2010
DOI: 10.7763/ijet.2010.v2.140
|View full text |Cite
|
Sign up to set email alerts
|

A Data Mining Approach for Data Generation and Analysis for Digital Forensic Application

Abstract: Abstract-With the rapid advancements in information and communication technology in the world, crimes committed are becoming technically intensive. When crimes committed use digital devices, forensic examiners have to adopt practical frameworks and methods to recover data for analysis which can pose as evidence. Data Generation, Data Warehousing and Data Mining, are the three essential features involved in the investigation process. This paper proposes a unique way of generating, storing and analyzing data, re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 4 publications
0
9
0
1
Order By: Relevance
“…Data mining techniques can extract implicit in where people are not known in advance, but is potentially useful information and knowledge from fuzzy, large, noisy, random, incomplete data. How to apply data mining techniques to analysis of electronic evidence in the massive data through computer forensics associate analysis and find evidence of computer crimes, assisting public security authorities for combating and prevention of computer crime [3], is the critic issue described in the research objectives. As technology advances, though some of the original crime will disappear and some new type of crime will continue to appear, the criminal record in the recordset will be constantly updated, and the relationship among the project also will be changed and continuous generation of new association rules, the outdated crime cannot be ignored because it maybe appear by the other form.…”
Section: Introductionmentioning
confidence: 99%
“…Data mining techniques can extract implicit in where people are not known in advance, but is potentially useful information and knowledge from fuzzy, large, noisy, random, incomplete data. How to apply data mining techniques to analysis of electronic evidence in the massive data through computer forensics associate analysis and find evidence of computer crimes, assisting public security authorities for combating and prevention of computer crime [3], is the critic issue described in the research objectives. As technology advances, though some of the original crime will disappear and some new type of crime will continue to appear, the criminal record in the recordset will be constantly updated, and the relationship among the project also will be changed and continuous generation of new association rules, the outdated crime cannot be ignored because it maybe appear by the other form.…”
Section: Introductionmentioning
confidence: 99%
“…Pandeya S.N and Usha L (23) et.al., Mannich condensation on 3-sulfadiazinylsarion in the presence of formaldehyde and secondary furnished 3-aminomethyl analogs which were evaluated as antimicrobial agents. (27) Bhat AR Shenoy G.G and have reported the synthesis, antibacterial and antiviral activities of isatin derivatives. Sridhar S.K 28 et.al., Isatins have been reacted with 3-(4-pyridyl)-4-amino-5-mercapto-4H-1,2,4-triazole to from Schiff bases and the N-Mannich bases of these compounds were synthesized by reacting them with formaldehyde and several secondary amines.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Hao and Lizhu [10] defined a stopword list in Chinese language which was based on weighted Chi-squared statistic. Association rule mining using Genetic Algorithm is used in the papers [11], [12], [13].…”
Section: Related Workmentioning
confidence: 99%