A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour
SS Hasanabadi, AH Lashkari, AA Ghorbani - Forensic Science International …, 2020 - Elsevier
Digital forensic investigators' aim is identifying, collecting and presenting reliable, accurate,
and admissible evidence in court. However, anti-forensics manipulate, obfuscate, hide, and …
and admissible evidence in court. However, anti-forensics manipulate, obfuscate, hide, and …
[HTML][HTML] Uncovering the social impact of digital steganalysis tools applied to cybercrime investigations: a European Union perspective
A Nicolás-Sánchez, FJ Castro-Toledo - Crime Science, 2024 - Springer
Abstract Background European Union (EU) research on cybersecurity is actively developing
more efficient digital steganalysis techniques aimed at uncovering hidden online illegal …
more efficient digital steganalysis techniques aimed at uncovering hidden online illegal …
Cryptographic Techniques for Data Privacy in Digital Forensics
TB Ogunseyi, OM Adedayo - IEEE Access, 2023 - ieeexplore.ieee.org
The acquisition and analysis of data in digital forensics raise different data privacy
challenges. Many existing works on digital forensic readiness discuss what information …
challenges. Many existing works on digital forensic readiness discuss what information …
[PDF][PDF] Privacy-aware digital forensics.
All things considered, even when digital investigations are conducted by responsible
professionals, the data collected from personal devices may result in dreadful invasions to …
professionals, the data collected from personal devices may result in dreadful invasions to …
Establishing forensics capabilities in the presence of superuser insider threats
B Manral, G Somani - Forensic Science International: Digital Investigation, 2021 - Elsevier
Insider threats are paving ways to the headlines of security articles and reports across the
globe. It's a common practice across organizations to have designated employees as …
globe. It's a common practice across organizations to have designated employees as …
[HTML][HTML] High rate Denial-of-Service attack detection system for cloud environment using flume and spark
JP Gutierrez, K Lee - Journal of Information Processing Systems, 2021 - jips-k.org
Nowadays, cloud computing is being adopted for more organizations. However, since cloud
computing has a virtualized, volatile, scalable and multi-tenancy distributed nature, it is …
computing has a virtualized, volatile, scalable and multi-tenancy distributed nature, it is …
Revealing the traces of histogram equalisation in digital images
The popular histogram equalisation (HE) technique, which was developed to improve the
image contrast, sometimes may also be misused to hide intensity variations in tampered …
image contrast, sometimes may also be misused to hide intensity variations in tampered …
[HTML][HTML] An attack-based filtering scheme for slow rate denial-of-service attack detection in cloud environment
JNP Gutierrez, K Lee - Journal of Multimedia Information System, 2020 - jmis.org
Nowadays, cloud computing is becoming more popular among companies. However, the
characteristics of cloud computing such as a virtualized environment, constantly changing …
characteristics of cloud computing such as a virtualized environment, constantly changing …
[图书][B] Forensic psychology: Fact and fiction
T Davis - 2020 - books.google.com
This fascinating and research-led textbook gives students the facts and the tools they need
to engage critically with the psychological dimension of the criminal justice system …
to engage critically with the psychological dimension of the criminal justice system …
VM Anti-forensics: Detecting File Wiping Using File System Journals
Malware, tools, or other files deleted or created on a cloud Virtual Machine (VM) by an
adversary may leave traces of the activities performed. Adversaries may securely delete the …
adversary may leave traces of the activities performed. Adversaries may securely delete the …