[1]
|
Comparing Data Mining Classification for Online Fraud Victim Profile in Indonesia
INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi,
2023
DOI:10.29407/intensif.v7i1.18283
|
|
|
[2]
|
Effective Visualization and Trend Forecasting of Crime Data Through Big Data Analytics and Mining
2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN),
2023
DOI:10.1109/ICPCSN58827.2023.00132
|
|
|
[3]
|
On Big Data Forensic and Forensic Cloud Environment
2022 International Conference on Smart Applications, Communications and Networking (SmartNets),
2022
DOI:10.1109/SmartNets55823.2022.9994011
|
|
|
[4]
|
Illumination of Artificial Intelligence in Cybersecurity and Forensics
Lecture Notes on Data Engineering and Communications Technologies,
2022
DOI:10.1007/978-3-030-93453-8_4
|
|
|
[5]
|
Digital Forensic Investigation Framework for Marine Industry
2022 International Wireless Communications and Mobile Computing (IWCMC),
2022
DOI:10.1109/IWCMC55113.2022.9825338
|
|
|
[6]
|
A Digital Forensics Approach for Lost Secondary Partition Analysis using Master Boot Record Structured Hard Disk Drives
Sakarya University Journal of Computer and Information Sciences,
2021
DOI:10.35377/saucis...1022600
|
|
|
[7]
|
Cyber Forensics Tools: A Review on Mechanism and Emerging Challenges
2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS),
2021
DOI:10.1109/NTMS49979.2021.9432641
|
|
|
[8]
|
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
Advances in Digital Crime, Forensics, and Cyber Terrorism,
2021
DOI:10.4018/978-1-7998-4162-3.ch003
|
|
|
[9]
|
A Digital Forensics Approach for Lost Secondary Partition Analysis using Master Boot Record Structured Hard Disk Drives
Sakarya University Journal of Computer and Information Sciences,
2021
DOI:10.35377/saucis...1022600
|
|
|
[10]
|
Cyber Warfare and Terrorism
2020
DOI:10.4018/978-1-7998-2466-4.ch018
|
|
|
[11]
|
Process mining-based approach for investigating malicious login events
NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium,
2020
DOI:10.1109/NOMS47738.2020.9110301
|
|
|
[12]
|
Comprehensive Review of Cybercrime Detection Techniques
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.3011259
|
|
|
[13]
|
Ontology for Reactive Techniques in Digital Forensics
2019 IEEE Conference on Application, Information and Network Security (AINS),
2019
DOI:10.1109/AINS47559.2019.8968696
|
|
|
[14]
|
Securing the Internet of Things
2019
DOI:10.4018/978-1-5225-9866-4.ch035
|
|
|
[15]
|
A Review of Evidence Extraction Techniques in Big Data Environment
2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE),
2018
DOI:10.1109/ICSCEE.2018.8538437
|
|
|
[16]
|
Digital Multimedia
2018
DOI:10.4018/978-1-5225-3822-6.ch029
|
|
|
[17]
|
Cyber Security and Threats
2018
DOI:10.4018/978-1-5225-5634-3.ch072
|
|
|
[18]
|
Web application attack detection and forensics: A survey
2018 6th International Symposium on Digital Forensic and Security (ISDFS),
2018
DOI:10.1109/ISDFS.2018.8355378
|
|
|
[19]
|
Practicality of Data Mining for Proficient Network Security Management
2018 5th Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE),
2018
DOI:10.1109/APWConCSE.2018.00032
|
|
|
[20]
|
Advances in Computer Science and Ubiquitous Computing
Lecture Notes in Electrical Engineering,
2017
DOI:10.1007/978-981-10-3023-9_58
|
|
|
[21]
|
Data Mining Trends and Applications in Criminal Science and Investigations
Advances in Data Mining and Database Management,
2016
DOI:10.4018/978-1-5225-0463-4.ch002
|
|
|
[22]
|
Data Mining Trends and Applications in Criminal Science and Investigations
Advances in Data Mining and Database Management,
2016
DOI:10.4018/978-1-5225-0463-4.ch008
|
|
|
[23]
|
Scenario-Based Digital Forensics Challenges in Cloud Computing
Symmetry,
2016
DOI:10.3390/sym8100107
|
|
|
[24]
|
Handbook of Research on Threat Detection and Countermeasures in Network Security
Advances in Information Security, Privacy, and Ethics,
2015
DOI:10.4018/978-1-4666-6583-5.ch008
|
|
|
[25]
|
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications
Studies in Computational Intelligence,
2014
DOI:10.1007/978-3-319-05885-6_2
|
|
|
[26]
|
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications
Studies in Computational Intelligence,
2014
DOI:10.1007/978-3-319-05885-6_2
|
|
|