Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    Digital Evidence Lifecycle Management Framework in Courts of Law (DELM-C): A Case of Zanzibar High Courts

    Idarous Saleh Said1, Gilbert Gilibrays Ocen1,*, Mwase Ali2, Alunyu Andrew Egwar1

    Journal of Cyber Security, Vol.7, pp. 359-375, 2025, DOI:10.32604/jcs.2025.066979 - 25 September 2025

    Abstract The growing reliance on digital evidence in judicial proceedings has heightened the need for structured, secure, and legally sound frameworks for its collection, preservation, storage, and presentation. In Zanzibar, however, the integration of digital evidence into the court system remains hindered by the absence of standardized procedures and digital infrastructure, undermining the integrity and admissibility of such evidence. This study addresses these challenges by developing a comprehensive Digital Evidence Lifecycle Management Framework (DELM-C) tailored to the operational and legal context of the Zanzibar High Court. The proposed framework aims to streamline digital evidence handling, enhance… More >

  • Open Access

    ARTICLE

    Data-Driven Digital Evidence Analysis for the Forensic Investigation of the Electric Vehicle Charging Infrastructure

    Dong-Hyuk Shin1, Jae-Jun Ha1, Ieck-Chae Euom2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3795-3838, 2025, DOI:10.32604/cmes.2025.066727 - 30 June 2025

    Abstract The accelerated global adoption of electric vehicles (EVs) is driving significant expansion and increasing complexity within the EV charging infrastructure, consequently presenting novel and pressing cybersecurity challenges. While considerable effort has focused on preventative cybersecurity measures, a critical deficiency persists in structured methodologies for digital forensic analysis following security incidents, a gap exacerbated by system heterogeneity, distributed digital evidence, and inconsistent logging practices which hinder effective incident reconstruction and attribution. This paper addresses this critical need by proposing a novel, data-driven forensic framework tailored to the EV charging infrastructure, focusing on the systematic identification, classification,… More >

  • Open Access

    ARTICLE

    A Common Architecture-Based Smart Home Tools and Applications Forensics for Scalable Investigations

    Sungbum Kim1, Gwangsik Lee2, Jian Song2, Insoo Lee2, Taeshik Shon3,*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 661-683, 2025, DOI:10.32604/cmc.2025.063687 - 26 March 2025

    Abstract The smart home platform integrates with Internet of Things (IoT) devices, smartphones, and cloud servers, enabling seamless and convenient services. It gathers and manages extensive user data, including personal information, device operations, and patterns of user behavior. Such data plays an essential role in criminal investigations, highlighting the growing importance of specialized smart home forensics. Given the rapid advancement in smart home software and hardware technologies, many companies are introducing new devices and services that expand the market. Consequently, scalable and platform-specific forensic research is necessary to support efficient digital investigations across diverse smart home… More >

  • Open Access

    ARTICLE

    AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics

    Juhwan Kim, Baehoon Son, Jihyeon Yu, Joobeom Yun*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3371-3393, 2024, DOI:10.32604/cmc.2024.057234 - 18 November 2024

    Abstract Digital forensics aims to uncover evidence of cybercrimes within compromised systems. These cybercrimes are often perpetrated through the deployment of malware, which inevitably leaves discernible traces within the compromised systems. Forensic analysts are tasked with extracting and subsequently analyzing data, termed as artifacts, from these systems to gather evidence. Therefore, forensic analysts must sift through extensive datasets to isolate pertinent evidence. However, manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive. Previous studies addressed such inefficiencies by integrating artificial intelligence (AI) technologies into digital forensics. Despite the efforts in previous studies, artifacts were… More >

  • Open Access

    ARTICLE

    Predicting Age and Gender in Author Profiling: A Multi-Feature Exploration

    Aiman1, Muhammad Arshad1,*, Bilal Khan1, Sadique Ahmad2,*, Muhammad Asim2,3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3333-3353, 2024, DOI:10.32604/cmc.2024.049254 - 15 May 2024

    Abstract Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personal information, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic, semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, and marketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French, etc. However, the research on Roman Urdu is not up to the mark. Hence, this study focuses on detecting the author’s age and gender based on Roman Urdu text messages.… More >

  • Open Access

    ARTICLE

    Hyper-Tuned Convolutional Neural Networks for Authorship Verification in Digital Forensic Investigations

    Asif Rahim1, Yanru Zhong2, Tariq Ahmad3,*, Sadique Ahmad4,*, Mohammed A. ElAffendi4

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1947-1976, 2023, DOI:10.32604/cmc.2023.039340 - 30 August 2023

    Abstract Authorship verification is a crucial task in digital forensic investigations, where it is often necessary to determine whether a specific individual wrote a particular piece of text. Convolutional Neural Networks (CNNs) have shown promise in solving this problem, but their performance highly depends on the choice of hyperparameters. In this paper, we explore the effectiveness of hyperparameter tuning in improving the performance of CNNs for authorship verification. We conduct experiments using a Hyper Tuned CNN model with three popular optimization algorithms: Adaptive Moment Estimation (ADAM), Stochastic Gradient Descent (SGD), and Root Mean Squared Propagation (RMSPROP).… More >

  • Open Access

    ARTICLE

    Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation

    Waleed Halboob1,*, Jalal Almuhtadi1,2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2071-2092, 2023, DOI:10.32604/csse.2023.024110 - 03 November 2022

    Abstract Privacy preservation (PP) in Digital forensics (DF) is a conflicted and non-trivial issue. Existing solutions use the searchable encryption concept and, as a result, are not efficient and support only a keyword search. Moreover, the collected forensic data cannot be analyzed using existing well-known digital tools. This research paper first investigates the lawful requirements for PP in DF based on the organization for economic co-operation and development OECB) privacy guidelines. To have an efficient investigation process and meet the increased volume of data, the presented framework is designed based on the selective imaging concept and… More >

  • Open Access

    ARTICLE

    Multiple Forgery Detection in Video Using Convolution Neural Network

    Vinay Kumar1,*, Vineet Kansal2, Manish Gaur2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1347-1364, 2022, DOI:10.32604/cmc.2022.023545 - 18 May 2022

    Abstract With the growth of digital media data manipulation in today’s era due to the availability of readily handy tampering software, the authenticity of records is at high risk, especially in video. There is a dire need to detect such problem and do the necessary actions. In this work, we propose an approach to detect the interframe video forgery utilizing the deep features obtained from the parallel deep neural network model and thorough analytical computations. The proposed approach only uses the deep features extracted from the CNN model and then applies the conventional mathematical approach to… More >

  • Open Access

    ARTICLE

    Reinforced CNN Forensic Discriminator to Detect Document Forgery by DCGAN

    Seo-young Lim, Jeongho Cho*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6039-6051, 2022, DOI:10.32604/cmc.2022.024862 - 14 January 2022

    Abstract Recently, the technology of digital image forgery based on a generative adversarial network (GAN) has considerably improved to the extent that it is difficult to distinguish it from the original image with the naked eye by compositing and editing a person's face or a specific part with the original image. Thus, much attention has been paid to digital image forgery as a social issue. Further, document forgery through GANs can completely change the meaning and context in a document, and it is difficult to identify whether the document is forged or not, which is dangerous.… More >

  • Open Access

    ARTICLE

    Digital Forensics for Skulls Classification in Physical Anthropology Collection Management

    Imam Yuadi1,*, Myrtati D. Artaria2, Sakina3, A. Taufiq Asyhari4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3979-3995, 2021, DOI:10.32604/cmc.2021.015417 - 06 May 2021

    Abstract The size, shape, and physical characteristics of the human skull are distinct when considering individual humans. In physical anthropology, the accurate management of skull collections is crucial for storing and maintaining collections in a cost-effective manner. For example, labeling skulls inaccurately or attaching printed labels to skulls can affect the authenticity of collections. Given the multiple issues associated with the manual identification of skulls, we propose an automatic human skull classification approach that uses a support vector machine and different feature extraction methods such as gray-level co-occurrence matrix features, Gabor features, fractal features, discrete wavelet… More >

Displaying 1-10 on page 1 of 12. Per Page