


default search action
15th ICDF2C 2024: Dubrovnik, Croatia - Part I
- Sanjay Goel

, Ersin Uzun, Mengjun Xie
, Sumantra Sarkar
:
Digital Forensics and Cyber Crime - 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 613, Springer 2025, ISBN 978-3-031-89362-9
Artificial Intelligence and Security
- Sarah Dill, Joseph Hommel, Justin Kennedy

, Vaughn Woerpel
, Justin Pelletier
:
Hacking Mobile Biometrics with the Photograph of a Fingerprint. 3-16 - Ivan Cvitic

, Dragan Perakovic
, Josip Vladava
, Karlo Gavrilovic
:
Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling. 17-37 - Yüksel Çelik

, Erdal Basaran
, Sanjay Goel:
Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review. 38-65 - Chunyan Ma, Zhengwei Jiang, Kai Zhang, Jun Jiang, Peian Yang, Bo Xu, Huamin Feng:

CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-task Adversarial Active Learning. 66-85
Multimedia Forensics
- Safiia Mohammed, Alioune Ngom:

Toward Forensic-Friendly AI: Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness. 89-99 - Akif Ahsen Ozer, Umit Karabiyik

:
The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router. 100-112 - Nicola Landro

, Lorenzo Schiavone
, Anselmo Castelo Branco Ferreira
, Laurent Beslay:
ENF Match with Masking: A New Method for Searching with Sparse Signal. 113-128 - Abdul Majid Jamil, Yue Cao, Naveed Ahmad, Aduwati Sali, Mohammed Ali Alshare, Long Chen, Hassan Jalil Hadi:

Lightweight Multi-tier IDS for UAV Networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence. 129-150
Intrusion Detection
- Hassan Jalil Hadi, Yue Cao, Faisal Bashir Hussain, Naveed Ahmad, Mohammed Ali Alshara, Insaf Ullah, Yasir Javed, Yinglong He, Abdul Majid Jamil:

Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model. 153-167 - Yiming Zhang, Peian Yang, Zhengwei Jiang, Chunyan Ma, Mengjiao Cui, Yizhe You:

APTChaser: Cyber Threat Attribution via Attack Technique Modeling. 168-185 - Jukka Ruohonen

, Mubashrah Saddiqa
:
What Do We Know About the Psychology of Insider Threats? 186-211 - Jieun Dokko, Michael Shin:

A Digital Profiling Triage Model for Industrial Espionage. 212-230
Intrusion and Fraud Detection
- Yi Anson Lam, Kam-Pui Chow, Siu-Ming Yiu:

Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning Techniques. 233-248 - Pengcheng Bi, Qi Wang, Zhuohang Lv, Xiaochun Yun, Tianning Zang:

Sky-Eye: Detect Multi-stage Cyber Attacks at the Bigger Picture. 249-266 - Yuedong Pan, Lixin Zhao, Chaofei Li, Tao Leng, Aimin Yu, Lijun Cai, Dan Meng:

ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning. 267-282
Large Language Models, Advances in Security and Forensics
- Malte Josten

, Torben Weis
:
Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-Modified Spam Mails. 285-295 - Kangyuan Qin, Ran Liu, Min Yu, Gang Li, Mingqi Liu, Jingyuan Li, Weiqing Huang, Jianguo Jiang:

SecureSem: Sensitive Text Classification Based on Semantic Feature Optimization. 296-311
Advances in Security and Forensics
- Mirella Sangiovanni, George Manias, Willem-Jan van den Heuvel:

Biologically Sustainable Cyber-Physical Spaces: A Systematic Literature Review. 333-339 - Pradeep Rangappa, Amanda Muscat, Alejandra Sanchez Lara, Petr Motlícek, Michaela Antonopoulou, Ioannis Fourfouris, Antonios Skarlatos, Nikos Avgerinos, Manolis Tsangaris, Kasia Kostka:

Detecting Criminal Networks via Non-content Communication Data Analysis Techniques from the TRACY Project. 340-353

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














