A Study on Countermeasures against Neutralizing Technology: Encoding Algorithm-Based Ransomware Detection Methods Using Machine Learning

J Lee, J Yun, K Lee - Electronics, 2024 - mdpi.com
Ransomware, which emerged in 1989, has evolved to the present in numerous variants and
new forms. For this reason, serious damage caused by ransomware has occurred not only …

Analysis of home security system based Arduino

R Wirawan, AS Putra, N Aisyah… - … (International Journal of …, 2022 - ijistech.org
The background of this research is how to implement a smart security system that will be
applied to a smart home concept so that it can help its residents maintain security in the …

ANALISIS PENGOLAHAN DATA FORENSIK PADA SOLID STATE DRIVE (SSD) MENGGUNAKAN FRAMEWORK GRR RAPID RESPONSE

AS Putra, N Aisyah, S Safrizal - Jurnal Ilmiah Teknik Informatika …, 2022 - ojs.upi-yai.ac.id
Latar belakang penelitian ini adalah dengan mengetahui pengolahan data pada Solid State
Drive (SSD) dengan menggunakan pendekatan framework GRR Rapid Respone, maka …

Investigations Using The Whatsapp Application By Analyzing Evidence of Crime In Conversation Data

P Priyono, BA Wahid, P Priatno, R Iskandar… - … (International Journal of …, 2022 - ijistech.org
The background of this research is to find evidence in an application called WhatsApp by
analyzing data in the form of conversations or chats from 2 people who are suspected of …

[PDF][PDF] A Study on Countermeasures against Neutralizing Technology: Encoding Algorithm-Based Ransomware Detection Methods Using Machine Learning …

J Lee, J Yun, K Lee - 2024 - academia.edu
Ransomware, which emerged in 1989, has evolved to the present in numerous variants and
new forms. For this reason, serious damage caused by ransomware has occurred not only …

Forensic authentication examination of webcam videos

S Li, M Yang, J Zeng - International Conference on Computer …, 2024 - spiedigitallibrary.org
With the rise of network cameras, the authenticity of video data they capture has become a
common challenge in forensic science and expertise. There are many camera …

Research on the source tracing and authentication of mobile phone screenshot images

M Yang, S Li, X Qiu, J Zeng - International Conference on …, 2024 - spiedigitallibrary.org
In the modern digital society, mobile phone screenshots are essential for documenting data,
proving events, and providing legal evidence. However, modern digital technologies have …

[PDF][PDF] The Significance of Metadata and Video Compression for Investigating Video Files on Social Media Forensic

M Choudhary, AV Ramani, V Bhardwaj - 2023 - academia.edu
Digital forensics is an essential aspect of cyber security and the investigation of digital
crimes. Digital recordings are routinely used as important evidence sources in the …