no code implementations • 29 Feb 2024 • Akila Wickramasekara, Frank Breitinger, Mark Scanlon
The growing number of cases requiring digital forensic analysis raises concerns about law enforcement's ability to conduct investigations promptly.
no code implementations • 23 Feb 2024 • Opeyemi Bamigbade, John Sheppard, Mark Scanlon
This systematic literature review thoroughly examines the state-of-the-art leveraging computer vision techniques for multimedia geolocation and assesses their potential to expedite human trafficking investigation.
1 code implementation • 10 Jul 2023 • Mark Scanlon, Frank Breitinger, Christopher Hargreaves, Jan-Niclas Hilgert, John Sheppard
The disruptive application of ChatGPT (GPT-3. 5, GPT-4) to a variety of domains has become a topic of much discussion in the scientific community and society at large.
no code implementations • 2 Dec 2020 • Felix Anda, Brett A. Becker, David Lillis, Nhien-An Le-Khac, Mark Scanlon
Swift response to the detection of endangered minors is an ongoing concern for law enforcement.
no code implementations • 2 Dec 2020 • Xiaoyu Du, Chris Hargreaves, John Sheppard, Felix Anda, Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon
Multi-year digital forensic backlogs have become commonplace in law enforcement agencies throughout the globe.
no code implementations • 2 Dec 2020 • Xiaoyu Du, Quan Le, Mark Scanlon
This is due to an ever-growing number of cases requiring digital forensic investigation coupled with the growing volume of data to be processed per case.
no code implementations • 2 Jul 2019 • Xiaoyu Du, Mark Scanlon
In this paper, a methodology for the automatic prioritisation of suspicious file artefacts (i. e., file artefacts that are pertinent to the investigation) is proposed to reduce the manual analysis effort required.
no code implementations • 2 Jul 2019 • Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon
Achieving high performance for facial age estimation with subjects in the borderline between adulthood and non-adulthood has always been a challenge.
no code implementations • 18 Mar 2019 • Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon
EM side-channel analysis is a technique where unintentional electromagnetic emissions are used for eavesdropping on the operations and data handling of computing devices.
Cryptography and Security General Literature
1 code implementation • 22 Jul 2018 • Quan Le, Oisín Boydell, Brian Mac Namee, Mark Scanlon
Current malware detection and classification approaches generally rely on time consuming and knowledge intensive processes to extract patterns (signatures) and behaviors from malware, which are then used for identification.
Ranked #1 on Malware Classification on Microsoft Malware Classification Challenge (F1 score (5-fold) metric)
no code implementations • 22 Jul 2018 • Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac
To date, there is little research on the digital traces in modern radio communication equipment.
Cryptography and Security Computers and Society