Digital Forensics and Cyber Crime : 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineeri

個数:

Digital Forensics and Cyber Crime : 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineeri

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 357 p.
  • 商品コード 9783031893629

Full Description

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9-10, 2024.

The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:

Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.

Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

Contents

.- Artificial Intelligence & Security.

.- Hacking Mobile Biometrics with the Photograph of a Fingerprint.

.- Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling.

.- Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review.

.- CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning.

.- Multimedia Forensics. 

.- Toward Forensic-Friendly AI: Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness.

.- The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router.

.- ENF Match with Masking: a new method for searching with sparse signal.

.- Lightweight Multi-Tier IDS for UAV Networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence.

.- Intrusion Detection.

.- Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model.

.- APTChaser: Cyber Threat Attribution via Attack Technique Modeling.

.- What Do We Know About the Psychology of Insider Threats?.

.- A Digital Profiling Triage Model for Industrial Espionage.

.- Intrusion and Fraud Detection.

.- Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning.

.- Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture.

.- ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning.

.- Large Language Models, Advances in Security and Forensics.

.- Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails.

.- SecureSem: Sensitive Text Classification based on Semantic Feature Optimization.

.- The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI.

.- Advances in Security and Forensics.

.- Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review.

.- Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project.

最近チェックした商品