SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The International Conference on Digital Security and Forensics (DigitalSec2014)
-
Tracks Inspector: Putting Digital Investigations in the Hands of Investigators
With the pervasiveness of computers and mobile devices, digital forensics becomes more important in law enforcement. Investigators increasingly depend on the scarce support of digital specialists ...Authors: J. Henseler, J. Hofste and A.Post
Year Published: Jun. 2014 | 1-7 | DigitalSec2014 -
Centralized Smart Meter-to-Collector Communications Security
The Traditional Power utilities are gradually moving towards the Smart Grids. These Grids deploy a very large number of smart meters at the consumers’ sites using bi-directional communication ...Authors: Mustafa Saed, Nizar Al Holou and Kevin Daimi
Year Published: Jun. 2014 | 8-14 | DigitalSec2014 -
Practical Issues of Clustering Relatively Small Text Data Sets for Business Purposes
Clustering of relatively small sets of documents has become a frequent task in small business. Current topic modeling and clustering algorithms can handle this task, but there are some ways to ...Authors: Nikita Nikitinsky, Tamara Sokolova and Ekaterina Pshehotskaya
Year Published: Jun. 2014 | 15-22 | DigitalSec2014 -
A Cloud Forensic Readiness Model Using a Botnet as a Service
Cloud forensics has become an inexorable and a transformative discipline in the modern world. The need to share a pool of resources and to extract digital evidence from the same distributed resources ...Authors: Victor R.Kebande, Hein.S.Venter
Year Published: Jun. 2014 | 23-32 | DigitalSec2014 -
Critical Infrastructure Protection
The protection of Critical Infrastructures (CIs) has become one of the most cutting-edge research areas in recent years. There has been considerable effort and expenditure since 9/11 on the ...Authors: George S. Oreku, Joseph E. Mbowe
Year Published: Jun. 2014 | 33-39 | DigitalSec2014 -
Botnets Detection Using Message Sniffing
A botnet is a large number of compromised computers which are used to create and send spam, viruses or a flood of network messages as a distributed denial of service attack for different purposes ...Authors: Walid Al-Ahmad, Ayat Al-Ahmad
Year Published: Jun. 2014 | 40-45 | DigitalSec2014 -
Cryptanalysis of Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
A three-factor authentication combines biometrics information with user password and smart card to provide security-enhanced user authentication. An’s scheme provides more improved user ...Authors: Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung and Dongho Won
Year Published: Jun. 2014 | 46-55 | DigitalSec2014 -
ID-Based Certificateless Electronic Cash on Smart Card against Identity Theft and Financial Card Fraud
Secure electronic payment instruments play an important role in retail electronic commerce. As in most countries, people in Taiwan often use credit cards for payments on Internet shopping. However, ...Authors: Yalin Chen, Jue-Sam Chou
Year Published: Jun. 2014 | 56-67 | DigitalSec2014 -
Critical Phases in Network Forensics - A Review
The fragility nature of digital evidence required an adequate investigation procedure to maintain its admissibility. Thus, a Digital Forensic Investigation (DFI) models and frameworks had been ...Authors: Nik Mariza Nik Abdull Malik, Saadiah Yahya and Mohd Taufik Abdullah
Year Published: Jun. 2014 | 68-75 | DigitalSec2014 -
How Cyber Breeds Crime and Criminals
Understanding how cyber breeds novel crime and new criminals is a contribution to criminological models with significant applied value. It is highly important for law enforcement and particularly ...Authors: Sacha Helfenstein, Pertti Saariluoma
Year Published: Jun. 2014 | 76-90 | DigitalSec2014 -
Near Zero Bitcoin Transaction Fees Cannot Last Forever
Under Bitcoin protocol and payment scheme, anyone can send any amount of bitcoins that he owns to anywhere in the world via internet, near instantly for near zero fees. While the popular ...Authors: Kerem Kaskaloglu
Year Published: Jun. 2014 | 91-99 | DigitalSec2014 -
Detection of a Misuse of Digital Sound Sampling Manifestations, Analysis Methods and Labelling Strategies in Connection with Copyright Infringements
Nowadays, rapid technical progress makes editing and changing music, film and picture recordings much easier, faster and better. Computers with editing software have replaced keyboards, synthesizers ...Authors: Stefan K. Braun
Year Published: Jun. 2014 | 100-109 | DigitalSec2014