


default search action
20th ARES 2025: Ghent, Belgium - Workshops Part III
- Bart Coppens

, Bruno Volckaert
, Vincent Naessens
, Bjorn De Sutter
:
Availability, Reliability and Security - ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part III. Lecture Notes in Computer Science 15996, Springer 2025, ISBN 978-3-032-00637-0
Proceedings of the Eighteenth International Workshop on Digital Forensics (WSDF 2025)
- Patrício Domingues

, Miguel Frade
, Miguel Negrão:
Forensic Insights into Windows 11's Capability Access Manager Artifacts. 5-22 - Axel Mahr

, Jan-Niclas Hilgert, Martin Lambertz
:
Reconstructing File Versions and Timestamps: Challenges and Guidelines in Network Forensics. 23-41 - Aikaterini Kanta

, Christopher Hargreaves:
Measuring the Effectiveness of Keyword Lists in Digital Forensics. 42-59 - Trevor T. Spinosa, Abdur Rahman Onik, Joshua Rovira, Ibrahim Baggili:

Money on My Mind: Forensic Investigation of Venmo Payment App. 60-77 - Christopher Hargreaves, Dan Drury:

Forensic Analysis of AI Applications - A Replika "AI Companion" Example. 78-95 - Syed Rizvi

, Mark Scanlon
, Jimmy McGibney
, John Sheppard
:
An AI-Based Network Forensic Readiness Framework for Resource-Constrained Environments. 96-112 - Gokila Dorai

, Pouria Rad
, Frank Breitinger
, Rajon Bardhan, Vijayalakshmi Ramasamy
:
Mapping the Research Landscape - An Exploratory Analysis of AI Applications in Digital Forensics. 113-130 - Zuzana Hennelová

, Eva Marková
, Pavol Sokol
:
The Impact of Anti-forensic Techniques on Data-Driven Digital Forensics: Anomaly Detection Case Study. 131-148
Proceedings of the Fourteenth International Workshop on Cyber Crime (IWCC 2025)
- Stefano Bistarelli

, Francesco Santini
, Edoardo Toma Tavassi:
Generating Deepfakes with Stable Diffusion, ControlNet, and LoRA. 153-170 - York Yannikos

, Marc Leon Agel, Julian Heeger
, Lukas Graner
, Martin Steinebach
:
Towards Creating a Darknet Image Database. 171-186 - Christos Karapapas

, Iakovos Pittaras
, George C. Polyzos
, Constantinos Patsakis
:
Hello, Won't You Tell Me Your Name?: Investigating Anonymity Abuse in IPFS. 187-204 - Rafal Kozik, Piotr Gocal, Michal Choras:

Countering Financial Cyber Crime: New Method for Subsequent Steps Analysis in Large Complex Graphs of Financial Transactions. 205-220 - Julia Kramer, Anne Streicher, Marcus Niemietz

:
From Sign-Up to Multi-million Revenues: A Deep Dive Into Vendors on Darknet Marketplaces. 221-238
Proceedings of the Ninth International Workshop on Cyber Use of Information Hiding (CUING 2025)
- Katsuyuki Umezawa

, Toshikatsu Kashima, Sven Wohlgemuth, Kazuo Takaragi:
Contextual Coherence Evaluation of Perfectly Secure Steganography in Text Documents. 243-254 - Martin Steinebach

, York Yannikos
:
Robust Hashing Meets Inpainting. 255-270 - Steffen Wendzel

, Christian Krätzer
, Jana Dittmann, Luca Caviglione
, Aleksandra Mileva
, Tobias Schmidbauer
, Claus Vielhauer, Sebastian Zander
:
Combining Different Existing Methods for Describing Steganography Hiding Methods. 271-289 - Daniel Lerch-Hostalot

, Jordi Puiggali
, David Megías
:
Calyptography: Secure Secret Storage Inspired by Cryptography and Steganography. 290-308 - Tanya Koohpayeh Araghi

, David Megías
:
An Independent Secure Authentication System Against False Positive/Negative Attacks in SVD-Based Watermarking: Design and Implementation. 309-326 - Pawel Rajba

, Jörg Keller
, Wojciech Mazurczyk
:
Entropy-Aware Secret Data Embedding for Network Storage Channels. 327-345 - Farzana Kabir

, Krzysztof Cabaj
, Tanya Koohpayeh Araghi
, David Megías
:
ReWaP: Reversible Watermarking and Paillier Encryption Approach for Privacy-Preserving Smart Meter. 346-363

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














