Transactions or funds in Bitcoin can become "stuck" due to low fees, network congestion, custodial holds, chain reorganizations, or lost keys. This paper surveys the causes, describes remediation techniques such as fee bumping,... more
Cloud log forensics (CLF) mitigates the investigation process by identifying the malicious behavior of attackers through profound cloud log analysis. However, the accessibility attributes of cloud logs obstruct accomplishment of the goal... more
Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud... more
Many companies have cited lack of cyber-security as the main barrier to Industrie 4.0 or digitalization. Security functions include protection, detection, response and investigation. Cyber-attack investigation is important as it can... more
This conference delves into the transformative potential of blockchain technology. We urge researchers, engineers, academicians, and industry leaders from across the globe to converge and illuminate their breakthroughs and endeavours in... more
Due to growth of Internet and multimedia technologies in today's life, it made easy to copy and distribution of any document without any owner's consent. Watermarking is a process of concealing the digital information in a document for... more
Explainable models in Artificial Intelligence are often employed to ensure transparency and accountability of AI systems. The fidelity of the explanations are dependent upon the algorithms used as well as on the fidelity of the data. Many... more
Forensic investigators should acquire and analyze large amount of digital evidence and submit to the court the technical truth about facts in virtual worlds. Since digital evidence is complex, diffuse, volatile and can be accidentally or... more
The justification of an algorithm’s outcomes is important in many domains, and in particular in the law. However, previous research has shown that machine learning systems can make the right decisions for the wrong reasons: despite high... more
The influence of Artificial Intelligence is growing, as is the need to make it as explainable as possible. Explainability is one of the main obstacles that AI faces today on the way to more practical implementation. In practise, companies... more
In this paper, we propose a comprehensive analytics framework that can serve as a decision support tool for HR recruiters in real-world settings in order to improve hiring and placement decisions. The proposed framework follows two main... more
The current challenge of mobile devices is the storage capacity that has led service providers to develop new value-added mobile services. To address these limitations, mobile cloud computing, which offers on-demand is developed. Mobile... more
Digital Forensic Readiness (DFR) has received little attention by the research community, when compared to the core digital forensic investigation processes. DFR was primarily about logging of security events to be leveraged by the... more
We describe the design, implementation, and evaluation of FROSTdthree new forensic tools for the OpenStack cloud platform. Our implementation for the OpenStack cloud platform supports an Infrastructure-as-a-Service (IaaS) cloud and... more
Within the field of Requirements Engineering (RE), the increasing significance of Explainable Artificial Intelligence (XAI) in aligning AI-supported systems with user needs, societal expectations, and regulatory standards has garnered... more
For vehicle-pedestrian accidents, knowledge of pedestrian pre-impact speed aids in understanding post-impact kinematics, injury patterns and legal culpability. It is hypothesised that the transverse offset between the primary and... more
This paper describes an extensive study on the existing methods and techniques for the web server analysis. The web server analysis is important in forensic study as it analyses the web log files to discover user-accessing patterns of web... more
Digital crime inflicts immense damage to users and systems and now it has reached a level of sophistication that makes it difficult to track its sources or origins especially with the advancements in modern computers, networks and the... more
Explainable models in Artificial Intelligence are often employed to ensure transparency and accountability of AI systems. The fidelity of the explanations are dependent upon the algorithms used as well as on the fidelity of the data. Many... more
Cloud computing has been adopted by a wide variety of businesses and organisations to give services to customers in a secure and certified manner, protecting cloud providers from fraudulent actions. To investigate cloud-based cybercrimes,... more
The justification of an algorithm's outcomes is important in many domains, and in particular in the law. However, previous research has shown that machine learning systems can make the right decisions for the wrong reasons: despite high... more
CURE—Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments
A malicious alteration of system-provided timeline can negatively affect the reliability of computer forensics. Indeed, detecting such changes and possibly reconstructing the correct timeline of events is of paramount importance for court... more
Cloud computing provides several benefits to organizations such as increased flexibility, scalability and reduced cost. However, it provides several challenges for digital forensics and criminal investigation. Some of these challenges are... more
As technology advances, multimedia files such as videos are susceptible to manipulation. This has led to serious concerns that images and videos are not trustworthy evidence as the files can be manipulated easily. As a result, forensic... more
User activity logs can be a valuable source of information in cloud forensic investigations; hence, ensuring the reliability and integrity of such logs is crucial. Most existing solutions for secure logging are designed for conventional... more
Digital forensics is a process of uncovering and exploring evidence from digital content. A growth in digital data in recent years has made it challenging for forensic investigators to uncover useful information. Moreover, the applied use... more
Digital forensics has plenty of applications. Digital evidence in the field of forensic investigation is has become very important. There are many issues in dealing with network evidence. As the network is volatile in nature it becomes... more
Digital forensic investigators are faced with multimedia retrieval and discovery challenges that require innovation and application of evolving methodologies. This work is made more difficult in critical infra-structure environments where... more
Most cloud security incidents are initially detected by automated monitoring tools. Because they are tuned to minimize the risk of false-negative errors, these tools cast a wide net of suspicion. Depending on the scale of the incident,... more
loud-based applications and services have changed the nature of computing. Individuals, businesses, industries, and governments are increasingly adopting the cloud because of its scalability and its capacity to let customers of... more
The present level of skepticism expressed by courts, legal practitioners, and the general public over Artificial Intelligence (AI) based digital evidence extraction techniques has been observed, and understandably so. Concerns have been... more
As technology advances, multimedia files such as videos are susceptible to manipulation. This has led to serious concerns that images and videos are not trustworthy evidence as the files can be manipulated easily. As a result, forensic... more
Digital forensic analyses are being applied to a variety of domains as the scope and potential of digital evidence available is vast. The importance of forensic analyses of web-based devices and tools is increasing, coinciding with the... more
The use of Role in CASE is important to clarify. Assigning a Role to an Identity within a specific context allows the same Identity to have multiple Roles in different contexts. In the Oresteia example, Clytemnestra has the Role of... more
Digital forensics has plenty of applications. Digital evidence in the field of forensic investigation is has become very important. There are many issues in dealing with network evidence. As the network is volatile in nature it becomes... more
Recently, the exponential growth of Internet of Things (IoT) network-connected devices has resulted in the exchange of large amounts of data via a smart grid. This extensive connection between IoT devices results in numerous security... more
In recent years we can observe that digital forensics is being applied to a variety of domains as nearly any data can become valuable forensic evidence. The sheer scope of web-based investigations provides a vast amount of information.... more
Digital forensic analyses are being applied to a variety of domains as the scope and potential of digital evidence available is vast. The importance of forensic analyses of web-based devices and tools is increasing, coinciding with the... more
A Cloud is a platform that allows for quick application deployment and dynamic scaling. The cloud differs from on-premise software and data storage in terms of cost, security, scalability, recovery, and mobility which makes more... more
THE STUDY OF COMPUTER SCIENCE AND FILE RECOVERY FROM IDENTIFICATION TO REPORTING
Cloud computing technology attracted many Internet users and organizations the past few years and has become one of the hottest topics in IT. However, due to the newly appeared threats and challenges arisen in cloud computing, current... more
As technology advances, multimedia files such as videos are susceptible to manipulation. This has led to serious concerns that images and videos are not trustworthy evidence as the files can be manipulated easily. As a result, forensic... more
This paper shows empirically that Fuzzy Pattern Trees (FPT) evolved using Grammatical Evolution (GE), a system we call FGE, meet the criteria to be considered a robust Explainable Artificial Intelligence (XAI) system. Experimental results... more
Cloud computing and cloud storage services, in particular, pose new challenges to digital forensic investigations. Currently, evidence acquisition for these services follows the traditional method of collecting artifacts residing on... more