Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Crimes committed within electronic or digital domains, particularly within cyberspace, have become extremely common these days. Criminals are using technology to a great extent in committing various digital offences and creating new... more
    • by 
    •   6  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer securityDigital Forensic, Cyber Crime, Cyber SecurityE-discovery
    • by 
    • Digital Forensics and Cyber Investigation
    • by 
    •   5  
      Machine LearningDigital ForensicsDigital Investigation,Computer Forensics, Computer securityDigital Forensics and Cyber Investigation
There is a growing concern, based on credible technical evidence that the government of Zimbabwe recently started using IMSI Catchers to track its citizens' movements and mobile phone usage within certain defined zones. Originally... more
    • by  and +1
    •   7  
      Data MiningCyber crimeCyber SecuritySting Rays
The computer is being used by majority of the people living today. There are linked to the computer either directly or indirectly. The computer systems are gaining their implementations in different departments. Either it is education or... more
    • by 
    •   11  
      Computer ForensicsDigital ForensicsDigital Investigation,Computer Forensics, Computer securityCyber Forensics
This is the only forensic-qualified tool for examinination of optical media. It has been around since 1999 and is in use by law enforcement, government and data recovery companies worldwide.
    • by 
    •   16  
      Digital Forensic Evidence ProvisionDigital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer security
Data mining technology is applied to fraud detection to establish the fraud detection model, describe the process of creating the fraud detection model, then establish data model with ID3 decision tree, and establish example of fraud... more
    • by 
    •   13  
      Digital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer securitySociology of Forensic Science and Criminal InvestigationsForensic investigation practices of sexual abuse and sexual exploitation of children
The purpose of this study is to explore the evolving technology and systems to find a low cost, efficient and portable solution for hard disk drive forensic imaging.Hard Disk Drive Imaging is one of the most frequently used forensic... more
    • by 
    •   34  
      Computer SciencePolice ScienceForensicsCyberlaw
Many a times, it has been argued that over dependency on technology leads to deskilling, lack of innovation and creativity thus resulting in inferior or substandard work. With a field growing in both demand for personnel and market for... more
    • by 
    •   10  
      Computer ForensicsDigital ForensicsCyber SecurityCyber Forensics
    • by 
    •   7  
      Computer ForensicsCybercrimesDigital ForensicsDigital Investigation,Computer Forensics, Computer security
Bellingcat’s Digital Forensics Tools
A List of Open Source Verification and Investigation Tools and Methods
    • by 
    •   9  
      Open Source SoftwareOpen Source and Free Software StudiesDigital ForensicsDigital Investigation,Computer Forensics, Computer secuirty
completely equipped to assimilate the detailed and complicated technical aspects of video forensics. Keywords Video forgery detection · Video tamper detection · Passive-blind video forensics · Video anti-forensics · Video content... more
    • by 
    •   6  
      Digital InvestigationDigital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer security
Forensics from volatile memory plays an important role in the investigation of cybercrime. The acquisition of RAM memory or other terms of RAM dump can assist forensic investigators in retrieving much of the information related to crime.... more
    • by 
    •   3  
      Malware AnalysisDigital Forensics and Cyber InvestigationInternet of Things (IoTs)
As we have seen several versions of Shamoon malware like 2 and 3 Generation , the fourth version has been spread, but it did not was famous like version 3 . In this paper i will analyze the Shamoon 4 malware , which may be the next target... more
    • by 
    •   17  
      ForensicsMiddle East StudiesCyber ConflictComputer Security
LAPORAN PRAKTIKUM DIGITAL FORENSIC TENTANG ANALISIS KASUS NARKOBA
MATA KULIAH DIGITAL FORENSIC
    • by 
    •   6  
      Computer ForensicsForensic ScienceDigital ForensicsComputer Forensics, Digital evidence acquisition
Information security management (ISM) is an important endeavour in today’s world where data and information are now critical assets of businesses and government. The purpose of this study was to conduct an empirical exploration and... more
    • by 
    •   7  
      Information SystemsInformation SecurityCloud Computing SecurityCampus Security
ABSTRAK Anti Forensik merupakan suatu bagian kajian di bidang Teknologi Informasi yang bertujuan untuk mengamankan data digital yang bersifat rahasia, agar tidak ditemukan oleh ahli komputer forensik (investigator) pada saat proses... more
    • by  and +1
    •   6  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer securityCyber Forensics
Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar informasi. Hal ini memungkinkan pihak ketiga menyalahgunakan email untuk mendapatkan informasi secara ilegal dengan mengubah identitas... more
    • by 
    •   2  
      Digital Forensics and Cyber InvestigationEmail Spoofing
There has been a wide usage of anti-computer forensics all over the world. This paper takes an overview of, and an analysis of the most widely used anti-forensic techniques in the world. Mostly, these techniques hide or make it... more
    • by 
    •   22  
      Computer ScienceComputer ForensicsDigital InvestigationForensic Science
In recent times, most of the data such as books, personal materials and genetic information digitally. This transformation gives rise to a field of Cyberspace. This newly created space, gave rise to a new set of crime Cybercrime, this... more
    • by 
    •   2  
      Deep LearningDigital Forensics and Cyber Investigation
La facilità tecnica ed economica di creare un deepfake rende opportuno modificare l'approccio alle regole che disciplinano l'efficacia probatoria dei documenti informatici. L'esame di alcune ipotesi di prova consistente in una... more
    • by 
    •   11  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer securityProcedura CivileReliability of forensic science evidence
With the increase in technology over the past 30 years, the digital and computer fields have been booming with new ways to harness data and organize someone’s life. Smart devices have become an everyday convenience for millions... more
    • by 
    •   10  
      Computer ForensicsLaw EnforcementDigital ForensicsDigital Investigation,Computer Forensics, Computer security
Malware is currently growing rapidly, diverse and complex. But, human resources that can carry out malware analysis is limited, because special expertise is needed. Reverse engineering is one of many solution that can carry out malware... more
    • by 
    •   3  
      Malware AnalysisInternet of Things (IoT)Digital Forensics and Cyber Investigation
The probability of having sensitive information retrieved from secondhand IoT devices has increased, even though the previous user removed data and deleted apps in those IoT devices. Due to the increase in flash memory storage technology,... more
    • by 
    •   2  
      SmartphonesDigital Forensics and Cyber Investigation
A common investigative task is to identify known contraband images on a device, which typicallyinvolves calculating cryptographic hashes for all the files on a disk and checking these against adatabase of known contraband.... more
    • by  and +1
    •   4  
      Computer ForensicsDigital ForensicsComputer Forensics for Cyberspace CrimesDigital Forensics and Cyber Investigation
In the wake of widespread proliferation of inexpensive and easy-to-use digital content editing software, digital videos have lost the idealized reputation they once held as universal, objective and infallible evidence of occurrence of... more
    • by 
    •   6  
      Digital InvestigationDigital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Forensic, Cyber Crime, Cyber Security
Digital vision technologies emerged exponentially in all living areas to watch, play, control, or track events. Security checkpoints have benefited also from those technologies by integrating dedicated cameras in studied locations. The... more
    • by 
    •   5  
      Software SecuritySecurity and PrivacyCyber SecurityDigital Forensics and Cyber Investigation
The old adage, "seeing is believing", no longer holds true in modern society. Digital media has paved the way for anyone to doctor images and for videos to misrepresent truth. The lines between fact, entertainment, advertising,... more
    • by 
    •   3  
      MisinformationDigital Forensics and Cyber InvestigationSocial Media and Fake News/Propaganda
Pasal 35 : Setiap Orang dengan sengaja dan tanpa hak atau melawan hukum melakukan manipulasi, penciptaan, perubahan, penghilangan, pengrusakan Informasi Elektronik dan/atau Dokumen Elektronik dengan tujuan agar Informasi Elektronik... more
    • by 
    •   3  
      Forensic ScienceDigital Forensics and Cyber InvestigationAnalisa UU ITE
Over the years researchers have proposed and developed models for extraction of digital evidence in mobile devices but little has been done on standardization of these models hence leading to inconsistencies in the extraction process used... more
    • by 
    •   3  
      Computer Forensics, Digital evidence acquisitionDigital Forensic ModelDigital Forensics and Cyber Investigation
    • by 
    •   36  
      Computer Security And ReliabilityNetwork SecurityComputer SecurityUsable Security (Computer Security)
    • by 
    •   17  
      Computer ScienceDigital HumanitiesVisualizationCybercrimes
This paper presents a robust signature verification and forgery detection system using Additive fuzzy and TS modeling technique. The features of various handwritten signatures are sampled with proper analysis and encapsulated to devise an... more
    • by 
    •   9  
      Computer ScienceInformation TechnologyNigeriaCyber Security
With the growing number of digital forensic tools and the increasing use of digital forensics in various contexts, including incident response and cyber threat intelligence, there is a pressing need for a widely accepted standard for... more
    • by 
    •   5  
      Digital InvestigationDigital ForensicsDIGITAL EVIDENCE AND INVESTIGATIONDigital Forensics and Cyber Investigation
Build a comprehensive Digital Forensic Lab
    • by 
    •   11  
      Digital Records ForensicsDigital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer security
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given media,... more
    • by 
    •   6  
      Digital InvestigationDigital ForensicsDigital Investigation,Computer Forensics, Computer securityDigital Forensic, Cyber Crime, Cyber Security
In this digital day and age, we are becoming increasingly dependent on multimedia content, especially digital images and videos, to provide a reliable proof of occurrence of events. However, the availability of several sophisticated yet... more
    • by 
    •   8  
      Digital InvestigationDigital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer security
FORENSIC TOOLS
    • by 
    •   8  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer securityDigital Image Forensic
Digital vision technologies emerged exponentially in all living areas to watch, play, control, or track events. Security checkpoints have benefited also from those technologies by integrating dedicated cameras in studied locations. The... more
    • by 
    •   5  
      Software SecuritySecurity and PrivacyCyber SecurityDigital Forensics and Cyber Investigation
This paper presents a robust signature verification and forgery detection system using Additive fuzzy and TS modeling technique. The features of various handwritten signatures are sampled with proper analysis and encapsulated to devise an... more
    • by  and +1
    • Digital Forensics and Cyber Investigation
Abstrak Malware merupakan salah satu bentuk dari kejahatan komputer yang terjadi pada sebuah sistem jaringan komputer, malware Njrat termasuk jenis Trojan horse. Trojan adalah salah satu jenis malware yang ikut berkembang di dalamnya,... more
    • by 
    •   4  
      Cloud ComputingMalware AnalysisInternet of Things (IoT)Digital Forensics and Cyber Investigation
This paper covers the different aspects of computer forensics analyst job detailing what they are usually tasked with.
    • by 
    •   5  
      Computer ScienceDigital ForensicsDigital Investigation,Computer Forensics, Computer securityDigital Forensics, Security and Law
The eternal preoccupation with multimedia technology is the precursor of us becoming a civilization replete with astonishing miscellanea of digital audio-visual information. Not so long ago, this digital information (images and videos... more
    • by 
    •   6  
      Digital InvestigationDigital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer security
    • by 
    •   8  
      Formal AnalysisDigital ForensicsCase StudyLiquid State Machine
    • by 
    •   9  
      Software EngineeringArtCloud ComputingDigital Forensics
    • by 
    •   8  
      Computer ScienceComputer NetworksCloud ComputingDigital Forensics
    • by 
    •   6  
      Computer NetworksDigital ForensicsInternet of Things (IoT)Cloud Computing and Virtualization
Roman playwright Plautus once said, “One eyewitness weights more than ten hearsays – seeing is believing, all the world over.” The tendency to trust the evidence of our eyes is a biological predilection, and it applies not only to the... more
    • by 
    •   7  
      Digital InvestigationDigital Image ProcessingDigital ForensicsDigital Investigation,Computer Forensics, Computer security
Gaurav, a petroleum engineer, worked for Green Oil (names have been changed to maintain confidentiality and privacy) and was in possession of highly classified and critical data relating to research carried out by the company. Gaurav... more
    • by 
    •   10  
      Information SecurityComputer ForensicsComputer SecurityDigital Forensics