語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Digital Forensics and Cyber Crime = ...
~
SpringerLink (Online service)
Digital Forensics and Cyber Crime = 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Digital Forensics and Cyber Crime/ edited by Petr Matoušek, Martin Schmiedecker.
其他題名:
9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings /
其他作者:
Matoušek, Petr.
面頁冊數:
X, 235 p. 83 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-319-73697-6
ISBN:
9783319736976
Digital Forensics and Cyber Crime = 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings /
Digital Forensics and Cyber Crime
9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings /[electronic resource] :edited by Petr Matoušek, Martin Schmiedecker. - 1st ed. 2018. - X, 235 p. 83 illus.online resource. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,2161867-8211 ;. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,154.
FindEvasion : An Effective Environment-sensitive Malware Detection System for the Cloud -- Real-time Forensics through Endpoint Visibility -- Locky ransomware, Al Capone and Brexit Deanonymization -- Finding and Rating Personal Names on Drives for Forensic Needs -- A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness -- Open Source Forensics for a Multi-platform Drone System -- A Novel File Carving Algorithm for EVTX Logs -- Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence -- Cyber Crime Investigation and Digital Forensics Triage -- Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector -- A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph -- Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees -- Approxis: a fast, robust, lightweight and approximate Disassembler considered in the field of memory forensics -- Memory Forensics and the Macintosh OS X Operating System -- Sketch-based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation -- An Overview of the Usage of Default Passwords Hacking -- Automation of MitM Attack on Wi-Fi Networks -- SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle -- Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets.
This book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017. The 18 full papers were selected from 50 submissions and are grouped in topical sections on malware and botnet, deanonymization, digital forensics tools, cybercrime investigation and digital forensics triage, digital forensics tools testing and validation, hacking.
ISBN: 9783319736976
Standard No.: 10.1007/978-3-319-73697-6doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Digital Forensics and Cyber Crime = 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings /
LDR
:03474nam a22004215i 4500
001
996101
003
DE-He213
005
20200702025155.0
007
cr nn 008mamaa
008
201225s2018 gw | s |||| 0|eng d
020
$a
9783319736976
$9
978-3-319-73697-6
024
7
$a
10.1007/978-3-319-73697-6
$2
doi
035
$a
978-3-319-73697-6
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Digital Forensics and Cyber Crime
$h
[electronic resource] :
$b
9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings /
$c
edited by Petr Matoušek, Martin Schmiedecker.
250
$a
1st ed. 2018.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
X, 235 p. 83 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-8211 ;
$v
216
505
0
$a
FindEvasion : An Effective Environment-sensitive Malware Detection System for the Cloud -- Real-time Forensics through Endpoint Visibility -- Locky ransomware, Al Capone and Brexit Deanonymization -- Finding and Rating Personal Names on Drives for Forensic Needs -- A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness -- Open Source Forensics for a Multi-platform Drone System -- A Novel File Carving Algorithm for EVTX Logs -- Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence -- Cyber Crime Investigation and Digital Forensics Triage -- Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector -- A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph -- Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees -- Approxis: a fast, robust, lightweight and approximate Disassembler considered in the field of memory forensics -- Memory Forensics and the Macintosh OS X Operating System -- Sketch-based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation -- An Overview of the Usage of Default Passwords Hacking -- Automation of MitM Attack on Wi-Fi Networks -- SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle -- Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets.
520
$a
This book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017. The 18 full papers were selected from 50 submissions and are grouped in topical sections on malware and botnet, deanonymization, digital forensics tools, cybercrime investigation and digital forensics triage, digital forensics tools testing and validation, hacking.
650
0
$a
Computer security.
$3
557122
650
0
$a
Computers.
$3
565115
650
0
$a
Law and legislation.
$3
1069250
650
0
$a
Data protection.
$3
557764
650
0
$a
Computers and civilization.
$3
556557
650
0
$a
Management information systems.
$3
561123
650
0
$a
Computer science.
$3
573171
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Legal Aspects of Computing.
$3
669901
650
2 4
$a
Security.
$3
1114130
650
2 4
$a
Computers and Society.
$3
669900
650
2 4
$a
Management of Computing and Information Systems.
$3
593928
700
1
$a
Matoušek, Petr.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1287262
700
1
$a
Schmiedecker, Martin.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1287263
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319736969
776
0 8
$i
Printed edition:
$z
9783319736983
830
0
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-8211 ;
$v
154
$3
1253880
856
4 0
$u
https://doi.org/10.1007/978-3-319-73697-6
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入