Digital Forensics and Cyber Crime (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)

個数:
  • 予約

Digital Forensics and Cyber Crime (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783032225443

Full Description

This two-volume set, LNICST 685 and 686, constitutes the refereed post-conference proceedings of the 16th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2025, Miami, FL, USA, during November 17-19, 2025.

The 66 full papers and 1 poster paper included in these volumes were carefully reviewed and selected from 163 submissions. They have been organized in the following topical sections:

Part I: AI and Machine Learning in Digital Forensics: Papers applying AI, LLMs, and deep learning to detect anomalies,enhance forensics, or improve model reliability; Digital Forensics and Incident Response: Focused on forensic investigation, evidence recovery, data analysis, and structured workflows; Adversarial Machine Learning and Attack Detection: Addressing adversarial AI, attack simulation, and defensive mechanisms; and Cyber Threat Intelligence and Malware Analysis: Focus on malware detection, honeynets, phishing, traffic analysis, and intrusion defense.

Part II: Cyber Threat Intelligence and Malware Analysis: Focus on malware detection, honeynets, phishing, traffic analysis, and intrusion defense; Digital Evidence Management, Blockchain, and Privacy: Addressing blockchain forensics, data provenance, and privacy-preserving computation; Critical Infrastructure and Cyber-Physical Security: Cyber resilience in physical and industrial systems, including IoT, satellites, and SCADA; Legal, Policy, and AI Governance in Digital Forensics: Studies bridging AI governance, digital law, compliance, and socio-technical policy; and Posters & Demos.

Contents

.- Cyber Threat Intelligence and Malware Analysis: Focus on malware detection, honeynets, phishing, traffic analysis, and intrusion defense. 
.-  An encrypted traffic classification method based on Mamba and wavelet transform convolution.
.- MFETD: Multimodal Feature Fusion for Encrypted Traffic Detection based on Transformer.
.- Online Learning for Android Malware Detection under Concept-Drift.
.- Evaluating the Impact of Honeynets on Malicious Activity in Home Network Environments.
.- Revealing the Intents: Malware Protocol Semantic Inference using Large Language Models.
.- PhishIntentionLLM: Uncovering Phishing Website Intentions through Multi-Agent Retrieval-Augmented Generation.
.- APT-Agent: A Training-Free, Unsupervised, LLM-Based Multi-Agent Framework for Interpretable Advanced Persistent Threat Detection.
.- Digital Evidence Management, Blockchain, and Privacy: Addressing blockchain forensics, data provenance, and privacy-preserving computation.
.- Blockchain-based vs. SQL Database Systems for Digital Twin Evidence Management: A Comparative Forensic Analysis.
.- FAIR-MPC:Secure and Auditable SMPC for Anonymous Financial Collaboration.
.- Privacy-Preserving k-Bitruss Community Query over Encrypted Bipartite Graphs.
.- Towards Regulated and Accountable Privacy-Preserving Retrieval for Digital Forensics: A Cryptographic Design Framework.
.- Automatic Recovery of Cryptowallets from Mnemonic Seed Phrases.
.- AnchorMark: Real-World Anchor-Based Watermarking for Digital Content Authentication and Manipulation Detection.
.- Critical Infrastructure and Cyber-Physical Security: Cyber resilience in physical and industrial systems, including IoT,satellites, and SCADA.
.-  Resilient Satellite Cybersecurity: Integrating NIST and AI Governance.
.-  An Enhanced Federated Machine Learning Approach for Decentralized Water Contamination Detection.
.- DepFieldGen: Research on Dependent Field Generation for Secure ICS Protocols.
.- A ROSI-Based Framework with Zero Trust Architecture: Interdependent Risks and Cybersecurity Investment.
.- Accelerating Criminal Investigations with TRACY.
.- Legal, Policy, and AI Governance in Digital Forensics:Studies bridging AI governance, digital law, compliance, and socio-technical policy.
.- Retrospective Analysis of Legal Documents Using Hybrid AI - A Preliminary Empirical Study of Historical Search Warrant Processing.
.- Where the Money Is: Shadow AI Risks to Family Offices and the Wealth Management Sector.
.- Chances and Challenges of the Model Context Protocol in Digital Forensics and Incident Response.
.- SCOPE - Activity Recognition Using Temporally Dominant Topic Identification In Forensic Chat Analysis.
.- Automating Cloud Security and Forensics Through a Secure-by-Design GenAI Framework.
.- Understanding Online Grooming Through LLMs: Stage Detection and Linguistic Patterns.
.- Emerging Research, Tools, and Experimental Frameworks: Novel methods, datasets, and future directions in digital forensics and cybersecurity.
.- Graph Neural Networks for Video Device Identification.
.-  WebHunter: An LLM-Agent with Exploit Planning and Tool Collaboration for Automated SQL Injection.
.- AFLTrans: An Intelligent Generative Fuzz Testing Method for Binary Programs Based on Transformer.
.-  HLSEn: High-level Semantic Awareness Pseudo-code Encoding for Binary Code Similarity Detection.
.- SolDataVul-LLaMA Dataset: a LLM-driven construction method and detection research of smart contract vulnerability dataset in data trading scenarios.
.-  The sample classification method accelerates the efficiency of robustness verification.
.- MuLImg-SCV: Multi-Label Vulnerability Classification of Smart Contracts Based on RGB Image.
.- On the Security of the RDHEI by Binary Symmetric Channel and Polar Code.
.- Posters & Demos.
.- Enhancing Trust in VideoKYC: Deepfake Detection and Source Attribution.

最近チェックした商品