|
|
|
Luis Alberto Martínez Hernández, Ana Lucila Sandoval Orozco and Luis Javier García Villalba
Due to the advancement of technology, cybercrime has increased considerably, making digital forensics essential for any organisation. One of the most critical challenges is to analyse and classify the information on devices, identifying the relevant and ...
ver más
|
|
|
|
|
|
|
Monika Bjelopavlovic, Desiree Degering, Karl Martin Lehmann, Daniel G. E. Thiem, Jochen Hardt and Katja Petrowski
The INTERPOL standard for the identification of unknown individuals includes the established primary characteristics of fingerprint, DNA, and teeth. Exposure to noxious agents such as fire and water often severely limits the availability of usable materi...
ver más
|
|
|
|
|
|
|
Alexandros Z. Spyropoulos, Charalampos Bratsas, Georgios C. Makris, Emmanouel Garoufallou and Vassilis Tsiantos
Nowadays, more and more sciences are involved in strengthening the work of law enforcement authorities. Scientific documentation is evidence highly respected by the courts in administering justice. As the involvement of science in solving crimes increase...
ver más
|
|
|
|
|
|
|
Mohammad Meraj Mirza, Akif Ozer and Umit Karabiyik
As many new mobile device applications are leveraging blockchain technologies, Web3 wallets were created as a tool to store, manage, stack, and perform cryptocurrency-related transactions. Therefore, it is necessary to investigate what these new nontradi...
ver más
|
|
|
|
|
|
|
Arafat Al-Dhaqm, Shukor Razak, Richard A. Ikuesan, Victor R. Kebande and Siti Hajar Othman
Using a face validity approach, this paper provides a validation of the Database Forensic Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability, heterogeneity, complexity, and ambiguity in the database forensic investigation ...
ver más
|
|
|
|
|
|
|
Bako Zawali, Richard A. Ikuesan, Victor R. Kebande, Steven Furnell and Arafat A-Dhaqm
Complexity and sophistication among multimedia-based tools have made it easy for perpetrators to conduct digital crimes such as counterfeiting, modification, and alteration without being detected. It may not be easy to verify the integrity of video conte...
ver más
|
|
|
|
|
|
|
Soohyeon Choi and Dohoon Kim
Illegally filmed images, the sharing of non-consensually filmed images over social media, and the secret recording and distribution of celebrity images are increasing. To catch distributors of illegally filmed images, many investigation techniques based ...
ver más
|
|
|
|
|
|
|
Tianyun Liu, Diqun Yan, Rangding Wang, Nan Yan and Gang Chen
The number of channels is one of the important criteria in regard to digital audio quality. Generally, stereo audio with two channels can provide better perceptual quality than mono audio. To seek illegal commercial benefit, one might convert a mono audi...
ver más
|
|
|
|
|
|
|
Aleksandr Romanov, Anna Kurtukova, Alexander Shelupanov, Anastasia Fedotova and Valery Goncharov
The article explores approaches to determining the author of a natural language text and the advantages and disadvantages of these approaches. The importance of the considered problem is due to the active digitalization of society and reassignment of mos...
ver más
|
|
|
|
|
|
|
Da-Yu Kao
When computer systems are increasingly important for our daily activities, cybercrime has created challenges for the criminal justice system. Data can be hidden in ADS (Alternate Data Stream) without hindering performance. This feature has been exploited...
ver más
|
|
|
|