2017 IEEE Conference on Application, Information and Network Security (AINS) 2017
DOI: 10.1109/ains.2017.8270436
|View full text |Cite
|
Sign up to set email alerts
|

User attribution based on keystroke dynamics in digital forensic readiness process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…The authors also posit that, while ISO/IEC guidelines may not be application‐specific during the cyber forensic investigation process, it is still important to note that, lack of these processes may easily lead to disregarding potential evidence 44,45 . Notably, important objectives that we present in this paper are as follows: Saving costs by achieving forensic preparedness, forensically sound digital evidence is collected thus the sanctity of this evidence is preserved, the integrity of the collected digital data is also maintained thus increased the chances of admissibility.…”
Section: Discussionmentioning
confidence: 99%
“…The authors also posit that, while ISO/IEC guidelines may not be application‐specific during the cyber forensic investigation process, it is still important to note that, lack of these processes may easily lead to disregarding potential evidence 44,45 . Notably, important objectives that we present in this paper are as follows: Saving costs by achieving forensic preparedness, forensically sound digital evidence is collected thus the sanctity of this evidence is preserved, the integrity of the collected digital data is also maintained thus increased the chances of admissibility.…”
Section: Discussionmentioning
confidence: 99%
“…A Decision Tree is one of the most commonly used classification algorithms in the security domain (Berrueta, Morato, Magana, et al, 2019;Molina et al, 2021). Trees provide a rule-based approach to classification, and since security relies on rules, this is often the preferred approach (Adeyemi, Razak, Salleh, et al, 2016;Ernsberger, Ikuesan, Venter, et al, 2017;Mohlala, Ikuesan & Venter, 2018). The parameters used for the DT comprised the quality measure that integrates the Gini Index, with no pruning, and a minimum number of five records per node.…”
Section: Decision Tree (Dt)mentioning
confidence: 99%
“…For example, an FSM can widely be explored after being defined and based on the existing events/stages of CFRaaS, an FSM can be leveraged to determine or to give the probable scenarios that can lead to seamless analysis of a potential security incident based on some forensic hypothesis (Kebande et al, 2019; Adeyemi et al, 2017). [7][8][9][10][11] That notwithstanding, an event-based FSM provides an approach of formally analyzing situations or circumstances through which forensic readiness process-dubbed events from a cloud forensic perspective, could in context be feasibly represented. This, is owing to the fact that, CFRaaS that previously has been described in Kebande and Venter, 12 Kebande and Venter (2019b), 13 and Kebande and Venter 6 is composed of steps/processes/events that have a possibility of being formally analyzed as event-steps from a forensic examination perspective.…”
Section: Motivationmentioning
confidence: 99%