Impacts of increasing volume of digital forensic data: A survey and future research challenges
A major challenge to digital forensic analysis is the ongoing growth in the volume of data
seized and presented for analysis. This is a result of the continuing development of storage …
seized and presented for analysis. This is a result of the continuing development of storage …
User profiling in intrusion detection: A review
Intrusion detection systems are important for detecting and reacting to the presence of
unauthorised users of a network or system. They observe the actions of the system and its …
unauthorised users of a network or system. They observe the actions of the system and its …
[HTML][HTML] Availability of datasets for digital forensics–and what is missing
This paper targets two main goals. First, we want to provide an overview of available
datasets that can be used by researchers and where to find them. Second, we want to stress …
datasets that can be used by researchers and where to find them. Second, we want to stress …
Detecting deceptive reviews using lexical and syntactic features
Deceptive opinion classification has attracted a lot of research interest due to the rapid
growth of social media users. Despite the availability of a vast number of opinion features …
growth of social media users. Despite the availability of a vast number of opinion features …
Authorship verification for short messages using stylometry
Authorship verification can be checked using stylometric techniques through the analysis of
linguistic styles and writing characteristics of the authors. Stylometry is a behavioral feature …
linguistic styles and writing characteristics of the authors. Stylometry is a behavioral feature …
Twitter spam account detection based on clustering and classification methods
Twitter social network has gained more popularity due to the increase in social activities of
registered users. Twitter performs dual functions of online social network (OSN), acting as a …
registered users. Twitter performs dual functions of online social network (OSN), acting as a …
CS-BPSO: Hybrid feature selection based on chi-square and binary PSO algorithm for Arabic email authorship analysis
Email authorship analysis is a challenging task involving the detection of an author's style to
help determine their identity. Emails represent a widespread application of big data, and …
help determine their identity. Emails represent a widespread application of big data, and …
Document clustering for forensic analysis: An approach for improving computer inspection
In computer forensic analysis, hundreds of thousands of files are usually examined. Much of
the data in those files consists of unstructured text, whose analysis by computer examiners is …
the data in those files consists of unstructured text, whose analysis by computer examiners is …
Authorship verification using deep belief network systems
This paper explores the use of deep belief networks for authorship verification model
applicable for continuous authentication (CA). The proposed approach uses Gaussian units …
applicable for continuous authentication (CA). The proposed approach uses Gaussian units …
A unified data mining solution for authorship analysis in anonymous textual communications
The cyber world provides an anonymous environment for criminals to conduct malicious
activities such as spamming, sending ransom e-mails, and spreading botnet malware. Often …
activities such as spamming, sending ransom e-mails, and spreading botnet malware. Often …