Skip to main content
In recent past, there are a lot of research advancements in mobile forensics tools. This is so due to increase usage of mobile phones in storage of information, law enforcement, mobile online transactions, and also negatively by criminals... more
Today's huge volumes of data, heterogeneous information and communication technologies, and borderless cyberinfrastructures create new challenges for security experts and law enforcement agencies investigating cybercrimes. The future of... more
Crimes committed within electronic or digital domains, particularly within cyberspace, have become extremely common these days. Criminals are using technology to a great extent in committing various digital offences and creating new... more
"iPredator - Dark Side of Cyberspace Concept" (Edited & Revised 2019) is the updated version to Dr. Nuccitelli's original 2010 concept. iPredator remains an online assailant concept and explores why some online users become targets.
The ISO/IEC 17020 and 17025 standards both include requirements for impartiality and the freedom from bias. Meeting these requirements for implicit cognitive bias is not a simple matter. In this article, we address these international... more
— Today’s growing number of security threats to computers and networks also increase the importance of log inspections to support the detection of possible breaches. The investigation and assessment of security incidents becomes more and... more
Abstract—Forensic analysis of a suspect program is a daily challenge encounters forensic analysts and law-enforcement. It requires determining the behavior of a suspect program found in a computer system subject to investigation and... more
German physicist Georg Christoph Lichtenberg once said, “The most dangerous of all falsehoods is a slightly distorted truth.” In our multimedia–driven society, where photographic and video evidence enjoys an epistemologically unique... more
Dengan lebih dari 1000 juta pengguna aktif berdasarkan survey 2017 perkembangan ini semakin meningkat setiap tahunnya [1]. Perlu diketahui bahwa WhatsApp mempunyai suatu tabel database yang tersimpan secara rasahsia didalam sistem sistem... more
In this paper, an experimental evaluation of one of the most effective source camera identification techniques proposed so far, by Lukáš et al., is presented. This method uses the characteristic noise left by the sensor on a digital... more
Background: Sexual assault examiners provides comprehensive health care to victims of sexual assault. Communication with the victim is important to collect relevant information from the victims. Ineffective communications can cause... more
Malware is a pervasive problem in both personal computing devices and distributed computing systems. Identification of malware variants and their families others a great benefit in early detection resulting in a reduction of the analyses... more
— An automatic verification of person's identity from its voice is a part of modern telecommunication services. In order to execute a verification task, a speech signal has to be transmitted to a remote server. So, a performance of the... more
The success of any statistical steganalysis algorithm depends on the choice of features extracted and the classifier employed. This paper proposes steganalysis using random forests (SURF) employing HCS (Huffman Code Statistics) features... more
Substantial progress has been achieved in voice-based biometrics in recent times but a variety of challenges still remain for speech research community. One such obstacle is reliable speaker authentication from speech signals degraded by... more
The development of systems capable of recognizing and categorising emotions is of interest to researchers in various scientific areas including artificial intelligence. The traditional notion that emotions and rationality are two separate... more
—The field of digital forensic analysis has emerged in the past two decades to counter the digital crimes and investigate the modus operandi of the culprits to secure the computer systems. With the advances in technologies and pervasive... more
Digital forensics is the application of forensic and scientific knowledge to retrieve information legally from any digital device such as computers and smartphones. This legally fetched information is then presented as a piece of evidence... more
With the raise in practice of Internet, in social, personal, commercial and other aspects of life, the cybercrime is as well escalating at an alarming rate. Such usage of Internet in diversified areas also augmented the illegal... more
When computer security violations are detected, com-puter forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of finding and preserving useful clues in large networks of... more
During forensic examination, analysis of unallocated space of seized storage media is essential to extract the previously deleted or overwritten files when the file system metadata is missing or corrupted. The process of recovering files... more
Secure communication is a necessity that must be considered in any smart application to guarantee the confidentiality of information. Recently, ZigBee has been utilized in different smart applications such as automatic metering, power... more
In this paper, we deal with introducing a technique of digital forensics for reconstruction of events or evidences after the commitment of a crime through any of the digital devices. It shows a clear transparency between Computer... more
If we start from the concept: “Forensic Computer is the science of extracting data so that it can be presented as evidence in a court of law” (Albert J. Marcella, 2007), in the process of extraction is important the recovery, examination... more
We are glad to inform you that the School of Engineering & Technology, Sharda University, Greater Noida is organizing One Week International FDP on "Recent Trends in Cyber Security" through online mode from 26th June -01st July, 2021.... more
Berkut adalah form design Berdasarkan temuan pada thesis yang disusun oleh Devi Ratnasari (42 field informasi) maka design form yang relevan untuk mencover 42 field informasi
Software tools designed for disk analysis play a critical role today in digital forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally... more
The utilization of the internet within organizations has surged over the past decade. Though, it has numerous benefits, the internet also comes with its own challenges such as intrusions and threats. Bring Your Own Device (BYOD) as a... more
WhatsApp is a medium that everyone can use to interact and to share information effectively and efficiently. However, it can be misused for criminal activities. Analyzing WhatsApp' artifacts is quite challenging as the suspect may... more
This paper discusses the concept of a virtual digital forensic laboratory, which incorporates networked examination and storage machines, secure communications, multi-factor authentication, role-based access control, and case management... more
Similarity digesting is a class of algorithms and technologies that generate hashes from files and preserve file similarity. They find applications in various areas across security industry: malware variant detection, spam filtering,... more
I wrote this case study on 28 October 2002 for the book Hacking Exposed, Fourth Edition, published by McGraw-Hill Osborne Media on 25 February 2013. The book contained the first definition, in print, of the term "network security... more
Cloud Storage is recently as emerging topic in these eras. As the data are increasing, the storage become major issue for the people. There are different kind of Cloud Storage application such as One Drive, Sky Drive, Drop Box and Google... more
The study was to examine the importance for the study of computer and cyber forensics in the fight against crime and prevention of crime. Using the security agencies in Ghana namely the Ghana police service and the bureau of national... more
Riepilogo delle regole fondamentali

2) Accenni alla ISO27037

3) Evoluzione degli strumenti hardware professionali

4) Evoluzione degli strumenti software professionali

5) Live Forensics e Sniper Forensics

6) Qualche esempio pratico
Traffic analysis consists of capturing network traffic in order to identify and respond to anomalies that could be indicative of security threats or other areas of concern. The communication, network, and technological infrastructures... more