Digital Forensics and Cyber Crime : 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineer

個数:

Digital Forensics and Cyber Crime : 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineer

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 359 p.
  • 商品コード 9783031893599

Full Description

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9-10, 2024.

The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:

Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.

Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

Contents

.- Security Analytics, Threat Intelligence, Multimedia Forensics.

.- Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse.

.- EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency.

.- Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security.

.- Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators.

.- ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats.

.- Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data.

.- A Comprehensive Survey on Basic Safety Message Attacks and Their Detection.

.- BGETC: An Encrypted Traffic Classification Method Based on BERT and GRU.

.- AnGSL: Graph-Based Android Malware Detection Method.

.- Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching.

.- MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network.

.- An IP Anti-Geolocation Method Based on Constructed Landmarks.

.- Burst Sequence Based Graph Neural Network for Video Traffic Identification.

.- KP-WF: Cross-domain Few-shot Website Fingerprinting.

.- Generative AI, Emerging Threats. 

.- Pixel-level Face Correction Task for More Generalized Deepfake Detection.

.- Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data.

.- Driven to Evidence: The Digital Forensic Trail of Vehicles.

.- Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing.

.- Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack.

.-  Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals.

最近チェックした商品