{"title":"AndroParse - An Android Feature Extraction Framework and Dataset","authors":"R. Schmicker, Frank Breitinger, I. Baggili","doi":"10.1007/978-3-030-05487-8_4","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_4","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122115259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Digital Forensic Investigation and Verification Model for Industrial Espionage","authors":"Jieun Dokko, M. Shin","doi":"10.1007/978-3-030-05487-8_7","DOIUrl":"https://doi.org/10.1007/978-3-030-05487-8_7","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122311652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peter Kieseberg, S. Neuner, S. Schrittwieser, Martin Schmiedecker, E. Weippl
{"title":"Real-Time Forensics Through Endpoint Visibility","authors":"Peter Kieseberg, S. Neuner, S. Schrittwieser, Martin Schmiedecker, E. Weippl","doi":"10.1007/978-3-319-73697-6_2","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_2","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126122492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ming Xu, Jinkai Sun, Ning Zheng, T. Qiao, Yiming Wu, Kai Shi, Haidong Ge, Tao Yang
{"title":"A Novel File Carving Algorithm for EVTX Logs","authors":"Ming Xu, Jinkai Sun, Ning Zheng, T. Qiao, Yiming Wu, Kai Shi, Haidong Ge, Tao Yang","doi":"10.1007/978-3-319-73697-6_7","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_7","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128161771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dominik Ernsberger, A. Ikuesan, H. Venter, A. Zugenmaier
{"title":"A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness","authors":"Dominik Ernsberger, A. Ikuesan, H. Venter, A. Zugenmaier","doi":"10.1007/978-3-319-73697-6_5","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_5","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132618572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approxis: A Fast, Robust, Lightweight and Approximate Disassembler Considered in the Field of Memory Forensics","authors":"Lorenz Liebler, Harald Baier","doi":"10.1007/978-3-319-73697-6_12","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_12","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132043553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding and Rating Personal Names on Drives for Forensic Needs","authors":"N. Rowe","doi":"10.1007/978-3-319-73697-6_4","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_4","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114461162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automation of MitM Attack on Wi-Fi Networks","authors":"Martin Vondrácek, J. Pluskal, O. Ryšavý","doi":"10.1007/978-3-319-73697-6_16","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_16","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114797392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}