Search dblp for Publications

export results for "toc:db/conf/icdf2c/icdf2c2018.bht:"

 download as .bib file

@proceedings{DBLP:conf/icdf2c/2018,
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-05487-8},
  doi          = {10.1007/978-3-030-05487-8},
  isbn         = {978-3-030-05486-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/AL-MaksousyW18,
  author       = {Hassan Hadi Latheeth Al{-}Maksousy and
                  Michele C. Weigle},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Hybrid Intrusion Detection System for Worm Attacks Based on Their
                  Network Behavior},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {225--234},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_12},
  doi          = {10.1007/978-3-030-05487-8\_12},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/AL-MaksousyW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/DokkoS18,
  author       = {Jieun Dokko and
                  Michael Shin},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {A Digital Forensic Investigation and Verification Model for Industrial
                  Espionage},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {128--146},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_7},
  doi          = {10.1007/978-3-030-05487-8\_7},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/DokkoS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/GobelB18,
  author       = {Thomas G{\"{o}}bel and
                  Harald Baier},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {fishy - {A} Framework for Implementing Filesystem-Based Data Hiding
                  Techniques},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_2},
  doi          = {10.1007/978-3-030-05487-8\_2},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/GobelB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HaighBB18,
  author       = {Trevor Haigh and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {If {I} Had a Million Cryptos: Cryptowallet Application Analysis and
                  a Trojan Proof-of-Concept},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {45--65},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_3},
  doi          = {10.1007/978-3-030-05487-8\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HaighBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LieblerB18,
  author       = {Lorenz Liebler and
                  Harald Baier},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {On Efficiency and Effectiveness of Linear Function Detection Approaches
                  for Memory Carving},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_1},
  doi          = {10.1007/978-3-030-05487-8\_1},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LieblerB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Rowe18,
  author       = {Neil C. Rowe},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Associating Drives Based on Their Artifact and Metadata Distributions},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {165--182},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_9},
  doi          = {10.1007/978-3-030-05487-8\_9},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Rowe18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SchelkophPO18,
  author       = {Daniel J. Schelkoph and
                  Gilbert L. Peterson and
                  James S. Okolica},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Digital Forensics Event Graph Reconstruction},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {185--203},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_10},
  doi          = {10.1007/978-3-030-05487-8\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SchelkophPO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SchmickerBB18,
  author       = {Robert Schmicker and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {AndroParse - An Android Feature Extraction Framework and Dataset},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {66--88},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_4},
  doi          = {10.1007/978-3-030-05487-8\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SchmickerBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/ShenCZ18,
  author       = {Jaryn Shen and
                  Kim{-}Kwang Raymond Choo and
                  Qingkai Zeng},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Multi-item Passphrases: {A} Self-adaptive Approach Against Offline
                  Guessing Attacks},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {204--221},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_11},
  doi          = {10.1007/978-3-030-05487-8\_11},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/ShenCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/SinghIV18,
  author       = {Avinash Singh and
                  Adeyemi R. Ikuesan and
                  Hein S. Venter},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Digital Forensic Readiness Framework for Ransomware Investigation},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {91--105},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_5},
  doi          = {10.1007/978-3-030-05487-8\_5},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/SinghIV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/Tabuyo-BenitoBP18,
  author       = {Raquel Tabuyo{-}Benito and
                  Hayretdin Bahsi and
                  Pedro Peris{-}Lopez},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Forensics Analysis of an On-line Game over Steam Platform},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {106--127},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_6},
  doi          = {10.1007/978-3-030-05487-8\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/Tabuyo-BenitoBP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/VieyraSL18,
  author       = {John Vieyra and
                  Mark Scanlon and
                  Nhien{-}An Le{-}Khac},
  editor       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Solid State Drive Forensics: Where Do We Stand?},
  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,
                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {259},
  pages        = {149--164},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05487-8\_8},
  doi          = {10.1007/978-3-030-05487-8\_8},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/VieyraSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}