Diverging deep learning cognitive computing techniques into cyber forensics
暂无分享,去创建一个
[1] Erik Cambria,et al. Recent Trends in Deep Learning Based Natural Language Processing , 2017, IEEE Comput. Intell. Mag..
[2] Jiajun Wu,et al. Deep multiple instance learning for image classification and auto-annotation , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[3] Hein S. Venter,et al. Harmonised digital forensic investigation process model , 2012, 2012 Information Security for South Africa.
[4] Fabio Roli,et al. Machine learning in computer forensics (and the lessons learned from machine learning in computer security) , 2011, AISec '11.
[5] Nickson M. Karie,et al. Towards a framework for enhancing potential digital evidence presentation , 2013, 2013 Information Security for South Africa.
[6] Dianne Easterling,et al. March , 1890, The Hospital.
[7] Tang Ling. The Study of Computer Forensics on Linux , 2013, 2013 International Conference on Computational and Information Sciences.
[8] Sateesh Kumar Pradhan,et al. Applying Data Mining techniques in Cyber Crimes , 2017, 2017 2nd International Conference on Anti-Cyber Crimes (ICACC).
[9] Chung-Huang Yang,et al. Fast Deployment of Computer Forensics with USBs , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[10] Jianfeng Wang,et al. Kernel-based deep learning for intelligent data analysis , 2017, 2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS).
[11] Todd-Malmlov. April , 1872, The Hospital.
[12] Hüseyin Çakir,et al. Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review , 2015, ArXiv.
[13] Parag H Rughani,et al. MACHINE LEARNING FORENSICS:A NEW BRANCH OF DIGITAL FORENSICS , 2017 .
[14] Angshul Majumdar,et al. Noisy deep dictionary learning: Application to Alzheimer's Disease classification , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[15] Yan Zhang,et al. Research on the Key Technology of Secure Computer Forensics , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.
[16] Frank Stewart,et al. June , 1890, The Hospital.
[17] Danna Zhou,et al. d. , 1934, Microbial pathogenesis.
[18] Mohamed AbdElhamid Abbas,et al. Improving deep learning performance using random forest HTM cortical learning algorithm , 2018, 2018 First International Workshop on Deep and Representation Learning (IWDRL).
[19] Nickson M. Karie,et al. A generic Digital Forensic Readiness model for BYOD using honeypot technology , 2016, 2016 IST-Africa Week Conference.
[20] Lyal B. Harris. November , 1890, The Hospital.
[22] Hein S. Venter,et al. Introduction of concurrent processes into the digital forensic investigation process , 2016 .
[23] N. Sahu,et al. Identify Uncertainty of Cyber Crime and Cyber Laws , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[24] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[25] F. Mitchell,et al. The use of Artificial Intelligence in digital forensics: An introduction , 2014 .