Mark Scanlon

Orcid: 0000-0002-6581-7164

According to our database1, Mark Scanlon authored at least 78 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A comprehensive evaluation on the benefits of context based password cracking for digital forensics.
J. Inf. Secur. Appl., 2024

Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics.
Forensic Sci. Int. Digit. Investig., 2024

DFRWS EU 10-year review and future directions in Digital Forensic Research.
Forensic Sci. Int. Digit. Investig., 2024

SoK: Exploring the Potential of Large Language Models for Improving Digital Forensic Investigation Efficiency.
CoRR, 2024

Computer Vision for Multimedia Geolocation in Human Trafficking Investigation: A Systematic Literature Review.
CoRR, 2024

Systematic Literature Review of EM-SCA Attacks on Encryption.
CoRR, 2024

A Digital Forensic Methodology for Encryption Key Recovery from Black-Box IoT Devices.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

A Framework for Integrated Digital Forensic Investigation Employing AutoGen AI Agents.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

2023
ChatGPT for digital forensic investigation: The good, the bad, and the unknown.
Forensic Sci. Int. Digit. Investig., October, 2023

Digital forensic investigation in the age of ChatGPT.
Forensic Sci. Int. Digit. Investig., March, 2023

Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries.
Forensic Sci. Int. Digit. Investig., March, 2023

Ensuring Cross-Device Portability of Electromagnetic Side-Channel Analysis.
CoRR, 2023

An Evaluation of AI-Based Network Intrusion Detection in Resource-Constrained Environments.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

2022
Application of Artificial Intelligence to Network Forensics: Survey, Challenges and Future Directions.
IEEE Access, 2022

A Novel Dictionary Generation Methodology for Contextual-Based Password Cracking.
IEEE Access, 2022

Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

2021
A comparative study of support vector machine and neural networks for file type identification using n-gram analysis.
Digit. Investig., 2021

Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis.
Digit. Investig., 2021

How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts.
Digit. Investig., 2021

Vec2UAge: Enhancing underage age estimation performance through facial embeddings.
Digit. Investig., 2021

PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

2020
Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection.
Digit. Investig., 2020

Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework.
Digit. Investig., 2020

EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis.
Digit. Investig., 2020

A survey exploring open source Intelligence for smarter password cracking.
Digit. Investig., 2020

DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation.
Digit. Investig., 2020

Retracing the Flow of the Stream: Investigating Kodi Streaming Services.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices.
Digit. Investig., 2019

A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics.
Digit. Investig., 2019

Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS.
Digit. Investig., 2019

Improving the accuracy of automated facial age estimation to aid CSEM investigations.
Digit. Investig., 2019

Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Hierarchical Bloom Filter Trees for Approximate Matching.
J. Digit. Forensics Secur. Law, 2018

Deep learning at the shallow end: Malware classification for non-domain experts.
Digit. Investig., 2018

Digital forensic investigation of two-way radio communication equipment and services.
Digit. Investig., 2018

Deduplicated Disk Image Evidence Acquisition and Forensically-Sound Reconstruction.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Evaluating Automated Facial Age Estimation Techniques for Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis.
Proceedings of the Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018

Enabling Non-Expert Analysis OF Large Volumes OF Intercepted Network Traffic.
Proceedings of the Advances in Digital Forensics XIV, 2018

Solid State Drive Forensics: Where Do We Stand?
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution.
Digit. Investig., 2017

Behavioral Service Graphs: A formal data-driven approach for prompt investigation of enterprise and internet-wide infections.
Digit. Investig., 2017

Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic.
CoRR, 2017

Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies.
CoRR, 2017

Enabling the Remote Acquisition of Digital Forensic Evidence through Secure Data Transmission and Verification.
CoRR, 2017

Increasing digital investigator availability through efficient workflow management and automation.
CoRR, 2017

Forensic Analysis of Epic Privacy Browser on Windows Operating Systems.
CoRR, 2017

Integration of Ether Unpacker into Ragpicker for plugin-based Malware Analysis and Identification.
CoRR, 2017

Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service.
CoRR, 2017

Privileged Data Within Digital Evidence.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

2016
Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists.
Digit. Investig., 2016

Battling the Digital Forensic Backlog through Data Deduplication.
CoRR, 2016

Current Challenges and Future Research Areas for Digital Forensic Investigation.
CoRR, 2016

Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

2015
Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser.
J. Digit. Forensics Secur. Law, 2015

Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps.
CoRR, 2015

HTML5 Zero Configuration Covert Channels: Security Risks and Challenges.
CoRR, 2015

Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service.
Comput. Secur., 2015

Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Overview of the Forensic Investigation of Cloud Services.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync.
J. Digit. Forensics Secur. Law, 2014

BitTorrent Sync: First Impressions and Digital Forensic Implications.
Digit. Investig., 2014

Digital Evidence Bag Selection for P2P Network Investigation.
CoRR, 2014

The Case for a Collaborative Universal Peer-to-Peer Botnet Investigation Framework.
CoRR, 2014

An analysis of BitTorrent cross-swarm peer participation and geolocational distribution.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

BitTorrent Sync: Network Investigation Methodology.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Universal Peer-to-Peer Network Investigation Framework.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2011
Investigating Cybercrimes that Occur on Documented P2P Networks.
Int. J. Ambient Comput. Intell., 2011

2009
Online Acquisition of Digital Forensic Evidence.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009


  Loading...