ARTIFICIAL INTELLIGENCE BASED DIGITAL FORENSICS FRAMEWORK
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
2016: Current State of Cybercrime, RSA Whitepaper, 2016
World Internet Users and 2017 Population Stats, 10 th July, 2017
[http:// http://www.internetworldstats.com/stats.htm]
Morgan S., Cyber Crime Costs Projected To Reach $2 Trillion by 2019, 2016, Forbes.
The Hiscox Cyber Readiness Report - 2017, Hiscox
Cyber Crime Statistics and Trends [Infographic], 17 May 2013, Go-gulf
[ https://www.go-gulf.com/blog/cyber-crime/ ]
Identity Theft Resource Center, 2 nd August, 2017
[ http://www.idtheftcenter.org/Data-Breaches/data-breaches ]
http://mha1.nic.in/par2013/par2016-pdfs/ls-190716/23%20E.pdf
Grimes R., Why Internet crime goes unpunished, CSO, 2012
[ http://www.csoonline.com/article/2618598/cyber-crime/why-internet-crime-goes-unpunished.html ]
Altheide C. and Carvey H., Digital Forensics with Open Source Tools, 201110. https://www.guidancesoftware.com/encase-forensic
http://accessdata.com/products-services/forensic-toolkit-ftk
https://www.cellebrite.com/en/home/
https://www.magnetforensics.com/magnet-ief/
https://www.sleuthkit.org/autopsy/
https://www.msab.com/products/xry/
Martini, B., & Choo, K. K. R. (2012). An integrated conceptual digital forensic framework for cloud
computing. Digital Investigation, 9(2), 71-80.
Beebe, N. L., & Clark, J. G. (2005). A hierarchical, objectives-based framework for the digital investigations
process. Digital Investigation, 2(2), 147-167.
Marziale, L., Richard, G. G., & Roussev, V. (2007). Massive threading: Using GPUs to increase the
performance of digital forensics tools. digital investigation, 4, 73-81.
Reith, M., Carr, C., & Gunsch, G. (2002). An examination of digital forensic models. International Journal of
Digital Evidence, 1(3), 1-12.
Garfinkel, S. L. (2010). Digital forensics research: The next 10 years. digital investigation, 7, S64-S73.
Mukkamala, S., & Sung, A. H. (2003). Identifying significant features for network forensic analysis using
artificial intelligent techniques. International Journal of digital evidence, 1(4), 1-17.
Hoelz, B. W., Ralha, C. G., & Geeverghese, R. (2009, March). Artificial intelligence applied to computer
forensics. In Proceedings of the 2009 ACM symposium on Applied Computing (pp. 883-888). ACM.
Case, A., Cristina, A., Marziale, L., Richard, G. G., & Roussev, V. (2008). FACE: Automated digital evidence
discovery and correlation. digital investigation, 5, S65-S75.