Learn More
Smart Home is one of emerging application domains of The Internet of things which following the computer and Internet. Although home automation technologies have been commercially available already, they are basically designed for signal-family smart homes with a high cost, and along with the constant growth of digital appliances in smart home, we merge(More)
Academic researchers in digital forensics often lack backgrounds in related laws. This ignorance could make their research and development legally invalid, or with less relevance in practice. To better assist academic researchers, we discuss related laws that regulate the government's investigation and summarize different requirements of acquiring data and(More)
An effective detection algorithm based on the randomness is devised in this paper for stego-webpages with different steganographies. The parts where secret information embedded in a webpage can generally be represented as two states, which can be described in binary code string. The randomness of the states varies a great deal depending on the webpage part(More)
Secret messages can be embedded in a webpage by switching the uppercase-lowercase states of letters in tags. In this paper, a novel steganalytic approach called Tag-Mismatch analysis for detection of hidden information embedded in tags is presented. In order to guarantee reasonable false positive and false negative, the approach is firstly trained on a set(More)
We consider the problem of jointly describing extreme events at a multitude of locations, which presents paramount importance in catastrophes forecast and risk management. Specifically, a novel Ensemble-of-Latent-Trees of Pairwise Copula (ELTPC) model is proposed. In this model, the spatial dependence is captured by latent trees expressed by pairwise(More)
With the development of steganalysis, steganalysis- proof ability of steganography is becoming more and more important. The evaluation for steganalysis-proof ability of steganographic algorithms can provide theoretical foundation and promote the development of steganalysis-proof ability of steganographic algorithms. This paper proposes an evaluation scheme(More)
Cyber criminals may abuse open wireless networks or those with weak encryption for cyber crimes. Assume surveillance has identified suspect traffic such as child porn downloading traffic on the Internet. To locate such criminals, law enforcement has to first identify which mobile (MAC) is generating suspect traffic behind a wireless router. The challenge is(More)
Digital forensics is the science of laws and technologies fighting computer crimes. It can be divided into two sub-areas, computer forensics and network forensics. Network forensics is still a frontier area of digital forensics and is the focus of this paper. We propose to classify network forensic investigations into three categories based on when law(More)
  • 1