Digital Forensics and Cyber Crime, 1st ed. 2018
9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series, Vol. 216

Coordinators: Matoušek Petr, Schmiedecker Martin

Language: English

Approximative price 52.74 €

In Print (Delivery period: 15 days).

Add to cartAdd to cart
Publication date:
Support: Print on demand

This book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017. The 18 full papers were selected from 50 submissions and are grouped in topical sections on malware and botnet, deanonymization, digital forensics tools, cybercrime investigation and digital forensics triage, digital forensics tools testing and validation, hacking

FindEvasion : An Effective Environment-sensitive Malware Detection System for the Cloud.- Real-time Forensics through Endpoint Visibility.- Locky ransomware, Al Capone and Brexit Deanonymization.- Finding and Rating Personal Names on Drives for Forensic Needs.- A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness.- Open Source Forensics for a Multi-platform Drone System.- A Novel File Carving Algorithm for EVTX Logs.- Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence.- Cyber Crime Investigation and Digital Forensics Triage.- Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector.- A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph.-  Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees.- Approxis: a fast, robust, lightweight and approximate Disassembler considered in the field of memory forensics.- Memory Forensics and the Macintosh OS X Operating System.- Sketch-based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation.- An Overview of the Usage of Default Passwords Hacking.- Automation of MitM Attack on Wi-Fi Networks.- SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle.- Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets.

Includes supplementary material: sn.pub/extras