Login / Signup
ICDF2C
2009
2013
2019
2023
2009
2023
Keyphrases
Publications
volume 508, 2023
Digital Forensics and Cyber Crime - 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings
ICDF2C
508 (2023)
2022
Chengjie Li
,
Yunchun Zhang
,
Zixuan Li
,
Fan Feng
,
Zikun Liao
,
Xiaohui Cui
The Lightweight Botnet Detection Model Based on the Improved UNet.
ICDF2C
(2022)
Francis N. Nwebonyi
,
Xiaoyu Du
,
Pavel Gladyshev
Crime and Incident Watch for Smart Cities: A Sensor-Based Approach.
ICDF2C
(2022)
Jia Chen
,
Kunlin Chen
,
Yongjie Wang
,
Xuehu Yan
,
Longlong Li
A General Steganalysis Method of QR Codes.
ICDF2C
(2022)
Daniel Dolejska
,
Vladimír Veselý
,
Jan Pluskal
,
Michal Koutenský
Shedding Light on Monopoly: Temporal Analysis of Drug Trades.
ICDF2C
(2022)
Syed Rizvi
,
Mark Scanlon
,
Jimmy McGibney
,
John Sheppard
Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments.
ICDF2C
(2022)
Michael Mundt
,
Harald Baier
Cyber Crime Undermines Data Privacy Efforts - On the Balance Between Data Privacy and Security.
ICDF2C
(2022)
Jia-Hui Xie
,
Di Wu
,
Bo-Hao Zhang
,
Hai Su
,
Huan Yang
Can Image Watermarking Efficiently Protect Deep-Learning-Based Image Classifiers? - A Preliminary Security Analysis of an IP-Protecting Method.
ICDF2C
(2022)
Qiuming Liu
,
Zhexin Yao
,
Zhen Wu
,
Zeyao Xu
Attribute-Based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET.
ICDF2C
(2022)
Anass El Moadine
,
Gouenou Coatrieux
,
Reda Bellafqira
Poisoning-Attack Detection Using an Auto-encoder for Deep Learning Models.
ICDF2C
(2022)
Samantha Klier
,
Harald Baier
Towards Efficient On-Site CSAM Triage by Clustering Images from a Source Point of View.
ICDF2C
(2022)
Rahul Varshney
,
Nitesh Kumar
,
Anand Handa
,
Sandeep Kumar Shukla
Volatility Custom Profiling for Automated Hybrid ELF Malware Detection.
ICDF2C
(2022)
Abhishek Bhattarai
,
Maryna Veksler
,
Hadi Sahin
,
Ahmet Kurt
,
Kemal Akkaya
Crypto Wallet Artifact Detection on Android Devices Using Advanced Machine Learning Techniques.
ICDF2C
(2022)
Jiaxuan Zhou
,
Umit Karabiyik
Forensic Analysis of Webex on the iOS Platform.
ICDF2C
(2022)
Yueqi Li
,
Sanjay Goel
,
Kevin J. Williams
Are External Auditors Capable of Dealing with Cybersecurity Risks?
ICDF2C
(2022)
Zhiyuan Hu
,
Linghang Shi
,
Huijun Chen
,
Jinghui Lu
Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP).
ICDF2C
(2022)
Ruichu Yao
,
Kunsheng Tang
,
Yongshi Zhu
,
Bingbing Fan
,
Tian Luo
,
Yide Song
PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data.
ICDF2C
(2022)
Mohsen M. Jozani
,
Gianluca Zanella
,
Maxium Khanov
,
Gokila Dorai
,
Esra Akbas
The Need for Biometric Anti-spoofing Policies: The Case of Etsy.
ICDF2C
(2022)
Yutong Zeng
,
Honghao Yu
,
Tiejun Wu
,
Yong Chen
,
Xing Lan
,
Cheng Huang
CSCD: A Cyber Security Community Detection Scheme on Online Social Networks.
ICDF2C
(2022)
Ke Zhang
,
Guanghua Zhang
,
Zhenguo Chen
,
Xiaojun Zuo
IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft.
ICDF2C
(2022)
Raymond H. Chan
,
Wye Kaye Yan
,
Jung Man Ma
,
Kai Mun Loh
,
Greger Chen Zhi En
,
Malcolm Y. H. Low
,
Habib Rehman
,
Thong Chee Phua
MQTT Traffic Collection and Forensic Analysis Framework.
ICDF2C
(2022)
Xiaoyu Du
,
Francis N. Nwebonyi
,
Pavel Gladyshev
Automating the Flow of Data Between Digital Forensic Tools Using Apache NiFi.
ICDF2C
(2022)
Zhoushi Sheng
,
Bo Yu
,
Chen Liang
,
Yongyi Zhang
VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning.
ICDF2C
(2022)
Jiaxuan Zhou
,
Umit Karabiyik
Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android.
ICDF2C
(2022)
Alejandro Guerra-Manzanares
,
Hayretdin Bahsi
On the Application of Active Learning to Handle Data Evolution in Android Malware Detection.
ICDF2C
(2022)
Maryna Veksler
,
Clara Caspard
,
Kemal Akkaya
Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification.
ICDF2C
(2022)
Milos Stankovic
,
Tahir M. Khan
Digital Forensics Tool Evaluation on Deleted Files.
ICDF2C
(2022)
Seyed Mohammad Hadi Mirsadeghi
,
Hayretdin Bahsi
,
Wissem Inbouli
Deep Learning-Based Detection of Cyberattacks in Software-Defined Networks.
ICDF2C
(2022)
Fan Yang
,
Hao Cheng
,
Shanxiang Lyu
Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding.
ICDF2C
(2022)
volume 441, 2022
Digital Forensics and Cyber Crime - 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings
ICDF2C
441 (2022)
2021
M. A. Hannan Bin Azhar
,
Jake Timms
,
Benjamin Tilley
Forensic Investigations of Google Meet and Microsoft Teams - Two Popular Conferencing Tools in the Pandemic.
ICDF2C
(2021)
Anthony Cheuk Tung Lai
,
Ken Wai Kin Wong
,
Johnny Tsz Wun Wong
,
Austin Tsz Wai Lau
,
Alan Po Lun Ho
,
Shuai Wang
,
Jogesh Muppala
Backdoor Investigation and Incident Response: From Zero to Profit.
ICDF2C
(2021)
Xiaoyu Cao
,
Neil Zhenqiang Gong
Understanding the Security of Deepfake Detection.
ICDF2C
(2021)
Fatima-Zahra Boujdad
,
David Niyitegeka
,
Reda Bellafqira
,
Gouenou Coatrieux
,
Emmanuelle Génin
,
Mario Südholt
A Hybrid Cloud Deployment Architecture for Privacy-Preserving Collaborative Genome-Wide Association Studies.
ICDF2C
(2021)
Miguel Martín-Pérez
,
Ricardo J. Rodríguez
Quantifying Paging on Recoverable Data from Windows User-Space Modules.
ICDF2C
(2021)
Zhenzhen Zhang
,
Henan Shi
,
Xinghao Jiang
,
Zhaohong Li
,
Jindou Liu
A CNN-Based HEVC Video Steganalysis Against DCT/DST-Based Steganography.
ICDF2C
(2021)
Thomas Göbel
,
Frieder Uhlig
,
Harald Baier
Find My IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows.
ICDF2C
(2021)
Tiffanie Edwards
,
Syria McCullough
,
Mohamed Nassar
,
Ibrahim M. Baggili
On Exploring the Sub-domain of Artificial Intelligence (AI) Model Forensics.
ICDF2C
(2021)
Alexander Mühle
,
Andreas Grüner
,
Christoph Meinel
Gotta Catch'em All! Improving P2P Network Crawling Strategies.
ICDF2C
(2021)
Aikaterini Kanta
,
Iwen Coisel
,
Mark Scanlon
PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality.
ICDF2C
(2021)
Haoran Ou
,
Yongyan Guo
,
Chaoyi Huang
,
Zhiying Zhao
,
Wenbo Guo
,
Yong Fang
,
Cheng Huang
No Pie in the Sky: The Digital Currency Fraud Website Detection.
ICDF2C
(2021)
Richard Buurke
,
Nhien-An Le-Khac
Accessing Secure Data on Android Through Application Analysis.
ICDF2C
(2021)
Michael Mundt
,
Harald Baier
Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK Framework.
ICDF2C
(2021)
Na Li
,
Haoyu Zhang
,
Zhihui Hu
,
Guang Kou
,
Huadong Dai
Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention.
ICDF2C
(2021)
Andrew Mahr
,
Robert Serafin
,
Cinthya Grajeda
,
Ibrahim M. Baggili
Auto-Parser: Android Auto and Apple CarPlay Forensics.
ICDF2C
(2021)
Zhenzhou Tian
,
Hengchao Mao
,
Yaqian Huang
,
Jie Tian
,
Jinrui Li
Fine-Grained Obfuscation Scheme Recognition on Binary Code.
ICDF2C
(2021)
Elizabeth Wyss
,
Drew Davidson
Parcae: A Blockchain-Based PRF Service for Everyone.
ICDF2C
(2021)
Jaime C. Acosta
,
Anjon Basak
,
Christopher Kiekintveld
,
Charles A. Kamhoua
Lightweight On-Demand Honeypot Deployment for Cyber Deception.
ICDF2C
(2021)
Xiaoyi Duan
,
You Li
,
Chengyuan Liu
,
Xiuying Li
,
Wenfeng Liu
,
Guoqian Li
Research on the Method of Selecting the Optimal Feature Subset in Big Data for Energy Analysis Attack.
ICDF2C
(2021)
volume 351, 2021
Digital Forensics and Cyber Crime - 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings
ICDF2C
351 (2021)