A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection
2022
International Journal of Communication Networks and Information Security
In this paper, we explore the science of computer forensics, a dark web forensic framework, and digital evidence detection tools. ...
Hence, computer forensics research is becoming more crucial in developing good forensic frameworks and digital evidence detection tools to deter more cyber-attacks. ...
That is collecting and analyzing data from different computer resources including computer networks, lines of communication, Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence ...
doi:10.17762/ijcnis.v11i3.4407
fatcat:heolt366ojcvdk5r7zdu2atuum
Digital Forensics for Recoloring via Convolutional Neural Network
2019
Computers Materials & Continua
Thus, in digital forensics, it is necessary to understand the manipulating history of images. That requires to verify all possible manipulations applied to images. ...
Thus, it is necessary to guarantee the correctness of color in digital forensics. On the other hand, many image retouching or editing applications or software are equipped with recoloring function. ...
In 1989, a neural network to recognize handwritten digits is proposed. This network was named 'Net-5'. ...
doi:10.32604/cmc.2020.08291
fatcat:ocsyxhllfzg6vcsl2iydcfmoka
Exploration of Vulnerabilities, Threats and Forensic Issues and its impact on the Distributed Environment of Cloud and its mitigation
2020
Procedia Computer Science
Most of the criminals get away because of lack of evidence. Evidence collection and analysis in the digital world and especially in cloud environment is a great challenge. ...
Most of the criminals get away because of lack of evidence. Evidence collection and analysis in the digital world and especially in cloud environment is a great challenge. ...
Acknowledgements The authors are thankful to the anonymous reviewers and the editors for their suggestions. The authors are also thankful to the managers for quick and timely responses. ...
doi:10.1016/j.procs.2020.03.194
fatcat:hy7dsllia5c5biq24xlfhdihwm
A Study of Cybercrimes in India using Digital Forensics
2020
International Journal for Research in Applied Science and Engineering Technology
This paper deals with different tools for analysing and comparing the evidence and generating results Various work has been carried out in the domain of cyber crime and digital forensics to deal with cybercrimes ...
Various digital tools and techniques are being used to achieve this. ...
His knowledge on the various tools of Digital Forensics is commendable that proved to be very helpful for deeper understanding of the evidences and the case. ...
doi:10.22214/ijraset.2020.31865
fatcat:pvgjf3mmuvfufamdefjoqxvsva
Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism
2021
Journal of Law and Emerging Technologies
While there is no internationally agreed standard to apply on using OSINT for criminal investigations, the researcher proposes new framework that utilizes the application of digital forensics standards ...
Due to the proliferation of internet connectivity and the use of the Internet by terrorists, new mythologies and framework are needed to effectively identify, collect, preserve, and present the evidence ...
Digital forensics with open source tools: using open source platform tools for performing computer forensics on target systems: Windows, Mac, Linux, UNIX, etc. ...
doi:10.54873/jolets.v1i1.32
fatcat:hhcwnbknm5b7rhcwy2nxzgy5gu
Digital evidence review 2016–2019
2020
Forensic Science International: Synergy
This review paper covers the forensic-relevant literature in digital evidence from 2016 to 2019 as a part of the 19th Interpol International Forensic Science Managers Symposium. ...
Dark net A lack of privacy offered by digital communication became a global debate following the revelations of Edward Snowden concerning mass surveillance. ...
Detecting tools errors in digital forensics can be especially fraught as there is little opportunity for manual validation as the evidence cannot be touched or viewed. ...
doi:10.1016/j.fsisyn.2020.01.015
pmid:33385144
pmcid:PMC7770434
fatcat:iqenqbpx7bdelkcbhinbczvi4i
Media Forensics and DeepFakes: an overview
[article]
2020
arXiv
pre-print
Therefore, there is an urgent need for automated tools capable of detecting false multimedia content and avoiding the spread of dangerous false information. ...
The analysis will help to highlight the limits of current forensic tools, the most relevant issues, the upcoming challenges, and suggest future directions for research. ...
For example, a tool for copy-move detection will not help in case of a splicing. ...
arXiv:2001.06564v1
fatcat:b3izh3hcmrae5frbd2bv3tmlgu
Applying Artificial Intelligence for Age Estimation in Digital Forensic Investigations
[article]
2022
arXiv
pre-print
The precise age estimation of child sexual abuse and exploitation (CSAE) victims is one of the most significant digital forensic challenges. ...
This paper evaluates existing facial image datasets and proposes a new dataset tailored to the needs of similar digital forensic research contributions. ...
Their results suggest an accurate tool for the detection of CSAE material with false-positive rates of 7.9% for images and 4.3% for videos. ...
arXiv:2201.03045v1
fatcat:i6mk4i253nf7fex2ssklp472va
The Digital Detective's Discourse - A toolset for forensically sound collaborative dark web content annotation and collection
2022
Journal of Digital Forensics, Security and Law
Using a design science strategy, we design and develop tools to enable and extend web content annotation. The annotation tool was implemented as a plugin for the Tor browser. ...
Consequently, the research in cybercrime and digital forensics has relied on ML techniques and methods for analyzing large quantities of data such as text, graphics, images, videos, and network traffic ...
ACKNOWLEDGEMENT The work is partially supported by the Nord-Forsk Grant No. 80512 for the project "Police Detectives on the TOR-network." ...
doi:10.15394/jdfsl.2022.1740
fatcat:a3x7thgyd5em7owrbaazyv7yke
Genetic witness: forensic uses of DNA tests
1991
ChoiceReviews
Congress on five policy issues: . standards for forensic uses of DNA typing; q funding of crime laboratories, forensic personnel training, and forensic research; . the advisability of establishing computer ...
Today's debate focuses on what standards and additional quality control may need to be used in forensic DNA testing, but no scientific doubt remains that technologies already available can accurately detect ...
Computer technology in use and under development provides tools for interpreting test results. ...
doi:10.5860/choice.28-3884
fatcat:7ojje6yngbdsbmu2zfylwy3fcy
Exploring Deviant Hacker Networks (DHM) on Social Media Platforms
2016
Journal of Digital Forensics, Security and Law
The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious ...
These nefarious uses of OSNs poses a signicant threat to society, and thus requires research attention. ...
groups through cyber forensic tools and methodologies. ...
doi:10.15394/jdfsl.2016.1375
fatcat:6svjljsidzeirhqjbeusffm4uy
Retrieval of Digital Artefacts from TeamSpeak and Discord: A Forensic Investigation and Analysis of the Malicious Use of Gaming Communication Clients
2020
Figshare
This paper aims to understand the effectiveness of current moderation tools used to filter online abuse and to look at the possibility of extracting terrestrial artefacts that are left after use from these ...
Gaming communication clients such as Discord and TeamSpeak have started to become an active choice for committing acts of crime, from being used to groom children to being used to organise crimes. ...
-Y. and Lin, Y.-L. (2012). 'Skype Chat Data Forgery Detection'. Computer Applications for Communication, Networking, and Digital Contents. Communications in Computer and Information Science. ...
doi:10.6084/m9.figshare.12656990
fatcat:qncwz6czzvaidlatxfe7hqbuuu
Identity Document and banknote security forensics: a survey
[article]
2019
arXiv
pre-print
Aiming to detect these counterfeits, the present survey covers a wide range of anti-counterfeiting security features, categorizing them into three components: security substrate, security inks and security ...
From the computer vision perspective, we present works in the literature covering these three categories. ...
Same reasoning can be applied to design computer vision algorithms for counterfeit detection. ...
arXiv:1910.08993v1
fatcat:6onl6iprozbm3m7r3rea6xlnfq
Copy-Move Geometric Tampering Estimation Through Enhanced SIFT Detector Method
2023
Computer systems science and engineering
Digital picture forgery detection has recently become a popular and significant topic in image processing. ...
Due to advancements in image processing and the availability of sophisticated software, picture fabrication may hide evidence and hinder the detection of such criminal cases. ...
Oleg Muratov and colleagues present a new use of saliency detection as a tool for forensic image analysis [23] . ...
doi:10.32604/csse.2023.023747
fatcat:7zn7f6rfgjhkfk242bqr4c7noe
Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions
2021
Journal of Cybersecurity and Privacy
To accomplish this, the survey establishes criteria for comparison and conducts an analysis of the tools in both mobile digital forensic and open-source intelligence investigations. ...
Out of all the methods used in mobile digital forensics, logical extraction and hex dumps are the most effective and least likely to cause damage to the data. ...
Digital Forensics Digital forensics is the practice of collecting and organizing information found on an electronic device for investigative purposes. ...
doi:10.3390/jcp1040029
doaj:333f0fb03bcf4ab69d6cf4be3808a2c5
fatcat:g4mgeamwjbawrfgxyarkolkl2y
« Previous
Showing results 1 — 15 out of 978 results