[HTML][HTML] Challenges and Advances in Analyzing TLS 1.3-Encrypted Traffic: A Comprehensive Survey

J Zhou, W Fu, W Hu, Z Sun, T He, Z Zhang - Electronics, 2024‏ - mdpi.com
The widespread adoption of encrypted communication protocols has significantly enhanced
network security and user privacy, simultaneously elevating the importance of encrypted …

Can workers meaningfully consent to workplace wellbeing technologies?

S Chowdhary, A Kawakami, ML Gray, J Suh… - Proceedings of the …, 2023‏ - dl.acm.org
Sensing technologies deployed in the workplace can unobtrusively collect detailed data
about individual activities and group interactions that are otherwise difficult to capture. A …

[HTML][HTML] A comprehensive survey on artifact recovery from social media platforms: approaches and future research directions

K Gupta, D Oladimeji, C Varol, A Rasheed… - Information, 2023‏ - mdpi.com
Social media applications have been ubiquitous in modern society, and their usage has
grown exponentially over the years. With the widespread adoption of these platforms, social …

[HTML][HTML] Enhancing mobile security through comprehensive penetration testing

M Roshanaei - Journal of Information Security, 2024‏ - scirp.org
In today's era, where mobile devices have become an integral part of our daily lives,
ensuring the security of mobile applications has become increasingly crucial. Mobile …

[HTML][HTML] A framework for digital forensics of encrypted real-time network traffic, instant messaging, and VoIP application case study

SAE Sarhan, HA Youness, AM Bahaa-Eldin - Ain Shams Engineering …, 2023‏ - Elsevier
Digital forensics is one of the prime professional fields for law enforcement forces. It is also a
major active research topic in the cybersecurity field. Internet traffic and content analysis are …

[HTML][HTML] Digital forensic analysis of the private mode of browsers on Android

X Fernández-Fuentes, TF Pena, JC Cabaleiro - Computers & Security, 2023‏ - Elsevier
The smartphone has become an essential electronic device in our daily lives. We carry our
most precious and important data on it, from family videos of the last few years to credit card …

I still know what you did last summer: Inferring sensitive user activities on messaging applications through traffic analysis

A Bozorgi, A Bahramali, F Rezaei… - … on Dependable and …, 2022‏ - ieeexplore.ieee.org
Instant Messaging (IM) applications such as Signal, Telegram, and WhatsApp have become
tremendously popular in recent years. Unfortunately, such IM services have been targets of …

A security analysis comparison between Signal, WhatsApp and Telegram

CE Bogos, R Mocanu, E Simion - Cryptology ePrint Archive, 2023‏ - eprint.iacr.org
This paper aims to provide a security analysis comparison between three popular instant
messaging apps: Signal, WhatsApp and Telegram. The analysis will focus on the encryption …

Beyond Current Cryptography: Exploring New Frontiers

P Pappachan, M Rahaman… - Innovations in Modern …, 2024‏ - igi-global.com
Cryptography has evolved significantly, from simple ancient ciphers to sophisticated
algorithms to secure modern digital communications. The advent of quantum computing and …

VoIP Network Forensics of Instant Messaging Calls

SAE Sarhan, HA Youness, AM Bahaa-Eldin… - IEEE …, 2024‏ - ieeexplore.ieee.org
Digital forensics is a prime professional field for law enforcement organizations. This is a
major active research topic in the field of cybersecurity. Although traffic and content analysis …