Machine learning for authorship attribution and cyber forensics
1. Cybersecurity And Cybercrime Investigation -- 2. Machine Learning Framework For Messaging Forensics -- 3. Header-Level Investigation And Analyzing Network Information -- 4. Authorship Analysis Approaches -- 5. Authorship Analysis -- Writeprint Mining For Authorship Attribution -- 6. Authorship At...
Authors: | ; ; |
---|---|
Format: | Electronic/Print Book |
Language: | English |
Published: |
Cham, Switzerland
Springer
[2020]
|
In: | Year: 2020 |
Online Access: |
Table of Contents Volltext (doi) |
Availability in Tübingen: | Present in Tübingen. UB: KB 21 A 2082 |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: | |
Related Items: | Erscheint auch als:
1743799977 |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 1744537453 | ||
003 | DE-627 | ||
005 | 20230428033038.0 | ||
007 | tu | ||
008 | 210113s2020 xx ||||| 00| ||eng c | ||
020 | |a 9783030616748 |c Festeinband : EUR 139.09 (DE) |9 978-3-030-61674-8 | ||
024 | 7 | |a 10.1007/978-3-030-61675-5 |2 doi | |
035 | |a (DE-627)1744537453 | ||
035 | |a (DE-599)KXP1744537453 | ||
035 | |a (OCoLC)1256540165 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
050 | 0 | |a QA76.9.D343 | |
082 | 0 | |a 006.312 | |
084 | |a 2,1 |2 ssgn | ||
084 | |a ST 300 |q DE-B69 |2 rvk |0 (DE-625)rvk/143650: | ||
100 | 1 | |a Iqbal, Farkhund |e VerfasserIn |0 (DE-588)1259926338 |0 (DE-627)1807071391 |4 aut | |
109 | |a Iqbal, Farkhund |a Iqbal, F. | ||
245 | 1 | 0 | |a Machine learning for authorship attribution and cyber forensics |c Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung |
264 | 1 | |a Cham, Switzerland |b Springer |c [2020] | |
264 | 4 | |c © 2020 | |
300 | |a ix, 158 Seiten |b Illustrationen, Diagramme | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
490 | 0 | |a International series on computer entertainment and media technology | |
520 | |a 1. Cybersecurity And Cybercrime Investigation -- 2. Machine Learning Framework For Messaging Forensics -- 3. Header-Level Investigation And Analyzing Network Information -- 4. Authorship Analysis Approaches -- 5. Authorship Analysis -- Writeprint Mining For Authorship Attribution -- 6. Authorship Attribution With Few Training Samples -- 7. Authorship Characterization -- 8. Authorship Verification -- 9. Authorship Attribution Using Customized Associative Classification -- 10. Criminal Information Mining -- 11. Artificial Intelligence And Digital Forensics. | ||
520 | |a The book first explores the cybersecurity's landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |f FID |2 pdager |5 DE-21 | |
650 | 0 | |a Data Mining | |
650 | 0 | |a machine learning | |
650 | 0 | |a Computer crimes | |
689 | 0 | 0 | |d s |0 (DE-588)4193754-5 |0 (DE-627)105224782 |0 (DE-576)21008944X |a Maschinelles Lernen |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4010452-7 |0 (DE-627)106357816 |0 (DE-576)208888128 |a Computerkriminalität |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)4274324-2 |0 (DE-627)104467525 |0 (DE-576)21070585X |a Computersicherheit |2 gnd |
689 | 0 | 3 | |d s |0 (DE-588)4113821-1 |0 (DE-627)105826642 |0 (DE-576)209479604 |a Hacker |2 gnd |
689 | 0 | 4 | |d s |0 (DE-588)4043830-2 |0 (DE-627)104189177 |0 (DE-576)209057513 |a Organisiertes Verbrechen |2 gnd |
689 | 0 | 5 | |d s |0 (DE-588)4428654-5 |0 (DE-627)216935180 |0 (DE-576)212347217 |a Data Mining |2 gnd |
689 | 0 | 6 | |d s |0 (DE-588)4055762-5 |0 (DE-627)106156918 |0 (DE-576)209115289 |a Soziales Netzwerk |2 gnd |
689 | 0 | 7 | |d s |0 (DE-588)4137829-5 |0 (DE-627)105647136 |0 (DE-576)20968092X |a Urheber |2 gnd |
689 | 0 | 8 | |d s |0 (DE-588)4310355-8 |0 (DE-627)124244238 |0 (DE-576)211125385 |a Agent |g Künstliche Intelligenz |2 gnd |
689 | 0 | |5 (DE-627) | |
700 | 1 | |a Debbabi, Mourad |e VerfasserIn |0 (DE-588)1259926796 |0 (DE-627)1807072053 |4 aut | |
700 | 1 | |a Fung, Benjamin C. M. |e VerfasserIn |0 (DE-588)1259927164 |0 (DE-627)1807072673 |4 aut | |
776 | 1 | |z 9783030616755 |c eBook | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |a Iqbal, Farkhund |t Machine Learning for Authorship Attribution and Cyber Forensics |b 1st ed. 2020. |d Cham : Springer International Publishing, 2020 |h 1 Online-Ressource(IX, 158 p. 38 illus., 28 illus. in color.) |w (DE-627)1743799977 |z 9783030616755 |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz1744537453inh.htm |m V:DE-576 |m B:DE-21 |v 20220625193119 |3 Inhaltsverzeichnis |
856 | |u https://doi.org/10.1007/978-3-030-61675-5 |x doi |3 Volltext | ||
936 | r | v | |a ST 300 |b Allgemeines |k Monografien |k Künstliche Intelligenz |k Allgemeines |0 (DE-627)1271119005 |0 (DE-625)rvk/143650: |0 (DE-576)201119005 |
951 | |a BO | ||
ELC | |a 1 |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4128479217 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1744537453 | ||
LOK | |0 005 20220615131434 | ||
LOK | |0 008 220503||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 21 A 2082 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 938 |a 2206 |f 34 | ||
ORI | |a SA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 21 A 2082 |