Holistic Analytics of Digital Artifacts
Open Access
- 1 September 2021
- journal article
- research article
- Published by IGI Global in International Journal of Digital Crime and Forensics
- Vol. 13 (5), 78-100
- https://doi.org/10.4018/ijdcf.20210901.oa5
Abstract
Investigation of every crime scene with digital evidence is predominantly required in identifying almost all atomic files behind the scenes that have been intentionally scrubbed out. Apart from the data generated across digital devices and the use of diverse technology that slows down the traditional digital forensic investigation strategies. Dynamically scrutinizing the concealed or sparse metadata matches from the less frequent archives of evidence spread across heterogeneous sources and finding their association with other artifacts across the collection is still a horrendous task for the investigators. The effort of this article via unique pockets (UP), unique groups (UG), and unique association (UA) model is to address the exclusive challenges mixed up in identifying incoherent associations that are buried well within the meager metadata field-value pairs. Both the existing similarity models and proposed unique mapping models are verified by the unique metadata association model.Keywords
This publication has 9 references indexed in Scilit:
- A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPUElectronics, 2020
- A semantic-based methodology for digital forensics analysisJournal of Parallel and Distributed Computing, 2020
- Structured optimal graph based sparse feature extraction for semi-supervised learningSignal Processing, 2020
- Cyber forensics framework for big data analytics in IoT environment using machine learningMultimedia Tools and Applications, 2018
- Availability of datasets for digital forensics – And what is missingDigital Investigation, 2017
- Reconstructing Tabbed Browser Sessions Using Metadata AssociationsPublished by Springer Science and Business Media LLC ,2016
- A multimodal approach for extracting content descriptive metadata from lecture videosJournal of Intelligent Information Systems, 2015
- Identifying Cyber Predators through Forensic Authorship Analysis of Chat LogsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation RecoveryIEEE Transactions on Information Forensics and Security, 2011