简略 发表于 2025-3-28 18:19:29

http://reply.papertrans.cn/28/2794/279326/279326_41.png

为宠爱 发表于 2025-3-28 22:43:03

1867-8211 al Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023..The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:.Volume I:.Crime profil

预感 发表于 2025-3-28 23:51:40

Conference proceedings 2024ere carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:.Volume I:.Crime profile analysis and Fact checking, Information hiding and Machine learning..Volume II: .Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics..

Ingenuity 发表于 2025-3-29 05:44:03

https://doi.org/10.1007/978-1-4020-8489-8application metadata was discovered. Next, network traffic analysis using a desktop computer revealed plaintext usernames and passwords. A detailed depiction of the forensic analysis performed for this paper is presented to aid future investigators.

放纵 发表于 2025-3-29 09:43:11

http://reply.papertrans.cn/28/2794/279326/279326_45.png

珍奇 发表于 2025-3-29 13:33:26

https://doi.org/10.1007/978-3-319-95597-1ransformation attacks and can achieve a Corr value of 0.729 in the face of a composite attack with 10% simplification, 0.5% noise and 10% shear. The algorithm’s invisibility, capacity, and its robustness against multiple attacks are improved.

judiciousness 发表于 2025-3-29 17:18:20

Latin American Integration: A Brazilian View performance and maintaining stealth. We not only validate the feasibility and effectiveness of CCBA in deep neural networks but also extend it successfully to graph neural networks and natural language processing, demonstrating promising results.

fidelity 发表于 2025-3-29 20:33:51

https://doi.org/10.1007/978-981-99-7996-7triggers to enforce the well-trained GSCD model to misclassify trigger-embedded crime data as the premeditated result. Extensive experiments on multiple detection models and open-source datasets reveal that the CBAG exhibits effective escape performance and evasiveness.

Vulnerable 发表于 2025-3-30 02:48:47

Retruth Reconnaissance: A Digital Forensic Analysis of Truth Socialapplication metadata was discovered. Next, network traffic analysis using a desktop computer revealed plaintext usernames and passwords. A detailed depiction of the forensic analysis performed for this paper is presented to aid future investigators.

thyroid-hormone 发表于 2025-3-30 04:21:31

A Multi-carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model layer area is compressed according to the secret information to complete the secret information hiding. The experimental results show that, compared with the comparison algorithm, the proposed algorithm is robust while maintaining invisibility in the face of a single attack.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Digital Forensics and Cyber Crime; 14th EAI Internation Sanjay Goel,Paulo Roberto Nunes de Souza Conference proceedings 2024 ICST Institute