
-
Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation
Memory was captured from a system infected by ransomware and its content...
read it
-
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric
Electronic health record (EHR) management systems require the adoption o...
read it
-
Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing
The outbreak of viruses have necessitated contact tracing and infection ...
read it
-
TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies
The growing trend of sharing news/contents, through social media platfor...
read it
-
SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain
The proof-of-work consensus protocol suffers from two main limitations: ...
read it
-
Privacy Preserving Passive DNS
The Domain Name System (DNS) was created to resolve the IP addresses of ...
read it
-
Decentralized Accessibility of e-commerce Products through Blockchain Technology
A distributed and transparent ledger system is considered for various e-...
read it
-
Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting
A substantial administrative burden is placed on healthcare professional...
read it
-
A Distributed Trust Framework for Privacy-Preserving Machine Learning
When training a machine learning model, it is standard procedure for the...
read it
-
Fast Probabilistic Consensus with Weighted Votes
The fast probabilistic consensus (FPC) is a voting consensus protocol th...
read it
-
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
Phishing is considered to be one of the most prevalent cyber-attacks bec...
read it
-
Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction
Bluetooth is a short-range wireless technology that provides audio and d...
read it
-
An authentication protocol based on chaos and zero knowledge proof
Port Knocking is a method for authenticating clients through a closed st...
read it
-
The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime
We increasingly live in a world where there is a balance between the rig...
read it
-
Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge
Malware writers frequently try to hide the activities of their agents wi...
read it
-
Deriving ChaCha20 Key Streams From Targeted Memory Analysis
There can be performance and vulnerability concerns with block ciphers, ...
read it
-
Protocol for Asynchronous, Reliable, Secure and Efficient Consensus (PARSEC) Version 2.0
In this paper we present an open source, fully asynchronous, leaderless ...
read it
-
Machine learning and semantic analysis of in-game chat for cyberbullying
One major problem with cyberbullying research is the lack of data, since...
read it
-
Decrypting live SSH traffic in virtual environments
Decrypting and inspecting encrypted malicious communications may assist ...
read it
-
Privacy Parameter Variation Using RAPPOR on a Malware Dataset
Stricter data protection regulations and the poor application of privacy...
read it
-
A Forensic Audit of the Tor Browser Bundle
The increasing use of encrypted data within file storage and in network ...
read it
-
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier
Insider threats continue to present a major challenge for the informatio...
read it