978 Hits in 7.0 sec

Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection

May A. Alotaibi, Mohammed A. AlZain, Ben Soh, Mehedi Masud, Jehad Al-Amri
2022 International Journal of Communication Networks and Information Security  
In this paper, we explore the science of computer forensics, a dark web forensic framework, and digital evidence detection tools.  ...  Hence, computer forensics research is becoming more crucial in developing good forensic frameworks and digital evidence detection tools to deter more cyber-attacks.  ...  That is collecting and analyzing data from different computer resources including computer networks, lines of communication, Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence  ... 
doi:10.17762/ijcnis.v11i3.4407 fatcat:heolt366ojcvdk5r7zdu2atuum

Digital Forensics for Recoloring via Convolutional Neural Network

Zhangyi Shen, Feng Ding, Yunqing Shi
2019 Computers Materials & Continua  
Thus, in digital forensics, it is necessary to understand the manipulating history of images. That requires to verify all possible manipulations applied to images.  ...  Thus, it is necessary to guarantee the correctness of color in digital forensics. On the other hand, many image retouching or editing applications or software are equipped with recoloring function.  ...  In 1989, a neural network to recognize handwritten digits is proposed. This network was named 'Net-5'.  ... 
doi:10.32604/cmc.2020.08291 fatcat:ocsyxhllfzg6vcsl2iydcfmoka

Exploration of Vulnerabilities, Threats and Forensic Issues and its impact on the Distributed Environment of Cloud and its mitigation

Gayatri S Pandi (Jain), Saurabh Shah, K.H. Wandra
2020 Procedia Computer Science  
Most of the criminals get away because of lack of evidence. Evidence collection and analysis in the digital world and especially in cloud environment is a great challenge.  ...  Most of the criminals get away because of lack of evidence. Evidence collection and analysis in the digital world and especially in cloud environment is a great challenge.  ...  Acknowledgements The authors are thankful to the anonymous reviewers and the editors for their suggestions. The authors are also thankful to the managers for quick and timely responses.  ... 
doi:10.1016/j.procs.2020.03.194 fatcat:hy7dsllia5c5biq24xlfhdihwm

A Study of Cybercrimes in India using Digital Forensics

Tanvi Gupta
2020 International Journal for Research in Applied Science and Engineering Technology  
This paper deals with different tools for analysing and comparing the evidence and generating results Various work has been carried out in the domain of cyber crime and digital forensics to deal with cybercrimes  ...  Various digital tools and techniques are being used to achieve this.  ...  His knowledge on the various tools of Digital Forensics is commendable that proved to be very helpful for deeper understanding of the evidences and the case.  ... 
doi:10.22214/ijraset.2020.31865 fatcat:pvgjf3mmuvfufamdefjoqxvsva

Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism

Mohamed Elguindy
2021 Journal of Law and Emerging Technologies  
While there is no internationally agreed standard to apply on using OSINT for criminal investigations, the researcher proposes new framework that utilizes the application of digital forensics standards  ...  Due to the proliferation of internet connectivity and the use of the Internet by terrorists, new mythologies and framework are needed to effectively identify, collect, preserve, and present the evidence  ...  Digital forensics with open source tools: using open source platform tools for performing computer forensics on target systems: Windows, Mac, Linux, UNIX, etc.  ... 
doi:10.54873/jolets.v1i1.32 fatcat:hhcwnbknm5b7rhcwy2nxzgy5gu

Digital evidence review 2016–2019

Paul Reedy
2020 Forensic Science International: Synergy  
This review paper covers the forensic-relevant literature in digital evidence from 2016 to 2019 as a part of the 19th Interpol International Forensic Science Managers Symposium.  ...  Dark net A lack of privacy offered by digital communication became a global debate following the revelations of Edward Snowden concerning mass surveillance.  ...  Detecting tools errors in digital forensics can be especially fraught as there is little opportunity for manual validation as the evidence cannot be touched or viewed.  ... 
doi:10.1016/j.fsisyn.2020.01.015 pmid:33385144 pmcid:PMC7770434 fatcat:iqenqbpx7bdelkcbhinbczvi4i

Media Forensics and DeepFakes: an overview [article]

Luisa Verdoliva
2020 arXiv   pre-print
Therefore, there is an urgent need for automated tools capable of detecting false multimedia content and avoiding the spread of dangerous false information.  ...  The analysis will help to highlight the limits of current forensic tools, the most relevant issues, the upcoming challenges, and suggest future directions for research.  ...  For example, a tool for copy-move detection will not help in case of a splicing.  ... 
arXiv:2001.06564v1 fatcat:b3izh3hcmrae5frbd2bv3tmlgu

Applying Artificial Intelligence for Age Estimation in Digital Forensic Investigations [article]

Thomas Grubl, Harjinder Singh Lallie
2022 arXiv   pre-print
The precise age estimation of child sexual abuse and exploitation (CSAE) victims is one of the most significant digital forensic challenges.  ...  This paper evaluates existing facial image datasets and proposes a new dataset tailored to the needs of similar digital forensic research contributions.  ...  Their results suggest an accurate tool for the detection of CSAE material with false-positive rates of 7.9% for images and 4.3% for videos.  ... 
arXiv:2201.03045v1 fatcat:i6mk4i253nf7fex2ssklp472va

The Digital Detective's Discourse - A toolset for forensically sound collaborative dark web content annotation and collection

Jesper Bergman, Oliver B. Popov
2022 Journal of Digital Forensics, Security and Law  
Using a design science strategy, we design and develop tools to enable and extend web content annotation. The annotation tool was implemented as a plugin for the Tor browser.  ...  Consequently, the research in cybercrime and digital forensics has relied on ML techniques and methods for analyzing large quantities of data such as text, graphics, images, videos, and network traffic  ...  ACKNOWLEDGEMENT The work is partially supported by the Nord-Forsk Grant No. 80512 for the project "Police Detectives on the TOR-network."  ... 
doi:10.15394/jdfsl.2022.1740 fatcat:a3x7thgyd5em7owrbaazyv7yke

Genetic witness: forensic uses of DNA tests

1991 ChoiceReviews  
Congress on five policy issues: . standards for forensic uses of DNA typing; q funding of crime laboratories, forensic personnel training, and forensic research; . the advisability of establishing computer  ...  Today's debate focuses on what standards and additional quality control may need to be used in forensic DNA testing, but no scientific doubt remains that technologies already available can accurately detect  ...  Computer technology in use and under development provides tools for interpreting test results.  ... 
doi:10.5860/choice.28-3884 fatcat:7ojje6yngbdsbmu2zfylwy3fcy

Exploring Deviant Hacker Networks (DHM) on Social Media Platforms

Samer Al-khateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger
2016 Journal of Digital Forensics, Security and Law  
The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious  ...  These nefarious uses of OSNs poses a signicant threat to society, and thus requires research attention.  ...  groups through cyber forensic tools and methodologies.  ... 
doi:10.15394/jdfsl.2016.1375 fatcat:6svjljsidzeirhqjbeusffm4uy

Retrieval of Digital Artefacts from TeamSpeak and Discord: A Forensic Investigation and Analysis of the Malicious Use of Gaming Communication Clients

Oliver Bryant
2020 Figshare  
This paper aims to understand the effectiveness of current moderation tools used to filter online abuse and to look at the possibility of extracting terrestrial artefacts that are left after use from these  ...  Gaming communication clients such as Discord and TeamSpeak have started to become an active choice for committing acts of crime, from being used to groom children to being used to organise crimes.  ...  -Y. and Lin, Y.-L. (2012). 'Skype Chat Data Forgery Detection'. Computer Applications for Communication, Networking, and Digital Contents. Communications in Computer and Information Science.  ... 
doi:10.6084/m9.figshare.12656990 fatcat:qncwz6czzvaidlatxfe7hqbuuu

Identity Document and banknote security forensics: a survey [article]

Albert Berenguel Centeno, Oriol Ramos Terrades, Josep Lladós Canet, Cristina Cañero Morales
2019 arXiv   pre-print
Aiming to detect these counterfeits, the present survey covers a wide range of anti-counterfeiting security features, categorizing them into three components: security substrate, security inks and security  ...  From the computer vision perspective, we present works in the literature covering these three categories.  ...  Same reasoning can be applied to design computer vision algorithms for counterfeit detection.  ... 
arXiv:1910.08993v1 fatcat:6onl6iprozbm3m7r3rea6xlnfq

Copy-Move Geometric Tampering Estimation Through Enhanced SIFT Detector Method

J. S. Sujin, S. Sophia
2023 Computer systems science and engineering  
Digital picture forgery detection has recently become a popular and significant topic in image processing.  ...  Due to advancements in image processing and the availability of sophisticated software, picture fabrication may hide evidence and hinder the detection of such criminal cases.  ...  Oleg Muratov and colleagues present a new use of saliency detection as a tool for forensic image analysis [23] .  ... 
doi:10.32604/csse.2023.023747 fatcat:7zn7f6rfgjhkfk242bqr4c7noe

Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions

Cecelia Horan, Hossein Saiedian
2021 Journal of Cybersecurity and Privacy  
To accomplish this, the survey establishes criteria for comparison and conducts an analysis of the tools in both mobile digital forensic and open-source intelligence investigations.  ...  Out of all the methods used in mobile digital forensics, logical extraction and hex dumps are the most effective and least likely to cause damage to the data.  ...  Digital Forensics Digital forensics is the practice of collecting and organizing information found on an electronic device for investigative purposes.  ... 
doi:10.3390/jcp1040029 doaj:333f0fb03bcf4ab69d6cf4be3808a2c5 fatcat:g4mgeamwjbawrfgxyarkolkl2y
« Previous Showing results 1 — 15 out of 978 results