Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Sanjay Goel, Pavel Gladyshev, Akatyev Nikolay, George Markowsky, Daryl Johnson (eds.) |
Digital Forensics and Cyber Crime - 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings |
ICDF2C |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Mohsen M. Jozani, Gianluca Zanella, Maxium Khanov, Gokila Dorai, Esra Akbas |
The Need for Biometric Anti-spoofing Policies: The Case of Etsy. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Milos Stankovic, Tahir M. Khan |
Digital Forensics Tool Evaluation on Deleted Files. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Raymond H. Chan, Wye Kaye Yan, Jung Man Ma, Kai Mun Loh, Greger Chen Zhi En, Malcolm Y. H. Low, Habib Rehman, Thong Chee Phua |
MQTT Traffic Collection and Forensic Analysis Framework. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Maryna Veksler, Clara Caspard, Kemal Akkaya |
Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Samantha Klier, Harald Baier |
Towards Efficient On-Site CSAM Triage by Clustering Images from a Source Point of View. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Fan Yang, Hao Cheng, Shanxiang Lyu |
Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jia Chen, Kunlin Chen, Yongjie Wang, Xuehu Yan, Longlong Li |
A General Steganalysis Method of QR Codes. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Michael Mundt, Harald Baier |
Cyber Crime Undermines Data Privacy Efforts - On the Balance Between Data Privacy and Security. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ruichu Yao, Kunsheng Tang, Yongshi Zhu, Bingbing Fan, Tian Luo, Yide Song |
PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Zhiyuan Hu, Linghang Shi, Huijun Chen, Jinghui Lu |
Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP). |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yutong Zeng, Honghao Yu, Tiejun Wu, Yong Chen, Xing Lan, Cheng Huang |
CSCD: A Cyber Security Community Detection Scheme on Online Social Networks. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0002, Mark Scanlon, Jimmy McGibney, John Sheppard 0002 |
Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Dolejska, Vladimír Veselý, Jan Pluskal, Michal Koutenský |
Shedding Light on Monopoly: Temporal Analysis of Drug Trades. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jiaxuan Zhou, Umit Karabiyik |
Forensic Analysis of Webex on the iOS Platform. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Francis N. Nwebonyi, Xiaoyu Du, Pavel Gladyshev |
Crime and Incident Watch for Smart Cities: A Sensor-Based Approach. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyu Du, Francis N. Nwebonyi, Pavel Gladyshev |
Automating the Flow of Data Between Digital Forensic Tools Using Apache NiFi. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jiaxuan Zhou, Umit Karabiyik |
Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Alejandro Guerra-Manzanares, Hayretdin Bahsi |
On the Application of Active Learning to Handle Data Evolution in Android Malware Detection. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Seyed Mohammad Hadi Mirsadeghi, Hayretdin Bahsi, Wissem Inbouli |
Deep Learning-Based Detection of Cyberattacks in Software-Defined Networks. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ke Zhang, Guanghua Zhang, Zhenguo Chen, Xiaojun Zuo |
IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Pavel Gladyshev, Sanjay Goel, Joshua James, George Markowsky, Daryl Johnson (eds.) |
Digital Forensics and Cyber Crime - 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Qiuming Liu, Zhexin Yao, Zhen Wu, Zeyao Xu |
Attribute-Based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Anass El Moadine, Gouenou Coatrieux, Reda Bellafqira |
Poisoning-Attack Detection Using an Auto-encoder for Deep Learning Models. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Zhoushi Sheng, Bo Yu, Chen Liang, Yongyi Zhang |
VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jia-Hui Xie, Di Wu, Bo-Hao Zhang, Hai Su, Huan Yang |
Can Image Watermarking Efficiently Protect Deep-Learning-Based Image Classifiers? - A Preliminary Security Analysis of an IP-Protecting Method. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Chengjie Li, Yunchun Zhang, Zixuan Li, Fan Feng, Zikun Liao, Xiaohui Cui |
The Lightweight Botnet Detection Model Based on the Improved UNet. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Abhishek Bhattarai, Maryna Veksler, Hadi Sahin, Ahmet Kurt, Kemal Akkaya |
Crypto Wallet Artifact Detection on Android Devices Using Advanced Machine Learning Techniques. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yueqi Li, Sanjay Goel, Kevin J. Williams |
Are External Auditors Capable of Dealing with Cybersecurity Risks? |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Rahul Varshney, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla |
Volatility Custom Profiling for Automated Hybrid ELF Malware Detection. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Anthony Cheuk Tung Lai, Ken Wai Kin Wong, Johnny Tsz Wun Wong, Austin Tsz Wai Lau, Alan Po Lun Ho, Shuai Wang, Jogesh Muppala |
Backdoor Investigation and Incident Response: From Zero to Profit. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | M. A. Hannan Bin Azhar, Jake Timms, Benjamin Tilley |
Forensic Investigations of Google Meet and Microsoft Teams - Two Popular Conferencing Tools in the Pandemic. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Michael Mundt, Harald Baier |
Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK Framework. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyi Duan, You Li, Chengyuan Liu, Xiuying Li, Wenfeng Liu, Guoqian Li |
Research on the Method of Selecting the Optimal Feature Subset in Big Data for Energy Analysis Attack. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Charles A. Kamhoua |
Lightweight On-Demand Honeypot Deployment for Cyber Deception. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Mühle, Andreas Grüner, Christoph Meinel |
Gotta Catch'em All! Improving P2P Network Crawling Strategies. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Tiffanie Edwards, Syria McCullough, Mohamed Nassar 0001, Ibrahim M. Baggili |
On Exploring the Sub-domain of Artificial Intelligence (AI) Model Forensics. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Richard Buurke, Nhien-An Le-Khac |
Accessing Secure Data on Android Through Application Analysis. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyu Cao, Neil Zhenqiang Gong |
Understanding the Security of Deepfake Detection. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Zhenzhen Zhang, Henan Shi, Xinghao Jiang, Zhaohong Li, Jindou Liu |
A CNN-Based HEVC Video Steganalysis Against DCT/DST-Based Steganography. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Miguel Martín-Pérez, Ricardo J. Rodríguez |
Quantifying Paging on Recoverable Data from Windows User-Space Modules. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Elizabeth Wyss, Drew Davidson |
Parcae: A Blockchain-Based PRF Service for Everyone. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Sanjay Goel, Pavel Gladyshev, Daryl Johnson, Makan Pourzandi, Suryadipta Majumdar (eds.) |
Digital Forensics and Cyber Crime - 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Zhenzhou Tian, Hengchao Mao, Yaqian Huang, Jie Tian, Jinrui Li |
Fine-Grained Obfuscation Scheme Recognition on Binary Code. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Göbel, Frieder Uhlig, Harald Baier |
Find My IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Haoran Ou, Yongyan Guo, Chaoyi Huang, Zhiying Zhao, Wenbo Guo 0011, Yong Fang 0002, Cheng Huang 0003 |
No Pie in the Sky: The Digital Currency Fraud Website Detection. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Fatima-Zahra Boujdad, David Niyitegeka, Reda Bellafqira, Gouenou Coatrieux, Emmanuelle Génin, Mario Südholt |
A Hybrid Cloud Deployment Architecture for Privacy-Preserving Collaborative Genome-Wide Association Studies. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Aikaterini Kanta, Iwen Coisel, Mark Scanlon |
PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Mahr, Robert Serafin, Cinthya Grajeda, Ibrahim M. Baggili |
Auto-Parser: Android Auto and Apple CarPlay Forensics. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Na Li, Haoyu Zhang, Zhihui Hu, Guang Kou, Huadong Dai |
Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Kong Huang, Ke Zhang, Jiongyi Chen, Menghan Sun, Wei Sun, Di Tang, Kehuan Zhang |
Understanding the Brains and Brawn of Illicit Streaming App. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Max Kilger, Kim-Kwang Raymond Choo |
Do Dark Web and Cryptocurrencies Empower Cybercriminals? |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Weicong Huang, Qisheng Guang, Dong Jiang, Lijun Chen 0006 |
Cheating Sensitive Security Quantum Bit Commitment with Security Distance Function. |
ICDF2C |
2021 |
DBLP DOI BibTeX RDF |
|
1 | François Bouchaud, Thomas Vantroys, Gilles Grimaud |
Evidence Gathering in IoT Criminal Investigation. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Todd Bromley, John Sheppard 0002, Mark Scanlon, Nhien-An Le-Khac |
Retracing the Flow of the Stream: Investigating Kodi Streaming Services. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Gengqian Zhou, Jianwei Zhuge |
Adapting to Local Conditions: Similarities and Differences in Anonymous Online Market Between Chinese and English Speaking Communities. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Marcel Busch, Florian Nicolai, Fabian Fleischer, Christian Rückert, Christoph Safferling, Felix C. Freiling |
Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tobias Latzo |
Efficient Fingerprint Matching for Forensic Event Reconstruction. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Edgar Padilla, Jaime C. Acosta, Christopher D. Kiekintveld |
Cybersecurity Methodology for Specialized Behavior Analysis. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Pasquale Ferrara, Gerard Draper-Gil, Ignacio Sanchez, Henrik Junklewitz, Laurent Beslay |
Modelling GOP Structure Effects on ENF-Based Video Forensics. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Lukas Bortnik, Arturs Lavrenovs |
Android Dumpsys Analysis to Indicate Driver Distraction. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | John Sheppard 0002 |
A Partial Approach to Intrusion Detection. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jiaqi Shi, Gang Wang, Ming Su, Xiaoguang Liu |
Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Zhongmin Wang, Zhen Feng, Zhenzhou Tian |
Neural Representation Learning Based Binary Code Authorship Attribution. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tom Van der Mussele, Babak Habibnia, Pavel Gladyshev |
Remote Air-Gap Live Forensics. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Marian Waltereit, Maximilian Uphoff, Peter Zdankin, Viktor Matkovic, Torben Weis |
A Digital Forensic Approach for Optimizing the Investigation of Hit-and-Run Accidents. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jieun Dokko, Michael Shin, Soo Young Park |
An Intelligence Criminal Tracker for Industrial Espionage - Applying Digital Data Acquired Onsite to Target Criminals. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Petr Matousek, Ivana Burgetova, Ondrej Rysavý, Malombe Victor |
On Reliability of JA3 Hashes for Fingerprinting Mobile Applications. |
ICDF2C |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Frank Breitinger, Ibrahim M. Baggili (eds.) |
Digital Forensics and Cyber Crime - 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings |
ICDF2C |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Neil C. Rowe |
Associating Drives Based on Their Artifact and Metadata Distributions. |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | John Vieyra, Mark Scanlon, Nhien-An Le-Khac |
Solid State Drive Forensics: Where Do We Stand? |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Daniel J. Schelkoph, Gilbert L. Peterson, James S. Okolica |
Digital Forensics Event Graph Reconstruction. |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Robert Schmicker, Frank Breitinger, Ibrahim M. Baggili |
AndroParse - An Android Feature Extraction Framework and Dataset. |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hassan Hadi Latheeth Al-Maksousy, Michele C. Weigle |
Hybrid Intrusion Detection System for Worm Attacks Based on Their Network Behavior. |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jaryn Shen, Kim-Kwang Raymond Choo, Qingkai Zeng 0002 |
Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attacks. |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jieun Dokko, Michael Shin |
A Digital Forensic Investigation and Verification Model for Industrial Espionage. |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Petr Matousek, Martin Schmiedecker (eds.) |
Digital Forensics and Cyber Crime - 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Avinash Singh, Adeyemi R. Ikuesan, Hein S. Venter |
Digital Forensic Readiness Framework for Ransomware Investigation. |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Raquel Tabuyo-Benito, Hayretdin Bahsi, Pedro Peris-Lopez |
Forensics Analysis of an On-line Game over Steam Platform. |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Trevor Haigh, Frank Breitinger, Ibrahim M. Baggili |
If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept. |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Lorenz Liebler, Harald Baier |
On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving. |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Göbel, Harald Baier |
fishy - A Framework for Implementing Filesystem-Based Data Hiding Techniques. |
ICDF2C |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoqi Jia, Guangzhe Zhou, Qingjia Huang, Weijuan Zhang, Donghai Tian |
FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu 0020, Kunying Liu, Min Yu 0001 |
A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Irvin Homem |
Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | David Lillis, Frank Breitinger, Mark Scanlon |
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Dominik Ernsberger, Adeyemi Richard Ikuesan, Hein S. Venter, Alf Zugenmaier |
A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Asif Iqbal 0012, Mathias Ekstedt, Hanan Alobaidli |
Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power Sector. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim M. Baggili |
An Overview of the Usage of Default Passwords. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Charles B. Leopard, Neil C. Rowe, Michael R. McCarrin |
Memory Forensics and the Macintosh OS X Operating System. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pu Ren, Mingquan Zhou, Jin Liu, Yachun Fan, Wenshuo Zhao, Wuyang Shui |
Sketch-Based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Konstantia Barmpatsalou, Tiago Cruz 0001, Edmundo Monteiro, Paulo Simões 0001 |
Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic Evidence. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Edward Allen Barton, M. A. Hannan Bin Azhar |
Open Source Forensics for a Multi-platform Drone System. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lorenz Liebler, Harald Baier |
Approxis: A Fast, Robust, Lightweight and Approximate Disassembler Considered in the Field of Memory Forensics. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | John MacRae, Virginia N. L. Franqueira |
On Locky Ransomware, Al Capone and Brexit. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Peter Kieseberg, Sebastian Neuner, Sebastian Schrittwieser, Martin Schmiedecker, Edgar R. Weippl |
Real-Time Forensics Through Endpoint Visibility. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Martin Vondrácek, Jan Pluskal, Ondrej Rysavý |
Automation of MitM Attack on Wi-Fi Networks. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu |
SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ming Xu 0001, Jinkai Sun, Ning Zheng 0001, Tong Qiao, Yiming Wu 0001, Kai Shi, Haidong Ge, Tao Yang |
A Novel File Carving Algorithm for EVTX Logs. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Neil C. Rowe |
Finding and Rating Personal Names on Drives for Forensic Needs. |
ICDF2C |
2017 |
DBLP DOI BibTeX RDF |
|