Network security and digital forensics using deep learning.
Gespeichert in:
| Titel: | Network security and digital forensics using deep learning. |
|---|---|
| Autoren: | Ahmad, Syed Shabbeer, Shailaja, M., Latha, S. Bhargavi, Bethu, Srikanth, Varaprasad, Srisailapu D. |
| Quelle: | AIP Conference Proceedings; 2023, Vol. 2938 Issue 1, p1-10, 10p |
| Schlagwörter: | DIGITAL forensics, COMPUTER network security, DEEP learning, TECHNOLOGICAL innovations, ELECTRONIC evidence, FRAUD |
| Abstract: | Information era (IT) is the fastest-developing enterprise global over the last few decades. It has performed a large function in unravelling the fraud case and getting ready the excessive instances in the justice system.IT era has grown to be a vital device for analyzing and collecting digital evidence. Computer forensics performs a critical function due to the fact the price of crime is growing at an alarming price. If you need to lessen crime and convey criminals to justice, laptop forensics performs a vital function. It has grown to be extra green and transportable as an end result of latest technological advancements. Every day, a big quantity of facts is stored and accessed. The accrued personal facts are being saved in numerous technologically superior gadgets. These gadgets can nonetheless be moved and reached with an unmarried click on or possibly a voice command. In order to convict the perpetrators, it's far vital to have such vast facts; however, so as for the recovered statistics to be admissible in court, investigators have to shield its confidentiality. The protection mechanism for such facts profits momentum due to this. Virtual forensics encompasses the sports of digital file collection, evaluation, research, and reporting. Here, we offer a evaluate of the maximum latest research within side the area of video forensic evaluation. [ABSTRACT FROM AUTHOR] |
| Copyright of AIP Conference Proceedings is the property of American Institute of Physics and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Datenbank: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Ahmad%20SS Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 174420931 RelevancyScore: 980 AccessLevel: 6 PubType: Conference PubTypeId: conference PreciseRelevancyScore: 980.440002441406 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Network security and digital forensics using deep learning. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Ahmad%2C+Syed+Shabbeer%22">Ahmad, Syed Shabbeer</searchLink><br /><searchLink fieldCode="AR" term="%22Shailaja%2C+M%2E%22">Shailaja, M.</searchLink><br /><searchLink fieldCode="AR" term="%22Latha%2C+S%2E+Bhargavi%22">Latha, S. Bhargavi</searchLink><br /><searchLink fieldCode="AR" term="%22Bethu%2C+Srikanth%22">Bethu, Srikanth</searchLink><br /><searchLink fieldCode="AR" term="%22Varaprasad%2C+Srisailapu+D%2E%22">Varaprasad, Srisailapu D.</searchLink> – Name: TitleSource Label: Source Group: Src Data: AIP Conference Proceedings; 2023, Vol. 2938 Issue 1, p1-10, 10p – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22DIGITAL+forensics%22">DIGITAL forensics</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+network+security%22">COMPUTER network security</searchLink><br /><searchLink fieldCode="DE" term="%22DEEP+learning%22">DEEP learning</searchLink><br /><searchLink fieldCode="DE" term="%22TECHNOLOGICAL+innovations%22">TECHNOLOGICAL innovations</searchLink><br /><searchLink fieldCode="DE" term="%22ELECTRONIC+evidence%22">ELECTRONIC evidence</searchLink><br /><searchLink fieldCode="DE" term="%22FRAUD%22">FRAUD</searchLink> – Name: Abstract Label: Abstract Group: Ab Data: Information era (IT) is the fastest-developing enterprise global over the last few decades. It has performed a large function in unravelling the fraud case and getting ready the excessive instances in the justice system.IT era has grown to be a vital device for analyzing and collecting digital evidence. Computer forensics performs a critical function due to the fact the price of crime is growing at an alarming price. If you need to lessen crime and convey criminals to justice, laptop forensics performs a vital function. It has grown to be extra green and transportable as an end result of latest technological advancements. Every day, a big quantity of facts is stored and accessed. The accrued personal facts are being saved in numerous technologically superior gadgets. These gadgets can nonetheless be moved and reached with an unmarried click on or possibly a voice command. In order to convict the perpetrators, it's far vital to have such vast facts; however, so as for the recovered statistics to be admissible in court, investigators have to shield its confidentiality. The protection mechanism for such facts profits momentum due to this. Virtual forensics encompasses the sports of digital file collection, evaluation, research, and reporting. Here, we offer a evaluate of the maximum latest research within side the area of video forensic evaluation. [ABSTRACT FROM AUTHOR] – Name: Abstract Label: Group: Ab Data: <i>Copyright of AIP Conference Proceedings is the property of American Institute of Physics and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=174420931 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1063/5.0181569 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 10 StartPage: 1 Subjects: – SubjectFull: DIGITAL forensics Type: general – SubjectFull: COMPUTER network security Type: general – SubjectFull: DEEP learning Type: general – SubjectFull: TECHNOLOGICAL innovations Type: general – SubjectFull: ELECTRONIC evidence Type: general – SubjectFull: FRAUD Type: general Titles: – TitleFull: Network security and digital forensics using deep learning. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Ahmad, Syed Shabbeer – PersonEntity: Name: NameFull: Shailaja, M. – PersonEntity: Name: NameFull: Latha, S. Bhargavi – PersonEntity: Name: NameFull: Bethu, Srikanth – PersonEntity: Name: NameFull: Varaprasad, Srisailapu D. IsPartOfRelationships: – BibEntity: Dates: – D: 05 M: 12 Text: 2023 Type: published Y: 2023 Identifiers: – Type: issn-print Value: 0094243X Numbering: – Type: volume Value: 2938 – Type: issue Value: 1 Titles: – TitleFull: AIP Conference Proceedings Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science