Sefaced: Semantic-based forensic analysis and classification of e-mail data using deep learning

M Hina, M Ali, AR Javed, F Ghabban, LA Khan… - IEEE …, 2021 - ieeexplore.ieee.org
Artificial Intelligence (AI), in combination with the Internet of Things (IoT), called (AIoT), an
emerging trend in industrial applications, is capable of intelligent decision-making with self …

Dark web forum correlation analysis research

Y Yang, L Yang, M Yang, H Yu, G Zhu… - 2019 IEEE 8th Joint …, 2019 - ieeexplore.ieee.org
With the rapid development of the Internet, the dark network has also been widely used in
the Internet [1]. Due to the anonymity of the dark network, many illegal elements have …

SankeyVis: Visualizing active relationship from emails based on multiple dimensions and topic classification methods

Y Fang, C Zhao, C Huang, L Liu - Forensic Science International: Digital …, 2020 - Elsevier
The explosive growth of email has led to the rapid development of e-mail-based forensics,
and at the same time, it has brought enormous challenges. As a special kind of data, email …

Advances in the application of Ontologies in the area of Digital Forensic Electronic Mail

B Parra, M Vegetti, H Leone - IEEE Latin America Transactions, 2019 - ieeexplore.ieee.org
This article presents a descriptive review of the research published in the last five years to
identify areas of unavailability in the study of Digital Forensics problems. Particularly, it is …

Electronic evidence service research in cloud computing environment

Z Chen, W Liu, Y Yang, J Wang, M Guo… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
With the increasing of computer crime incidence and the digitization of criminal means, the
work of collecting electronic evidence has become the key to provide important clues and …

Combatting the data volume issue in digital forensics: A structured literature review

M Sjöstrand - 2020 - diva-portal.org
The increase in data volume and amount of data sources submitted as evidence such as
from Internet of Things (IoT) devices or cloud computing systems has caused the digital …

Research and Design of Visual Analytics System of Network Security Situation Based on Multi-source Log

Y Zhong, S Wang - 2020 7th International Conference on …, 2020 - ieeexplore.ieee.org
Network security visualization takes advantage of the human perceptual and cognitive
processes, provides an effective visual tool for analysts to understand the network status …

[PDF][PDF] Email Correlation And Analysis Using Pattern Matching

A IOIT - researchgate.net
Email or Electronic mail is been widely used to exchange messages between people.
Electronic mail or an Email can be personal, commercial, business related messages. These …