Listing 1 - 6 of 6 |
Sort by
|
Choose an application
This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big data reduction, and evidence and intelligence extraction methods. Further, it includes the experimental results on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.
Computer crimes --- Big data. --- Investigation. --- Computer science. --- Forensic science. --- Computer security. --- Application software. --- Computers. --- Law and legislation. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Forensic Science. --- Legal Aspects of Computing. --- Computer Appl. in Social and Behavioral Sciences. --- Data sets, Large --- Large data sets --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Criminal investigation --- Data sets --- Forensic medicine. --- Computers --- Social sciences --- Data processing. --- Forensic medicine --- Injuries (Law) --- Jurisprudence, Medical --- Legal medicine --- Forensic sciences --- Medicine --- Medical laws and legislation --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cyberspace --- Protection --- Security measures --- Law and legislation --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Criminalistics --- Forensic science --- Science --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big digital forensic data analysis for evidence and intelligence. It includes the results of experiments on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.
Social sciences (general) --- Demography --- Legal medicine --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- gerechtelijk onderzoek --- analytische chemie --- big data --- biochemie --- informatica --- sociale wetenschappen --- informatiesystemen --- gerechtelijke geneeskunde --- computerbeveiliging --- computercriminaliteit --- Computer security. --- Application software. --- Forensic science. --- Computers. --- Law and legislation. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Forensic Science. --- Legal Aspects of Computing. --- Computer Appl. in Social and Behavioral Sciences.
Choose an application
This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big digital forensic data analysis for evidence and intelligence. It includes the results of experiments on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.
Social sciences (general) --- Demography --- Legal medicine --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- gerechtelijk onderzoek --- analytische chemie --- big data --- biochemie --- informatica --- sociale wetenschappen --- informatiesystemen --- gerechtelijke geneeskunde --- computerbeveiliging --- computercriminaliteit
Choose an application
This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big data reduction, and evidence and intelligence extraction methods. Further, it includes the experimental results on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.
Social sciences (general) --- Demography --- Legal medicine --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- gerechtelijk onderzoek --- analytische chemie --- big data --- biochemie --- informatica --- sociale wetenschappen --- informatiesystemen --- gerechtelijke geneeskunde --- computerbeveiliging --- computercriminaliteit
Choose an application
This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electronic security and intelligence.
Engineering. --- Artificial intelligence. --- Computational intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Intelligence, Computational --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Construction --- Artificial intelligence --- Soft computing --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Industrial arts --- Technology --- Computer security --- Computer crimes --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Artificial Intelligence.
Choose an application
This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electronic security and intelligence.
Listing 1 - 6 of 6 |
Sort by
|