Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Machine Learning for Authorship Attr...
~
Debbabi, Mourad.
Machine Learning for Authorship Attribution and Cyber Forensics
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Machine Learning for Authorship Attribution and Cyber Forensics/ by Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung.
Author:
Iqbal, Farkhund.
other author:
Debbabi, Mourad.
Description:
IX, 158 p. 38 illus., 28 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data mining. -
Online resource:
https://doi.org/10.1007/978-3-030-61675-5
ISBN:
9783030616755
Machine Learning for Authorship Attribution and Cyber Forensics
Iqbal, Farkhund.
Machine Learning for Authorship Attribution and Cyber Forensics
[electronic resource] /by Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung. - 1st ed. 2020. - IX, 158 p. 38 illus., 28 illus. in color.online resource. - International Series on Computer Entertainment and Media Technology,2364-947X. - International Series on Computer Entertainment and Media Technology,.
1. Cybersecurity And Cybercrime Investigation -- 2. Machine Learning Framework For Messaging Forensics -- 3. Header-Level Investigation And Analyzing Network Information -- 4. Authorship Analysis Approaches -- 5. Authorship Analysis - Writeprint Mining For Authorship Attribution -- 6. Authorship Attribution With Few Training Samples -- 7. Authorship Characterization -- 8. Authorship Verification -- 9. Authorship Attribution Using Customized Associative Classification -- 10. Criminal Information Mining -- 11. Artificial Intelligence And Digital Forensics.
The book first explores the cybersecurity’s landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law. .
ISBN: 9783030616755
Standard No.: 10.1007/978-3-030-61675-5doiSubjects--Topical Terms:
528622
Data mining.
LC Class. No.: QA76.9.D343
Dewey Class. No.: 006.312
Machine Learning for Authorship Attribution and Cyber Forensics
LDR
:03514nam a22004215i 4500
001
1030481
003
DE-He213
005
20201204150856.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030616755
$9
978-3-030-61675-5
024
7
$a
10.1007/978-3-030-61675-5
$2
doi
035
$a
978-3-030-61675-5
050
4
$a
QA76.9.D343
072
7
$a
UNF
$2
bicssc
072
7
$a
COM021030
$2
bisacsh
072
7
$a
UNF
$2
thema
072
7
$a
UYQE
$2
thema
082
0 4
$a
006.312
$2
23
100
1
$a
Iqbal, Farkhund.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1327406
245
1 0
$a
Machine Learning for Authorship Attribution and Cyber Forensics
$h
[electronic resource] /
$c
by Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
IX, 158 p. 38 illus., 28 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
International Series on Computer Entertainment and Media Technology,
$x
2364-947X
505
0
$a
1. Cybersecurity And Cybercrime Investigation -- 2. Machine Learning Framework For Messaging Forensics -- 3. Header-Level Investigation And Analyzing Network Information -- 4. Authorship Analysis Approaches -- 5. Authorship Analysis - Writeprint Mining For Authorship Attribution -- 6. Authorship Attribution With Few Training Samples -- 7. Authorship Characterization -- 8. Authorship Verification -- 9. Authorship Attribution Using Customized Associative Classification -- 10. Criminal Information Mining -- 11. Artificial Intelligence And Digital Forensics.
520
$a
The book first explores the cybersecurity’s landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law. .
650
0
$a
Data mining.
$3
528622
650
0
$a
Machine learning.
$3
561253
650
0
$a
Computer crimes.
$3
564161
650
1 4
$a
Data Mining and Knowledge Discovery.
$3
677765
650
2 4
$a
Machine Learning.
$3
1137723
650
2 4
$a
Cybercrime.
$3
1109747
700
1
$a
Debbabi, Mourad.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258107
700
1
$a
Fung, Benjamin C. M.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
848104
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030616748
776
0 8
$i
Printed edition:
$z
9783030616762
776
0 8
$i
Printed edition:
$z
9783030616779
830
0
$a
International Series on Computer Entertainment and Media Technology,
$x
2364-947X
$3
1263758
856
4 0
$u
https://doi.org/10.1007/978-3-030-61675-5
912
$a
ZDB-2-SMA
912
$a
ZDB-2-SXMS
950
$a
Mathematics and Statistics (SpringerNature-11649)
950
$a
Mathematics and Statistics (R0) (SpringerNature-43713)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login