Table of Contents
|
Advances in Digital Forensics XVII Gilbert Peterson, Sujeet Shenoi |
Front Matter |
PART I Themes and Issues
|
DIGITAL FORENSIC ACQUISITION KILL CHAIN – ANALYSIS AND DEMONSTRATION Gunnar Alendal, Geir Olav Dyrkolbotn, Stefan Axelsson |
3-19 |
ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS Marietheres Dietz, Ludwig Englbrecht, Günther Pernul |
21-38 |
COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET York Yannikos, Quang Anh Dang, Martin Steinebach |
39-61 |
PART II Approximate Matching Techniques
|
USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES Myeong Lim, James Jones |
65-87 |
EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS Thomas Göbel, Frieder Uhlig, Harald Baier |
89-108 |
PART III Advanced Forensic Techniques
|
LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION Gunnar Alendal, Stefan Axelsson, Geir Olav Dyrkolbotn |
111-133 |
DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING Jianguo Jiang, Nan Song, Min Yu, Kam-Pui Chow, Gang Li, Chao Liu, Weiqing Huang |
135-155 |
MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM Yanna Wu, Fucheng Liu, Yu Wen |
157-173 |
PART IV Novel Applications
|
PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA Shengzhi Qin, Qiaokun Wen, Kam-Pui Chow |
177-191 |
EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS Yali Luo, Shengqin Ao, Ning Luo, Changxin Su, Peian Yang, Zhengwei Jiang |
193-211 |
SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME Suryadipta Majumdar, Daniel Bastos, Anoop Singhal |
213-234 |
PART V Image Forensics
|
INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH Saheb Chhabra, Gaurav Gupta, Garima Gupta, Monika Gupta |
237-253 |
SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES Pulkit Garg, Saheb Chhabra, Gaurav Gupta, Garima Gupta, Monika Gupta |
255-267 |