- Digital and Cyber Forensics
- Advanced Malware Detection Techniques
- Digital Media Forensic Detection
- Information and Cyber Security
- Network Security and Intrusion Detection
- Cybercrime and Law Enforcement Studies
- Cybersecurity and Cyber Warfare Studies
- Privacy, Security, and Data Protection
- Cloud Data Security Solutions
- User Authentication and Security Systems
- Data Quality and Management
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Forensic and Genetic Research
- Security and Verification in Computing
- Advanced Data Storage Technologies
- Marriage and Sexual Relationships
- Software Engineering Research
- Artificial Intelligence in Law
- Human Rights and Development
- Advanced Database Systems and Queries
- Global Educational Policies and Reforms
- Youth Education and Societal Dynamics
- Engineering Education and Technology
- Dental Education, Practice, Research
Apptronik (United States)
2021
Hallym University
2015-2020
Hallym University of Graduate Studies
2017
Hallym University Medical Center
2017
Albany State University
2017
University at Albany, State University of New York
2017
Hallym Polytechnic University
2017
Soonchunhyang University
2014-2015
University College Dublin
2009-2014
Princess Margaret Rose Orthopaedic Hospital
1968-1975
Cryptocurrency, and its underlying technologies, has been gaining popularity for transaction management beyond financial transactions. Transaction information is maintained in the block-chain, which can be used to audit integrity of transaction. The focus on this paper potential availability block-chain technology other transactional uses. Block-chain one most stable open ledgers that preserves information, difficult forge. Since stored not related personally identify it characteristics...
The explosive growth of information and communications technologies (ICTs) as manifested in Smart Cities the Internet Things (IoT) creates more computable data with myriad benefits. They also produce ever digital evidence people's lives all contexts, commensurately greater potential risks to safety rights citizens. Digital/computational forensics analytics, used combat crime, are vanguard collision these public policy privacy personal autonomy. bring evidentiary fruits this technology...
The rapid advancement of technology has been matched by a significant rise in cybercrime, posing substantial challenges for digital forensics investigators who must handle increasingly complex cases and navigate vast volumes evidence. While current research on intent recognition largely focused cybersecurity measures preventing attacks, there noticeable gap the integration legal analysis with technical forensics. This paper addresses this presenting an innovative model that combines...
At the time of this writing, Android devices are widely used, and many studies considering methods forensic acquisition data from have been conducted. Similarly, a diverse collection smartphone tools has also introduced. However, conducted thus far do not normally guarantee integrity required for digital investigations. Therefore, work uses previously proposed method device utilizing 'Recovery Mode'. This evaluates Recovery Mode variables that potentially compromise at acquisition. Based on...
The use of automation in digital forensic investigations is not only a technological issue, but also has political and social implications. This work discusses some challenges with the implementation acceptance investigation, possible implications for current investigators. Current attitudes towards are examined, as well issue investigators knowledge acquisition retention. argument made planned, careful going forward that allows more efficient effective while at same time attempting to...
This work addresses the definition and identification of key elements robustness resilience in context sustainable digital investigation capacity. After a review prior work, we describe results structured questionnaire that was sent to 72 law enforcement agencies subject-matter experts both online oral formats (app. response rate 29%). Based on an in-depth analysis feedback received, for capacity are identified discussed at strategic operational levels, including Digital Forensics Strategy,...
Built into Microsoft Windows is the ability for operating system to track user window viewing preferences specific Explorer. This information, which called "ShellBag" stored in several locations within Registry Operating System. paper introduces a novel method examine ShellBag information snapshots reconstruct activities. It compares different states of consecutive order detect ShellBag-related actions. Nine detection rules are proposed on basis analyzing causality between actions and...
Anti-forensics, whether intentionally to disrupt investigations or simply an effort make a computer system run better, is becoming of increasing concern digital investigators. This work attempts assess the problem anti-forensics techniques commonly deployed in South Korea. Based on identified challenges, method signature-based anti-forensic trace detection proposed for triage purposes that will assist investigators quickly making decisions about suspect devices before conducting full...
In this systematic literature review, we delve into the realm of intention recognition within context digital forensics and cybercrime. The rise cybercrime has become a major concern for individuals, organizations, governments worldwide. Digital is field that deals with investigation analysis evidence in order to identify, preserve, analyze information can be used as court law. Intention subfield artificial intelligence identification agents’ intentions based on their actions change states....
Abstract With so much information collected from many places and stored in others, the forensic value of digital evidence has exploded globally. This ranges relating to traditional crimes that for new cybercrimes. The ability use forensics, computational policing analytics electronic all types, protections misuse, are governed by laws national jurisdictions. Where those intersect transnational cases may be harmonized or conflict‐ridden. As forensics is an interdisciplinary activity, both...