Vast manpower and resources are needed to investigate cybercrimes. The use of new advanced technologies, such as machine learning combined with automation, are effective in providing significant additional support in prevention of cyber-attacks, in the speedy recovery of data, and in reducing human error. This new volume offers a comprehensive study of the advances that have been made in cybercrime investigations and digital forensics, highlighting the most up-to-date tools that help to mitigate cyber-attacks and to extract digital evidence for forensic investigations to recover lost, purposefully deleted, or damaged files. The chapters look at technological cybersecurity tools such as artificial intelligence, machine learning, data mining, and others for mitigation and investigation.
Author(s): A. Harisha & Amarnath Mishra & Chandra Singh
Publisher: CRC Press
Year: 2023
Language: English
Pages: 428
Cover
Half Title
Title
Copyright
About the Editors
Contents
Contributors
Abbreviations
Acknowledgment
Preface
1. Challenges to Cybercrime Reporting, Investigation, and Adjudication in India
2. A Comprehensive Review on Digital Forensics Intelligence
3. Specific Security Mechanisms for Information Protection and Transmission Over Open Networks
4. Wearable Devices Forensic Investigation
5. Combating Cybercrimes with Digital Forensics
6. Clustering and Classification of Digital Forensic Data Using Machine Learning and Data Mining Approaches
7. Digital Forensic Investigation: Ontology, Methodology, and Technological Advancement
8. Data Breach Fraudulence and Preventive Measures in E-Commerce Platforms
9. An Approach to Data Recovery from Solid State Drive: Cyber Forensics
10. A Critical Analysis of the Dark Side of the Dark Web
11. Tools and Protocols for the Analysis of Mobile Phones in Digital Forensics
12. Analysis of Tree-Based Machine Learning Techniques for Credit Card Fraud Detection
13. Black Hats: A Major Threat to Your Finances
14. Enhanced Security Based on Face Detection in Payment Gateway
15. Artificial Intelligence Applied to Computer Forensics
16. Open Standard Authorization Protocol: OAuth 2.0 Defenses and Working Using Digital Signatures
17. Child Pornography: The Filth of Society
18. Digital Forensics and Cybersecurity Tools
Index