{"title":"Time Series Database Preprocessing for Data Mining Using Python","authors":"Hussein Farooq Tayeb, M. Karabatak, C. Varol","doi":"10.1109/ISDFS49300.2020.9116260","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116260","url":null,"abstract":"Data mining is an important method that we use for extracting meaningful information from data. Data preprocessing lays the groundwork for data mining yet most researchers unfortunately, ignore it. Before getting to the data mining stage, the target data set must be properly prepared. This paper describes steps followed for time series data preprocessing for data mining processes. The data that was used in the study is that of the minimum daily temperatures over 10 years (1981–1990) in the city of Melbourne, Australia. Python programming language is used to read the data and decompose it into trend, seasonality, and residue components. These components were plot and analyzed by removing the trend and seasonality to make the series stationary. Dicky Fuller’s stationary test was done on the data. The test statistics results show that Dicky Fuller’s null hypothesis can be rejected and the data is stationary. Hence, ready for the next step of data mining modeling processes.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125416779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Conceptual Framework for Database Anti-forensics Impact Mitigation","authors":"B. Adamu, M. Karabatak, F. Ertam","doi":"10.1109/ISDFS49300.2020.9116375","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116375","url":null,"abstract":"The emergence of databases has become one of the most important achievements in the field of software. Databases are at the core of information systems (Online and Offline), and this has fundamentally made them a target for malicious intents because they contain sensitive information. Digital forensics tends to outwit such malicious activities by providing provable evidence for prosecution. On the other hand, criminals develop and promote counter forensic measures to reduce the quality and quantity of forensic data known as “Anti-forensics”. Such counter measures tend to jeopardize forensics efforts at all stages to ensure that court admissible evidences are not acquired. The aim of this paper is to explore database anti-forensics agents, highlight the challenges and or negative effects they pose at various stages of the database forensics processes, present a taxonomy for database anti-forensics impacts, provide recommendations on how these impacts can be mitigated, and directions for future research opportunities.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a Simple Online Court Case Management System Based on the Android Platform","authors":"Chawan Taha Hama Ali, A. Varol","doi":"10.1109/ISDFS49300.2020.9116452","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116452","url":null,"abstract":"The main purpose of this research is to create a new application in Android Operating System for a complainant who cannot visit his/her lawyer regularly or unable to go out due to fear of his/her life. Thanks to this research, a new application was established to make a bridge between a complainant and his/her lawyer. Everything is done automatically after necessary data entered into the application. So, costs are reduced and wasting of the time is diminished.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges of acquiring mobile devices while minimizing the loss of usable forensics data","authors":"Lazaro A. Herrera","doi":"10.1109/ISDFS49300.2020.9116458","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116458","url":null,"abstract":"The move from computers to mobile devices has placed forensic professionals in a tough spot when performing analysis of seized hardware. Forensics specialists must contend with hardware that is designed to be secure as it is highly mobile, is capable of receiving commands from a suspect after it has been seized which could include commands that are capable of destroying evidence remotely, obsolescence of certain forensics methods such as deleted file recovery from block storage while having to purchase expensive software and hardware packages to extract any usable data.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116443785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In-Depth Analysis of Speech Production, Auditory System, Emotion Theories and Emotion Recognition","authors":"Yeşím Ülgen Sönmez, A. Varol","doi":"10.1109/ISDFS49300.2020.9116231","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116231","url":null,"abstract":"Artificial intelligence and machine learning are used to make machines more intelligent. SER emotion recognition from speech signals is a difficult problem for machine learning which artificial intelligence method is. The speech signal is difficult to analyze because it contains different frequencies and features. Speech is digitized by signal processing methods and sound characteristics are obtained by acoustic analysis. These features vary by emotions such as sadness, fear, anger, happiness, boredom and surprise. Analysis methods emerged by modeling the features of speech production system and human hearing system. In this study, speech production system, hearing system, emotion production system, emotion definition and theories, emotion recognition models are examined.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124765758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISDFS 2020 Cover Page","authors":"","doi":"10.1109/isdfs49300.2020.9116426","DOIUrl":"https://doi.org/10.1109/isdfs49300.2020.9116426","url":null,"abstract":"","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1827 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129777399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"District Ransomware: Static and Dynamic Analysis","authors":"Neil Andes, Mingkui Wei","doi":"10.1109/ISDFS49300.2020.9116451","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116451","url":null,"abstract":"Ransomware is one of the fastest growing threats to internet security. New Ransomware attacks happen around the globe, on a weekly basis. These attacks happen to individual users and groups, from almost any type of business. Many of these attacks involve Ransomware as a service, where one attacker creates a template Malware, which can be purchased and modified by other attackers to perform specific actions. The District Ransomware was a less well-known strain. This work focuses on statically and dynamically analyzing the District Ransomware and presenting the results.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1832 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129779264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QIM-Based Semi-Fragile Watermarking for H.264 Video Authentication","authors":"A. Egorova, V. Fedoseev","doi":"10.1109/ISDFS49300.2020.9116454","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116454","url":null,"abstract":"The paper presents a semi-fragile watermarking system designed for H.264 video authentication. The proposed system embeds a semi-fragile watermark into integer DCT coefficients of each keyframe of a video at the H.264 quantization step. The system localizes modified video regions of size 4×4 with close to 95% accuracy. The experimental part demonstrates the influence of the embedding process on the visual quality of the protected video and the watermark extraction error for different H.264 quality parameter values.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127520147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting Vulnerabilities Of MRI Scanner Machine: Lebanon Case Study","authors":"Reem A. Nabha, Hassan Sbeyti","doi":"10.1109/ISDFS49300.2020.9116449","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116449","url":null,"abstract":"Internet of Things (IoT) in the modern healthcare environment is continuously growing to offer a seamless platform to monitor patients in hospitals making our lives easier. Medical Imaging Devices (MIDs), such as Magnetic Resonance Imaging (MRI) systems are commonly connected to hospital networks becoming increasingly vulnerable to cyberattacks such as Ransomware. This paper attempts to discuss vulnerabilities in the MRI scanner that ransomware can exploit to propagate through a system.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126395593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing Security Challenges and Threats","authors":"Zina Balani, H. Varol","doi":"10.1109/ISDFS49300.2020.9116266","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116266","url":null,"abstract":"In today’s sophisticated life, technology covers all aspects of our daily life, and that creates an environment for the attackers to access and attack a targeted organisation easily with the lowest cost. However, it is difficult for the organisation to detect it easily. Cloud computing, users can store data across the network in an online environment. Moreover, the data can be accessed everywhere across the world. Most people, especially users who do not know enough about the increasing number of attacks and the development of technology, are concerned about keeping their data in clouds because security is a critical issue. In the study of this paper, some methods and techniques are provided to protect data in an online environment. These methods and techniques have the lowest costs and can be employed by every user as an easy way to defend themselves against attackers.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124938061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}