Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9–10, 2024.

The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:

Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.

Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

1147083035
Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9–10, 2024.

The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:

Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.

Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.

64.99 In Stock
Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II

Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II

Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II

Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II

eBook

$64.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9–10, 2024.

The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections:

Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics.

Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.


Product Details

ISBN-13: 9783031893605
Publisher: Springer-Verlag New York, LLC
Publication date: 05/24/2025
Series: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering , #614
Sold by: Barnes & Noble
Format: eBook
File size: 38 MB
Note: This product may take a few minutes to download.

Table of Contents

.- Security Analytics, Threat Intelligence, Multimedia Forensics.

.- Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse.

.- EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency.

.- Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security.

.- Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators.

.- ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats.

.- Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data.

.- A Comprehensive Survey on Basic Safety Message Attacks and Their Detection.

.- BGETC: An Encrypted Traffic Classification Method Based on BERT and GRU.

.- AnGSL: Graph-Based Android Malware Detection Method.

.- Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching.

.- MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network.

.- An IP Anti-Geolocation Method Based on Constructed Landmarks.

.- Burst Sequence Based Graph Neural Network for Video Traffic Identification.

.- KP-WF: Cross-domain Few-shot Website Fingerprinting.

.- Generative AI, Emerging Threats. 

.- Pixel-level Face Correction Task for More Generalized Deepfake Detection.

.- Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data.

.- Driven to Evidence: The Digital Forensic Trail of Vehicles.

.- Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing.

.- Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack.

.-  Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals.

From the B&N Reads Blog

Customer Reviews