default search action
9th ICDF2C 2017: Prague, Czech Republic
- Petr Matousek, Martin Schmiedecker:
Digital Forensics and Cyber Crime - 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 216, Springer 2018, ISBN 978-3-319-73696-9
Malware and Botnet
- Xiaoqi Jia, Guangzhe Zhou, Qingjia Huang, Weijuan Zhang, Donghai Tian:
FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud. 3-17 - Peter Kieseberg, Sebastian Neuner, Sebastian Schrittwieser, Martin Schmiedecker, Edgar R. Weippl:
Real-Time Forensics Through Endpoint Visibility. 18-32 - John MacRae, Virginia N. L. Franqueira:
On Locky Ransomware, Al Capone and Brexit. 33-45
Deanonymization
- Neil C. Rowe:
Finding and Rating Personal Names on Drives for Forensic Needs. 49-63 - Dominik Ernsberger, Adeyemi Richard Ikuesan, Hein S. Venter, Alf Zugenmaier:
A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness. 64-79
Digital Forensics Tools I
- Thomas Edward Allen Barton, M. A. Hannan Bin Azhar:
Open Source Forensics for a Multi-platform Drone System. 83-96 - Ming Xu, Jinkai Sun, Ning Zheng, Tong Qiao, Yiming Wu, Kai Shi, Haidong Ge, Tao Yang:
A Novel File Carving Algorithm for EVTX Logs. 97-105 - Konstantia Barmpatsalou, Tiago Cruz, Edmundo Monteiro, Paulo Simões:
Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic Evidence. 106-114
Cyber Crime Investigation and Digital Forensics Triage
- Asif Iqbal, Mathias Ekstedt, Hanan Alobaidli:
Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power Sector. 117-129 - Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu:
A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph. 130-143 - David Lillis, Frank Breitinger, Mark Scanlon:
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees. 144-157 - Lorenz Liebler, Harald Baier:
Approxis: A Fast, Robust, Lightweight and Approximate Disassembler Considered in the Field of Memory Forensics. 158-172
Digital Forensics Tools Testing and Validation
- Charles B. Leopard, Neil C. Rowe, Michael R. McCarrin:
Memory Forensics and the Macintosh OS X Operating System. 175-180 - Pu Ren, Mingquan Zhou, Jin Liu, Yachun Fan, Wenshuo Zhao, Wuyang Shui:
Sketch-Based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation. 181-194 - Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim M. Baggili:
An Overview of the Usage of Default Passwords. 195-203
Hacking
- Martin Vondrácek, Jan Pluskal, Ondrej Rysavý:
Automation of MitM Attack on Wi-Fi Networks. 207-220 - Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu:
SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle. 221-227 - Irvin Homem:
Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets. 228-233
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.