Table of Contents
Front Matter/Back Matter
Articles
Exploring Deviant Hacker Networks (DHM) on Social Media Platforms
Samer Al-khateeb, Kevin J. Conlan, Nitin Agarwal, Ibrahim Baggili, and Frank Breitinger
Security Analysis of MVhash-B Similarity Hashing
Donghoon Chang, Somitra Sanadhya, and Monika Singh
Log Analysis Using Temporal Logic and Reconstruction Approach: Web Server Case
Murat Gunestas and Zeki Bilgin
Bytewise Approximate Matching: The Good, The Bad, and The Unknown
Vikram S. Harichandran, Frank Breitinger, and Ibrahim Baggili
On Efficiency of Distributed Password Recovery
Radek Hranický, Martin Holkovič, and Petr Matoušek
Towards Syntactic Approximate Matching - A Pre-Processing Experiment
Doowon Jeong, Frank Breitinger, Hari Kang, and Sangjin Lee
Countering Noise-based Splicing Detection Using Noise Density Transfer
Thibault Julliand, Vincent Nozick, and Hugues Talbot
Electronic Voting Service Using Block-Chain
Kibin Lee, Joshua I. James, Tekachew G. Ejeta, and Hyoung J. Kim
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data
Hussam Mohammed, Nathan Clarke, and Fudong Li
Making Sense of Email Addresses on Drives
Neil C. Rowe, Riqui Schwamm, Michael R. McCarrin, and Ralucca Gera
Verification of Recovered Digital Evidence on the Amazon Kindle
Marcus Thompson and Raymond Hansen