International ICST Conference on Digital Forensics & Cyber Crime最新文献

筛选
英文 中文
Open Source Forensics for a Multi-platform Drone System 多平台无人机系统的开源取证
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_6
Thomas Edward Allen Barton, M. A. Hannan Bin Azhar
{"title":"Open Source Forensics for a Multi-platform Drone System","authors":"Thomas Edward Allen Barton, M. A. Hannan Bin Azhar","doi":"10.1007/978-3-319-73697-6_6","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_6","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122806407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An Overview of the Usage of Default Passwords 默认密码用法概述
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_15
Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, I. Baggili
{"title":"An Overview of the Usage of Default Passwords","authors":"Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, I. Baggili","doi":"10.1007/978-3-319-73697-6_15","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_15","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129492472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets 芫荽:生成逼真的Android数字证据数据集的工具集
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_18
Irvin Homem
{"title":"Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets","authors":"Irvin Homem","doi":"10.1007/978-3-319-73697-6_18","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_18","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134437830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud FindEvasion:一个有效的云环境敏感恶意软件检测系统
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_1
Xiaoqi Jia, Guangzhe Zhou, Qingjia Huang, Weijuan Zhang, Donghai Tian
{"title":"FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud","authors":"Xiaoqi Jia, Guangzhe Zhou, Qingjia Huang, Weijuan Zhang, Donghai Tian","doi":"10.1007/978-3-319-73697-6_1","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_1","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"15 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127516065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees 基于分层布隆滤波树的MRSH-v2近似匹配研究
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_11
David Lillis, Frank Breitinger, M. Scanlon
{"title":"Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees","authors":"David Lillis, Frank Breitinger, M. Scanlon","doi":"10.1007/978-3-319-73697-6_11","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_11","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122419260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph 一种基于属性导向归纳的频繁项挖掘和超图的网络取证可视化方案
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_10
Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu
{"title":"A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph","authors":"Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu","doi":"10.1007/978-3-319-73697-6_10","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_10","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134473027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power Sector 关键基础设施中的数字取证准备:电力行业变电站自动化案例
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_9
Asif Iqbal, M. Ekstedt, Hanan Alobaidli
{"title":"Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power Sector","authors":"Asif Iqbal, M. Ekstedt, Hanan Alobaidli","doi":"10.1007/978-3-319-73697-6_9","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_9","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124850329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On Locky Ransomware, Al Capone and Brexit 关于洛基勒索软件、阿尔·卡彭和英国脱欧
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_3
J. Macrae, V. N. Franqueira
{"title":"On Locky Ransomware, Al Capone and Brexit","authors":"J. Macrae, V. N. Franqueira","doi":"10.1007/978-3-319-73697-6_3","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_3","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121192271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Memory Forensics and the Macintosh OS X Operating System 内存取证和Macintosh OS X操作系统
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_13
Charles B. Leopard, N. Rowe, Michael McCarrin
{"title":"Memory Forensics and the Macintosh OS X Operating System","authors":"Charles B. Leopard, N. Rowe, Michael McCarrin","doi":"10.1007/978-3-319-73697-6_13","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_13","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126181132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic Evidence 基于模糊系统的移动取证可疑模式检测
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2017-10-09 DOI: 10.1007/978-3-319-73697-6_8
Konstantia Barmpatsalou, T. Cruz, E. Monteiro, P. Simões
{"title":"Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic Evidence","authors":"Konstantia Barmpatsalou, T. Cruz, E. Monteiro, P. Simões","doi":"10.1007/978-3-319-73697-6_8","DOIUrl":"https://doi.org/10.1007/978-3-319-73697-6_8","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128182189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信