Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (2)
- Computer Law (2)
- Computer Sciences (2)
- Electrical and Computer Engineering (2)
- Engineering (2)
-
- Forensic Science and Technology (2)
- Information Security (2)
- Law (2)
- Legal Studies (2)
- Physical Sciences and Mathematics (2)
- Arts and Humanities (1)
- Communication (1)
- Communication Technology and New Media (1)
- Film and Media Studies (1)
- International and Intercultural Communication (1)
- Political Science (1)
- Political Theory (1)
- Politics and Social Change (1)
- Sociology (1)
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Social and Behavioral Sciences
Blame It On The Russians: Tracking The Portrayal Of Russians During Cyber Conflict Incidents, Athina Karatzogianni Dr
Blame It On The Russians: Tracking The Portrayal Of Russians During Cyber Conflict Incidents, Athina Karatzogianni Dr
Athina Karatzogianni
This article analyses various cyber conflicts and cyber crime incidents attributed to Russian hackers, such as the Estonian and Georgian cyber conflicts and the ‘Climategate hack’. The article argues that Russian hackers were blamed by dozens of outlets for the Climategate hack, because that was consistent with global media coverage of cyber crime incidents which portrayed Russians as highly powerful hackers responsible for many hacking incidents. This narrative also was congruent with the new Cold War rhetoric that consistently takes issue with Russia acting on its geopolitical interests. These interests are seen to manifest themselves in Russia’s objection to countries, …
Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum
Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum
Journal of Digital Forensics, Security and Law
Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to send more spam. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the IP addresses over a period of time. The results show that many …
Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward
Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward
Journal of Digital Forensics, Security and Law
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis …