Front cover image for Digital Forensics and Cyber Crime : 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings

Digital Forensics and Cyber Crime : 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings

This book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017. The 18 full papers were selected from 50 submissions and are grouped in topical sections on malware and botnet, deanonymization, digital forensics tools, cybercrime investigation and digital forensics triage, digital forensics tools testing and validation, hacking
Print Book, English, 2018
Springer, Cham, 2018
Conference papers and proceedings
x, 233 pages : illustrations, charts ; 24 cm
9783319736969, 3319736965
1030998869
FindEvasion : An Effective Environment-sensitive Malware Detection System for the Cloud
Real-time Forensics through Endpoint Visibility
Locky ransomware, Al Capone and Brexit Deanonymization
Finding and Rating Personal Names on Drives for Forensic Needs
A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness
Open Source Forensics for a Multi-platform Drone System
A Novel File Carving Algorithm for EVTX Logs
Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence
Cyber Crime Investigation and Digital Forensics Triage
Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector
A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees
Approxis: a fast, robust, lightweight and approximate Disassembler considered in the field of memory forensics
Memory Forensics and the Macintosh OS X Operating System
Sketch-based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation
An Overview of the Usage of Default Passwords Hacking
Automation of MitM Attack on Wi-Fi Networks
SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle
Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets