International ICST Conference on Digital Forensics & Cyber Crime最新文献

筛选
英文 中文
Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features 基于子块特征的数字视频帧重复类型伪造检测
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2015-10-06 DOI: 10.1007/978-3-319-25512-5_3
V. Singh, P. Pant, R. Tripathi
{"title":"Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features","authors":"V. Singh, P. Pant, R. Tripathi","doi":"10.1007/978-3-319-25512-5_3","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_3","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116292656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Advanced Techniques for Reconstruction of Incomplete Network Data 不完全网络数据重构的先进技术
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2015-10-06 DOI: 10.1007/978-3-319-25512-5_6
P. Matoušek, J. Pluskal, O. Ryšavý, V. Veselý, M. Kmet, F. Karpísek, Martin Vymlátil
{"title":"Advanced Techniques for Reconstruction of Incomplete Network Data","authors":"P. Matoušek, J. Pluskal, O. Ryšavý, V. Veselý, M. Kmet, F. Karpísek, Martin Vymlátil","doi":"10.1007/978-3-319-25512-5_6","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_6","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Analysis of the HIKVISION DVR File System 海康威视DVR文件系统分析
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2015-10-06 DOI: 10.1007/978-3-319-25512-5_13
Jaehyeok Han, Doowon Jeong, Sangjin Lee
{"title":"Analysis of the HIKVISION DVR File System","authors":"Jaehyeok Han, Doowon Jeong, Sangjin Lee","doi":"10.1007/978-3-319-25512-5_13","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_13","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123893578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Digital Forensics Education: A Multidisciplinary Curriculum Model 数字法医教育:多学科课程模式
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2015-10-06 DOI: 10.1007/978-3-319-25512-5_1
I. Palmer, E. Wood, Stefan Nagy, Gabriela García, Masooda N. Bashir, Roy H. Campbell
{"title":"Digital Forensics Education: A Multidisciplinary Curriculum Model","authors":"I. Palmer, E. Wood, Stefan Nagy, Gabriela García, Masooda N. Bashir, Roy H. Campbell","doi":"10.1007/978-3-319-25512-5_1","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_1","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126205923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Exploring the Effectiveness of Digital Forensics Tools on the Sony PlayStation Vita 探索索尼PlayStation Vita上数字取证工具的有效性
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2015-10-06 DOI: 10.1007/978-3-319-25512-5_14
Karolina Alvarez, Masooda N. Bashir
{"title":"Exploring the Effectiveness of Digital Forensics Tools on the Sony PlayStation Vita","authors":"Karolina Alvarez, Masooda N. Bashir","doi":"10.1007/978-3-319-25512-5_14","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_14","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility 法医分析和远程证据恢复:一个开源的分散文件同步工具
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2015-10-06 DOI: 10.1007/978-3-319-25512-5_7
Conor Quinn, M. Scanlon, Jason Farina, Mohand Tahar Kechadi
{"title":"Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility","authors":"Conor Quinn, M. Scanlon, Jason Farina, Mohand Tahar Kechadi","doi":"10.1007/978-3-319-25512-5_7","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_7","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Survey of International Cooperation in Digital Investigations 数字调查中的国际合作调查
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2015-10-06 DOI: 10.1007/978-3-319-25512-5_8
Joshua James, P. Gladyshev
{"title":"A Survey of International Cooperation in Digital Investigations","authors":"Joshua James, P. Gladyshev","doi":"10.1007/978-3-319-25512-5_8","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_8","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129377966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting 智能手机验证和用户配置文件链接跨社交网络摄像头指纹
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2015-10-06 DOI: 10.1007/978-3-319-25512-5_12
Flavio Bertini, Rajesh Sharma, A. Ianni, D. Montesi
{"title":"Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting","authors":"Flavio Bertini, Rajesh Sharma, A. Ianni, D. Montesi","doi":"10.1007/978-3-319-25512-5_12","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_12","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128748096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
How Cuckoo Filter Can Improve Existing Approximate Matching Techniques 杜鹃滤波器如何改进现有的近似匹配技术
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2015-10-06 DOI: 10.1007/978-3-319-25512-5_4
Vikas Gupta, Frank Breitinger
{"title":"How Cuckoo Filter Can Improve Existing Approximate Matching Techniques","authors":"Vikas Gupta, Frank Breitinger","doi":"10.1007/978-3-319-25512-5_4","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_4","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125744944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-psychological and Communication Perspectives 彭德龙网络威胁的解释性案例研究:社会心理学和传播视角
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2015-10-06 DOI: 10.1007/978-3-319-25512-5_11
Kathryn C. Seigfried-Spellar, Ben M. Flores, Darrin J. Griffin
{"title":"Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-psychological and Communication Perspectives","authors":"Kathryn C. Seigfried-Spellar, Ben M. Flores, Darrin J. Griffin","doi":"10.1007/978-3-319-25512-5_11","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_11","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124520106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信