Social IoT data mining and cyber-crime forensics under complex cloud environment

1Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Computer forensics is accompanied by the development of computer technology and the emergence of a new form of crime, network crime. The computer log provides a lot of evidence for the computer system to attack crime. Due to the particularity of information technology, it also brings huge information security risks in the whole information process. There are more and more new types of criminal activities which take computer network information system as criminal object and computer network information system as criminal tool. Therefore, it is of great practical significance to crack down on computer network crimes and ensure information security for national economic development and social stability. Different from the traditional social crime, cyber crime is a typical high-tech crime. The evidence of network crime is transmitted and stored in the form of binary digital data through computers or related network devices in the network. The network forensics model based on data mining technology proposed in this paper applies data mining technology to the evidence analysis of network forensics, and makes full use of various mining modes of data mining technology.

Cite

CITATION STYLE

APA

Cai, Y., Li, D., & Wang, Y. (2023). Social IoT data mining and cyber-crime forensics under complex cloud environment. Internet Technology Letters, 6(1). https://doi.org/10.1002/itl2.231

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free