Network security and digital forensics using deep learning.

Gespeichert in:
Bibliographische Detailangaben
Titel: Network security and digital forensics using deep learning.
Autoren: Ahmad, Syed Shabbeer, Shailaja, M., Latha, S. Bhargavi, Bethu, Srikanth, Varaprasad, Srisailapu D.
Quelle: AIP Conference Proceedings; 2023, Vol. 2938 Issue 1, p1-10, 10p
Schlagwörter: DIGITAL forensics, COMPUTER network security, DEEP learning, TECHNOLOGICAL innovations, ELECTRONIC evidence, FRAUD
Abstract: Information era (IT) is the fastest-developing enterprise global over the last few decades. It has performed a large function in unravelling the fraud case and getting ready the excessive instances in the justice system.IT era has grown to be a vital device for analyzing and collecting digital evidence. Computer forensics performs a critical function due to the fact the price of crime is growing at an alarming price. If you need to lessen crime and convey criminals to justice, laptop forensics performs a vital function. It has grown to be extra green and transportable as an end result of latest technological advancements. Every day, a big quantity of facts is stored and accessed. The accrued personal facts are being saved in numerous technologically superior gadgets. These gadgets can nonetheless be moved and reached with an unmarried click on or possibly a voice command. In order to convict the perpetrators, it's far vital to have such vast facts; however, so as for the recovered statistics to be admissible in court, investigators have to shield its confidentiality. The protection mechanism for such facts profits momentum due to this. Virtual forensics encompasses the sports of digital file collection, evaluation, research, and reporting. Here, we offer a evaluate of the maximum latest research within side the area of video forensic evaluation. [ABSTRACT FROM AUTHOR]
Copyright of AIP Conference Proceedings is the property of American Institute of Physics and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Datenbank: Complementary Index
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Ahmad%20SS
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edb
DbLabel: Complementary Index
An: 174420931
RelevancyScore: 980
AccessLevel: 6
PubType: Conference
PubTypeId: conference
PreciseRelevancyScore: 980.440002441406
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Network security and digital forensics using deep learning.
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Ahmad%2C+Syed+Shabbeer%22">Ahmad, Syed Shabbeer</searchLink><br /><searchLink fieldCode="AR" term="%22Shailaja%2C+M%2E%22">Shailaja, M.</searchLink><br /><searchLink fieldCode="AR" term="%22Latha%2C+S%2E+Bhargavi%22">Latha, S. Bhargavi</searchLink><br /><searchLink fieldCode="AR" term="%22Bethu%2C+Srikanth%22">Bethu, Srikanth</searchLink><br /><searchLink fieldCode="AR" term="%22Varaprasad%2C+Srisailapu+D%2E%22">Varaprasad, Srisailapu D.</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: AIP Conference Proceedings; 2023, Vol. 2938 Issue 1, p1-10, 10p
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22DIGITAL+forensics%22">DIGITAL forensics</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+network+security%22">COMPUTER network security</searchLink><br /><searchLink fieldCode="DE" term="%22DEEP+learning%22">DEEP learning</searchLink><br /><searchLink fieldCode="DE" term="%22TECHNOLOGICAL+innovations%22">TECHNOLOGICAL innovations</searchLink><br /><searchLink fieldCode="DE" term="%22ELECTRONIC+evidence%22">ELECTRONIC evidence</searchLink><br /><searchLink fieldCode="DE" term="%22FRAUD%22">FRAUD</searchLink>
– Name: Abstract
  Label: Abstract
  Group: Ab
  Data: Information era (IT) is the fastest-developing enterprise global over the last few decades. It has performed a large function in unravelling the fraud case and getting ready the excessive instances in the justice system.IT era has grown to be a vital device for analyzing and collecting digital evidence. Computer forensics performs a critical function due to the fact the price of crime is growing at an alarming price. If you need to lessen crime and convey criminals to justice, laptop forensics performs a vital function. It has grown to be extra green and transportable as an end result of latest technological advancements. Every day, a big quantity of facts is stored and accessed. The accrued personal facts are being saved in numerous technologically superior gadgets. These gadgets can nonetheless be moved and reached with an unmarried click on or possibly a voice command. In order to convict the perpetrators, it's far vital to have such vast facts; however, so as for the recovered statistics to be admissible in court, investigators have to shield its confidentiality. The protection mechanism for such facts profits momentum due to this. Virtual forensics encompasses the sports of digital file collection, evaluation, research, and reporting. Here, we offer a evaluate of the maximum latest research within side the area of video forensic evaluation. [ABSTRACT FROM AUTHOR]
– Name: Abstract
  Label:
  Group: Ab
  Data: <i>Copyright of AIP Conference Proceedings is the property of American Institute of Physics and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.)
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=174420931
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.1063/5.0181569
    Languages:
      – Code: eng
        Text: English
    PhysicalDescription:
      Pagination:
        PageCount: 10
        StartPage: 1
    Subjects:
      – SubjectFull: DIGITAL forensics
        Type: general
      – SubjectFull: COMPUTER network security
        Type: general
      – SubjectFull: DEEP learning
        Type: general
      – SubjectFull: TECHNOLOGICAL innovations
        Type: general
      – SubjectFull: ELECTRONIC evidence
        Type: general
      – SubjectFull: FRAUD
        Type: general
    Titles:
      – TitleFull: Network security and digital forensics using deep learning.
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Ahmad, Syed Shabbeer
      – PersonEntity:
          Name:
            NameFull: Shailaja, M.
      – PersonEntity:
          Name:
            NameFull: Latha, S. Bhargavi
      – PersonEntity:
          Name:
            NameFull: Bethu, Srikanth
      – PersonEntity:
          Name:
            NameFull: Varaprasad, Srisailapu D.
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 05
              M: 12
              Text: 2023
              Type: published
              Y: 2023
          Identifiers:
            – Type: issn-print
              Value: 0094243X
          Numbering:
            – Type: volume
              Value: 2938
            – Type: issue
              Value: 1
          Titles:
            – TitleFull: AIP Conference Proceedings
              Type: main
ResultId 1