default search action
ISDFS 2024: San Antonio, TX, USA
- 12th International Symposium on Digital Forensics and Security, ISDFS 2024, San Antonio, TX, USA, April 29-30, 2024. IEEE 2024, ISBN 979-8-3503-3036-6
- Yagmur Çigdem Aktas, Jorge García Castaño:
Few-Shot Multi-Label Multi-Class Classification for Dark Web Image Categorization. 1-6 - Anna Forster, Carlo Lucheroni, Stefan Gürtler:
Decoding DOOH Viewability using YOLO for Privacy-Friendly Human Silhouette Identification on LiDAR Point Clouds. 1-6 - Hala Strohmier, Vincent Langner, Fardeen Mohamed, Ethan Wood:
Examination of Artificial Intelligence Integration and Impact on Higher Education. 1-6 - Ashfak Md Shibli, Mir Mehedi A. Pritom, Maanak Gupta:
AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns. 1-6 - Jonas Vasconcelos Bistene, Clayton Escouper das Chagas, Anderson Fernandes Pereira dos Santos, Gabriela Moutinho de Souza Dias, Ronaldo Moreira Salles:
ForTT-Gen: Network Traffic Generator for Malware Forensics Analysis Training. 1-6 - Trent Menard, Mahmoud Abouyoussef:
Towards Privacy-Preserving Vehicle Digital Forensics: A Blockchain Approach. 1-6 - Eva Tuba, Ahad Nasab, Asaf Varol:
Welcome Note from Co-Chairs. 1-2 - Hafzullah Is:
LLM-Driven SAT Impact on Phishing Defense: A Cross-Sectional Analysis. 1-5 - Mario Raciti, Giampaolo Bella:
Behind the (Digital Crime) Scenes: An MSC Model. 1-6 - Anandhu Santhosh, Narayanan Subramanian:
Classify Attacks Based on Blockchain Components. 1-6 - Sagiru Mati, Irfan Civcir, Salim Jibrin Danbatta, Asaf Varol, Ahad Nasab, Ahmad Muhammad, Sani Isah Abba:
Demystifying Knitr Package: Essential Recipes and Easy Steps for Adding Knit-Engines in R. 1-6 - Richard Ikuesan, Farkhund Iqbal, Abdul Kadhim Hayawi:
Infeasibility of Sequitur-Based Motif for Mouse Dynamics in Digital Forensics. 1-7 - Islam Elsadek, Eslam Yahya Tawfik:
Efficient Programable Architecture for LWC NIST FIPS Standard ASCON. 1-5 - Sevinç Ay, Songül Karabatak, Murat Karabatak:
Examination of Object Tracking Studies using Deep Learning: A Bibliometric Analysis Study. 1-6 - Irem Zehra Altun, Abdurrahman Emre Özkök:
Securing Artificial Intelligence: Exploring Attack Scenarios and Defense Strategies. 1-6 - Senay A. Gebreab, Khaled Salah, Raja Jayaraman, Muhammad Habib Ur Rehman, Samer Ellahham:
LLM-Based Framework for Administrative Task Automation in Healthcare. 1-7 - Ezgi Gucuyener, M. Amaç Güvensan:
Towards Next-Generation Smart Sandboxes: Comprehensive Approach to Mobile Application Security. 1-6 - Songül Karabatak, Müslim Alanoglu, Murat Karabatak:
Examining the Relationship Between Digital Well-Being, Digital Hoarding and Mobile Information Security Awareness with Association Rule. 1-6 - Sabrina Friedl, Günther Pernul:
Forensic Analysis of an IoT ARP Spoofing Attack. 1-7 - Zardasht Abdulaziz Shwany, Shayda Khudhur Ismail, Karwan Khoshnaw, Twana Mustafa, Murat Karabatak, Nashwan Adnan Othman:
A Real-Time Hand Sign Language Recognition System for Threatening Situations Using Deep Learning. 1-6 - Marius Butz, Matthias Wölfel:
Evaluation of Different Passive Methods for Liveness Detection. 1-6 - Sarah Adair, Cihan Varol, Fan Liang, Vung Pham:
Malware API Call-Based Multiclass-Classification Using Machine Learning and Deep Learning. 1-7 - Cetin Arslan, Sefa Ata:
The Reliability of Digital Evidence in Criminal Proceedings and the Potential Utilization of Artificial Intelligence in the Evidence Evaluation Process. 1-4 - Chiamaka Femi-Adeyinka, Nuri Alperen Kose, Tosin Akinsowon, Cihan Varol:
Digital Forensics Analysis of YouTube, Instagram, and TikTok on Android Devices: A Comparative Study. 1-6 - Kossi Bissadu, Gahangir Hossain, Leela Pavani Velagala, Salleh Sonko:
Analyzing Insider Cyber Threats and Human Factors within the Framework of Agriculture 5.0. 1-5 - Collins Mbwika Mwange, Ebru Celikel Cankaya:
Android Trojan Horse Spyware Attack: A Practical Implementation. 1-5 - Kasturi Uday Aditya, Prateek N. Kamath, Yuktha Poral, Baddela Divya Mallika, Vadiraja A:
Framework for Early Cyber Attack Detection Using ML Models Deployed On Fog Devices. 1-6 - Dina Millatina, Eko Hadi Gunawan, Bambang Sugiantoro:
Forensic Analysis of WhatsApp, Instagram, and Telegram on Virtual Android Device. 1-4 - Ryan Barron, Maksim Ekin Eren, Manish Bhattarai, Selma Wanna, Nick Solovyev, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas, Cynthia Matuszek:
Cyber-Security Knowledge Graph Generation by Hierarchical Nonnegative Matrix Factorization. 1-6 - Fazal-ur Rehman, Joudat Hashmi, Moiz Abdullah, Hafsah Zaman:
Guarding Voices, Protecting Homes: A Comprehensive Case Study on Voice Assistant Security in Smart Living. 1-6 - Tuncay Cigal, Erkan Tanyildizi:
Discovery of New Chaotic Systems: Based on Existing Systems. 1-4 - Ines Vega, José Valencia, Ángel Arcos, Danny Navarrete, Maria G. Baldeon Calisto:
A Comparison Between Transformers and Foundation Models in Sentiment Analysis of Student Evaluation of Teaching. 1-7 - LD Herrera, John D. Hastings:
The Trajectory of Romance Scams in the U.S. 1-6 - Matvei Popov, Eva Tuba:
Credible Diffusion: Improving Diffusion Models Interpretability with Transformer Embeddings. 1-6 - Hanyu Wu, Ke Yan, Peng Xu, Bei Hui, Ling Tian:
Adversarial Cross-laser Attack: Effective Attack to DNNs in the Real World. 1-6 - Inês Alves, Paulo Teixeira, Nuno Lopes:
Evolutionary analysis of adherence to the ISO 27001:2013 standard in Portugal: Regional and sectoral study. 1-5 - Lucy Tsado, Camille Gibson, Izzat Alsmadi, Janaya Bob:
Cyber Ready Rural: Understanding Law Enforcement Cyber Readiness. 1-5 - Arifa I. Champa, Md. Fazle Rabbi, Minhaz F. Zibran:
Why Phishing Emails Escape Detection: A Closer Look at the Failure Points. 1-6 - Vismaya Vijayan, Kurunandan Jain, Narayanan Subramanian:
Chaos-Based Stream Ciphers for 5G Inter-Slice Network Security. 1-6 - Prashant Vajpayee, Gahangir Hossain:
Multi-Tenant Cloud Security- Risk Prediction through Cyber-Value-at-Risk (CVaR). 1-7 - Murat Bakirci, Irem Bayraktar:
YOLOv9-Enabled Vehicle Detection for Urban Security and Forensics Applications. 1-6 - Onyeka Ezenwoye, Eduard Pinconschi:
A Study of Fine-Tuned Language Models in Vulnerability Classification. 1-6 - Lilita Infante, Roger A. Hallman, John Hays, Evelyn Cronnon, Uri Stav:
Recovery CAT: A Digital Forensics Tool for Cryptocurrency Investigations. 1-5 - Durga Srikari Maguluri, Leela Pavani Velagala, Gahangir Hossain:
Securing Healthcare 5.0: Exploring BYOD Cyber Risks, Misuse Cases, and Best Practices. 1-6 - Merve Akkus, Murat Karabatak, Ramazan Tekin:
Classification of ECG Signals Encrypted with CNN Based Autoencoder with LSTM. 1-6 - Kubra Gundogan, Jeffrey Berg, Cihan Varol:
Investigating YouTube, TikTok, and Instagram Social Media Interactions on Chrome and Edge Browsers. 1-6 - Selma Güzel, Erkan Uslu, Sirma Yavuz:
Occupancy Grid Map Completion Based on Geometric Features and Door Discovery. 1-6 - Nurettin Selcuk Senol, Amar Rasheed, Narasimha Shashidar:
Mobile Forensic Investigation: Extractions and Connectivity Isolation in Phones Utilizing eSIM, iSIM Technology. 1-6 - Tyler Nichols, Jack Zemlanicky, Zhirui Luo, Qingqing Li, Jun Zheng:
Image-based PDF Malware Detection Using Pre-trained Deep Neural Networks. 1-5 - Bradley Boswell, Seth Barrett, Gokila Dorai:
Unraveling IoT Traffic Patterns: Leveraging Principal Component Analysis for Network Anomaly Detection and Optimization. 1-6 - Manuel Alejandro Cardona-López, Juan Carlos Chimal-Eguía, Víctor Manuel Silva García, Rolando Flores-Carapia:
Key Exchange with Diffie-Hellman Protocol and Composite Hash-Functions. 1-6 - Deka Julian Arrizki, Stefanus A. Kosim, Hudan Studiawan:
Stream Clustering on a Forensic Timeline. 1-6 - Ömer Miraç Kökçam, Aytug Boyaci, Muhammed Emre Çolak:
Deep Learning based Brain Tumor Classification for MR Images using ResNet50. 1-6 - Pinar Savci, Bihter Das:
Multi-Label Classification in Text Data: An Examination on Innovative Technologies. 1-4 - Shema Alenazi, Sumaya Alshokeeran, Sultan AlThaqeel:
Exploring Security, Privacy, and Forensics Concerns in the Metaverse. 1-6 - Milan Tuba:
Keynote Speaker of ISDFS 2024. 1-2 - Murat Bakirci, Muhammed Mirac Ozer:
Enhancing Forensic Analysis with Autonomous UAV Deployment for Aerial Investigation. 1-6 - Tomojit Ghosh, Shahnewaz Karim Sakib:
Enhanced UAV Security: Optimizing Accuracy and Efficiency with MSBCE Feature Selection. 1-6 - Lakshmi Priya Krishnan, Iman Vakilinia, Sandeep Reddivari, Sanjay Ahuja:
Analyzing Cryptocurrency Social Media for Price Forecasting and Scam Detection. 1-6 - Sri Harsha Mekala, Zubair A. Baig, Adnan Anwar, Naeem Syed:
Evaluation and Analysis of a Digital Forensic Readiness Framework for the IIoT. 1-6 - Kelly O'Brien, Liam Brown, Joaquim Gonçalves:
Investigation of Efficiency and Accuracy of Deep Learning Models and Features with Electroencephalogram (EEG) Data for Binary Classification. 1-5 - Taufiq Odhi Dwi Putra, Royyana Muslim Ijtihadie, Tohari Ahmad:
Load Characterization of AI Applications using DQoES Scheduler for Serving Multiple Requests. 1-6 - Lakshmi Priya Krishnan, Iman Vakilinia, Sandeep Reddivari, Sanjay Ahuja:
Handling Imbalanced Data for Detecting Scams in Ethereum Transactions Using Sampling Techniques. 1-6 - Hamadou Saliah-Hassane:
Keynote Speaker of ISDFS 2024. 1-2 - Shahnewaz Karim Sakib, Tomojit Ghosh:
Evaluation of Privacy-Utility Tradeoff in Generative Adversarial Network Variants. 1-6 - Shan Liu, Hanfei Zhao:
Opinions Evolution Analysis in Time-varying Social Networks: A Silent Spiral Opinion Model. 1-6 - Akila Wickramasekara, Mark Scanlon:
A Framework for Integrated Digital Forensic Investigation Employing AutoGen AI Agents. 1-6 - Ganesh Kumar Murugesan:
Cloud Cost Factors and AWS Cost Optimization Techniques. 1-7 - Supriya Bandal, Suman Rath:
Unveiling Digital Secrets: An Image Text Vision App for Enhanced Digital Forensics Investigations. 1-6 - Muhammed Esad Oztemel, Ömer Muhammet Soysal:
Effect of Signal Conditioning and Evoked-Potential Based Representation on Stability and Distinctiveness of EEG Brain Signatures. 1-7 - Murat Bakirci, Irem Bayraktar:
Boosting Aircraft Monitoring and Security through Ground Surveillance Optimization with YOLOv9. 1-6 - Hafiz Bilal Ahmad, Haichang Gao, Naila Latif, Abdul Aziiz, Muhammad Auraangzeb, Muhammad Tanveer Khan:
Adversarial Machine Learning for Detecting Advanced Threats Inspired by StuxNet in Critical Infrastructure Networks. 1-7 - Sebástion Granizo, Maria G. Baldeon Calisto, Milena Iñiguez, Danny Navarrete, Daniel Riofrío, Noel Pérez-Pérez, Diego S. Benítez, Ricardo Flores Moyano:
A Comparative Analysis of Vision Transformers and Convolutional Neural Networks in Cardiac Image Segmentation. 1-7 - Kunpeng Cao, Leyi Zhang:
Research on Network Security Measurement on the Basis of Defense-In-Depth. 1-7 - Günes Gürsoy, Asaf Varol, Ahad Nasab:
DNS Tunnel Problem In Cybersecurity. 1-6 - Nikhil Rane, Amna Qureshi:
Comparative Analysis of Automated Scanning and Manual Penetration Testing for Enhanced Cybersecurity. 1-6 - Pranav Kalariya, Manthan Jethva, Yasser Alginahi:
ML Assisted Web Application Firewall. 1-6 - Arun K. Mani, Oluwasola Mary Adedayo:
Dynamic Calculation of Password Salts for Improved Resilience towards Password Cracking Algorithms. 1-6 - Jordan Shropshire, Todd McDonald:
Assessing the Integrity of Mobile Platform-Based Sensor Data Pipelines. 1-6 - Christopher Lowetz, Grant Shepard, Joel Coffman:
Anti-forensics Under Scrutiny Assessing the Effectiveness of Digital Obfuscation in the Cloud. 1-6 - Aayushman Singh, Kurunandan Jain:
Text Encryption Using Audio with Multiple Chaotic Maps. 1-5 - Tunahan Gokcimen, Bihter Das:
Comparison of Pretrained Models for Optimized Transformer Based Question Answering System. 1-5 - Hala Strohmier, James R. Lowe, Angel G. Rodriguez, Miles M. Trammell:
Security and Privacy Threats Posed by IoT Devices Used by Students on College Campuses. 1-6 - Pedro Marques, Alfie Beard, Jonathan Roscoe:
Assessing the Health of a Network Under Attack. 1-7 - Fnu Aakanksha, Avinash Kumar, Cihan Varol, Hyuk Cho, Amar Rasheed:
Persistent Browser Storage Data Extractor. 1-5 - Harem Ali Kheder, Asaf Varol:
Contribution of Algorithm Visualizations to Students' Learning Skills: A Pedagogical Approach. 1-6 - Jahirul Islam, Sabuj Saha, Mahadi Hasan, Alvi Mahmud, Musfika Jannat:
Cognitive Modelling of Bankruptcy Risk: A Comparative Analysis of Machine Learning Models to Predict the Bankruptcy. 1-6 - Mithun M, Saranya Chandran:
AndroPack: A Hybrid Method To Detect Packed Android Malware With Ensemble Learning. 1-4 - Abduljalil Alblooshi, Naser Aljneibi, Farkhund Iqbal, Richard Ikuesan, Mohamad Badra, Zainab Khalid:
Smartphone Forensics: A Comparative Study of Common Mobile Phone Models. 1-6 - Sahilkumar K. Ahir, Oluwasola Mary Adedayo:
Multimedia Forensics: Preserving Video Integrity with Blockchain. 1-6 - Zefang Liu:
A Review of Advancements and Applications of Pre-Trained Language Models in Cybersecurity. 1-10 - Ayesh Meepaganithage, Suman Rath, Mircea Nicolescu, Monica N. Nicolescu, Shamik Sengupta:
Image Forgery Detection Using Convolutional Neural Networks. 1-6 - Sevinç Ay, Songül Karabatak, Murat Karabatak:
Investigation of Teacher Candidates' Digital Obesity. 1-5 - Abdullahi Modibbo Abdullahi, Wassila Lalouani, Messaoud Rahim:
A Robust Misbehavior Detection System for Cooperative Driving Network. 1-6 - Akshit Naithani, Vrishin Jain, Tanish Singh Rajpal, Vansh Mistry:
AI based Goalkeeper for Penalty Shot Prediction using RNN and Pattern Matching Algorithm. 1-7 - Sérgio Lopes, Patrícia Leite, Sandro Carvalho, Paulo Teixeira:
Using ITIL as part of the NIST Cybersecurity Framework. 1-6 - M. Jahanzeb Khan, Suman Rath, Muhammad Hassan Zaib:
Privacy-Enhanced Image Restoration in Remote Sensing via Federated Learning. 1-6 - Naresh Kshetri, Dilip Kumar, James Hutson, Navneet Kaur, Omar Faruq Osama:
AlgoXSSF: Detection and Analysis of Cross-Site Request Forgery (XSRF) and Cross-Site Scripting (XSS) Attacks via Machine Learning Algorithms. 1-8 - Julia Alford, Eva Tuba:
Cassava Plant Disease Detection Using Transfer Learning with Convolutional Neural Networks. 1-6 - Iwan Handovo Putro, Tohari Ahmad:
Feature Selection Using Pearson Correlation with Lasso Regression for Intrusion Detection System. 1-6 - Christos Liambas, Athanasios Manios:
Performance Comparison Analysis of Digital Forensic Tools in Various Operating Systems. 1-5 - Dan Wang, Liangyu Dong, Hua Tang, Junjie Gu, Ziwei Liu, Xintong You:
SDN Security Channel Constructed Using SM9. 1-5 - Görkem Gök, Aytug Boyaci, Mustafa Ulas:
Comparison of IDS in IoT, Mobile and Cloud based Systems. 1-7 - Timea Bezdan, Ivana Strumberger, Milan Tuba:
Optimizing Machine Learning for Breast Cancer Detection by Hybrid Metaheuristic Approach. 1-6 - Sevinç Ay, Songül Karabatak, Murat Karabatak:
Bibliometric Analysis of Artificial Intelligence in Utilized Distance Education and Distance Learning Studies. 1-5 - Mario Merendon, Cihan Varol, Narasimha K. Shashidhar, Kirk Burns:
iOS Mobile Forensics Methodologies, Extracting Biome Artifacts, and Overlooked Artifacts Needed to Improve Investigations. 1-7 - Sagiru Mati, Salim Jibrin Danbatta, Asaf Varol, Ahad Nasab, Abdullahi Garba Usman, Berna Uzun, Ahmad Muhammad:
Econometric and AI-Based Modelling of Nigeria's Interest Rates Based on Fisher Equation. 1-6 - Shafi Parvez Mohammed, Gahangir Hossain, Syed Yaseen Quadri Ameen:
Cybersecurity Data Visualization: Designing a Course for Future High School Students. 1-7 - Alejandra de la Torre, Maria G. Baldeon Calisto:
Generative Artificial Intelligence in Latin American Higher Education: A Systematic Literature Review. 1-7 - Songül Karabatak, Müslim Alanoglu, Ebru Polat:
Investigation of Teachers' Knowledge Management and Knowledge Hiding Behaviors. 1-6 - Kubra Gundogan, Khushi Gupta, Laura Garland, Cihan Varol, Narasimha K. Shashidhar:
Identifying Malware Family with String Matching Algorithms Based on API Calls and Entire Strings. 1-7 - Sai Bharadwaj Sirivaram, Sankardas Roy:
Deleted File Recovery for the Linux File System (Ext4): Finding the State-of-the-Art. 1-6 - Maksim Ekin Eren, Ryan Barron, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Ø. Rasmussen, Boian S. Alcxandrov, Charles Nicholas:
Catch'em all: Classification of Rare, Prominent, and Novel Malware Families. 1-6 - Rashad Aliyev:
A Comprehensive Spectrum of Open Ports: A Global Internet Wide Analysis. 1-4 - Songül Karabatak, Ebru Polat, Müslim Alanoglu:
Investigation of Teacher Candidates' Digital Well-Being Levels with Respect to Various Variables. 1-5 - Tunahan Gokcimen, Bihter Das:
Topic Modelling Using BERTopic for Robust Spam Detection. 1-5 - Naresh Kshetri, Rahul Mishra, Mir Mehedi Rahman, Tanja Steigner:
HNMblock: Blockchain Technology Powered Healthcare Network Model for Epidemiological Monitoring, Medical Systems Security, and Wellness. 1-8 - Zeynep Senturk, Erdal Irmak:
Persistence Techniques in Microsoft Active Directory: Detection and Mitigation Strategies. 1-6 - Muhammad Rusyaidi Zunaidi, Asanka P. Sayakkara, Mark Scanlon:
A Digital Forensic Methodology for Encryption Key Recovery from Black-Box IoT Devices. 1-7 - Dhruv Suvarna, Mahesh KM, Mahika Gupta, Sonal Gabburi, Prasad B. Honnavalli, Sapna VM:
The Development of a Digital Forensic Framework for Ease of Forensic Analysis. 1-5 - Pinar Savci, Bihter Das:
Structured Named Entity Recognition (NER) in Biomedical Texts Using Pre-Trained Language Models. 1-5 - Anil Sezgin, Aytug Boyaci:
Advancements in Object Detection for Unmanned Aerial Vehicles: Applications, Challenges, and Future Perspectives. 1-6 - Khouloud Samrouth, Nicolas Beuve, Olivier Déforges, Nader Bakir, Wassim Hamidouche:
Ensemble Learning Model for Face Swap Detection. 1-5 - José Martinho, Diogo Mendes, Pedro Pinto:
ORAT - An Open Redirect Analysis Tool. 1-5 - Thomas Harris, Mabrouka Abuhmida, Richard Ward:
Understanding Microbenchmark Detection of Existing Exploits in Apple M1 and M2 Chips. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.