You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 10, Issue 12

December 2021 - 16 articles

Cover Story: Web browsers are one of the most used applications on every computational device. Hence, they play a pivotal role in any forensic investigation and help to determine if nefarious or suspicious activity has occurred on that device. Our study investigates the use of private mode and browsing artefacts within four web browsers and focuses on analyzing both hard disk and random-access memory. Forensic analysis on the browsing activity, search history, cookies, and temporary files of the target device showed that using the private mode artefacts are not saved in the device’s hard disks and matched each web browser vendors’ claims; however, in volatile memory analysis, most artefacts were retrieved. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (16)

  • Article
  • Open Access
13 Citations
5,026 Views
17 Pages

A Lightweight BPMN Extension for Business Process-Oriented Requirements Engineering

  • Benedetto Intrigila,
  • Giuseppe Della Penna and
  • Andrea D’Ambrogio

16 December 2021

Process-oriented requirements engineering approaches are often required to deal with the effective adaptation of existing processes in order to easily introduce new or updated requirements. Such approaches are based on the adoption of widely used not...

  • Article
  • Open Access
11 Citations
4,659 Views
22 Pages

13 December 2021

Currently, most chatbots are unable to detect the emotional state of the interlocutor and respond according to the interlocutor’s emotional state. Over the last few years, there has been growing interest in empathic chatbots. In other disciplin...

  • Article
  • Open Access
1 Citations
3,905 Views
21 Pages

An Applying Colored Petri Net for Computerized Accounting System and Ledger Accounts Instruction

  • Chanon Dechsupa,
  • Wiwat Vatanawood,
  • Worawit Poolsawasdi and
  • Arthit Thongtak

12 December 2021

Many learners who are not familiar with the accounting terms find blended learning very complex to understand with respect to the computerized accounting system, the journal entries process, and tracing the accounting transaction flows of accounting...

  • Review
  • Open Access
51 Citations
14,618 Views
17 Pages

The Use of Blockchain Technology in e-Government Services

  • Ioannis Lykidis,
  • George Drosatos and
  • Konstantinos Rantos

10 December 2021

e-Government services have evolved significantly over the last decade, from a paper-based bureaucratic procedure to digital services. Electronically processed transactions require limited physical interaction with the public administration, and provi...

  • Article
  • Open Access
11 Citations
4,531 Views
16 Pages

Automated Paraphrase Quality Assessment Using Language Models and Transfer Learning

  • Bogdan Nicula,
  • Mihai Dascalu,
  • Natalie N. Newton,
  • Ellen Orcutt and
  • Danielle S. McNamara

6 December 2021

Learning to paraphrase supports both writing ability and reading comprehension, particularly for less skilled learners. As such, educational tools that integrate automated evaluations of paraphrases can be used to provide timely feedback to enhance l...

  • Article
  • Open Access
6 Citations
3,770 Views
18 Pages

6 December 2021

Advances in information and communication technologies and, more specifically, in artificial intelligence resulted in more intelligent systems, which, in the business world, particularly in collaborative business ecosystems, can lead to a more stream...

  • Article
  • Open Access
11 Citations
8,574 Views
20 Pages

Browsers’ Private Mode: Is It What We Were Promised?

  • Kris Hughes,
  • Pavlos Papadopoulos,
  • Nikolaos Pitropakis,
  • Adrian Smales,
  • Jawad Ahmad and
  • William J. Buchanan

2 December 2021

Web browsers are one of the most used applications on every computational device in our days. Hence, they play a pivotal role in any forensic investigation and help determine if nefarious or suspicious activity has occurred on that device. Our study...

  • Article
  • Open Access
18 Citations
16,433 Views
33 Pages

1 December 2021

Recent research has revealed an alarming prevalence of click fraud in online advertising systems. In this article, we present a comprehensive study on the usage and impact of bots in performing click fraud in the realm of digital advertising. Specifi...

  • Article
  • Open Access
7 Citations
5,011 Views
9 Pages

IoT Security Mechanisms in the Example of BLE

  • Evgeny Kalinin,
  • Danila Belyakov,
  • Dmitry Bragin and
  • Anton Konev

29 November 2021

In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device fail...

  • Article
  • Open Access
19 Citations
6,793 Views
15 Pages

29 November 2021

Global industry is at the heart of its fourth industrial revolution, being driven by the emergence of new digital solutions: Augmented reality allows us to consider the evolution towards the “the augmented operator”. This technology is cu...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X