- Digital and Cyber Forensics
- Advanced Malware Detection Techniques
- User Authentication and Security Systems
- Digital Media Forensic Detection
- Network Security and Intrusion Detection
- Information and Cyber Security
- Spam and Phishing Detection
- Internet Traffic Analysis and Secure E-voting
- Cybercrime and Law Enforcement Studies
- Advanced Steganography and Watermarking Techniques
- RFID technology advancements
- Privacy, Security, and Data Protection
- Data Quality and Management
- Anomaly Detection Techniques and Applications
- Adversarial Robustness in Machine Learning
- Smart Grid Security and Resilience
- Advanced Authentication Protocols Security
- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- Opinion Dynamics and Social Influence
- Generative Adversarial Networks and Image Synthesis
- Bullying, Victimization, and Aggression
- Technology and Data Analysis
- Complex Network Analysis Techniques
- Innovation in Digital Healthcare Systems
Zayed University
2022-2024
University of Pretoria
2016-2023
Community College of Qatar
2019-2022
ORCID
2020
University of Technology Malaysia
2012-2017
UNSW Sydney
2017
Voice cloning methods have been used in a range of ways, from customized speech interfaces for marketing to video games. Current voice systems are smart enough learn characteristics few samples and produce perceptually unrecognizable speech. These pose new protection privacy risks voice-driven interfaces. Fake audio has malicious purposes is difficult classify what real fake during digital forensic investigation. This paper reviews the issue deep-fake classification evaluates current...
Database forensic investigation (DBFI) is an important area of research within digital forensics. It's importance growing as data becomes more extensive and commonplace. The challenges associated with DBFI are numerous, one the lack a harmonized process for investigators to follow. In this paper, therefore, we conduct survey existing literature hope understanding body work already accomplished. Furthermore, build on present using design science methodology. This has been developed based...
For every contact that is made in a database, digital trace will potentially be left and most of the database breaches are mostly aimed at defeating major security goals (Confidentiality, Integrity, Authenticity) data reside database. In order to prove/refute fact during litigation, it important identify suitable investigation techniques can used link potential incident/suspect crime. As result, this paper has proposed steps constructing Integrated Incident Response Model (IIRM) relied upon...
The emergence of unmanned aerial vehicles (also referred to as drones) has transformed the digital landscape surveillance and supply chain logistics, especially in terrains where such was previously deemed unattainable. Moreover, adoption drones further led proliferation diverse drone types drone-related criminality, which introduced a myriad security forensics-related concerns. As step towards understanding state-of-the-art research into these challenges potential approaches mitigation,...
For reliable and relevant scientific evidence to be admitted in a court of law, it is important apply digital forensic investigation techniques corroborate suspected potential security incident. Mainly, traditional forensics have focused on computer desktops servers. However, recent advances media platforms seen an increased need for the application other subdomains including small mobile devices, databases, networks, cloud-based platforms, Internet Things (IoT). To assist investigators,...
Internet of Things (IoT) are becoming commonplace in homes, buildings, cities, and nations, IoT networks also getting more complex interconnected. The complexity, interconnectivity, heterogeneity systems, however, complicate digital (forensic) investigations. challenge is compounded due to the lack holistic standardized approaches. Hence, building on ISO/IEC 27043 international standard, we present a forensic readiness (DFR) framework. We qualitatively evaluate utility proposed DFR
Machine learning has been shown as a promising approach to mine larger datasets, such those that comprise data from broad range of Internet Things devices, across complex environment(s) solve different problems. This paper surveys existing literature on the potential using supervised classical machine techniques, K-Nearest Neigbour, Support Vector Machines, Naive Bayes and Random Forest algorithms, in performing live digital forensics for IoT configurations. There are also number challenges...
Using a face validity approach, this paper provides validation of the Database Forensic Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability, heterogeneity, complexity, and ambiguity in database forensic investigation (DBFI) field, where several models were identified, collected, reviewed develop DBFIM. However, lacked validity-based approach that could ensure DBFIM’s applicability DBFI field. completeness, usefulness, logic needed be validated by experts....
Continuous and emerging advances in Information Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due the implicit functionalities that are focused on realizing Internet of Vehicle (IoV) vision. However, IoV is susceptible attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may...
Securing digital evidence is a key factor that contributes to admissibility during forensic investigations, particularly in establishing the chain of custody evidence. However, not enough done ensure environment and access are secure. Attackers can go extreme lengths cover up their tracks, which serious concern forensics – readiness. If an attacker gains location where stored, they could easily alter (if remove it altogether). Even though integrity checks be performed sound, collected may...
Integrating Internet of Things (IoT) devices into smart homes has necessitated the development novel strategies to address difficulties and complexities cyber-attacks privacy concerns in current digital threat landscape. One unaddressed challenge is lack clarity information collected stored by these IoT homes. The data storage process compliance home appliances, such as security cameras, thermostats, speakers, are examined this study. More specifically, study focuses on sensitive potential...
Abstract The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless say, today’s dynamic, virtualized, complex environments, it has become undeniably necessary for administrators, analysts as well engineers practice vigilantism, on traffic other events reason understand the exact security posture an organization’s environment at any given time. This driven by fact that modern environments do,...
Ransomware attacks have increased significantly in recent years, causing great destruction and damage to critical systems business operations. Attackers are unfailingly finding innovative ways bypass detection mechanisms, which encouraged the adoption of artificial intelligence. However, most research summarizes general features AI induces many false positives, as behavior ransomware constantly differs detection. Focusing on key indicating becomes vital this guides investigator inner...
Abstract A Cloud Forensic Readiness as a Service (CFRaaS) model allows an environment to preemptively accumulate relevant potential digital evidence (PDE) which may be needed during post‐event response process. The benefit of applying CFRaaS in cloud environment, is that, it designed prevent the modification/tampering architectures or infrastructure reactive process, if could, end up having far‐reaching implications. authors this article present process very costly exercise when must...
Currently, about half of all global enterprises are adopting and using some form cloud computing services. In computing, potential digital evidence is distributed across multiple isolated virtual machine instances. Investigating deleted or inactive instances a challenge to forensics, the traditional methods forensics inadequate address such forensic investigation. Users public (whether victim cyberattack, cybercriminal investigator) inherently communicate natural human language in sentences...
Complexity and sophistication among multimedia-based tools have made it easy for perpetrators to conduct digital crimes such as counterfeiting, modification, alteration without being detected. It may not be verify the integrity of video content that, example, has been manipulated digitally. To address this perennial investigative challenge, paper proposes integration a forensically sound push button forensic modality (PBFM) model investigation MP4 file format step towards automated...
<span>User attribution, the process of identifying a human in digital medium, is research area that has receive significant attention information security areas, with little focus on forensics. This study explored probability existence fingerprint based thinking style, which can be used to identify an online user. To achieve this, utilized Server-side web data 43-respondents were collected for 10-months as well self-report style measurement instrument. Cluster dichotomies from five styles...
Comprehension of the statistical and structural mechanisms governing human dynamics in online interaction plays a pivotal role user identification, profile development, recommender systems. However, building characteristic model on Internet involves complete analysis variations activity patterns, which is complex process. This complexity inherent has not been extensively studied to reveal composition behavior. A typical method anatomizing such system viewing all independent interconnectivity...
The relationship between negative and positive connotations with regard to malware in the cloud is rarely investigated according prevailing literature. However, there a significant use of connotations. A clear distinction two emanates when we originally considered malicious code, for connotation like case capturing keystrokes proactive forensic purpose. This done during collection digital evidence Digital Forensic Readiness (DFR) purposes, preparation Investigation (DFI) process. paper...
Even though the cloud paradigm and its associated services has been adopted in various enterprise applications, there major issues with regard to authenticating users' critical data. Single Sign on (SSO) is a user authentication technique through which server authenticates allows use single aspect of login credentials, for example, access multiple cloud. SSO reduces number logins that are needed over heterogeneous environments, risk might be security detrimental if, Man-in-the Middle (MITM)...