Machine learning in digital forensics: a systematic literature review
T Nayerifard, H Amintoosi, AG Bafghi… - arXiv preprint arXiv …, 2023 - arxiv.org
Development and exploitation of technology have led to the further expansion and
complexity of digital crimes. On the other hand, the growing volume of data and …
complexity of digital crimes. On the other hand, the growing volume of data and …
[图书][B] The development of play
D Cohen - 2018 - taylorfrancis.com
Why is play so important in child development? Are children in today's society suffering from
a lack of time for free play, with the emerging dominance of screen play? Can play therapy …
a lack of time for free play, with the emerging dominance of screen play? Can play therapy …
Assessing the challenges affecting the investigative methods to combat online child exploitation material offenses
Technology has dramatically simplified the process of engaging in a variety of crimes,
particularly the distribution of child exploitation materials, or CEM. The ability to share photos …
particularly the distribution of child exploitation materials, or CEM. The ability to share photos …
Phishing URL detection: A real-case scenario through login URLs
M Sánchez-Paniagua, EF Fernández, E Alegre… - IEEE …, 2022 - ieeexplore.ieee.org
Phishing is a social engineering cyberattack where criminals deceive users to obtain their
credentials through a login form that submits the data to a malicious server. In this paper, we …
credentials through a login form that submits the data to a malicious server. In this paper, we …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
AttM-CNN: Attention and metric learning based CNN for pornography, age and Child Sexual Abuse (CSA) Detection in images
Nowadays, the growing number of cases of possession and distribution of Child Sexual
Abuse (CSA) material pose a significant challenge for Law Enforcement Agencies (LEAs). In …
Abuse (CSA) material pose a significant challenge for Law Enforcement Agencies (LEAs). In …
[HTML][HTML] A practitioner survey exploring the value of forensic tools, ai, filtering, & safer presentation for investigating child sexual abuse material (csam)
For those investigating cases of Child Sexual Abuse Material (CSAM), there is the potential
harm of experiencing trauma after illicit content exposure over a period of time. Research …
harm of experiencing trauma after illicit content exposure over a period of time. Research …
Towards automated detection of risky images shared by youth on social media
With the growing ubiquity of the Internet and access to media-based social media platforms,
the risks associated with media content sharing on social media and the need for safety …
the risks associated with media content sharing on social media and the need for safety …
[HTML][HTML] Detecting child sexual abuse images: Traits of child sexual exploitation hosting and displaying websites
E Guerra, BG Westlake - Child Abuse & Neglect, 2021 - Elsevier
Background Automated detection of child sexual abuse images (CSAI) often relies on image
attributes, such as hash values. However, electronic service providers and others without …
attributes, such as hash values. However, electronic service providers and others without …
Towards forensic-ready software systems
As software becomes more ubiquitous, and the risk of cyber-crimes increases, ensuring that
software systems are forensic-ready (ie, capable of supporting potential digital …
software systems are forensic-ready (ie, capable of supporting potential digital …