Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icdf2c/icdf2c2022.bht:"
@proceedings{DBLP:conf/icdf2c/2022, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-36574-4}, doi = {10.1007/978-3-031-36574-4}, isbn = {978-3-031-36573-7}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/BhattaraiVSKA22, author = {Abhishek Bhattarai and Maryna Veksler and Hadi Sahin and Ahmet Kurt and Kemal Akkaya}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Crypto Wallet Artifact Detection on Android Devices Using Advanced Machine Learning Techniques}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {111--132}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_7}, doi = {10.1007/978-3-031-36574-4\_7}, timestamp = {Mon, 17 Jul 2023 16:28:01 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/BhattaraiVSKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ChanYMLELRP22, author = {Raymond H. Chan and Wye Kaye Yan and Jung Man Ma and Kai Mun Loh and Greger Chen Zhi En and Malcolm Y. H. Low and Habib Rehman and Thong Chee Phua}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {{MQTT} Traffic Collection and Forensic Analysis Framework}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {185--202}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_11}, doi = {10.1007/978-3-031-36574-4\_11}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ChanYMLELRP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ChenCWYL22, author = {Jia Chen and Kunlin Chen and Yongjie Wang and Xuehu Yan and Longlong Li}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {A General Steganalysis Method of {QR} Codes}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {472--483}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_28}, doi = {10.1007/978-3-031-36574-4\_28}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ChenCWYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/DolejskaVPK22, author = {Daniel Dolejska and Vladim{\'{\i}}r Vesel{\'{y}} and Jan Pluskal and Michal Koutensk{\'{y}}}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Shedding Light on Monopoly: Temporal Analysis of Drug Trades}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {151--168}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_9}, doi = {10.1007/978-3-031-36574-4\_9}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/DolejskaVPK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/DuNG22, author = {Xiaoyu Du and Francis N. Nwebonyi and Pavel Gladyshev}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Automating the Flow of Data Between Digital Forensic Tools Using Apache NiFi}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {435--452}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_26}, doi = {10.1007/978-3-031-36574-4\_26}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/DuNG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/Guerra-Manzanares22, author = {Alejandro Guerra{-}Manzanares and Hayretdin Bahsi}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {On the Application of Active Learning to Handle Data Evolution in Android Malware Detection}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {256--273}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_15}, doi = {10.1007/978-3-031-36574-4\_15}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/Guerra-Manzanares22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/HuSCL22, author = {Zhiyuan Hu and Linghang Shi and Huijun Chen and Jinghui Lu}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process {(AHP)}}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {453--471}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_27}, doi = {10.1007/978-3-031-36574-4\_27}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/HuSCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JozaniZKDA22, author = {Mohsen M. Jozani and Gianluca Zanella and Maxium Khanov and Gokila Dorai and Esra Akbas}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {The Need for Biometric Anti-spoofing Policies: The Case of Etsy}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {295--306}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_17}, doi = {10.1007/978-3-031-36574-4\_17}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/JozaniZKDA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/KlierB22, author = {Samantha Klier and Harald Baier}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Towards Efficient On-Site {CSAM} Triage by Clustering Images from a Source Point of View}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {19--33}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_2}, doi = {10.1007/978-3-031-36574-4\_2}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/KlierB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LiGW22, author = {Yueqi Li and Sanjay Goel and Kevin J. Williams}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Are External Auditors Capable of Dealing with Cybersecurity Risks?}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {326--340}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_19}, doi = {10.1007/978-3-031-36574-4\_19}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LiGW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LiZLFLC22, author = {Chengjie Li and Yunchun Zhang and Zixuan Li and Fan Feng and Zikun Liao and Xiaohui Cui}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {The Lightweight Botnet Detection Model Based on the Improved UNet}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {241--255}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_14}, doi = {10.1007/978-3-031-36574-4\_14}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LiZLFLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LiuYWX22, author = {Qiuming Liu and Zhexin Yao and Zhen Wu and Zeyao Xu}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Attribute-Based Proxy Re-encryption with Privacy Protection for Message Dissemination in {VANET}}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {387--402}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_23}, doi = {10.1007/978-3-031-36574-4\_23}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LiuYWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MirsadeghiBI22, author = {Seyed Mohammad Hadi Mirsadeghi and Hayretdin Bahsi and Wissem Inbouli}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Deep Learning-Based Detection of Cyberattacks in Software-Defined Networks}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {341--354}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_20}, doi = {10.1007/978-3-031-36574-4\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/MirsadeghiBI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MoadineCB22, author = {Anass El Moadine and Gouenou Coatrieux and Reda Bellafqira}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Poisoning-Attack Detection Using an Auto-encoder for Deep Learning Models}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {368--384}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_22}, doi = {10.1007/978-3-031-36574-4\_22}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MoadineCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/MundtB22, author = {Michael Mundt and Harald Baier}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Cyber Crime Undermines Data Privacy Efforts - On the Balance Between Data Privacy and Security}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {417--434}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_25}, doi = {10.1007/978-3-031-36574-4\_25}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/MundtB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/NwebonyiDG22, author = {Francis N. Nwebonyi and Xiaoyu Du and Pavel Gladyshev}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Crime and Incident Watch for Smart Cities: {A} Sensor-Based Approach}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {222--238}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_13}, doi = {10.1007/978-3-031-36574-4\_13}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/NwebonyiDG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/RizviSM022, author = {Syed Rizvi and Mark Scanlon and Jimmy McGibney and John Sheppard}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {355--367}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_21}, doi = {10.1007/978-3-031-36574-4\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/RizviSM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ShengYLZ22, author = {Zhoushi Sheng and Bo Yu and Chen Liang and Yongyi Zhang}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {VPnet: {A} Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {307--325}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_18}, doi = {10.1007/978-3-031-36574-4\_18}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ShengYLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/StankovicK22, author = {Milos Stankovic and Tahir M. Khan}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Digital Forensics Tool Evaluation on Deleted Files}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {61--83}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_4}, doi = {10.1007/978-3-031-36574-4\_4}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/StankovicK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/VarshneyKHS22, author = {Rahul Varshney and Nitesh Kumar and Anand Handa and Sandeep Kumar Shukla}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Volatility Custom Profiling for Automated Hybrid {ELF} Malware Detection}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {274--291}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_16}, doi = {10.1007/978-3-031-36574-4\_16}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/VarshneyKHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/VekslerCA22, author = {Maryna Veksler and Clara Caspard and Kemal Akkaya}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {3--18}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_1}, doi = {10.1007/978-3-031-36574-4\_1}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/VekslerCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/XieWZSY22, author = {Jia{-}Hui Xie and Di Wu and Bo{-}Hao Zhang and Hai Su and Huan Yang}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Can Image Watermarking Efficiently Protect Deep-Learning-Based Image Classifiers? - {A} Preliminary Security Analysis of an IP-Protecting Method}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {34--57}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_3}, doi = {10.1007/978-3-031-36574-4\_3}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/XieWZSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/YangCL22, author = {Fan Yang and Hao Cheng and Shanxiang Lyu}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {169--182}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_10}, doi = {10.1007/978-3-031-36574-4\_10}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/YangCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/YaoTZFLS22, author = {Ruichu Yao and Kunsheng Tang and Yongshi Zhu and Bingbing Fan and Tian Luo and Yide Song}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {{PBPAFL:} {A} Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {403--416}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_24}, doi = {10.1007/978-3-031-36574-4\_24}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/YaoTZFLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ZengYWCLH22, author = {Yutong Zeng and Honghao Yu and Tiejun Wu and Yong Chen and Xing Lan and Cheng Huang}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {{CSCD:} {A} Cyber Security Community Detection Scheme on Online Social Networks}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {135--150}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_8}, doi = {10.1007/978-3-031-36574-4\_8}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ZengYWCLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ZhangZCZ22, author = {Ke Zhang and Guanghua Zhang and Zhenguo Chen and Xiaojun Zuo}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {IoT Malicious Traffic Detection Based on {FSKDE} and Federated DIOT-Pysyft}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {203--221}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_12}, doi = {10.1007/978-3-031-36574-4\_12}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ZhangZCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ZhouK22, author = {Jiaxuan Zhou and Umit Karabiyik}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Forensic Analysis of Webex on the iOS Platform}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {84--96}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_5}, doi = {10.1007/978-3-031-36574-4\_5}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ZhouK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/ZhouK22a, author = {Jiaxuan Zhou and Umit Karabiyik}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {97--110}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_6}, doi = {10.1007/978-3-031-36574-4\_6}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/ZhouK22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.