Science topic
Digital Forensics - Science topic
Explore the latest questions and answers in Digital Forensics, and find Digital Forensics experts.
Questions related to Digital Forensics
For the past few months, I have been receiving strange review invitations from the famous "Susan Lee" at the HSPI Open Access Journal.
The most surprising aspect of these requests is that they all concern subjects far removed from my area of expertise (for example, one for a publication in the Journal of Forensic Science and Research and another in the Journal of Pulmonology and Respiratory Research). Moreover, the corresponding manuscripts were directly attached to the message ... I imagine a great manner to maintain the confidentiality.😕
Since my expertise lies more in organic chemistry, spectroscopy, and quantum calculations, you can imagine that I am not the right person to assess the quality of papers like "Risk Factors for Respiratory Diseases: A Comparison Between South Asia and Central Asia" or "Digital Forensics and Media Offenses – Investigating Synergy in the Cyber Age"...
Despite politely declining these invitations, I continue to receive requests from "Susan," which leads me to conclude that these journals are not serious.
Has anyone else had a similar experience, or am I the only lucky one here?
Hello everyone, I’m planning to publish a research paper on the intersection of Artificial Intelligence and Blockchain in Digital Forensics. Can anyone guide me on where to begin with the literature review and the best practices for structuring my research? Any recommendations for key areas or resources to focus on would be greatly appreciated. Thank you!
We are excited to announce that the 13th International Symposium on Digital Forensics and Security (ISDFS 2025) will take place both online and in person at Wentworth Institute of Technology, Boston, Massachusetts, USA, on April 24-25, 2025. Since 2016, the IEEE has been a proud supporter of this symposium. Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.
ISDFS offers a platform for researchers and professionals from academia, industry, and government to exchange ideas and recent advancements in Digital Forensics, Cybersecurity, and Computer Science more broadly. Building on the success of the 12th event, the 13th ISDFS conference will continue to promote and share knowledge on various topics and technologies related to Digital Forensics and Cybersecurity. The symposium will feature a diverse program including special sessions, workshops, tutorials, keynote speeches, panel discussions, posters, and oral presentations.
Submissions will be reviewed by a minimum of two members of the Scientific Program Committee. Accepted papers will be submitted for inclusion in IEEE Xplore, provided they meet IEEE Xplore’s scope and quality standards. Papers must be written in English and formatted according to the IEEE guidelines. Submissions that do not adhere to the required format will be rejected, regardless of content quality.
Explore cutting-edge digital forensics research trends, focusing on tech impact, challenges, and innovative responses to evolving cyber threats.
hello,
I'm a presently running my master degree programme in cybersecurity and i am looking at Digital Forensics and Information security management. I really need good topics and materials on it. Can anyone help please with topics along that path and materials also?
Thanks
Hi
I am conducting a research in digital forensics where I need to identify key subjects (witnesses or perpetrators) of an incident. Therefore, I am in need of twitter event datasets to test my algorithm. The dataset could be an event of any type, e.g. crime, natural disaster, terrorism etc.
Additionally, if anyone could recommend any recent works within the domain of digital forensics and machine learning that could be of benefit to my work, that would be equally appreciated.
Many thanks
The field of cyber security is open and has multiple fields (network security, information security, and digital forensics), so I need help in suggesting some recent topics in which I can register for my Ph.D. and improve them. Thank you.
Digital evidence can be encrypted during a forensic investigation to ensure privacy, so what other type of operation can be performed on the encrypted digital evidence apart from keyword search?
Do you have any suggestions on using digital forensic software for research purposes?
Could data extracted through phone forensic methods give a never-before-seen insight into children's social networks?
Is data extracted through phone forensic methods more reliable than self-report methods?
any ideas in digital forensic in cloud computing such as using Tools or type of monitoring and diagnosis of attach using features in kali Linux for Example or any every things can help
Any research update on Mobile (Android) Deduplication from forensic perspective?
I am looking for a research papers in Challenges to digital forensics
Dear Research Gate Community,
I'm finally able to publish my dissertation paper and I'm keen to find the right place to publish it. My old university has just given me permission to publish it online.
First I looked at arXiv however it requires you to have someone who can endorse you for your subject area (My supervisor has now left the University that I originally did my studies at so I'm not expecting to be able to get the endorsement.)
Ideally I'm looking for an open access journal for Digital Forensics and one that accepts submissions in a PDF format.
Another part of me has considered just posting the paper up on my own website however it would be nice to have it in an open journal.
Any tips, tricks or information will be greatly appreicated.
Thank you for your time!
Oliver
Please I am looking for a document listing technical artefacts used as evidence in digital forensics classified according to their evidential strength. Example IP address could be spoofed so it is a weak evidence, malware code similarity is a strong evidence etc.
recent hot area of research in the field of cyber forensics
Smartphones are fast becoming an ubiquitous device used throughout the day to undertake a variety of activities which may have been traditionally completed using a PC. What are the implications in the rise of smartphones for forensic practitioners?
what are the current hot topics for research in digital forensics for PHD?
I need to extract some features from the temporal domain for digital video analyzing
can reversible data hiding in encrypted images be carried out in digital forensics? what are the future researches that can be done on reversible data hiding for increasing the embedding capacity
Because a mobile device forensics has become a significant part of digital forensics. I am looking for Important parts of a device which used in the digital forensics.
Possibly on some techniques or methodologies in analysis of forensic sources of data
Talking about a multi-platform digital forensic software that supports computer and smartphones, including tablets.
I need the database of digital crimes committed especially for cases already established may be in a court of law.
what are the various forensic tool kits, i want to generate reports from them is there any which works effectively, or how to know more about Forenic Tool Kits are they freeware's , how much reliable are they.
We need a documentation about EXT4 file system in Android mobile for digital forensics?
is the topic a future topic what are the resources from where one can get an updated information about cloud forensic what what is the current research going on in it
We all or some of us have an idea of the capabilities of Zeus which is still commercial as we speak. Zeus has managed to steal a lot of millions of $$ and a pretty good amount of personal information through the herders. Why is the pace of stopping Zeus or take down so slow? I know the binaries keep changing each day. Nevertheless, can we attribute that the anti-forensics techniques are still far much ahead of the available digital forensic tools?Other than EnCase and other major FTKs, what can stop this mess once and for all?
In the case of file digital evidence resulting from the acquisition and imaging of electronic device, is there any metadata standard used to be applied to digital evidence. Are there any similar research that discusses about metadata (standard / specification / schema / element) for digital evidence ?
If we employ a forensic agent/multi-agent to gather digital forensic data "potential" across diverse platforms, we all know that, this data will be streaming from different platforms. So if this is true, How can we solve the problem of Time synchronization across the different platforms if all agents in the machines are synchronized within the same time zone
*Take note: If we have to normalize based on attributes.
If we are only collecting logs, content may be gone by the time someone initiates an investigation. On the same note if we are collecting all content/data on the system and the logs, this becomes an impossible proposition, since you need more storage than all of the content on the system to contain content and logs. Whenever i see analysis being addressed (although MapReduce is now on the way as other, more effective analysis methods have been brought to bear). Whenever we experience storage problems, is it an advantage if you have effective data computation mechanisms or still the suspect would have erased the traces. From an expert opinion: You might be removing what you are looking for WRT analysis.What is what in this context?
I am working on Data hiding at Edges. In my contribution i am getting PSNR value greater than 100 for some images.
digital forensic investigations in the cloud
How do these impact current digital forensic techniques? Any suggestions on alternative forensic analysis technique?
I am interested in buying forensic softwares, please suggest along with vendors and prices. Thank you.
Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone.
It is possible to use Shot boudaries por counter the problem of synchronization (Time shift) in video systems fingerpinting. and also what is the extent of this timing shift in the accuracy of results. thanks and best regards.
I need the vendor details and approximate cost of the software in INR.
Given that a piece of malware generally has escalated privileges when it has infected a host, it should be plausible to change/fake the MAC address for traffic coming from the infected host. Has anyone come across any malware that does this?
Here is the steps that I am successful so far :
1.Apply 3Level of DWT to host image
2.Apply SVD to one of the subbands
3.convert the subband and SV's to semi-binary using my own algorithm which will convert a number such as 205.36 to a semi-binary form like :
1.36 0 1 1 0 0 1 1
4.insert my watermark inside the frist and second LSB of the semi-binary form
5.Apply the reverse SVD
6.Apply the IDWT
Until here my watermark is remain intact But when I am going to write the image like
% convert back to uint8
WImg8=uint8(WImg);
imwrite(WImg8,'dwt_watermarked.bmp','bmp');
After extracting the watermark , the watermark is something else, I was wondering if I am doing something wrong? DO I have to convert the whole thing to uint8? because otherwise the written image is one blank image if I don't convert it to unit8