|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Daniel Spiekermann and Jörg Keller
While network forensics has matured over the decades and even made progress in the last 10 years when deployed in virtual networks, network forensics in fog and edge computing is still not progressed to that level despite the now widespread use of these ...
ver más
|
|
|
|
|
|
|
Alexandros Z. Spyropoulos, Charalampos Bratsas, Georgios C. Makris, Emmanouel Garoufallou and Vassilis Tsiantos
Nowadays, more and more sciences are involved in strengthening the work of law enforcement authorities. Scientific documentation is evidence highly respected by the courts in administering justice. As the involvement of science in solving crimes increase...
ver más
|
|
|
|
|
|
|
Luis Alberto Martínez Hernández, Ana Lucila Sandoval Orozco and Luis Javier García Villalba
Due to the advancement of technology, cybercrime has increased considerably, making digital forensics essential for any organisation. One of the most critical challenges is to analyse and classify the information on devices, identifying the relevant and ...
ver más
|
|
|
|
|
|
|
Giovanni Acampora, Pasquale Trinchese, Roberto Trinchese and Autilia Vitiello
Recognizing and collecting evidence at a crime scene are essential tasks for gathering information about perpetrators and/or the dynamics of a criminal event. Hence, the success of a crime investigation is strongly based on the ability of forensic invest...
ver más
|
|
|
|
|
|
|
Furkan Paligu and Cihan Varol
Social media usage is increasing at a rapid rate. Everyday users are leaving a substantial amount of data as artifacts in these applications. As the size and velocity of data increase, innovative technologies such as Web Storage and IndexedDB are emergin...
ver más
|
|
|
|
|
|
|
Soohyeon Choi and Dohoon Kim
Illegally filmed images, the sharing of non-consensually filmed images over social media, and the secret recording and distribution of celebrity images are increasing. To catch distributors of illegally filmed images, many investigation techniques based ...
ver más
|
|
|
|
|
|
|
Bako Zawali, Richard A. Ikuesan, Victor R. Kebande, Steven Furnell and Arafat A-Dhaqm
Complexity and sophistication among multimedia-based tools have made it easy for perpetrators to conduct digital crimes such as counterfeiting, modification, and alteration without being detected. It may not be easy to verify the integrity of video conte...
ver más
|
|
|
|
|
|
|
Arafat Al-Dhaqm, Shukor Razak, Richard A. Ikuesan, Victor R. Kebande and Siti Hajar Othman
Using a face validity approach, this paper provides a validation of the Database Forensic Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability, heterogeneity, complexity, and ambiguity in the database forensic investigation ...
ver más
|
|
|
|
|
|
|
Furkan Paligu and Cihan Varol
Digital Evidence is becoming an indispensable factor in most legal cases. However, technological advancements that lead to artifact complexity, are forcing investigators to create sophisticated connections between the findings and the suspects for admiss...
ver más
|
|
|
|