A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour

SS Hasanabadi, AH Lashkari, AA Ghorbani - Forensic Science International …, 2020 - Elsevier
Digital forensic investigators' aim is identifying, collecting and presenting reliable, accurate,
and admissible evidence in court. However, anti-forensics manipulate, obfuscate, hide, and …

[HTML][HTML] Uncovering the social impact of digital steganalysis tools applied to cybercrime investigations: a European Union perspective

A Nicolás-Sánchez, FJ Castro-Toledo - Crime Science, 2024 - Springer
Abstract Background European Union (EU) research on cybersecurity is actively developing
more efficient digital steganalysis techniques aimed at uncovering hidden online illegal …

Cryptographic Techniques for Data Privacy in Digital Forensics

TB Ogunseyi, OM Adedayo - IEEE Access, 2023 - ieeexplore.ieee.org
The acquisition and analysis of data in digital forensics raise different data privacy
challenges. Many existing works on digital forensic readiness discuss what information …

[PDF][PDF] Privacy-aware digital forensics.

A Nieto, R Rios, J Lopez, W Ren, L Wang, KKR Choo… - 2019 - nics.uma.es
All things considered, even when digital investigations are conducted by responsible
professionals, the data collected from personal devices may result in dreadful invasions to …

Establishing forensics capabilities in the presence of superuser insider threats

B Manral, G Somani - Forensic Science International: Digital Investigation, 2021 - Elsevier
Insider threats are paving ways to the headlines of security articles and reports across the
globe. It's a common practice across organizations to have designated employees as …

[HTML][HTML] High rate Denial-of-Service attack detection system for cloud environment using flume and spark

JP Gutierrez, K Lee - Journal of Information Processing Systems, 2021 - jips-k.org
Nowadays, cloud computing is being adopted for more organizations. However, since cloud
computing has a virtualized, volatile, scalable and multi-tenancy distributed nature, it is …

Revealing the traces of histogram equalisation in digital images

Z Akhtar, E Khan - IET Image Processing, 2018 - Wiley Online Library
The popular histogram equalisation (HE) technique, which was developed to improve the
image contrast, sometimes may also be misused to hide intensity variations in tampered …

[HTML][HTML] An attack-based filtering scheme for slow rate denial-of-service attack detection in cloud environment

JNP Gutierrez, K Lee - Journal of Multimedia Information System, 2020 - jmis.org
Nowadays, cloud computing is becoming more popular among companies. However, the
characteristics of cloud computing such as a virtualized environment, constantly changing …

[图书][B] Forensic psychology: Fact and fiction

T Davis - 2020 - books.google.com
This fascinating and research-led textbook gives students the facts and the tools they need
to engage critically with the psychological dimension of the criminal justice system …

VM Anti-forensics: Detecting File Wiping Using File System Journals

P Sanda, D Pawar, V Radha - … Conference on Computing in Engineering & …, 2022 - Springer
Malware, tools, or other files deleted or created on a cloud Virtual Machine (VM) by an
adversary may leave traces of the activities performed. Adversaries may securely delete the …