Abstract is missing.
- A Canary in the Voting Booth: Attacks on a Virtual Voting MachineMichael Madden, Dan Szafaran, Philomena Gray, Justin Pelletier, Ted Selker. 3-18 [doi]
- Catch Me if You Can: Analysis of Digital Devices and Artifacts Used in Murder CasesJohn Jankura, Hannah Catallo-Stooks, Ibrahim M. Baggili, Golden Richard. 19-32 [doi]
- Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, ReviewMichael Mundt, Harald Baier. 33-57 [doi]
- Identify Users on Dating Applications: A Forensic PerspectivePaul Stenzel, Nhien-An Le-Khac. 58-77 [doi]
- Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT ModelCheuk Yu Ip, Fu Kay Frankie Li, Yi Anson Lam, Siu-Ming Yiu. 78-95 [doi]
- Retruth Reconnaissance: A Digital Forensic Analysis of Truth SocialJoseph Brown, Ibrahim Baggili. 96-113 [doi]
- A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum AnalysisShuai Ren, Liming Ma, Qiuyu Feng. 117-131 [doi]
- A Multi-carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud ModelShuai Ren, Yuxiao Li, Bo Li, Hao Gong, Qiuyu Feng. 132-145 [doi]
- Point Cloud Model Information Hiding Algorithm Based on Multi-scale Transformation and Composite OperatorShuai Ren, Hao Gong, Huirong Cheng, Zejing Cheng. 146-161 [doi]
- An Information Hiding Algorithm Based on Multi-carrier Fusion State Partitioning of 3D ModelsShuai Ren, Bo Li, ShengXia Liu. 162-175 [doi]
- CCBA: Code Poisoning-Based Clean-Label Covert Backdoor Attack Against DNNsXubo Yang, Linsen Li, Cunqing Hua, Changhao Yao. 179-192 [doi]
- Decoding HDF5: Machine Learning File Forensics and Data InjectionClinton Walker, Ibrahim Baggili, Hao Wang. 193-211 [doi]
- DEML: Data-Enhanced Meta-Learning Method for IoT APT Traffic DetectionJia Hu, Weina Niu, Qingjun Yuan, Lingfeng Yao, Junpeng He, Yanfeng Zhang, Xiaosong Zhang 0001. 212-226 [doi]
- Finding Forensic Artefacts in Long-Term Frequency Band Occupancy Measurements Using Statistics and Machine LearningBart Somers, Asanka P. Sayakkara, Darren R. Hayes, Nhien-An Le-Khac. 227-248 [doi]
- IoT Malicious Traffic Detection Based on Federated LearningYi Shen, Yuhan Zhang, Yuwei Li, Wanmeng Ding, Miao Hu, Yang Li, Cheng Huang 0003, Jie Wang. 249-263 [doi]
- Persistent Clean-Label Backdoor on Graph-Based Semi-supervised Cybercrime DetectionXiao Yang, Gaolei Li, Meng Han. 264-278 [doi]
- Backdoor Learning on Siamese Networks Using Physical Triggers: FaceNet as a Case StudyZeshan Pang, Yuyuan Sun, Shasha Guo, Yuliang Lu. 279-292 [doi]
- Research on Feature Selection Algorithm of Energy CurveXiaohong Fan, Ye Huang, Xue Wang, Ziran Nie, Zhenyang Yu, Xuhui Cheng, Xiaoyi Duan. 293-307 [doi]
- Power Analysis Attack Based on GA-Based Ensemble LearningXiaoyi Duan, Ye Huang, YuTing Wang, Yu Gu, Jianmin Tong, Zunyang Wang, Ronglei Hu. 308-322 [doi]