© Springer International Publishing AG 2018. Child Pornography is an increasingly visible rising cybercrime in the world today. Over the past decade, with rapid growth in smart phone usage, readily available free Cloud Computing storage, and various mobile communication apps, child pornographers have found a convenient and reliable mobile platform for instantly sharing pictures or videos of children being sexually abused. Within this new paradigm, law enforcement officers are finding that detecting, gathering, and processing evidence for the prosecution of child pornographers is becoming increasingly challenging. Deep learning is a machine learning method that models high-level abstractions in data and extracts hierarchical representations ...
Copyright © 2020, IGI Global. The Internet of Things (IoT) represents the seamless merging of the re...
Call record analysis is the most critical task for the Law Enforcement Agencies (LEAs) in a cyber-in...
With the move toward mobile computing being the trend of this technology era it is clear that our wa...
© 2015 IEEE. The utility of Behavioural Evidence Analysis (BEA) has gained attention in the field of...
Detecting criminal activity online is not a new concept but how it can occur is changing. Technology...
The smart phones are used worldwide due to their enhanced features, computing capabilities, increase...
Collecting digital devices in a forensically sound manner is becoming more critical since 80% of all...
© 2016 IEEE. Cyber-Attacks are on the rise due to the increased usage of social networking applicati...
This chapter presents the central theme and a big picture of the methods and technologies covered in...
Society\u27s increasing reliance on technology, fueled by a growing desire for increased connectivit...
© 2016 IEEE. With the emergence of smartphones and the widespread use of social media services, dist...
© 2017 Elsevier Ltd Previous studies examining the investigative challenges and needs of Digital For...
Cyber criminals exploit opportunities for anonymity and masquerade in web-based communication to con...
© 2013 IEEE. Instant Messaging (IM) is one of the most used types of applications across all digital...
Copyright © 2020, IGI Global. The Internet of Things (IoT) represents the seamless merging of the re...
Call record analysis is the most critical task for the Law Enforcement Agencies (LEAs) in a cyber-in...
With the move toward mobile computing being the trend of this technology era it is clear that our wa...
© 2015 IEEE. The utility of Behavioural Evidence Analysis (BEA) has gained attention in the field of...
Detecting criminal activity online is not a new concept but how it can occur is changing. Technology...
The smart phones are used worldwide due to their enhanced features, computing capabilities, increase...
Collecting digital devices in a forensically sound manner is becoming more critical since 80% of all...
© 2016 IEEE. Cyber-Attacks are on the rise due to the increased usage of social networking applicati...
This chapter presents the central theme and a big picture of the methods and technologies covered in...
Society\u27s increasing reliance on technology, fueled by a growing desire for increased connectivit...
© 2016 IEEE. With the emergence of smartphones and the widespread use of social media services, dist...
© 2017 Elsevier Ltd Previous studies examining the investigative challenges and needs of Digital For...
Cyber criminals exploit opportunities for anonymity and masquerade in web-based communication to con...
© 2013 IEEE. Instant Messaging (IM) is one of the most used types of applications across all digital...
Copyright © 2020, IGI Global. The Internet of Things (IoT) represents the seamless merging of the re...
Call record analysis is the most critical task for the Law Enforcement Agencies (LEAs) in a cyber-in...
With the move toward mobile computing being the trend of this technology era it is clear that our wa...