Open Access. Powered by Scholars. Published by Universities.®
Forensic Science and Technology Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (485)
- University of New Haven (60)
- Bridgewater State University (50)
- University of Central Florida (24)
- City University of New York (CUNY) (18)
-
- Edith Cowan University (6)
- West Virginia University (5)
- Florida International University (3)
- Old Dominion University (3)
- Selected Works (3)
- University of Nebraska - Lincoln (3)
- Virginia Commonwealth University (3)
- South Dakota State University (2)
- The University of Southern Mississippi (2)
- University at Albany, State University of New York (2)
- University of Mississippi (2)
- California State University, San Bernardino (1)
- Central Washington University (1)
- Chapman University (1)
- Dakota State University (1)
- Duke Law (1)
- Eastern Kentucky University (1)
- Marshall University (1)
- Nova Southeastern University (1)
- Pace University (1)
- Penn State Dickinson Law (1)
- Pepperdine University (1)
- San Jose State University (1)
- Syracuse University (1)
- University of Montana (1)
- Keyword
-
- Digital forensics (54)
- Forensics (26)
- Computer forensics (21)
- Digital Forensics (21)
- Cybercrime (17)
-
- Digital evidence (17)
- Cybersecurity (13)
- Computer Forensics (10)
- Privacy (10)
- Security (10)
- Approximate matching (9)
- Cyber forensics (9)
- Cyberbullying (9)
- Forensic (9)
- Mobile device forensics (9)
- Forensic science (8)
- Mrsh-v2 (8)
- Survey (8)
- Cryptocurrency (7)
- Android (6)
- Cyber security (6)
- Data recovery (6)
- Information security (6)
- Investigation (6)
- Law enforcement (6)
- Network forensics (6)
- Sdhash (6)
- Android forensics (5)
- Cyber crime (5)
- Data disposal (5)
- Publication Year
- Publication
-
- Journal of Digital Forensics, Security and Law (294)
- Annual ADFSL Conference on Digital Forensics, Security and Law (187)
- Electrical & Computer Engineering and Computer Science Faculty Publications (56)
- International Journal of Cybersecurity Intelligence & Cybercrime (50)
- Electronic Theses and Dissertations (20)
-
- Student Theses (15)
- Graduate Theses, Dissertations, and Problem Reports (5)
- Honors Theses (4)
- Master's Theses (4)
- Publications (4)
- Research outputs 2014 to 2021 (4)
- FIU Electronic Theses and Dissertations (3)
- Australian Digital Forensics Conference (2)
- CHAR (2)
- Cybersecurity Undergraduate Research Showcase (2)
- Department of Statistics: Faculty Publications (2)
- Dissertations, Theses, and Capstone Projects (2)
- Electronic Theses and Dissertations, 2020- (2)
- Honors Undergraduate Theses (2)
- J. Philip Craiger, Ph.D. (2)
- All Faculty Scholarship for the College of the Sciences (1)
- CCE Theses and Dissertations (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer Sciences and Electrical Engineering Faculty Research (1)
- David Dampier (1)
- Dickinson Law Review (2017-Present) (1)
- Electronic Theses, Projects, and Dissertations (1)
- Faculty Scholarship (1)
- Graduate Student Theses, Dissertations, & Professional Papers (1)
- Honors Capstone Projects - All (1)
Articles 1 - 30 of 686
Full-Text Articles in Forensic Science and Technology
Coomassie Brilliant Blue Dye As A Method For Analyzing Fracture Markings In Bone, Abigail Hoffmeister, David Harutunyan, Matthew Aizawa, Everett Baker, Brandon Mendoza, Chase Freeman, Siran Iskanian
Coomassie Brilliant Blue Dye As A Method For Analyzing Fracture Markings In Bone, Abigail Hoffmeister, David Harutunyan, Matthew Aizawa, Everett Baker, Brandon Mendoza, Chase Freeman, Siran Iskanian
Seaver College Research And Scholarly Achievement Symposium
Coomassie Brilliant Blue Dye is a dye commonly used to stain proteins. Because of its ability to adhere to proteins, this research has focused on perfecting a method of dyeing a fractured flat bone in order to most accurately observe and analyze fracture markings within the trabecular layer. Stereoscopic microscopy was the chosen technique of analysis for this research because of its proven effectiveness in glass and ceramic fractography to observe varying depths. In order to most effectively apply stereoscopic microscopy to this research, the following variables were manipulated to maximize color contrast in the trabecular layer in order to …
Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee
Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Papers from this issue advocate for empowering young adults with knowledge and tools to navigate cyberspace safely, emphasizing the necessity of heightened cybersecurity measures and proactive education. As we advance into the digital abyss, this call becomes imperative, ensuring that the young adults' experience remains a journey of growth and enlightenment, unaffected by the shadows of unseen online threats.
Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones
Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones
International Journal of Cybersecurity Intelligence & Cybercrime
Doubleday released Andy Greenberg’s Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency in November 2022. Through vivid case studies of global criminal investigations, the book dispels myths about the anonymizing power of cryptocurrency. The book details how the ability to identify cryptocurrency users and payment methods successfully brought down several large criminal empires, while also highlighting the continuous cat-and-mouse game between law enforcement officials and criminal actors using cryptocurrency. The book is an excellent resource for law enforcement officials, academics, and general cybersecurity practitioners interested in cryptocurrency-related criminal activities and law enforcement techniques.
Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo
Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo
International Journal of Cybersecurity Intelligence & Cybercrime
The research publication, “Generative Agents: Interactive Simulacra of Human Behavior,” by Stanford and Google in 2023 established that large language models (LLMs) such as GPT-4 can generate interactive agents with credible and emergent human-like behaviors. However, their application in simulating human responses in cybersecurity scenarios, particularly in social engineering attacks, remains unexplored. In addressing that gap, this study explores the potential of LLMs, specifically the Open AI GPT-4 model, to simulate a broad spectrum of human responses to social engineering attacks that exploit human social behaviors, framing our primary research question: How does the simulated behavior of human targets, based …
Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi
Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi
International Journal of Cybersecurity Intelligence & Cybercrime
Artificial intelligence is one of the newest innovations which offenders exploit to satisfy their criminal desires. Although understanding cybercrime that is associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, one about deepfakes in the metaverse and the other about social engineering attacks. The articles were written by the winners of the student paper competition at the 2023 International White Hat Conference.
Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi
Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi
International Journal of Cybersecurity Intelligence & Cybercrime
Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework …
Identification Of Different Hair Dyes In Dyed Hair Using Attenuated Total Reflectance (Atr Ft-Ir), Surface Enhancing Raman Spectroscopy (Sers) Techniques, Nicholas Lovera
Identification Of Different Hair Dyes In Dyed Hair Using Attenuated Total Reflectance (Atr Ft-Ir), Surface Enhancing Raman Spectroscopy (Sers) Techniques, Nicholas Lovera
Student Theses
This investigation compares the ability of Attenuated Total Reflection Fourier Transfer Infrared Spectroscopy (ATR FT-IR) and Surface Enhance Raman Spectroscopy (SERS) to identify and differentiate different hair dye brands on dyed hair samples. Hair is a common type of trace evidence found at crime scenes and can provide numerous information through forensic hair analysis. Cosmetic hair treatment such as dying the hair different colors has grown and became popular, thus it can be a very common type of trace evidence. This study can provide a forensic scientist an additional method for analyzing dyed hair samples. The goal was to compare …
Structural Integrity And Stability Of Dna In Ionic Liquid And Near-Infrared Indolizine Squaraine Dye, Ember Yeji Suh
Structural Integrity And Stability Of Dna In Ionic Liquid And Near-Infrared Indolizine Squaraine Dye, Ember Yeji Suh
Honors Theses
Luminol, the most common presumptive test for blood at a crime scene, has multiple issues, such as false positive results with chemical agents, no luminescence due to “active oxygen” cleaning agents on bloodstains, and inability to penetrate textile materials. A combination of indolizine squaraine dye and ionic liquid (IL), or Dye Enhanced Textile Emission for Crime Tracking (DETECT), have shown potential to address these issues. The purpose of this study was to assess the binding mechanism of CG (1:1) and SO3SQ dye to HSA and how the mechanism can explain the W214 fluorescence quenching effect and to determine …
Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis
Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis
Master's Theses
This study aspires to find a new screening approach to trace DNA recovery techniques to yield a higher quantity of trace DNA from larger items of evidence. It takes the path of visualizing trace DNA on items of evidence with potential DNA so analysts can swab a more localized area rather than attempting to recover trace DNA through the general swabbing technique currently used for trace DNA recovery. The first and second parts consisted of observing trace DNA interaction with Diamond Dye on porous and non-porous surfaces.
The third part involved applying the Diamond Dye solution by spraying it onto …
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Cybersecurity Undergraduate Research Showcase
According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).
The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …
Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler
Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler
International Journal of Cybersecurity Intelligence & Cybercrime
This research aims to explore the influence of news media on the fear of cyberterrorism and how cyberterrorism is framed in the media. Using a mixed-method approach as a research strategy, this paper reports on two studies that explore the influence of news reading on the fear of cyberterrorism. The first study analyzed survey responses from 1,190 participants and found that increased exposure to reading news media was associated with increased fear of cyberterrorism. The second study, built on the first, sought to investigate how cyberterrorism is framed and constructed as a threat by the US local and national newspapers. …
Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins
Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins
International Journal of Cybersecurity Intelligence & Cybercrime
The difference in depression between non-cyberbullied and cyberbullied youth is not well understood. To describe the prevalence and trends in depression among cyberbullied adolescents. Using cross-sectional, nationally-representative data from the YRBS 2011 - 2019, we estimated the prevalence and trends of depression across the total years and within cyberbullied groups that include biological sex and race and ethnicity among adolescents. The results indicated the prevalence of depression was higher among those that were cyberbullied. Within the cyberbullied groups the total trend was higher than the non-cyberbullied, females had a higher prevalence of depression than males, and Hispanics had a higher …
New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens
New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens
International Journal of Cybersecurity Intelligence & Cybercrime
This editorial introduction will present an overview of the four articles contained in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The articles examine the profiling of hackers, the role of the media in shaping public perceptions of cyberterrorism, research trends in cybersecurity and cybercrime, as well as the impacts of cyberbullying.
Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke
Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke
International Journal of Cybersecurity Intelligence & Cybercrime
Studies on cybercrime and cybersecurity have expanded in both scope and breadth in recent years. This study offers a bibliometric review of research trends in cybercrime and cybersecurity over the past 26 years (1995-2021) based on Web of Science core collection database. Specifically, we examine the growth of scholarship and the expanded scope of subject categories and relevant journals. We also analyze the research collaboration network based on authors’ affiliated institutions and countries. Finally, we identify major topics within the fields, how each topic relates to – and diverges from – one another, and their evolution over time. Overall, we …
Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld
Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld
International Journal of Cybersecurity Intelligence & Cybercrime
Recently, it seems as if hacking-related stories can be found in the news every day. To study, and hopefully prevent, this new type of crime, the field of cyber criminology has emerged. This study adds to the existing cybercrime literature by examining hacking behavior specifically. It determines if there is a relationship between the age, gender, and nationality of hackers and characteristics of the cyberattacks that they perpetrate. To do this, this study analyzes 122 United States Department of Justice (USDOJ) press reports from January 2019 to December 2021. Some key results include the finding that older hackers and international …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Session 8: Ensemble Of Score Likelihood Ratios For The Common Source Problem, Federico Veneri, Danica M. Ommen
Session 8: Ensemble Of Score Likelihood Ratios For The Common Source Problem, Federico Veneri, Danica M. Ommen
SDSU Data Science Symposium
Machine learning-based Score Likelihood Ratios have been proposed as an alternative to traditional Likelihood Ratios and Bayes Factor to quantify the value of evidence when contrasting two opposing propositions.
Under the common source problem, the opposing proposition relates to the inferential problem of assessing whether two items come from the same source. Machine learning techniques can be used to construct a (dis)similarity score for complex data when developing a traditional model is infeasible, and density estimation is used to estimate the likelihood of the scores under both propositions.
In practice, the metric and its distribution are developed using pairwise comparisons …
Feature Extraction Of Footwear Impression Images For Quality Assessment, Alexandra Hill
Feature Extraction Of Footwear Impression Images For Quality Assessment, Alexandra Hill
Graduate Theses, Dissertations, and Problem Reports
Forensic footwear impression analysis is a valuable tool in criminal investigations. Extracting useful features from images of footwear impressions is a critical step in this process. However, the quality of these images can vary widely, making feature extraction challenging. In order to give a quality assessment rating to a footwear impression image, the image should first be analyzed to extract features from the impression. In this paper, we present a method to extract features from a 2D grayscale footwear impression image. A Hierarchical Grid Model implementation has been adapted from use on a 3D dataset to assist in finding features, …
Analysis Of Fiber Uv Degradation Through An Environmental Chamber, Davis A. Eames
Analysis Of Fiber Uv Degradation Through An Environmental Chamber, Davis A. Eames
Undergraduate Research Posters
Environmentally degraded fibers could impact multiple aspects of a fiber comparison, considering that collected weathered fabrics/fibers may express an altered chemical structure and/or colorimetric property compared to their unexposed counterparts. Depending on the amount of degradation the evidence has suffered, it could be challenging for forensic scientists to make conclusions from their comparative analyses. Observations presented in this study were orchestrated to test the possible outcomes that sunlight has on fabric-based materials. Photodegradation of fabrics was investigated through the use of an environmental chamber for a duration of six weeks, which would be equivalent to three months of real-world UV …
Strengthening The Interpretation Of Glass And Paint Evidence Through The Study Of Random Frequency Of Occurrence And Analytical Information, Lauryn C. Alexander
Strengthening The Interpretation Of Glass And Paint Evidence Through The Study Of Random Frequency Of Occurrence And Analytical Information, Lauryn C. Alexander
Graduate Theses, Dissertations, and Problem Reports
Glass and paint particles are frequently discovered at crime scenes as valuable trace evidence. Often, these fragments are transferred from a crime scene to a victim or person-of-interest, and can subsequently be evaluated, analyzed, and classified according to their physical and optical measurements, and chemical properties, each of which can provide important information to the analyst to assist in the determining if a recovered particle is distinguishable or indistinguishable from a known source. Moreover, these minute materials can provide information about how the events took place, leading to the reconstruction of crime scenes and the identification of valuable clues for …
Meta-Analysis Of Scent Detection Canines And Potential Factors Influencing Their Success Rates, Molly Marie Jaskinia
Meta-Analysis Of Scent Detection Canines And Potential Factors Influencing Their Success Rates, Molly Marie Jaskinia
Graduate Student Theses, Dissertations, & Professional Papers
Objective: This is a meta-analysis focused on the success rates of scent detection canines and potential factors that could influence their accuracy. A series of statistical analyses were conducted to determine if certain demographic factors, such as the dog’s gender, age, and breed, have an effect on a scent dog’s accuracy during a search. Or if more circumstantial factors, like the dog’s level of experience in scent work, the type of target scent, and their handler’s awareness of the target’s location, affect the outcome of the search.
Materials and Methods: A dataset was created from 37 different articles consisting of …
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
International Journal of Cybersecurity Intelligence & Cybercrime
Recent years have witnessed a growing academic interest in deviance and victimization in the cyber space. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime features three empirical research articles on online behavior of traditionally under-researched populations and a review of much waited book on digital forensics and investigation. This paper was prepared to introduce these important scholarly works in the context of newly emerging scholarship that focuses on the experiences of diverse subgroups in cyberspace.
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
International Journal of Cybersecurity Intelligence & Cybercrime
Reality docuseries have dominated primetime airwaves for the greater part of three decades. However, little is known about how viewers who are enamored with the genre’s most aggressive characters are influenced. Using Glaser’s (1956) theory of differential identification, this study employs survey data from 210 college students at a historically Black college and university to explore whether identification with characters from aggressive reality docuseries (ARDs) and the frequency of viewing ARD are positively associated with cyberbullying. Results of multivariate analyses revealed that men were more likely than women to publicly shame others and air other’s dirty laundry online. Additionally, the …
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
International Journal of Cybersecurity Intelligence & Cybercrime
The study examined the current trend in cybercrime awareness and the relationship such trend has with cybercrime vulnerability or victimization. Selecting a sample of 1104 Internet users from Umuahia, Abia State, Nigeria, We found that: 1) awareness of information security was high in that about 2 in every 3 (68%) participants demonstrated a favorable awareness of information security and cybercrime. It was, however, revealed that such a high level of awareness could be partial and weak. 2) most Internet users demonstrated the awareness of fraud-related cybercrime categories (39%), e-theft (15%), hacking (12%), and ATM theft (10%). However, they were rarely …
Book Review: Digital Forensics And Cyber Investigation
Book Review: Digital Forensics And Cyber Investigation
International Journal of Cybersecurity Intelligence & Cybercrime
No abstract provided.
Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee
Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Kerberoasting, an attack vector aimed at the Kerberos authentication protocol, can be used as part of an adversary’s attack arsenal. Kerberos is a type of network authentication protocol that allows a client and server to conduct a mutual verification before providing the requested resource to the client. A successful Kerberoasting attack allows an adversary to leverage the architectural limitations of Kerberos, providing access to user password hashes that can be subject to offline cracking. A cracked user password could give a bad actor the ability to maintain persistence, move laterally, or escalate privileges in a system. Persistence or movement within …
Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti
Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti
International Journal of Cybersecurity Intelligence & Cybercrime
Cryptography has been applied to a range of modern technologies which criminals also exploit to gain criminal rewards while hiding their identity. Although understanding of cybercrime involving this technique is necessary in devising effective preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles, featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, that will enhance our understanding of cryptography-related crime, ranging from cryptocurrency and darknet market to password-cracking. The articles were presented by the winners of the student paper competition at the 2022 International …
Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee
Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee
International Journal of Cybersecurity Intelligence & Cybercrime
The number of Dark Web financial marketplaces where Dark Web users and sellers actively trade illegal goods and services anonymously has been growing exponentially in recent years. The Dark Web has expanded illegal activities via selling various illicit products, from hacked credit cards to stolen crypto accounts. This study aims to delineate the characteristics of the Dark Web financial market and its scams. Data were derived from leading Dark Web financial websites, including Hidden Wiki, Onion List, and Dark Web Wiki, using Dark Web search engines. The study combines statistical analysis with thematic analysis of Dark Web content. Offering promotions …
A Comparison Of Methods Used For The Elimination Of Organics From Soil Prior To Analysis By Ftir-Atr And Sem-Eds, Argeliz Pomales
A Comparison Of Methods Used For The Elimination Of Organics From Soil Prior To Analysis By Ftir-Atr And Sem-Eds, Argeliz Pomales
Student Theses
This project suggests improvements to the treatment methods utilized for the sample preparation and evaluation of minerals in soil samples encountered in forensic science casework and research. The evaluation of pre-treated and post-treated soil samples were performed using Fourier-Transform Infrared Spectroscopy with Attenuated Total Reflection (FTIR-ATR) and Scanning Electron Microscopy-Energy Dispersive Spectroscopy (SEM-EDS). Because soil samples contain a significant amount of organic matter and water which interfere with examination of these minerals while using these instruments, pretreatment methods are necessary to isolate the mineral fraction for examination and analysis.
Soil samples were first sieved with various size stainless steel mesh …
Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry
Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry
Department of Statistics: Faculty Publications
1 Preliminaries
1.1 Scope
The aim of this document is to respond to issues raised in Federal Bureau of Investigation1 and Alex Biedermann, Bruce Budowle & Christophe Champod.2
1.2 Conflict of Interest
We are statisticians employed at public institutions of higher education (Iowa State University and University of Nebraska, Lincoln) and have not been paid for our time or expertise when preparing either this response or the original affidavit.3 We provide this information as a public service and as scientists and researchers in this area.
1.3 Organization
The rest of the document precedes as follows: we begin …