[PDF][PDF] Towards a Timely Causality Analysis for Enterprise Security.

Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal - NDSS, 2018 - princeton.edu
The increasingly sophisticated Advanced Persistent Threat (APT) attacks have become a
serious challenge for enterprise IT security. Attack causality analysis, which tracks multi-hop …

A Machine Learning-based Triage methodology for automated categorization of digital media

F Marturana, S Tacconi - Digital Investigation, 2013 - Elsevier
The global diffusion of smartphones and tablets, exceeding traditional desktops and laptops
market share, presents investigative opportunities and poses serious challenges to law …

[HTML][HTML] Machine learning based approach to analyze file meta data for smart phone file triage

C Serhal, NA Le-Khac - Forensic Science International: Digital Investigation, 2021 - Elsevier
With the rapid increase in mobile phone storage capacity and penetration, digital forensic
investigators face a significant challenge in quickly identifying relevant examinable files …

Triage-based automated analysis of evidence in court cases of copyright infringement

F Marturana, S Tacconi, R Bertè… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Over the past few years, the number of crimes related to the worldwide diffusion of digital
devices with large storage and broadband network connections has increased dramatically …

[PDF][PDF] INTEGRATED EXAMINATION AND ANALYSIS MODEL FOR IMPROVING MOBILE CLOUD FORENSIC INVESTIGATION

IA ALNAJJAR - 2022 - etd.uum.edu.my
Advanced forensic techniques become inevitable to investigate the malicious activities in
Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific …

Prioritizing computer forensics using triage techniques

MW Gielen - 2014 - essay.utwente.nl
There is a lot of information contained on a single computer and a company can contain a lot
of computer and other devices. If there is a breach somewhere in this organization how will a …

[图书][B] Enhancing Network Security and Privacy Using Graph-Theoretic Characteristics

Y Liu - 2021 - search.proquest.com
Today, governments, businesses, and the critical infrastructure are facing cyberattacks of
increasing frequency, intensity, and complexity. With the widespread use of sensitive data in …

[PDF][PDF] Relevance Feedback Optimization for Digital Forensic Investigations

AS Hanadi - 2019 - bspace.buid.ac.ae
Digital forensics deals with the use of tools and techniques to preserve, identify, extract,
document, and interpret any data stored or transmitted using a digital system. It is usually …

Relevance Feedback Optimization for Digital Forensic Investigations

H Al Suwaidi - 2019 - search.proquest.com
Digital forensics deals with the use of tools and techniques to preserve, identify, extract,
document, and interpret any data stored or transmitted using a digital system. It is usually …

[PDF][PDF] Architecture and Design of Process Based Framework for Mobile Forensics (PBFMF)

MH Al Tawqi - 2017 - openresearch.surrey.ac.uk
Over the last two decades, the world has witnessed a vast increase in smart phones devices
usage, where mobile phone devices have become an integral part of our daily routine. As a …