oncologist 发表于 2025-3-27 00:34:36

http://reply.papertrans.cn/28/2794/279328/279328_31.png

ureter 发表于 2025-3-27 03:04:10

CSCD: A Cyber Security Community Detection Scheme on Online Social Networkspropound a pruning strategy to remove weak relationships between accounts on the basis of edge features. An unsupervised overlapping community detection model is applied to unearthing potential communities. To evaluate our proposed scheme, we utilize Twitter as the platform to construct datasets. Th

共同给与 发表于 2025-3-27 09:05:33

Petra Schneider,Ralf Löser,Frank Gössel. Our experimental results demonstrate that the proposed attack can be implemented to successfully compromise the existing forensic methods with 100% probability for non-flat videos while producing the high quality content. The results indicate the need for attack-prone video source camera identific

FID 发表于 2025-3-27 10:42:20

http://reply.papertrans.cn/28/2794/279328/279328_34.png

Ataxia 发表于 2025-3-27 15:00:01

Konrad Otto-Zimmermann,Alice Balbosibility issue. Adapting the original approach by replacing its steganalyzer with watermark extraction algorithm and revising the overall training strategy, we are able to mitigate the visibility issue. Furthermore, we evaluate our improved approaches under three simple yet practical attacks, i.e.,

choleretic 发表于 2025-3-27 20:07:16

Springer Optimization and Its Applicationssics tool, to partially bridge the gap for this era. We also used a differential analysis approach to investigate the persistence of deleted files. Moreover, for the best evaluation of the tools, we created files of various types and activities that mimic the daily usage of an average user on a Wind

公共汽车 发表于 2025-3-28 00:09:39

https://doi.org/10.1007/978-981-15-2529-2eting session start time, meeting session attendee ID, etc. Also, we compared the evidence left from two types of accounts, basic and enterprise. The result shows that an enterprise account leaves more user data on the phone, a basic account keeps more device data. We used three tools, Cellebrite, A

使声音降低 发表于 2025-3-28 03:57:14

http://reply.papertrans.cn/28/2794/279328/279328_38.png

围裙 发表于 2025-3-28 10:00:00

http://reply.papertrans.cn/28/2794/279328/279328_39.png

bronchodilator 发表于 2025-3-28 11:14:45

Emine Didem Evci Kiraz,Aylin Sönmez Günpropound a pruning strategy to remove weak relationships between accounts on the basis of edge features. An unsupervised overlapping community detection model is applied to unearthing potential communities. To evaluate our proposed scheme, we utilize Twitter as the platform to construct datasets. Th
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Digital Forensics and Cyber Crime; 13th EAI Internation Sanjay Goel,Pavel Gladyshev,Daryl Johnson Conference proceedings 2023 ICST Institut