E-Books durchsuchen
Digital Forensics and Cyber Crime [2023]
- 1
-
Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification
- 2
-
Towards Efficient On-Site CSAM Triage by Clustering Images from a Source Point of View
- 3
-
Can Image Watermarking Efficiently Protect Deep-Learning-Based Image Classifiers? – A Preliminary Security Analysis of an IP-Protecting Method
- 4
-
Digital Forensics Tool Evaluation on Deleted Files
- 5
-
Forensic Analysis of Webex on the iOS Platform
- 6
-
Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android
- 7
-
Crypto Wallet Artifact Detection on Android Devices Using Advanced Machine Learning Techniques
- 8
-
CSCD: A Cyber Security Community Detection Scheme on Online Social Networks
- 9
-
Shedding Light on Monopoly: Temporal Analysis of Drug Trades
- 10
-
Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding
- 11
-
MQTT Traffic Collection and Forensic Analysis Framework
- 12
-
IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft
- 13
-
Crime and Incident Watch for Smart Cities: A Sensor-Based Approach
- 14
-
The Lightweight Botnet Detection Model Based on the Improved UNet
- 15
-
On the Application of Active Learning to Handle Data Evolution in Android Malware Detection
- 16
-
Volatility Custom Profiling for Automated Hybrid ELF Malware Detection
- 17
-
The Need for Biometric Anti-spoofing Policies: The Case of Etsy
- 18
-
VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning
- 19
-
Are External Auditors Capable of Dealing with Cybersecurity Risks?
- 20
-
Deep Learning-Based Detection of Cyberattacks in Software-Defined Networks
- 21
-
Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments
- 22
-
Poisoning-Attack Detection Using an Auto-encoder for Deep Learning Models
- 23
-
Attribute-Based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET
- 24
-
PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data
- 25
-
Cyber Crime Undermines Data Privacy Efforts – On the Balance Between Data Privacy and Security
- 26
-
Automating the Flow of Data Between Digital Forensic Tools Using Apache NiFi
- 27
-
Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP)
- 28
-
A General Steganalysis Method of QR Codes