Statistical Sampling Approach to Investigate Child Pornography Cases

Conference paper


Sarantinos, N., Al-Nemrat, A. and Naeem, U. 2013. Statistical Sampling Approach to Investigate Child Pornography Cases. 2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC). Sydney NSW, Australia 21 - 22 Nov 2013 IEEE. https://doi.org/10.1109/CTC.2013.14
AuthorsSarantinos, N., Al-Nemrat, A. and Naeem, U.
TypeConference paper
Abstract

One of the pressing issues in cyber crime is to carry out efficient investigation in child pornography cases. The work in this paper presents an in-depth understanding and deployment of statistical analysis methodologies in the field of digital forensic, with the linkage of the MD5 hash value in conducting forensic investigations. More precisely, it highlights the challenges that forensic investigators are facing during an examination, such as the amount or the content of data. Furthermore, the paper presents the margins of forensic software when dealing with large quantities of data, and how the use of statistical analysis assists in reducing the investigation time and improving effectiveness and efficiency.

Year2013
Conference2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC)
PublisherIEEE
Publication dates
Online06 Mar 2014
Publication process dates
Deposited12 May 2021
Journal citationpp. 22-29
Book titleProceedings: Fourth Cybercrime and Trustworthy Computing Workshop: CTC 2013
Book editorGuerrero, J. E.
ISBN978-1-4799-3076-0
Digital Object Identifier (DOI)https://doi.org/10.1109/CTC.2013.14
Copyright holder© 2014 IEEE
Copyright informationAll rights reserved.
Permalink -

https://repository.uel.ac.uk/item/8958v

  • 203
    total views
  • 0
    total downloads
  • 3
    views this month
  • 0
    downloads this month

Export as

Related outputs

The Impact of CISO Appointment Announcements on the Market Value of Firms
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2022. The Impact of CISO Appointment Announcements on the Market Value of Firms. 17th International Conference on Cyber Warfare and Security (ICCWS 2022). Albany, New York, USA 17 - 18 Mar 2022 Academic Conferences International (ACI).
The Impact of Data Breach Announcements on Company Value in European Markets
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2021. The Impact of Data Breach Announcements on Company Value in European Markets. WEIS 2021: The 20th Annual Workshop on the Economics of Information Security. 28 - 29 Jun 2021
The Impact of GDPR Infringement Fines on the Market Value of Firms
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2021. The Impact of GDPR Infringement Fines on the Market Value of Firms. ECCWS 2021- Proceeding of the 20th European Conference on Cyber Warfare and Security. 24 - 25 Jun 2021 Academic Conferences International (ACI). https://doi.org/10.34190/EWS.21.088
Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All
Ebenuwa, S., Sharif, S., Al-Nemrat, A., Al-Bayatti, A. H., Alalwan, N., Alzahrani, A. I. and Alfarraj, O. 2019. Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All. Symmetry. 11 (Art. 1504). https://doi.org/10.3390/sym11121504
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
Uddin, M., Islam, S. and Al-Nemrat, A. 2019. A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control. IEEE Access. 7 (Art. 166676). https://doi.org/10.1109/ACCESS.2019.2947377
Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data
Ebenuwa, S., Sharif, M., Alazab, Mamoun and Al-Nemrat, A. 2019. Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data. IEEE Access. 7, pp. 24649-24666. https://doi.org/10.1109/ACCESS.2019.2899578
Deep Learning Approach for Intelligent Intrusion Detection System
Vinayakumar, R., Alazab, Mamoun, Soman, K. P., Poornachandran, Prabaharan, Al-Nemrat, A. and Venkatraman, Sitalakshmi 2019. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access. 7, pp. 41525-41550. https://doi.org/10.1109/ACCESS.2019.2895334
Tracking Functional Decline using Ambient Intelligence for Alzheimer's Patients
Lee, Sin Wee, Naeem, U., Anthony, Richard, Tawil, A., Azam, Muhammad Awais and Preston, David 2014. Tracking Functional Decline using Ambient Intelligence for Alzheimer's Patients. in: Dogru, Ali H. and Suh, Sang (ed.) Proceedings of the 19th International Conference on Transformative Science and Engineering, Business and Social Innovation Society for Design and Process Science. pp. 107-116
Inference of Activities with Unexpected Actions Using Pattern Mining
Nasreen, Shamila, Azam, Muhammad Awais, Naeem, U. and Ghazanfar, Mustansar Ali 2015. Inference of Activities with Unexpected Actions Using Pattern Mining. in: UbiComp/ISWC'15 Adjunct: Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers Association for Computing Machinery (ACM). pp. 1479-1488
Inference of Hygiene Behaviours While Recognising Activities of Daily Living
Naeem, U., Tawil, Abdel-Rahman, Semelis, Ivans, Judah, Gaby and Aunger, Robert 2015. Inference of Hygiene Behaviours While Recognising Activities of Daily Living. in: Mansoor, Wathiq, Maamar, Zakaria and Rabhi, Fethi (ed.) ICCASA '14: Proceedings of the 3rd International Conference on Context-Aware Systems and Applications ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering). pp. 154-161
Neural Predictors of Gait Stability When Walking Freely in the Real-World.
Pizzamiglio, S., Abdalla, H., Naeem, U. and Turner, D. 2018. Neural Predictors of Gait Stability When Walking Freely in the Real-World. Journal of NeuroEngineering and Rehabilitation. 15 (11). https://doi.org/10.1186/s12984-018-0357-z
Functional Connectivity Evaluation for Infant EEG Signals based on Artificial Neural Network
Sharif, M., Naeem, U., Islam, S. and Karami, A. 2018. Functional Connectivity Evaluation for Infant EEG Signals based on Artificial Neural Network. Arai, Kohei, Kapoor, Supriya and Bhatia, Rahul (ed.) Intelligent Systems Conference (IntelliSys) 2018. London, UK 06 - 07 Sep 2018 Springer, Cham. https://doi.org/10.1007/978-3-030-01057-7_34
The Application of a Semantic-Based Process Mining Framework on a Learning Process Domain
Okoye, Kingsley, Islam, S., Naeem, U., Sharif, M., Azam, Muhammad Awais and Karami, A. 2018. The Application of a Semantic-Based Process Mining Framework on a Learning Process Domain. Arai, Kohei, Kapoor, Supriya and Bhatia, Rahul (ed.) Intelligent Systems Conference (IntelliSys) 2018. London, UK 06 - 07 Sep 2018 Springer, Cham. https://doi.org/10.1007/978-3-030-01054-6_96
Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing
Ehatisham-ul-Haq, Muhammad, Azam, Muhammad Awais, Loo, Jonathan, Shuang, Kai, Islam, S., Naeem, U. and Amin, Yasar 2017. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing. Sensors. 17 (9), p. 2043. https://doi.org/10.3390/s17092043
Identifying Smartphone Users based on their Activity Patterns via Mobile Sensing
Ehatisham-ul-Haq, M., Azam, Muhammad Awais, Naeem, U., Rѐhman, Shafiq Ur and Khalid, Asra 2017. Identifying Smartphone Users based on their Activity Patterns via Mobile Sensing. Procedia Computer Science. 113, pp. 202-209. https://doi.org/10.1016/j.procs.2017.08.349
Taskification – Gamification of Tasks
Naeem, U., Islam, S., Sharif, M., Sudakov, Sergey and Azam, Awais 2017. Taskification – Gamification of Tasks. in: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers Association for Computing Machinery (ACM). pp. 631-634
SignalSense - Towards Quality Service
Islam, S., Sharif, M., Naeem, U. and Geehan, James 2017. SignalSense - Towards Quality Service. in: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers Association for Computing Machinery (ACM). pp. 627-630
CrimeSafe - Helping you stay safe
Islam, S., Naeem, U., Sharif, M. and Dovnarovic, Arnold 2017. CrimeSafe - Helping you stay safe. in: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers Association for Computing Machinery (ACM). pp. 642-645
Neural correlates of single- and dual-task walking in the real world
Pizzamiglio, Sara, Naeem, U., Abdalla, H. and Turner, D. 2017. Neural correlates of single- and dual-task walking in the real world. Frontiers in Human Neuroscience. 11, p. Art 460. https://doi.org/10.3389/fnhum.2017.00460
Content Discovery Advertisements: An Explorative Analysis
Jadhav Balaji, R., Baravalle, Andres, Al-Nemrat, A. and Falcarin, P. 2017. Content Discovery Advertisements: An Explorative Analysis. in: Jahankhani, Hamid, Carlile, Alex, Emmett, David, Hosseinian-Far, Amin, Brown, Guy, Sexton, Graham and Jamal, Arshad (ed.) Global Security, Safety and Sustainability - The Security Challenges of the Connected World Springer Verlag.
Recognizing activities of daily living from patterns and extraction of web knowledge
Ihianle, I., Naeem, U., Tawil, A. and Azam, Muhammad Awais 2016. Recognizing activities of daily living from patterns and extraction of web knowledge. in: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct - UbiComp '16 New York, NY, USA Association for Computing Machinery (ACM). pp. 1255-1262
Using semantic-based approach to manage perspectives of process mining: Application on improving learning process domain data
Kingsley, Okoye, Tawil, Abdel-Rahman H., Naeem, U., Islam, S. and Lamine, Elyes 2017. Using semantic-based approach to manage perspectives of process mining: Application on improving learning process domain data. in: 2016 IEEE International Conference on Big Data (Big Data) IEEE. pp. 3529-3538
Inference Engine Based on a Hierarchical Structure for Detecting Everyday Activities within the Home
Naeem, U., Tawil, A., Semelis, Ivans, Azam, Muhammad Awais and Ghazanfar, Mustansar Ali 2017. Inference Engine Based on a Hierarchical Structure for Detecting Everyday Activities within the Home. in: Bi, Yaxin, Kapoor, Supriya and Bhatia, Rahul (ed.) Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016 Springer, Cham. pp. 969-986
Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment
Tawil, Abdel-Rahman H., Taweel, Adel, Naeem, U., Montebello, Matthew, Bashroush, R. and Al-Nemrat, A. 2014. Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment. Journal of Intelligent Information Systems. 43 (1), pp. 1-32. https://doi.org/10.1007/s10844-013-0300-5
A Semantic Reasoning Method Towards Ontological Model for Automated Learning Analysis
Okoye, Kingsley, Tawil, A., Naeem, U. and Lamine, Elyes 2015. A Semantic Reasoning Method Towards Ontological Model for Automated Learning Analysis. in: Pillay, Nelishia, Engelbrecht, Andries P., Abraham, Ajith, Plessis, Mathys C. du, Snášel, Václav and Muda, Azah Kamilah (ed.) Advances in Nature and Biologically Inspired Computing Cham, Switzerland Springer International Publishing.
A dynamic segmentation based activity discovery through topic modelling
Kennedy, Ihianle Isibor, Naeem, U. and Tawil, A. 2016. A dynamic segmentation based activity discovery through topic modelling. in: IET International Conference on Technologies for Active and Assisted Living (TechAAL) IEEE.
Semantic-Based Model Analysis Towards Enhancing Information Values of Process Mining: Case Study of Learning Process Domain
Okoye, Kingsley, Tawila, Abdel-Rahman H., Naeem, U., Islam, S. and Lamine, Elyes 2017. Semantic-Based Model Analysis Towards Enhancing Information Values of Process Mining: Case Study of Learning Process Domain. in: Abraham, Ajith, Cherukuri, Aswani Kumar, Madureira, Ana Maria and Muda, Azah Kamilah (ed.) Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016) Springer, Cham.
Security countermeasures in the cyber-world
Bendovschi, Andreea and Al-Nemrat, A. 2016. Security countermeasures in the cyber-world. in: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) IEEE. pp. 1-7
Measuring sustainability for an effective Information System audit from public organization perspective
Lope Abdul Rahman, Alifah Aida, Islam, S. and Al-Nemrat, A. 2015. Measuring sustainability for an effective Information System audit from public organization perspective. in: Research Challenges in Information Science (RCIS), 2015 IEEE 9th International Conference on IEEE. pp. 42-51
ARP cache poisoning mitigation and forensics investigation
Mangut, Heman Awang, Al-Nemrat, A., Benzaid, Chafika and Tawil, Abdel-Rahman H. 2015. ARP cache poisoning mitigation and forensics investigation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1392-1397
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation
Al-Nemrat, A. and Benzaid, Chafika 2015. Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1380-1385
Intelligent Detection of MAC Spoofing Attack in 802.11 Network
Benzaid, Chafika, Boulgheraif, Abderrahman, Dahmane, Fatma Zohra, Al-Nemrat, A. and Zeraoulia, Khaled 2016. Intelligent Detection of MAC Spoofing Attack in 802.11 Network. in: Proceedings of the 17th International Conference on Distributed Computing and Networking Association for Computing Machinery (ACM).
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities
Sarantinos, Nikolaos, Benzaid, Chafika, Arabiat, Omar and Al-Nemrat, A. 2017. Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. in: 2016 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1782-1787
A Scalable Malware Classification based on Integrated Static and Dynamic Features
Bounouh, Tewfik, Brahimi, Zakaria, Al-Nemrat, A. and Benzaid, Chafika 2017. A Scalable Malware Classification based on Integrated Static and Dynamic Features. 11th International Conference on Global Security, Safety, and Sustainability (ICGS3) 2017. London, UK 18 - 20 Jan 2017 Springer International Publishing. https://doi.org/10.1007/978-3-319-51064-4_10
High-Frequency Intermuscular Coherence between Arm Muscles during Robot-Mediated Motor Adaptation
Pizzamiglio, Sara, De Lillo, Martina, Naeem, U., Abdalla, Hassan and Turner, D. 2017. High-Frequency Intermuscular Coherence between Arm Muscles during Robot-Mediated Motor Adaptation. Frontiers in Physiology. 7 (668), pp. 1-14. https://doi.org/10.3389/fphys.2016.00668
A Mutlimodal Approach to Measure the Levels Distraction of Pedestrians using Mobile Sensing
Pizzamiglio, S., Naeem, U., ur Réhman, Shafiq, Sharif, M., Abdalla, H. and Turner, D. 2017. A Mutlimodal Approach to Measure the Levels Distraction of Pedestrians using Mobile Sensing. Procedia Computer Science. 113, pp. 89-96. https://doi.org/10.1016/j.procs.2017.08.297
Recognition of Activities of Daily Living from Topic Model
Ihianle, I., Naeem, U. and Tawil, A. 2016. Recognition of Activities of Daily Living from Topic Model. Procedia Computer Science. 98, pp. 24-31. https://doi.org/10.1016/j.procs.2016.09.007
Fast authentication in wireless sensor networks
Benzaid, Chafika, Lounis, Karim, Al-Nemrat, A., Badache, Nadjib and Alazab, Mamoun 2014. Fast authentication in wireless sensor networks. Future Generation Computer Systems. 55, pp. 362-375.
Recognition Framework for Inferring Activities of Daily Living Based on Pattern Mining
Nasreen, Shamila, Azam, Muhammad Awais, Naeem, U., Ghazanfar, Mustansar Ali and Khalid, Asra 2016. Recognition Framework for Inferring Activities of Daily Living Based on Pattern Mining. Arabian Journal for Science and Engineering. 41 (8), pp. 3113-3126. https://doi.org/10.1007/s13369-016-2091-9
Activities of daily life recognition using process representation modelling to support intention analysis
Naeem, U., Bashroush, R., Anthony, Richard, Azam, Muhammad Awais, Tawil, Abdel Rahman, Lee, S. and Mou-Ling, Dennis 2015. Activities of daily life recognition using process representation modelling to support intention analysis. International Journal of Pervasive Computing and Communications. 11 (3), pp. 347-371. https://doi.org/10.1108/IJPCC-01-2015-0002
Novel centroid selection approaches for KMeans-clustering based recommender systems
Zahra, Sobia, Ghazanfar, Mustansar Ali, Khalid, Asra, Azam, Muhammad Awais, Naeem, U. and Prugel-Bennett, Adam 2015. Novel centroid selection approaches for KMeans-clustering based recommender systems. Information Sciences. 320, pp. 156-189.
An Analysis of Honeypot Programs and the Attack Data Collected
Moore, C. and Al-Nemrat, A. 2015. An Analysis of Honeypot Programs and the Attack Data Collected. in: Jahankhani, Hamid, Carlile, Alex, Akhgar, Babak, Taal, Amie, Hessami, Ali G. and Hosseinian-Far, Amin (ed.) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security Springer International Publishing.
Semantic Process Mining Towards Discovery and Enhancement of Learning Model Analysis
Okoye, Kingsley, Tawil, Abdel Rahman H., Naeem, U. and Lamine, Elyes 2015. Semantic Process Mining Towards Discovery and Enhancement of Learning Model Analysis. in: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems IEEE. pp. 363-370
A Semantic Rule-based Approach Supported by Process Mining for Personalised Adaptive Learning
Okoye, Kingsley, Tawil, A., Naeem, U., Bashroush, Rabih and Lamine, Elyes 2014. A Semantic Rule-based Approach Supported by Process Mining for Personalised Adaptive Learning. Procedia Computer Science. 37, pp. 203-210.
Frequent Pattern Mining Algorithms for Finding Associated Frequent Patterns for Data Streams: A Survey
Nasreen, Shamila, Azam, Muhammad Awais, Shehzad, Khurram, Naeem, U. and Ghazanfar, Mustansar Ali 2014. Frequent Pattern Mining Algorithms for Finding Associated Frequent Patterns for Data Streams: A Survey. Procedia Computer Science. 37, pp. 109-116.
A Framework to Recognise Daily Life Activities with Wireless Proximity and Object Usage Data
Azam, M.A., Loo, J., Naeem, U., Khan, S.K.A., Lasebae, A. and Gemikonakli, O. 2012. A Framework to Recognise Daily Life Activities with Wireless Proximity and Object Usage Data. in: Proceedings of 23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communication 2012 IEEE. pp. 590-595
Behavioural Patterns Analysis of Low Entropy People Using Proximity Data
Azam, M.A., Loo, J., Khan, S.K.A., Naeem, U., Adeel, M. and Ejaz, Waleed 2012. Behavioural Patterns Analysis of Low Entropy People Using Proximity Data. Innovative Information Science & Technology Research Group.
A Comparison of Two Hidden Markov Approaches to Task Identification in the Home Environment
Naeem, U. and Bigham, John 2007. A Comparison of Two Hidden Markov Approaches to Task Identification in the Home Environment. Proceedings of the 2nd International Conference on Pervasive Computing and Applications, Birmingham, UK, 2007, pp. 383-388
Recognising Activities of Daily Life Using Hierarchical Plans
Naeem, U., Bigham, John and Wang, Jinfu 2007. Recognising Activities of Daily Life Using Hierarchical Plans. Proceedings of the 2nd European Conference on Smart Sensing and Context, LNCS 4793, Lake District, UK, 2007, pp. 175-189
A Hierarchal Approach to Activity Recognition in the Home Environment based on Object Usage
Naeem, U. and Bigham, John 2008. A Hierarchal Approach to Activity Recognition in the Home Environment based on Object Usage. Proceedings of the 2008 Networking and Electronic Commerce Research Conference (NAEC 2008), Lake Garda, Italy, 2008, pp. 48-54
Recognising Activities of Daily Life through the Usage of Everyday Objects around the Home
Naeem, U. and Bigham, John 2009. Recognising Activities of Daily Life through the Usage of Everyday Objects around the Home. Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare. Technologies to Counter Cognitive Decline Workshop London
Activity Recognition using a Hierarchical Framework
Naeem, U. and Bigham, John 2008. Activity Recognition using a Hierarchical Framework. Proceedings of the 2nd International Conference on Pervasive Computing Technologies for Healthcare, Ambient Technologies for Diagnosing and Monitoring Chronic Patients Workshop, Tampere, Finland, 2008, IEEE pp. 24-27