Journal of Computer and Forensic Sciences https://aseestant.ceon.rs/index.php/jcfs <p class="MsoNormal" style="margin-bottom: 4.3pt; text-align: justify;"><span style="font-size: 11.0pt; font-family: 'Times New Roman','serif';">The Journal of Computer and Forensic Sciences is an open access, peer-reviewed scientific journal published by the University of Criminal Investigation and Police Studies in Belgrade, covering advanced and innovative research across the fields of computer and forensic sciences. The aim of the journal is to provide a platform through which authors can communicate their viewpoints on diverse but often related aspects of computer and forensic sciences and a source of information to support advancing research, education, and practice in these fields.</span></p> <p>&nbsp;</p> <p>&nbsp;</p> en-US <p>I (we), the author(s), hereby declare under full moral, financial and criminal liability that the manuscript submitted for publication to the Journal of Computer and Forensic Sciences</p> <p>a) is the result of my (our) own original research and that I (we) hold the right to publish it;</p> <p>b) does not infringe any copyright or other third-party proprietary rights;</p> <p>c) complies with the Journal&rsquo;s research and publishing ethics standards;</p> <p>d) has not been published elsewhere, under this or any other title;</p> <p>e) is not under consideration by another publication, under this or any other title.</p> <p>I (we) also declare under full moral, financial and criminal liability:</p> <p>f) that all conflicts of interest that may directly or potentially influence or impart bias on the work have been disclosed in the manuscript;</p> <p>g) that if the article has been accepted for publishing I (we) will transfer all copyright ownership of the manuscript to the University of Criminal Investigation and Police Studies in Belgrade.</p> <p><span style="color: #1d2228; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;">Signed by the Corresponding Author on behalf of the all other authors.</span></p> <p>&nbsp;</p> <p>&nbsp;</p> <p>&nbsp;</p> comput.forensic.sci@kpu.edu.rs (Nemanja Vučković) comput.forensic.sci@kpu.edu.rs (Nemanja Vučković) Thu, 13 Jul 2023 14:52:08 +0200 OJS 3.1.2.0 http://blogs.law.harvard.edu/tech/rss 60 A verifiable model of a minimal market operating sequentially, with price and time discrete https://aseestant.ceon.rs/index.php/jcfs/article/view/44362 <p class="MDPI17abstract" style="margin-left: 0in;"><span style="font-size: 10.0pt; font-family: 'Times New Roman','serif';">This research presents a minimal computational market model, i.e.,a model of a trading venue, with sequential order matching, in a declarative style, and proceeds to demonstrate how some fundamental properties can be formally proved. It is a challenging task to formally certify properties for a fundamental system in any realm of human endeavor, especially for systems with infinite state space. With the recent development of theoretical frameworks based on formal logic, it is now possible (albeit very difficult) to both formalize and reason about an object system in the same language. This research derives from the previous research presented in [1], and represents a simplification to obtain a minimal model. The computational model of a minimal market, presented here in a declarative style, is of importance from the perspective of both market design and verification.</span></p> <p>&nbsp;</p> <p>&nbsp;</p> Dragiša Žunić Copyright (c) 2023 Journal of Computer and Forensic Sciences https://aseestant.ceon.rs/index.php/jcfs/article/view/44362 Mon, 19 Jun 2023 00:00:00 +0200 Speech Enhancement by CycleGAN Using Feature Map Regularization https://aseestant.ceon.rs/index.php/jcfs/article/view/45100 <p><span style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-fareast-font-family: 'Noto Serif CJK SC'; mso-bidi-font-family: 'Lohit Devanagari'; mso-font-kerning: 1.5pt; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: HI;">Highly promising speech enhancement results are recently obtained using an unsupervised CycleGAN approach, comparable to paired dataset neural network approach. However, very often, only a limited amount of noisy speech data is available. Therefore, a semi-supervised CycleGAN approach has been proposed, relying on augmented data samples. Another feature map regularized CycleGAN approach has also been proposed and applied in an image-style translation task, obtaining significant improvements on several standard databases. The feature map regularized CycleGAN approach is combined with the aforementioned semi-supervised learning approach and applied within a speech enhancement task. Significant improvements are obtained in terms of several standard measures using the proposed algorithm in comparison with the baseline algorithm as well as the augmented CycleGAN approach.</span></p> Branislav Popović Copyright (c) 2023 University of Criminal Investigation and Police Studies, Belgrade, Serbia https://aseestant.ceon.rs/index.php/jcfs/article/view/45100 Thu, 13 Jul 2023 00:00:00 +0200 iThrust News Certificate: A Blockchain-Based Solution for News Verification and Reputation Management https://aseestant.ceon.rs/index.php/jcfs/article/view/44736 <p><span lang="EN-US" style="font-size: 10pt; font-family: 'Times New Roman', serif;">The proliferation of fake news and misinformation in the digital era poses a significant challenge to news organizations and content creators. In this paper, we introduce iThrust News Certificate, the architecture of an online blockchain-based solution designed to combat fake news, enhance news verification, and maintain reputation within the media ecosystem. Unlike previous attempts, iThrust News Certificate focuses on user-friendly features while ensuring transparency and reliability.</span></p> Aleksandar Miljkovic, Milan Cabarkapa, Filip Miljkovic, Ljubisa Bojic Copyright (c) 2023 University of Criminal Investigation and Police Studies, Belgrade, Serbia https://aseestant.ceon.rs/index.php/jcfs/article/view/44736 Fri, 07 Jul 2023 00:00:00 +0200 A system architecture for preventing social engineering attacks via e-mail https://aseestant.ceon.rs/index.php/jcfs/article/view/44741 <p>&nbsp;</p> <p style="line-height: 0.18in; margin-top: 0.17in; margin-bottom: 0in;" align="justify">&nbsp;</p> <p style="line-height: 100%; margin-bottom: 0in;" align="justify"><span style="font-family: Times New Roman, serif;"><span style="font-size: small;"><span lang="sr-RS">Modern business and the expansion of Internet technology have caused a great growth in communication via electronic mail. Bearing in mind that the weakest link of any system is the person himself, it is precisely in this part of the system that the greatest danger of unauthorized access to ICT resources is recognized</span></span></span><span style="font-family: Times New Roman, serif;"><span style="font-size: small;">[6]</span></span><span style="font-family: Times New Roman, serif;"><span style="font-size: small;"><span lang="sr-RS">. For this reason, the greatest attention regarding the protection of ICT systems should be focused on the users themselves and preventive response to phishing campaigns as the most common form of cyber attack. This paper will present the system architecture for preventive response to phishing campaigns. The architecture itself, which will be explained in more detail later in the text, consists of several different modules integrated into a whole. First, a sender analysis module, which would be based on the blacklist principle. Next, an email attachment analysis module, which would perform the functions of static and dynamic analysis of potentially malicious attachments. A link analysis module, which would include the application of CORTEX, an open source intelligence service, and finally, a text analysis module, based on statistical models.</span></span></span></p> <p style="line-height: 100%; margin-bottom: 0in;"><span style="font-size: small;"><span lang="sr-RS"><strong>Keywords</strong></span></span><span style="font-size: small;"><span lang="sr-RS">: phishing, Cortex; analysis, cyber attack</span></span></p> <p></p> Milan Brkić Copyright (c) 2023 University of Criminal Investigation and Police Studies, Belgrade, Serbia https://aseestant.ceon.rs/index.php/jcfs/article/view/44741 Thu, 13 Jul 2023 00:00:00 +0200 An Application of Machine Learning Methods for Anomaly Detection in Internet Advertising https://aseestant.ceon.rs/index.php/jcfs/article/view/45169 <p><span style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-fareast-font-family: 'Noto Serif CJK SC'; mso-bidi-font-family: 'Lohit Devanagari'; mso-font-kerning: 1.5pt; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: HI;">This research deals certain issues regarding downloading data from the Internet, i.e. Internet page advertising, and certain mechanisms to take care of the integrity of the data that is put into the dedicated processing context afterwards. The work also relates to e-commerce as well as to the economy in general, as some advertising scenarios provide high error-rates with pricing, which may be unacceptable in various scenarios, such as renting or selling a home. This paper presents a brief overview of the outlier detection methods and machine learning-based classifiers which are used to determine the number of anomalies in the analyzed dataset. This work contributes to the operation of the organizations which are dealing with data accuracy and integrity, such as home renting or selling agencies.</span></p> Marko Živanović, Svetlana Štrbac-Savić, Zlatogor Minchev Copyright (c) 2023 University of Criminal Investigation and Police Studies, Belgrade, Serbia https://aseestant.ceon.rs/index.php/jcfs/article/view/45169 Fri, 07 Jul 2023 00:00:00 +0200