author       = {Kathryn C. Seigfried{-}Spellar},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Measuring the Preference of Image Content for Self-reported Consumers
                  of Child Pornography},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {81--90},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_6},
  doi          = {10.1007/978-3-642-39891-9\_6},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Seigfried-Spellar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ShoshaJHLG12,
  author       = {Ahmed F. Shosha and
                  Joshua I. James and
                  Alan Hannaway and
                  Chen{-}Ching Liu and
                  Pavel Gladyshev},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Towards Automated Malware Behavioral Analysis and Profiling for Digital
                  Forensic Investigation Purposes},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {66--80},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_5},
  doi          = {10.1007/978-3-642-39891-9\_5},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ShoshaJHLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Strikwerda12,
  author       = {Litska Strikwerda},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {When Should Virtual Cybercrime Be Brought under the Scope of the Criminal
                  Law?},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {109--143},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_8},
  doi          = {10.1007/978-3-642-39891-9\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Strikwerda12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Tennyson12,
  author       = {Matthew F. Tennyson},
  editor       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {On Improving Authorship Attribution of Source Code},
  booktitle    = {Digital Forensics and Cyber Crime - 4th International Conference,
                  {ICDF2C} 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {114},
  pages        = {58--65},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-39891-9\_4},
  doi          = {10.1007/978-3-642-39891-9\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Tennyson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2011,
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35515-8},
  doi          = {10.1007/978-3-642-35515-8},
  isbn         = {978-3-642-35514-1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Barnett11,
  author       = {Alexander G. Barnett},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {The Forensic Value of the Windows 7 Jump List},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {197--210},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_17},
  doi          = {10.1007/978-3-642-35515-8\_17},
  timestamp    = {Wed, 24 May 2017 08:28:31 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Barnett11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Blackwell11,
  author       = {Clive Blackwell},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {A Forensic Framework for Incident Analysis Applied to the Insider
                  Threat},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {268--281},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_22},
  doi          = {10.1007/978-3-642-35515-8\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Blackwell11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BreitingerB11,
  author       = {Frank Breitinger and
                  Harald Baier},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Performance Issues About Context-Triggered Piecewise Hashing},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_12},
  doi          = {10.1007/978-3-642-35515-8\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BreitingerB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ChoR11,
  author       = {Gyu{-}Sang Cho and
                  Marcus K. Rogers},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Finding Forensic Information on Creating a Folder in {\textdollar}LogFile
                  of {NTFS}},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {211--225},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_18},
  doi          = {10.1007/978-3-642-35515-8\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ChoR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ColeSM11,
  author       = {Kelly A. Cole and
                  Ramindu L. Silva and
                  Richard P. Mislan},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {All Bot Net: {A} Need for Smartphone {P2P} Awareness},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {36--46},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_4},
  doi          = {10.1007/978-3-642-35515-8\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ColeSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/KatzMRS11,
  author       = {Eric Katz and
                  Richard Mislan and
                  Marcus K. Rogers and
                  Anthony Smith},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Results of Field Testing Mobile Phone Shielding Devices},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {47--61},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_5},
  doi          = {10.1007/978-3-642-35515-8\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/KatzMRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/KeaneO11,
  author       = {Anthony Keane and
                  Stephen O'Shaughnessy},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Tracking User Activity on Personal Computers},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {188--196},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_16},
  doi          = {10.1007/978-3-642-35515-8\_16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/KeaneO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/KumarTT11,
  author       = {S. Satheesh Kumar and
                  Bibin Thomas and
                  K. L. Thomas},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {An Agent Based Tool for Windows Mobile Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {77--88},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_7},
  doi          = {10.1007/978-3-642-35515-8\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/KumarTT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LevendoskiDR11,
  author       = {Matthew Levendoski and
                  Tejashree Datar and
                  Marcus K. Rogers},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Yahoo! Messenger Forensics on Windows Vista and Windows 7},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {172--179},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_14},
  doi          = {10.1007/978-3-642-35515-8\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LevendoskiDR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Lohrum11,
  author       = {Mark Lohrum},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Forensic Extractions of Data from the Nokia {N900}},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {89--103},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_8},
  doi          = {10.1007/978-3-642-35515-8\_8},
  timestamp    = {Thu, 30 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Lohrum11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Lohrum11a,
  author       = {Mark Lohrum},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Forensic Extractions of Data from the Nokia {N900}},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {253--267},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_21},
  doi          = {10.1007/978-3-642-35515-8\_21},
  timestamp    = {Thu, 30 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Lohrum11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Lyle11,
  author       = {James R. Lyle},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {A Strategy for Testing Metadata Based Deleted File Recovery Tools},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {104--114},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_9},
  doi          = {10.1007/978-3-642-35515-8\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Lyle11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MochF11,
  author       = {Christian Moch and
                  Felix C. Freiling},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Evaluating the Forensic Image Generator Generator},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {238--252},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_20},
  doi          = {10.1007/978-3-642-35515-8\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MochF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MokhovPD11,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Reasoning About a Simulated Printer Case Investigation with Forensic
                  Lucid},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_23},
  doi          = {10.1007/978-3-642-35515-8\_23},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MokhovPD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Murphy11,
  author       = {Cynthia A. Murphy},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {The Role of Perception in Age Estimation},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_1},
  doi          = {10.1007/978-3-642-35515-8\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Murphy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Peshin11,
  author       = {Esti Peshin},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Law Enforcement 2.0: Regulating the Lawful Interception of Social
                  Media},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {33--35},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_3},
  doi          = {10.1007/978-3-642-35515-8\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Peshin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/RoweG11,
  author       = {Neil C. Rowe and
                  Simson L. Garfinkel},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Finding Anomalous and Suspicious Files from Directory Metadata on
                  a Large Corpus},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {115--130},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_10},
  doi          = {10.1007/978-3-642-35515-8\_10},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/RoweG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SchaeferHS11,
  author       = {Thomas Schaefer and
                  Hans H{\"{o}}fken and
                  Marko Schuba},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Windows Phone 7 from a Digital Forensics' Perspective},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {62--76},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_6},
  doi          = {10.1007/978-3-642-35515-8\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SchaeferHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Seigfried-SpellarBR11,
  author       = {Kathryn C. Seigfried{-}Spellar and
                  Gary R. Bertoline and
                  Marcus K. Rogers},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Internet Child Pornography, {U.S.} Sentencing Guidelines, and the
                  Role of Internet Service Providers},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_2},
  doi          = {10.1007/978-3-642-35515-8\_2},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Seigfried-SpellarBR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ShoshaJG11,
  author       = {Ahmed F. Shosha and
                  Joshua James and
                  Pavel Gladyshev},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {A Novel Methodology for Malware Intrusion Attack Path Reconstruction},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {131--140},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_11},
  doi          = {10.1007/978-3-642-35515-8\_11},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ShoshaJG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Steinebach11,
  author       = {Martin Steinebach},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Robust Hashing for Efficient Forensic Analysis of Image Sets},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {180--187},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_15},
  doi          = {10.1007/978-3-642-35515-8\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Steinebach11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ThorpeRRGBF11,
  author       = {Sean S. E. Thorpe and
                  Indrakshi Ray and
                  Indrajit Ray and
                  Tyrone Grandison and
                  Abbie Barbir and
                  Robert B. France},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Formal Parameterization of Log Synchronization Events within a Distributed
                  Forensic Compute Cloud Database Environment},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_13},
  doi          = {10.1007/978-3-642-35515-8\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ThorpeRRGBF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/YasuhiraNK11,
  author       = {Toshinobu Yasuhira and
                  Kazuhiro Nishimura and
                  Tomofumi Koida},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Rescuing Digital Data from Submerged {HDD}},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {226--237},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_19},
  doi          = {10.1007/978-3-642-35515-8\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/YasuhiraNK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2010,
  editor       = {Ibrahim M. Baggili},
  title        = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19513-6},
  doi          = {10.1007/978-3-642-19513-6},
  isbn         = {978-3-642-19512-9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/AlkaabiMMC10,
  author       = {Ali Alkaabi and
                  George M. Mohay and
                  Adrian McCullagh and
                  Nicholas Chantler},
  editor       = {Ibrahim M. Baggili},
  title        = {Dealing with the Problem of Cybercrime},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_1},
  doi          = {10.1007/978-3-642-19513-6\_1},
  timestamp    = {Wed, 24 May 2017 08:28:31 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/AlkaabiMMC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BabooB10,
  author       = {S. Santhosh Baboo and
                  P. Vinod Bhattathiripad},
  editor       = {Ibrahim M. Baggili},
  title        = {Software Piracy Forensics: The Need for Further Developing {AFC}},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {19--26},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_2},
  doi          = {10.1007/978-3-642-19513-6\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BabooB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BarikiHB10,
  author       = {Hamda Bariki and
                  Mariam Hashmi and
                  Ibrahim M. Baggili},
  editor       = {Ibrahim M. Baggili},
  title        = {Defining a Standard for Reporting Digital Evidence Items in Computer
                  Forensic Tools},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {78--95},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_7},
  doi          = {10.1007/978-3-642-19513-6\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BarikiHB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/GladyshevA10,
  author       = {Pavel Gladyshev and
                  Afrah Almansoori},
  editor       = {Ibrahim M. Baggili},
  title        = {Reliable Acquisition of {RAM} Dumps from Intel-Based Apple Mac Computers
                  over FireWire},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {55--64},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_5},
  doi          = {10.1007/978-3-642-19513-6\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/GladyshevA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HashimS10,
  author       = {Noor Hashim and
                  Iain Sutherland},
  editor       = {Ibrahim M. Baggili},
  title        = {An Architecture for the Forensic Analysis of Windows System Artifacts},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {120--128},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_10},
  doi          = {10.1007/978-3-642-19513-6\_10},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HashimS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HusainBS10,
  author       = {Mohammad Iftekhar Husain and
                  Ibrahim M. Baggili and
                  Ramalingam Sridhar},
  editor       = {Ibrahim M. Baggili},
  title        = {A Simple Cost-Effective Framework for iPhone Forensic Analysis},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {27--37},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_3},
  doi          = {10.1007/978-3-642-19513-6\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HusainBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JamesGZ10,
  author       = {Joshua James and
                  Pavel Gladyshev and
                  Yuandong Zhu},
  editor       = {Ibrahim M. Baggili},
  title        = {Signature Based Detection of User Events for Post-mortem Forensic
                  Analysis},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {96--109},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_8},
  doi          = {10.1007/978-3-642-19513-6\_8},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JamesGZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/KahvedzicK10,
  author       = {Damir Kahvedzic and
                  M. Tahar Kechadi},
  editor       = {Ibrahim M. Baggili},
  title        = {Semantic Modelling of Digital Forensic Evidence},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {149--156},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_13},
  doi          = {10.1007/978-3-642-19513-6\_13},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/KahvedzicK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/PilliJN10,
  author       = {Emmanuel S. Pilli and
                  Ramesh Chandra Joshi and
                  Rajdeep Niyogi},
  editor       = {Ibrahim M. Baggili},
  title        = {An {IP} Traceback Model for Network Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {129--136},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_11},
  doi          = {10.1007/978-3-642-19513-6\_11},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/PilliJN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/PovarB10,
  author       = {Digambar Povar and
                  V. K. Bhadran},
  editor       = {Ibrahim M. Baggili},
  title        = {Forensic Data Carving},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {137--148},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_12},
  doi          = {10.1007/978-3-642-19513-6\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/PovarB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SaleemP10,
  author       = {Shahzad Saleem and
                  Oliver Popov},
  editor       = {Ibrahim M. Baggili},
  title        = {Protecting Digital Evidence Integrity by Using Smart Cards},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {110--119},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_9},
  doi          = {10.1007/978-3-642-19513-6\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SaleemP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SinghEWM10,
  author       = {Gurvinder Singh and
                  Martin Eian and
                  Svein Yngvar Willassen and
                  Stig Fr. Mj{\o}lsnes},
  editor       = {Ibrahim M. Baggili},
  title        = {Detecting Intermediary Hosts by {TCP} Latency Measurements},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {38--54},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_4},
  doi          = {10.1007/978-3-642-19513-6\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SinghEWM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/TrabelsiABA10,
  author       = {Zouheir Trabelsi and
                  Mohamed Al{-}Hemairy and
                  Ibrahim M. Baggili and
                  Saad Ali Amin},
  editor       = {Ibrahim M. Baggili},
  title        = {Towards More Secure Biometric Readers for Effective Digital Forensic
                  Investigation},
  booktitle    = {Digital Forensics and Cyber Crime - Second International {ICST} Conference,
                  {ICDF2C} 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {53},
  pages        = {65--77},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19513-6\_6},
  doi          = {10.1007/978-3-642-19513-6\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/TrabelsiABA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2009,
  editor       = {Sanjay Goel},
  title        = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11534-9},
  doi          = {10.1007/978-3-642-11534-9},
  isbn         = {978-3-642-11533-2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Al-KuwariW09,
  author       = {Saif M. Al{-}Kuwari and
                  Stephen D. Wolthusen},
  editor       = {Sanjay Goel},
  title        = {A Survey of Forensic Localization and Tracking Mechanisms in Short-Range
                  and Cellular Networks},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {19--32},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_3},
  doi          = {10.1007/978-3-642-11534-9\_3},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Al-KuwariW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BaggiliMR09,
  author       = {Ibrahim M. Baggili and
                  Ashwin Mohan and
                  Marcus K. Rogers},
  editor       = {Sanjay Goel},
  title        = {{SMIRK:} {SMS} Management and Information Retrieval Kit},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {33--42},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_4},
  doi          = {10.1007/978-3-642-11534-9\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BaggiliMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HusainS09,
  author       = {Mohammad Iftekhar Husain and
                  Ramalingam Sridhar},
  editor       = {Sanjay Goel},
  title        = {iForensics: Forensic Analysis of Instant Messaging on Smart Phones},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {9--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_2},
  doi          = {10.1007/978-3-642-11534-9\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HusainS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/IbrahimM09,
  author       = {Amin Ibrahim and
                  Miguel Vargas Martin},
  editor       = {Sanjay Goel},
  title        = {Detecting and Preventing the Electronic Transmission of Illicit Images
                  and Its Network Performance},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {139--150},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_14},
  doi          = {10.1007/978-3-642-11534-9\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/IbrahimM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JamesGAZ09,
  author       = {Joshua James and
                  Pavel Gladyshev and
                  Mohd Taufik Abdullah and
                  Yuandong Zhu},
  editor       = {Sanjay Goel},
  title        = {Analysis of Evidence Using Formal Event Reconstruction},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {85--98},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_9},
  doi          = {10.1007/978-3-642-11534-9\_9},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JamesGAZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LawCLT09,
  author       = {Frank Y. W. Law and
                  Kam{-}Pui Chow and
                  Pierre K. Y. Lai and
                  Hayson Tse},
  editor       = {Sanjay Goel},
  title        = {A Host-Based Approach to BotNet Investigation?},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {161--170},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_16},
  doi          = {10.1007/978-3-642-11534-9\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LawCLT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Le-KhacMK09,
  author       = {Nhien{-}An Le{-}Khac and
                  Sammer Markos and
                  Mohand Tahar Kechadi},
  editor       = {Sanjay Goel},
  title        = {Towards a New Data Mining-Based Approach for Anti-Money Laundering
                  in an International Investment Bank},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {77--84},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_8},
  doi          = {10.1007/978-3-642-11534-9\_8},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Le-KhacMK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MagalingamMAY09,
  author       = {Pritheega Magalingam and
                  Azizah Bt Abdul Manaf and
                  Rabiah Ahmad and
                  Zuraimi Yahya},
  editor       = {Sanjay Goel},
  title        = {Digital Evidence Retrieval and Forensic Analysis on Gambling Machine},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {111--121},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_11},
  doi          = {10.1007/978-3-642-11534-9\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MagalingamMAY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Mercuri09,
  author       = {Rebecca Mercuri},
  editor       = {Sanjay Goel},
  title        = {Criminal Defense Challenges in Computer Forensics},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {132--138},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_13},
  doi          = {10.1007/978-3-642-11534-9\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Mercuri09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/OrebaughA09,
  author       = {Angela Orebaugh and
                  Jeremy E. Allnutt},
  editor       = {Sanjay Goel},
  title        = {Data Mining Instant Messaging Communications to Perform Author Identification
                  for Cybercrime Investigations},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {99--110},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_10},
  doi          = {10.1007/978-3-642-11534-9\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/OrebaughA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/RaghavanR09,
  author       = {Sriram Raghavan and
                  S. V. Raghavan},
  editor       = {Sanjay Goel},
  title        = {Digital Evidence Composition in Fraud Detection},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_1},
  doi          = {10.1007/978-3-642-11534-9\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/RaghavanR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ScanlonK09,
  author       = {Mark Scanlon and
                  Mohand Tahar Kechadi},
  editor       = {Sanjay Goel},
  title        = {Online Acquisition of Digital Forensic Evidence},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {122--131},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_12},
  doi          = {10.1007/978-3-642-11534-9\_12},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ScanlonK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SteinebachOLK09,
  author       = {Martin Steinebach and
                  Mohamed El Ouariachi and
                  Huajian Liu and
                  Stefan Katzenbeisser},
  editor       = {Sanjay Goel},
  title        = {On the Reliability of Cell Phone Camera Fingerprint Recognition},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {69--76},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_7},
  doi          = {10.1007/978-3-642-11534-9\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SteinebachOLK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/WilsonL09,
  author       = {Duane Wilson and
                  Michael K. Lavine},
  editor       = {Sanjay Goel},
  title        = {A Discretionary Access Control Method for Preventing Data Exfiltration
                  {(DE)} via Removable Devices},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {151--160},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_15},
  doi          = {10.1007/978-3-642-11534-9\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/WilsonL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/YasinWK09,
  author       = {Muhammad Yasin and
                  Muhammad Arif Wahla and
                  Firdous Kausar},
  editor       = {Sanjay Goel},
  title        = {Analysis of Free Download Manager for Forensic Artefacts},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {59--68},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_6},
  doi          = {10.1007/978-3-642-11534-9\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/YasinWK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/YoonC09,
  author       = {Jong P. Yoon and
                  Zhixiong Chen},
  editor       = {Sanjay Goel},
  title        = {Localization and Detection of Vector Logo Image Plagiarism},
  booktitle    = {Digital Forensics and Cyber Crime - First International {ICST} Conference,
                  {ICDF2C} 2009, Albany, NY, USA, September 30-October 2, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {31},
  pages        = {43--58},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11534-9\_5},
  doi          = {10.1007/978-3-642-11534-9\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/YoonC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics