Artificial Intelligence Applied to digital Email for forensic Application
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 3
Abstract
The number of computer security incidents is growing exponentially and society’s collective ability to respond to this crisis is constrained by the lack of trained professionals. The increased use of the Internet and computer technology to commit crimes indicates an abuse of new developments that requires a response by those involved in law enforcement. In this paper we see new research approach that uses artificial intelligence and data mining techniques to study spam emails with the focus on law enforcement forensic analysis. In this 1st we retrieve useful attributes or features from spam emails, these are use in intelligence toolkit to reduction size to investigation then we use clustering algorithm to form relationships between messages. These first clusters are then refined by using a weighted edges model where membership in the cluster requires the weight to exceed a chosen threshold and data mining to managed database. Herein, we describe the use of Artificial Intelligence in computer forensics through the development of a multiagent system and span email tracking retrieve useful attributes from spam emails.
Authors and Affiliations
Mr. Shrimant B. Bandgar, Mr. Mahesh Sale and Dr. B. B. Meshram
A study on role of transformational leadership behaviors across cultures in effectively solving the issues in Mergers and Acquisitions
As and when Merger and acquisition comes to a discussion, financial aspects will take a lead and less will be the humanitarian approach. By understanding this fact there are considerable research work which started foc...
FEATURES SELECTION FOR IMAGE CLUSTERING USING LIMITED DEVICE.
Image classification is becoming a prominent field with the passage of time. Image classification on limited devices such as cellular phone is also coming in demand as the technology is advancing. So for constructing c...
DESIGN & DEVELOPMENT OF A NEW AND EFFICIENT APPROACH FOR LINE TEXT EDITING IN TURBO PASCAL 7 FOR WINDOWS.
Text editors come in the forms viz. Line editors, Stream editors, Screen editors, Word processors, Structure editors, etc. There are many text editors provided with Windows viz. Notepad, WordPad, Microsoft Office Word,...
Evaluating the Effectiveness of Educational Institutions Using Frontier Analysis
The higher education system has been experimenting with management approaches to deal with challenges arising from both internal as well as external factors. In this context, it is absolutely essential to assess the qu...
A NEW SYMMETRICAL ENCRYPTION ALGORITHM WITH HIGH SECURITYAND DATA RATE FOR WLAN
The hacking is the greatest problem in the wireless local area network (WLAN). Many algorithms like DES, 3DES, AES,CAST, UMARAM and RC6 have been used to prevent the outside attacks to eavesdrop or prevent the data to...