{"id":"https://openalex.org/W3183276505","doi":"https://doi.org/10.1109/isdfs52919.2021.9486354","title":"Review of NLP-based Systems in Digital Forensics and Cybersecurity","display_name":"Review of NLP-based Systems in Digital Forensics and Cybersecurity","publication_year":2021,"publication_date":"2021-06-28","ids":{"openalex":"https://openalex.org/W3183276505","doi":"https://doi.org/10.1109/isdfs52919.2021.9486354","mag":"3183276505"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs52919.2021.9486354","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs52919.2021.9486354","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 9th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063213917","display_name":"David Okore Ukwen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087579","display_name":"National Space Research and Development Agency","ror":"https://ror.org/005epk420","country_code":"NG","type":"government","lineage":["https://openalex.org/I2801477186","https://openalex.org/I4210087579","https://openalex.org/I4210122850"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"David Okore Ukwen","raw_affiliation_strings":["Development Agency, National Information Technology, Abuja, Nigeria"],"affiliations":[{"raw_affiliation_string":"Development Agency, National Information Technology, Abuja, Nigeria","institution_ids":["https://openalex.org/I4210087579"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037649961","display_name":"Murat Karabatak","orcid":"https://orcid.org/0000-0002-6719-7421"},"institutions":[{"id":"https://openalex.org/I143396566","display_name":"F\u0131rat University","ror":"https://ror.org/05teb7b63","country_code":"TR","type":"education","lineage":["https://openalex.org/I143396566"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Murat Karabatak","raw_affiliation_strings":["Department of Software Engineering, Firat University, Elazig, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Firat University, Elazig, Turkey","institution_ids":["https://openalex.org/I143396566"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063213917"],"corresponding_institution_ids":["https://openalex.org/I4210087579"],"apc_list":null,"apc_paid":null,"fwci":7.7114,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.97326299,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.8857666254043579},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.8162046074867249},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7699246406555176},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.6105421185493469},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.544455349445343},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.5271967053413391},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4451358914375305},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.43313759565353394},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33859145641326904},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2802470922470093},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1846071183681488},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.06432127952575684}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.8857666254043579},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.8162046074867249},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7699246406555176},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.6105421185493469},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.544455349445343},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.5271967053413391},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4451358914375305},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.43313759565353394},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33859145641326904},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2802470922470093},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1846071183681488},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.06432127952575684},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs52919.2021.9486354","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs52919.2021.9486354","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 9th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":125,"referenced_works":["https://openalex.org/W47648955","https://openalex.org/W138782056","https://openalex.org/W150462035","https://openalex.org/W186296515","https://openalex.org/W307257734","https://openalex.org/W1510333715","https://openalex.org/W1538546197","https://openalex.org/W1567460621","https://openalex.org/W1932701845","https://openalex.org/W1966741850","https://openalex.org/W1969457446","https://openalex.org/W1972364321","https://openalex.org/W2015585187","https://openalex.org/W2024718598","https://openalex.org/W2024745364","https://openalex.org/W2027166822","https://openalex.org/W2030369136","https://openalex.org/W2039003158","https://openalex.org/W2049449085","https://openalex.org/W2060988608","https://openalex.org/W2062957903","https://openalex.org/W2069867586","https://openalex.org/W2076203506","https://openalex.org/W2085628363","https://openalex.org/W2093002133","https://openalex.org/W2102414025","https://openalex.org/W2126985156","https://openalex.org/W2128003338","https://openalex.org/W2142600876","https://openalex.org/W2145946200","https://openalex.org/W2163548000","https://openalex.org/W2169818249","https://openalex.org/W2242316747","https://openalex.org/W2273160540","https://openalex.org/W2287142169","https://openalex.org/W2305164035","https://openalex.org/W2313513770","https://openalex.org/W2333305094","https://openalex.org/W2485766864","https://openalex.org/W2508310662","https://openalex.org/W2538865281","https://openalex.org/W2591102410","https://openalex.org/W2592440977","https://openalex.org/W2741809018","https://openalex.org/W2743850138","https://openalex.org/W2745980806","https://openalex.org/W2766955736","https://openalex.org/W2767094836","https://openalex.org/W2768073432","https://openalex.org/W2780450026","https://openalex.org/W2782749307","https://openalex.org/W2784050149","https://openalex.org/W2787538540","https://openalex.org/W2795170942","https://openalex.org/W2796263526","https://openalex.org/W2796585196","https://openalex.org/W2797672282","https://openalex.org/W2799908179","https://openalex.org/W2805270360","https://openalex.org/W2805641541","https://openalex.org/W2837911466","https://openalex.org/W2884137358","https://openalex.org/W2887289472","https://openalex.org/W2895859872","https://openalex.org/W2896064132","https://openalex.org/W2905210781","https://openalex.org/W2908121058","https://openalex.org/W2908909372","https://openalex.org/W2910048657","https://openalex.org/W2913185305","https://openalex.org/W2921156288","https://openalex.org/W2925159895","https://openalex.org/W2926701059","https://openalex.org/W2939322617","https://openalex.org/W2942056403","https://openalex.org/W2953336510","https://openalex.org/W2953915235","https://openalex.org/W2962960733","https://openalex.org/W2971203802","https://openalex.org/W2974768159","https://openalex.org/W2977506040","https://openalex.org/W2979462143","https://openalex.org/W2991219622","https://openalex.org/W2992918197","https://openalex.org/W3004908285","https://openalex.org/W3009129408","https://openalex.org/W3011624874","https://openalex.org/W3032769455","https://openalex.org/W3033260057","https://openalex.org/W3033777149","https://openalex.org/W3038046627","https://openalex.org/W3038110523","https://openalex.org/W3039268099","https://openalex.org/W3042373905","https://openalex.org/W3083778360","https://openalex.org/W3089718532","https://openalex.org/W3117479037","https://openalex.org/W3118722953","https://openalex.org/W3118888569","https://openalex.org/W3119513105","https://openalex.org/W3128181049","https://openalex.org/W3128916430","https://openalex.org/W3153911193","https://openalex.org/W3159649695","https://openalex.org/W3161935901","https://openalex.org/W3173648532","https://openalex.org/W4235324633","https://openalex.org/W4252460146","https://openalex.org/W4288092791","https://openalex.org/W4302282827","https://openalex.org/W6601909726","https://openalex.org/W6630341987","https://openalex.org/W6679033275","https://openalex.org/W6679136918","https://openalex.org/W6721919763","https://openalex.org/W6734770194","https://openalex.org/W6748384357","https://openalex.org/W6750913529","https://openalex.org/W6761705730","https://openalex.org/W6767508426","https://openalex.org/W6768908728","https://openalex.org/W6771358182","https://openalex.org/W6779690972","https://openalex.org/W7007923404","https://openalex.org/W7030290986"],"related_works":["https://openalex.org/W2598491911","https://openalex.org/W2181728705","https://openalex.org/W4247205791","https://openalex.org/W4242633011","https://openalex.org/W2489557937","https://openalex.org/W4238452393","https://openalex.org/W2536999591","https://openalex.org/W4244711387","https://openalex.org/W93745046","https://openalex.org/W4283205458"],"abstract_inverted_index":{"Over":[0],"the":[1,8,78,93],"years,":[2],"there":[3],"is":[4],"an":[5],"increase":[6],"in":[7,56],"use":[9],"of":[10,53,81],"Artificial":[11],"Intelligence":[12],"(AI)":[13],"by":[14],"digital":[15,31,57,84],"forensics":[16,32,58,85],"and":[17,27,33,42,59,64,75,83,86],"cybersecurity":[18,34,82],"professionals":[19],"to":[20],"combat":[21],"cybercrime.":[22],"Natural":[23],"Language":[24],"Processing":[25],"(NLP)":[26],"AI":[28],"applications":[29],"for":[30,73,92],"include":[35],"data":[36],"mining,":[37],"knowledge":[38],"representation,":[39],"pattern":[40],"recognition,":[41],"expert":[43],"systems.":[44],"This":[45,67],"research":[46],"paper":[47],"focuses":[48],"on":[49,77],"a":[50,71,90],"literature":[51],"review":[52],"NLP-based":[54],"systems":[55],"cybersecurity:":[60],"role,":[61],"applications,":[62],"challenges,":[63],"future":[65],"directions.":[66],"article":[68],"serves":[69],"as":[70,87],"guide":[72],"researchers":[74],"practitioners":[76],"current":[79],"state":[80],"well":[88],"provides":[89],"roadmap":[91],"future.":[94]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
