Manager, The Cyber Academy
Thuemmler, C. (2017). VDE PP Resiliente Funksysteme RZ Web. https://www.vde.com/de/itg: VDE, Germany
No abstract available.
McKeown, S., Russell, G. & Leimich, P. (in press). Fingerprinting JPEGs with Optimised Huffman Tables. Journal of Digital Forensics, Security and Law. ISSN 1558-7215
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...
McKeown, S., Russell, G., & Leimich, P. (in press). Sub-file Hashing Strategies for Fast Contraband Detection. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018)
Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for man...
The Scottish Informatics & Computer Science Alliance
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
Lecturer in Cybersecurity and Digital Forensics
McKeown, S., Russell, G., & Leimich, P. (in press). Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018)
Cloud based storage is increasing in popularity, with
large volumes of data being stored remotely. Digital forensics
investigators examining such systems remotely are limited ...
McKeown, S., Russell, G. & Leimich, P. (in press). Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and LawISBN not yet known
Paulin, A., & Thuemmler, C. (2016). Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom),, 245-248. doi:10.1109/HealthCom.2016.7749462
— This paper describes the use of the Secure SQL Server system (SecSQL) – a system for dynamic fine-grained access control, in the context of e-Health. The system was used in ...
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for law enforcement agencies, impeding...