Machine learning in digital forensics: a systematic literature review

T Nayerifard, H Amintoosi, AG Bafghi… - arXiv preprint arXiv …, 2023 - arxiv.org
Development and exploitation of technology have led to the further expansion and
complexity of digital crimes. On the other hand, the growing volume of data and …

AI and machine learning: A mixed blessing for cybersecurity

F Kamoun, F Iqbal, MA Esseghir… - … Symposium on Networks …, 2020 - ieeexplore.ieee.org
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in
defensive cybersecurity has received considerable attention, there remains a noticeable …

Review of NLP-based systems in digital forensics and cybersecurity

DO Ukwen, M Karabatak - 2021 9th International symposium …, 2021 - ieeexplore.ieee.org
Over the years, there is an increase in the use of Artificial Intelligence (AI) by digital forensics
and cybersecurity professionals to combat cybercrime. Natural Language Processing (NLP) …

[HTML][HTML] A comparative study of support vector machine and neural networks for file type identification using n-gram analysis

J Sester, D Hayes, M Scanlon, NA Le-Khac - Forensic Science International …, 2021 - Elsevier
File type identification (FTI) has become a major discipline for anti-virus developers, firewall
designers and for forensic cybercrime investigators. Over the past few years, research has …

FiFTy: large-scale file fragment type identification using convolutional neural networks

G Mittal, P Korus, N Memon - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
We present FiFTy, a modern file-type identification tool for memory forensics and data
carving. In contrast to previous approaches based on hand-crafted features, we design a …

Frameup: an incriminatory attack on Storj: a peer to peer blockchain enabled distributed storage system

X Zhang, J Grannis, I Baggili, NL Beebe - Digital Investigation, 2019 - Elsevier
In this work we present a primary account of frameup, an incriminatory attack made possible
because of existing implementations in distributed peer to peer storage. The frameup attack …

A multi-scale feature attention approach to network traffic classification and its model explanation

Y Wang, X Yun, Y Zhang, C Zhao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Network traffic classification, the task of associating network traffic with their generating
application protocols or applications, is valuable for the control, allocation, and management …

Sparse coding for n-gram feature extraction and training for file fragment classification

F Wang, TT Quach, J Wheeler… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
File fragment classification is an important step in the task of file carving in digital forensics.
In file carving, files must be reconstructed based on their content as a result of their …

ByteNet: Rethinking multimedia file fragment classification through visual perspectives

W Liu, K Wu, T Liu, Y Wang, KH Yap… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Multimedia file fragment classification (MFFC) aims to identify file fragment types, eg,
image/video, audio, and text without system metadata. It is of vital importance in multimedia …

ByteRCNN: Enhancing File Fragment Type Identification with Recurrent and Convolutional Neural Networks

K Skračić, J Petrović, P Pale - IEEE access, 2023 - ieeexplore.ieee.org
File fragment type identification is an important step in file carving and data recovery.
Machine learning techniques, especially neural networks, have been utilized for this …