Novel Strategies to FigHt Child Sexual Exploitation and Human TRafficking Crimes and PrOtect thEir VictimS

    













Novel Strategies to FigHt Child Sexual Exploitation and Human TRafficking Crimes and PrOtect thEir VictimS

Publications


Cyber Threat Modeling Framework

Abstract

The Cyberspace has reshaped the boundaries of the dispute fields used by organizations and governments. Organizational security doctrines and strategies have been adapted to face the evergrowing complexity of cyber threats. Part of the success in surviving in that environment depends on the ability one has to understand the nature of the threats aiming the systems to be protected...


Authors: Renato Carvalho Raposo De Melo, Robson De Oliveira Albuquerque, Fábio Lúcio Lopes De Mendonça.

Conference: 17th Iberian Conference on Information Systems and Technologies (CISTI).

Publication Date: August 2022.

Publisher: IEEE.

Read More

Towards System Security: What a Comparison of National Vulnerability Databases Reveals

Abstract

System vulnerabilities are ubiquitous nowadays. In 2021, millions of cyberattacks exploited system flaws resulting in billions of losses. Despite massive vulnerability databases supported by the USA and China governments, there are still several unknown issues between them. This paper proposes a methodology to compare the National Vulnerability Database (NVD), the China National Vulnerability Database (CNVD), and the China National Vulnerability Database of Information Security (CNNVD)...


Authors: Igor Forain, Robson de Oliveira Albuquerque, Rafael Timóteo de Sousa Júnior.

Conference: 17th Iberian Conference on Information Systems and Technologies (CISTI).

Publication Date: July 2022.

Publisher: IEEE.

Read More

Topic modeling approaches to counter online grooming

Abstract

This paper describes a topic model-based approach for analyzing alarge-scale dataset of chat messages exchanged between the usersof LiveMe, a major social live streaming platform, in the context ofbroadcasts involving sexually explicit content. The analysis revealsthe characteristics of predatory behavior targeting minors and itscriminal dimension in an accessible and explainable manner...


Authors: Nikolaos Lykousas, Constantinos Patsakis.

Conference: WebSci 22: 14th ACM Web Science Conference 2022.

Publication Date: June 2022.

Publisher: Association for Computing Machinery.

Read More

SoK: Cross-border Criminal Investigations and Digital Evidence

Abstract

Digital evidence underpin the majority of crimes as their analysis is an integral part of almost every criminal investigation. Even if we temporarily disregard the numerous challenges in the collection and analysis of digital evidence, the exchange of the evidence among the different stakeholders has many thorny issues. Of specific interest are cross-border criminal investigations as the complexity is significantly high due to the heterogeneity of legal frameworks which beyond time bottlenecks can also become prohibiting...


Authors: Fran Casino, Claudia Pina, Pablo López-Aguilar, Edgar Batista, Agusti Solanas, Constantinos Patsakis.

Journal: Journal of Cybersecurity (Oxford).

Publication Date: May 2022.

Publisher: Oxford Press.

Read More

Natural Language Processing Applied to Forensics Information Extraction With Transformers and Graph Visualization

Abstract

Digital forensics analysis is a slow process mainly due to the large amount and variety of data. Some forensic tools help categorize files by type and allow automatization of tasks, like named entity recognition (NER). NER is a key component in many natural language processing (NLP) applications, such as relation extraction (RE) and information retrieval...


Authors: Fillipe Barros Rodrigues, William Ferreira Giozza, Robson de Oliveira Albuquerque, Luis Javier García Villalba.

Journal: IEEE Transactions on Computational Social Systems.

Publication Date: April 2022.

Publisher: IEEE.

Read More

Sensitivity and uniformity in statistical randomness tests

Abstract

In this paper we propose a new measure of the sensitivity of a statistical test . This can be applied to any of the common statistical batteries (NIST SP 800-22, Dieharder, TestU01, ENT, all FIPS versions, etc.) We will validate its use with the FIPS 140-2 battery. In addition, we will apply this new measure to other statistical tests, including tests of independence and uniformity...


Authors: Elena Almaraz Luengo, Marcos Leiva Cerna, Luis Javier García Villalba, Darren Hurley-Smith, Julio Hernandez-Castro.

Journal: Journal of Information Security and Applications.

Publication Date: April 2022.

Publisher: Elsevier.

Read More

A Model for the Definition, Prioritization and Optimization of Indicators

Abstract

The definition and prioritization of indicators is now a common reality and an integral part of the evolution of the strategic, technical and business processes of any organization, whether public or private. Purpose: This paper proposes a new model regarding the definition and prioritization of indicators. Herein, we also investigate the definition and prioritization models currently adopted by academia and industry, and analyze the context of the proposed strategies against the traditional view of indicator definition currently adopted...


Authors: Frederico Viana Almeida, Edna Dias Canedo, Robson de Oliveira Albuquerque, Flávio Elias Gomes de Deus, Ana Lucila Sandoval Orozco, Luis Javier García Villalba.

Journal: Electronics.

Publication Date: March 2022.

Publisher: MDPI.

Read More

Outcome of sex determination from ulnar and radial ridge densities of Brazilians’ fingerprints: Applying an existing method to a new population

Abstract

Fingerprints do not repeat, varying from region to region on the same fingerprint and from person to person. Using this morphological exclusivity in the individualization of people is considered one of the most reliable methods of identification worldwide. Many populations have been studied with respect to sex determination from fingerprints...


Authors: Daniel da Silva Carvalho, Marcos Martinho Viana de Alecrim, Rafael Timóteo de Sousa Júnior, Luiz Antônio Ribeiro Júnior.

Journal: Science & Justice.

Publication Date: March 2022.

Publisher: Elsevier.

Read More

Sex determination from distal and proximal ridge densities of Brazilians’ fingerprints

Abstract

Fingerprints are one of the most used biometrics to distinguish persons. This fact is based on important characteristics that they present: stability after full development, easy classification of design patterns, noninvasive enrollment, and uniqueness throughout an individual’s lifetime...


Authors: Daniel da Silva Carvalho, Marcos Martinho Viana de Alecrim, Bernardo José Munhoz Lobo, Ramon Santos Fernandez, Alessandro Mendes Soares Evangelista, Clauber Franco Miranda, Luiz Antônio Ribeiro Júnior, Rafael Timóteo de Sousa Júnior.

Journal: Research, Society and development.

Publication Date: March 2022.

Publisher: Rsdjournal.

Read More

Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews

Abstract

Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern cyberattacks is directly related to the complexity of evidence acquisition, which often requires the use of several technologies. To date, researchers have presented many surveys and reviews on the field. However, such articles focused on the advances of each particular domain of digital forensics individually...


Authors: Casino, Fran and Dasaklis, Thomas K and Spathoulas, George and Anagnostopoulos, Marios and Ghosal, Amrita and Borocz, Istvan and Solanas, Agusti and Conti, Mauro Patsakis, Constantinos.

Journal: IEEE Access.

Publication Date: February 2022.

Publisher: IEEE.

Read More

On the effectiveness of binary emulation in malware classification

Abstract

Malware authors continuously evolve their code base to include counter-analysis methods that can significantly hinder their detection and blocking. While malware execution in a sandboxed environment may provide insightful feedback about what the malware does in a machine, anti-virtualisation and hooking evasion methods may allow malware to bypass such detection methods...


Authors: Vouvoutsis, Vasilis, Fran Casino, Constantinos Patsakis.

Journal: Journal of Information Security and Applications.

Publication Date: February 2022.

Publisher: Elsevier.

Read More

On the mechanical properties and fracture patterns of the nonbenzenoid carbon allotrope (biphenylene network): a reactive molecular dynamics study

Abstract

Recently, a new two-dimensional carbon allotrope named biphenylene network (BPN) was experimentally realized. The BPN structure consists of four-, six-, and eight-membered rings of sp2-hybridized carbon atoms. In this work, we carried out fully-atomistic reactive (ReaxFF) molecular dynamics simulations to study the mechanical properties and fracture patterns of non-defective and defective (nanocracks) BPN...


Authors: M. L. Pereira, Júnior; W. F. da Cunha; R. T. de Sousa, Junior; G. D. Amvame Nze; D. S. Galvão; L. A. Ribeiro, Júnior.

Journal: Nanoscale.

Publication Date: Februar 2022.

Publisher: Royal Society of Chemistry.

Read More

REVS: A Vulnerability Ranking Tool for Enterprise Security

Abstract

Information security incidents currently affect organizations worldwide. In 2021, thousands of companies suffered cyber attacks, resulting in billions of dollars in losses. Most of these events result from known vulnerabilities in information assets. However, several heterogeneous databases and sources host information about those flaws, turning the risk assessment difficult. This paper proposes a Recommender Exploitation-Vulnerability System (REVS) with the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) to rank vulnerability-exploit...


Authors: Igor Forain, Robson de Oliveira Albuquerque, Rafael Timóteo de Sousa Júnior.

Conference: In Proceedings of the 24th International Conference on Enterprise Information Systems (ICEIS 2022).

Publication Date: January 2022.

Publisher: ICEIS.

Read More