Sok: Explainable machine learning for computer security applications
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …
[HTML][HTML] DFRWS EU 10-year review and future directions in Digital Forensic Research
Conducting a systematic literature review and comprehensive analysis, this paper surveys
all 135 peer-reviewed articles published at the Digital Forensics Research Conference …
all 135 peer-reviewed articles published at the Digital Forensics Research Conference …
SoK: cross-border criminal investigations and digital evidence
F Casino, C Pina, P López-Aguilar… - Journal of …, 2022 - academic.oup.com
Digital evidence underpin the majority of crimes as their analysis is an integral part of almost
every criminal investigation. Even if we temporarily disregard the numerous challenges in …
every criminal investigation. Even if we temporarily disregard the numerous challenges in …
[HTML][HTML] A forensics and compliance auditing framework for critical infrastructure protection
Contemporary societies are increasingly dependent on products and services provided by
Critical Infrastructure (CI) such as power plants, energy distribution networks, transportation …
Critical Infrastructure (CI) such as power plants, energy distribution networks, transportation …
Security of Programmable Logic Controllers and Related Systems: Today and Tomorrow
W Alsabbagh, P Langendörfer - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
Programmable logic controllers (PLCs) are indispensable in critical infrastructures and
industrial control systems. The increasing demand for enhanced cost-effectiveness and …
industrial control systems. The increasing demand for enhanced cost-effectiveness and …
Цифрова криміналістика й удосконалення системи криміналістичної техніки в Україні
РЛ Степанюк, СІ Перлін - 2022 - dspace.univd.edu.ua
Анотація З кожним роком зростають потреби правоохоронних органів в ефективних
інструментах виявлення, вилучення, дослідження та використання в доказуванні …
інструментах виявлення, вилучення, дослідження та використання в доказуванні …
Blockchain-based digital chain of custody multimedia evidence preservation framework for internet-of-things
Abstract The Internet of Things (IoT) has made everyday tasks more efficient using smart
devices, which are now integral parts of people's daily routines. As a result, there has been a …
devices, which are now integral parts of people's daily routines. As a result, there has been a …
Mobile cyber forensic investigations of Web3 wallets on Android and iOS
Featured Application As many new mobile device applications are leveraging blockchain
technologies, Web3 wallets were created as a tool to store, manage, stack, and perform …
technologies, Web3 wallets were created as a tool to store, manage, stack, and perform …
A review of battery state of charge estimation and management systems: Models and future prospective
HM Hussein, A Aghmadi… - Wiley …, 2024 - Wiley Online Library
Batteries are considered critical elements in most applications nowadays due to their power
and energy density features. However, uncontrolled charging and discharging will …
and energy density features. However, uncontrolled charging and discharging will …
On the effectiveness of binary emulation in malware classification
Malware authors continuously evolve their code base to include counter-analysis methods
that can significantly hinder their detection and blocking. While malware execution in a …
that can significantly hinder their detection and blocking. While malware execution in a …