Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
forensic analysis
biblio
Forensic Analysis of Fitbit Versa: Android vs iOS
Submitted by grigby1 on Fri, 09/30/2022 - 3:56pm
Digital Forensics
forensic analysis
Fitbit forensics
Cellebrite
ios
cloud forensics
iOS Security
Resiliency
wearable computers
fitbit
security
Compositionality
Data mining
Databases
privacy
Conferences
resilience
Metrics
Human Factors
pubcrawl
biblio
Discord Server Forensics: Analysis and Extraction of Digital Evidence
Submitted by grigby1 on Mon, 01/31/2022 - 5:43pm
Computer crime
VoIP
discord server
discord
cache storage
cache analysis
Web Caching
forensic analysis
Data mining
tools
Scalability
Resiliency
resilience
Metrics
pubcrawl
Digital Forensics
Servers
security
biblio
Building Knowledge Bases for Timestamp Changes Detection Mechanisms in MFT Windows OS
Submitted by grigby1 on Thu, 03/04/2021 - 2:44pm
information security
Windows Operating System Security
timestamps
Resiliency
resilience
pubcrawl
operating system
Microsoft Windows (operating systems)
MFT Windows Os
MFT
Metrics
master file table
knowledge bases
knowledge based systems
Windows operating system
İNDEX\_ROOT
İNDEX\_ALLOCATION
forensic analysis
file timestamp change detection
file organisation
file operations
feature extraction
Digital Forensics
computer forensic science
composability
\$STANDARDİNFORMATION
\$FILE\_NAME
security
biblio
Forensic Analysis of Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
bitcoin security
transaction processing
transaction patterns
suspicious bitcoin addresses
Petri nets
forensic investigation
forensic analysis
Firing
FABT
Bitcoin transactions
bitcoin transaction net
bitcoin transaction data
data privacy
financial data processing
bitcoin
pattern matching
visualization
cryptocurrencies
Data mining
Human behavior
pubcrawl
computer science
Forensics
Scalability
biblio
An Effective Android Ransomware Detection Through Multi-Factor Feature Filtration and Recurrent Neural Network
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
smart phones
multifactor feature filtration
majority voting process
Long short-term memory
filtration
feature selection algorithms
feature filtration techniques
deep learning-based malware detection model
Android ransomware detection
Android malware dataset
Android malware
Android environment
recurrent neural network
defense mechanisms
recurrent neural nets
forensic analysis
security
Malware Analysis
Digital Forensics
Metrics
deep learning
Ransomware
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Feature Selection
feature extraction
mobile computing
invasive software
smart devices
biblio
Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
data comparison analysis
wearables security
wearable technology
Manuals
low-cost HETP fitness tracker
location data
HETP watches
Garmin Forerunner 110
garmin
fitness bands
Fitbit Charge HR
fitbit
digital forensic practitioners
Scalability
wearable computers
Wearable devices
Biomedical monitoring
forensic analysis
smart phones
Digital Forensics
Data mining
privacy
pubcrawl
Human behavior
Resiliency
Internet of Things
biblio
Wiping Techniques and Anti-Forensics Methods
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
metadata
Writing
wiping techniques
wiping standards
tools
standards
software products developement
secure file destruction
Scalability
resilience
pubcrawl
product development
Metrics
anti-forensics methods
meta data
local storage devices
information forensics
Human behavior
forensic analysis
File systems
erasure standards
eraser software
Digital Forensics
data wiping
Cryptography
biblio
Adversarial Multimedia Forensics: Overview and Challenges Ahead
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
information forensics
Transform coding
tools
tampering detection
Signal processing algorithms
Scalability
resilience
pubcrawl
multimedia forensics tools
multimedia documents
multimedia computing
Metrics
information retrieval
adversarial environment
Human behavior
game theory
Forensics
forensic techniques
forensic analysis
distortion
Digital Forensics
Detectors
counter-forensic tools
Cameras
adversarial multimedia forensics
biblio
A tool to compute approximation matching between windows processes
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
digital forensics scenarios
Windows Operating System Security
windows processes
Windows memory dump
Windows
volatility
memory image file
image matching
Image forensics
forensics memory image
Forensics
forensic memory analysis
forensic analysis
file organisation
executable file
dumping process
tools
cryptographic hashing functions
cryptographic hash values
bytewise approximate matching
Binary codes
approximation matching algorithms
Approximation algorithms
Microsoft Windows (operating systems)
microsoft windows
Cryptography
malware
composability
Resiliency
Metrics
pubcrawl
biblio
RAIN: Refinable Attack Investigation with On-Demand Inter-Process Information Flow Tracking
Submitted by grigby1 on Mon, 03/05/2018 - 1:17pm
attack provenance
forensic analysis
Human behavior
Human Factors
information flow analysis
information forensics
Metrics
pubcrawl
record and replay
resilience
Resiliency
Scalability
1
2
next ›
last »