2020 8th International Symposium on Digital Forensics and Security (ISDFS)最新文献

筛选
英文 中文
Time Series Database Preprocessing for Data Mining Using Python 使用Python进行数据挖掘的时间序列数据库预处理
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116260
Hussein Farooq Tayeb, M. Karabatak, C. Varol
{"title":"Time Series Database Preprocessing for Data Mining Using Python","authors":"Hussein Farooq Tayeb, M. Karabatak, C. Varol","doi":"10.1109/ISDFS49300.2020.9116260","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116260","url":null,"abstract":"Data mining is an important method that we use for extracting meaningful information from data. Data preprocessing lays the groundwork for data mining yet most researchers unfortunately, ignore it. Before getting to the data mining stage, the target data set must be properly prepared. This paper describes steps followed for time series data preprocessing for data mining processes. The data that was used in the study is that of the minimum daily temperatures over 10 years (1981–1990) in the city of Melbourne, Australia. Python programming language is used to read the data and decompose it into trend, seasonality, and residue components. These components were plot and analyzed by removing the trend and seasonality to make the series stationary. Dicky Fuller’s stationary test was done on the data. The test statistics results show that Dicky Fuller’s null hypothesis can be rejected and the data is stationary. Hence, ready for the next step of data mining modeling processes.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125416779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Conceptual Framework for Database Anti-forensics Impact Mitigation 数据库反取证影响缓解的概念框架
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116375
B. Adamu, M. Karabatak, F. Ertam
{"title":"A Conceptual Framework for Database Anti-forensics Impact Mitigation","authors":"B. Adamu, M. Karabatak, F. Ertam","doi":"10.1109/ISDFS49300.2020.9116375","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116375","url":null,"abstract":"The emergence of databases has become one of the most important achievements in the field of software. Databases are at the core of information systems (Online and Offline), and this has fundamentally made them a target for malicious intents because they contain sensitive information. Digital forensics tends to outwit such malicious activities by providing provable evidence for prosecution. On the other hand, criminals develop and promote counter forensic measures to reduce the quality and quantity of forensic data known as “Anti-forensics”. Such counter measures tend to jeopardize forensics efforts at all stages to ensure that court admissible evidences are not acquired. The aim of this paper is to explore database anti-forensics agents, highlight the challenges and or negative effects they pose at various stages of the database forensics processes, present a taxonomy for database anti-forensics impacts, provide recommendations on how these impacts can be mitigated, and directions for future research opportunities.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of a Simple Online Court Case Management System Based on the Android Platform 基于Android平台的简易在线法院案件管理系统的设计与实现
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116452
Chawan Taha Hama Ali, A. Varol
{"title":"Design and Implementation of a Simple Online Court Case Management System Based on the Android Platform","authors":"Chawan Taha Hama Ali, A. Varol","doi":"10.1109/ISDFS49300.2020.9116452","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116452","url":null,"abstract":"The main purpose of this research is to create a new application in Android Operating System for a complainant who cannot visit his/her lawyer regularly or unable to go out due to fear of his/her life. Thanks to this research, a new application was established to make a bridge between a complainant and his/her lawyer. Everything is done automatically after necessary data entered into the application. So, costs are reduced and wasting of the time is diminished.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges of acquiring mobile devices while minimizing the loss of usable forensics data 获取移动设备的挑战,同时尽量减少可用取证数据的损失
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116458
Lazaro A. Herrera
{"title":"Challenges of acquiring mobile devices while minimizing the loss of usable forensics data","authors":"Lazaro A. Herrera","doi":"10.1109/ISDFS49300.2020.9116458","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116458","url":null,"abstract":"The move from computers to mobile devices has placed forensic professionals in a tough spot when performing analysis of seized hardware. Forensics specialists must contend with hardware that is designed to be secure as it is highly mobile, is capable of receiving commands from a suspect after it has been seized which could include commands that are capable of destroying evidence remotely, obsolescence of certain forensics methods such as deleted file recovery from block storage while having to purchase expensive software and hardware packages to extract any usable data.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116443785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
In-Depth Analysis of Speech Production, Auditory System, Emotion Theories and Emotion Recognition 深入分析语音产生,听觉系统,情绪理论和情绪识别
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116231
Yeşím Ülgen Sönmez, A. Varol
{"title":"In-Depth Analysis of Speech Production, Auditory System, Emotion Theories and Emotion Recognition","authors":"Yeşím Ülgen Sönmez, A. Varol","doi":"10.1109/ISDFS49300.2020.9116231","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116231","url":null,"abstract":"Artificial intelligence and machine learning are used to make machines more intelligent. SER emotion recognition from speech signals is a difficult problem for machine learning which artificial intelligence method is. The speech signal is difficult to analyze because it contains different frequencies and features. Speech is digitized by signal processing methods and sound characteristics are obtained by acoustic analysis. These features vary by emotions such as sadness, fear, anger, happiness, boredom and surprise. Analysis methods emerged by modeling the features of speech production system and human hearing system. In this study, speech production system, hearing system, emotion production system, emotion definition and theories, emotion recognition models are examined.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124765758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ISDFS 2020 Cover Page ISDFS 2020封面
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/isdfs49300.2020.9116426
{"title":"ISDFS 2020 Cover Page","authors":"","doi":"10.1109/isdfs49300.2020.9116426","DOIUrl":"https://doi.org/10.1109/isdfs49300.2020.9116426","url":null,"abstract":"","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1827 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129777399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
District Ransomware: Static and Dynamic Analysis 区域勒索软件:静态和动态分析
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116451
Neil Andes, Mingkui Wei
{"title":"District Ransomware: Static and Dynamic Analysis","authors":"Neil Andes, Mingkui Wei","doi":"10.1109/ISDFS49300.2020.9116451","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116451","url":null,"abstract":"Ransomware is one of the fastest growing threats to internet security. New Ransomware attacks happen around the globe, on a weekly basis. These attacks happen to individual users and groups, from almost any type of business. Many of these attacks involve Ransomware as a service, where one attacker creates a template Malware, which can be purchased and modified by other attackers to perform specific actions. The District Ransomware was a less well-known strain. This work focuses on statically and dynamically analyzing the District Ransomware and presenting the results.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1832 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129779264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QIM-Based Semi-Fragile Watermarking for H.264 Video Authentication 基于qim的H.264视频认证半脆弱水印
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116454
A. Egorova, V. Fedoseev
{"title":"QIM-Based Semi-Fragile Watermarking for H.264 Video Authentication","authors":"A. Egorova, V. Fedoseev","doi":"10.1109/ISDFS49300.2020.9116454","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116454","url":null,"abstract":"The paper presents a semi-fragile watermarking system designed for H.264 video authentication. The proposed system embeds a semi-fragile watermark into integer DCT coefficients of each keyframe of a video at the H.264 quantization step. The system localizes modified video regions of size 4×4 with close to 95% accuracy. The experimental part demonstrates the influence of the embedding process on the visual quality of the protected video and the watermark extraction error for different H.264 quality parameter values.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127520147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting Vulnerabilities Of MRI Scanner Machine: Lebanon Case Study 利用核磁共振扫描机漏洞:黎巴嫩案例研究
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116449
Reem A. Nabha, Hassan Sbeyti
{"title":"Exploiting Vulnerabilities Of MRI Scanner Machine: Lebanon Case Study","authors":"Reem A. Nabha, Hassan Sbeyti","doi":"10.1109/ISDFS49300.2020.9116449","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116449","url":null,"abstract":"Internet of Things (IoT) in the modern healthcare environment is continuously growing to offer a seamless platform to monitor patients in hospitals making our lives easier. Medical Imaging Devices (MIDs), such as Magnetic Resonance Imaging (MRI) systems are commonly connected to hospital networks becoming increasingly vulnerable to cyberattacks such as Ransomware. This paper attempts to discuss vulnerabilities in the MRI scanner that ransomware can exploit to propagate through a system.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126395593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud Computing Security Challenges and Threats 云计算安全挑战与威胁
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116266
Zina Balani, H. Varol
{"title":"Cloud Computing Security Challenges and Threats","authors":"Zina Balani, H. Varol","doi":"10.1109/ISDFS49300.2020.9116266","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116266","url":null,"abstract":"In today’s sophisticated life, technology covers all aspects of our daily life, and that creates an environment for the attackers to access and attack a targeted organisation easily with the lowest cost. However, it is difficult for the organisation to detect it easily. Cloud computing, users can store data across the network in an online environment. Moreover, the data can be accessed everywhere across the world. Most people, especially users who do not know enough about the increasing number of attacks and the development of technology, are concerned about keeping their data in clouds because security is a critical issue. In the study of this paper, some methods and techniques are provided to protect data in an online environment. These methods and techniques have the lowest costs and can be employed by every user as an easy way to defend themselves against attackers.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124938061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信