Abstract is missing.
- Digital Forensic Acquisition Kill Chain - Analysis and DemonstrationGunnar Alendal, Geir Olav Dyrkolbotn, Stefan Axelsson. 3-19 [doi]
- Enhancing Industrial Control System Forensics Using Replication-Based Digital TwinsMarietheres Dietz, Ludwig Englbrecht, Günther Pernul. 21-38 [doi]
- Comparison of Cyber Attacks on Services in the Clearnet and DarknetYork Yannikos, Quang Anh Dang, Martin Steinebach. 39-61 [doi]
- Using Parallel Distributed Processing to Reduce the Computational Time of Digital Media Similarity MeasuresMyeong Lim, James Jones. 65-87 [doi]
- Evaluation of Network Traffic Analysis Using Approximate Matching AlgorithmsThomas Göbel, Frieder Uhlig, Harald Baier. 89-108 [doi]
- Leveraging USB Power Delivery Implementations for Digital Forensic AcquisitionGunnar Alendal, Stefan Axelsson, Geir Olav Dyrkolbotn. 111-133 [doi]
- Detecting Malicious PDF Documents Using Semi-Supervised Machine LearningJianguo Jiang, Nan Song, Min Yu, Kam-Pui Chow, Gang Li 0009, Chao Liu, Weiqing Huang. 135-155 [doi]
- Malicious Login Detection Using Long Short-Term Memory with an Attention MechanismYanna Wu, Fucheng Liu, Yu Wen. 157-173 [doi]
- Predicting the Locations of Unrest Using Social MediaShengzhi Qin, Qiaokun Wen, Kam-Pui Chow. 177-191 [doi]
- Extracting Threat Intelligence Relations Using Distant Supervision and Neural NetworksYali Luo, Shengqin Ao, Ning Luo, Changxin Su, Peian Yang, Zhengwei Jiang. 193-211 [doi]
- Security Auditing of Internet of Things Devices in a Smart HomeSuryadipta Majumdar, Daniel Bastos, Anoop Singhal. 213-234 [doi]
- Indian Currency Database for Forensic ResearchSaheb Chhabra, Gaurav Gupta, Garima Gupta, Monika Gupta. 237-253 [doi]
- Security and Privacy Issues Related to Quick Response CodesPulkit Garg, Saheb Chhabra, Gaurav Gupta, Garima Gupta, Monika Gupta. 255-267 [doi]