International Journal of Digital Crime and Forensics最新文献

筛选
英文 中文
Design of Cyberspace Security Talents Training System Based on Knowledge Graph 基于知识图谱的网络空间安全人才培养体系设计
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2020-10-01 DOI: 10.4018/IJDCF.2020100104
Xi Chen, Fangming Ruan, Lvyang Zhang, Yang Zhao
{"title":"Design of Cyberspace Security Talents Training System Based on Knowledge Graph","authors":"Xi Chen, Fangming Ruan, Lvyang Zhang, Yang Zhao","doi":"10.4018/IJDCF.2020100104","DOIUrl":"https://doi.org/10.4018/IJDCF.2020100104","url":null,"abstract":"Internet, big data, global society, economy, life, politics, military, and culture are deeply integrated and have developed into an era of overlapping cyberspace and real society. Cyberspace security has become the most complex, comprehensive, and severe non-traditional security challenge facing all countries in the world. However, the talents in the field of cyberspace security cannot meet the practical needs of the development of cyberspace security. This paper puts forward the training scheme of network security talents, discusses the relationship between knowledge atlas and network space security, gives the construction and distribution of network space full knowledge atlas, and then constructs an education big data architecture for cyberspace security based on knowledge graph around the use of knowledge.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"17 1","pages":"44-53"},"PeriodicalIF":0.7,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79843751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Summary of the Development of Cyber Security Threat Intelligence Sharing 网络安全威胁情报共享发展综述
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2020-10-01 DOI: 10.4018/IJDCF.2020100105
L. Du, Yaqin Fan, Lvyang Zhang, Lianying Wang, Tianhang Sun
{"title":"A Summary of the Development of Cyber Security Threat Intelligence Sharing","authors":"L. Du, Yaqin Fan, Lvyang Zhang, Lianying Wang, Tianhang Sun","doi":"10.4018/IJDCF.2020100105","DOIUrl":"https://doi.org/10.4018/IJDCF.2020100105","url":null,"abstract":"In recent years, the sharing of cybersecurity threat intelligence (hereinafter referred to as threat intelligence) has received increasing attention from national network security management organizations and network security enterprises. Academia and industry have conducted research on threat intelligence analysis and sharing. This paper first introduces the value and significance of threat intelligence. Then it introduces the commonly used threat intelligence analysis model. Then it organizes and classifies the threat intelligence sharing norms and threat intelligence vendors. Then it starts from the main problems faced by threat intelligence sharing. A solution to build regional network security capabilities is presented; finally, the future research direction of threat intelligence sharing is explored.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"513 1","pages":"54-67"},"PeriodicalIF":0.7,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86862328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications 基于云的移动应用的移动云取证准备过程模型
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2020-07-01 DOI: 10.4018/ijdcf.2020070105
Puneet Sharma, Deepak Arora, T. Sakthivel
{"title":"Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications","authors":"Puneet Sharma, Deepak Arora, T. Sakthivel","doi":"10.4018/ijdcf.2020070105","DOIUrl":"https://doi.org/10.4018/ijdcf.2020070105","url":null,"abstract":"Nowadays, mobile cloud applications have attracted millions of smartphone users due to the proliferation of cyber technologies and a wide range of applications. Mobile cloud forensic investigation methodologies need tremendous growth due to the increasing crime incidents. The forensic readiness model plays a significant role in the forensic investigation framework by ensuring the ease of investigation to the forensic investigator. The existing forensic readiness supports either the mobile device or cloud environment, which lacks to prepare the information for the investigation. This article presents a mobile cloud forensic readiness process model to identify the factors and prepare the information that effectively supports forensic investigations. The proposed model involves requirements for the mobile cloud forensics from multiple perspectives with the aim of developing the forensic-ready system. As a result, the proposed forensic readiness model enables the mobile cloud forensic to improve the accuracy of investigation as well as reduces the investigation time significantly.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"241 1","pages":"58-76"},"PeriodicalIF":0.7,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83432981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Anti-Forensics of Double Compressed MP3 Audio 反取证双压缩MP3音频
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2020-07-01 DOI: 10.4018/ijdcf.2020070104
Biaoli Tao, Rangding Wang, Diqun Yan, Chao Jin
{"title":"Anti-Forensics of Double Compressed MP3 Audio","authors":"Biaoli Tao, Rangding Wang, Diqun Yan, Chao Jin","doi":"10.4018/ijdcf.2020070104","DOIUrl":"https://doi.org/10.4018/ijdcf.2020070104","url":null,"abstract":"The widespread availability of audio editing software has made it easy to create acoustically convincing digital audio forgeries. To address this problem, more and more attention has been paid to the field of digital audio forensics. There has been little work, however, in the field of anti-forensics, which seeks to develop a set of techniques designed to fool current forensic methodologies. The compression history of an audio sample can be used to provide evidence of audio forgeries. In this work, we present a simple method for distinguishing the MP3 compression history of an audio sample. We show the proposed anti-forensics method to remove the artifacts of MP3 double compression by destroying the audio frame structure. In addition, effectiveness of the proposed method is verified by three double compression detection methods. The experimental results show that the proposed method can effectively resist detection from three methods.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"2 1","pages":"45-57"},"PeriodicalIF":0.7,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87812530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User Identity Hiding Method of Android Android用户身份隐藏方法
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2020-07-01 DOI: 10.4018/ijdcf.2020070102
Yi Zhang
{"title":"User Identity Hiding Method of Android","authors":"Yi Zhang","doi":"10.4018/ijdcf.2020070102","DOIUrl":"https://doi.org/10.4018/ijdcf.2020070102","url":null,"abstract":"With an 86.1% global market share, Android takes the top spot smartphone operating system. Due to its open environment, Android suffers from various kinds of attacks, which cause a serious privacy leakage problem. To protect users' privacy information, this article proposes a user identity hiding method of Android. The method constructs a hidden user identity in Android based on the multi-user mechanism. In particular, by hiding information related to hidden user, the method makes it invisible to normal user. The method can quickly switch the identity of normal user and hidden user by passwords. Thus, the method can deal with privacy information under hidden user identity while processing regular information under normal user identity. Compared with traditional security methods of Android, this method significantly improves the security of android devices without arousing any suspicion. Experimental results show the effectiveness of the method that it not only achieves ideal hiding effect on user identity, but also implements quick switch without sacrificing the performance of system.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"9 1","pages":"15-26"},"PeriodicalIF":0.7,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87847456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Copy Move Forgery Detection Through Differential Excitation Component-Based Texture Features 基于差分激励分量纹理特征的复制移动伪造检测
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2020-07-01 DOI: 10.4018/ijdcf.2020070103
G. Suresh, Chanamallu Srinivasarao
{"title":"Copy Move Forgery Detection Through Differential Excitation Component-Based Texture Features","authors":"G. Suresh, Chanamallu Srinivasarao","doi":"10.4018/ijdcf.2020070103","DOIUrl":"https://doi.org/10.4018/ijdcf.2020070103","url":null,"abstract":"Copy-move forgery (CMF) is an established process to copy an image segment and pastes it within the same image to hide or duplicate a portion of the image. Several CMF detection techniques are available; however, better detection accuracy with low feature vector is always substantial. For this, differential excitation component (DEC) of Weber Law descriptor in combination with the gray level co-occurrence matrix (GLCM) approach of texture feature extraction for CMFD is proposed. GLCM Texture features are computed in four directions on DEC and this acts as a feature vector for support vector machine classifier. These texture features are more distinguishable and it is validated through other two proposed methods based on discrete wavelet transform-GLCM (DWT-GLCM) and GLCM. Experimentation is carried out on CoMoFoD and CASIA databases to validate the efficacy of proposed methods. Proposed methods exhibit resilience against many post-processing attacks. Comparative analysis with existing methods shows the superiority of the proposed method (DEC-GLCM) with regard to detection accuracy.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"41 1","pages":"27-44"},"PeriodicalIF":0.7,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80424244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimization-Driven Kernel and Deep Convolutional Neural Network for Multi-View Face Video Super Resolution 基于优化驱动核和深度卷积神经网络的多视图人脸视频超分辨率研究
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2020-07-01 DOI: 10.4018/ijdcf.2020070106
A. Deshmukh, N. U. Rani
{"title":"Optimization-Driven Kernel and Deep Convolutional Neural Network for Multi-View Face Video Super Resolution","authors":"A. Deshmukh, N. U. Rani","doi":"10.4018/ijdcf.2020070106","DOIUrl":"https://doi.org/10.4018/ijdcf.2020070106","url":null,"abstract":"One of the major challenges faced by video surveillance is recognition from low-resolution videos or person identification. Image enhancement methods play a significant role in enhancing the resolution of the video. This article introduces a technique for face super resolution based on a deep convolutional neural network (Deep CNN). At first, the video frames are extracted from the input video and the face detection is performed using the Viola-Jones algorithm. The detected face image and the scaling factors are fed into the Fractional-Grey Wolf Optimizer (FGWO)-based kernel weighted regression model and the proposed Deep CNN separately. Finally, the results obtained from both the techniques are integrated using a fuzzy logic system, offering a face image with enhanced resolution. Experimentation is carried out using the UCSD face video dataset, and the effectiveness of the proposed Deep CNN is checked depending on the block size and the upscaling factor values and is evaluated to be the best when compared to other existing techniques with an improved SDME value of 80.888.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"15 1","pages":"77-95"},"PeriodicalIF":0.7,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87392194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Common General Access Structure Construction Approach in Secret Image Sharing 秘密图像共享中一种通用访问结构构建方法
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2020-07-01 DOI: 10.4018/ijdcf.2020070107
Xuehu Yan, Yuliang Lu, Lintao Liu
{"title":"A Common General Access Structure Construction Approach in Secret Image Sharing","authors":"Xuehu Yan, Yuliang Lu, Lintao Liu","doi":"10.4018/ijdcf.2020070107","DOIUrl":"https://doi.org/10.4018/ijdcf.2020070107","url":null,"abstract":"(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS), polynomial-based SIS, linear congruence (LC)-based SIS, etc., were proposed with only (k, k) threshold or (k, n) threshold other than GAS. This article introduces a common GAS construction approach in SIS with on pixel expansion from existing (k, k) threshold or (k, n) threshold SIS. The authors input classic SIS methods to test the efficiency and feasibility of the proposed common GAS construction approach. Experiments are presented to indicate the efficiency of the approach by illustrations and analysis.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"17 1","pages":"96-110"},"PeriodicalIF":0.7,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89458629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks 传感器网络中密钥建立对等中介的两种变体
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2020-07-01 DOI: 10.4018/ijdcf.2020070101
Jingyuan Rao, M. Tu, Xuanjin Yang
{"title":"Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks","authors":"Jingyuan Rao, M. Tu, Xuanjin Yang","doi":"10.4018/ijdcf.2020070101","DOIUrl":"https://doi.org/10.4018/ijdcf.2020070101","url":null,"abstract":"Recently, the issue pertinent to sensor network security is a popular topic. Especially, due to the restriction of energy supplied by battery power of the sensors, symmetric cryptography is one of the suitable choices for the secret communication between sensors, while asymmetric cryptography is not appropriate because of its heavy loading on computation should consume a lot of energy. As a result of using symmetric cryptography, there are numerous research papers focusing on designing efficient key management scheme in sensor networks. PIKE designed by Chan and Perrig is a scheme using peer intermediaries and their pre-installed keys to deliver secret message from one sensor to another. However, they did not consider the case that the sensors are scattered in nonuniform way. Moreover, O(logn) is enough for sensor networks to achieve expander topology while PIKE has O(√n) storage overhead. This article gives generalizations of PIKE to offer more choices for developers under different requirements. The Constant Storage Protocol, abbreviated as CSP, costs constant memory storage and is more suitable for group-based deployment.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"519 1","pages":"1-14"},"PeriodicalIF":0.7,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77200156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings 我国刑事诉讼中的电子证据规则研究
IF 0.7
International Journal of Digital Crime and Forensics Pub Date : 2020-07-01 DOI: 10.4018/ijdcf.2020070108
Jin Du, Liping Ding, Guangxuan Chen
{"title":"Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings","authors":"Jin Du, Liping Ding, Guangxuan Chen","doi":"10.4018/ijdcf.2020070108","DOIUrl":"https://doi.org/10.4018/ijdcf.2020070108","url":null,"abstract":"As a new object in judicial practice, electronic evidence is of great practical significance. To locate the probative force of electronic evidence, which can be used to prove the facts of the crime, judging the electronic evidence validity, and how to establish scientific rules of electronic evidence, which not only effectively contains crime, but also protects civil rights from illegal infringement of state power becomes very important. This article outlines the definition of electronic evidence and rules and establishes a suitable electronic evidence system of China's criminal procedure system based on the analysis of problems in each link of judicial proof in judicial practice and the four aspects of judicial proof.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"33 1","pages":"111-121"},"PeriodicalIF":0.7,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81055226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信