Mark Scanlon
Orcid: 0000-0002-6581-7164
According to our database1,
Mark Scanlon
authored at least 78 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A comprehensive evaluation on the benefits of context based password cracking for digital forensics.
J. Inf. Secur. Appl., 2024
Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics.
Forensic Sci. Int. Digit. Investig., 2024
Forensic Sci. Int. Digit. Investig., 2024
SoK: Exploring the Potential of Large Language Models for Improving Digital Forensic Investigation Efficiency.
CoRR, 2024
Computer Vision for Multimedia Geolocation in Human Trafficking Investigation: A Systematic Literature Review.
CoRR, 2024
A Digital Forensic Methodology for Encryption Key Recovery from Black-Box IoT Devices.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
A Framework for Integrated Digital Forensic Investigation Employing AutoGen AI Agents.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
2023
Forensic Sci. Int. Digit. Investig., October, 2023
Forensic Sci. Int. Digit. Investig., March, 2023
Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries.
Forensic Sci. Int. Digit. Investig., March, 2023
CoRR, 2023
An Evaluation of AI-Based Network Intrusion Detection in Resource-Constrained Environments.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023
2022
Application of Artificial Intelligence to Network Forensics: Survey, Challenges and Future Directions.
IEEE Access, 2022
IEEE Access, 2022
Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022
2021
A comparative study of support vector machine and neural networks for file type identification using n-gram analysis.
Digit. Investig., 2021
Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis.
Digit. Investig., 2021
How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts.
Digit. Investig., 2021
Digit. Investig., 2021
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
2020
Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection.
Digit. Investig., 2020
Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework.
Digit. Investig., 2020
EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis.
Digit. Investig., 2020
Digit. Investig., 2020
Digit. Investig., 2020
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices.
Digit. Investig., 2019
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics.
Digit. Investig., 2019
Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS.
Digit. Investig., 2019
Improving the accuracy of automated facial age estimation to aid CSEM investigations.
Digit. Investig., 2019
Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
J. Digit. Forensics Secur. Law, 2018
Digit. Investig., 2018
Digital forensic investigation of two-way radio communication equipment and services.
Digit. Investig., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis.
Proceedings of the Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution.
Digit. Investig., 2017
Behavioral Service Graphs: A formal data-driven approach for prompt investigation of enterprise and internet-wide infections.
Digit. Investig., 2017
Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic.
CoRR, 2017
Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies.
CoRR, 2017
Enabling the Remote Acquisition of Digital Forensic Evidence through Secure Data Transmission and Verification.
CoRR, 2017
Increasing digital investigator availability through efficient workflow management and automation.
CoRR, 2017
Integration of Ether Unpacker into Ragpicker for plugin-based Malware Analysis and Identification.
CoRR, 2017
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service.
CoRR, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
2016
Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists.
Digit. Investig., 2016
CoRR, 2016
Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
2015
J. Digit. Forensics Secur. Law, 2015
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps.
CoRR, 2015
Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service.
Comput. Secur., 2015
Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync.
J. Digit. Forensics Secur. Law, 2014
Digit. Investig., 2014
CoRR, 2014
An analysis of BitTorrent cross-swarm peer participation and geolocational distribution.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2011
Int. J. Ambient Comput. Intell., 2011
2009
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009