• No results found

Mining Frequent Sequences for Emails in Cyber Forensics Investigation

N/A
N/A
Protected

Academic year: 2020

Share "Mining Frequent Sequences for Emails in Cyber Forensics Investigation"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig.1: Types of Digital Forensics
Fig 2: Types of Cyber Frauds
Table 2.  Tools in Digital Forensics
Fig 4: Role of data mining in digital forensics Investigation

References

Related documents

In-depth interviews were used to collect primary data from officials (policy implementers) in the Ministry of Health and Social Welfare, National AIDS Control Program,

The results obtained from this study showed that fish meal can be replaced partially with blood meal at 10% inclusion level which differs from the report of [3] who

The supply of health insurance was characterized above by fi ve dimensions: size of benefi t package, risk selection effort, amount of loading as the net price of coverage, degree

In [13], the authors conducted a comparison of sentiment polarity classification methods for twitter text. They performed the comparison using various classifiers. They used

In conclusion, combination therapy of PKC ζ and COX-2 inhibitors could synergistically suppress melanoma cells migration, invasion and adhesion in vitro and block mel- anoma

Simulation results reveal that the combination of the eligibility traces algorithm and the sliding mode control can control the blood glucose level and insulin with a

Boreholes, hollow-stem auger flights, or permanent or temporary surface casing should have a minimum inside working diameter at least four (4) inches larger than the outside diameter