D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage (English)
Free access
- New search for: Vella, Mark
- Further information on Vella, Mark:
-
https://orcid.org/http://orcid.org/0000-0002-6483-9054
- New search for: Colombo, Christian
- Further information on Colombo, Christian:
-
https://orcid.org/http://orcid.org/0000-0002-2844-5728
- New search for: Meng, Weizhi
- Further information on Meng, Weizhi:
-
https://orcid.org/https://orcid.org/0000-0003-4384-5786
- New search for: Fischer-Hübner, Simone
- Further information on Fischer-Hübner, Simone:
-
https://orcid.org/https://orcid.org/0000-0002-6938-4466
- New search for: Jensen, Christian D.
- Further information on Jensen, Christian D.:
-
https://orcid.org/https://orcid.org/0000-0002-0921-7148
- New search for: Vella, Mark
- Further information on Vella, Mark:
-
https://orcid.org/http://orcid.org/0000-0002-6483-9054
- New search for: Colombo, Christian
- Further information on Colombo, Christian:
-
https://orcid.org/http://orcid.org/0000-0002-2844-5728
In:
ICT Systems Security and Privacy Protection
: 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13–15, 2022, Proceedings
;
Chapter: 10
;
161-178
;
2022
- Article/Chapter (Book) / Electronic Resource
-
Title:D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage
-
Additional title:IFIP Advs Information
-
Contributors:Meng, Weizhi ( editor ) / Fischer-Hübner, Simone ( editor ) / Jensen, Christian D. ( editor ) / Vella, Mark ( author ) / Colombo, Christian ( author )
-
Conference:IFIP International Conference on ICT Systems Security and Privacy Protection ; 2022 ; Copenhagen, Denmark
-
Published in:ICT Systems Security and Privacy Protection : 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13–15, 2022, Proceedings ; Chapter: 10 ; 161-178IFIP Advances in Information and Communication Technology ; 648 ; 161-178
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2022-06-03
-
Size:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-AppHarborth, David / Pape, Sebastian et al. | 2022
- 2
-
Deriving and Using Synthetic Consequences for Privacy Risk ModelingShapiro, Stuart S. et al. | 2022
- 3
-
Enhanced Privacy in Smart Workplaces: Employees’ Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart WatchesRichter, Alexander / Kühtreiber, Patrick / Reinhardt, Delphine et al. | 2022
- 4
-
DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoringDey, Alexandre / Totel, Eric / Costé, Benjamin et al. | 2022
- 5
-
FOCUS: Frequency Based Detection of Covert Ultrasonic SignalsHellemans, Wouter / Rabbani, Md Masoom / Vliegen, Jo / Mentens, Nele et al. | 2022
- 6
-
Passive, Transparent, and Selective TLS Decryption for Network Security MonitoringWilkens, Florian / Haas, Steffen / Amann, Johanna / Fischer, Mathias et al. | 2022
- 7
-
A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship CircumventionFejrskov, Martin / Vasilomanolakis, Emmanouil / Pedersen, Jens Myrup et al. | 2022
- 8
-
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic FeaturesSun, Peishuai / Li, Shuhao / Xie, Jiang / Xu, Hongbo / Cheng, Zhenyu / Qin, Rui et al. | 2022
- 9
-
Evaluation of Circuit Lifetimes in TorKöster, Kevin / Marx, Matthias / Kunstmann, Anne / Federrath, Hannes et al. | 2022
- 10
-
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud StorageVella, Mark / Colombo, Christian et al. | 2022
- 11
-
Robust PDF Files Forensics Using Coding StyleAdhatarao, Supriya / Lauradoux, Cédric et al. | 2022
- 12
-
Light-Weight File Fragments Classification Using Depthwise Separable ConvolutionsSaaim, Kunwar Muhammed / Felemban, Muhamad / Alsaleh, Saleh / Almulhem, Ahmad et al. | 2022
- 13
-
Novel Approaches for the Development of Trusted IoT EntitiesFerraris, Davide / Fernandez-Gago, Carmen / Lopez, Javier et al. | 2022
- 14
-
Requirements and Secure Serialization for Selective Disclosure Verifiable CredentialsKalos, Vasilis / Polyzos, George C. et al. | 2022
- 15
-
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update PropertiesWu, Shaoqiang / Jia, Chunfu / Wang, Ding et al. | 2022
- 16
-
CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware FeatureZhong, Bingnan / Wang, Zicheng / Guo, Yinggang / Zeng, Qingkai et al. | 2022
- 17
-
Usability Insights from Establishing TLS ConnectionsKraus, Lydia / Grabovský, Matěj / Ukrop, Martin / Galanská, Katarína / Matyáš, Vashek et al. | 2022
- 18
-
Usability of Antivirus Tools in a Threat Detection ScenarioKörber, Michael / Kalysch, Anatoli / Massonne, Werner / Benenson, Zinaida et al. | 2022
- 19
-
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User ConfigurationsBurkert, Christian / Ansohn McDougall, Johanna / Federrath, Hannes et al. | 2022
- 20
-
Greedy Networking in Cryptocurrency BlockchainWuthier, Simeon / Chandramouli, Pranav / Zhou, Xiaobo / Chang, Sang-Yoon et al. | 2022
- 21
-
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric BlockchainPericherla, Amshumaan / Paul, Proteet / Sural, Shamik / Vaidya, Jaideep / Atluri, Vijay et al. | 2022
- 22
-
AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android AppsForoughipour, Ardalan / Stakhanova, Natalia / Abazari, Farzaneh / Sistany, Bahman et al. | 2022
- 23
-
One Light, One App: Tackling a Common Misperception Causing Breach of User PrivacySiapiti, Efi / Dionysiou, Ioanna / Gjermundrød, Harald et al. | 2022
- 24
-
Double-X: Towards Double-Cross-Based Unlock Mechanism on SmartphonesLi, Wenjuan / Tan, Jiao / Zhu, Nan et al. | 2022
- 25
-
Post-Quantum Cheating Detectable Private Information RetrievalZhu, Lin / Lin, Changlu / Lin, Fuchun / Zhang, Liang Feng et al. | 2022
- 26
-
Anonymous Trusted Data Relocation for TEEsGuita, Vasco / Andrade, Daniel / Silva, João Nuno / Correia, Miguel et al. | 2022
- 27
-
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive QueriesLi, Tianci / Wu, Jiaojiao / Wang, Jianfeng et al. | 2022
- 28
-
Upside Down: Exploring the Ecosystem of Dark Web Data MarketsCovrig, Bogdan / Mikelarena, Enrique Barrueco / Rosca, Constanta / Goanta, Catalina / Spanakis, Gerasimos / Zarras, Apostolis et al. | 2022
- 29
-
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer NullificationYu, Yue / Jia, Xiaoqi / An, Xun / Zhang, Shengzhi et al. | 2022