Kim et al., 2024 - Google Patents
AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics.Kim et al., 2024
View PDF- Document ID
- 16991010906344657859
- Author
- Kim J
- Son B
- Yu J
- Yun J
- Publication year
- Publication venue
- Computers, Materials & Continua
External Links
Snippet
Digital forensics aims to uncover evidence of cybercrimes within compromised systems. These cybercrimes are often perpetrated through the deployment of malware, which inevitably leaves discernible traces within the compromised systems. Forensic analysts are …
- 238000012913 prioritisation 0 title description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6228—Selecting the most significant subset of features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00771—Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Van Ede et al. | Deepcase: Semi-supervised contextual analysis of security events | |
Khraisat et al. | Survey of intrusion detection systems: techniques, datasets and challenges | |
WO2020040878A1 (en) | Enhancing cybersecurity and operational monitoring with alert confidence assignments | |
US20100192222A1 (en) | Malware detection using multiple classifiers | |
CN119254489B (en) | Information network security self-defense method and system based on trusted computing | |
Downing et al. | {DeepReflect}: Discovering malicious functionality through binary reconstruction | |
CN105516127A (en) | Internal threat detection-oriented user cross-domain behavior pattern mining method | |
Liu et al. | Unsupervised insider detection through neural feature learning and model optimisation | |
Poudyal et al. | Malware analytics: Review of data mining, machine learning and big data perspectives | |
Xiao | Malware cyber threat intelligence system for internet of things (IoT) using machine learning | |
Babu et al. | Network intrusion detection using machine learning algorithms | |
Fettaya et al. | Detecting malicious PDF using CNN | |
Sharif et al. | Drsec: Flexible distributed representations for efficient endpoint security | |
Masabo et al. | Improvement of malware classification using hybrid feature engineering | |
Wang et al. | Malware detection using cnn via word embedding in cloud computing infrastructure | |
Guemmah et al. | A review and synthesis for framing the use of artificial intelligence in cybersecurity | |
Sallay et al. | Intrusion detection alert management for high‐speed networks: current researches and applications | |
Mambetov et al. | DETECTION AND CLASSIFICATION OF THREATS AND VULNERABILITIES ON HACKER FORUMS BASED ON MACHINE LEARNING. | |
Kim et al. | AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics. | |
AbuAlghanam et al. | Android Malware Detection System Based on Ensemble Learning | |
Luh et al. | Advanced threat intelligence: detection and classification of anomalous behavior in system processes | |
Wendt | AI for Defense | |
Bartoszewski | Machine learning and anomaly detection for insider threat detection | |
Xu et al. | [Retracted] IoT‐Oriented Distributed Intrusion Detection Methods Using Intelligent Classification Algorithms in Spark | |
Gagulic et al. | Ransomware detection with machine learning in storage systems |