Special Issue on New, Modern and Advanced Digital Forensic Techniques
• 大类 : 工程技术 - 2区
• 小类 : 计算机：理论方法 - 2区
A digital forensic operation is a technological inspection, acquisition, and examination of digital media and their contents using forensic equipment and special software tools. The objective is to locate, identify, collect and acquire data which may be relevant to an investigation, and may be used as evidence in administrative, disciplinary and judicial procedures. The stages of the digital forensics process require differing specialist training and knowledge. Nowadays there is not a universally accepted process model for digital forensics.
A Digital Forensic branch such as Multimedia Forensics (MF) which deals with the recovery of information can be directly used to measure the trustworthiness of digital multimedia content is nowadays an important area of study because digital multimedia contents (images, audio, video, ...) now play an important role as evidence in a trial. That is why becomes important to analyze and decide if a multimedia content is original and has no modification on it in order to use as evidence in court. Another factor to take in count around any digital forensic tool is the right way to maintain the chain of custody of any kind of digital evidence on it.
Traditional tools may be used in typical cybercrime investigation, but these will not be sufficient or suitable for use in cases of sophisticated cybercrime.
Based on this motivation, this Special Issue invites researchers in all related fields (including but not limited to digital forensics, cyber security, machine learning, pattern recognition, malware forensics, etc.) to join us in a quest for solutions to solve actual and possible future problems on digital forensics. The potential topics of interest of this Special Issue are listed below. Submissions can contemplate original research, serious dataset collection and benchmarking, or critical surveys.
This special issue is focused on cutting-edge research from both academia and industry, with a particular emphasis on novel techniques. Only technical papers describing previously unpublished, original, state-of-the-art research, and not currently under review by a conference or a journal will be considered. We will recommend submission of multimedia with each paper as it significantly increases the visibility, downloads, and citations of articles.
Potential topics include, but are not limited to:
- Antiforensics and anti-antiforensics approaches
- Automated and intelligent methods for adversary profiling
- Automated and smart tools for collection, preservation and analysis of digital evidences
- Behavior of cyber criminals on compromised systems
- Big data and digital forensics
- Data loss prevention after crypto ransomware attack
- Detection of data exfiltration using steganography
- Digital forensic triage
- Digital forensics on mobile devices
- Early detection of ransomware threats
- Forensic analysis of malware
- Human aspects of information security
- Improving security awareness
- Intelligent analysis of different types of data collected from different layers of network security solutions
- Intelligent forensics tools
- Intelligent forensics tools, techniques and procedures for cloud, mobile and data-centre forensics
- Malware and targeted attacks including analysis and attribution
- Malware honey pots
- Mobile application and mobile cloud application security and digital forensics
- Modern forensic tools
- Modern Multimedia forensic
- New and improved digital forensic techniques
- Novel machine and deep learning forensics approach
- Techniques and procedures for analysis of fileless and modern malware