[HTML][HTML] Interpol review of digital evidence for 2019–2022

P Reedy - Forensic Science International: Synergy, 2023 - Elsevier
When compiling the digital evidence review for 2019–2022, the first thought that came to
mind was “we have come so far… we have so far to go”. There has been considerable …

Argumentation and explainable artificial intelligence: a survey

A Vassiliades, N Bassiliades, T Patkos - The Knowledge …, 2021 - cambridge.org
Argumentation and eXplainable Artificial Intelligence (XAI) are closely related, as in the
recent years, Argumentation has been used for providing Explainability to AI. Argumentation …

[HTML][HTML] DFRWS EU 10-year review and future directions in Digital Forensic Research

F Breitinger, JN Hilgert, C Hargreaves… - Forensic Science …, 2024 - Elsevier
Conducting a systematic literature review and comprehensive analysis, this paper surveys
all 135 peer-reviewed articles published at the Digital Forensics Research Conference …

[PDF][PDF] Cybersecurity strategies for safeguarding customers data and preventing financial fraud in the United States financial sectors

O Efijemue, C Obunadike, E Taiwo… - … Journal of Soft …, 2023 - researchgate.net
As the financial sectors in the United States deal with expanding cyberthreats and a rising
danger of financial crime, cybersecurity has become a top priority. This paper examines the …

[HTML][HTML] Forensics for multi-stage cyber incidents: Survey and future directions

A Nisioti, G Loukas, A Mylonas, E Panaousis - … Science International: Digital …, 2023 - Elsevier
The increase in the complexity and sophistication of multi-stage cyber attacks, such as
advanced persistent threats, paired with the large volume of data produced by modern …

Data-driven techniques and security issues in wireless networks

MM Saeed, ES Ali, RA Saeed - Data-Driven Intelligence in …, 2023 - taylorfrancis.com
The data-Driven Technique is a method that employs real-world data to acquire insight into
system behavior. It allows for the examination of small, simple systems as well as large …

A3R: Argumentative explanations for recommendations

J Zhong, E Negre - 2022 IEEE 9th International Conference on …, 2022 - ieeexplore.ieee.org
Existing recommender systems often apply factorization-based models, which have been
proved to be efficient in rating prediction. However, the explicit semantics of the learned …

APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion

N **ao, B Lang, T Wang, Y Chen - Computers & Security, 2024 - Elsevier
Threat actor attribution is a crucial defense strategy for combating advanced persistent
threats (APTs). Cyber threat intelligence (CTI), which involves analyzing multisource …

A rag-based question-answering solution for cyber-attack investigation and attribution

S Rajapaksha, R Rani, E Karafili - arxiv preprint arxiv:2408.06272, 2024 - arxiv.org
In the constantly evolving field of cybersecurity, it is imperative for analysts to stay abreast of
the latest attack trends and pertinent information that aids in the investigation and attribution …

Towards a framework for automatic firewalls configuration via argumentation reasoning

E Karafili, F Valenza, Y Chen… - NOMS 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Firewalls have been widely used to protect not only small and local networks but also large
enterprise networks. The configuration of firewalls is mainly done by network administrators …