[PDF][PDF] E-mail data analysis for application to cyber forensic investigation using data mining

SR Khan, SM Nirkhi, RV Dharaskar - Proceedings of the 2nd …, 2013 - researchgate.net
This paper discusses briefly the significance of e-mail communication in today's world, how
substantial e-mails are with respect to obtaining digital evidence. The framework proposed …

[PDF][PDF] Mining e-mail content for cyber forensic investigation

MSR Khan, MSM Nirkhi… - … International Journal of …, 2012 - researchgate.net
E-mail is a widely used mechanism for communication, due to its cost and expediency.
However, the concern lies when along with its legitimate usage; it is being abused for …

Contributions to cyber-forensics: processes and e-mail analysis

D Benredjem - 2007 - spectrum.library.concordia.ca
The primary intent of this thesis is to contribute to cyber forensics by addressing two
important aspects that are processes and analysis techniques. In this thesis, first, the existing …

Digital cyber forensics contribution for email analysis

SD Hamdi, AM Radhi - Journal of Engineering and …, 2020 - jeasd.uomustansiriyah.edu.iq
In the past two decades, the Internet has become as open, publicly and widely used as a
source of data transmission and exchanging the messages between criminals, terrorists and …

[PDF][PDF] Digital Cyber Forensic Email Analysis and Detection Based on Intelligent Techniquesinvestigation

SD Hamdi, AM Radhi - Iraqi Journal of Information and Communication …, 2020 - iasj.net
The Internet has become open, public and widely used as a source of data transmission and
exchanging messages between criminals, terrorists and those who have illegal motivations …

Computational intelligence in e-mail traffic analysis

MJH Lim - 2008 - figshare.utas.edu.au
In law enforcement, tools and techniques are required that enable forensic analysts to
uncover electronic evidence about the communication activities of possible criminal or …

[PDF][PDF] A methodology for cyber crime identification using email corpus based on gaussian mixture model

V Sreenivasulu, RS Prasad - International Journal of Computer …, 2015 - Citeseer
The area of crime investigation has extended its roots to cyber media and has emerged
exponentially with the technological strides. Among the various media used in Digital …

[PDF][PDF] Techniques and Tools for Forensic Investigation of E-mail

MT Banday - International Journal of Network Security & Its …, 2011 - Citeseer
ABSTRACT E-mail has emerged as the most important application on Internet for
communication of messages, delivery of documents and carrying out of transactions and is …

[PDF][PDF] Email mining toolkit supporting law enforcement forensic analyses

SJ Stolfo, S Hershkop - ACM international conference Proceeding …, 2005 - researchgate.net
ABSTRACT The Email Mining Toolkit (EMT) is a data mining tool that visualizes a very wide
range of detailed analyses of email and email flows derived from an archive of email in a …

[PDF][PDF] Combating against anti-forensics aligned with e-mail forensics

S Neralla, DL Bhaskari… - International Journal of …, 2013 - researchgate.net
Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber
criminals' uses sophisticated technological knowledge and always they plan to escape from …