LimonDroid: a system coupling three signature-based schemes for profiling Android malware

F Tchakounté, RCN Ngassi, VC Kamla… - Iran Journal of Computer …, 2021 - Springer
Android remains an interesting target to attackers due to its openness. A contribution in the
literature consists of providing similarity measurement such as fuzzy hashing to fight against …

Holistic analytics of digital artifacts: unique metadata association model

AK Mohan, S Madathil, KV Lakshmy - International Journal of Digital …, 2021 - igi-global.com
Investigation of every crime scene with digital evidence is predominantly required in
identifying almost all atomic files behind the scenes that have been intentionally scrubbed …

Ensure the validity of forensic evidence by using a hash function

K Aishwarya Lakshmi, PB Honnavali… - … : Proceedings of ICICCT …, 2021 - Springer
A hash function is a mathematical function used to identify and authenticate the file data.
Data corruption in forensic evidence will tamper the digital evidence and could mislead the …

Google Drive Forensics

P Balarezo - 2021 - search.proquest.com
Google Drive is a popular application that features online creation, storage, sharing, editing,
and deleting data. People and businesses are using Google Drive to conduct their daily …

[PDF][PDF] A DIGITAL FORENSICS INVESTIGATION MODEL THAT INCORPORATES DIGITAL CHAIN OF CUSTODY FOR ITS INTEGRITY, AND AUTHENTICITY

RA Koleoso, OO Ajayi, FA Oladeji… - COMPUTER …, 2018 - conims.unilag.edu.ng
Digital Forensics Investigation Models (DFIMs) are designed to assist investigators in
handling Digital Evidence (DE) related to computers and other digital media. Researchers …

Técnicas de seguridad en redes de comunicaciones aplicadas a la custodia de evidencia digital

PS Haro Parra - 2021 - repositorio.puce.edu.ec
A medida que las nuevas tecnologías se extienden en las organizaciones con una creciente
influencia de transformación digital, los desafíos de seguridad comenzaron a identificar …

[PDF][PDF] OFICINA DE POSTGRADOS

IVM Lara - 2022 - repositorio.puce.edu.ec
The main reason supporting this study, is the need institutions have to develop in the
financial-accounting field efficiently. In addition, to have internal control procedures or …

[PDF][PDF] THE USE OF SOFTWARE AND HARDWARE VULNERABILITIES BY LAW ENFORCEMENT

W El Hammouti - 2019 - arno.uvt.nl
1.1 Background Vulnerabilities are often described as flaws or weaknesses in the code of a
software system or application and have been around for as long as computer systems have …

Survey analysis of cloned SIM card

TKM Gudimalla, S Kannan - Proceedings of International …, 2019 - papers.ssrn.com
Cyber-attacks increase in many ways such as Smart Card Cloning, Social Engineering, and
Malware attacks, that eventually left millions of users prone to seizures. Currently, smart card …

[CITATION][C] Maintaining the Integrity of Digital Evidence using Piecewise Hashing

M Roy, AK Mohan, M Sethumadhavan - International Journal of Pure and Applied …, 2018