[go: up one dir, main page]

Kim et al., 2024 - Google Patents

AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics.

Kim et al., 2024

View PDF
Document ID
16991010906344657859
Author
Kim J
Son B
Yu J
Yun J
Publication year
Publication venue
Computers, Materials & Continua

External Links

Snippet

Digital forensics aims to uncover evidence of cybercrimes within compromised systems. These cybercrimes are often perpetrated through the deployment of malware, which inevitably leaves discernible traces within the compromised systems. Forensic analysts are …
Continue reading at cdn.techscience.press (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6228Selecting the most significant subset of features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • G06K9/00771Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity

Similar Documents

Publication Publication Date Title
Van Ede et al. Deepcase: Semi-supervised contextual analysis of security events
Khraisat et al. Survey of intrusion detection systems: techniques, datasets and challenges
WO2020040878A1 (en) Enhancing cybersecurity and operational monitoring with alert confidence assignments
US20100192222A1 (en) Malware detection using multiple classifiers
CN119254489B (en) Information network security self-defense method and system based on trusted computing
Downing et al. {DeepReflect}: Discovering malicious functionality through binary reconstruction
CN105516127A (en) Internal threat detection-oriented user cross-domain behavior pattern mining method
Liu et al. Unsupervised insider detection through neural feature learning and model optimisation
Poudyal et al. Malware analytics: Review of data mining, machine learning and big data perspectives
Xiao Malware cyber threat intelligence system for internet of things (IoT) using machine learning
Babu et al. Network intrusion detection using machine learning algorithms
Fettaya et al. Detecting malicious PDF using CNN
Sharif et al. Drsec: Flexible distributed representations for efficient endpoint security
Masabo et al. Improvement of malware classification using hybrid feature engineering
Wang et al. Malware detection using cnn via word embedding in cloud computing infrastructure
Guemmah et al. A review and synthesis for framing the use of artificial intelligence in cybersecurity
Sallay et al. Intrusion detection alert management for high‐speed networks: current researches and applications
Mambetov et al. DETECTION AND CLASSIFICATION OF THREATS AND VULNERABILITIES ON HACKER FORUMS BASED ON MACHINE LEARNING.
Kim et al. AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics.
AbuAlghanam et al. Android Malware Detection System Based on Ensemble Learning
Luh et al. Advanced threat intelligence: detection and classification of anomalous behavior in system processes
Wendt AI for Defense
Bartoszewski Machine learning and anomaly detection for insider threat detection
Xu et al. [Retracted] IoT‐Oriented Distributed Intrusion Detection Methods Using Intelligent Classification Algorithms in Spark
Gagulic et al. Ransomware detection with machine learning in storage systems