Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (2)
- Information Security (2)
- Physical Sciences and Mathematics (2)
- Business (1)
- Computer Law (1)
-
- Computer and Systems Architecture (1)
- Data Storage Systems (1)
- Digital Communications and Networking (1)
- Forensic Science and Technology (1)
- Law (1)
- Legal Studies (1)
- Management Information Systems (1)
- OS and Networks (1)
- Other Computer Engineering (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Systems Architecture (1)
- Technology and Innovation (1)
- Keyword
-
- 3D model database (1)
- Accessing secured wireless networks (1)
- Big Data (1)
- Big forensic data (1)
- Dictionary personalization (1)
-
- EnCase (1)
- Forensic analysis (1)
- Hadoop (1)
- Immersive display (1)
- Impersonation (1)
- Indoor crime scene presentation (1)
- Man-in-the-Middle attack (1)
- Map and Reduce (1)
- NodeXL (1)
- Password cracking (1)
- Phishing (1)
- Rapid modeling (1)
- Sketch-based retrieval (1)
- Social Network analysis (1)
- Tampering network topology (1)
Articles 1 - 3 of 3
Full-Text Articles in Engineering
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
Journal of Digital Forensics, Security and Law
Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …
Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý
Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý
Journal of Digital Forensics, Security and Law
Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated …
A Sketch-Based Rapid Modeling Method For Crime Scene Presentation, Pu Ren, Wuyang Shui, Jin Liu, Yachun Fan, Wenshuo Zhao, Mingquan Zhou
A Sketch-Based Rapid Modeling Method For Crime Scene Presentation, Pu Ren, Wuyang Shui, Jin Liu, Yachun Fan, Wenshuo Zhao, Mingquan Zhou
Journal of Digital Forensics, Security and Law
The reconstruction of crime scene plays an important role in digital forensic application. This article integrates computer graphics, sketch-based retrieval and virtual reality (VR) techniques to develop a low-cost and rapid 3D crime scene presentation approach, which can be used by investigators to analyze and simulate the criminal process. First, we constructed a collection of 3D models for indoor crime scenes using various popular techniques, including laser scanning, image-based modeling and geometric modeling. Second, to quickly obtain an object of interest from the 3D model database, a sketch-based retrieval method was proposed. Finally, a rapid modeling system that integrates our …