Information Retrieval and Cyber Forensics with Data Science

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: 15 December 2024 | Viewed by 1020

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science, Sam Houston State University, 1803 Avenue I., Huntsville, TX 77341, USA
Interests: data mining; computational intelligence; digital forensics; cybersecurity; bioinformatics; computer vision
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science, Sam Houston State University, 1803 Avenue I., Huntsville, TX 77341, USA
Interests: Information security; database security; decision making under uncertainty; soft computing; bayesian decision theory; probabilistic inference; machine learning; data mining; information retrieval; web intelligence; granular computing; cognitive informatics

Special Issue Information

Dear Colleagues,

The rich formats of digital data and the rapid evolution of data science have provided numerous ways to create digital data on the Internet. Unfortunately, advertisers, hackers, criminals, enemies, and terrorists alike create, alter, forge, or manipulate these digital data for their commercial, political, malicious, or illegal purposes, threatening public safety, societal wellbeing, or even national security. For example, adulterated or forged images and videos may be used for propaganda; unauthorized distribution of copyrighted material violates the owner’s rights; and steganography may be used for illicit cover communications, for carrying malware, or to facilitate scamming or phishing schemes, such as the use of AI-assisted face swap and synthesized voices by cyber criminals, etc.

Social networks have become primary venues for digital data communications, providing a wealth of source material for cyber forensics research. Additionally, the social networks’ connectivity patterns, information diffusion, and influence processes, as well as social bots, are of immense interest in the broader study of digital forensics.

Potential topics of interest for this Special Issue include (but are not limited to):

  • Social media forensics;
  • Tampering detection;
  • Multimedia forensics;
  • Cybercrime and fraud analysis;
  • Mobile forensics;
  • Operating systems forensics;
  • Network security;
  • Computer vision;
  • Video surveillance, video search matching, and anomaly detection;
  • Security and privacy in virtual and augmented reality applications and games;
  • Cloud computing security and forensics;
  • Countermeasures to steganography, forgery, covert channels, and other threats to security;
  • Biometrics;
  • Natural language processing;
  • Malware analysis;
  • Big data analysis;
  • Deep learning and applications;
  • Graphic neural network and applications;
  • Biomedical informatics;
  • AI and applications.

Prof. Dr. Qingzhong Liu
Dr. Bing Zhou
Guest Editors

Technical Program Committee Member:

Name: Prof. Yu Zhang
Email: [email protected]
Affiliation: Department of Cybersecurity, Guangdong Polytechnic Normal University, Guangzhou, China
Research Interests: computational intelligence; digital forensics; cybersecurity; malware detection; threat hunting

Name: Dr. Ashar Neyaz
Email: [email protected]
Affiliation: School of Computing and Data Science, Wentworth Institute of Technology, Boston, USA
Research Interests: digital forensics; storage media forensics; mobile forensics; cybersecurity; cryptography; network forensics; operating system forensics  

Manuscript Submission Information

Manuscripts should be submitted online at mdpi.longhoe.net by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • digital forensics
  • data science
  • deep learning
  • AI
  • computer vision
  • biometrics

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

26 pages, 3674 KiB  
Article
StructuredFuzzer: Fuzzing Structured Text-Based Control Logic Applications
by Koffi Anderson Koffi, Vyron Kampourakis, Jia Song, Constantinos Kolias and Robert C. Ivans
Electronics 2024, 13(13), 2475; https://doi.org/10.3390/electronics13132475 - 25 Jun 2024
Viewed by 314
Abstract
Rigorous testing methods are essential for ensuring the security and reliability of industrial controller software. Fuzzing, a technique that automatically discovers software bugs, has also proven effective in finding software vulnerabilities. Unsurprisingly, fuzzing has been applied to a wide range of platforms, including [...] Read more.
Rigorous testing methods are essential for ensuring the security and reliability of industrial controller software. Fuzzing, a technique that automatically discovers software bugs, has also proven effective in finding software vulnerabilities. Unsurprisingly, fuzzing has been applied to a wide range of platforms, including programmable logic controllers (PLCs). However, current approaches, such as coverage-guided evolutionary fuzzing implemented in the popular fuzzer American Fuzzy Lop Plus Plus (AFL++), are often inadequate for finding logical errors and bugs in PLC control logic applications. They primarily target generic programming languages like C/C++, Java, and Python, and do not consider the unique characteristics and behaviors of PLCs, which are often programmed using specialized programming languages like Structured Text (ST). Furthermore, these fuzzers are ill suited to deal with complex input structures encapsulated in ST, as they are not specifically designed to generate appropriate input sequences. This renders the application of traditional fuzzing techniques less efficient on these platforms. To address this issue, this paper presents a fuzzing framework designed explicitly for PLC software to discover logic bugs in applications written in ST specified by the IEC 61131-3 standard. The proposed framework incorporates a custom-tailored PLC runtime and a fuzzer designed for the purpose. We demonstrate its effectiveness by fuzzing a collection of ST programs that were crafted for evaluation purposes. We compare the performance against a popular fuzzer, namely, AFL++. The proposed fuzzing framework demonstrated its capabilities in our experiments, successfully detecting logic bugs in the tested PLC control logic applications written in ST. On average, it was at least 83 times faster than AFL++, and in certain cases, for example, it was more than 23,000 times faster. Full article
(This article belongs to the Special Issue Information Retrieval and Cyber Forensics with Data Science)
30 pages, 1517 KiB  
Article
Interpretability and Transparency of Machine Learning in File Fragment Analysis with Explainable Artificial Intelligence
by Razaq **ad, ABM Islam and Narasimha Shashidhar
Electronics 2024, 13(13), 2438; https://doi.org/10.3390/electronics13132438 - 21 Jun 2024
Viewed by 242
Abstract
Machine learning models are increasingly being used across diverse fields, including file fragment classification. As these models become more prevalent, it is crucial to understand and interpret their decision-making processes to ensure accountability, transparency, and trust. This research investigates the interpretability of four [...] Read more.
Machine learning models are increasingly being used across diverse fields, including file fragment classification. As these models become more prevalent, it is crucial to understand and interpret their decision-making processes to ensure accountability, transparency, and trust. This research investigates the interpretability of four machine learning models used for file fragment classification through the lens of Explainable Artificial Intelligence (XAI) techniques. Specifically, we employ two prominent XAI methods, Shapley Additive Explanations (SHAP) and Local Interpretable Model-Agnostic Explanations (LIME), to shed light on the black-box nature of four machine learning models used for file fragment classification. By conducting a detailed analysis of the SHAP and LIME explanations, we demonstrate the effectiveness of these techniques in improving the interpretability of the models’ decision-making processes. Our analysis reveals that these XAI techniques effectively identify key features influencing each model’s predictions. The results also showed features that were critical to predicting specific classes. The ability to interpret and validate the decisions made by machine learning models in file fragment classification can enhance trust in these models and inform improvements for better accuracy and reliability. Our research highlights the importance of XAI techniques in promoting transparency and accountability in the application of machine learning models across diverse domains. Full article
(This article belongs to the Special Issue Information Retrieval and Cyber Forensics with Data Science)
Show Figures

Figure 1

Back to TopTop