Machine Learning for Authorship Attribution and Cyber Forensics

Machine Learning for Authorship Attribution and Cyber Forensics

Author: Farkhund Iqbal

Publisher: Springer Nature

Published: 2020-12-04

Total Pages: 158

ISBN-13: 3030616754

DOWNLOAD EBOOK

The book first explores the cybersecurity’s landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law.


Authorship Attribution

Authorship Attribution

Author: Patrick Juola

Publisher: Now Publishers Inc

Published: 2008

Total Pages: 116

ISBN-13: 160198118X

DOWNLOAD EBOOK

Authorship Attribution surveys the history and present state of the discipline, presenting some comparative results where available. It also provides a theoretical and empirically-tested basis for further work. Many modern techniques are described and evaluated, along with some insights for application for novices and experts alike.


Social Network Analytics for Contemporary Business Organizations

Social Network Analytics for Contemporary Business Organizations

Author: Bansal, Himani

Publisher: IGI Global

Published: 2018-03-23

Total Pages: 339

ISBN-13: 1522550984

DOWNLOAD EBOOK

Social technology is quickly becoming a vital tool in our personal, educational, and professional lives. Its use must be further examined in order to determine the role of social media technology in organizational settings to promote business development and growth. Social Network Analytics for Contemporary Business Organizations is a critical scholarly resource that analyzes the application of social media in business applications. Featuring coverage on a broad range of topics, such as business management, dynamic networks, and online interaction, this book is geared towards professionals, researchers, academics, students, managers, and practitioners actively involved in the business industry.


Intelligent Systems Technologies and Applications

Intelligent Systems Technologies and Applications

Author: Sabu M. Thampi

Publisher: Springer

Published: 2017-10-20

Total Pages: 442

ISBN-13: 3319683853

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed post-conference proceedings of the third International Symposium on Intelligent Systems Technologies and Applications (ISTA’17), September 13-16, 2017, Manipal, Karnataka, India. All submissions were evaluated on the basis of their significance, novelty, and technical quality. This proceedings contains 34 papers selected for presentation at the Symposium.


Cyber Security Cryptography and Machine Learning

Cyber Security Cryptography and Machine Learning

Author: Shlomi Dolev

Publisher: Springer

Published: 2017-06-14

Total Pages: 318

ISBN-13: 331960080X

DOWNLOAD EBOOK

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.


Security and Artificial Intelligence

Security and Artificial Intelligence

Author: Lejla Batina

Publisher: Springer Nature

Published: 2022-04-07

Total Pages: 365

ISBN-13: 3030987957

DOWNLOAD EBOOK

AI has become an emerging technology to assess security and privacy, with many challenges and potential solutions at the algorithm, architecture, and implementation levels. So far, research on AI and security has looked at subproblems in isolation but future solutions will require sharing of experience and best practice in these domains. The editors of this State-of-the-Art Survey invited a cross-disciplinary team of researchers to a Lorentz workshop in 2019 to improve collaboration in these areas. Some contributions were initiated at the event, others were developed since through further invitations, editing, and cross-reviewing. This contributed book contains 14 invited chapters that address side-channel attacks and fault injection, cryptographic primitives, adversarial machine learning, and intrusion detection. The chapters were evaluated based on their significance, technical quality, and relevance to the topics of security and AI, and each submission was reviewed in single-blind mode and revised.


Advances in Digital Forensics X

Advances in Digital Forensics X

Author: Gilbert Peterson

Publisher: Springer

Published: 2014-10-09

Total Pages: 336

ISBN-13: 3662449528

DOWNLOAD EBOOK

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics X describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: - Internet Crime Investigations; - Forensic Techniques; - Mobile Device Forensics; - Forensic Tools and Training. This book is the 10th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-two edited papers from the 10th Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Vienna, Austria in the winter of 2014. Advances in Digital Forensics X is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.


Advances in Digital Forensics IX

Advances in Digital Forensics IX

Author: Gilbert Peterson

Publisher: Springer

Published: 2013-10-09

Total Pages: 398

ISBN-13: 3642411487

DOWNLOAD EBOOK

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics IX describe original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Models, Forensic Techniques, File system Forensics, Network Forensics, Cloud Forensics, Forensic Tools, and Advanced Forensic Techniques. This book is the ninth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2013. Advances in Digital Forensics IX is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.


Applied Soft Computing

Applied Soft Computing

Author: Samarjeet Borah

Publisher: CRC Press

Published: 2022-02-03

Total Pages: 286

ISBN-13: 1000406636

DOWNLOAD EBOOK

This new volume explores a variety of modern techniques that deal with estimated models and give resolutions to complex real-life issues. Soft computing has played a crucial role not only with theoretical paradigms but is also popular for its pivotal role for designing a large variety of expert systems and artificial intelligence-based applications. Involving the concepts and practices of soft computing in conjunction with other frontier research domains, this book begins with the basics and goes on to explore a variety of modern applications of soft computing in areas such as approximate reasoning, artificial neural networks, Bayesian networks, big data analytics, bioinformatics, cloud computing, control systems, data mining, functional approximation, fuzzy logic, genetic and evolutionary algorithms, hybrid models, machine learning, metaheuristics, neuro fuzzy system, optimization, randomized searches, and swarm intelligence. This book will be helpful to a wide range of readers who wish to learn applications of soft computing approaches. It will be useful for academicians, researchers, students, and machine learning experts who use soft computing techniques and algorithms to develop cutting-edge artificial intelligence-based applications.


Applications of Data Mining in Computer Security

Applications of Data Mining in Computer Security

Author: Daniel Barbará

Publisher: Springer Science & Business Media

Published: 2002-05-31

Total Pages: 286

ISBN-13: 9781402070549

DOWNLOAD EBOOK

Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security. Applications Of Data Mining In Computer Security concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence.