Quantcast
Channel: Journal of Digital Forensics, Security and Law
Browsing all 20 articles
Browse latest View live

An Economical Method for Securely Disintegrating Solid-State Drives Using...

Pulverizing solid-state drives (SSDs) down to particles no larger than 2 mm is required by the United States National Security Agency (NSA) to ensure the highest level of data security, but commercial...

View Article



DIGITAL FORENSIC READINESS FRAMEWORK BASED ON HONEYPOT AND HONEYNET FOR BYOD

The utilization of the internet within organizations has surged over the past decade. Though, it has numerous benefits, the internet also comes with its own challenges such as intrusions and threats....

View Article

The survey on cross-border collection of digital evidence by representatives...

Dynamic development of IT technology poses new challenges related to the cross-border collection of electronic evidence from the cloud. Many times investigators need to secure data stored on foreign...

View Article

Internet of Things Software and Hardware Architectures and Their Impacts on...

The never-before-seen proliferation of interconnected low-power computing devices, patently dubbed the Internet of Things (IoT), is revolutionizing how people, organizations, and malicious actors...

View Article

DON'T BITE THE BAIT: PHISHING ATTACK FOR INTERNET BANKING (E-BANKING)

Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirecting, panicking, curiosity, or excitement. Most of the phishing web sites are...

View Article


Performance Assessment of some Phishing predictive models based on Minimal...

Phishing is currently one of the severest cybersecurity challenges facing the emerging online community. With damages running into millions of dollars in financial and brand losses, the sad tale of...

View Article

Forensic Discoverability of iOS Vault Applications

Vault Applications are used to store potentially sensitive information on a smartphone; and are available on Android and iOS. The purpose of using these applications could be used to hide potential...

View Article

TECHNICAL BEHAVIOURS OF CHILD SEXUAL EXPLOITATION MATERIAL OFFENDERS

An exploration of the technological behaviours of previously convicted child sexual exploitation material (CSEM) offenders provides a foundation for future applied research into deterrence,...

View Article


Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of...

This study is a follow-up to Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration – 2010 to 2015. The current study examines appeals of criminal...

View Article


A CRITICAL COMPARISON OF BRAVE BROWSER AND GOOGLE CHROME FORENSIC ARTEFACTS

Digital forensic practitioners are tasked with the identification, recovery and analysis of Internet browser artefacts which may have been used in the pursuit of committing a civil or criminal...

View Article

The Digital Detective's Discourse - A toolset for forensically sound...

In the last decade, the proliferation of machine learning (ML) algorithms and their application on big data sets have benefited many researchers and practitioners in different scientific areas....

View Article

A Combined Approach For Private Indexing Mechanism

Private indexing is a set of approaches for analyzing research data that are similar or resemble similar ones. This is used in the database to keep track of the keys and their values. The main subject...

View Article

Proposed L-Shape Pattern on UFS ACM For Risk Analysis

At this cloud age, there is tremendous growth in business, services, resources, and cloud technology. This growth comes with a risk of unsafe, unordered, and uncertainty due to unauthorized access and...

View Article


Fault Lines In The Application Of International Humanitarian Law To Cyberwarfare

The dynamics of warfare have changed from the conventional wars fought on the battlefield to virtual warfare as states have been involved in the cyber arms race. From simple distributed...

View Article

To License or Not to License Reexamined: An Updated Report on Licensing of...

In this update to the 2015 study, the authors examine US state statutes and regulations relating to licensing and enforcement of Digital Examiner functions under each state’s private...

View Article


Assessment of 3D mesh watermarking techniques

With the increasing usage of three-dimensional meshes in Computer-Aided Design (CAD), medical imaging, and entertainment fields like virtual reality, etc., the authentication problems and awareness of...

View Article

An Analysis of Product Liability for AI Entities with special reference to...

An Analysis of Product Liability for AI Entities with special reference to the Consumer Protection Act, 2019 Dr. Priya Roy & Mr. Rituraj Bhowal Abstract: In 1955 computer scientist John McCarthy...

View Article


An Evaluation Framework For Digital Image Forensics Tools

The boom of digital cameras, photography, and social media has drastically changed how humans live their day-to-day, but this normalization is accompanied by malicious agents finding new ways to forge...

View Article

A Study of the Data Remaining on Second-Hand Mobile Devices in the UK

This study was carried out intending to identify the level and type of information that remained on portable devices that were purchased from the second-hand market in the UK over the last few years....

View Article

AN ML BASED DIGITAL FORENSICS SOFTWARE FOR TRIAGE ANALYSIS THROUGH FACE...

Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images