[1] |
TEPE A N , BOYLAN A A , DAVIS D W . Analysis of digital forensic capabilities in texas law enforcement agencies[R]. The Bush School of Government & Public Service, 2019.
|
[2] |
CAVIGLIONE L , WENDZE S , MAZURCZKY W . The future of digital forensics:challenges and the road ahead[J]. IEEE Security& Privacy, 2017,15(6): 12-17.
|
[3] |
LIN X D , CHEN T , ZHU T ,et al. Automated forensic analysis of mobile applications on Android devices[J]. Digital Investigation, 2018,26: S59-S66.
|
[4] |
高元照, 李炳龙, 陈性元 . 基于MapReduce的HDFS数据窃取随机检测算法[J]. 通信学报, 2018,39(10): 11-21.
|
|
GAO Y Z , LI B L , CHEN X Y . Stochastic algorithm for HDFS data detection based on MapReduce[J]. Journal on Communications, 2018,39(10): 11-21.
|
[5] |
ZAWOAD S , HASAN R . Digital forensics in the age of big data:challenges,approaches,and opportunities[C]// IEEE Big Data Security 2015. 2015: 1-7.
|
[6] |
SERVIDA F , CASEY E . IoT forensic challenges and opportunities for digital traces[J]. Digital Investigation, 2019,28: S22-S29.
|
[7] |
韩宗达, 李炳龙 . 基于证据库的数据证据转换模型[J]. 计算机应用研究, 2015,32(7): 2140-2143.
|
|
HAN Z D , LI B L . Evidence conversion model based on evidence database[J]. Application Research of Computers, 2015,32(7): 2140-2143.
|
[8] |
JAMES J I , PAVEL G . Challenges with automation in digital forensic investigations[J]. arXiv:1303.4498, 2013.
|
[9] |
Guidanc[EB].
|
[10] |
AccessData[EB].
|
[11] |
ZHU Y , JAMES J , GLADYSHEV P . A consistency study of the windows registry[C]// 6th IFIP WG 11.9 International Conference on Digital Forensics(DF). 2010: 77-90.
|
[12] |
ROGERS M , GOLDMAN J ,et al. Computer forensics field triage process model[J]. Journal of Digital Forensics,Security and Law, 2006,1(2): 27-40.
|
[13] |
MISLAN R P , CASEY E ,et al. The growing need for on-scene triage of mobile devices[J]. Digital Investigation, 2010,6(3-4): 112-124.
|
[14] |
MARZIALE L , RICHARD G G , ROUSSEV V . Massive threading:using GPUs to increase the performance of digital forensics tools[J]. Digital Investigation, 2007,4S: S73-S81.
|
[15] |
GARFINKEL S , NELSON A , WHITE D ,et al. Using purpose-built functions and block hashes to enable small block and sub-file forensics[J]. Digital Investigation, 2010,7: S13-S23.
|
[16] |
QUICK D , CHOO K K R . Impacts of increasing volume of digital forensic data:a survey and future research challenges[J]. Digital Investigation, 2014,11(4): 273-294.
|
[17] |
Federal Bureau of Investigation(FBI) . 2019 Internet Crime Report[R]. 2020.
|
[18] |
McAfee Labs. 2019 Threats Report[EB]. 2019.
|
[19] |
PIRSCOVEANU R , HANSEN S , CZECH A . Analysis of malware behavior:type classification using machine learning[C]// Proceedings of the 2015 International Conference on Cyber Situational Awareness,Data Analytics and Assessment (CyberSA). 2015.
|
[20] |
MOHAISEN A , ALRAWI O , MOHAISEN M . Amal:High-fidelity,behavior-based automated malware analysis and classification[J]. Computers & Security, 2015,52: 251-266.
|
[21] |
LIN Y D , LAI Y C , LU C N ,et al. Three-phase behavior-based detection and classification of known and unknown malware[J]. Security and Communication Networks, 2015,8(11): 2004-2015.
|
[22] |
KRIS C , MAREK R . A Joint model for word embedding and word morphology[C]// Proc of the 1st Workshop on Representation Learning for NLP,August 11th. 2016: 18-26.
|
[23] |
陈翠平 . 基于深度信念网络的文本分类算法[J]. 计算机系统应用, 2015,24(2): 121-126.
|
|
CHEN C P . Text Categorization based on deep belief network[J]. Computer System & Application, 2015,24(2): 121-126.
|
[24] |
黎亚雄, 张坚强, 潘登 ,等. 基于RNN-RBM语言模型的语音识别研究[J]. 计算机研究与发展, 2014,51(9): 1936-1944.
|
|
LI Y X , ZHANG J Q , PAN D ,et al. A study of speech recognition based on RNN-RBM language model[J]. Journal of Computer Research and Development, 2014,51(9): 1936-1944.
|
[25] |
LUKASZ K , AIDAN N.G , NOAM S ,et al. One model to learn them all[J]. arXiv:1706.05137v1, 2017.06:1-10.
|
[26] |
Ponemon Institite . 2017 Cost of Data Breach Study[R].
|
[27] |
RAFF E , ZAK R , MUNOZ G ,et al. Automatic yara rele generation using biclustering[C]// Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security. 2020: 71-82.
|