Search dblp for Publications

export results for "toc:db/conf/icdf2c/icdf2c2022.bht:"

 download as .bib file

@proceedings{DBLP:conf/icdf2c/2022,
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-36574-4},
  doi          = {10.1007/978-3-031-36574-4},
  isbn         = {978-3-031-36573-7},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BhattaraiVSKA22,
  author       = {Abhishek Bhattarai and
                  Maryna Veksler and
                  Hadi Sahin and
                  Ahmet Kurt and
                  Kemal Akkaya},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Crypto Wallet Artifact Detection on Android Devices Using Advanced
                  Machine Learning Techniques},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {111--132},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_7},
  doi          = {10.1007/978-3-031-36574-4\_7},
  timestamp    = {Mon, 17 Jul 2023 16:28:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BhattaraiVSKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ChanYMLELRP22,
  author       = {Raymond H. Chan and
                  Wye Kaye Yan and
                  Jung Man Ma and
                  Kai Mun Loh and
                  Greger Chen Zhi En and
                  Malcolm Y. H. Low and
                  Habib Rehman and
                  Thong Chee Phua},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {{MQTT} Traffic Collection and Forensic Analysis Framework},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {185--202},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_11},
  doi          = {10.1007/978-3-031-36574-4\_11},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ChanYMLELRP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ChenCWYL22,
  author       = {Jia Chen and
                  Kunlin Chen and
                  Yongjie Wang and
                  Xuehu Yan and
                  Longlong Li},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {A General Steganalysis Method of {QR} Codes},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {472--483},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_28},
  doi          = {10.1007/978-3-031-36574-4\_28},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ChenCWYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/DolejskaVPK22,
  author       = {Daniel Dolejska and
                  Vladim{\'{\i}}r Vesel{\'{y}} and
                  Jan Pluskal and
                  Michal Koutensk{\'{y}}},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Shedding Light on Monopoly: Temporal Analysis of Drug Trades},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {151--168},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_9},
  doi          = {10.1007/978-3-031-36574-4\_9},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/DolejskaVPK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/DuNG22,
  author       = {Xiaoyu Du and
                  Francis N. Nwebonyi and
                  Pavel Gladyshev},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Automating the Flow of Data Between Digital Forensic Tools Using Apache
                  NiFi},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {435--452},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_26},
  doi          = {10.1007/978-3-031-36574-4\_26},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/DuNG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Guerra-Manzanares22,
  author       = {Alejandro Guerra{-}Manzanares and
                  Hayretdin Bahsi},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {On the Application of Active Learning to Handle Data Evolution in
                  Android Malware Detection},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {256--273},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_15},
  doi          = {10.1007/978-3-031-36574-4\_15},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Guerra-Manzanares22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HuSCL22,
  author       = {Zhiyuan Hu and
                  Linghang Shi and
                  Huijun Chen and
                  Jinghui Lu},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Android Mobile Terminal Security Assessment Based on Analytical Hierarchy
                  Process {(AHP)}},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {453--471},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_27},
  doi          = {10.1007/978-3-031-36574-4\_27},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HuSCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/JozaniZKDA22,
  author       = {Mohsen M. Jozani and
                  Gianluca Zanella and
                  Maxium Khanov and
                  Gokila Dorai and
                  Esra Akbas},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {The Need for Biometric Anti-spoofing Policies: The Case of Etsy},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {295--306},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_17},
  doi          = {10.1007/978-3-031-36574-4\_17},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/JozaniZKDA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/KlierB22,
  author       = {Samantha Klier and
                  Harald Baier},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Towards Efficient On-Site {CSAM} Triage by Clustering Images from
                  a Source Point of View},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_2},
  doi          = {10.1007/978-3-031-36574-4\_2},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/KlierB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LiGW22,
  author       = {Yueqi Li and
                  Sanjay Goel and
                  Kevin J. Williams},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Are External Auditors Capable of Dealing with Cybersecurity Risks?},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {326--340},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_19},
  doi          = {10.1007/978-3-031-36574-4\_19},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LiGW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LiZLFLC22,
  author       = {Chengjie Li and
                  Yunchun Zhang and
                  Zixuan Li and
                  Fan Feng and
                  Zikun Liao and
                  Xiaohui Cui},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {The Lightweight Botnet Detection Model Based on the Improved UNet},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {241--255},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_14},
  doi          = {10.1007/978-3-031-36574-4\_14},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LiZLFLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LiuYWX22,
  author       = {Qiuming Liu and
                  Zhexin Yao and
                  Zhen Wu and
                  Zeyao Xu},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Attribute-Based Proxy Re-encryption with Privacy Protection for Message
                  Dissemination in {VANET}},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {387--402},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_23},
  doi          = {10.1007/978-3-031-36574-4\_23},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LiuYWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MirsadeghiBI22,
  author       = {Seyed Mohammad Hadi Mirsadeghi and
                  Hayretdin Bahsi and
                  Wissem Inbouli},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Deep Learning-Based Detection of Cyberattacks in Software-Defined
                  Networks},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {341--354},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_20},
  doi          = {10.1007/978-3-031-36574-4\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MirsadeghiBI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MoadineCB22,
  author       = {Anass El Moadine and
                  Gouenou Coatrieux and
                  Reda Bellafqira},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Poisoning-Attack Detection Using an Auto-encoder for Deep Learning
                  Models},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {368--384},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_22},
  doi          = {10.1007/978-3-031-36574-4\_22},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MoadineCB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MundtB22,
  author       = {Michael Mundt and
                  Harald Baier},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Cyber Crime Undermines Data Privacy Efforts - On the Balance Between
                  Data Privacy and Security},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {417--434},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_25},
  doi          = {10.1007/978-3-031-36574-4\_25},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MundtB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/NwebonyiDG22,
  author       = {Francis N. Nwebonyi and
                  Xiaoyu Du and
                  Pavel Gladyshev},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Crime and Incident Watch for Smart Cities: {A} Sensor-Based Approach},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {222--238},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_13},
  doi          = {10.1007/978-3-031-36574-4\_13},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/NwebonyiDG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/RizviSM022,
  author       = {Syed Rizvi and
                  Mark Scanlon and
                  Jimmy McGibney and
                  John Sheppard},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Deep Learning Based Network Intrusion Detection System for Resource-Constrained
                  Environments},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {355--367},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_21},
  doi          = {10.1007/978-3-031-36574-4\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/RizviSM022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ShengYLZ22,
  author       = {Zhoushi Sheng and
                  Bo Yu and
                  Chen Liang and
                  Yongyi Zhang},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {VPnet: {A} Vulnerability Prioritization Approach Using Pointer Network
                  and Deep Reinforcement Learning},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {307--325},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_18},
  doi          = {10.1007/978-3-031-36574-4\_18},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ShengYLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/StankovicK22,
  author       = {Milos Stankovic and
                  Tahir M. Khan},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Digital Forensics Tool Evaluation on Deleted Files},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {61--83},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_4},
  doi          = {10.1007/978-3-031-36574-4\_4},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/StankovicK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/VarshneyKHS22,
  author       = {Rahul Varshney and
                  Nitesh Kumar and
                  Anand Handa and
                  Sandeep Kumar Shukla},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Volatility Custom Profiling for Automated Hybrid {ELF} Malware Detection},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {274--291},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_16},
  doi          = {10.1007/978-3-031-36574-4\_16},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/VarshneyKHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/VekslerCA22,
  author       = {Maryna Veksler and
                  Clara Caspard and
                  Kemal Akkaya},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Image-to-Image Translation Generative Adversarial Networks for Video
                  Source Camera Falsification},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_1},
  doi          = {10.1007/978-3-031-36574-4\_1},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/VekslerCA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/XieWZSY22,
  author       = {Jia{-}Hui Xie and
                  Di Wu and
                  Bo{-}Hao Zhang and
                  Hai Su and
                  Huan Yang},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Can Image Watermarking Efficiently Protect Deep-Learning-Based Image
                  Classifiers? - {A} Preliminary Security Analysis of an IP-Protecting
                  Method},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {34--57},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_3},
  doi          = {10.1007/978-3-031-36574-4\_3},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/XieWZSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/YangCL22,
  author       = {Fan Yang and
                  Hao Cheng and
                  Shanxiang Lyu},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {169--182},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_10},
  doi          = {10.1007/978-3-031-36574-4\_10},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/YangCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/YaoTZFLS22,
  author       = {Ruichu Yao and
                  Kunsheng Tang and
                  Yongshi Zhu and
                  Bingbing Fan and
                  Tian Luo and
                  Yide Song},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {{PBPAFL:} {A} Federated Learning Framework with Hybrid Privacy Protection
                  for Sensitive Data},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {403--416},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_24},
  doi          = {10.1007/978-3-031-36574-4\_24},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/YaoTZFLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ZengYWCLH22,
  author       = {Yutong Zeng and
                  Honghao Yu and
                  Tiejun Wu and
                  Yong Chen and
                  Xing Lan and
                  Cheng Huang},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {{CSCD:} {A} Cyber Security Community Detection Scheme on Online Social
                  Networks},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {135--150},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_8},
  doi          = {10.1007/978-3-031-36574-4\_8},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ZengYWCLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ZhangZCZ22,
  author       = {Ke Zhang and
                  Guanghua Zhang and
                  Zhenguo Chen and
                  Xiaojun Zuo},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {IoT Malicious Traffic Detection Based on {FSKDE} and Federated DIOT-Pysyft},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {203--221},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_12},
  doi          = {10.1007/978-3-031-36574-4\_12},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ZhangZCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ZhouK22,
  author       = {Jiaxuan Zhou and
                  Umit Karabiyik},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Forensic Analysis of Webex on the iOS Platform},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_5},
  doi          = {10.1007/978-3-031-36574-4\_5},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ZhouK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ZhouK22a,
  author       = {Jiaxuan Zhou and
                  Umit Karabiyik},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments
                  on Android},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {97--110},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_6},
  doi          = {10.1007/978-3-031-36574-4\_6},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ZhouK22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics