Destination: Red Apple

Batuhan Dilek
Tampere University
Tampere / Finland
batuhan.dilek@tuni.fi
batuhandlek@gmail.com

Abstract

This paper investigates the techniques and challenges of digital forensics and cybercrime investigations. All harmful behavior which is directly or indirectly related to computer are called cybercrime [1]. Nowadays, most of the crime involves computer systems. Therefore, the demand for cybercrime investigations is going up. All crimes are a subject to an investigation. Cybercrimes are no exception. Incorporating results from research papers, webpages and open-source resources, this paper shows the meaning of cybercrime and it’s categories, moreover, it mentions about the techniques and challenges for the digital forensics and cybercrime investigations.

Keywords-cybercrime, crime, cyber investigation, investigation, digital forensics, static analysis, live analysis

Read More
post @ 2024-01-14

What is Buffer Overflow?

Read More
post @ 2024-01-04
Read More
post @ 2023-12-10

Symmetrical Disguise : Hybrid Homomorphic Encryption

The primary objective of this project is to implement Hybrid Homomorphic Encryption and
replicate the results of a research paper: “Symmetrical Disguise: Realizing Homomorphic
Encryption Services from Symmetric Primitives
(extended version)
“. This involves developing
a practical system that mirrors the outlined evaluations, contributing to a deeper understanding
of the theoretical concepts and demonstrating the real-world applicability of Hybrid
Homomorphic Encryption. The focus is on bridging the gap between academic theory and
practical implementation, shedding light on potential challenges and optimizations in the
process.

Read More
⬆︎TOP