[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions
R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
[HTML][HTML] Deep learning for anomaly detection in log data: A survey
M Landauer, S Onder, F Skopik… - Machine Learning with …, 2023 - Elsevier
Automatic log file analysis enables early detection of relevant incidents such as system
failures. In particular, self-learning anomaly detection techniques capture patterns in log …
failures. In particular, self-learning anomaly detection techniques capture patterns in log …
Unmanned aerial vehicle (UAV) forensics: the good, the bad, and the unaddressed
Abstract Unmanned Aerial Vehicles (UAVs) have been used for a variety of purposes
including taking photographs and videos of large areas, undertaking environmental surveys …
including taking photographs and videos of large areas, undertaking environmental surveys …
Formal concept analysis approach to understand digital evidence relationships
The number of cyber attacks is constantly increasing daily, which demands organizations to
respond quickly and adequately to security incidents. Digital forensics plays an essential …
respond quickly and adequately to security incidents. Digital forensics plays an essential …
[HTML][HTML] Beyond timestamps: Integrating implicit timing information into digital forensic timelines
LM Dreier, C Vanini, CJ Hargreaves, F Breitinger… - Forensic Science …, 2024 - Elsevier
Generating timelines, ie, sorting events by their respective timestamps, is an essential
technique commonly used in digital forensic investigations. But timestamps are not the only …
technique commonly used in digital forensic investigations. But timestamps are not the only …
Transformer-based Sentiment Analysis for Anomaly Detection on Drone Forensic Timeline
S Silalahi, T Ahmad… - 2023 11th International …, 2023 - ieeexplore.ieee.org
An IoT device such as a drone is constantly generating log records to store every event that
happens to the drone during a flight. In case the drone encounters a problem or experiences …
happens to the drone during a flight. In case the drone encounters a problem or experiences …
Rule-based entity recognition for forensic timeline
H Studiawan, MF Hasan… - 2023 Conference on …, 2023 - ieeexplore.ieee.org
In digital forensics, the sequence of all events in a forensic image needs to be analyzed.
Building a forensic timeline is one of the possible techniques. Naturally, the forensic timeline …
Building a forensic timeline is one of the possible techniques. Naturally, the forensic timeline …
Drone Flight Log Anomaly Severity Classification via Sentence Embedding
S Silalahi, T Ahmad… - … Conference on Artificial …, 2023 - ieeexplore.ieee.org
Log-based anomaly detection is one of the popular research topics in the cybersecurity
domain. Typically, the log event classification target is only separated into two classes …
domain. Typically, the log event classification target is only separated into two classes …
Log Anomaly Detection by Leveraging LLM-Based Parsing and Embedding with Attention Mechanism
During the software operation phase, automated log analysis is crucial for the early
detection of anomalies to prevent critical incidents, like system failure. Learning-based …
detection of anomalies to prevent critical incidents, like system failure. Learning-based …
[PDF][PDF] The analysis of digital evidence by Formal concept analysis.
An increasing number of cyberattacks puts a rising demand on the security analysts and
teams for security incident response. In this paper, we focus on connections and …
teams for security incident response. In this paper, we focus on connections and …