Publications News Archive

Summary: Internet of Things (IoT) is one of the greatest technology revolutions in the history. Due to IoT potential, daily objects will be consciously worked in harmony with optimized performances. However, today, technology is not ready to fully bring its power to our daily life because of huge data analysis requirements in instant time. On

Summary: Digital forensic investigation requires the investigator to examine the forensic image of the seized storage media or device. The investigator gets full access to all the data contained in the forensic image including the suspect’s private or sensitive data that may be entirely unrelated to the given case. The unrestricted access to the forensic

Summary: The search providers track the user’s browsing behavior to construct his or her activity profile. The tracking helps the search engines to fine-tune the results and presenting user-specific advertising. When a search input matches with some commercial product or service offering, ads based on the previously saved interests, likes, and dislikes are displayed. The

Summary: Learn how to use AccessData’s Forensic Toolkit (FTK) while mastering the fundamentals of digital forensics: Digital Forensics with the AccessData Forensic Toolkit (FTK) provides a comprehensive review of essential digital forensics concepts and builds on this information to teach you how to conduct digital investigations with AccessData’s FTK―the industry-standard, court-accepted digital investigations platform. Part I

Summary: Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can

Summary: Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security

Summary: As a popular routing protocol in wireless sensor networks (WSNs), greedy routing has received great attention. The previous works characterize its data deliverability in WSNs by the probability of all nodes successfully sending their data to the base station. Their analysis, however, neither provides the information of the quantitative relation between successful data delivery

Summary: Dynamic link library (DLL) injection is a method of forcing a running process to load a DLL into its address space. Malware authors use DLL injection to hide their code while it executes on a system. Due to the large number and variety of DLLs in modern Windows systems, distinguishing a malicious DLL from

Summary: Digital forensic investigators can take advantage of tools and techniques that have the capability of finding similar files out of thousands of files up for investigation in a particular case. Finding similar files could significantly reduce the volume of data that needs to be investigated. Sdhash is a well-known fuzzy hashing scheme used for

Summary: Many institutions today are interested in starting cyber-security programs. It is one of the hottest topics out there, and an increasing number of students are interested in studying cyber-security. This paper describes a recipe that can be used to build a successful cyber-security program, either from scratch or from a minimal capability that already