A comprehensive study of practical techniques and methodologies in incident-based approaches for cyber forensics

AA Mughal - Tensorgate Journal of Sustainable Technology …, 2019 - research.tensorgate.org
Cyber forensic investigations are vital for identifying, mitigating, and providing evidence in
response to cyber threats and attacks. The incident-based approach offers a flexible and …

Learning stylometric representations for authorship analysis

SHH Ding, BCM Fung, F Iqbal… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Authorship analysis (AA) is the study of unveiling the hidden properties of authors from
textual data. It extracts an author's identity and sociolinguistic characteristics based on the …

Behavioural digital forensics model: Embedding behavioural evidence analysis into the investigation of digital crimes

N Al Mutawa, J Bryce, VNL Franqueira, A Marrington… - Digital …, 2019 - Elsevier
The state-of-the-art and practice show an increased recognition, but limited adoption, of
Behavioural Evidence Analysis (BEA) within the Digital Forensics (DF) investigation …

Authorship attribution using stylometry and machine learning techniques

H Ramnial, S Panchoo, S Pudaruth - Intelligent Systems Technologies and …, 2016 - Springer
Plagiarism is considered to be a highly unethical activity in the academic world. Text-
alignment is currently the preferred technique for estimating the degree of similarity with …

Forensic authorship analysis of microblogging texts using n-grams and stylometric features

NMS Belvisi, N Muhammad… - 2020 8th International …, 2020 - ieeexplore.ieee.org
In recent years, messages and text posted on the Internet are used in criminal investigations.
Unfortunately, the authorship of many of them remains unknown. In some channels, the …

Writer identification using microblogging texts for social media forensics

F Alonso-Fernandez, NMS Belvisi… - … and Identity Science, 2021 - ieeexplore.ieee.org
Establishing authorship of online texts is fundamental to combat cybercrimes. Unfortunately,
text length is limited on some platforms, making the challenge harder. We aim at identifying …

Authorship verification of online messages for forensic investigation

S Nirkhi, RV Dharaskar, VM Thakare - Procedia Computer Science, 2016 - Elsevier
Online messaging provides a convenient and effective means of fast communication. Along
with personal communication it is being used by organizations for official communication …

An improved framework for authorship identification in online messages

L Srinivasan, C Nalini - Cluster Computing, 2019 - Springer
The authorship identification will determine the likelihood of the writing produced, by an
author, by means of examining the other writings. The rapid proliferation of technologies …

Workflow optimization through task redesign in business information processes

R Dewan, A Seidmann, Z Walter - Proceedings of the Thirty …, 1998 - ieeexplore.ieee.org
The academic and professional literature addressing business process reengineering points
at inter-task information flow delays (handoffs) as a major source of processing errors and …

Enhancing E-commerce Security: The Effectiveness of Blockchain Technology in Protecting Against Fraudulent Transactions

SB Dahal - International Journal of Information and …, 2023 - publications.dlpress.org
This study aims to investigate the effectiveness of blockchain technology in securing e-
commerce transactions and protecting against fraud. The study examines the application of …