基于取证方法的twitter垃圾邮件分析框架设计综述

Ankita M. Ghate, L. Malik
{"title":"基于取证方法的twitter垃圾邮件分析框架设计综述","authors":"Ankita M. Ghate, L. Malik","doi":"10.1109/PERVASIVE.2015.7087158","DOIUrl":null,"url":null,"abstract":"In the last few decades, a dynamic growth in the number of research works conducted in the area of cyber forensic. This paper gives short reviews analysis and detecting twitter spammers using network forensic approach. In Today's world a social networking service is a platform to build social networks or social relations among people who share interests, activities, backgrounds or real-life connections. Digital forensics is an established field in civilization and criminal investigations. In the enterprise, digital investigations are often associated with incident response the detection and investigation of online social networking spammers. This paper examines the comparison of different forensic tool and its parameters. The previous results focus a number of usability issues that need to be taken into consideration when designing and implementing network forensic tools. In this paper general methodology is discussed for forensic data analysis and also the survey of various forensic data analysis tools and approach in use to capturing data from different resources.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Survey on designing framework for analyzing twitter spammers using forensic method\",\"authors\":\"Ankita M. Ghate, L. Malik\",\"doi\":\"10.1109/PERVASIVE.2015.7087158\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the last few decades, a dynamic growth in the number of research works conducted in the area of cyber forensic. This paper gives short reviews analysis and detecting twitter spammers using network forensic approach. In Today's world a social networking service is a platform to build social networks or social relations among people who share interests, activities, backgrounds or real-life connections. Digital forensics is an established field in civilization and criminal investigations. In the enterprise, digital investigations are often associated with incident response the detection and investigation of online social networking spammers. This paper examines the comparison of different forensic tool and its parameters. The previous results focus a number of usability issues that need to be taken into consideration when designing and implementing network forensic tools. In this paper general methodology is discussed for forensic data analysis and also the survey of various forensic data analysis tools and approach in use to capturing data from different resources.\",\"PeriodicalId\":442000,\"journal\":{\"name\":\"2015 International Conference on Pervasive Computing (ICPC)\",\"volume\":\"67 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-04-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Pervasive Computing (ICPC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PERVASIVE.2015.7087158\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Pervasive Computing (ICPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PERVASIVE.2015.7087158","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

在过去的几十年里,在网络取证领域进行的研究工作数量出现了动态增长。本文简要介绍了利用网络取证方法分析和检测twitter垃圾邮件发送者。在当今世界,社交网络服务是一个平台,用于在分享兴趣、活动、背景或现实生活联系的人们之间建立社交网络或社会关系。数字取证在文明和刑事调查中是一个成熟的领域。在企业中,数字调查通常与事件响应有关,即在线社交网络垃圾邮件发送者的检测和调查。本文考察了不同取证工具及其参数的比较。前面的结果集中了在设计和实现网络取证工具时需要考虑的一些可用性问题。本文讨论了法医数据分析的一般方法,并概述了各种法医数据分析工具和从不同资源获取数据的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Survey on designing framework for analyzing twitter spammers using forensic method
In the last few decades, a dynamic growth in the number of research works conducted in the area of cyber forensic. This paper gives short reviews analysis and detecting twitter spammers using network forensic approach. In Today's world a social networking service is a platform to build social networks or social relations among people who share interests, activities, backgrounds or real-life connections. Digital forensics is an established field in civilization and criminal investigations. In the enterprise, digital investigations are often associated with incident response the detection and investigation of online social networking spammers. This paper examines the comparison of different forensic tool and its parameters. The previous results focus a number of usability issues that need to be taken into consideration when designing and implementing network forensic tools. In this paper general methodology is discussed for forensic data analysis and also the survey of various forensic data analysis tools and approach in use to capturing data from different resources.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信