Full Description
The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9-10, 2024.
The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:
Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.
Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.
Contents
.- Artificial Intelligence & Security.
.- Hacking Mobile Biometrics with the Photograph of a Fingerprint.
.- Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling.
.- Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review.
.- CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning.
.- Multimedia Forensics.
.- Toward Forensic-Friendly AI: Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness.
.- The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router.
.- ENF Match with Masking: a new method for searching with sparse signal.
.- Lightweight Multi-Tier IDS for UAV Networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence.
.- Intrusion Detection.
.- Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model.
.- APTChaser: Cyber Threat Attribution via Attack Technique Modeling.
.- What Do We Know About the Psychology of Insider Threats?.
.- A Digital Profiling Triage Model for Industrial Espionage.
.- Intrusion and Fraud Detection.
.- Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning.
.- Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture.
.- ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning.
.- Large Language Models, Advances in Security and Forensics.
.- Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails.
.- SecureSem: Sensitive Text Classification based on Semantic Feature Optimization.
.- The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI.
.- Advances in Security and Forensics.
.- Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review.
.- Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project.