


default search action
ISDFS 2024: San Antonio, TX, USA
- 12th International Symposium on Digital Forensics and Security, ISDFS 2024, San Antonio, TX, USA, April 29-30, 2024. IEEE 2024, ISBN 979-8-3503-3036-6

- Yagmur Çigdem Aktas, Jorge García Castaño:

Few-Shot Multi-Label Multi-Class Classification for Dark Web Image Categorization. 1-6 - Anna Forster, Carlo Lucheroni

, Stefan Gürtler:
Decoding DOOH Viewability using YOLO for Privacy-Friendly Human Silhouette Identification on LiDAR Point Clouds. 1-6 - Hala Strohmier

, Vincent Langner, Fardeen Mohamed, Ethan Wood:
Examination of Artificial Intelligence Integration and Impact on Higher Education. 1-6 - Ashfak Md Shibli, Mir Mehedi A. Pritom, Maanak Gupta:

AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns. 1-6 - Jonas Vasconcelos Bistene

, Clayton Escouper das Chagas
, Anderson Fernandes Pereira dos Santos, Gabriela Moutinho de Souza Dias, Ronaldo Moreira Salles
:
ForTT-Gen: Network Traffic Generator for Malware Forensics Analysis Training. 1-6 - Trent Menard, Mahmoud Abouyoussef:

Towards Privacy-Preserving Vehicle Digital Forensics: A Blockchain Approach. 1-6 - Eva Tuba, Ahad Nasab, Asaf Varol:

Welcome Note from Co-Chairs. 1-2 - Hafzullah Is:

LLM-Driven SAT Impact on Phishing Defense: A Cross-Sectional Analysis. 1-5 - Mario Raciti

, Giampaolo Bella
:
Behind the (Digital Crime) Scenes: An MSC Model. 1-6 - Anandhu Santhosh, Narayanan Subramanian:

Classify Attacks Based on Blockchain Components. 1-6 - Sagiru Mati

, Irfan Civcir
, Salim Jibrin Danbatta
, Asaf Varol
, Ahad Nasab
, Ahmad Muhammad
, Sani Isah Abba
:
Demystifying Knitr Package: Essential Recipes and Easy Steps for Adding Knit-Engines in R. 1-6 - Richard Ikuesan, Farkhund Iqbal, Abdul Kadhim Hayawi:

Infeasibility of Sequitur-Based Motif for Mouse Dynamics in Digital Forensics. 1-7 - Islam Elsadek

, Eslam Yahya Tawfik:
Efficient Programable Architecture for LWC NIST FIPS Standard ASCON. 1-5 - Sevinç Ay, Songül Karabatak, Murat Karabatak:

Examination of Object Tracking Studies using Deep Learning: A Bibliometric Analysis Study. 1-6 - Irem Zehra Altun, Abdurrahman Emre Özkök:

Securing Artificial Intelligence: Exploring Attack Scenarios and Defense Strategies. 1-6 - Senay A. Gebreab

, Khaled Salah, Raja Jayaraman, Muhammad Habib Ur Rehman, Samer Ellahham:
LLM-Based Framework for Administrative Task Automation in Healthcare. 1-7 - Ezgi Gucuyener, M. Amaç Güvensan:

Towards Next-Generation Smart Sandboxes: Comprehensive Approach to Mobile Application Security. 1-6 - Songül Karabatak, Müslim Alanoglu, Murat Karabatak:

Examining the Relationship Between Digital Well-Being, Digital Hoarding and Mobile Information Security Awareness with Association Rule. 1-6 - Sabrina Friedl

, Günther Pernul:
Forensic Analysis of an IoT ARP Spoofing Attack. 1-7 - Zardasht Abdulaziz Shwany, Shayda Khudhur Ismail, Karwan Khoshnaw, Twana Mustafa, Murat Karabatak, Nashwan Adnan Othman:

A Real-Time Hand Sign Language Recognition System for Threatening Situations Using Deep Learning. 1-6 - Marius Butz, Matthias Wölfel:

Evaluation of Different Passive Methods for Liveness Detection. 1-6 - Sarah Adair, Cihan Varol, Fan Liang, Vung Pham:

Malware API Call-Based Multiclass-Classification Using Machine Learning and Deep Learning. 1-7 - Cetin Arslan, Sefa Ata

:
The Reliability of Digital Evidence in Criminal Proceedings and the Potential Utilization of Artificial Intelligence in the Evidence Evaluation Process. 1-4 - Chiamaka Femi-Adeyinka, Nuri Alperen Kose, Tosin Akinsowon, Cihan Varol:

Digital Forensics Analysis of YouTube, Instagram, and TikTok on Android Devices: A Comparative Study. 1-6 - Kossi Bissadu, Gahangir Hossain

, Leela Pavani Velagala, Salleh Sonko
:
Analyzing Insider Cyber Threats and Human Factors within the Framework of Agriculture 5.0. 1-5 - Collins Mbwika Mwange

, Ebru Celikel Cankaya:
Android Trojan Horse Spyware Attack: A Practical Implementation. 1-5 - Kasturi Uday Aditya, Prateek N. Kamath, Yuktha Poral, Baddela Divya Mallika, Vadiraja A

:
Framework for Early Cyber Attack Detection Using ML Models Deployed On Fog Devices. 1-6 - Dina Millatina, Eko Hadi Gunawan, Bambang Sugiantoro:

Forensic Analysis of WhatsApp, Instagram, and Telegram on Virtual Android Device. 1-4 - Ryan Barron

, Maksim Ekin Eren, Manish Bhattarai, Selma Wanna, Nick Solovyev, Kim Ø. Rasmussen, Boian S. Alexandrov
, Charles Nicholas, Cynthia Matuszek:
Cyber-Security Knowledge Graph Generation by Hierarchical Nonnegative Matrix Factorization. 1-6 - Fazal-ur Rehman, Joudat Hashmi, Moiz Abdullah, Hafsah Zaman:

Guarding Voices, Protecting Homes: A Comprehensive Case Study on Voice Assistant Security in Smart Living. 1-6 - Tuncay Cigal, Erkan Tanyildizi:

Discovery of New Chaotic Systems: Based on Existing Systems. 1-4 - Ines Vega, José Valencia, Ángel Arcos, Danny Navarrete, Maria G. Baldeon Calisto:

A Comparison Between Transformers and Foundation Models in Sentiment Analysis of Student Evaluation of Teaching. 1-7 - LD Herrera

, John D. Hastings
:
The Trajectory of Romance Scams in the U.S. 1-6 - Matvei Popov, Eva Tuba:

Credible Diffusion: Improving Diffusion Models Interpretability with Transformer Embeddings. 1-6 - Hanyu Wu, Ke Yan, Peng Xu, Bei Hui, Ling Tian:

Adversarial Cross-laser Attack: Effective Attack to DNNs in the Real World. 1-6 - Inês Alves, Paulo Teixeira

, Nuno Lopes
:
Evolutionary analysis of adherence to the ISO 27001:2013 standard in Portugal: Regional and sectoral study. 1-5 - Lucy Tsado, Camille Gibson, Izzat Alsmadi, Janaya Bob:

Cyber Ready Rural: Understanding Law Enforcement Cyber Readiness. 1-5 - Arifa I. Champa, Md. Fazle Rabbi, Minhaz F. Zibran:

Why Phishing Emails Escape Detection: A Closer Look at the Failure Points. 1-6 - Vismaya Vijayan, Kurunandan Jain

, Narayanan Subramanian:
Chaos-Based Stream Ciphers for 5G Inter-Slice Network Security. 1-6 - Prashant Vajpayee, Gahangir Hossain

:
Multi-Tenant Cloud Security- Risk Prediction through Cyber-Value-at-Risk (CVaR). 1-7 - Murat Bakirci, Irem Bayraktar:

YOLOv9-Enabled Vehicle Detection for Urban Security and Forensics Applications. 1-6 - Onyeka Ezenwoye, Eduard Pinconschi:

A Study of Fine-Tuned Language Models in Vulnerability Classification. 1-6 - Lilita Infante, Roger A. Hallman

, John Hays, Evelyn Cronnon
, Uri Stav:
Recovery CAT: A Digital Forensics Tool for Cryptocurrency Investigations. 1-5 - Durga Srikari Maguluri, Leela Pavani Velagala, Gahangir Hossain

:
Securing Healthcare 5.0: Exploring BYOD Cyber Risks, Misuse Cases, and Best Practices. 1-6 - Merve Akkus

, Murat Karabatak
, Ramazan Tekin
:
Classification of ECG Signals Encrypted with CNN Based Autoencoder with LSTM. 1-6 - Kubra Gundogan

, Jeffrey Berg, Cihan Varol:
Investigating YouTube, TikTok, and Instagram Social Media Interactions on Chrome and Edge Browsers. 1-6 - Selma Güzel, Erkan Uslu

, Sirma Yavuz:
Occupancy Grid Map Completion Based on Geometric Features and Door Discovery. 1-6 - Nurettin Selcuk Senol, Amar Rasheed, Narasimha K. Shashidhar:

Mobile Forensic Investigation: Extractions and Connectivity Isolation in Phones Utilizing eSIM, iSIM Technology. 1-6 - Tyler Nichols, Jack Zemlanicky, Zhirui Luo, Qingqing Li, Jun Zheng:

Image-based PDF Malware Detection Using Pre-trained Deep Neural Networks. 1-5 - Bradley Boswell

, Seth Barrett, Gokila Dorai:
Unraveling IoT Traffic Patterns: Leveraging Principal Component Analysis for Network Anomaly Detection and Optimization. 1-6 - Manuel Alejandro Cardona-López

, Juan Carlos Chimal-Eguía, Víctor Manuel Silva García, Rolando Flores-Carapia:
Key Exchange with Diffie-Hellman Protocol and Composite Hash-Functions. 1-6 - Deka Julian Arrizki, Stefanus A. Kosim

, Hudan Studiawan:
Stream Clustering on a Forensic Timeline. 1-6 - Ömer Miraç Kökçam

, Aytug Boyaci
, Muhammed Emre Çolak
:
Deep Learning based Brain Tumor Classification for MR Images using ResNet50. 1-6 - Pinar Savci, Bihter Das:

Multi-Label Classification in Text Data: An Examination on Innovative Technologies. 1-4 - Shema Alenazi, Sumaya Alshokeeran, Sultan AlThaqeel:

Exploring Security, Privacy, and Forensics Concerns in the Metaverse. 1-6 - Milan Tuba:

Keynote Speaker of ISDFS 2024. 1-2 - Murat Bakirci, Muhammed Mirac Ozer

:
Enhancing Forensic Analysis with Autonomous UAV Deployment for Aerial Investigation. 1-6 - Tomojit Ghosh, Shahnewaz Karim Sakib:

Enhanced UAV Security: Optimizing Accuracy and Efficiency with MSBCE Feature Selection. 1-6 - Lakshmi Priya Krishnan, Iman Vakilinia, Sandeep Reddivari

, Sanjay Ahuja:
Analyzing Cryptocurrency Social Media for Price Forecasting and Scam Detection. 1-6 - Sri Harsha Mekala

, Zubair A. Baig, Adnan Anwar, Naeem Syed
:
Evaluation and Analysis of a Digital Forensic Readiness Framework for the IIoT. 1-6 - Kelly O'Brien, Liam Brown, Joaquim Gonçalves

:
Investigation of Efficiency and Accuracy of Deep Learning Models and Features with Electroencephalogram (EEG) Data for Binary Classification. 1-5 - Taufiq Odhi Dwi Putra, Royyana Muslim Ijtihadie, Tohari Ahmad

:
Load Characterization of AI Applications using DQoES Scheduler for Serving Multiple Requests. 1-6 - Lakshmi Priya Krishnan, Iman Vakilinia, Sandeep Reddivari

, Sanjay Ahuja:
Handling Imbalanced Data for Detecting Scams in Ethereum Transactions Using Sampling Techniques. 1-6 - Hamadou Saliah-Hassane:

Keynote Speaker of ISDFS 2024. 1-2 - Shahnewaz Karim Sakib, Tomojit Ghosh:

Evaluation of Privacy-Utility Tradeoff in Generative Adversarial Network Variants. 1-6 - Shan Liu, Hanfei Zhao:

Opinions Evolution Analysis in Time-varying Social Networks: A Silent Spiral Opinion Model. 1-6 - Akila Wickramasekara, Mark Scanlon:

A Framework for Integrated Digital Forensic Investigation Employing AutoGen AI Agents. 1-6 - Ganesh Kumar Murugesan

:
Cloud Cost Factors and AWS Cost Optimization Techniques. 1-7 - Supriya Bandal, Suman Rath:

Unveiling Digital Secrets: An Image Text Vision App for Enhanced Digital Forensics Investigations. 1-6 - Muhammed Esad Oztemel, Ömer Muhammet Soysal:

Effect of Signal Conditioning and Evoked-Potential Based Representation on Stability and Distinctiveness of EEG Brain Signatures. 1-7 - Murat Bakirci, Irem Bayraktar:

Boosting Aircraft Monitoring and Security through Ground Surveillance Optimization with YOLOv9. 1-6 - Hafiz Bilal Ahmad, Haichang Gao, Naila Latif, Abdul Aziiz, Muhammad Auraangzeb, Muhammad Tanveer Khan:

Adversarial Machine Learning for Detecting Advanced Threats Inspired by StuxNet in Critical Infrastructure Networks. 1-7 - Sebástion Granizo, Maria G. Baldeon Calisto, Milena Iñiguez, Danny Navarrete, Daniel Riofrío, Noel Pérez-Pérez, Diego S. Benítez, Ricardo Flores Moyano:

A Comparative Analysis of Vision Transformers and Convolutional Neural Networks in Cardiac Image Segmentation. 1-7 - Kunpeng Cao, Leyi Zhang:

Research on Network Security Measurement on the Basis of Defense-In-Depth. 1-7 - Günes Gürsoy

, Asaf Varol
, Ahad Nasab
:
DNS Tunnel Problem In Cybersecurity. 1-6 - Nikhil Rane, Amna Qureshi:

Comparative Analysis of Automated Scanning and Manual Penetration Testing for Enhanced Cybersecurity. 1-6 - Pranav Kalariya, Manthan Jethva, Yasser M. Alginahi:

ML Assisted Web Application Firewall. 1-6 - Arun K. Mani, Oluwasola Mary Adedayo

:
Dynamic Calculation of Password Salts for Improved Resilience towards Password Cracking Algorithms. 1-6 - Jordan Shropshire, Todd McDonald:

Assessing the Integrity of Mobile Platform-Based Sensor Data Pipelines. 1-6 - Christopher Lowetz, Grant Shepard, Joel Coffman:

Anti-forensics Under Scrutiny Assessing the Effectiveness of Digital Obfuscation in the Cloud. 1-6 - Aayushman Singh

, Kurunandan Jain
:
Text Encryption Using Audio with Multiple Chaotic Maps. 1-5 - Tunahan Gokcimen, Bihter Das:

Comparison of Pretrained Models for Optimized Transformer Based Question Answering System. 1-5 - Hala Strohmier

, James R. Lowe, Angel G. Rodriguez, Miles M. Trammell:
Security and Privacy Threats Posed by IoT Devices Used by Students on College Campuses. 1-6 - Pedro Marques, Alfie Beard, Jonathan Roscoe:

Assessing the Health of a Network Under Attack. 1-7 - Fnu Aakanksha, Avinash Kumar, Cihan Varol, Hyuk Cho, Amar Rasheed:

Persistent Browser Storage Data Extractor. 1-5 - Harem Ali Kheder

, Asaf Varol
:
Contribution of Algorithm Visualizations to Students' Learning Skills: A Pedagogical Approach. 1-6 - Jahirul Islam, Sabuj Saha, Mahadi Hasan, Alvi Mahmud, Musfika Jannat:

Cognitive Modelling of Bankruptcy Risk: A Comparative Analysis of Machine Learning Models to Predict the Bankruptcy. 1-6 - Mithun M, Saranya Chandran:

AndroPack: A Hybrid Method To Detect Packed Android Malware With Ensemble Learning. 1-4 - Abduljalil Alblooshi, Naser Aljneibi, Farkhund Iqbal, Richard Ikuesan, Mohamad Badra, Zainab Khalid:

Smartphone Forensics: A Comparative Study of Common Mobile Phone Models. 1-6 - Sahilkumar K. Ahir, Oluwasola Mary Adedayo

:
Multimedia Forensics: Preserving Video Integrity with Blockchain. 1-6 - Zefang Liu:

A Review of Advancements and Applications of Pre-Trained Language Models in Cybersecurity. 1-10 - Ayesh Meepaganithage

, Suman Rath, Mircea Nicolescu, Monica N. Nicolescu, Shamik Sengupta:
Image Forgery Detection Using Convolutional Neural Networks. 1-6 - Sevinç Ay, Songül Karabatak, Murat Karabatak:

Investigation of Teacher Candidates' Digital Obesity. 1-5 - Abdullahi Modibbo Abdullahi, Wassila Lalouani, Messaoud Rahim

:
A Robust Misbehavior Detection System for Cooperative Driving Network. 1-6 - Akshit Naithani

, Vrishin Jain, Tanish Singh Rajpal
, Vansh Mistry:
AI based Goalkeeper for Penalty Shot Prediction using RNN and Pattern Matching Algorithm. 1-7 - Sérgio Lopes

, Patrícia Leite
, Sandro Carvalho, Paulo Teixeira
:
Using ITIL as part of the NIST Cybersecurity Framework. 1-6 - M. Jahanzeb Khan, Suman Rath, Muhammad Hassan Zaib

:
Privacy-Enhanced Image Restoration in Remote Sensing via Federated Learning. 1-6 - Naresh Kshetri, Dilip Kumar

, James Hutson, Navneet Kaur, Omar Faruq Osama:
AlgoXSSF: Detection and Analysis of Cross-Site Request Forgery (XSRF) and Cross-Site Scripting (XSS) Attacks via Machine Learning Algorithms. 1-8 - Julia Alford, Eva Tuba:

Cassava Plant Disease Detection Using Transfer Learning with Convolutional Neural Networks. 1-6 - Iwan Handovo Putro, Tohari Ahmad

:
Feature Selection Using Pearson Correlation with Lasso Regression for Intrusion Detection System. 1-6 - Christos Liambas, Athanasios Manios

:
Performance Comparison Analysis of Digital Forensic Tools in Various Operating Systems. 1-5 - Dan Wang, Liangyu Dong, Hua Tang, Junjie Gu, Ziwei Liu, Xintong You:

SDN Security Channel Constructed Using SM9. 1-5 - Görkem Gök

, Aytug Boyaci
, Mustafa Ulas
:
Comparison of IDS in IoT, Mobile and Cloud based Systems. 1-7 - Timea Bezdan

, Ivana Strumberger, Milan Tuba:
Optimizing Machine Learning for Breast Cancer Detection by Hybrid Metaheuristic Approach. 1-6 - Sevinç Ay, Songül Karabatak, Murat Karabatak:

Bibliometric Analysis of Artificial Intelligence in Utilized Distance Education and Distance Learning Studies. 1-5 - Mario Merendon, Cihan Varol, Narasimha K. Shashidhar, Kirk Burns:

iOS Mobile Forensics Methodologies, Extracting Biome Artifacts, and Overlooked Artifacts Needed to Improve Investigations. 1-7 - Sagiru Mati

, Salim Jibrin Danbatta
, Asaf Varol
, Ahad Nasab
, Abdullahi Garba Usman
, Berna Uzun
, Ahmad Muhammad
:
Econometric and AI-Based Modelling of Nigeria's Interest Rates Based on Fisher Equation. 1-6 - Shafi Parvez Mohammed, Gahangir Hossain

, Syed Yaseen Quadri Ameen:
Cybersecurity Data Visualization: Designing a Course for Future High School Students. 1-7 - Alejandra de la Torre, Maria G. Baldeon Calisto:

Generative Artificial Intelligence in Latin American Higher Education: A Systematic Literature Review. 1-7 - Songül Karabatak, Müslim Alanoglu, Ebru Polat:

Investigation of Teachers' Knowledge Management and Knowledge Hiding Behaviors. 1-6 - Kubra Gundogan

, Khushi Gupta, Laura Garland, Cihan Varol, Narasimha K. Shashidhar:
Identifying Malware Family with String Matching Algorithms Based on API Calls and Entire Strings. 1-7 - Sai Bharadwaj Sirivaram, Sankardas Roy:

Deleted File Recovery for the Linux File System (Ext4): Finding the State-of-the-Art. 1-6 - Maksim Ekin Eren, Ryan Barron

, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Ø. Rasmussen, Boian S. Alexandrov
, Charles Nicholas:
Catch'em all: Classification of Rare, Prominent, and Novel Malware Families. 1-6 - Rashad Aliyev

:
A Comprehensive Spectrum of Open Ports: A Global Internet Wide Analysis. 1-4 - Songül Karabatak, Ebru Polat, Müslim Alanoglu:

Investigation of Teacher Candidates' Digital Well-Being Levels with Respect to Various Variables. 1-5 - Tunahan Gokcimen, Bihter Das:

Topic Modelling Using BERTopic for Robust Spam Detection. 1-5 - Naresh Kshetri, Rahul Mishra, Mir Mehedi Rahman

, Tanja Steigner:
HNMblock: Blockchain Technology Powered Healthcare Network Model for Epidemiological Monitoring, Medical Systems Security, and Wellness. 1-8 - Zeynep Senturk, Erdal Irmak:

Persistence Techniques in Microsoft Active Directory: Detection and Mitigation Strategies. 1-6 - Muhammad Rusyaidi Zunaidi, Asanka P. Sayakkara, Mark Scanlon:

A Digital Forensic Methodology for Encryption Key Recovery from Black-Box IoT Devices. 1-7 - Dhruv Suvarna, Mahesh KM, Mahika Gupta, Sonal Gabburi, Prasad B. Honnavalli, Sapna VM

:
The Development of a Digital Forensic Framework for Ease of Forensic Analysis. 1-5 - Pinar Savci, Bihter Das:

Structured Named Entity Recognition (NER) in Biomedical Texts Using Pre-Trained Language Models. 1-5 - Anil Sezgin, Aytug Boyaci:

Advancements in Object Detection for Unmanned Aerial Vehicles: Applications, Challenges, and Future Perspectives. 1-6 - Khouloud Samrouth, Nicolas Beuve, Olivier Déforges, Nader Bakir, Wassim Hamidouche

:
Ensemble Learning Model for Face Swap Detection. 1-5 - José Martinho, Diogo Mendes, Pedro Pinto

:
ORAT - An Open Redirect Analysis Tool. 1-5 - Thomas Harris

, Mabrouka Abuhmida
, Richard Ward:
Understanding Microbenchmark Detection of Existing Exploits in Apple M1 and M2 Chips. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














