Search
Search Results
-
SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES
Quick response codes are widely used for tagging products, sharing information and making digital payments due to their robustness against... -
What’s in This Book and Why?
Multimedia forensics is a societally important and technically challenging research area that will need significant effort for the foreseeable... -
Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of...
-
Sensor Fingerprints: Camera Identification and Beyond
Every imaging sensor introduces a certain amount of noise to the images it captures—slight fluctuations in the intensity of individual pixels even... -
Forged document detection and writer identification through unsupervised deep learning approach
In recent years, there has been a significant increase in document forgery, which includes the fraudulent replication of currency, diplomas, and...
-
H4VDM: H.264 Video Device Matching
Methods that can determine if two given video sequences are captured by the same device (e.g., mobile telephone or digital camera) can be used in... -
A Robust Approach for Crop Misalignment Estimation in Single and Double JPEG Compressed Images
In forensics investigation, information about the crop performed after a JPEG compression can be useful exploited to reconstruct the manipulation... -
Machine Learning-Based Online Source Identification for Image Forensics
Source camera identification is central to multimedia forensics with much research effort addressing to this problem. The assumption made by most... -
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device
The IoT devices have proliferated into human lives from simple mundane to advanced lifesaving activities by means of automation, control and...
-
Incident Response
Turning away from law enforcement, computer forensics is a common part of modern-day incident response. Incident response is essentially the practice... -
Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security
The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data...
-
Computer and Network Forensics
This chapter discusses what constitutes digital evidence, the collection and analysis of digital evidence, the chain of custody, the writing of the... -
Triage
Two major challenges in modern-day forensics are urgency and volume of data. Needless to say, modern computers can carry large amounts of data, and... -
Computer security incident response teams: are they legally regulated? The Swiss example
Computer Security Incident Response Teams (CSIRTs) or Computer Emergency Response Teams (CERTs) are an integral part of incident handling...
-
ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS
Industrial control systems are increasingly targeted by cyber attacks. However, it is difficult to conduct forensic investigations of industrial... -
An Intrusion Detection System and Attack Intension Used in Network Forensic Exploration
Cyberattacks are occurring increasingly frequently as cyber science advances and people utilize the internet and other technology on a regular basis.... -
Forensic Analysis of Telegram Messenger on iOS and Android Smartphones Case Study
Mobile digital forensics science is develo** on a daily basis, and every day there is a new tool introduced and a new challenge as well. This... -
High-Quality PRNU Anonymous Algorithm for JPEG Images
The utilization of Photo Response Non-Uniformity (PRNU) technology has found extensive application in the field of multimedia forensics, particularly... -
Blockchain-based tamper-proof and transparent investigation model for cloud VMs
In cloud forensics, ensuring the integrity of the evidence such that it is admissible in a court of law is essential. There is always a possibility...
-