000838803 000__ 02986cam\a2200505Ii\4500 000838803 001__ 838803 000838803 005__ 20230306144655.0 000838803 006__ m\\\\\o\\d\\\\\\\\ 000838803 007__ cr\un\nnnunnun 000838803 008__ 180430s2018\\\\si\\\\\\ob\\\\000\0\eng\d 000838803 019__ $$a1034550256$$a1038458328 000838803 020__ $$a9789811077630$$q(electronic book) 000838803 020__ $$a9811077630$$q(electronic book) 000838803 020__ $$z9789811077623 000838803 0247_ $$a10.1007/978-981-10-7763-0$$2doi 000838803 035__ $$aSP(OCoLC)on1032810150 000838803 035__ $$aSP(OCoLC)1032810150$$z(OCoLC)1034550256$$z(OCoLC)1038458328 000838803 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dAZU$$dUWO$$dEBLCP$$dUPM$$dCOO$$dUAB$$dOCLCF 000838803 049__ $$aISEA 000838803 050_4 $$aHV8079.C65 000838803 08204 $$a364.16/8$$223 000838803 1001_ $$aQuick, Darren,$$eauthor. 000838803 24510 $$aBig digital forensic data.$$nVolume 1,$$pData reduction framework and selective imaging /$$cDarren Quick, Kim-Kwang Raymond Choo. 000838803 24630 $$aData reduction framework and selective imaging 000838803 264_1 $$aSingapore :$$bSpringer,$$c2018. 000838803 300__ $$a1 online resource. 000838803 336__ $$atext$$btxt$$2rdacontent 000838803 337__ $$acomputer$$bc$$2rdamedia 000838803 338__ $$aonline resource$$bcr$$2rdacarrier 000838803 347__ $$atext file$$bPDF$$2rda 000838803 4901_ $$aSpringerBriefs on cyber security systems and networks,$$x2522-5561 000838803 504__ $$aIncludes bibliographical references. 000838803 5050_ $$aChapter 1 Introduction -- Chapter 2 Background and Literature Review -- Chapter 3 Data Reduction and Data Mining Framework -- Chapter 4 Digital Forensic Data Reduction by Selective Imaging -- Chapter 5 Summary of the Framework and DRbSI. 000838803 506__ $$aAccess limited to authorized users. 000838803 520__ $$aThis book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big data reduction, and evidence and intelligence extraction methods. Further, it includes the experimental results on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas. 000838803 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 1, 2018). 000838803 650_0 $$aComputer crimes$$xInvestigation. 000838803 650_0 $$aBig data. 000838803 7001_ $$aChoo, Kim-Kwang Raymond,$$eauthor. 000838803 77608 $$iPrint version: $$z9789811077623 000838803 830_0 $$aSpringerBriefs on cyber security systems and networks. 000838803 852__ $$bebk 000838803 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-7763-0$$zOnline Access$$91397441.1 000838803 909CO $$ooai:library.usi.edu:838803$$pGLOBAL_SET 000838803 980__ $$aEBOOK 000838803 980__ $$aBIB 000838803 982__ $$aEbook 000838803 983__ $$aOnline 000838803 994__ $$a92$$bISE