Learn More
Cloud computing may well become one of the most transformative technologies in the history of computing. Cloud service providers and customers have yet to establish adequate forensic capabilities that could support investigations of criminal activities in the cloud. This paper discusses the emerging area of cloud forensics, and highlights its challenges and(More)
In this paper we compare the performance of three distinct approaches to lexical cohesion based text segmen-tation. Most work in this area has focused on the discovery of textual units that discuss subtopic structure within documents. In contrast our segmentation task requires the discovery of topical units of text i.e. distinct news stories from broadcast(More)
With the rapid growth of cloud adoption in both private and public sectors globally, cloud computing environments have become a new battlefield for cyber crime. In this paper, the researchers present the results and analysis of a survey that had been widely circulated among digital forensic experts and practitioners worldwide on cloud forensics and critical(More)
In this paper, we present the ADMIRE architecture; a new framework for developing novel and innovative data mining techniques to deal with very large and distributed heterogeneous datasets in both commercial and academic applications. The main ADMIRE components are detailed as well as its interfaces allowing the user to efficiently develop and implement(More)
The Syria conflict has been described as the most socially mediated in history, with online social media playing a particularly important role. At the same time, the ever-changing landscape of the conflict leads to difficulties in applying analytical approaches taken by other studies of online political activism. Therefore, in this paper, we use an approach(More)
We present a comparative study of lexical chain-based summarisation techniques. The aim of this paper is to highlight the effect of lexical chain scoring metrics and sentence extraction techniques on summary generation. We present our own lexical chain-based summarisation system and compare it to other chain-based summarisation systems. We also compare the(More)
As cloud adoption grows, the importance of preparing for forensic investigations in cloud environments also grows. A recent survey of digital forensic professionals identified that missing terms and conditions regarding forensic activities in service level agreements between cloud providers and cloud consumers is a significant challenge for cloud(More)
In this paper, we introduce an efficient approach for modelling the problem of faults' identification and alarms correlation in large telecommunication networks. These alarms are usually useful for identifying faults in such systems, and therefore solving them. However, for large systems, the number of alarms produced is so large that the current management(More)