A Systematic Literature Review on Digital Forensic Investigation on Android Devices

A Almuqren, H Alsuwaelim, MMH Rahman… - Procedia Computer …, 2024 - Elsevier
Mobile forensics, particularly in the Android ecosystem, is a rapidly evolving field that
demands continuous advancements to address the growing complexity and diversity of …

[PDF][PDF] Web Tracking Domain and Possible Privacy Defending Tools: A Literature Review

MAS Bubukayr, M Frikha - Journal of Cybersecurity, 2022 - researchgate.net
Personal data are strongly linked to web browsing history. By visiting a certain website, a
user can share her favorite items, location, employment status, financial information …

[HTML][HTML] Digital forensic analysis of the private mode of browsers on Android

X Fernández-Fuentes, TF Pena, JC Cabaleiro - Computers & Security, 2023 - Elsevier
The smartphone has become an essential electronic device in our daily lives. We carry our
most precious and important data on it, from family videos of the last few years to credit card …

From Promises to Practice: Evaluating the Private Browsing Modes of Android Browser Apps

X Liu, W Li, Q Hou, S Yang, L Ying, W Diao… - Proceedings of the …, 2024 - dl.acm.org
Private browsing is a common feature of web browsers on desktop platforms. This feature
protects the privacy of users browsing the Internet and, therefore, is widely welcomed by …

SoK: The Design Paradigm of Safe and Secure Defaults

J Ruohonen - arXiv preprint arXiv:2412.17329, 2024 - arxiv.org
In security engineering, including software security engineering, there is a well-known
design paradigm telling to prefer safe and secure defaults. The paper presents a …

Multimodal Fusion for Disaster Event Classification on Social Media: A Deep Federated Learning Approach

A El-Niss, A Alzu'Bi, A Abuarqoub - Proceedings of the 7th International …, 2023 - dl.acm.org
This paper explores the intersection of federated learning and disaster identification using a
curated dataset of captioned images sourced from social media. Leveraging a federated …

Malware Prediction Using Tabular Deep Learning Models

A Alzu'bi, A Abuarqoub, M Abdullah, RA Agolah… - UK Workshop on …, 2023 - Springer
As technology progresses, malware evolves, becoming increasingly perilous and posing a
significant challenge in combating cybercriminals. With the abundance of massive data on …

Unveiling Data Artefacts in Private Web Browsing: A Comparative Digital Forensics Study

B Spiteri - 2024 - diva-portal.org
The Internet has brought invaluable advantages to society and has become a key
component of our lives. Many things have been facilitated by this, for example, the ability to …

Web Tracking Domain and Possible Privacy Defending Tools: A Literature Review.

MA Saad Bubukayr, M Frikha - Journal of Cybersecurity …, 2022 - search.ebscohost.com
Personal data are strongly linked to web browsing history. By visiting a certain website, a
user can share her favorite items, location, employment status, financial information …

Douyin clues forensics analysis using knowledge graph

Y Yang, X Yu, X Zhang, Y Li, L Yan… - … Conference on Digital …, 2022 - spiedigitallibrary.org
Because of the interaction of Douyin, it has become a new generation of social tools. There
is a huge browse every day, which will leave various access data. Internet criminals take …