Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/517480
Title: | Design and analysis of integrated approach for mobile device forensic |
Researcher: | Maria jones, G |
Guide(s): | Godfrey Winster, S and Valarmathie, P |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology forensic integrated approach mobile device |
University: | Anna University |
Completed Date: | 2022 |
Abstract: | The study developed an integrated approach for identifying suspicious activity involved in mobile criminal cases. General flow processes in mobile forensics are Seizure, Acquisition, Analysis, and Reporting. This flow process aims to retrieve the digital evidence for legal proceedings. The amount and diversity of data available for digital forensic investigations have grown dramatically in recent years. This rise is primarily due to a dramatic rise in the usage of mobile phones, the Internet, and social network media. As a result, forensic specialists face challenges while conducting manual investigations. So, Machine Learning (ML) and Deep Learning (DL) technologies can help in digital forensic investigations. These technologies can automate the stated laborious digital forensic investigation procedures, when analyzing huge quantities and a wide range of data found in chat logs. These can also help law enforcement agencies to investigate and respond more quickly and effectively. Consequently, the evidence against the predators may be utilized in a court of law, limiting the spread of online sexual grooming. Machine learning models have recently been applied to solve social cyber-related issues in digital forensics, including intrusion detection and digital text forensics. The study obtained the detection of suspicious pattern methodology for criminal activities involved in mobile devices. Mobile forensics model supported by Natural Language Processing for pre-processing the text data, Machine Learning and Deep Learning models were used to facilitate the automatic detection of suspicious activities. It aims to investigate how an integrated approach can perform the forensics data task. Mobile forensics has been well studied, and there are numerous techniques to handle the issues. However, the methods suffer to achieve the expected level of performance in detecting cybercrimes and threats. An efficient Real-time Multi Feature Crime Suspect Analysis Model (RMFCSA) is presented in this study to handle this issue newline |
Pagination: | xxiii,177p. |
URI: | http://hdl.handle.net/10603/517480 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 251.1 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 2.37 MB | Adobe PDF | View/Open | |
03_content.pdf | 597.95 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 245.87 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 942.67 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 711.32 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 818.82 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.43 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 1.29 MB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 1.04 MB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 832.99 kB | Adobe PDF | View/Open | |
12_chapter 8.pdf | 608.38 kB | Adobe PDF | View/Open | |
13_chapter 9.pdf | 462.5 kB | Adobe PDF | View/Open | |
14_annexures.pdf | 180.19 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 125.21 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: