{"id":"https://openalex.org/W4390098592","doi":"https://doi.org/10.1109/commnet60167.2023.10365260","title":"Enhancing Forensic Analysis Using a Machine Learning-based Approach","display_name":"Enhancing Forensic Analysis Using a Machine Learning-based Approach","publication_year":2023,"publication_date":"2023-12-11","ids":{"openalex":"https://openalex.org/W4390098592","doi":"https://doi.org/10.1109/commnet60167.2023.10365260"},"language":"en","primary_location":{"id":"doi:10.1109/commnet60167.2023.10365260","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet60167.2023.10365260","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029084805","display_name":"Samira Benkerroum","orcid":null},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Samira Benkerroum","raw_affiliation_strings":["University Ibn Tofail,National School of Applied Sciences,Kenitra,Morocco","National School of Applied Sciences, University Ibn Tofail, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"University Ibn Tofail,National School of Applied Sciences,Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"National School of Applied Sciences, University Ibn Tofail, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075132083","display_name":"Khalid Chougdali","orcid":"https://orcid.org/0000-0002-1072-0461"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Khalid Chougdali","raw_affiliation_strings":["University Ibn Tofail,National School of Applied Sciences,Kenitra,Morocco","National School of Applied Sciences, University Ibn Tofail, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"University Ibn Tofail,National School of Applied Sciences,Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"National School of Applied Sciences, University Ibn Tofail, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5029084805"],"corresponding_institution_ids":["https://openalex.org/I3121676899"],"apc_list":null,"apc_paid":null,"fwci":3.2071,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.93290092,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7025601267814636},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33928805589675903},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33119305968284607}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7025601267814636},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33928805589675903},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33119305968284607}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/commnet60167.2023.10365260","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet60167.2023.10365260","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1550705287","https://openalex.org/W1553076703","https://openalex.org/W2061278117","https://openalex.org/W2520494781","https://openalex.org/W2529303197","https://openalex.org/W2614375709","https://openalex.org/W2765088361","https://openalex.org/W2911869793","https://openalex.org/W2954401588","https://openalex.org/W2968309075","https://openalex.org/W3003243629","https://openalex.org/W3003302059","https://openalex.org/W3026406599","https://openalex.org/W3100184169","https://openalex.org/W3107271146","https://openalex.org/W3109180383","https://openalex.org/W3115779709","https://openalex.org/W3129453524","https://openalex.org/W3132223643","https://openalex.org/W3194734433","https://openalex.org/W4252837801","https://openalex.org/W4400134761","https://openalex.org/W6737232581","https://openalex.org/W6869554581"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W3107602296","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"computers":[3],"or":[4,79],"digital":[5,69,118],"devices":[6],"contribute":[7],"to":[8,41,50,92,96,104,127,171,193,246],"the":[9,24,27,43,65,73,117,129,132,142,148,189,195,198,217,229,247],"global":[10],"spread":[11],"of":[12,26,45,68,75,116,214,219,243],"cyber":[13,16],"threats":[14],"and":[15,37,54,56,86,108,186,201],"crimes.":[17],"These":[18],"cyberattacks":[19],"leave":[20],"some":[21],"artefacts":[22],"on":[23,138],"storage":[25],"target":[28],"device,":[29],"for":[30,72],"this":[31,61],"reason":[32],"they":[33],"require":[34],"special":[35],"treatment,":[36],"which":[38],"will":[39],"have":[40,253],"be":[42],"subject":[44],"various":[46],"investigations":[47,71,82],"in":[48,216,233],"order":[49],"study":[51],"its":[52],"behavior":[53],"analyze":[55],"prevent":[57],"it":[58],"so":[59],"that":[60],"never":[62],"happen":[63],"again.Despite":[64],"continued":[66],"development":[67],"forensic":[70,99,119],"recovery":[74],"evidence":[76],"whether":[77],"volatile":[78],"non-volatile,":[80],"manual":[81,98],"are":[83],"both":[84],"time-intensive":[85],"laborious.":[87],"The":[88,179,224],"proposed":[89],"solution":[90],"is":[91],"use":[93],"a":[94,114,210],"method":[95],"automate":[97,128],"investigation":[100,120],"tasks":[101],"(forensic":[102],"analysis)":[103],"reduce":[105],"human":[106],"effort":[107],"improve":[109],"time":[110],"efficiency.This":[111],"paper":[112,133],"presents":[113],"summary":[115],"process,":[121],"we":[122],"discuss":[123],"existing":[124],"ML":[125],"solutions":[126],"analysis":[130],"process.Finally,":[131],"proposes":[134],"an":[135,240],"approach":[136],"based":[137],"machine":[139],"learning":[140],"where":[141],"binary":[143],"classification":[144],"was":[145],"performed":[146],"using":[147,168,236],"algorithms":[149,205,251],"K-Nearest":[150],"Neighbors,":[151],"Naive":[152],"Bayes,":[153],"Random":[154,199],"Forest,":[155],"Support":[156],"Vector":[157],"Machine,":[158],"Decision":[159],"Tree,":[160,165],"Logistic":[161,225],"Regression,":[162],"Gradient":[163,202],"Boosted":[164,203],"Multi-Layer":[166],"Perceptron,":[167],"CIC-MalMem-2022":[169],"dataset":[170],"identify":[172],"malware.The":[173],"algorithms\u2019":[174],"respective":[175],"performances":[176],"were":[177,191],"contrasted.":[178],"performance":[180,232],"metrics":[181],"Precision,":[182],"F1-score,":[183],"Accuracy,":[184],"Recall,":[185],"Area":[187],"Under":[188],"Curve":[190],"used":[192,252],"assess":[194],"outcomes.":[196],"Consequently,":[197],"Forest":[200],"Tree":[204],"demonstrated":[206],"superior":[207],"performance,":[208],"achieving":[209,239],"remarkable":[211],"accuracy":[212,241],"level":[213],"99.98%":[215],"detection":[218],"malware":[220,235],"through":[221],"memory":[222,237],"scans.":[223],"Regression":[226],"algorithm":[227],"exhibited":[228],"least":[230],"favorable":[231],"analyzing":[234],"data,":[238],"rate":[242],"95.75%.":[244],"According":[245],"results":[248],"obtained,":[249],"many":[250],"obtained":[254],"very":[255],"satisfactory":[256],"results.":[257]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
