𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Machine Learning for Authorship Attribution and Cyber Forensics

✍ Scribed by Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung


Publisher
Springer International Publishing;Springer
Year
2020
Tongue
English
Leaves
163
Series
International Series on Computer Entertainment and Media Technology
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The book first explores the cybersecurity’s landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes.

Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals.

Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law.


✦ Table of Contents


Front Matter ....Pages i-ix
Cybersecurity And Cybercrime Investigation (Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung)....Pages 1-21
Messaging Forensics In Perspective (Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung)....Pages 23-36
Analyzing Network Level Information (Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung)....Pages 37-44
Authorship Analysis Approaches (Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung)....Pages 45-56
Writeprint Mining For Authorship Attribution (Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung)....Pages 57-74
Authorship Attribution With Few Training Samples (Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung)....Pages 75-87
Authorship Characterization (Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung)....Pages 89-94
Authorship Verification (Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung)....Pages 95-103
Authorship Attribution Using Customized Associative Classification (Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung)....Pages 105-120
Criminal Information Mining (Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung)....Pages 121-137
Artificial Intelligence And Digital Forensics (Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung)....Pages 139-150
Back Matter ....Pages 151-158

✦ Subjects


Computer Science; Data Mining and Knowledge Discovery; Cybercrime


πŸ“œ SIMILAR VOLUMES


Machine Learning Methods for Stylometry:
✍ Jacques Savoy πŸ“‚ Library πŸ“… 2020 πŸ› Springer 🌐 English

This book presents methods and approaches used to identify the true author of a doubtful document or text excerpt. It provides a broad introduction to all text categorization problems (like authorship attribution, psychological traits of the author, detecting fake news, etc.) grounded in stylistic f

Machine Learning Methods for Stylometry:
✍ Jacques Savoy πŸ“‚ Library πŸ“… 2020 πŸ› Springer International Publishing;Springer 🌐 English

<p><p>This book presents methods and approaches used to identify the true author of a doubtful document or text excerpt. It provides a broad introduction to all text categorization problems (like authorship attribution, psychological traits of the author, detecting fake news, etc.) grounded in styli

Social Network Forensics, Cyber Security
✍ P. Venkata Krishna, Sasikumar Gurumoorthy, Mohammad S. Obaidat πŸ“‚ Library πŸ“… 2019 πŸ› Springer Singapore 🌐 English

<p><p>This book discusses the issues and challenges in Online Social Networks (OSNs). It highlights various aspects of OSNs consisting of novel social network strategies and the development of services using different computing models. Moreover, the book investigates how OSNs are impacted by cutting

Confluence of AI, Machine, and Deep Lear
✍ Sanjay Misra (editor), Chamundeswari Arumugam (editor), Suresh Jaganathan (edito πŸ“‚ Library πŸ“… 2020 πŸ› Information Science Reference 🌐 English

Developing a knowledge model helps to formalize the difficult task of analyzing crime incidents in addition to preserving and presenting the digital evidence for legal processing. The use of data analytics techniques to collect evidence assists forensic investigators in following the standard set of

Machine Learning for Cyber Security
✍ Preeti Malik, Lata Nautiyal, Mangey Ram πŸ“‚ Library πŸ“… 2022 πŸ› De Gruyter 🌐 English

<p><span>Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical model

Machine Learning for Cyber Security
πŸ“‚ Library πŸ“… 2023 πŸ› Springer International Publishing 🌐 English

<div>The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed</div><div>proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China.</div><div></div><div>The 100