|
|
|
Ancilon Leuch Alencar, Marcelo Dornbusch Lopes, Anita Maria da Rocha Fernandes, Julio Cesar Santos dos Anjos, Juan Francisco De Paz Santana and Valderi Reis Quietinho Leithardt
In the current era of social media, the proliferation of images sourced from unreliable origins underscores the pressing need for robust methods to detect forged content, particularly amidst the rapid evolution of image manipulation technologies. Existin...
ver más
|
|
|
|
|
|
|
Georgios Karantaidis and Constantine Kotropoulos
The detection of computer-generated (CG) multimedia content has become of utmost importance due to the advances in digital image processing and computer graphics. Realistic CG images could be used for fraudulent purposes due to the deceiving recognition ...
ver más
|
|
|
|
|
|
|
Daniel Spiekermann and Jörg Keller
While network forensics has matured over the decades and even made progress in the last 10 years when deployed in virtual networks, network forensics in fog and edge computing is still not progressed to that level despite the now widespread use of these ...
ver más
|
|
|
|
|
|
|
Aleksandr Romanov, Anna Kurtukova, Anastasia Fedotova and Alexander Shelupanov
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors. Any program is ma...
ver más
|
|
|
|
|
|
|
Ankita Dhar, Himadri Mukherjee, Shibaprasad Sen, Md Obaidullah Sk, Amitabha Biswas, Teresa Gonçalves and Kaushik Roy
Author identification is an important aspect of literary analysis, studied in natural language processing (NLP). It aids identify the most probable author of articles, news texts or social media comments and tweets, for example. It can be applied to othe...
ver más
|
|
|
|
|
|
|
Samar Samir Khalil, Sherin M. Youssef and Sherine Nagy Saleh
Fake media is spreading like wildfire all over the internet as a result of the great advancement in deepfake creation tools and the huge interest researchers and corporations are showing to explore its limits. Now anyone can create manipulated unethical ...
ver más
|
|
|
|
|
|
|
Aleksandr Romanov, Anna Kurtukova, Alexander Shelupanov, Anastasia Fedotova and Valery Goncharov
The article explores approaches to determining the author of a natural language text and the advantages and disadvantages of these approaches. The importance of the considered problem is due to the active digitalization of society and reassignment of mos...
ver más
|
|
|
|
|
|
|
Aminollah Khormali and Jiann-Shiun Yuan
Recent advancements of Generative Adversarial Networks (GANs) pose emerging yet serious privacy risks threatening digital media?s integrity and trustworthiness, specifically digital video, through synthesizing hyper-realistic images and videos, i.e., Dee...
ver más
|
|
|
|
|
|
|
Konstantinos Demertzis, Nikos Tziritas, Panayiotis Kikiras, Salvador Llopis Sanchez and Lazaros Iliadis
A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization?s security posture on an ongoing basis. The SOC staff works closely with incident response teams, securit...
ver más
|
|
|
|
|
|
|
Mariusz Nowostawski and Jardar Tøn
Payment channels and off-chain transactions are used to address blockchain scalability. Those mechanisms rely on the blockchain proper, as the resolution mechanism. They allow for high transaction throughput due to the pure peer-to-peer nature of the tra...
ver más
|
|
|
|