https://aseestant.ceon.rs/index.php/jcfs/issue/feed Journal of Computer and Forensic Sciences 2023-07-13T14:52:08+02:00 Nemanja Vučković comput.forensic.sci@kpu.edu.rs SCIndeks Assistant <p class="MsoNormal" style="margin-bottom: 4.3pt; text-align: justify;"><span style="font-size: 11.0pt; font-family: 'Times New Roman','serif';">The Journal of Computer and Forensic Sciences is an open access, peer-reviewed scientific journal published by the University of Criminal Investigation and Police Studies in Belgrade, covering advanced and innovative research across the fields of computer and forensic sciences. The aim of the journal is to provide a platform through which authors can communicate their viewpoints on diverse but often related aspects of computer and forensic sciences and a source of information to support advancing research, education, and practice in these fields.</span></p> <p>&nbsp;</p> <p>&nbsp;</p> https://aseestant.ceon.rs/index.php/jcfs/article/view/44362 A verifiable model of a minimal market operating sequentially, with price and time discrete 2023-07-13T14:52:07+02:00 Dragiša Žunić dragisa.zunic@ivi.ac.rs <p class="MDPI17abstract" style="margin-left: 0in;"><span style="font-size: 10.0pt; font-family: 'Times New Roman','serif';">This research presents a minimal computational market model, i.e.,a model of a trading venue, with sequential order matching, in a declarative style, and proceeds to demonstrate how some fundamental properties can be formally proved. It is a challenging task to formally certify properties for a fundamental system in any realm of human endeavor, especially for systems with infinite state space. With the recent development of theoretical frameworks based on formal logic, it is now possible (albeit very difficult) to both formalize and reason about an object system in the same language. This research derives from the previous research presented in [1], and represents a simplification to obtain a minimal model. The computational model of a minimal market, presented here in a declarative style, is of importance from the perspective of both market design and verification.</span></p> <p>&nbsp;</p> <p>&nbsp;</p> 2023-06-19T00:00:00+02:00 Copyright (c) 2023 Journal of Computer and Forensic Sciences https://aseestant.ceon.rs/index.php/jcfs/article/view/45100 Speech Enhancement by CycleGAN Using Feature Map Regularization 2023-07-13T14:52:07+02:00 Branislav Popović branislav.popovic@live.com <p><span style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-fareast-font-family: 'Noto Serif CJK SC'; mso-bidi-font-family: 'Lohit Devanagari'; mso-font-kerning: 1.5pt; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: HI;">Highly promising speech enhancement results are recently obtained using an unsupervised CycleGAN approach, comparable to paired dataset neural network approach. However, very often, only a limited amount of noisy speech data is available. Therefore, a semi-supervised CycleGAN approach has been proposed, relying on augmented data samples. Another feature map regularized CycleGAN approach has also been proposed and applied in an image-style translation task, obtaining significant improvements on several standard databases. The feature map regularized CycleGAN approach is combined with the aforementioned semi-supervised learning approach and applied within a speech enhancement task. Significant improvements are obtained in terms of several standard measures using the proposed algorithm in comparison with the baseline algorithm as well as the augmented CycleGAN approach.</span></p> 2023-07-13T00:00:00+02:00 Copyright (c) 2023 University of Criminal Investigation and Police Studies, Belgrade, Serbia https://aseestant.ceon.rs/index.php/jcfs/article/view/44736 iThrust News Certificate: A Blockchain-Based Solution for News Verification and Reputation Management 2023-07-13T14:52:07+02:00 Aleksandar Miljkovic aleksandar.miljkovic@mup.gov.rs Milan Cabarkapa mcabarkapa@kg.ac.rs Filip Miljkovic filip.miljkovic@mup.gov.rs Ljubisa Bojic ljubisa.bojic@instifdt.bg.ac.rs <p><span lang="EN-US" style="font-size: 10pt; font-family: 'Times New Roman', serif;">The proliferation of fake news and misinformation in the digital era poses a significant challenge to news organizations and content creators. In this paper, we introduce iThrust News Certificate, the architecture of an online blockchain-based solution designed to combat fake news, enhance news verification, and maintain reputation within the media ecosystem. Unlike previous attempts, iThrust News Certificate focuses on user-friendly features while ensuring transparency and reliability.</span></p> 2023-07-07T00:00:00+02:00 Copyright (c) 2023 University of Criminal Investigation and Police Studies, Belgrade, Serbia https://aseestant.ceon.rs/index.php/jcfs/article/view/44741 A system architecture for preventing social engineering attacks via e-mail 2023-07-13T14:52:07+02:00 Milan Brkić milan.brkic@mup.gov.rs <p>&nbsp;</p> <p style="line-height: 0.18in; margin-top: 0.17in; margin-bottom: 0in;" align="justify">&nbsp;</p> <p style="line-height: 100%; margin-bottom: 0in;" align="justify"><span style="font-family: Times New Roman, serif;"><span style="font-size: small;"><span lang="sr-RS">Modern business and the expansion of Internet technology have caused a great growth in communication via electronic mail. Bearing in mind that the weakest link of any system is the person himself, it is precisely in this part of the system that the greatest danger of unauthorized access to ICT resources is recognized</span></span></span><span style="font-family: Times New Roman, serif;"><span style="font-size: small;">[6]</span></span><span style="font-family: Times New Roman, serif;"><span style="font-size: small;"><span lang="sr-RS">. For this reason, the greatest attention regarding the protection of ICT systems should be focused on the users themselves and preventive response to phishing campaigns as the most common form of cyber attack. This paper will present the system architecture for preventive response to phishing campaigns. The architecture itself, which will be explained in more detail later in the text, consists of several different modules integrated into a whole. First, a sender analysis module, which would be based on the blacklist principle. Next, an email attachment analysis module, which would perform the functions of static and dynamic analysis of potentially malicious attachments. A link analysis module, which would include the application of CORTEX, an open source intelligence service, and finally, a text analysis module, based on statistical models.</span></span></span></p> <p style="line-height: 100%; margin-bottom: 0in;"><span style="font-size: small;"><span lang="sr-RS"><strong>Keywords</strong></span></span><span style="font-size: small;"><span lang="sr-RS">: phishing, Cortex; analysis, cyber attack</span></span></p> <p></p> 2023-07-13T00:00:00+02:00 Copyright (c) 2023 University of Criminal Investigation and Police Studies, Belgrade, Serbia https://aseestant.ceon.rs/index.php/jcfs/article/view/45169 An Application of Machine Learning Methods for Anomaly Detection in Internet Advertising 2023-07-13T14:52:07+02:00 Marko Živanović markozivanovic998@gmail.com Svetlana Štrbac-Savić svetlana.strbac@viser.edu.rs Zlatogor Minchev zlatogor@bas.bg <p><span style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-fareast-font-family: 'Noto Serif CJK SC'; mso-bidi-font-family: 'Lohit Devanagari'; mso-font-kerning: 1.5pt; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: HI;">This research deals certain issues regarding downloading data from the Internet, i.e. Internet page advertising, and certain mechanisms to take care of the integrity of the data that is put into the dedicated processing context afterwards. The work also relates to e-commerce as well as to the economy in general, as some advertising scenarios provide high error-rates with pricing, which may be unacceptable in various scenarios, such as renting or selling a home. This paper presents a brief overview of the outlier detection methods and machine learning-based classifiers which are used to determine the number of anomalies in the analyzed dataset. This work contributes to the operation of the organizations which are dealing with data accuracy and integrity, such as home renting or selling agencies.</span></p> 2023-07-07T00:00:00+02:00 Copyright (c) 2023 University of Criminal Investigation and Police Studies, Belgrade, Serbia