1,012
Views
1
CrossRef citations to date
0
Altmetric
Articles

An approach to quantifying the plausibility of the inadvertent download defence

&
Pages 28-32 | Received 17 Jun 2016, Accepted 22 Oct 2016, Published online: 16 Dec 2016

References

  • Overill RE, Silomon JAM, Chow KP. A complexity based model for quantifying forensic evidential probabilities. In: Proceedings of the 3rd International Workshop on Digital Forensics; 2010 Feb 15–18; Krakow: IEEE. p. 671–676. doi:10.1109/ARES.2010.42
  • Overill RE, Silomon JAM. A complexity based forensic analysis of the trojan horse defence. In: Proceedings of the 4th International Workshop on Digital Forensics; 2011 Aug 22–26; Vienna, Austria; p. 764–768.
  • Overill RE, Silomon JAM. Uncertainty bounds for digital forensic evidence and hypotheses. In: Proceedings of the 5th International Workshop on Digital Forensics; 2012 Aug 20–24; Prague, Czech Republic. p. 590–595. doi:10.1109/ARES.2012.17
  • Overill RE, Silomon JAM, Chow K-P, et al. Quantitative plausibility of the Trojan horse defence against possession of child pornography. In: Proceedings of the 1st International Conference on Digital Forensics and Investigation; 2012 Sept 21–23; Beijing, China. Available from: http://secmeeting.ihep.ac.cn/Program.htm
  • Overill RE, Silomon JAM, Chow K-P, et al. Effects of motivation and demography on the quantitative plausibility of the Trojan horse defence against possession of child pornography. J Harbin Institute Technol. 2014;21:9–15.
  • George E. UK computer misuse act – the Trojan virus defence. Digital Invest. 2004;1:89.
  • Brenner SW, Carrier B, Henninger J. The Trojan horse defence in cybercrime cases. Santa Clara Computer High Tech Law J. 2004;21:9–61.
  • Carney M, Rogers M. The Trojan made me do it: a first step in statistical based computer forensics event reconstruction. Int J Digital Evidence 2004;2:2.
  • Haagman D, Ghavalas B. Trojan defence: a forensic view. Digital Invest. 2005;2:23–30.
  • Ghavalas B, Philips A. Trojan defence: a forensic view, part II. Digital Invest. 2005;2:133–136.
  • Chow KP, Law YWF, Kwan YKM, et al. The rules of time on NTFS file system.In: Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering. Washington, DC: IEEE Computer Society; 2007. p. 71–85.
  • Law YWF, Chow KP, Lai KYP, et al. Digital child pornography: offender or not offender, in technology for facilitating humanity and combating social deviations: interdisciplinary perspectives In: Martin VM, Garcia-Ruiz MA, Edwards A, editors. Information science reference. Hershey (PA): IGI Global; 2011. Chapter 1.
  • Overill RE, Silomon JAM, Chow K-P, et al. Quantification of Digital Forensic Hypotheses Using Probability Theory. In: Proceedings of the 8th International Workshop on Systematic Approaches to Digital Forensic Engineering; 2013 Nov 21–22; Hong Kong. Washington, DC:IEEE Computer Society. p. 71–75.
  • Bernoulli J. Ars conjectandi: Usum & applicationem praecedentis doctrinae in civilibus. Moralibus & Oeconomicis [The art of conjecturing: Use and application of the previous doctrine to civil. Moral and economic affairs]. 1713. Chapter 4.
  • Johnson NL, Kotz S. Urn models and their application: an approach to modern discrete probability theory. New York (NY): Wiley; 1977. Chapter 2.
  • Mitzenmacher M, Upfal E. Probability and computing: randomized algorithms and probabilistic analysis. Cambridge: Cambridge University Press; 2005, Chapter 3.
  • Clopper CJ, Pearson ES. The use of confidence or fiducial limits illustrated in the case of the binomial. Biometrika. 1934;26:404–413.
  • Fisher RA. Inverse probability. Math Proc Camb Phil Soc. 1930;26:528–535.
  • Fisher RA. Inverse probability and the use of likelihood. Math Proc Camb Phil Soc. 1932;28:257–261.
  • Fisher RA. The concepts of inverse probability and fiducial probability referring to unknown parameters. Proc Roy Soc A. 1933;139:343–348.
  • Pizer SM. Numerical computing and mathematical analysis. Chicago (IL): S.R.A. Inc. 1975. p. 187–190.
  • Jaynes ET. Probability theory: the logic of science. Cambridge: Cambridge University Press; 1995, Chapter 2.
  • Pezzullo JC. JavaStat – exact binomial and Poisson confidence intervals. 2007. Available from: http://statpages.info/confint.html
  • Prat S, Bertsch I, Chudzik L. et al. Developing software to estimate age in child pornography images for forensic purposes. J. Forensic Sci. 2013;58:845–846.
  • de Castro Polastro M, da Silva Eleuterio PM. A statistical approach for identifying videos of child pornography at crime scenes. In: Proceedings of the 7th International Conference on Availability, Reliability & Security (ARES); 2012 Aug 20–24; Prague, Czech Republic. p. 604–612.
  • Steel CMS. The mask-SIFT cascading classifier for pornography detection. In: Proceedings of the 2012 World Congress on Internet Security (WorldCIS-2012); 2012 June 10–12; Guelph: University of Guelph. 139–142.