• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • Digital Forensics and Cyber Crime: 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings

    Digital Forensics and Cyber Crime by Goel, Sanjay; Gladyshev, Pavel; Nikolay, Akatyev;

    13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings

    Sorozatcím: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; 508;

      • 20% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár EUR 106.99
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        44 374 Ft (42 261 Ft + 5% áfa)
      • Kedvezmény(ek) 20% (cc. 8 875 Ft off)
      • Kedvezményes ár 35 499 Ft (33 809 Ft + 5% áfa)

    44 374 Ft

    db

    Beszerezhetőség

    Megrendelésre a kiadó utánnyomja a könyvet. Rendelhető, de a szokásosnál kicsit lassabban érkezik meg.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    Hosszú leírás:

    This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022.


    The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.

    Több

    Tartalomjegyzék:

    Image Forensics.- Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification.- Towards efficient on-site CSAM triage by clustering images from a source point of view.- Can Image Watermarking Efficiently Protect DeepLearning-Based Image Classifiers? – A Preliminary Security Analysis of an IP-Protecting Method.- Forensics Analysis.- Digital Forensics Tool Evaluation on Deleted Files.- Forensic Analysis of Webex on the iOS Platform.- Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android.- Crypto Wallet Artifact Detection on Android Devices using Advanced Machine Learning Techniques.- SPREAD SPECTRUM ANALYSIS.- CSCD: A Cyber Security Community Detection Scheme on Online Social Networks.- Shedding Light on Monopoly: Temporal Analysis of Drug Trades.- Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding.- TRAFFIC ANALYSIS AND MONITORING.- MQTT Traffic Collection and ForensicAnalysis Framework.- IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft.- Crime and Incident Watch for Smart Cities: A Sensor-Based Approach.- Malware Analysis.- The Lightweight Botnet Detection Model Based on the Improved UNet.- On the application of active learning to handle data evolution in Android malware detection.- Volatility Custom Profiling for Automated Hybrid ELF Malware Detection.- Security Risk Management.- The Need for Biometric Anti-Spoofing Policies: The Case of Etsy.- VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning.- Are External Auditors Capable of Dealing with Cybersecurity Risks?.- Deep Learning-based Detection of Cyberattacks in Software-Defined Networks.- Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments.- Poisoning-Attack Detection using an Auto-Encoder for Deep Learning Models.- PRIVACY AND SECURITY.- Attribute-based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET.- PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data.- Cyber Crime undermines Data Privacy efforts – On the Balance between Data Privacy and Security.- Automating the Flow of Data Between Digital Forensic Tools using Apache NiFi.- Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP).- A General Steganalysis Method of QR Codes.

    Több