[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

[HTML][HTML] Deep learning for anomaly detection in log data: A survey

M Landauer, S Onder, F Skopik… - Machine Learning with …, 2023 - Elsevier
Automatic log file analysis enables early detection of relevant incidents such as system
failures. In particular, self-learning anomaly detection techniques capture patterns in log …

Unmanned aerial vehicle (UAV) forensics: the good, the bad, and the unaddressed

H Studiawan, G Grispos, KKR Choo - Computers & Security, 2023 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) have been used for a variety of purposes
including taking photographs and videos of large areas, undertaking environmental surveys …

Formal concept analysis approach to understand digital evidence relationships

P Sokol, Ľ Antoni, O Krídlo, E Marková… - International Journal of …, 2023 - Elsevier
The number of cyber attacks is constantly increasing daily, which demands organizations to
respond quickly and adequately to security incidents. Digital forensics plays an essential …

[HTML][HTML] Beyond timestamps: Integrating implicit timing information into digital forensic timelines

LM Dreier, C Vanini, CJ Hargreaves, F Breitinger… - Forensic Science …, 2024 - Elsevier
Generating timelines, ie, sorting events by their respective timestamps, is an essential
technique commonly used in digital forensic investigations. But timestamps are not the only …

Transformer-based Sentiment Analysis for Anomaly Detection on Drone Forensic Timeline

S Silalahi, T Ahmad… - 2023 11th International …, 2023 - ieeexplore.ieee.org
An IoT device such as a drone is constantly generating log records to store every event that
happens to the drone during a flight. In case the drone encounters a problem or experiences …

Rule-based entity recognition for forensic timeline

H Studiawan, MF Hasan… - 2023 Conference on …, 2023 - ieeexplore.ieee.org
In digital forensics, the sequence of all events in a forensic image needs to be analyzed.
Building a forensic timeline is one of the possible techniques. Naturally, the forensic timeline …

Drone Flight Log Anomaly Severity Classification via Sentence Embedding

S Silalahi, T Ahmad… - … Conference on Artificial …, 2023 - ieeexplore.ieee.org
Log-based anomaly detection is one of the popular research topics in the cybersecurity
domain. Typically, the log event classification target is only separated into two classes …

Log Anomaly Detection by Leveraging LLM-Based Parsing and Embedding with Attention Mechanism

A Fariha, V Gharavian, M Makrehchi… - 2024 IEEE Canadian …, 2024 - ieeexplore.ieee.org
During the software operation phase, automated log analysis is crucial for the early
detection of anomalies to prevent critical incidents, like system failure. Learning-based …

[PDF][PDF] The analysis of digital evidence by Formal concept analysis.

P Sokol, L'ubomír Antoni, O Krídlo, E Marková… - CLA, 2022 - ceur-ws.org
An increasing number of cyberattacks puts a rising demand on the security analysts and
teams for security incident response. In this paper, we focus on connections and …