Reza Montasari

Reza Montasari
Swansea University | SWAN · Department of Criminology

About

48
Publications
9,507
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
299
Citations

Publications

Publications (48)
Article
Full-text available
Phishing attacks are on the increase. The fact that our ways of living, studying and working have drastically changed as a result of the COVID pandemic (i.e., almost everything being done online) has created many new cyber security concerns. In particular, with the move to remote working, the number of phishing emails threatening employees has incr...
Article
Power Line channels present a very harsh environment for high speed data transfer which degrades the data transmission. Using proper channel coding can enhance the data transmission over PLC systems. The purpose of using channel coding is to encode the information transmitted over communication channel in such a way that in presence of other interf...
Chapter
Human trafficking is a crime that has devastating impacts on all societies worldwide. Law enforcement and security organisations often encounter many obstacles in their endeavours to combat this crime. Effective measures to tackle human trafficking necessitate the fusion of a wide range of factors which together could produce the desired impact. On...
Chapter
Human trafficking is a complex, burgeoning crime with a global foothold that impacts an estimated 40.3 million people worldwide. Currently, the number and the scale of innovation and technology tools do not correspond with the magnitude of the problem. There is little awareness about existing digital innovations and technology initiatives within th...
Chapter
Despite its many technological and economic benefits, Cloud Computing poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. By characterising th...
Book
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text...
Chapter
In the current, fast paced development of computer hardware, hardware manufacturers often focus on an expedited time to market paradigm or on maximum throughput. This inevitably leads to a number of unintentional hardware vulnerabilities. These vulnerabilities can be exploited to launch devastating hardware attacks and as a result compromise the pr...
Chapter
The dark nets’ anonymity has provided the organised crime groups, terror groups, and paedophiles alike a place to communicate, recruit, purchase and disseminate illegal materials across the world instantly without much fear of retribution. As the exit nodes of the TOR browser can be set up by anyone across the globe, policing requires a significant...
Book
This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as...
Book
The book provides a valuable reference for cyber security experts, digital forensic practitioners and network security professionals. In recent years, AI has gained substantial attention from researchers in both academia and industry, and as a result AI’s capabilities are constantly increasing at an extraordinary pace. AI is considered to be the Fo...
Chapter
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many organisations do not sufficiently utilise CTI. This i...
Chapter
Without sufficient intelligence, police response to crimes occurs in the form a reactive retort. This is even more so in the case of cyberspace policing, as digital platforms increase the complexities involved in the overall police incident response development. In this paper, we briefly introduce cybercrime and the necessities that police forces h...
Chapter
IoT devices are becoming more prevalent in society, with an expected 21.5 Billion devices connected by 2025 [24], and when an incident occurs in the vicinity of such devices then they should be considered as potential digital evidence. A network of IoT devices is often referred to as a smart environment, or more frequently as a cyber physical syste...
Article
The high velocity, variety and volume of data generation by today's systems have necessitated Big Data (BD) analytic techniques. This has penetrated a wide range of industries; BD as a notion has various types and characteristics, and therefore a variety of analytic techniques would be required. The traditional analysis methods are typically unable...
Article
Considering the ever-growing ubiquity of technology, there is an associated growth in the possibility of digital devices being related to a criminal investigation or civil litigation. As the variety of digital devices is increasing, the storage capacity of each is also rising exponentially. Due to the varied and large volumes of data produced, law...
Article
In recent years, organisations have invested heavily in the digitisation of their processes to maximise productivity. A digital twin is one of the most recent emerging technologies that is to disrupt business models and to leverage competitive advantage; applications can be found in many industries including, but not limited to healthcare, manufact...
Article
Abstract: The rapid increase in the pervasiveness of digital devices, combined with their heterogeneous nature, has culminated in increasing volumes of diverse data, aka big data, that can become subject to criminal or civil investigations. This growth in big digital forensic data (DFD) has forced digital forensic practitioners (DFPs) to consider s...
Article
There are certain vulnerabilities associated with computing hardware that attackers can exploit to launch destructive attacks which often go undetected by the existing hardware and software countermeasures. Side Chanel Attacks (SCAs) and Rowhammer Attacks (RHAs), the consequences of hardware vulnerabilities, pose significant security and privacy th...
Chapter
The field of digital forensics still lacks formal process models that courts can employ to determine the reliability of the process followed in a digital investigation. The existing models have often been developed by digital forensic practitioners , based on their own personal experience and on an ad-hoc basis, without attention to the establishme...
Article
Various social networking sites (SNSs), widely referred to as social media, provide services such as email, blogging, instant messaging and photo sharing for social and commercial interactions. SNSs are facilitating new forms of social interaction, dialogue, exchange and collaboration. They allow millions of users and organisations worldwide to exc...
Article
There are several vulnerabilities in computing systems hardware that can be exploited by attackers to carry out devastating microarchitectural timing-based side-channel attacks against these systems and as a result compromise the security of the users of such systems. By exploiting microarchitectural resources, adversaries can potentially launch di...
Chapter
Cybercriminology as a subject area has numerous dimensions. Some studies in the field primarily focus on a corrective action to reduce the impact of an already committed crime. However, there are existing computational techniques which can assist in predicting and therefore preventing cyber-crimes. These quantitative techniques are capable of provi...
Chapter
Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging to identify a solution to create an effective defensive posture. As the cyber phenomenon becomes a fundamental part of our society, it is essential to identify adaptive methods to increase the worldwide defensive condition in the most effective manner...
Article
Full-text available
This article describes how there exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural attacks, the result of these vulnerabilities, take advantage of microarchitectural performance of processor implementations, revealing hidden computing process. Lev...
Chapter
The Comprehensive Digital Forensic Investigation Process Model (the CDFIPM), presented in Montasari (IJESDF 8(4)285–301, 2016), provides guidelines for carrying out digital investigations in the UK jurisdiction in a forensically sound manner. The CDFIPM is comprehensive in that it covers the entire digital forensic investigative process; it is gene...
Chapter
Cloud computing has become one of the most game changing technologies in the recent history of computing. It is gaining acceptance and growing in popularity. However, due to its infancy, it encounters challenges in strategy, capabilities, as well as technical, organizational, and legal dimensions. Cloud service providers and customers do not yet ha...
Article
Similar to traditional evidence, courts of law do not assume that digital evidence is reliable if there is no evidence of some empirical testing regarding the theories and techniques pertaining to its production. Courts take a careful notice of the way in which digital evidence has been acquired and stored. In contrast with traditional crimes for w...
Conference Paper
Computer and Internet technology has become a vital part of a daily life for many as it has brought many enhancements to the quality of many individuals' lives. Although advances in computer and Internet technology are utilised by many people for various respectable reasons, at the same time it has become a tool in the hands of cybercriminals for v...
Article
For the past decade, digital forensics has been the subject of scientific study, and as a result it has become an established research and application field. One of the foundational methods in which the researchers in the field have attempted to comprehend the scientific basis of this discipline has been to develop models which reflect their observ...
Article
A formal process model is needed to enable digital forensic practitioners in following a uniform approach and to enable courts of law in determining the reliability of digital evidence presented to them. Such a model also needs to be generic in that it can be applicable in the different fields of digital forensics including law enforcement, corpora...
Conference Paper
Digital forensics, originally known as computer forensics, first presented itself in the 1970s. During the first investigations, financial fraud proved to be the most common cause on suspects’ computers. Since then, digital forensics has grown in importance in situations where digital devices are used in the commission of a crime. The original focu...
Conference Paper
Contrary to traditional crimes for which there exists deep-rooted standards, procedures and models upon which courts of law can rely, there are no formal standards, procedures nor models for digital forensics to which courts can refer. Although there are already a number of various digital investigation process models, these tend to be ad-hoc proce...
Conference Paper
This paper investigates the effectiveness of the private browsing modes built into four major Internet browsers. In examining the phenomenon of the private browsing modes built into four widely used Internet browsers, this paper aims to determine whether one can identify when a private browsing mode has been utilized by a suspect to perform a crimi...