The "Best of 2023" eBook is a comprehensive compilation of the 31 most impactful digital forensics articles published throughout 2023. This expertly curated collection covers a wide range of technical topics, including mobile forensics, ransomware investigations, satellite forensics, UAV analysis, and the use of tools like Autopsy in digital investigations.
Key contributions from leading experts like Paulo Pereira, Kate Libby, Amber Schroader, and Rhonda Johnson ensure valuable insights and practical strategies for both aspiring and experienced investigators. Articles delve into deepfake analysis, innovative AI applications, and other emerging trends in the field.
If you're looking to enhance your skills or explore specialized areas such as Android and iPhone forensics or the complexities of ransomware, this resource is for you. Expand your knowledge with this essential guide to modern digital forensics!
Table of Contents
DIGITAL FORENSICS ANALYSIS IN DEEPFAKE
by CHIRATH DE ALWIS
IMAGING AN ANDROID SMARTPHONE LOGICALLY
by AMBER SCHROADER
UNUSUAL EMAILS: INVESTIGATING
by JEFF MINAKATA
HOW TO BETTER PREPARE FOR A MEMORY FORENSICS INVESTIGATION
by BUNDE COLLINS
IPHONE FORENSICS
by KATE LIBBY
USING NEURAL NETWORKS TO PROTECT SYSTEMS AGAINST PHISHING ATTACK VULNERABILITIES ON IOS PLATFORMS
by RHONDA JOHNSON
ROOTING ANDROIDS FOR FORENSICS
by AMBER SCHROADER
THE HUMAN ELEMENT: AN ANALYSIS OF THE RELATIONSHIPS BETWEEN SOCIAL ENGINEERING AND RANSOMWARE ATTACKS
by SERGIO FIGUEIREDO & FABIANA BOTTON
RANSOMWARE INVESTIGATION: THE NEW CHALLENGES
by PAULO PEREIRA, PHD
SENSORY-BASED DECEPTION ATTACKS TO THWART DRONE FORENSIC INVESTIGATIONS
by RHONDA JOHNSON
RANSOMWARE ATTACKS IN THE USA: STATISTICS DATA ANALYSIS
by PAULO PEREIRA, PHD
RANSOMWARE'S EFFECT ON CRITICAL INFRASTRUCTURE SECURITY
by GREG KIPPER
THE POPULARITY OF RANSOMWARE ATTACKS: UNDERSTANDING WHY HACKERS USE THEM WITH CASE STUDIES
by KALPA KALHARA SAMPATH
RANSOMWARE PHISHING ATTACKS
by JEFF MINAKATA
AI POWERED RANSOMWARE PROTECTION
by KATE LIBBY
CLOUD STORAGE AND CJIS COMPLIANCE IN THE U.S.
by CHRISTOPHER COLLINS
ENGAGING SOCIAL ENGINEERING: EXTRACTING INFORMATION THROUGH STRATEGIC INTERACTIONS
by D4RKR4BB1T47
DOCKER FORENSICS SECRETS WITHIN CONTAINERS
by KATE LIBBY
SAFEGUARDING REMOTE VIDEO IDENTIFICATION: A LOOK AT DRONE CYBERSECURITY
by RHONDA JOHNSON
REMOTE VIDEO IDENTIFICATION
by KATE LIBBY
ENISA VIDEO REMOTE IDENTIFICATION GUIDELINES
by PAULO PEREIRA, PHD
BREAKING WEAK IMPLEMENTATIONS OF VPN ENCRYPTION AND THE ROLE OF ENTROPY LEVELS
by KATE LIBBY
UNRAVELING DIGITAL MYSTERIES: HOW AI COPILOTS CAN REVOLUTIONIZE DIGITAL FORENSIC INVESTIGATIONS
by HANS HENSELER
AI-DRIVEN ANALYSIS IN DIGITAL FORENSICS: UNCOVERING PATTERNS FROM PIXELS
by GREG KIPPER
AUTOPSY 4.21 VERSION
by PAULO PEREIRA, PHD
DIGITAL FORENSIC ANALYSIS USING AUTOPSY 4.21.0
by PAULO PEREIRA, DIFIR
DIGITAL FORENSIC LAB MANAGEMENT MADE EASY WITH MONOLITH
by CHRISTOPHER COLLINS
FORENSICATING THREATS IN THE CLOUD
by CHRIS DOMAN & MATT GEORGY
HISTORY OF RANSOMWARE
by CHIRATH DE ALWIS, NIPUNI SATHSARANI, SANDALI LAVANYA LIYANAARACHCHI, WATHMI SURESHIKA, AHAMED NUSKI
HOW AI AND ML CAN BE USED TO COUNTER RANSOMWARE
by KAVINDU ANJANA GUNASEKARA, BUDDHI NAYANI PERERA, SHAMEEN SAMARAWICKREMA, PUBUDU PRIYANGA LIYANAGE, CHIRATH DE ALWIS
MODERN DETECTION MECHANISMS FOR COUNTERING RANSOMWARE
by K.I. SRIMAL, IROMIKA UDAYAPPRIYA, M.P. NADUN CHATHURANGA, J.L. KAVINDA AKALANKA, CHIRATH DE ALWIS
Reviews
There are no reviews yet.