Abstract is missing.
- Quantifying Paging on Recoverable Data from Windows User-Space ModulesMiguel Martín-Pérez, Ricardo J. Rodríguez. 1-19 [doi]
- Forensic Investigations of Google Meet and Microsoft Teams - Two Popular Conferencing Tools in the PandemicM. A. Hannan Bin Azhar, Jake Timms, Benjamin Tilley. 20-34 [doi]
- On Exploring the Sub-domain of Artificial Intelligence (AI) Model ForensicsTiffanie Edwards, Syria McCullough, Mohamed Nassar, Ibrahim M. Baggili. 35-51 [doi]
- Auto-Parser: Android Auto and Apple CarPlay ForensicsAndrew Mahr, Robert Serafin, Cinthya Grajeda, Ibrahim M. Baggili. 52-71 [doi]
- Find My IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic FlowsThomas Göbel, Frieder Uhlig, Harald Baier. 72-92 [doi]
- Accessing Secure Data on Android Through Application AnalysisRichard Buurke, Nhien-An Le-Khac. 93-108 [doi]
- Research on the Method of Selecting the Optimal Feature Subset in Big Data for Energy Analysis AttackXiaoyi Duan, You Li, Chengyuan Liu, Xiuying Li, Wenfeng Liu, Guoqian Li. 109-126 [doi]
- Cheating Sensitive Security Quantum Bit Commitment with Security Distance FunctionWeicong Huang, Qisheng Guang, Dong Jiang, Lijun Chen 0006. 127-138 [doi]
- Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK FrameworkMichael Mundt, Harald Baier. 139-158 [doi]
- PCWQ: A Framework for Evaluating Password Cracking Wordlist QualityAikaterini Kanta, Iwen Coisel, Mark Scanlon. 159-175 [doi]
- No Pie in the Sky: The Digital Currency Fraud Website DetectionHaoran Ou, Yongyan Guo, Chaoyi Huang, Zhiying Zhao, Wenbo Guo 0011, Yong Fang 0002, Cheng Huang 0003. 176-193 [doi]
- Understanding the Brains and Brawn of Illicit Streaming AppKong Huang, Ke Zhang, Jiongyi Chen, Menghan Sun, Wei Sun, Di Tang, Kehuan Zhang. 194-214 [doi]
- Fine-Grained Obfuscation Scheme Recognition on Binary CodeZhenzhou Tian, Hengchao Mao, Yaqian Huang, Jie Tian, Jinrui Li. 215-228 [doi]
- Backdoor Investigation and Incident Response: From Zero to ProfitAnthony Cheuk Tung Lai, Ken Wai Kin Wong, Johnny Tsz Wun Wong, Austin Tsz Wai Lau, Alan Po Lun Ho, Shuai Wang, Jogesh Muppala. 229-247 [doi]
- Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self AttentionNa Li, Haoyu Zhang, Zhihui Hu, Guang Kou, Huadong Dai. 248-264 [doi]
- A CNN-Based HEVC Video Steganalysis Against DCT/DST-Based SteganographyZhenzhen Zhang, Henan Shi, Xinghao Jiang, Zhaohong Li, Jindou Liu. 265-276 [doi]
- Do Dark Web and Cryptocurrencies Empower Cybercriminals?Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Max Kilger, Kim-Kwang Raymond Choo. 277-293 [doi]
- Lightweight On-Demand Honeypot Deployment for Cyber DeceptionJaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Charles A. Kamhoua. 294-312 [doi]
- Gotta Catch'em All! Improving P2P Network Crawling StrategiesAlexander Mühle, Andreas Grüner, Christoph Meinel. 313-327 [doi]
- Parcae: A Blockchain-Based PRF Service for EveryoneElizabeth Wyss, Drew Davidson. 328-341 [doi]
- A Hybrid Cloud Deployment Architecture for Privacy-Preserving Collaborative Genome-Wide Association StudiesFatima-zahra Boujdad, David Niyitegeka, Reda Bellafqira, Gouenou Coatrieux, Emmanuelle Génin, Mario Südholt. 342-359 [doi]
- Understanding the Security of Deepfake DetectionXiaoyu Cao, Neil Zhenqiang Gong. 360-378 [doi]