2010 International Conference on Availability, Reliability and Security 2010
DOI: 10.1109/ares.2010.42
|View full text |Cite
|
Sign up to set email alerts
|

A Complexity Based Model for Quantifying Forensic Evidential Probabilities

Abstract: An operational complexity model (OCM) is proposed to enable the complexity of both the cognitive and the computational components of a process to be determined. From the complexity of formation of a set of traces via a specified route a measure of the probability of that route can be determined. By determining the complexities of alternative routes leading to the formation of the same set of traces, the odds indicating the relative plausibility of the alternative routes can be found. An illustrative applicatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Prosecutions for the possession of illegally downloaded digital material have caused serious problems for both digital forensic examiners and prosecution authorities alike for well over a decade. In previous studies based upon complexity theory [ 1 – 5 ] the plausibility of the Trojan Horse Defence [ 6 10 ] has been analysed. This defence has been successfully employed against prosecutions for the possession of large quantities child pornography (CP) images [ 11 , 12 ], but it also applies to images of terrorist material or espionage-related documents.…”
Section: Introductionmentioning
confidence: 99%
“…Prosecutions for the possession of illegally downloaded digital material have caused serious problems for both digital forensic examiners and prosecution authorities alike for well over a decade. In previous studies based upon complexity theory [ 1 – 5 ] the plausibility of the Trojan Horse Defence [ 6 10 ] has been analysed. This defence has been successfully employed against prosecutions for the possession of large quantities child pornography (CP) images [ 11 , 12 ], but it also applies to images of terrorist material or espionage-related documents.…”
Section: Introductionmentioning
confidence: 99%
“…For example, modifying the system time needs only an email client, and the operation needs simple steps;  L2: The operation needs some time and resource and the OC<10 10 . For example, using telnet command to falsify the email address needs little resources, and the operational step is complex and time-consuming;  L3: The operation needs much more resource and the OC<10 11 . For example, stealing other"s password not only needs many resources but the operational step is more complex and time-consuming.…”
Section: B the Classification Of Strategiesmentioning
confidence: 99%
“…Some of the related works to forensic science involve mathematical and computational methods but the authors do not mentioned specifically its relationship either with DSS concepts or frameworks for DSS [1]- [3]. In the case study presented in this paper, the changes that will be applied are evolving from the Bayesian networks (BN) into Object-oriented Bayesian networks (OOBN).…”
mentioning
confidence: 99%