Forensic Implication of a Cyber-Enabled Fraud Taking Advantage of an Offline Adversary-in-the-Middle (AiTM) Attack.
D. O. LawalDavid W. GrestyDiane GanT. C. DurojaiyePublished in: MIPRO (2023)
Keyphrases
- cyber crime
- crime investigation
- cyber attacks
- cyber security
- identity theft
- law enforcement
- forensic analysis
- countermeasures
- cyber defense
- real time
- law enforcement agencies
- dos attacks
- digital forensics
- functional dependencies
- intrusion detection
- security policies
- anomaly detection
- document analysis
- fraud detection
- criminal networks
- data mining