default search action
16th Digital Forensics 2020: New Delhi, India
- Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers. IFIP Advances in Information and Communication Technology 589, Springer 2020, ISBN 978-3-030-56222-9
Themes and Issues
- Martin Olivier:
Digital Forensics and the Big Data Deluge - Some Concerns Based on Ramsey Theory. 3-23 - Michael Losavio:
Identity and Sufficiency of Digital Evidence. 25-36
Forensic Techniques
- Nikolai Adderley, Gilbert L. Peterson:
Interactive Temporal Digital Forensic Event Analysis. 39-55 - Weiqing Huang, Chenggang Jia, Min Yu, Kam-Pui Chow, Jiuming Chen, Chao Liu, Jianguo Jiang:
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors. 57-72 - Thomas Göbel, Thomas Schäfer, Julien Hachenberger, Jan Türr, Harald Baier:
A Novel Approach for Generating Synthetic Datasets for Digital Forensics. 73-93 - Ken Yau, Kam-Pui Chow, Siu-Ming Yiu:
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines. 95-108
Filesystem Forensics
- Myeong Lim, James Jones:
A Digital Media Similarity Measure for Triage of Digital Forensic Evidence. 111-135 - Nitesh K. Bharadwaj, Upasna Singh, Gaurav Gupta:
Resident Data Pattern Analysis Using Sector Clustering for Storage Drive Forensics. 137-157
Cloud Forensics
- Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments. 161-180 - Anand Kumar Mishra, Mahesh Chandra Govil, Emmanuel S. Pilli:
A Taxonomy of Hypervisor Forensic Tools. 181-199
Social Media Forensics
- Wencan Wu, Kam-Pui Chow, Yonghao Mai, Jun Zhang:
Public Opinion Monitoring for Proactive Crime Detection Using Named Entity Recognition. 203-214 - Ranul Deelaka Thantilage, Nhien-An Le-Khac:
Retrieving E-Dating Application Artifacts from iPhone Backups. 215-230
Multimedia Forensics
- Saheb Chhabra, Naman Banati, Gaurav Gupta, Garima Gupta:
Target Identity Attacks on Facial Recognition Systems. 233-252 - Maoyu Mao, Zhongcheng Xiao, Xiangui Kang, Xiang Li, Liang Xiao:
Electric Network Frequency Based Audio Forensics Using Convolutional Neural Networks. 253-270
Novel Applications
- Yichen Wei, Kam-Pui Chow, Siu-Ming Yiu:
Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning. 273-290 - Jingcheng Liu, Yaping Zhang, Yuze Li, Yongheng Jia, Yao Chen, Jin Cao:
Detecting Local Machine Data Leakage in Real Time. 291-308
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.