Login / Signup
ICDF2C (2)
2024
2024
2024
Keyphrases
Publications
volume 571, 2024
Digital Forensics and Cyber Crime - 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II
ICDF2C (2)
571 (2024)
2023
Lilian Noronha Nassif
,
Jonny Silva de Oliveira
Learning Framework for Guessing Alphanumeric Passwords on Mobile Phones Based on User Context and Fragment Semantics.
ICDF2C (2)
(2023)
Zhiqiang Wang
,
Zhuoyue Wang
,
Ying Zhang
An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network.
ICDF2C (2)
(2023)
Zhi Lu
,
Haochen Dou
,
Songfeng Lu
,
Xueming Tang
,
Junjun Wu
,
Samir Mohammed Umran
A PUF Based Audio Fingerprint Based for Device Authentication and Tamper Location.
ICDF2C (2)
(2023)
Songshou Dong
,
Yanqing Yao
,
Yihua Zhou
,
Yuguang Yang
Improvement of an Identity-Based Aggregate Signature Protocol from Lattice.
ICDF2C (2)
(2023)
Songshou Dong
,
Yanqing Yao
,
Yihua Zhou
,
Yuguang Yang
Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem).
ICDF2C (2)
(2023)
Ivan Cvitic
,
Dragan Perakovic
A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels.
ICDF2C (2)
(2023)
Hassan Jalil Hadi
,
Yue Cao
,
Mohammed Ali Alshara
,
Naveed Ahmad
,
Muhammad Saqib Riaz
,
Jun Li
Quantum Computing Challenges and Impact on Cyber Security.
ICDF2C (2)
(2023)
Josep Pegueroles Valles
,
Sebastien Kanj Bongard
,
Arnau Estebanell Castellví
XSS Vulnerability Test Enhancement for Progressive Web Applications.
ICDF2C (2)
(2023)
Quan Hong
,
Jiaqi Li
,
Xizhong Guo
,
Pan Xie
,
Lidong Zhai
Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim.
ICDF2C (2)
(2023)
Weimiao Feng
,
Rui Hu
,
Cong Zhou
,
Lei Yu
DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery.
ICDF2C (2)
(2023)
Steven Seiden
,
Ibrahim M. Baggili
,
Aisha I. Ali-Gombe
I've Got You, Under My Skin: Biohacking Augmentation Implant Forensics.
ICDF2C (2)
(2023)
Abdul Majid Jamil
,
Hassan Jalil Hadi
,
Sifan Li
,
Yue Cao
,
Naveed Ahmed
,
Faisal Bashir Hussain
,
Chakkaphong Suthaputchakun
,
Xinyuan Wang
Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle.
ICDF2C (2)
(2023)
Yiran Li
Power Analysis Attack Based on BS-XGboost Scheme.
ICDF2C (2)
(2023)
Yintong Yan
,
Lu Yu
,
Taiyan Wang
,
Yuwei Li
,
Zulie Pan
Optir-SBERT: Cross-Architecture Binary Code Similarity Detection Based on Optimized LLVM IR.
ICDF2C (2)
(2023)
Ruipeng Zhang
,
Mengjun Xie
ForensiQ: A Knowledge Graph Question Answering System for IoT Forensics.
ICDF2C (2)
(2023)
Chenxin Zhou
,
Cheng Huang
,
Yanghao Wang
,
Zheng Zuo
APTBert: Abstract Generation and Event Extraction from APT Reports.
ICDF2C (2)
(2023)
Aleck Nash
,
Hudan Studiawan
,
George Grispos
,
Kim-Kwang Raymond Choo
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy.
ICDF2C (2)
(2023)
Martin Husák
,
Shanchieh Jay Yang
,
Joseph Khoury
,
Dorde Klisura
,
Elias Bou-Harb
Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges.
ICDF2C (2)
(2023)
Aleck Nash
,
Kim-Kwang Raymond Choo
Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities.
ICDF2C (2)
(2023)
Qingran Lin
,
Xiang Li
,
Beilin Chu
,
Renying Wang
,
Xianhao Chen
,
Yuzhe Mao
,
Zhen Yang
,
Linna Zhou
,
Weike You
SHIELD: A Specialized Dataset for Hybrid Blind Forensics of World Leaders.
ICDF2C (2)
(2023)
Thorsten Jenke
,
Simon Liessem
,
Elmar Padilla
,
Lilli Bruckschen
A Measurement Study on Interprocess Code Propagation of Malicious Software.
ICDF2C (2)
(2023)
Linong Shi
,
Chuanping Hu
,
Yan Zhuang
,
Yan Lu
SdShield: Effectively Ensuring Heap Security via Shadow Page Table.
ICDF2C (2)
(2023)