- Digital and Cyber Forensics
- Advanced Malware Detection Techniques
- Innovation in Digital Healthcare Systems
- Digital Media Forensic Detection
- Cryptographic Implementations and Security
- Technology and Data Analysis
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Advanced Data Storage Technologies
- Advanced Steganography and Watermarking Techniques
- Internet of Things and Social Network Interactions
- Network Security and Intrusion Detection
- User Authentication and Security Systems
- Cloud Data Security Solutions
- E-commerce and Technology Innovations
- Energy and Environmental Systems
- Privacy, Security, and Data Protection
- Digital Rights Management and Security
- Dispute Resolution and Class Actions
- Internet Traffic Analysis and Secure E-voting
- Educational Systems and Policies
- Consumer Perception and Purchasing Behavior
- Cryptography and Data Security
- Spam and Phishing Detection
- Web Data Mining and Analysis
Wellcome Sanger Institute
2024-2025
Korea University
2015-2024
Chung-Ang University
2023
Hanyang University
2022
Pukyong National University
2022
Dongnam Institute of Radiological & Medical Sciences
2021
Convergence
2018
Pusan National University
2018
Purdue University West Lafayette
2014-2016
Agency for Defense Development
2012-2015
Internet of Things (IoT) devices such as the Amazon Echo – a smart speaker developed by are undoubtedly great sources potential digital evidence due to their ubiquitous use and always-on mode operation, constituting human-life's black box. The in particular plays centric role for cloud-based intelligent virtual assistant (IVA) Alexa Lab126. Alexa-enabled wireless is gateway all voice commands submitted Alexa. Moreover, IVA interacts with plethora compatible IoT third-party applications that...
A Web browser is an essential application program for accessing the Internet. If a suspect uses Internet as source of information, evidence related to crime would be saved in log file browser. Therefore, investigating browser's can help collect information relevant case. After considering existing research and tools, this paper suggests new collection analysis methodology tool aid process.
Abstract Summary Pacific Biosciences (PacBio) circular consensus sequencing (CCS) aka high fidelity (HiFi) technology has revolutionized modern genomics by producing long (10+kb) and highly accurate reads circularized DNA molecules multiple times combining them into a sequence. Currently the accuracy quality value estimation is more than sufficient for genome assembly germline variant calling, but estimated scores are not enough confident somatic calling on single reads. Here we introduce...
Abstract Background Pacific Biosciences (PacBio) circular consensus sequencing (CCS), also known as high fidelity (HiFi) technology, has revolutionized modern genomics by producing long (10 + kb) and highly accurate reads. This is achieved circularized DNA molecules multiple times combining them into a sequence. Currently, the accuracy quality value estimation provided HiFi technology are more than sufficient for applications such genome assembly germline variant calling. However, there...
At the time of this writing, Android devices are widely used, and many studies considering methods forensic acquisition data from have been conducted. Similarly, a diverse collection smartphone tools has also introduced. However, conducted thus far do not normally guarantee integrity required for digital investigations. Therefore, work uses previously proposed method device utilizing 'Recovery Mode'. This evaluates Recovery Mode variables that potentially compromise at acquisition. Based on...
In the IoT world, intelligent virtual assistant (IVA) is a popular service to interact with users based on voice command. For optimal performance and efficient data management, famous IVAs like Amazon Alexa Google Assistant usually operate cloud computing architecture. this process, large amount of behavioral traces that include user activity history detailed descriptions can be stored in remote servers within an IVA ecosystem. If those (as also known as native data) are leaked by attacks,...