Digital forensics
View article: Cybersecurity in Library Systems Protecting Patron Data and Digital Collections from Cyber Threats and Breaches
Cybersecurity in Library Systems Protecting Patron Data and Digital Collections from Cyber Threats and Breaches Open
This paper examines cybersecurity challenges in contemporary library systems and proposes strategies to safeguard patron data and digital collections. Through qualitative analysis of recent literature, standards, and documented cyber incid…
View article: Cybersecurity in Library Systems Protecting Patron Data and Digital Collections from Cyber Threats and Breaches
Cybersecurity in Library Systems Protecting Patron Data and Digital Collections from Cyber Threats and Breaches Open
This paper examines cybersecurity challenges in contemporary library systems and proposes strategies to safeguard patron data and digital collections. Through qualitative analysis of recent literature, standards, and documented cyber incid…
View article: Cybersecurity in Library Systems Protecting Patron Data and Digital Collections from Cyber Threats and Breaches
Cybersecurity in Library Systems Protecting Patron Data and Digital Collections from Cyber Threats and Breaches Open
This paper examines cybersecurity challenges in contemporary library systems and proposes strategies to safeguard patron data and digital collections. Through qualitative analysis of recent literature, standards, and documented cyber incid…
View article: Dataset_Digital_Divide
Dataset_Digital_Divide Open
This dataset accompanies the article “Bridging the Digital Divide: Identifying Pathways and Policies for Digital Inclusion Through Cluster-Based Analysis.”It contains harmonized indicators for 165 countries between 2010 and 2023 across fou…
View article: Whitepaper Series: Continuity Architecture and Digital Civilization
Whitepaper Series: Continuity Architecture and Digital Civilization Open
This deposit contains the finalized version of the work authored by Christopher Jamar Prater, prepared for archival preservation, academic reference, and continuity verification. The materials reflect original research in digital memory, l…
View article: A REVIEW OF BEHAVIOURAL FINGERPRINTING FOR CLOUD RANSOMWARE DETECTION VIA SYSTEM AND API CALL ANALYSIS
A REVIEW OF BEHAVIOURAL FINGERPRINTING FOR CLOUD RANSOMWARE DETECTION VIA SYSTEM AND API CALL ANALYSIS Open
The rapid spread of cloud computing has opened profit centres for ransomware attacks. Classical methods of detection are static in nature and signature-based have more and more difficulties with modern ransomware. Ransomware today employs …
View article: Whitepaper Series: Continuity Architecture and Digital Civilization
Whitepaper Series: Continuity Architecture and Digital Civilization Open
This deposit contains the finalized version of the work authored by Christopher Jamar Prater, prepared for archival preservation, academic reference, and continuity verification. The materials reflect original research in digital memory, l…
View article: Towards Interactive Analysis of Compressed Provenance Graphs Without Decompression
Towards Interactive Analysis of Compressed Provenance Graphs Without Decompression Open
Enterprise security systems generate massive volumes of log data essential for forensic analysis and cyber threat investigation. The challenge is scale. Storing these logs requires significant resources, and searching through them is painf…
View article: International Journal of Digital Crime and Forensics
International Journal of Digital Crime and Forensics Open
A large amount of surveillance videos and images need sufficient storage. In this article, an architecture of cloud-based surveillance systems and its modules will be designed, the Cloud-based Visual Surveillance System (CVSS) will be impl…
View article: Cyberstalking: Research and Evaluation to Enhance Criminal Justice, United States, 2021-2023
Cyberstalking: Research and Evaluation to Enhance Criminal Justice, United States, 2021-2023 Open
Cyberstalking involves using computing and communications technologies in threatening ways, such as to surveil or harass an individual (online or physically), convey threats, make false accusations about an individual, or share embarrassin…
View article: Cyberstalking: Research and Evaluation to Enhance Criminal Justice, United States, 2021-2023
Cyberstalking: Research and Evaluation to Enhance Criminal Justice, United States, 2021-2023 Open
Cyberstalking involves using computing and communications technologies in threatening ways, such as to surveil or harass an individual (online or physically), convey threats, make false accusations about an individual, or share embarrassin…
View article: Enhancing cross-site scripting attack detection by using FastText as word embeddings and long-short term memory
Enhancing cross-site scripting attack detection by using FastText as word embeddings and long-short term memory Open
Cross-site scripting (XSS) is one of the dangerous cyber-attacks and the number of attacks continues to increase. This study takes a new approach to detect attacks by utilizing FastText as word embedding, and long-short term memory (LSTM),…
View article: Cybercrime and Digital Forensics: Emerging Legal Challenges
Cybercrime and Digital Forensics: Emerging Legal Challenges Open
Authored by Mr. Ganesh Shrirang Nale (Satarkar), LL.M. (Criminal Law), LL.B. (Special), UGC-NET (Law & Criminology), and M.A. Sociology (Pursuing), Central University of Haryana, this research paper examines the evolving landscape of cyber…
View article: Cybercrime and Digital Forensics: Emerging Legal Challenges
Cybercrime and Digital Forensics: Emerging Legal Challenges Open
Authored by Mr. Ganesh Shrirang Nale (Satarkar), LL.M. (Criminal Law), LL.B. (Special), UGC-NET (Law & Criminology), and M.A. Sociology (Pursuing), Central University of Haryana, this research paper examines the evolving landscape of cyber…
View article: Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal Perspectives – Journal of Technology (UGC-CARE Group II, Scopus Indexed) by Ganesh S. Satarkar & Dr. Priyanka S. Jadhavar
Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal Perspectives – Journal of Technology (UGC-CARE Group II, Scopus Indexed) by Ganesh S. Satarkar & Dr. Priyanka S. Jadhavar Open
Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal Perspectives Authors: Mr. Ganesh Shrirang Satarkar (Nale) & Dr. Priyanka S. Jadhavar Published in: Journal of Technology (UGC-CARE Group II, Scopus…
View article: Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal Perspectives – Journal of Technology (UGC-CARE Group II, Scopus Indexed) by Ganesh S. Satarkar & Dr. Priyanka S. Jadhavar
Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal Perspectives – Journal of Technology (UGC-CARE Group II, Scopus Indexed) by Ganesh S. Satarkar & Dr. Priyanka S. Jadhavar Open
Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal Perspectives Authors: Mr. Ganesh Shrirang Satarkar (Nale) & Dr. Priyanka S. Jadhavar Published in: Journal of Technology (UGC-CARE Group II, Scopus…
View article: Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal Perspectives – Journal of Technology (UGC-CARE Group II, Scopus Indexed) by Ganesh S. Satarkar & Dr. Priyanka S. Jadhavar
Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal Perspectives – Journal of Technology (UGC-CARE Group II, Scopus Indexed) by Ganesh S. Satarkar & Dr. Priyanka S. Jadhavar Open
Title: Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal PerspectivesAuthors: Mr. Ganesh Shrirang Satarkar (Nale) & Dr. Priyanka S. JadhavarPublished in: Journal of Technology (UGC-CARE Group II, S…
View article: Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal Perspectives – Journal of Technology (UGC-CARE Group II, Scopus Indexed) by Ganesh S. Satarkar & Dr. Priyanka S. Jadhavar
Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal Perspectives – Journal of Technology (UGC-CARE Group II, Scopus Indexed) by Ganesh S. Satarkar & Dr. Priyanka S. Jadhavar Open
Title: Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal PerspectivesAuthors: Mr. Ganesh Shrirang Satarkar (Nale) & Dr. Priyanka S. JadhavarPublished in: Journal of Technology (UGC-CARE Group II, S…
View article: Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal Perspectives – Journal of Technology (UGC-CARE Group II, Scopus Indexed) by Ganesh S. Satarkar & Dr. Priyanka S. Jadhavar
Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal Perspectives – Journal of Technology (UGC-CARE Group II, Scopus Indexed) by Ganesh S. Satarkar & Dr. Priyanka S. Jadhavar Open
Title: Cyber Security and Artificial Intelligence in the Digital Age: Legal, Ethical, and Societal PerspectivesAuthors: Mr. Ganesh Shrirang Satarkar (Nale) & Dr. Priyanka S. JadhavarPublished in: Journal of Technology (UGC-CARE Group II, S…
View article: Cyber Security: Threats, Challenges, and Modern Protection Mechanisms
Cyber Security: Threats, Challenges, and Modern Protection Mechanisms Open
This research paper provides a comprehensive analysis of modern cybersecurity threats and the evolving landscape of digital risks at both global and national levels. It examines how cyberattacks—such as malware, phishing, ransomware, ident…
View article: Cyber Security: Threats, Challenges, and Modern Protection Mechanisms
Cyber Security: Threats, Challenges, and Modern Protection Mechanisms Open
This research paper provides a comprehensive analysis of modern cybersecurity threats and the evolving landscape of digital risks at both global and national levels. It examines how cyberattacks—such as malware, phishing, ransomware, ident…
View article: Hybrid Surveillance Coercive Control (HSCC) Framework
Hybrid Surveillance Coercive Control (HSCC) Framework Open
This paper introduces the Hybrid Surveillance Coercive Control (HSCC) Framework, an original survivor-informed forensic model describing how digital technologies and ambient behavioural surveillance combine into a unified system of psychol…
View article: Sextortion: A continuing mode of cyber crime
Sextortion: A continuing mode of cyber crime Open
Sextortion, a form of cybercrime obvious by the exploitation of intimate pictures or videos for fiscal, sexual, or psychological advantage, has become an rising global threat in the digital age. This crime includes forcing victims into com…
View article: Hybrid Surveillance Coercive Control (HSCC) Framework
Hybrid Surveillance Coercive Control (HSCC) Framework Open
This paper introduces the Hybrid Surveillance Coercive Control (HSCC) Framework, an original survivor-informed forensic model describing how digital technologies and ambient behavioural surveillance combine into a unified system of psychol…
View article: Digital Forensics to Prove Authenticity and Detect Malware in Email Sent on Directorat of Inovation and Bussiness Incubator
Digital Forensics to Prove Authenticity and Detect Malware in Email Sent on Directorat of Inovation and Bussiness Incubator Open
- The Directorate of Innovation and Business Incubator (DIIB) at Bina Darma University often receives emails from external sources, increasing the risk of phishing, spoofing, and malware threats. This study applies the Digital Forensic Res…
View article: PENGEMBANGAN SISTEM DIGITALISASI ARSIP SURAT DI LINGKUNGAN PUSAT KEUANGAN MABES POLRI SELONG BEBASIS WEBSITE
PENGEMBANGAN SISTEM DIGITALISASI ARSIP SURAT DI LINGKUNGAN PUSAT KEUANGAN MABES POLRI SELONG BEBASIS WEBSITE Open
The conventional letter archiving system still employed by government institutions such as the Financial Center of the National Police Headquarters (Mabes Polri) Selong faces several limitations, including document loss risks, slow retriev…
View article: Sextortion: A continuing mode of cyber crime
Sextortion: A continuing mode of cyber crime Open
Sextortion, a form of cybercrime obvious by the exploitation of intimate pictures or videos for fiscal, sexual, or psychological advantage, has become an rising global threat in the digital age. This crime includes forcing victims into com…
View article: User Behavior Analysis using Browser History and to Support Forensic Investigation
User Behavior Analysis using Browser History and to Support Forensic Investigation Open
In the digital age, browser history data serves as a rich source of behavioral insights, reflecting user preferences, routines, and potential threats. This project, titled User Behavior Analysis using Browser History and to Support Forensi…
View article: Revolutionizing Murder Investigations Through Digital Forensics
Revolutionizing Murder Investigations Through Digital Forensics Open
A B S T R A C T The answer of this question ‘How digital forensics has revolutionized murder investigations in Pakistan?’is given in this research paper. Furthermore, we come to know the role of digital forensics in homicide cases through …
View article: An AI-Enabled Hybrid Cyber-Physical Framework for Adaptive Control in Smart Grids
An AI-Enabled Hybrid Cyber-Physical Framework for Adaptive Control in Smart Grids Open
Smart grids are a fusion of classical power infrastructure and advanced communication networks and smart control, to create a cyber-physical environment that is more efficient and flexible than ever before. This integration causes vulnerab…