| Record Type: |
Electronic resources
: Monograph/item
|
| Title/Author: |
Availability, reliability and security/ edited by Bart Coppens ... [et al.]. |
| Reminder of title: |
ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings. |
| remainder title: |
ARES 2025 |
| other author: |
Coppens, Bart. |
| corporate name: |
International Conference on Availability, Security, and Reliability |
| Published: |
Cham :Springer Nature Switzerland : : 2025., |
| Description: |
xxv, 366 p. :ill. (some col.), digital ;24 cm. |
| [NT 15003449]: |
18th International Workshop on Digital Forensics (WSDF 2025): Forensic Insights into Windows 11's Capability Access Manager Artifacts -- Reconstructing File Versions and Timestamps: Challenges and Guidelines in Network Forensics -- Measuring the effectiveness of keyword lists in digital forensics -- Money on My Mind: Forensic Investigation of Venmo Payment App -- Forensic Analysis of AI Systems - A Replika "AI Companion" Example -- An AI-Based Network Forensic Readiness Framework for Resource-Constrained Environments -- Mapping the Research Landscape - An Exploratory Analysis of AI Applications in Digital Forensics -- The impact of anti-forensic techniques on data-driven digital forensics: anomaly detection case study. 14th International Workshop on Cyber Crime (IWCC 2025): Generating Deepfakes with Stable Diffusion, ControlNet, and LoRA -- Towards Creating a Darknet Image Database -- Hello, won't you tell me your name?: Investigating Anonymity Abuse in IPFS -- Countering Financial Cyber Crime: New Method for Subsequent Steps Analysis in Large Complex Graphs of Financial Transactions -- From Sign-Up to Multi-Million Revenues: A Deep Dive into Vendors on Darknet Marketplaces. 9th International Workshop on Cyber Use of Information Hiding (CUING 2025): Contextual Coherence Evaluation of Perfectly Secure Steganography in Text Documents -- Robust Hashing meets Inpainting -- Describing Steganography Hiding Methods by Combining Pre-Existing Methodology -- Calyptography: Secure Secret Storage Inspired by Cryptography and Steganography -- An Independent Secure Authentication System against False Positive/Negative attacks in SVD Based Watermarking: Design and Implementation -- Entropy-Aware Secret Data Embedding for Network Storage Channels -- ReWaP: Reversible Watermarking and Paillier Encryption Approach for Privacy-Preserving Smart Meter. |
| Contained By: |
Springer Nature eBook |
| Subject: |
Computer security - Congresses. - |
| Online resource: |
https://doi.org/10.1007/978-3-032-00635-6 |
| ISBN: |
9783032006356 |