Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence
暂无分享,去创建一个
[1] A. R. Gupta,et al. A Comparative Analysis of Cognitive Systems for the Prediction of Drillability of Rocks and Wear Factor , 2006 .
[2] Jatiya Kabi,et al. Performance Study of TDNN Training Algorithm for Speech Recognition , 2014 .
[3] E. Lievens. Bullying and sexting in social networks: Protecting minors from criminal acts or empowering minors to cope with risky behaviour? , 2014 .
[4] K. Gnana Sheela,et al. Review on Methods to Fix Number of Hidden Neurons in Neural Networks , 2013 .
[5] Frank Breitinger,et al. Availability of datasets for digital forensics - And what is missing , 2017, Digit. Investig..
[6] Wayan Suparta,et al. Adaptive Neuro-Fuzzy Interference System , 2016 .
[7] Martin T. Hagan,et al. Gauss-Newton approximation to Bayesian learning , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).
[8] Jyh-Shing Roger Jang,et al. ANFIS: adaptive-network-based fuzzy inference system , 1993, IEEE Trans. Syst. Man Cybern..
[9] Christoforos Ntantogian,et al. Evaluating the privacy of Android mobile applications under forensic analysis , 2014, Comput. Secur..
[10] S. Ferrari,et al. Network models of criminal behavior , 2008, IEEE Control Systems.
[11] Yaochu Jin,et al. Advanced fuzzy systems design and applications , 2003, Studies in Fuzziness and Soft Computing.
[12] Paulo J. G. Lisboa,et al. Interpretability in Machine Learning - Principles and Practice , 2013, WILF.
[13] José M. Alonso,et al. Interpretability of Fuzzy Systems: Current Research Trends and Prospects , 2015, Handbook of Computational Intelligence.
[14] Rhonda N. McEwen. Tools of the trade: Drugs, law and mobile phones in Canada , 2011, New Media Soc..
[15] Alan K. Goodboy,et al. The personality profile of a cyberbully: Examining the Dark Triad , 2015, Comput. Hum. Behav..
[16] Edmundo Monteiro,et al. Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic Evidence , 2017, ICDF2C.
[17] Jesus Mena,et al. Investigative Data Mining for Security and Criminal Detection , 2002 .
[18] J. Fleetwood. Keeping out of trouble: Female crack cocaine dealers in England , 2014 .
[19] Arka Ghosh,et al. Hybrid Optimized Back propagation Learning Algorithm For Multi-layer Perceptron , 2012, ArXiv.
[20] K. P. Sudheer,et al. Artificial Neural Network Modeling for Groundwater Level Forecasting in a River Island of Eastern India , 2010 .
[21] Jeff Heaton,et al. Introduction to Neural Networks for C#, 2nd Edition , 2008 .
[22] Marco Strano. A Neural Network Applied to Criminal Psychological Profiling: An Italian Initiative , 2004, International journal of offender therapy and comparative criminology.
[23] Marcus K. Rogers. The role of criminal profiling in the computer forensics process , 2003, Comput. Secur..
[24] Peter K. Smith,et al. Cyberbullying: its nature and impact in secondary school pupils. , 2008, Journal of child psychology and psychiatry, and allied disciplines.
[25] K. Gunavathi,et al. Lung cancer classification using neural networks for CT images , 2014, Comput. Methods Programs Biomed..
[26] Jilali Antari,et al. Identification and Prediction of Internet Traffic Using Artificial Neural Networks , 2010, J. Intell. Learn. Syst. Appl..
[27] Paulo Simões,et al. From Fuzziness to Criminal Investigation: An Inference System for Mobile Forensics , 2017 .
[28] Gaurang Panchal,et al. Behaviour Analysis of Multilayer Perceptrons with Multiple Hidden Neurons and Hidden Layers , 2011 .
[29] Marcus K. Rogers. Psychological profiling as an investigative tool for digital forensics , 2016 .
[30] Steven Furnell,et al. Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions , 2013, 2013 Information Security for South Africa.
[31] Aziz Mohaisen,et al. Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information , 2015, Digit. Investig..
[32] Roberto Battiti,et al. First- and Second-Order Methods for Learning: Between Steepest Descent and Newton's Method , 1992, Neural Computation.
[33] Benjamin Turnbull,et al. Digital Evidence on Mobile Devices , 2011 .
[34] J. Maguire,et al. Sexting: Youth Practices and Legal Implications , 2010 .
[35] Matthew W. Savage,et al. Prevalence and Predictors of Cyberbullying Perpetration by High School Seniors , 2014 .
[36] Mike Hough,et al. Drug markets and distribution systems , 2004 .
[37] Orkhan Baghirli,et al. Comparison of Lavenberg-Marquardt, Scaled Conjugate Gradient and Bayesian Regularization Backpropagation Algorithms for Multistep Ahead Wind Speed Forecasting Using Multilayer Perceptron Feedforward Neural Network , 2015 .
[38] Georgios Kambourakis,et al. A critical review of 7 years of Mobile Device Forensics , 2013, Digit. Investig..
[39] Rusli,et al. Feedforward Neural Network Trained by BFGS Algorithm for Modeling Plasma Etching of Silicon Carbide , 2010, IEEE Transactions on Plasma Science.
[40] Paulo Simões,et al. Current and Future Trends in Mobile Device Forensics , 2018, ACM Computing Surveys.
[41] Jonathan L. Ticknor. A Bayesian regularized artificial neural network for stock market forecasting , 2013, Expert Syst. Appl..
[42] Hao Yu,et al. Improved Computation for Levenberg–Marquardt Training , 2010, IEEE Transactions on Neural Networks.
[43] Martin A. Riedmiller,et al. Advanced supervised learning in multi-layer perceptrons — From backpropagation to adaptive learning algorithms , 1994 .
[44] B. Pradhan,et al. Landslide susceptibility assessment in the Hoa Binh province of Vietnam: A comparison of the Levenberg–Marquardt and Bayesian regularized neural networks , 2012 .
[45] James Martin,et al. Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’ , 2014 .
[46] T. S. Letia,et al. Training neural networks for construction of informatics offender profile , 2010, 2010 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR).
[47] Alastair R. Beresford,et al. Device Analyzer: Understanding Smartphone Usage , 2013, MobiQuitous.
[48] Dave Winkler,et al. Bayesian Regularization of Neural Networks , 2009, Artificial Neural Networks.
[49] Kim-Kwang Raymond Choo,et al. Pervasive social networking forensics: Intelligence and evidence from mobile device extracts , 2017, J. Netw. Comput. Appl..
[50] Dimitrios Kasiaras,et al. Android forensics: Correlation analysis , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).
[51] T. Kathirvalavakumar,et al. Pruning algorithms of neural networks — a comparative study , 2013, Central European Journal of Computer Science.
[52] M. Natarajan. Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data , 2006 .
[53] K. P. Chow,et al. An Empirical Study Profiling Internet Pirates , 2013, IFIP Int. Conf. Digital Forensics.
[54] R. Fletcher. Practical Methods of Optimization , 1988 .
[55] N. K. Treadgold. THE SARPROP ALGORITHM: A SIMULATED ANNEALING ENHANCEMENT TO RESILIENT BACK PROPAGATION , 1996 .
[56] Larry S. Miller,et al. The Electronic Crime Scene , 2014 .