International ICST Conference on Digital Forensics & Cyber Crime最新文献

筛选
英文 中文
If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept 如果我有一百万个密码:加密钱包应用分析和木马概念验证
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-05487-8_3
Trevor Haigh, Frank Breitinger, I. Baggili
{"title":"If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept","authors":"Trevor Haigh, Frank Breitinger, I. Baggili","doi":"10.1007/978-3-030-05487-8_3","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_3","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131028762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Digital Forensics Event Graph Reconstruction 数字取证事件图重建
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-05487-8_10
Daniel J. Schelkoph, Gilbert L. Peterson, James S. Okolica
{"title":"Digital Forensics Event Graph Reconstruction","authors":"Daniel J. Schelkoph, Gilbert L. Peterson, James S. Okolica","doi":"10.1007/978-3-030-05487-8_10","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_10","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127229111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attacks 多条目密码短语:一种对抗离线猜测攻击的自适应方法
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-05487-8_11
Jaryn Shen, Kim-Kwang Raymond Choo, Qingkai Zeng
{"title":"Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attacks","authors":"Jaryn Shen, Kim-Kwang Raymond Choo, Qingkai Zeng","doi":"10.1007/978-3-030-05487-8_11","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_11","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126802763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Associating Drives Based on Their Artifact and Metadata Distributions 基于工件和元数据分布关联驱动器
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-05487-8_9
N. Rowe
{"title":"Associating Drives Based on Their Artifact and Metadata Distributions","authors":"N. Rowe","doi":"10.1007/978-3-030-05487-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_9","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134022750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Solid State Drive Forensics: Where Do We Stand? 固态硬盘取证:我们站在哪里?
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-05487-8_8
J. Vieyra, M. Scanlon, Nhien-An Le-Khac
{"title":"Solid State Drive Forensics: Where Do We Stand?","authors":"J. Vieyra, M. Scanlon, Nhien-An Le-Khac","doi":"10.1007/978-3-030-05487-8_8","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_8","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129097568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
fishy - A Framework for Implementing Filesystem-Based Data Hiding Techniques 一个实现基于文件系统的数据隐藏技术的框架
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-05487-8_2
Thomas Göbel, Harald Baier
{"title":"fishy - A Framework for Implementing Filesystem-Based Data Hiding Techniques","authors":"Thomas Göbel, Harald Baier","doi":"10.1007/978-3-030-05487-8_2","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_2","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128543327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving 记忆雕刻线性函数检测方法的效率与有效性研究
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-05487-8_1
Lorenz Liebler, Harald Baier
{"title":"On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving","authors":"Lorenz Liebler, Harald Baier","doi":"10.1007/978-3-030-05487-8_1","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_1","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126232760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Intrusion Detection System for Worm Attacks Based on Their Network Behavior 基于网络行为的蠕虫攻击混合入侵检测系统
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-05487-8_12
H. AL-Maksousy, Michele C. Weigle
{"title":"Hybrid Intrusion Detection System for Worm Attacks Based on Their Network Behavior","authors":"H. AL-Maksousy, Michele C. Weigle","doi":"10.1007/978-3-030-05487-8_12","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_12","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Forensic Readiness Framework for Ransomware Investigation 勒索软件调查的数字取证准备框架
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-05487-8_5
Avinash Singh, A. Ikuesan, H. Venter
{"title":"Digital Forensic Readiness Framework for Ransomware Investigation","authors":"Avinash Singh, A. Ikuesan, H. Venter","doi":"10.1007/978-3-030-05487-8_5","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_5","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121964491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Forensics Analysis of an On-line Game over Steam Platform 基于Steam平台的在线游戏取证分析
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-05487-8_6
Raquel Tabuyo-Benito, Hayretdin Bahsi, Pedro Peris-López
{"title":"Forensics Analysis of an On-line Game over Steam Platform","authors":"Raquel Tabuyo-Benito, Hayretdin Bahsi, Pedro Peris-López","doi":"10.1007/978-3-030-05487-8_6","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_6","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114144284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信