[1]
|
Artificial Intelligence and Machine Learning in Cybersecurity: Applications, Challenges, and Opportunities for MIS Academics
|
|
… of the Association for Information Systems,
2022 |
|
|
[2]
|
Research Perspective on Digital Forensic Tools and Investigation Process
|
|
Illumination of Artificial Intelligence in …,
2022 |
|
|
[3]
|
Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad
|
|
Terrorism and Political Violence,
2022 |
|
|
[4]
|
Digital Forensic Investigation Framework for Marine Industry
|
|
2022 International Wireless …,
2022 |
|
|
[5]
|
A Digital Forensics Approach for Lost Secondary Partition Analysis using Master Boot Record Structured Hard Disk Drives
|
|
… University Journal of …,
2021 |
|
|
[6]
|
Cyber Forensics Tools: A Review on Mechanism and Emerging Challenges
|
|
2021 |
|
|
[7]
|
Computer Forensics and Cyber Crime Handling
|
|
2020 |
|
|
[8]
|
不正アクセスの痕跡情報を用いたタイムライン型イベントログ可視化機能の開発
|
|
2020 |
|
|
[9]
|
Process mining-based approach for investigating malicious login events
|
|
2020 |
|
|
[10]
|
Comprehensive Review of Cybercrime Detection Techniques
|
|
2020 |
|
|
[11]
|
Digital Forensics: Crimes and Challenges in Online Social Networks Forensics
|
|
2020 |
|
|
[12]
|
First response: Computer Forensics
|
|
2020 |
|
|
[13]
|
Analysis of Steganographic on Digital Evidence using General Computer Forensic Investigation Model Framework
|
|
International Journal of Advanced Computer Science and Applications,
2020 |
|
|
[14]
|
Ontology for reactive techniques in digital forensics
|
|
2019 |
|
|
[15]
|
A Digital Forensic Readiness Approach for Ransomware Forensics
|
|
2019 |
|
|
[16]
|
Malware Forensic Analytics Framework Using Big Data Platform
|
|
2019 |
|
|
[17]
|
Vulnerabilities & Attacks in SRS for Object-Oriented Software Development
|
|
2019 |
|
|
[18]
|
Practicality of Data Mining for Proficient Network Security Management
|
|
2018 |
|
|
[19]
|
利用信息网络犯罪行为二元形态的教义解读 The Interpretation of the Doctrine of Binary Form of Information Network Crime
|
|
2018 |
|
|
[20]
|
Acquisition of Blackberry Messenger's Digital Evidence in Android Based Smartphone
|
|
2018 |
|
|
[21]
|
Cyber Dogfighting: A Case Study Evaluation of the Dynamic Decision-Making Used by Hackers in a Turbulent Environment of Cyberspace at a Regional Hacking …
|
|
2018 |
|
|
[22]
|
A Review of Evidence Extraction Techniques in Big Data Environment
|
|
2018 |
|
|
[23]
|
Survey of Analysis of Crime Detection Techniques Using Data Mining and Machine Learning
|
|
Journal of Physics: Conference Series,
2018 |
|
|
[24]
|
Web application attack detection and forensics: A survey
|
|
2018 |
|
|
[25]
|
Forensic science, electronic evidence and cybercrime prosecution in Nigeria
|
|
2018 |
|
|
[26]
|
Analysis of Crime data using data mining
|
|
International Journal of Engineering, Science and Mathematics,
2017 |
|
|
[27]
|
Forensik Jaringan untuk Deteksi Serangan Flooding pada Web Server
|
|
2017 |
|
|
[28]
|
A Quantitative Analysis of Organizational Factors that Relate to Data Mining Success
|
|
ProQuest Dissertations Publishing,
2017 |
|
|
[29]
|
Network Forensics For Detecting Flooding Attack On Web Server
|
|
International Journal of Computer Science and Information Security,
2017 |
|
|
[30]
|
Database Forensic Menggunakan Log File Untuk Deteksi Penyalahgunaan Hak Akses User
|
|
2017 |
|
|
[31]
|
Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies
|
|
International Journal of Information Security and Privacy (IJISP),
2017 |
|
|
[32]
|
Data Mining Analytics for Crime Security Investigation and Intrusion Detection
|
|
2016 |
|
|
[33]
|
A Classification Framework for Data Mining Applications in Criminal Science and Investigations
|
|
2016 |
|
|
[34]
|
Data Mining Techniques to Facilitate Digital Forensics Investigations
|
|
Advances in Computer Science and Ubiquitous Computing,
2016 |
|
|
[35]
|
Digital Forensic a Novel Way to Investigate E-Crime
|
|
International Journal of New Innovations in Engineering and Technology,
2016 |
|
|
[36]
|
Scenario-Based Digital Forensics Challenges in Cloud Computing
|
|
Symmetry,
2016 |
|
|
[37]
|
基于协议验证的时间自动机取证模型
|
|
南京邮电大学学报:自然科学版,
2016 |
|
|
[38]
|
Data analysis of file forensic investigation
|
|
2016 |
|
|
[39]
|
The perception of cyber threats and its associative relationship to the protection motivation theory and generational age groups: A quantitative study
|
|
ProQuest Dissertations Publishing,
2015 |
|
|
[40]
|
Predictive modeling of complex cyberthreats with formal concept analysis
|
|
2015 |
|
|
[41]
|
Comparative Study and Simulation of Digital Forensic Tools
|
|
International Journal of Computer Applications,
2015 |
|
|
[42]
|
网络动态数据挖掘研究进展与展望
|
|
图书情报工作,
2015 |
|
|
[43]
|
Building adaptive defense against cybercrimes using real-time data mining
|
|
Anti-Cybercrime (ICACC), 2015 First International Conference on,
2015 |
|
|
[44]
|
A Log Based Strategy for Fingerprinting and Forensic Investigation of Online Cyber Crimes
|
|
Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing. ACM,
2014 |
|
|
[45]
|
A Complete Survey on application of Frequent Pattern Mining and Association Rule Mining on Crime Pattern Mining
|
|
International Journal of Advances in Computer Science and Technology,
2014 |
|
|
[46]
|
Digital Forensics 2.0
|
|
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Springer International Publishing,
2014 |
|
|
[47]
|
A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management
|
|
2014 |
|
|
[48]
|
Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics
|
|
Journal of ICT Research and Applications,
2014 |
|
|
[49]
|
Proposals to Win the Battle Against Cyber Crime
|
|
2014 |
|
|
[50]
|
A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident …
|
|
2014 |
|
|
[51]
|
Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics.
|
|
2014 |
|
|
[52]
|
Digital Forensic: An Annalistic Challenge
|
|
Proceeding, National Conference on Advances in Computing & Networking (NCAICN),
2013 |
|
|
[53]
|
The Future of Internet Systems Security
|
|
2013 |
|
|
[54]
|
Forensic Investigative Methodologies for Digital Crime
|
|
International Journal of Computer Science & Applications (TIJCSA),
2013 |
|
|
[55]
|
" First response: Computer Forensics" By Dr. Vinod Surana
|
|
|
|
|