Digital forensics investigation for attacks on artificial intelligence
S Manasa, KP Kumar - ECS Transactions, 2022 - iopscience.iop.org
The new research approaches are needed to be adopted to deal with security threats in AI
based systems. This research is aimed at investigating the Artificial Intelligence (AI) attacks …
based systems. This research is aimed at investigating the Artificial Intelligence (AI) attacks …
Smartphone data evaluation model: Identifying authentic smartphone data
Ever improving smartphone technology, along with the widespread use of the devices to
accomplish daily tasks, leads to the collection of rich sources of smartphone data …
accomplish daily tasks, leads to the collection of rich sources of smartphone data …
Reference architecture for android applications to support the detection of manipulated evidence
H Pieterse, MS Olivier… - SAIEE Africa Research …, 2016 - ieeexplore.ieee.org
Traces found on Android smartphones form a significant part of digital investigations. A key
component of these traces is the date and time, often formed as timestamps. These …
component of these traces is the date and time, often formed as timestamps. These …
Df 2.0: An automated, privacy preserving, and efficient digital forensic framework that leverages machine learning for evidence prediction and privacy evaluation
The current state of digital forensic investigation is continuously challenged by the rapid
technological changes, the increase in the use of digital devices (both the heterogeneity and …
technological changes, the increase in the use of digital devices (both the heterogeneity and …
Data privacy perceptions about digital forensic investigations in India
A digital forensic investigation requires an investigator to examine the forensic images of the
seized storage media and devices. The investigator obtains full access to all the data …
seized storage media and devices. The investigator obtains full access to all the data …
Detecting manipulated smartphone data on Android and iOS Devices
Ever improving technology allows smartphones to become an integral part of people's lives.
The reliance on and ubiquitous use of smartphones render these devices rich sources of …
The reliance on and ubiquitous use of smartphones render these devices rich sources of …
Evaluation framework for detecting manipulated smartphone data
H Pieterse, M Olivier… - SAIEE Africa Research …, 2019 - ieeexplore.ieee.org
Ever improving technology allows smartphones to become an integral part of people's lives.
The reliance on and ubiquitous use of smartphones render these devices rich sources of …
The reliance on and ubiquitous use of smartphones render these devices rich sources of …
Playing hide-and-seek: Detecting the manipulation of Android timestamps
H Pieterse, MS Olivier… - 2015 Information Security …, 2015 - ieeexplore.ieee.org
Mobile technology continues to evolve in the 21st century, providing users with improved
capabilities and advance functionality. One of the leaders of this evolution is Android, a …
capabilities and advance functionality. One of the leaders of this evolution is Android, a …
DF 2.0: Designing an automated, privacy preserving, and efficient digital forensic framework
The current state of digital forensic investigation is continuously challenged by the rapid
technological changes, the increase in the use of digital devices (both the heterogeneity and …
technological changes, the increase in the use of digital devices (both the heterogeneity and …
Evaluating the authenticity of smartphone evidence
The widespread use and rich functionality of smartphones have made them valuable
sources of digital evidence. Malicious individuals are becoming aware of the importance of …
sources of digital evidence. Malicious individuals are becoming aware of the importance of …