Listing 1 - 4 of 4 |
Sort by
|
Choose an application
This book constitutes the thoroughly refereed post-workshop proceedings at PAKDD Workshops 2018, held in conjunction with the 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2018, in Melbourne, Australia, in June 2018. The 32 revised papers presented were carefully reviewed and selected from 46 submissions. The workshops affiliated with PAKDD 2018 include: Workshop on Big Data Analytics for Social Computing, BDASC, Australasian Workshop on Machine Learning for Cyber-security, ML4Cyber, Workshop on Biologically-inspired Techniques for Knowledge Discovery and Data Mining, BDM, Pacific Asia Workshop on Intelligence and Security Informatics, PAISI, and Workshop on Data Mining for Energy Modeling and Optimization, DaMEMO.
Artificial intelligence. --- Data mining. --- Computer security. --- Social sciences --- Computer Communication Networks. --- Artificial Intelligence. --- Data Mining and Knowledge Discovery. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Computer Appl. in Social and Behavioral Sciences. --- Data processing. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Protection --- Security measures --- Data mining --- Application software. --- Computer communication systems. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Distributed processing
Choose an application
The book first explores the cybersecurity’s landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law. .
Data mining. --- Machine learning. --- Computer crimes. --- Data Mining and Knowledge Discovery. --- Machine Learning. --- Cybercrime. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Learning, Machine --- Artificial intelligence --- Machine theory --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching
Choose an application
Criminal law. Criminal procedure --- Programming --- Information systems --- Computer. Automation --- programmeren (informatica) --- computercriminaliteit --- data acquisition
Choose an application
The book first explores the cybersecurity’s landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law. .
Criminal law. Criminal procedure --- Programming --- Information systems --- Computer. Automation --- programmeren (informatica) --- computercriminaliteit --- data acquisition
Listing 1 - 4 of 4 |
Sort by
|