Sok: Explainable machine learning for computer security applications

A Nadeem, D Vos, C Cao, L Pajola… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …

[HTML][HTML] DFRWS EU 10-year review and future directions in Digital Forensic Research

F Breitinger, JN Hilgert, C Hargreaves… - Forensic Science …, 2024 - Elsevier
Conducting a systematic literature review and comprehensive analysis, this paper surveys
all 135 peer-reviewed articles published at the Digital Forensics Research Conference …

SoK: cross-border criminal investigations and digital evidence

F Casino, C Pina, P López-Aguilar… - Journal of …, 2022 - academic.oup.com
Digital evidence underpin the majority of crimes as their analysis is an integral part of almost
every criminal investigation. Even if we temporarily disregard the numerous challenges in …

[HTML][HTML] A forensics and compliance auditing framework for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - International Journal of Critical …, 2023 - Elsevier
Contemporary societies are increasingly dependent on products and services provided by
Critical Infrastructure (CI) such as power plants, energy distribution networks, transportation …

Security of Programmable Logic Controllers and Related Systems: Today and Tomorrow

W Alsabbagh, P Langendörfer - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
Programmable logic controllers (PLCs) are indispensable in critical infrastructures and
industrial control systems. The increasing demand for enhanced cost-effectiveness and …

Цифрова криміналістика й удосконалення системи криміналістичної техніки в Україні

РЛ Степанюк, СІ Перлін - 2022 - dspace.univd.edu.ua
Анотація З кожним роком зростають потреби правоохоронних органів в ефективних
інструментах виявлення, вилучення, дослідження та використання в доказуванні …

Blockchain-based digital chain of custody multimedia evidence preservation framework for internet-of-things

A Malik, AK Sharma - Journal of Information Security and Applications, 2023 - Elsevier
Abstract The Internet of Things (IoT) has made everyday tasks more efficient using smart
devices, which are now integral parts of people's daily routines. As a result, there has been a …

Mobile cyber forensic investigations of Web3 wallets on Android and iOS

MM Mirza, A Ozer, U Karabiyik - Applied Sciences, 2022 - mdpi.com
Featured Application As many new mobile device applications are leveraging blockchain
technologies, Web3 wallets were created as a tool to store, manage, stack, and perform …

A review of battery state of charge estimation and management systems: Models and future prospective

HM Hussein, A Aghmadi… - Wiley …, 2024 - Wiley Online Library
Batteries are considered critical elements in most applications nowadays due to their power
and energy density features. However, uncontrolled charging and discharging will …

On the effectiveness of binary emulation in malware classification

V Vouvoutsis, F Casino, C Patsakis - Journal of Information Security and …, 2022 - Elsevier
Malware authors continuously evolve their code base to include counter-analysis methods
that can significantly hinder their detection and blocking. While malware execution in a …