Jantje A. M. Silomon
King's College London
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jantje A. M. Silomon.
international conference on digital forensics | 2010
Michael Y. K. Kwan; Richard E. Overill; K. P. Chow; Jantje A. M. Silomon; Hayson Tse; Frank Y. W. Law; Pierre K. Y. Lai
Internet auction fraud has become prevalent. Methodologies for detecting fraudulent transactions use historical information about Internet auction participants to decide whether or not a user is a potential fraudster. The information includes reputation scores, values of items, time frames of various activities and transaction records. This paper presents a distinctive set of fraudster characteristics based on an analysis of 278 allegations about the sale of counterfeit goods at Internet auction sites. Also, it applies a Bayesian approach to analyze the relevance of evidence in Internet auction fraud cases.
availability, reliability and security | 2010
Richard E. Overill; Jantje A. M. Silomon; K. P. Chow
An operational complexity model (OCM) is proposed to enable the complexity of both the cognitive and the computational components of a process to be determined. From the complexity of formation of a set of traces via a specified route a measure of the probability of that route can be determined. By determining the complexities of alternative routes leading to the formation of the same set of traces, the odds ratio indicating the relative plausibility of the alternative routes can be found. An illustrative application to a BitTorrent piracy case is presented, and the results obtained suggest that the OCM is capable of providing a realistic estimate of the odds ratio for two competing hypotheses. It is also demonstrated that the OCM can be straightforwardly refined to encompass a variety of circumstances.
Digital Investigation | 2013
Richard E. Overill; Jantje A. M. Silomon; Keith A. Roscoe
This paper addresses the increasing resources overload being experienced by law enforcement digital forensics units with the proposal to introduce triage template pipelines into the investigative process, enabling devices and the data they contain to be examined according to a number of prioritised criteria.
availability, reliability and security | 2011
Richard E. Overill; Jantje A. M. Silomon
The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) multimedia piracy, online auction fraud, online storage of offensive material, theft of online game weapons, and distributed denial of service (DDoS) attacks. In each case the complexity of the simplest Trojan horse process that might be invoked as an alternative explanation for the recovered digital evidence is also determined using the OCM, and the results are used to assess the relative plausibility of the two competing explanations in each case. Finally, the forensically determined circumstances under which a Trojan horse defence is most likely to be successful are outlined.
2010 3rd International Conference on Human-Centric Computing | 2010
Richard E. Overill; Jantje A. M. Silomon; Michael Y. K. Kwan; K. P. Chow; Frank Y. W. Law; Pierre K. Y. Lai
A Bayesian network representing an actual prosecuted case of illegal file sharing over a peer-to-peer network has been subjected to a systematic and rigorous sensitivity analysis. Our results demonstrate that such networks are usefully insensitive both to the occurrence of missing evidential traces and to the choice of conditional evidential probabilities. The importance of this finding for the investigation of digital forensic hypotheses is highlighted.
2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering, SADFE 2013 | 2013
Richard E. Overill; Jantje A. M. Silomon; K. P. Chow; Hayson Tse
The issue of downloading illegal material from a website onto a personal digital device is considered from the perspective of conventional (Pascalian) probability theory. We present quantitative results for a simple model system by which we analyse and counter the putative defence case that the forensically recovered illegal material was downloaded accidentally by the defendant. The model is applied to two actual prosecutions involving possession of child pornography.
availability, reliability and security | 2012
Richard E. Overill; Jantje A. M. Silomon
Journal of the Harbin Institute of Technology | 2014
Richard E. Overill; Jantje A. M. Silomon; K. P. Chow; Hayson Tse
Archive | 2012
Jantje A. M. Silomon; Richard E. Overill
international conference on digital forensics | 2010
Y K Kwan; Richard E. Overill; K. P. Chow; Jantje A. M. Silomon; Hayson Tse; K Y Lai; Y W Law