ICDF2C 2021 论文录用列表
2021-08-18 18:32:45 Author: mp.weixin.qq.com(查看原文) 阅读量:91 收藏

国际数字取证与网络犯罪会议(ICDF2C)全称International Conference on Digital Forensics & Cyber Crime,信息安全及密码学CCF分类C类。该会议旨在促进数字取证及网络犯罪侦查的发展,推动全世界的优秀研究人员、实务人员、教育者间互相交流的国际性学术会议,每年举办一届,2021年计划2021年12月7-9日在新加坡实现线上线下会议。ICDF2C 2021年共收到?篇论文,录用25篇,录用率为?%,小编将一些跟自己相关的论文标记出来供大家查阅,所有录用论文标题如下:

  • Towards the Development of Cryptocurrencies Forensics Process Model (CFPM)

Taylor, Sarah Khadijah (CyberSecurity Malaysia); Zainol Ariffin, Khairul Akram (Universiti Kebangsaan Malaysia); Ariffin, Aswami (CyberSecurity Malaysia); Sheikh Abdullah, Siti Norul Huda (Universiti Kebangsaan Malaysia)

  • Quantifying Paging on Recoverable Data from Windows User-Space Modules

Martín-Pérez, Miguel (University of Zaragoza, Spain); Rodríguez, Ricardo J. (University of Zaragoza)

  • Android Malware Detection Based on Hybrid Analysis and Multimodal Deep Learning

Oliveira, Angelo (Universidade Nove de Julho); Sassi, Renato (Universidade Nove de Julho)

  • Forensic Investigations of Google Meet and Microsoft Teams – Two Popular Conferencing Tools in the Pandemic

Azhar, Hannan (Canterbury Christ Church University); Timms, Jake (Canterbury Christ Church University); Tilley, Benjamin (Canterbury Christ Church University)

  • On Establishing The Sub-Domain of ArtificialIntelligence (AI) Model Forensics

Edwards, Tiffanie (University of New Haven); McCullough, Syria (University of New Haven); Nassar, Mohamed (University of New Haven); Baggili, Ibrahim (University of New Haven)

  • Auto-Parser: Android Auto & Apple CarPlay

Mahr, Andrew (University of New Haven); Serafin, Robert (University of New Haven); Grajeda, Cinthya (University of New Haven); Baggili, Ibrahim (University of New Haven)

  • Find my IoT Device — An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows

Göbel, Thomas (Universität der Bundeswehr München); Uhlig, Frieder (Technische Universität Darmstadt); Baier, Harald (Universität der Bundeswehr München)

  • Accessing secure data on Android through application analysis

Le Khac, Nhien An (University College Dublin); Buurke, Richard (University College Dublin)

  • Research On The Method Of Selecting The Optimal Feature Subset In Big Data For Energy Analysis Attack

Duan, Xiaoyi (Beijing Electronic Science And Technology Institute); Li, You (Beijing Electronic Science And Technology Institute); Liu, Chengyuan (Beijing Electronic Science And Technology Institute); Li, Xiuying (Beijing Electronic Science And Technology Institute); Liu, Wenfeng (Beijing Electronic Science And Technology Institute); Li, Guoqian (Beijing Electronic Science And Technology Institute)

  • Cheating sensitive security quantum bit commitment with security distance function

Huang, Weicong (Nanjing University); Guang, Qisheng (Nanjing University); Chen, Lijun (Nanjing University)

  • Towards Mitigation of Data Exfiltration Techniques using the MITRE ATT&CK Framework

Mundt, Michael (Esri Deutschland GmbH); Baier, Harald (Bundeswehr University Munich)

  • PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality

Kanta, Aikaterini (University College Dublin); Coisel, Iwen (European Commission Joint Research Centre (DG JRC)); Scanlon, Mark (University College Dublin)

  • No Pie in The Sky: The Digital Currency Fraud Website Detection

Ou, Haoran (Sichuan University); Guo, Yongyan (Sichuan University); Huang, Chaoyi (Sichuan University); Zhao, Zhiying (Sichuan University); Guo, Wenbo (Sichuan University); Fang, Yong (Sichuan University); Huang, Cheng (Sichuan University)

  • Understanding the Brains and Brawn of IllicitStreaming App

Huang, Kong (Chinese University of Hong Kong); Zhang, Ke (Chinese University of Hong Kong); Chen, Jiong Yi (National University of Defence Technology); Sun, Meng Han (Chinese University of Hong Kong); Sun, Wei (Chinese University of Hong Kong); Tang, Di (Chinese University of Hong Kong); Zhang, Ke Huan (Chinese University of Hong Kong)

  • Fine-grained Obfuscation Scheme Recognition on Binary Code

Tian, Zhenzhou (Xi’an University of Posts and Telecommunications, Xi’an, China.); Mao, Hengchao (Xi’an University of Posts and Telecommunications, Xi’an, China.); Huang, Yaqian (Xi’an University of Posts and Telecommunications, Xi’an, China.); Tian, Jie (Xi’an University of Posts and Telecommunications, Xi’an, China.); Li, Jinrui (Xi’an University of Posts and Telecommunications, Xi’an, China.)

  • Backdoor Investigation and Incident Response: From Zero to Profit

Lai, Anthony Cheuk Tung (Hong Kong University of Science and Technology)

  • Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention

Li, Na (Artifcial Intelligence Research Center, National Innovation Institute of Defense Technology); Zhang, Haoyu (Artifcial Intelligence Research Center, National Innovation Institute of Defense Technology); Hu, Zhihui (Artifcial Intelligence Research Center, National Innovation Institute of Defense Technology); Kou, Guang (Artifcial Intelligence Research Center, National Innovation Institute of Defense Technology); Dai, Huadong (Artifcial Intelligence Research Center, National Innovation Institute of Defense Technology)

  • Cybercrime in the Age of Cryptocurrencies

Chawki, Mohamed (International Association of Cybercrime Prevention)

  • IoT Forensics: Device Identification and Investigation Routines

Scheidt, Nancy (University of Portsmouth); Adda, Mo (University of Portsmouth)

  • A CNN-based HEVC Video Steganalysis Against DCT/DST-Based Steganography

Zhang, Zhenzhen (Beijing Institute of Graphic Communication); Shi, Henan (Shanghai Jiao Tong University); Jiang, Xinghao (Shanghai Jiao Tong University); Li, Zhaohong (Beijing JiaoTong University); Liu, Jindou (Beijing JiaoTong University)

  • Do Dark Web and Cryptocurrencies Empower Cybercriminals?

Taleby Ahvanooey, Milad (School of Information Management, Nanjing University (NJU), P.R. China); Zhu, Mark Xuefang (School of Information Management, Nanjing University (NJU), P.R. China); Mazurczyk, Wojciech (Institute of Computer Science, Faculty of Electronics and Information Technology, Warsaw University of Technology (WUT), Poland.); Kilger, Max (Department of Information Systems and Cyber Security, University of Texas at San Antonio (UTSA), San Antonio, USA.); Choo, Kim-Kwang Raymond (Department of Information Systems and Cyber Security, University of Texas at San Antonio (UTSA), San Antonio, USA.)

  • Lightweight On-demand Honeypot Deployment for Cyber Deception

Acosta, Jaime (DEVCOM Army Research Laboratory); Basak, Anjon (DEVCOM Army Research Laboratory); Kiekintveld, Christopher (The University of Texas at El Paso); Kamhoua, Charles (Army Research Lab)

  • Gotta Catch’em All! Improving P2P Network Crawling Strategies

Mühle, Alexander (Hasso Plattner Institute, University of Potsdam, Germany); Grüner, Andreas (Hasso Plattner Institute, University of Potsdam, Germany); Meinel, Christoph (Hasso Plattner Institute, University of Potsdam, Germany)

  • Parcae: A Blockchain-Based PRF Service for Everyone

Wyss, Elizabeth (University of Kansas); Davidson, Drew (University of Kansas)

  • A Hybrid Cloud Deployment Architecture For Privacy-preserving Collaborative Genome-Wide Association Studies

Boujdad, Fatima-zahra (IMT Atlantique, LS2N); Niyitegeka, David (IMT Atlantique); Bellafqira, Reda (IMT Atlantique); Coatrieux, Gouenou (IMT Atlantique); Genin, Emmanuelle (INSERM); Südholt, Mario (IMT Atlantique, LS2N)

会议地址
https://icdf2c.eai-conferences.org/2021/

安全学术圈招募队友-ing, 有兴趣加入学术圈的请联系secdr#qq.com

文章来源: http://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247486406&idx=1&sn=8477c88903afd00c7bdf3d282fba9508&chksm=fe2ef44dc9597d5b9873c1afea8753847599fef65d8b0ffacebea6904c5bc712c6ed68058555#rd
如有侵权请联系:admin#unsafe.sh