SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Al Dhaqm Arafat) "

Sökning: WFRF:(Al Dhaqm Arafat)

  • Resultat 1-9 av 9
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Al-Dhaqm, Arafat, et al. (författare)
  • Digital Forensics Subdomains : The State of the Art and Future Directions
  • 2021
  • Ingår i: IEEE Access. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2169-3536. ; 9, s. 152476-152502
  • Tidskriftsartikel (refereegranskat)abstract
    • For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident. Mainly, traditional digital forensics techniques focus on computer desktops and servers. However, recent advances in digital media and platforms have seen an increased need for the application of digital forensic investigation techniques to other subdomains. This includes mobile devices, databases, networks, cloud-based platforms, and the Internet of Things (IoT) at large. To assist forensic investigators to conduct investigations within these subdomains, academic researchers have attempted to develop several investigative processes. However, many of these processes are domain-specific or describe domain-specific investigative tools. Hence, in this paper, we hypothesize that the literature is saturated with ambiguities. To further synthesize this hypothesis, a digital forensic model-orientated Systematic Literature Review (SLR) within the digital forensic subdomains has been undertaken. The purpose of this SLR is to identify the different and heterogeneous practices that have emerged within the specific digital forensics subdomains. A key finding from this review is that there are process redundancies and a high degree of ambiguity among investigative processes in the various subdomains. As a way forward, this study proposes a high-level abstract metamodel, which combines the common investigation processes, activities, techniques, and tasks for digital forensics subdomains. Using the proposed solution, an investigator can effectively organize the knowledge process for digital investigation.
  •  
2.
  • Al-Dhaqm, Arafat, et al. (författare)
  • A Review of Mobile Forensic Investigation Process Models
  • 2020
  • Ingår i: IEEE Access. - : IEEE. - 2169-3536. ; 8, s. 173359-173375
  • Forskningsöversikt (refereegranskat)abstract
    • Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques. Consequently, increased proliferation, mobile-based services, and the need for new requirements have led to the development of the MF field, which has in the recent past become an area of importance. In this article, the authors take a step to conduct a review on Mobile Forensics Investigation Process Models (MFIPMs) as a step towards uncovering the MF transitions as well as identifying open and future challenges. Based on the study conducted in this article, a review of the literature revealed that there are a few MFIPMs that are designed for solving certain mobile scenarios, with a variety of concepts, investigation processes, activities, and tasks. A total of 100 MFIPMs were reviewed, to present an inclusive and up-to-date background of MFIPMs. Also, this study proposes a Harmonized Mobile Forensic Investigation Process Model (HMFIPM) for the MF field to unify and structure whole redundant investigation processes of the MF field. The paper also goes the extra mile to discuss the state of the art of mobile forensic tools, open and future challenges from a generic standpoint. The results of this study find direct relevance to forensic practitioners and researchers who could leverage the comprehensiveness of the developed processes for investigation.
  •  
3.
  • Al-Dhaqm, Arafat, et al. (författare)
  • Categorization and Organization of Database Forensic Investigation Processes
  • 2020
  • Ingår i: IEEE Access. - : IEEE. - 2169-3536. ; 8, s. 112846-112858
  • Tidskriftsartikel (refereegranskat)abstract
    • Database forensic investigation (DBFI) is an important area of research within digital forensics. It & x2019;s importance is growing as digital data becomes more extensive and commonplace. The challenges associated with DBFI are numerous, and one of the challenges is the lack of a harmonized DBFI process for investigators to follow. In this paper, therefore, we conduct a survey of existing literature with the hope of understanding the body of work already accomplished. Furthermore, we build on the existing literature to present a harmonized DBFI process using design science research methodology. This harmonized DBFI process has been developed based on three key categories (i.e. planning, preparation and pre-response, acquisition and preservation, and analysis and reconstruction). Furthermore, the DBFI has been designed to avoid confusion or ambiguity, as well as providing practitioners with a systematic method of performing DBFI with a higher degree of certainty.
  •  
4.
  • Al-Dhaqm, Arafat, et al. (författare)
  • Face validation of database forensic investigation metamodel
  • 2021
  • Ingår i: Infrastructures. - Basel : MDPI. - 2412-3811. ; 6:2, s. 1-19
  • Tidskriftsartikel (refereegranskat)abstract
    • Using a face validity approach, this paper provides a validation of the Database Forensic Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability, heterogeneity, complexity, and ambiguity in the database forensic investigation (DBFI) field, where several models were identified, collected, and reviewed to develop DBFIM. However, the developed DBFIM lacked the face validity-based approach that could ensure DBFIM’s applicability in the DBFI field. The completeness, usefulness, and logic of the developed DBFIM needed to be validated by experts. Therefore, the objective of this paper is to perform the validation of the developed DBFIM using the qualitative face validity approach. The face validity method is a common way of validating metamodels through subject expert inquiry on the domain application of the metamodel to assess whether the metamodel is reasonable and compatible based on the outcomes. For this purpose, six experts were nominated and selected to validate the developed DBFIM. From the expert review, the developed DBFIM was found to be complete, coherent, logical, scalable, interoperable, and useful for the DBFI field.
  •  
5.
  • Al-Dhaqm, Arafat, et al. (författare)
  • Research Challenges and Opportunities in Drone Forensics Models
  • 2021
  • Ingår i: Electronics. - Switzerland : MDPI. - 2079-9292. ; 10:13
  • Forskningsöversikt (refereegranskat)abstract
    • The emergence of unmanned aerial vehicles (also referred to as drones) has transformed the digital landscape of surveillance and supply chain logistics, especially in terrains where such was previously deemed unattainable. Moreover, the adoption of drones has further led to the proliferation of diverse drone types and drone-related criminality, which has introduced a myriad of security and forensics-related concerns. As a step towards understanding the state-of-the-art research into these challenges and potential approaches to mitigation, this study provides a detailed review of existing digital forensic models using the Design Science Research method. The outcome of this study generated in-depth knowledge of the research challenges and opportunities through which an effective investigation can be carried out on drone-related incidents. Furthermore, a potential generic investigation model has been proposed. The findings presented in this study are essentially relevant to forensic researchers and practitioners towards a guided methodology for drone-related event investigation. Ultimately, it is important to mention that this study presents a background for the development of international standardization for drone forensics.
  •  
6.
  • Al-Dhaqm, Arafat, et al. (författare)
  • Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field
  • 2020
  • Ingår i: IEEE Access. - : IEEE. - 2169-3536. ; 8, s. 145018-145032
  • Tidskriftsartikel (refereegranskat)abstract
    • For every contact that is made in a database, a digital trace will potentially be left and most of the database breaches are mostly aimed at defeating the major security goals (Confidentiality, Integrity, and Authenticity) of data that reside in the database. In order to prove/refute a fact during litigation, it is important to identify suitable investigation techniques that can be used to link a potential incident/suspect to the digital crime. As a result, this paper has proposed suitable steps of constructing and Integrated Incident Response Model (IIRM) that can be relied upon in the database forensic investigation field. While developing the IIRM, design science methodology has been adapted and the outcome of this study has shown significant and promising approaches that could be leveraged by digital forensic experts, legal practitioners and law enforcement agencies. This is owing to the fact, that IIRM construction has followed incident investigation principles that are stipulated in ISO guidelines.
  •  
7.
  • Kebande, Victor R., et al. (författare)
  • Quantifying the need for supervised machine learning in conducting liveforensic analysis of emergent configurations (ECO) in IoT environments
  • 2020
  • Ingår i: Forensic Science International: Reports. - : Elsevier. - 2665-9107. ; 2
  • Tidskriftsartikel (övrigt vetenskapligt/konstnärligt)abstract
    • Machine learning has been shown as a promising approach to mine larger datasets, such as those that comprise datafrom a broad range of Internet of Things devices, across complex environment(s) to solve different problems. Thispaper surveys existing literature on the potential of using supervised classical machine learning techniques, such asK-Nearest Neigbour, Support Vector Machines, Naive Bayes and Random Forest algorithms, in performing livedigital forensics for different IoT configurations. There are also a number of challenges associated with the use ofmachine learning techniques, as discussed in this paper.
  •  
8.
  • Shamshad, Hasib, et al. (författare)
  • Forecasting and Trading of the Stable Cryptocurrencies With Machine Learning and Deep Learning Algorithms for Market Conditions
  • 2023
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 11, s. 122205-122220
  • Tidskriftsartikel (refereegranskat)abstract
    • The digital market trend is rapidly expanding due to key characteristics like decentralization, accessibility, and market diversity enabled by blockchain technology. This study proposes a Predictive Analytics System to provide simplified reporting for the three most popular cryptocurrencies with varying digits, namely ADA Cardano, Ethereum, and Binance coin, for ten days to contribute to this emerging technology. Thus, this proposed system employs a data science-based framework and six highly advanced data-driven Machine learning and Deep learning algorithms: Support Vector Regressor, Auto-Regressive Integrated Moving Average (ARIMA), Facebook Prophet, Unidirectional LSTM, Bidirectional LSTM, Stacked LSTM. Moreover, the research experiments are repeated several times to achieve the best results by employing hyperparameter tuning of each algorithm. This involves selecting an appropriate kernel and suitable data normalization technique for SVR, determining ARIMA's (p, d, q) values, and optimizing the loss function values, number of neurons, hidden layers, and epochs in LSTM models. For the model validation, we utilize widely used evaluation techniques: Mean Absolute Error, Root Mean Squared Error, Mean Absolute Percentage Error, and R-squared. Results demonstrate that ARIMA outperforms the other models in all cases, accurately projecting the price variability within the actual price range. Conversely, Facebook Prophet exhibits good performance to some extent. The paper suggests that the ARIMA technique offers practical implications for market analysts, enabling them to make well-informed decisions based on accurate price projections. © 2013 IEEE.
  •  
9.
  • Yang, Fan, et al. (författare)
  • A Systematic Literature Review of Deep Learning Approaches for Sketch-Based Image Retrieval : Datasets, Metrics, and Future Directions
  • 2024
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 12, s. 14847-14869
  • Forskningsöversikt (refereegranskat)abstract
    • Sketch-based image retrieval (SBIR) utilizes sketches to search for images containing similar objects or scenes. Due to the proliferation of touch-screen devices, sketching has become more accessible and therefore has received increasing attention. Deep learning has emerged as a potential tool for SBIR, allowing models to automatically extract image features and learn from large amounts of data. To the best of our knowledge, there is currently no systematic literature review (SLR) of SBIR with deep learning. Therefore, the aim of this review is to incorporate related works into a systematic study, highlighting the main contributions of individual researchers over the years, with a focus on past, present and future trends. To achieve the purpose of this study, 90 studies from 2016 to June 2023 in 4 databases were collected and analyzed using the Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) framework. The specific models, datasets, evaluation metrics, and applications of deep learning in SBIR are discussed in detail. This study found that Convolutional Neural Networks (CNN) and Generative Adversarial Networks (GAN) are the most widely used deep learning methods for SBIR. A commonly used dataset is Sketchy, especially in the latest Zero-shot sketch-based image retrieval (ZS-SBIR) task. The results show that Mean Average Precision (mAP) is the most commonly used metric for quantitative evaluation of SBIR. Finally, we provide some future directions and guidance for researchers based on the results of this review. © 2013 IEEE.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-9 av 9

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy