International ICST Conference on Digital Forensics & Cyber Crime最新文献

筛选
英文 中文
AndroParse - An Android Feature Extraction Framework and Dataset Android特征提取框架和数据集
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-05487-8_4
R. Schmicker, Frank Breitinger, I. Baggili
{"title":"AndroParse - An Android Feature Extraction Framework and Dataset","authors":"R. Schmicker, Frank Breitinger, I. Baggili","doi":"10.1007/978-3-030-05487-8_4","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_4","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122115259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Digital Forensic Investigation and Verification Model for Industrial Espionage 工业间谍的数字取证调查与验证模型
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2018-09-10 DOI: 10.1007/978-3-030-05487-8_7
Jieun Dokko, M. Shin
{"title":"A Digital Forensic Investigation and Verification Model for Industrial Espionage","authors":"Jieun Dokko, M. Shin","doi":"10.1007/978-3-030-05487-8_7","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_7","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122311652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle SeEagle:语义增强的安全鹰异常检测
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_17
Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu
{"title":"SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle","authors":"Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu","doi":"10.1007/978-3-319-73697-6_17","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_17","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134101006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real-Time Forensics Through Endpoint Visibility 通过端点可见性进行实时取证
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_2
Peter Kieseberg, S. Neuner, S. Schrittwieser, Martin Schmiedecker, E. Weippl
{"title":"Real-Time Forensics Through Endpoint Visibility","authors":"Peter Kieseberg, S. Neuner, S. Schrittwieser, Martin Schmiedecker, E. Weippl","doi":"10.1007/978-3-319-73697-6_2","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_2","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126122492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel File Carving Algorithm for EVTX Logs 一种新的EVTX日志文件雕刻算法
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_7
Ming Xu, Jinkai Sun, Ning Zheng, T. Qiao, Yiming Wu, Kai Shi, Haidong Ge, Tao Yang
{"title":"A Novel File Carving Algorithm for EVTX Logs","authors":"Ming Xu, Jinkai Sun, Ning Zheng, T. Qiao, Yiming Wu, Kai Shi, Haidong Ge, Tao Yang","doi":"10.1007/978-3-319-73697-6_7","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_7","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128161771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sketch-Based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation 基于素描的室内犯罪现场建模和沉浸式显示技术
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_14
Pu Ren, Mingquan Zhou, Jin Liu, Yachun Fan, Wenshuo Zhao, Wuyang Shui
{"title":"Sketch-Based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation","authors":"Pu Ren, Mingquan Zhou, Jin Liu, Yachun Fan, Wenshuo Zhao, Wuyang Shui","doi":"10.1007/978-3-319-73697-6_14","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_14","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124264380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness 一个基于web的鼠标动态可视化工具,用于数字取证准备中的用户归属
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_5
Dominik Ernsberger, A. Ikuesan, H. Venter, A. Zugenmaier
{"title":"A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness","authors":"Dominik Ernsberger, A. Ikuesan, H. Venter, A. Zugenmaier","doi":"10.1007/978-3-319-73697-6_5","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_5","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132618572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Approxis: A Fast, Robust, Lightweight and Approximate Disassembler Considered in the Field of Memory Forensics 近似:内存取证领域中一种快速、鲁棒、轻量级的近似反汇编器
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_12
Lorenz Liebler, Harald Baier
{"title":"Approxis: A Fast, Robust, Lightweight and Approximate Disassembler Considered in the Field of Memory Forensics","authors":"Lorenz Liebler, Harald Baier","doi":"10.1007/978-3-319-73697-6_12","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_12","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132043553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Finding and Rating Personal Names on Drives for Forensic Needs 在硬盘上查找和评价法医需要的个人姓名
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_4
N. Rowe
{"title":"Finding and Rating Personal Names on Drives for Forensic Needs","authors":"N. Rowe","doi":"10.1007/978-3-319-73697-6_4","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_4","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114461162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automation of MitM Attack on Wi-Fi Networks Wi-Fi网络MitM攻击自动化
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_16
Martin Vondrácek, J. Pluskal, O. Ryšavý
{"title":"Automation of MitM Attack on Wi-Fi Networks","authors":"Martin Vondrácek, J. Pluskal, O. Ryšavý","doi":"10.1007/978-3-319-73697-6_16","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_16","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114797392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信