Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman, A Chehab - Internet of Things, 2022 - Elsevier
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …

Media forensics on social media platforms: a survey

C Pasquini, I Amerini, G Boato - EURASIP Journal on Information Security, 2021 - Springer
The dependability of visual information on the web and the authenticity of digital media
appearing virally in social media platforms has been raising unprecedented concerns. As a …

Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
The number of cyber attacks has increased tremendously in the last few years. This resulted
into both human and financial losses at the individual and organization levels. Recently …

Byte-level object identification for forensic investigation of digital images

AR Javed, Z Jalil - … Conference on Cyber Warfare and Security …, 2020 - ieeexplore.ieee.org
Lately, digital data has increased a key role in providing and sharing information. Pictures
and video recordings are utilized to pass on convincing messages to be utilized under a few …

Real-Time Detection and Identification of Suspects in Forensic Imagery Using Advanced YOLOv8 Object Recognition Models.

S Karakuş, M Kaya, SA Tuncer - Traitement du Signal, 2023 - search.ebscohost.com
Rapid advancements in artificial intelligence, machine learning, deep learning, coupled with
easy access to high-capacity processing hardware, expansive organized datasets, and the …

[PDF][PDF] An Optimization Approach for Convolutional Neural Network Using Non-Dominated Sorted Genetic Algorithm-II.

A Zafar, M Aamir, NM Nawi, A Arshad… - … , Materials & Continua, 2023 - researchgate.net
In computer vision, convolutional neural networks have a wide range of uses. Images
represent most of today's data, so it's important to know how to handle these large amounts …

Blockchain-Based Distributed and Secure Digital Forensic Investigation Systems

M Conti, G Kumar, C Lal, R Saha - Blockchains: A Handbook on …, 2023 - Springer
Lawful evidence management by law enforcement agencies during the Digital Forensics
(DF) investigation is of supreme importance since it convicts suspects of crimes. Therefore, a …

[PDF][PDF] A Complete Bibliography of IEEE Security & Privacy

NHF Beebe - 2024 - 155.101.98.136
[Ami05, AS05, And06b, Ano18-30, Arb04, AM04, CMV09, CV10, Chu08, CG04, DR06,
DR04, ES11, GS06, GA10, IR11, KS08b, LS09, Lan13a, LS12, MW23, MD09b, MC09 …