DOI: 10.1007/978-3-540-85933-8_4
|View full text |Cite
|
Sign up to set email alerts
|

A Term Distribution Visualization Approach to Digital Forensic String Search

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Because data mining approach alone is probably not enough, there has been research to apply visual data exploration or visual mining to network management and security . Visual analytics is a meaningful presentation of data in a visually appealing way, whether using tables, plots, charts, graphs, or any innovative views that can aid knowledge discovery process.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Because data mining approach alone is probably not enough, there has been research to apply visual data exploration or visual mining to network management and security . Visual analytics is a meaningful presentation of data in a visually appealing way, whether using tables, plots, charts, graphs, or any innovative views that can aid knowledge discovery process.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, data mining approaches generally are unable to eliminate high error rates (false positives/negatives). Most importantly, there is a socalled semantic gap between the data mining results and decision-making, for example, what does the anomaly mean and what is the reason or cause behind the anomaly.Because data mining approach alone is probably not enough, there has been research to apply visual data exploration or visual mining [4] to network management and security [5][6][7][8]. Visual analytics is a meaningful presentation of data in a visually appealing way, whether using tables, plots, charts, graphs, or any innovative views that can aid knowledge discovery process.…”
mentioning
confidence: 99%
“…We have already done some preliminary work on applying this visualization model to the problem of digital forensic string search [15], and we foresee many more possible applications in the field of information security. Other applications to be pursued include the use of these visualizations for conventional text search tasks as was done in [7], and for trend analysis as has been explored in [9] and [5].…”
Section: Case Studies and Applicationsmentioning
confidence: 99%
“…While this method does assist in locating files with unusual metadata characteristics, the issue we are investigating requires inspection of the file's contents. For looking at file contents, Schwartz and Liebrock [18] provide a histogram-like version of Tile-Bars [12] for finding the distribution of search strings across a disk image. Their visualization is based upon a priori strings (i.e., ones provided by the user), and is thus less beneficial when searching for evidence beyond that initial set.…”
Section: Related Workmentioning
confidence: 99%