[HTML][HTML] Leveraging AI for Network Threat Detection—A Conceptual Overview

MA Paracha, SU Jamil, K Shahzad, MA Khan… - Electronics, 2024 - mdpi.com
Network forensics is commonly used to identify and analyse evidence of any illegal or
unauthorised activity in a given network. The collected information can be used for …

Ai-enabled system for efficient and effective cyber incident detection and response in cloud environments

MAM Farzaan, MC Ghanem, A El-Hajjar… - arXiv preprint arXiv …, 2024 - arxiv.org
The escalating sophistication and volume of cyber threats in cloud environments necessitate
a paradigm shift in strategies. Recognising the need for an automated and precise response …

[HTML][HTML] Reinforcement learning for an efficient and effective malware investigation during cyber Incident response

D Dunsin, MC Ghanem, K Ouazzane… - High-Confidence …, 2025 - Elsevier
The ever-escalating prevalence of malware is a serious cybersecurity threat, often requiring
advanced post-incident forensic investigation techniques. This paper proposes a framework …

[HTML][HTML] GenAI mirage: The impostor bias and the deepfake detection challenge in the era of artificial illusions

M Casu, L Guarnera, P Caponnetto… - Forensic Science …, 2024 - Elsevier
This paper examines the impact of cognitive biases on decision-making in forensics and
digital forensics, exploring biases such as confirmation bias, anchoring bias, and hindsight …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

A framework for automated big data analytics in cybersecurity threat detection

MA Ameedeen, RA Hamid… - … Journal of Big …, 2024 - journals.mesopotamian.press
This research presents a novel framework designed to enhance cybersecurity through the
integration of Big Data analytics, addressing the critical need for scalable and real-time …

Cyberfusion protocols: Strategic integration of enterprise risk management, ISO 27001, and mobile forensics for advanced digital security in the modern business …

OO Olaniyi, OO Omogoroye… - Journal of …, 2024 - research.sdpublishers.net
This research paper explores the integration of Enterprise Risk Management (ERM), the ISO
27001 standard, and mobile forensics methodologies as a comprehensive framework for …

SentinelFusion based machine learning comprehensive approach for enhanced computer forensics

U Islam, AA Alsadhan, HS Alwageed… - PeerJ Computer …, 2024 - peerj.com
In the rapidly evolving landscape of modern technology, the convergence of blockchain
innovation and machine learning advancements presents unparalleled opportunities to …

Advancing Cyber Incident Timeline Analysis Through Rule Based AI and Large Language Models

FY Loumachi, MC Ghanem - arXiv preprint arXiv:2409.02572, 2024 - arxiv.org
Timeline Analysis (TA) plays a crucial role in Timeline Forensics (TF) within the field of
Digital Forensics (DF). It focuses on examining and analyzing time-based digital artefacts …

Discrimination of coal geographical origins through HS-GC-IMS assisted with machine learning algorithms in larceny case

W Lu, C Ding, M Zhu - Journal of Chromatography A, 2024 - Elsevier
The process of globalization and industrialization has resulted in a rise in the theft of coal
and other related products, thereby becoming a focal point for forensic science. This …