001471845 000__ 06005cam\\22006737i\4500 001471845 001__ 1471845 001471845 003__ OCoLC 001471845 005__ 20230908003317.0 001471845 006__ m\\\\\o\\d\\\\\\\\ 001471845 007__ cr\cn\nnnunnun 001471845 008__ 230718s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001471845 020__ $$a9783031365744$$qelectronic book 001471845 020__ $$a3031365747$$qelectronic book 001471845 020__ $$z9783031365737 001471845 0247_ $$a10.1007/978-3-031-36574-4$$2doi 001471845 035__ $$aSP(OCoLC)1390715703 001471845 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dYDX$$dOCLCQ 001471845 049__ $$aISEA 001471845 050_4 $$aHV8079.C65$$bI58 2022 001471845 08204 $$a363.25/968$$223/eng/20230718 001471845 1112_ $$aInternational Conference on Digital Forensics and Cyber Crime$$n(13th :$$d2022 :$$cBoston, Mass.) 001471845 24510 $$aDigital forensics and cyber crime :$$b13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings /$$cSanjay Goel, Pavel Gladyshev, Akatyev Nikolay, George Markowsky, Daryl Johnson, editors. 001471845 2463_ $$aICDF2C 2022 001471845 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2023] 001471845 300__ $$a1 online resource (xiii, 486 pages) :$$billustrations (some color). 001471845 336__ $$atext$$btxt$$2rdacontent 001471845 337__ $$acomputer$$bc$$2rdamedia 001471845 338__ $$aonline resource$$bcr$$2rdacarrier 001471845 4901_ $$aLecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$$x1867-822X ;$$v508 001471845 500__ $$aIncludes author index. 001471845 5050_ $$aImage Forensics -- Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification -- Towards efficient on-site CSAM triage by clustering images from a source point of view -- Can Image Watermarking Efficiently Protect DeepLearning-Based Image Classifiers? - A Preliminary Security Analysis of an IP-Protecting Method -- Forensics Analysis -- Digital Forensics Tool Evaluation on Deleted Files -- Forensic Analysis of Webex on the iOS Platform -- Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android -- Crypto Wallet Artifact Detection on Android Devices using Advanced Machine Learning Techniques -- SPREAD SPECTRUM ANALYSIS -- CSCD: A Cyber Security Community Detection Scheme on Online Social Networks -- Shedding Light on Monopoly: Temporal Analysis of Drug Trades -- Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding -- TRAFFIC ANALYSIS AND MONITORING -- MQTT Traffic Collection and Forensic Analysis Framework -- IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft -- Crime and Incident Watch for Smart Cities: A Sensor-Based Approach -- Malware Analysis -- The Lightweight Botnet Detection Model Based on the Improved UNet -- On the application of active learning to handle data evolution in Android malware detection -- Volatility Custom Profiling for Automated Hybrid ELF Malware Detection -- Security Risk Management -- The Need for Biometric Anti-Spoofing Policies: The Case of Etsy -- VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning -- Are External Auditors Capable of Dealing with Cybersecurity Risks? -- Deep Learning-based Detection of Cyberattacks in Software-Defined Networks -- Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments -- Poisoning-Attack Detection using an Auto-Encoder for Deep Learning Models -- PRIVACY AND SECURITY -- Attribute-based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET -- PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data -- Cyber Crime undermines Data Privacy efforts - On the Balance between Data Privacy and Security -- Automating the Flow of Data Between Digital Forensic Tools using Apache NiFi -- Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP) -- A General Steganalysis Method of QR Codes. 001471845 506__ $$aAccess limited to authorized users. 001471845 520__ $$aThis book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022. The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security. 001471845 588__ $$aDescription based on online resource; title from digital title page (viewed on August 21, 2023). 001471845 650_0 $$aComputer crimes$$xInvestigation$$vCongresses. 001471845 650_0 $$aComputer crimes$$vCongresses. 001471845 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001471845 650_0 $$aComputer networks$$xAccess control$$vCongresses. 001471845 655_0 $$aElectronic books. 001471845 7001_ $$aGoel, Sanjay$$c(Of University of Albany, SUNY),$$eeditor. 001471845 7001_ $$aGladyshev, Pavel,$$eeditor. 001471845 7001_ $$aNikolay, Akatyev,$$eeditor. 001471845 7001_ $$aMarkowsky, George,$$eeditor. 001471845 7001_ $$aJohnson, Daryl,$$eeditor. 001471845 830_0 $$aLecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;$$v508.$$x1867-822X 001471845 852__ $$bebk 001471845 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-36574-4$$zOnline Access$$91397441.1 001471845 909CO $$ooai:library.usi.edu:1471845$$pGLOBAL_SET 001471845 980__ $$aBIB 001471845 980__ $$aEBOOK 001471845 982__ $$aEbook 001471845 983__ $$aOnline 001471845 994__ $$a92$$bISE