Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 31, Issue CDec 2019Current Issue
Reflects downloads up to 30 Aug 2024Bibliometrics
Skip Table Of Content Section
Research and Development
research-article
How to detect cryptocurrency miners? By traffic forensics!
Abstract

Cryptocurrencies set a new trend for a financial interaction between people. In order to successfully meet this use-case, cryptocurrencies combine various advanced information technologies (e.g., blockchain as a replicated database, ...

Highlights

  • Cryptocurrency mining can be detected in the network.
  • Three mining protocols ...

research-article
Standardization of file recovery classification and authentication
Abstract

Digital forensics can no longer tolerate software that cannot be relied upon to perform specific functions such as file recovery. Indistinct and non-standardized results increase the risk of misinterpretation by digital forensic ...

research-article
Data acquisition methods using backup data decryption of Sony smartphones
Abstract

As the storage capacity of smartphones increases, more user data such as call logs, SMS records, media data, and instant messages are stored in smartphones. Therefore, it is important in digital investigation to acquire smartphones ...

Highlights

  • Smartphone backup methods are different for each manufacturer.
  • Sony smartphone ...

research-article
Identifying suspicious addresses in Bitcoin thefts
Abstract

Bitcoin as a popular digital currency has been a target of theft and other illegal activities. Key to the forensic investigation is to identify bitcoin addresses involved in the bitcoin transfers. This paper presents a framework, FABT, ...

Highlights

  • Use bitcoin transaction net as a formal model of bitcoin transactions.
  • Exploit ...

Case Notes
rapid-communication
Reconstructing cached video stream content: - Part 2
Abstract

In 2018, Horsman (2018a; 2018b) provided guidance for the reconstruction of cached stream remnants following use of the Periscope, Facebook Live and YouTube platforms. These works confirmed that video stream content can be cached to a ...

Highlights

  • A follow-up to Horsman, G., 2018. Reconstructing streamed video content: A case study on YouTube and Facebook Live.

Survey Papers
research-article
An examination of gaming platform policies for law enforcement support
Abstract

The problems faced with regulating social media platforms are well known and documented, where frequent abuses of these platforms occur. In addition to this issue, the use of gaming platforms and their inbuilt communication facilities ...

Highlights

  • A follow-up to Horsman, G., 2017. A survey of current social network and online communication provision policies to support law enforcement identify ...

Application Analysis
research-article
Worldwide analysis of crimes by the traces of their online media coverage: The case of jewellery store robberies
Abstract

This empirical study aims to determine whether online media coverage can be used to gather intelligence on specific crimes worldwide. The quality of online news is evaluated as an indicator of the worldwide distribution of jewelry ...

Highlights

  • Online news can be used to gather forensic intelligence about phenomena which are well covered by the media.

Comments