Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Digital forensics subdomains: the state of the art and future directions
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …
scientifically proven digital forensic investigation techniques to corroborate a suspected …
Biometric cryptosystems: a comprehensive survey
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …
cryptosystem, where biometric provides authentication and cryptosystem imparts security …
A novel principle to validate digital forensic models
Digital forensic models (DFMs) form the base for any digital investigation because they
guide the investigators with necessary steps and procedures to be taken during the …
guide the investigators with necessary steps and procedures to be taken during the …
Network traffic classification using multiclass classifier
This paper aims to classify network traffic in order to segregate normal and anomalous
traffic. There can be multiple classes of network attacks, so a multiclass model is …
traffic. There can be multiple classes of network attacks, so a multiclass model is …
A survey of machine learning applications in digital forensics
H Khan, S Hanif - Trends in Computer Science and …, 2021 - peertechzpublications.us
We address the role of machine learning in digital forensics in this paper, in order to have a
better understanding of where machine learning stand in today's cyber security domain …
better understanding of where machine learning stand in today's cyber security domain …
[PDF][PDF] Digital forensics investigation procedures of smart grid environment
HIM Abdullah, ZA Ibrahim, FA Rahim… - International Journal of …, 2022 - eprints.utm.my
Smart grids have been widely used around the world. The security of this system is
debatable among the researchers because this area requires an improvement in order to …
debatable among the researchers because this area requires an improvement in order to …
The case for validating ADDIE model as a digital forensic model for peer-to-peer network investigation
AS Musa, IU Awan, F Zahrah - Information Systems Frontiers, 2022 - Springer
Rapid technological advancement can substantially impact the processes of digital forensic
investigation and present a myriad of challenges to the investigator. With these challenges, it …
investigation and present a myriad of challenges to the investigator. With these challenges, it …
Proactive network packet classification using artificial intelligence
A malicious packet attack is defined as a severe attack created or received over the network.
Recently, researchers have made modern intrusion detection systems in order to detect …
Recently, researchers have made modern intrusion detection systems in order to detect …
[PDF][PDF] An Artificial Intelligence-based Proactive Network Forensic Framework
Abstract is at an all-time high in the modern period, and the majority of the population uses
the Internet for all types of communication. It is great to be able to improvise like this. As a …
the Internet for all types of communication. It is great to be able to improvise like this. As a …
[КНИГА][B] Network Forensics: Privacy and Security
A Bijalwan - 2021 - taylorfrancis.com
This book primarily focuses on providing deep insight into the concepts of network security,
network forensics, botnet forensics, ethics and incident response in global perspectives. It …
network forensics, botnet forensics, ethics and incident response in global perspectives. It …