Impacts of increasing volume of digital forensic data: A survey and future research challenges

D Quick, KKR Choo - Digital Investigation, 2014‏ - Elsevier
A major challenge to digital forensic analysis is the ongoing growth in the volume of data
seized and presented for analysis. This is a result of the continuing development of storage …

User profiling in intrusion detection: A review

J Peng, KKR Choo, H Ashman - Journal of Network and Computer …, 2016‏ - Elsevier
Intrusion detection systems are important for detecting and reacting to the presence of
unauthorised users of a network or system. They observe the actions of the system and its …

[HTML][HTML] Availability of datasets for digital forensics–and what is missing

C Grajeda, F Breitinger, I Baggili - Digital Investigation, 2017‏ - Elsevier
This paper targets two main goals. First, we want to provide an overview of available
datasets that can be used by researchers and where to find them. Second, we want to stress …

Detecting deceptive reviews using lexical and syntactic features

S Shojaee, MAA Murad, AB Azman… - … on Intellient Systems …, 2013‏ - ieeexplore.ieee.org
Deceptive opinion classification has attracted a lot of research interest due to the rapid
growth of social media users. Despite the availability of a vast number of opinion features …

Authorship verification for short messages using stylometry

ML Brocardo, I Traore, S Saad… - 2013 International …, 2013‏ - ieeexplore.ieee.org
Authorship verification can be checked using stylometric techniques through the analysis of
linguistic styles and writing characteristics of the authors. Stylometry is a behavioral feature …

Twitter spam account detection based on clustering and classification methods

KS Adewole, T Han, W Wu, H Song… - The Journal of …, 2020‏ - Springer
Twitter social network has gained more popularity due to the increase in social activities of
registered users. Twitter performs dual functions of online social network (OSN), acting as a …

CS-BPSO: Hybrid feature selection based on chi-square and binary PSO algorithm for Arabic email authorship analysis

W BinSaeedan, S Alramlawi - Knowledge-Based Systems, 2021‏ - Elsevier
Email authorship analysis is a challenging task involving the detection of an author's style to
help determine their identity. Emails represent a widespread application of big data, and …

Document clustering for forensic analysis: An approach for improving computer inspection

LF da Cruz Nassif, ER Hruschka - IEEE transactions on …, 2012‏ - ieeexplore.ieee.org
In computer forensic analysis, hundreds of thousands of files are usually examined. Much of
the data in those files consists of unstructured text, whose analysis by computer examiners is …

Authorship verification using deep belief network systems

ML Brocardo, I Traore, I Woungang… - International Journal of …, 2017‏ - Wiley Online Library
This paper explores the use of deep belief networks for authorship verification model
applicable for continuous authentication (CA). The proposed approach uses Gaussian units …

A unified data mining solution for authorship analysis in anonymous textual communications

F Iqbal, H Binsalleeh, BCM Fung, M Debbabi - Information Sciences, 2013‏ - Elsevier
The cyber world provides an anonymous environment for criminals to conduct malicious
activities such as spamming, sending ransom e-mails, and spreading botnet malware. Often …