An Economical Method for Securely Disintegrating Solid-State Drives Using...
Pulverizing solid-state drives (SSDs) down to particles no larger than 2 mm is required by the United States National Security Agency (NSA) to ensure the highest level of data security, but commercial...
View ArticleDIGITAL FORENSIC READINESS FRAMEWORK BASED ON HONEYPOT AND HONEYNET FOR BYOD
The utilization of the internet within organizations has surged over the past decade. Though, it has numerous benefits, the internet also comes with its own challenges such as intrusions and threats....
View ArticleThe survey on cross-border collection of digital evidence by representatives...
Dynamic development of IT technology poses new challenges related to the cross-border collection of electronic evidence from the cloud. Many times investigators need to secure data stored on foreign...
View ArticleInternet of Things Software and Hardware Architectures and Their Impacts on...
The never-before-seen proliferation of interconnected low-power computing devices, patently dubbed the Internet of Things (IoT), is revolutionizing how people, organizations, and malicious actors...
View ArticleDON'T BITE THE BAIT: PHISHING ATTACK FOR INTERNET BANKING (E-BANKING)
Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirecting, panicking, curiosity, or excitement. Most of the phishing web sites are...
View ArticlePerformance Assessment of some Phishing predictive models based on Minimal...
Phishing is currently one of the severest cybersecurity challenges facing the emerging online community. With damages running into millions of dollars in financial and brand losses, the sad tale of...
View ArticleForensic Discoverability of iOS Vault Applications
Vault Applications are used to store potentially sensitive information on a smartphone; and are available on Android and iOS. The purpose of using these applications could be used to hide potential...
View ArticleTECHNICAL BEHAVIOURS OF CHILD SEXUAL EXPLOITATION MATERIAL OFFENDERS
An exploration of the technological behaviours of previously convicted child sexual exploitation material (CSEM) offenders provides a foundation for future applied research into deterrence,...
View ArticleDigital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of...
This study is a follow-up to Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration – 2010 to 2015. The current study examines appeals of criminal...
View ArticleA CRITICAL COMPARISON OF BRAVE BROWSER AND GOOGLE CHROME FORENSIC ARTEFACTS
Digital forensic practitioners are tasked with the identification, recovery and analysis of Internet browser artefacts which may have been used in the pursuit of committing a civil or criminal...
View ArticleThe Digital Detective's Discourse - A toolset for forensically sound...
In the last decade, the proliferation of machine learning (ML) algorithms and their application on big data sets have benefited many researchers and practitioners in different scientific areas....
View ArticleA Combined Approach For Private Indexing Mechanism
Private indexing is a set of approaches for analyzing research data that are similar or resemble similar ones. This is used in the database to keep track of the keys and their values. The main subject...
View ArticleProposed L-Shape Pattern on UFS ACM For Risk Analysis
At this cloud age, there is tremendous growth in business, services, resources, and cloud technology. This growth comes with a risk of unsafe, unordered, and uncertainty due to unauthorized access and...
View ArticleFault Lines In The Application Of International Humanitarian Law To Cyberwarfare
The dynamics of warfare have changed from the conventional wars fought on the battlefield to virtual warfare as states have been involved in the cyber arms race. From simple distributed...
View ArticleTo License or Not to License Reexamined: An Updated Report on Licensing of...
In this update to the 2015 study, the authors examine US state statutes and regulations relating to licensing and enforcement of Digital Examiner functions under each state’s private...
View ArticleAssessment of 3D mesh watermarking techniques
With the increasing usage of three-dimensional meshes in Computer-Aided Design (CAD), medical imaging, and entertainment fields like virtual reality, etc., the authentication problems and awareness of...
View ArticleAn Analysis of Product Liability for AI Entities with special reference to...
An Analysis of Product Liability for AI Entities with special reference to the Consumer Protection Act, 2019 Dr. Priya Roy & Mr. Rituraj Bhowal Abstract: In 1955 computer scientist John McCarthy...
View ArticleAn Evaluation Framework For Digital Image Forensics Tools
The boom of digital cameras, photography, and social media has drastically changed how humans live their day-to-day, but this normalization is accompanied by malicious agents finding new ways to forge...
View ArticleA Study of the Data Remaining on Second-Hand Mobile Devices in the UK
This study was carried out intending to identify the level and type of information that remained on portable devices that were purchased from the second-hand market in the UK over the last few years....
View ArticleAN ML BASED DIGITAL FORENSICS SOFTWARE FOR TRIAGE ANALYSIS THROUGH FACE...
Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal...
View Article
More Pages to Explore .....