{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T17:05:39Z","timestamp":1778259939557,"version":"3.51.4"},"reference-count":178,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,5,12]],"date-time":"2022-05-12T00:00:00Z","timestamp":1652313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,5,12]],"date-time":"2022-05-12T00:00:00Z","timestamp":1652313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Alma Mater Studiorum - Universit\u00e0\u00a0 di Bologna"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["K\u00fcnstl Intell"],"published-print":{"date-parts":[[2022,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The impact of AI on numerous sectors of our society and its successes over the years indicate that it can assist in resolving a variety of complex digital forensics investigative problems. Forensics analysis can make use of machine learning models\u2019 pattern detection and recognition capabilities to uncover hidden evidence in digital artifacts that would have been missed if conducted manually. Numerous works have proposed ways for applying AI to digital forensics; nevertheless, scepticism regarding the opacity of AI has impeded the domain\u2019s adequate formalization and standardization. We present three critical instruments necessary for the development of sound machine-driven digital forensics methodologies in this paper. We cover various methods for evaluating, standardizing, and optimizing techniques applicable to artificial intelligence models used in digital forensics. Additionally, we describe several applications of these instruments in digital forensics, emphasizing their strengths and weaknesses that may be critical to the methods\u2019 admissibility in a judicial process.<\/jats:p>","DOI":"10.1007\/s13218-022-00763-9","type":"journal-article","created":{"date-parts":[[2022,5,12]],"date-time":"2022-05-12T07:03:01Z","timestamp":1652338981000},"page":"143-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Digital Forensics AI: Evaluating, Standardizing and Optimizing Digital Evidence Mining Techniques"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6082-893X","authenticated-orcid":false,"given":"Abiodun A.","family":"Solanke","sequence":"first","affiliation":[]},{"given":"Maria Angela","family":"Biasiotti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,12]]},"reference":[{"issue":"7","key":"763_CR1","doi-asserted-by":"publisher","first-page":"621","DOI":"10.2165\/00002018-200730070-00010","volume":"30","author":"DJ Hand","year":"2007","unstructured":"Hand DJ (2007) Principles of data mining. Drug Saf 30(7):621\u2013622","journal-title":"Drug Saf"},{"issue":"236","key":"763_CR2","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1093\/mind\/LIX.236.433","volume":"59","author":"AM Turin","year":"1950","unstructured":"Turin AM (1950) Computing machinery and intelligence. Mind 59(236):433","journal-title":"Mind"},{"key":"763_CR3","unstructured":"McCarthy J (2004) What is artificial intelligence? Available online at: https:\/\/kewd.pw\/what_is_artificial_intelligence.pdf"},{"key":"763_CR4","doi-asserted-by":"crossref","unstructured":"Pasquale F (2015) The black box society: the secret algorithms that control money and information. Cambridge: Harvard Univ. Press, 320. ISBN 978-0674368279","DOI":"10.4159\/harvard.9780674736061"},{"key":"763_CR5","doi-asserted-by":"crossref","unstructured":"Palmiotto F (2021) The Black Box on Trial: The Impact of Algorithmic Opacity on Fair Trial Rights in Criminal Proceedings. In Algorithmic Governance and Governance of Algorithms 49-70","DOI":"10.1007\/978-3-030-50559-2_3"},{"key":"763_CR6","first-page":"3","volume":"1","author":"JG Carbonell","year":"1983","unstructured":"Carbonell JG et al (1983) An overview of machine learning. Mach Learn 1:3\u201323","journal-title":"Mach Learn"},{"issue":"6245","key":"763_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1126\/science.aaa8415","volume":"349","author":"MI Jordan","year":"2015","unstructured":"Jordan MI, Mitchell TM (2015) Machine learning: trends, perspective, and prospects. Science 349(6245):255\u2013260","journal-title":"Science"},{"key":"763_CR8","doi-asserted-by":"publisher","first-page":"184560","DOI":"10.1109\/ACCESS.2020.3029280","volume":"8","author":"J Doowon","year":"2020","unstructured":"Doowon J (2020) Artificial intelligence secuurity threat, crime, and forensics: taxonomy and open issues. IEEE Access 8:184560\u2013184574","journal-title":"IEEE Access"},{"key":"763_CR9","unstructured":"Behzadan V, Baggili IM (2020) Founding the domain of AI forensics. In SafeAI@ AAAI"},{"key":"763_CR10","doi-asserted-by":"crossref","unstructured":"Pollitt M, Casey E, Jaquet-Chiffelle D, Gladyshev P (2018) A framework for harmonizing forensic science practices and digital\/multimedia evidence. In Organization of Scientific Area Committees for Forensic Science (OSAC)","DOI":"10.29325\/OSAC.TS.0002"},{"key":"763_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.diin.2019.03.011","volume":"29","author":"N Sunde","year":"2019","unstructured":"Sunde N, Dror I (2019) Cognitive and Human Factors in Digital Forensics: Problems, Challenges, and the way Forward. Digit Investig 29:101\u2013108","journal-title":"Digit Investig"},{"key":"763_CR12","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1002\/jip.19","volume":"2","author":"K Ask","year":"2005","unstructured":"Ask K, Granhag PA (2005) Motivational Sources of Confirmation Bias in Criminal Investigations: The Need for Cognitive Closure. J Investig Psychol Offender Profil 2:43\u201363","journal-title":"J Investig Psychol Offender Profil"},{"key":"763_CR13","unstructured":"Lau T, Biedermann A (2020) Assessing AI output in legal decision-making with nearest Neighbors. Penn State Law Rev 24(3). https:\/\/elibrary.law.psu.edu\/pslr\/vol124\/iss3\/1\/"},{"issue":"1","key":"763_CR14","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/S1355-0306(06)71565-9","volume":"46","author":"J Graham","year":"2006","unstructured":"Graham J, Jones S, Booth G, Champod C, Evett I (2006) The Nature of Forensic Science Opinion - a Possible Framework to Guide Thinking and Practice in Investigation and in Court Proceedings. Sci Justice 46(1):33\u201344","journal-title":"Sci Justice"},{"key":"763_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.301016","volume":"34","author":"T Boll\u00e9","year":"2020","unstructured":"Boll\u00e9 T, Casey E, Jacquet M (2020) The role of evaluations in reaching decisions using automated systems supporting forensic analysis. Forensic Sci Int Digit Investig 34:301016","journal-title":"Forensic Sci Int Digit Investig"},{"key":"763_CR16","doi-asserted-by":"crossref","unstructured":"Islam M et al (2019) Toward detection of child exploitation material: a forensic approach. Deep Learn Appl Cyber Secur 221\u2013246","DOI":"10.1007\/978-3-030-13057-2_11"},{"issue":"1","key":"763_CR17","first-page":"2","volume":"17","author":"C Steel","year":"2022","unstructured":"Steel C et al (2022) Technical behaviour of child sexual exploitation material offenders. J Dig Forensic Secur Law 17(1):2","journal-title":"J Dig Forensic Secur Law"},{"key":"763_CR18","doi-asserted-by":"crossref","unstructured":"Anda F, David L, Kanta A, et al (2019) Improving the accuracy of automated facial age estimation to aid CSEM investigations. Dig Investig 28(S142)","DOI":"10.1016\/j.diin.2019.01.024"},{"key":"763_CR19","doi-asserted-by":"crossref","unstructured":"Solanke A, Chen X, Ramir\u00e9z-Cruz Y (2021) Pattern recognition and reconstruction: detecting malicious deletions in textual communications. In: Proceedings of the IEEE Intl. Conf. on Big Data 2021:2574\u20132582","DOI":"10.1109\/BigData52589.2021.9671921"},{"key":"763_CR20","unstructured":"European Network of Forensic Science Institutes (ENFSI) (2015). Best Practice manual for the Forensic Examination of Digital Technology. ENFSI-BPM_FIT-01 (Version 01). Available online at: https:\/\/enfsi.eu\/wp-content\/uploads\/2016\/09\/1._forensic_examination_of_digital_technology_0.pdf"},{"issue":"4","key":"763_CR21","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.3150\/12-BEJSP10","volume":"19","author":"B Dai","year":"2013","unstructured":"Dai B, Ding S, Wahba G (2013) Multivariate Bernoulli distribution. Bernoulli 19(4):1465\u20131483","journal-title":"Bernoulli"},{"key":"763_CR22","unstructured":"Gidudu A, Hulley G, Tshilidzi M (2007) Image classification using SVMs: one-against-one vs one-against-all. Asian Conf. on Remote Sensing 2007"},{"issue":"16\u201318","key":"763_CR23","doi-asserted-by":"publisher","first-page":"3275","DOI":"10.1016\/j.neucom.2008.04.033","volume":"71","author":"J Hong","year":"2008","unstructured":"Hong J, Cho S (2008) A probabilistic multi-class strategy of one-vs-rest support vector machines for cancer classification. Neurocomputing 71(16\u201318):3275\u20133281","journal-title":"Neurocomputing"},{"key":"763_CR24","first-page":"975","volume":"5","author":"T Wu","year":"2004","unstructured":"Wu T, Lin C, Weng R (2004) Probability estimates for multi-class classification by pairwise coupling. J Mach Learn Res 5:975\u20131005","journal-title":"J Mach Learn Res"},{"issue":"3","key":"763_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdwm.2007070101","volume":"3","author":"G Tsoumakas","year":"2007","unstructured":"Tsoumakas G, Katakis I (2007) Multi-label classification: an overview. Int J Data Warehouse Mining (IJDWM) 3(3):1\u201313","journal-title":"Int J Data Warehouse Mining (IJDWM)"},{"key":"763_CR26","doi-asserted-by":"crossref","unstructured":"Tang Y, Zhang Y, Chawla N, Krasser S (2008) SVMs modeling for highly imbalanced classification. IEEE Trans Syst Man Cybern Part B (Cybern) 39(1):281\u2013288","DOI":"10.1109\/TSMCB.2008.2002909"},{"issue":"2","key":"763_CR27","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1121\/1.1907983","volume":"27","author":"GA Miller","year":"1955","unstructured":"Miller GA, Nicely PE (1955) An analysis of perceptual confusions among some english consonants. J Acoust Soc Am 27(2):617","journal-title":"J Acoust Soc Am"},{"issue":"1","key":"763_CR28","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3758\/BF03213026","volume":"9","author":"JT Townsend","year":"1971","unstructured":"Townsend JT (1971) Theoretical analysis of an alphabetic confusion matrix. Percept Psychophys 9(1):40\u201350","journal-title":"Percept Psychophys"},{"key":"763_CR29","volume-title":"Recall","author":"M Zhu","year":"2004","unstructured":"Zhu M (2004) Recall. University of Waterloo, Precision and Average Precision. Dept. of Statistics & Actuarial Science"},{"issue":"7","key":"763_CR30","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1016\/S0031-3203(96)00142-2","volume":"30","author":"A Bradley","year":"1997","unstructured":"Bradley A (1997) The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recogn 30(7):1145\u20131159","journal-title":"Pattern Recogn"},{"issue":"1","key":"763_CR31","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1148\/radiology.143.1.7063747","volume":"143","author":"JA Hanley","year":"1982","unstructured":"Hanley JA, McNeil BJ (1982) The meaning and use of the area under a receiver operating characteristic (ROC) curve. Radiology 143(1):29\u201336","journal-title":"Radiology"},{"key":"763_CR32","doi-asserted-by":"crossref","unstructured":"Zhang E, Zhang Y (2009) Average precision. Encyclopedia of Database Systems","DOI":"10.1007\/978-0-387-39940-9_482"},{"key":"763_CR33","unstructured":"Powers DM (2014) What the f-measure doesn\u2019t measure. Technical report, Beijing University of Technology, China & Flinders University, Australia Tech. Report"},{"issue":"2","key":"763_CR34","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s11222-017-9746-6","volume":"28","author":"D Hand","year":"2018","unstructured":"Hand D, Christen P (2018) A note on using the F-measure for evaluating record linkgae algorithms. Stat Comput 28(2):539\u2013547","journal-title":"Stat Comput"},{"key":"763_CR35","doi-asserted-by":"crossref","unstructured":"Cook D, Weisberg S (1982) Criticism and Influence Analysis in Regression. Sociol Methodol 13:313-361. Jstor","DOI":"10.2307\/270724"},{"key":"763_CR36","doi-asserted-by":"crossref","unstructured":"Freedman D (2009) Statistical Models: Theory and Practice (2nd Ed.). Cambridge University Press. ISBN: 9780521743853","DOI":"10.1017\/CBO9780511815867"},{"key":"763_CR37","doi-asserted-by":"crossref","unstructured":"Khoury R, Harder DW (2016) Interpolation, regression, and extrapolation. In: Numerical methods and modelling for engineering 77\u2013113","DOI":"10.1007\/978-3-319-21176-3_6"},{"issue":"322","key":"763_CR38","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1080\/01621459.1968.11009275","volume":"63","author":"C Toro-Vizcarrondo","year":"1968","unstructured":"Toro-Vizcarrondo C, Wallace T (1968) A test of the mean square error criterion for restrictions in linear regression. J Am Stat Assoc 63(322):558\u2013572","journal-title":"J Am Stat Assoc"},{"issue":"3","key":"763_CR39","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1080\/00401706.1971.10488811","volume":"13","author":"D Allen","year":"1971","unstructured":"Allen D (1971) Mean square error of prediction as a criterion for selecting variables. Technometrics 13(3):469\u2013475","journal-title":"Technometrics"},{"key":"763_CR40","doi-asserted-by":"crossref","unstructured":"Sammut C, Webb G (2010) Mean absolute error. Encyclopedia of Machine Learning, 652","DOI":"10.1007\/978-0-387-30164-8"},{"issue":"3","key":"763_CR41","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1080\/00220970009600095","volume":"68","author":"J Nevitt","year":"2000","unstructured":"Nevitt J, Hancock G (2000) Improving the root mean square error of approximation for nonnormal conditions in structural equation modeling. J Exp Educ 68(3):251\u2013268","journal-title":"J Exp Educ"},{"key":"763_CR42","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.neucom.2015.12.114","volume":"192","author":"A De Myttenaere","year":"2016","unstructured":"De Myttenaere A, Golden B, Le Grand B, Rossi F (2016) Mean absolute percentage error for regression models. Neurocomputing 192:38\u201348","journal-title":"Neurocomputing"},{"key":"763_CR43","unstructured":"Lehmann E, Casella G (1998) Theory of point estimation (2nd ed.). New York: Springer. ISBN 978-0-387-98502-2"},{"issue":"3","key":"763_CR44","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.atmosenv.2008.10.005","volume":"43","author":"C Willmott","year":"2009","unstructured":"Willmott C, Matsuura K, Robeson S (2009) Ambiguities inherent in sums-of-squares-based error statistics. Atmos Environ 43(3):749\u2013752","journal-title":"Atmos Environ"},{"issue":"4","key":"763_CR45","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/j.ijforecast.2006.03.001","volume":"22","author":"R Hyndman","year":"2006","unstructured":"Hyndman R, Koehler A (2006) Another Look at Measures of Forecast Accuracy. Int J Forecast 22(4):679\u2013688","journal-title":"Int J Forecast"},{"issue":"4","key":"763_CR46","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/s11294-009-9233-8","volume":"15","author":"L Ren","year":"2009","unstructured":"Ren L, Glasure Y (2009) Applicability of the revised mean absolute percentage errors (mape) approach to some popular normal and non-normal independent time series. Int Adv Econ Res 15(4):409\u2013420","journal-title":"Int Adv Econ Res"},{"key":"763_CR47","doi-asserted-by":"crossref","unstructured":"Garofalakis M, Kumar A (2004) Deterministic wavelet thresholding for maximum-error metrics. In Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems pp. 166\u2013176","DOI":"10.1145\/1055558.1055582"},{"key":"763_CR48","unstructured":"Wright S (1921) Correlation and causation"},{"issue":"3","key":"763_CR49","doi-asserted-by":"publisher","first-page":"230","DOI":"10.5951\/MT.93.3.0230","volume":"93","author":"G Barrett","year":"2000","unstructured":"Barrett G (2000) The coefficient of determination: understanding r squared and R squared. Math Teach 93(3):230\u2013234","journal-title":"Math Teach"},{"key":"763_CR50","unstructured":"Di Bucchianico A (2008) Coefficient of determination (R2). Encyclopedia of Statistics in Quality and Reliability 1"},{"issue":"1","key":"763_CR51","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/0169-2070(92)90008-W","volume":"8","author":"J Armstrong","year":"1992","unstructured":"Armstrong J, Collopy F (1992) Error measures for generalizing about forecasting methods: Empirical comparisons. Int J Forecast 8(1):69\u201380","journal-title":"Int J Forecast"},{"issue":"1","key":"763_CR52","doi-asserted-by":"publisher","first-page":"79","DOI":"10.3354\/cr030079","volume":"30","author":"C Willmott","year":"2005","unstructured":"Willmott C, Matsuura K (2005) Advantages of the mean absolute error (MAE) over the root man square error (RMSE) in assessing average model performance. Clim Res 30(1):79\u201382","journal-title":"Clim Res"},{"issue":"3","key":"763_CR53","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.5194\/gmd-7-1247-2014","volume":"7","author":"T Chai","year":"2014","unstructured":"Chai T, Draxler R (2014) Root Mean Square Error (RMSE) or Mean Absolute Error (MAE)? - Arguments against Avoiding RMSE in the literature. Geosci Model Dev 7(3):1247\u20131250","journal-title":"Geosci Model Dev"},{"key":"763_CR54","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.623","volume":"7","author":"D Chicco","year":"2021","unstructured":"Chicco D, Warrens M, Jurman G (2021) The coefficient of determination R-squared is more informative than SMAPE, MAE, MAPE, MSE and RMSE in regression analysis evaluation. PeerJ Comput Sci 7:e623","journal-title":"PeerJ Comput Sci"},{"key":"763_CR55","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/S0304-4076(96)01818-0","volume":"77","author":"C Cameron","year":"1997","unstructured":"Cameron C, Windmeijer F (1997) A R-Squared Measure of Goodness of Fit for some Common Nonlinear Regression Models. J Econom 77:329\u2013342","journal-title":"J Econom"},{"issue":"3","key":"763_CR56","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1162\/neco.1989.1.3.295","volume":"1","author":"HB Barlow","year":"1989","unstructured":"Barlow HB (1989) Unsupervised learning. Neural Comput 1(3):295\u2013311","journal-title":"Neural Comput"},{"key":"763_CR57","doi-asserted-by":"crossref","unstructured":"Hinton G, Sejnowski TJ (Eds.) (1999) Unsupervised learning: foundations of neural computation. MIT Press","DOI":"10.7551\/mitpress\/7011.001.0001"},{"key":"763_CR58","doi-asserted-by":"crossref","unstructured":"Caruana R, Niculecu-Mizil A (2006) An empirical comparison of supervised learning algorithms. In proceedings of the 23rd international conference on Machine learning 161\u2013168","DOI":"10.1145\/1143844.1143865"},{"issue":"2","key":"763_CR59","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1093\/oxfordjournals.aob.a083391","volume":"18","author":"B Hopkins","year":"1954","unstructured":"Hopkins B, Skellam J (1954) A new method for determining the type of distribution of plant individuals. Ann Bot 18(2):213\u2013227","journal-title":"Ann Bot"},{"key":"763_CR60","unstructured":"Ng A (2012) Clustering with the k-means algorithm. Mach Learn"},{"issue":"6","key":"763_CR61","first-page":"90","volume":"1","author":"T Kodinariya","year":"2013","unstructured":"Kodinariya T, Makwana P (2013) Review on determining number of Cluster in K-Means Clustering. Int J 1(6):90\u201395","journal-title":"Int J"},{"issue":"2","key":"763_CR62","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1111\/1467-9868.00293","volume":"63","author":"R Tibshirani","year":"2001","unstructured":"Tibshirani R, Walther G, Hastie T (2001) Estimating the number of clusters in a data set via the gap statistic. J R Stat Soc Ser B (Stat Methodol) 63(2):411\u2013423","journal-title":"J R Stat Soc Ser B (Stat Methodol)"},{"key":"763_CR63","doi-asserted-by":"crossref","unstructured":"Rousseeuw P (1987) Silhouettes: a Graphical Aid to the Interpretation and Validation of Cluster Analysis Computational and Applied Mathematics. 20:53\u201365","DOI":"10.1016\/0377-0427(87)90125-7"},{"key":"763_CR64","doi-asserted-by":"crossref","unstructured":"Aranganayagi S, Thangavel K (2007) Clustering categorical data using silhouette coefficient as a relocating measure. In: International conference on computational intelligence and multimedia applications (ICCIMA 2007) 2:13\u201317","DOI":"10.1109\/ICCIMA.2007.328"},{"issue":"3","key":"763_CR65","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1080\/01969727308546046","volume":"3","author":"J Dunn","year":"1973","unstructured":"Dunn J (1973) A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters. J Cybern 3(3):32\u201357","journal-title":"J Cybern"},{"key":"763_CR66","doi-asserted-by":"crossref","unstructured":"Davies D, Bouldin D (1979) A Cluster Separation Measure. IEEE Trans Pattern Anal Mach Intell PAMI-1 (2):224-227","DOI":"10.1109\/TPAMI.1979.4766909"},{"issue":"336","key":"763_CR67","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1080\/01621459.1971.10482356","volume":"66","author":"W Rand","year":"1971","unstructured":"Rand W (1971) Objective criteria for the evaluation of clustering methods. J Am Stat Assoc 66(336):846\u2013850","journal-title":"J Am Stat Assoc"},{"key":"763_CR68","doi-asserted-by":"crossref","unstructured":"Manning C, Raghavan P, Sch\u00fctze H (2008) Introduction to Information Retrieval. Cambridge University Press. ISBN 978-0-521-86571-5","DOI":"10.1017\/CBO9780511809071"},{"issue":"383","key":"763_CR69","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1080\/01621459.1983.10478008","volume":"78","author":"E Fowlkes","year":"1983","unstructured":"Fowlkes E, Mallows C (1983) A method for comparing two hierarchical clusterings. J Am Stat Assoc 78(383):553\u2013569","journal-title":"J Am Stat Assoc"},{"issue":"8","key":"763_CR70","doi-asserted-by":"publisher","first-page":"87","DOI":"10.3390\/data6080087","volume":"6","author":"S Ferreira","year":"2021","unstructured":"Ferreira S, Antunes M, Correia M (2021) A dataset of photos and videos for digital forensics analysis using machine learning processing. Data 6(8):87","journal-title":"Data"},{"key":"763_CR71","unstructured":"Lau T, Biedermann A (2020) Assessing AI output in legal decision-making with nearest Neighbors. Penn State Law Rev. 24(3). https:\/\/elibrary.law.psu.edu\/pslr\/vol124\/iss3\/1\/"},{"key":"763_CR72","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2019.200888","volume":"32","author":"E Casey","year":"2020","unstructured":"Casey E (2020) Standardization of forming and expressing preliminary evaluative opinion on digital evidence. Forensic Sci Int Digit Investig 32:200888","journal-title":"Forensic Sci Int Digit Investig"},{"issue":"2","key":"763_CR73","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.scijus.2011.03.005","volume":"51","author":"C Berger","year":"2011","unstructured":"Berger C, Buckleton J, Chmapod C, Evett I, Jackson G (2011) Evidence evaluation: a response to the court of appeal judgement in R v T. Sci Justice 51(2):43\u20139","journal-title":"Sci Justice"},{"issue":"3","key":"763_CR74","first-page":"284","volume":"45","author":"W Kerkhoff","year":"2013","unstructured":"Kerkhoff W, Stoel R, Mattijssen E, Hermsen R (2013) The likelihood ratio approach in cartridge case and bullet comparison. AFTE J 45(3):284\u2013289","journal-title":"AFTE J"},{"key":"763_CR75","unstructured":"European Network of Forensic Science Institutes (ENFSI) (2015) Guideline for evaluative reporting in forensic science: strengthening the evaluation of forensic results across Europe. http:\/\/enfsi.eu\/wp-content\/uploads\/2016\/09\/m1_guideline.pdf"},{"key":"763_CR76","first-page":"773","volume":"48","author":"W Thompson","year":"2017","unstructured":"Thompson W (2017) How should forensic scientists present source conclusions. Seton Hall Law Rev. 48:773","journal-title":"Seton Hall Law Rev."},{"issue":"3","key":"763_CR77","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.scijus.2009.07.004","volume":"49","author":"Association of Forensic Science Providers (AFSP)","year":"2009","unstructured":"Association of Forensic Science Providers (AFSP) (2009) Standards for the formulation of evaluative forensic science expert opinion. Sci Justice 49(3):161\u20134","journal-title":"Sci Justice"},{"key":"763_CR78","unstructured":"President\u2019s Council of Advisors on Science And Technology (PCAST) (2016). Forensic science in crimi-nal courts: ensuring scientific validity of feature-comparison methods. https:\/\/obamawhitehouse.archives.gov\/sites\/default\/files\/microsites\/ostp\/PCAST\/pcast_forensic_science_report_final.pdf"},{"key":"763_CR79","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.scijus.2011.03.002","volume":"51","author":"G Morrison","year":"2011","unstructured":"Morrison G (2011) Measuring the validity and reliability of forensic likelihood-ratio systems. Sci Justice 51:91\u201398","journal-title":"Sci Justice"},{"key":"763_CR80","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2020.103387","volume":"289","author":"K Atkinson","year":"2020","unstructured":"Atkinson K, Bench-Capon T, Bollegala D (2020) Explanation in AI and Law: Past, Present and Future. Artif Intell 289:103387","journal-title":"Artif Intell"},{"key":"763_CR81","unstructured":"Casey E (2002) Error, uncertainty and loss in digital evidence. Int J Digit Evidence 1(2)"},{"key":"763_CR82","unstructured":"Casey E (2011) Digital evidence and computer crime 3rd Edition. Forensic Science, computers, and the Internet. Academic Press. eBook ISBN: 9780080921488"},{"key":"763_CR83","doi-asserted-by":"crossref","unstructured":"Bennett D (2012) The challenges facing computer forensics investigators in obtaining information from mobile devices for use in criminal investigations. Information Security Journal: A Global Per-spective v21(3):159\u2013168","DOI":"10.1080\/19393555.2011.654317"},{"key":"763_CR84","unstructured":"Forensic Science Regulator (2016) Draft guidance: digital forensics method validation. Crown Pros-ecution Service"},{"key":"763_CR85","unstructured":"Palmer G (2001) A road map for digital forensic research. in Proceedings of the 1st Digital Forensic Research Workshop, Utica, NY. 27-30"},{"issue":"3","key":"763_CR86","first-page":"1","volume":"1","author":"M Reith","year":"2002","unstructured":"Reith M, Carr C, Gunsch G (2002) An examination of digital forensic models. Int J Digit Evid 1(3):1\u201312","journal-title":"Int J Digit Evid"},{"key":"763_CR87","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.diin.2018.04.004","volume":"25","author":"P Sommer","year":"2018","unstructured":"Sommer P (2018) Accrediting digital forensics: what are the choices? Digit Investig 25:116\u2013120","journal-title":"Digit Investig"},{"key":"763_CR88","unstructured":"Arshad H, Aman B, Abiodun O (2018) Digital forensics: review of issues in scientific validation of digital evidence. J Inf Process Syst 14(2)"},{"key":"763_CR89","doi-asserted-by":"publisher","first-page":"S94","DOI":"10.1016\/j.diin.2017.06.004","volume":"22","author":"C Grajeda","year":"2017","unstructured":"Grajeda C, Breitinger F, Baggili I (2017) Availability of datasets for digital forensics: and what is missing. Digit Investig 22:S94\u2013S105","journal-title":"Digit Investig"},{"key":"763_CR90","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-030-56223-6_5","volume":"589","author":"T Gobel","year":"2020","unstructured":"Gobel T, Schafer T, Hachenberger J, Turr J, Harald B (2020) A Novel approach for generating synthetic datasets for digital forensics. Adv Digit Forensic XVI, IFIP ACT 589:73\u20139","journal-title":"Adv Digit Forensic XVI, IFIP ACT"},{"key":"763_CR91","doi-asserted-by":"crossref","unstructured":"Miyamoto D, Hazeyama H, Kadobayashi Y (2008) Detecting methods of virus email based on mail header and encoding anomaly. In: Advances in Neuro-Information Processing","DOI":"10.1007\/978-3-642-02490-0_67"},{"key":"763_CR92","unstructured":"Guo H, Jin B, Qian W (2013) Analysis of Email Header for Forensics Purpose. In Proceedings of the International Conference on Communication Systems and Network technologies"},{"key":"763_CR93","doi-asserted-by":"crossref","unstructured":"Morovati K, Kadam S (2019) Detection of phishing emails with email forensic analysis and machine learning techniques. International Journal of Cyber-Security and Digital Forensics (IJCSDF) 8(2):98-107, 2019","DOI":"10.17781\/P002568"},{"key":"763_CR94","first-page":"3","volume-title":"SIAM Intl","author":"J Diesner","year":"2005","unstructured":"Diesner J, Carley KM (2005) Exploration of communication networks from the Enron email corpus. SIAM Intl. Conf. on Data Mining, Workshop on Link Analysis, Counterterrorism and Security, Newport Beach, CA, pp 3\u201314"},{"key":"763_CR95","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.diin.2008.05.001","volume":"5","author":"I Farkhund","year":"2008","unstructured":"Farkhund I, Rachid H, Benjamin F, Mourad D (2008) A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digit Investig 5:42\u201351","journal-title":"Digit Investig"},{"key":"763_CR96","doi-asserted-by":"crossref","unstructured":"Bogawar P, Bhoyar K (2016) A novel approach for the identification of writing traits on email database. In 2016 1st India International Conference on Information Processing (IICIP) 1-6","DOI":"10.1109\/IICIP.2016.7975382"},{"issue":"2","key":"763_CR97","first-page":"72","volume":"8","author":"A Emad","year":"2019","unstructured":"Emad A et al (2019) Simplified features for email authorship identification. Int J Secure Network 8(2):72\u201381","journal-title":"Int J Secure Network"},{"issue":"4","key":"763_CR98","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2001","unstructured":"McHugh J (2001) Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans Inf Syst Secur 3(4):262\u2013294","journal-title":"ACM Trans Inf Syst Secur"},{"key":"763_CR99","first-page":"679","volume":"7","author":"EH Han","year":"2006","unstructured":"Han EH (2006) Hate crimes and hate speech. Geol J Gender L 7:679","journal-title":"Geol J Gender L"},{"key":"763_CR100","unstructured":"Nikoloska S, Liman X (2019) Criminal investigation of hate speech through a computer system in the Republic of North Macedonia. Facult Secur 63"},{"key":"763_CR101","volume-title":"Light and shadow in hate-speech cases: a forensic linguistics","author":"A Agustina","year":"2020","unstructured":"Agustina A et al (2020) Light and shadow in hate-speech cases: a forensic linguistics. Advances in Social Science, Education and Humanities Research"},{"key":"763_CR102","doi-asserted-by":"crossref","unstructured":"Riadi I, Widiandana P (2019) Mobile Forensics for Cyberbullying Detection using Term Frequency-Inverse Document Frequency (TF-IDF) 5:68\u201376","DOI":"10.26555\/jiteki.v5i2.14510"},{"issue":"2","key":"763_CR103","first-page":"461","volume":"9","author":"D Rubin","year":"1993","unstructured":"Rubin D (1993) Statistical disclosure limitation. J Off Stat 9(2):461\u2013468","journal-title":"J Off Stat"},{"issue":"2","key":"763_CR104","first-page":"407","volume":"9","author":"R Little","year":"1993","unstructured":"Little R (1993) Statistical analysis of masked data. J Off Stat 9(2):407","journal-title":"J Off Stat"},{"key":"763_CR105","unstructured":"Baggili I, Breitinger F (2015) Data sources for advancing cyber forensics: what the social world has to offer. in Proceedings of the 2015 AAAI Spring Symposium Series, Palo Alto, CA"},{"key":"763_CR106","doi-asserted-by":"crossref","unstructured":"Heyburn R et al (2018) Machine learning using synthetic and real data: similarity of evaluation metrics for different healthcare datasets and for different algorithms. In: Proceedings of the 13th International FLINS Conference, pp 1281\u20131291","DOI":"10.1142\/9789813273238_0160"},{"issue":"7","key":"763_CR107","doi-asserted-by":"publisher","DOI":"10.2196\/18910","volume":"8","author":"D Rankin","year":"2020","unstructured":"Rankin D et al (2020) Reliability of supervised machine learning using synthetic data in health care: model to preserve privacy for data sharing. JMIR Med Inf 8(7):e18910","journal-title":"JMIR Med Inf"},{"key":"763_CR108","doi-asserted-by":"crossref","unstructured":"Yannikos Y et al (2014) Data corpora for digital forensics education and research. In: IFIP International conference on digital forensics, pp 309\u2013325","DOI":"10.1007\/978-3-662-44952-3_21"},{"key":"763_CR109","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301264","volume":"38","author":"G Horsman","year":"2021","unstructured":"Horsman G, Lyle J (2021) Dataset construction challenges for digital forensics. Forensic Sci Int Digit Investig 38:301264","journal-title":"Forensic Sci Int Digit Investig"},{"key":"763_CR110","unstructured":"Scientific Working Group on Digital Evidence (SWGDE) (2018). Establishing confidence in digital and multimedia evidence forensics results by error mitigation analysis (Version 2.0)"},{"key":"763_CR111","unstructured":"Hughes I, Hase T (2010) Measurements and their uncertainties: a practical guide to modern error analysis. OUP Oxford"},{"key":"763_CR112","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511780608","volume-title":"Reliability in scientific research: improving the dependability of measurements, calculations, equipment, and software","author":"IR Walker","year":"2011","unstructured":"Walker IR (2011) Reliability in scientific research: improving the dependability of measurements, calculations, equipment, and software. Cambridge University Press, Cambridge"},{"key":"763_CR113","first-page":"323","volume":"31","author":"F Henry","year":"2003","unstructured":"Henry F et al (2003) The impact of daubert on forensic science. Pepp Law Rev 31:323","journal-title":"Pepp Law Rev"},{"issue":"8","key":"763_CR114","doi-asserted-by":"publisher","first-page":"3668","DOI":"10.1109\/TCYB.2019.2950779","volume":"50","author":"S Sun","year":"2020","unstructured":"Sun S, Cao Z, Zhu H, Zhao J (2020) A survey of optimization methods from a machine learning perspective. IEEE Trans Cybern 50(8):3668\u20133681","journal-title":"IEEE Trans Cybern"},{"issue":"1","key":"763_CR115","first-page":"1934","volume":"20","author":"P Probst","year":"2019","unstructured":"Probst P et al (2019) Tunability: importance of hyperparameters of machine learning algorithms. J Mach Learn Res 20(1):1934\u20131965","journal-title":"J Mach Learn Res"},{"key":"763_CR116","unstructured":"Steinholtz O (2018) A comparative study of black-box optimization algorithms for tuning of hyper-parameters in deep neural networks. M.S. thesis, Dept. Elect. Eng., Lule\u00e5 Univ. Technology"},{"key":"763_CR117","doi-asserted-by":"crossref","unstructured":"Kuhn M, Kjell J (2013) Applied predictive modelling. Springer, ISBN: 9781461468493","DOI":"10.1007\/978-1-4614-6849-3"},{"key":"763_CR118","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.neucom.2020.07.061","volume":"415","author":"L Yang","year":"2020","unstructured":"Yang L, Shami A (2020) On hyperparameter optimization of machine learning algorithms: theory and practice. Neurocomputing 415:295\u2013316","journal-title":"Neurocomputing"},{"key":"763_CR119","doi-asserted-by":"crossref","unstructured":"Hutter F, Kotthoff L, Vanschoren J (eds) (2019) Automatic Machine Learning: Methods, Systems. Springer, Challenges. ISBN 9783030053185","DOI":"10.1007\/978-3-030-05318-5"},{"issue":"42","key":"763_CR120","first-page":"1","volume":"9","author":"A Koutsoukas","year":"2017","unstructured":"Koutsoukas A, Monaghan K, Li X, Huan J (2017) Deep-learning: investigating deep neural net-works hyper-parameters and comparison of performance to shallow methods for modelling bioactivity data. J Cheminf 9(42):1\u201313","journal-title":"J Cheminf"},{"issue":"3","key":"763_CR121","doi-asserted-by":"publisher","first-page":"208","DOI":"10.3390\/e20030208","volume":"20","author":"D Ramos","year":"2018","unstructured":"Ramos D et al (2018) Deconstructing cross-entropy for probabilistic binary classifiers. Entropy 20(3):208","journal-title":"Entropy"},{"issue":"2","key":"763_CR122","first-page":"1","volume":"19","author":"M Aly","year":"2005","unstructured":"Aly M (2005) Survey on multiclass classification methods. Neural Netw 19(2):1\u20139","journal-title":"Neural Netw"},{"key":"763_CR123","unstructured":"Nair V, Hinton GE (2010) Rectified Linear Units Improve Restricted Boltzman Machines. ICML pp 807\u2013814"},{"key":"763_CR124","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep Learning. MIT Press. ISBN: 9780262035613"},{"key":"763_CR125","unstructured":"Kingma DP, Ba LJ (2015) Adam: a method for stochastic optimization. ICLR"},{"key":"763_CR126","unstructured":"Tieleman T, Hinton G (2012) Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude. COURSERA: Neural networks for machine learning 4(2):26-31"},{"key":"763_CR127","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105992","volume":"200","author":"M Injadat","year":"2020","unstructured":"Injadat M et al (2020) Systematic ensemble model selection ap-proach for educational data mining. Knowl-Based Syst 200:105992","journal-title":"Knowl-Based Syst"},{"key":"763_CR128","doi-asserted-by":"crossref","unstructured":"Lorenzo P et al (2017) Particle swarm optimization for hy-per-parameter selection in deep neural networks. Proceeding of the Genetic and Evolutionary Com-putation Conference 481-488","DOI":"10.1145\/3067695.3084211"},{"issue":"1","key":"763_CR129","first-page":"629","volume":"18","author":"F Bach","year":"2017","unstructured":"Bach F (2017) Breaking the curse of dimensionality with convex neural networks. The Journal of Machine Learning Research 18(1):629\u2013681","journal-title":"The Journal of Machine Learning Research"},{"key":"763_CR130","doi-asserted-by":"crossref","unstructured":"Gonzalez-Cuautle D et al (2019) An Efficient Botnet Detection Methodology using Hyper-parameter Optimization Through Grid-Search Techniques. IWBF","DOI":"10.1109\/IWBF.2019.8739208"},{"issue":"1","key":"763_CR131","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra J, Bengio Y (2012) Random search for hyper-parameter optimization. J Mach Learn Res 13(1):281\u2013305","journal-title":"J Mach Learn Res"},{"key":"763_CR132","unstructured":"Krivulin N, Dennis G, Charles H (2005) Parallel implementation of a random search procedure: an experimental study. In 5th WSEAS International Conference on Simulation, Modeling and Optimiza-tion (SMO\u201905)"},{"key":"763_CR133","doi-asserted-by":"crossref","unstructured":"Albawi S et al (2017) Understanding of a convolutional neural network. Intl. Conf. on Engineering and Technology (ICET) 1-6","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"763_CR134","unstructured":"Ari N, Heru S (2020) Hyper-Parameter Tuning based on Random Search for DenseNet Optimization. Intl. Conf. on Inf. Tech., Computer, & Elect. Eng. (ICITACEE)"},{"issue":"1","key":"763_CR135","first-page":"20","volume":"20","author":"R Pavlo","year":"2017","unstructured":"Pavlo R (2017) Impact of Training Set Batch Size on the Performance of Convolutional Neural Networks for Diverse Datasets. Info. Tech. & Mgt. Science 20(1):20\u201324","journal-title":"Info. Tech. & Mgt. Science"},{"issue":"3","key":"763_CR136","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.21437\/Interspeech.2010-343","volume":"2","author":"T Mikolov","year":"2010","unstructured":"Mikolov T et al (2010) Recurrent neural network based language model. Interspeech 2(3):1045\u20131048","journal-title":"Interspeech"},{"issue":"8","key":"763_CR137","doi-asserted-by":"publisher","first-page":"1889","DOI":"10.1162\/089976600300015187","volume":"12","author":"Y Bengio","year":"2000","unstructured":"Bengio Y (2000) Gradient-based optimization of hyperparameters. Neural Comput 12(8):1889\u20131900","journal-title":"Neural Comput"},{"key":"763_CR138","first-page":"2113","volume":"37","author":"D Maclaurin","year":"2015","unstructured":"Maclaurin D, Duvenaud D, Adams R (2015) Gradient-based Hyperparameter Optimization through Reversible Learning. Intl. Conf. on Machine Learning 37:2113\u20132122","journal-title":"Intl. Conf. on Machine Learning"},{"issue":"4","key":"763_CR139","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1023\/A:1008306431147","volume":"13","author":"D Jones","year":"1998","unstructured":"Jones D, Schonlau M, Welch W (1998) Efficient global optimization of expensive black-box functions. J Global Optim 13(4):455\u2013492","journal-title":"J Global Optim"},{"key":"763_CR140","first-page":"2951","volume":"2","author":"J Snoek","year":"2012","unstructured":"Snoek J, Larochelle H, Adams R (2012) Practical Bayesian optimization of machine learning algorithms. Neural Information Processing Systems 2:2951\u20132959","journal-title":"Neural Information Processing Systems"},{"key":"763_CR141","unstructured":"Koehrsen W (2018) Comparison of activation functions for deep neural networks. https: \/\/towardsdatascience.com\/bayes-rule-applied-75965e4482ff"},{"issue":"2","key":"763_CR142","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1142\/S0129065704001899","volume":"14","author":"M Seeger","year":"2004","unstructured":"Seeger M (2004) Gaussian processes for machine learning. International Journal Neural System 14(2):69\u2013106","journal-title":"International Journal Neural System"},{"key":"763_CR143","first-page":"507","volume":"5","author":"F Hutter","year":"2011","unstructured":"Hutter F, Hoos H, Leyton-Brown K (2011) Sequential model-based optimization for general algorithm configuration. Proc. LION 5:507\u2013523","journal-title":"Proc. LION"},{"key":"763_CR144","unstructured":"Bergstra J et al (2011) Algorithms for hyper-parameter optimization. Proceedings of the Neural Information Processing Systems 2546-2554"},{"issue":"1","key":"763_CR145","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M et al (2009) The WEKA data mining software: an update. ACM SIGKDD Exploration Newsletter 11(1):10\u201318","journal-title":"ACM SIGKDD Exploration Newsletter"},{"issue":"3","key":"763_CR146","first-page":"313","volume":"2","author":"VH Bhatt","year":"2010","unstructured":"Bhatt VH (2010) A Data Mining Approach for Data Generation and Analysis for Digital Forensic Application. IACSIT 2(3):313\u2013319","journal-title":"IACSIT"},{"issue":"6","key":"763_CR147","doi-asserted-by":"publisher","first-page":"41","DOI":"10.5121\/ijdkp.2012.2604","volume":"2","author":"SM Nirkhi","year":"2012","unstructured":"Nirkhi SM et al (2012) Data Mining: A Prospective Approach for Digital Forensics. IJDKP 2(6):41\u201348","journal-title":"IJDKP"},{"key":"763_CR148","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES51350.2021.9489015","volume-title":"Machine learning forensics to gauge the likelihood of fraud in emails","author":"UK Maheswari","year":"2021","unstructured":"Maheswari UK, Bushra NS (2021) Machine learning forensics to gauge the likelihood of fraud in emails. Intl. Conf. on Comm. & Elect. Systems, IEEE"},{"key":"763_CR149","doi-asserted-by":"crossref","unstructured":"Thornton C et al (2013) Auto-WEKA: combined selection and hyperparameter optimization of classification algorithms. ACM SIGKDD 847-855","DOI":"10.1145\/2487575.2487629"},{"key":"763_CR150","doi-asserted-by":"crossref","unstructured":"Kunang YN et al (2020) Improving Classification Attacks in IOT Intrusion Detection System using Bayesian Hyperparameter Optimization. ISRITI 146-151. IEEE","DOI":"10.1109\/ISRITI51436.2020.9315360"},{"key":"763_CR151","doi-asserted-by":"crossref","unstructured":"Zhang S et al (2016) A new optimal sampling rule for multi-fidelity optimization via ordinal transformation. IEEE International Conference om Automation Science and Engineering 670-674","DOI":"10.1109\/COASE.2016.7743467"},{"key":"763_CR152","unstructured":"Jamieson K, Talwalkar A (2015) Non-stochastic best arm identification and hyperparameter optimization. In Artificial Intelligence and Statistics 240-248"},{"key":"763_CR153","first-page":"2275","volume":"28","author":"Z Karnin","year":"2013","unstructured":"Karnin Z et al (2013) (2013) Almost optimal exploration in multi-armed bandits. Int. Conf. Mach. Learn. ICML 28:2275\u20132283","journal-title":"Int. Conf. Mach. Learn. ICML"},{"issue":"1","key":"763_CR154","first-page":"1","volume":"18","author":"L Li","year":"2017","unstructured":"Li L et al (2017) Hyperband: a novel bandit-based approach to hyper-parameter optimization. J Mach Learn Res 18(1):1\u201352","journal-title":"J Mach Learn Res"},{"issue":"10","key":"763_CR155","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2009","unstructured":"Pan SJ, Yang Q (2009) A survey on transfer learning. IEEE Trans Knowl Data Eng 22(10):1345\u20131359","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"763_CR156","doi-asserted-by":"crossref","unstructured":"Zhan et al (2017) Image forensics based on transfer learning and convolutional neural network. ACM Workshop on Information Hiding and Multimedia Security 165-170","DOI":"10.1145\/3082031.3083250"},{"key":"763_CR157","doi-asserted-by":"crossref","unstructured":"Al Banna MH et al (2019) Camera model identification using deep CNN and transfer learning approach. ICREST (pp. 626-630). IEEE","DOI":"10.1109\/ICREST.2019.8644194"},{"issue":"8","key":"763_CR158","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.1007\/s10994-019-05789-z","volume":"108","author":"P Prasse","year":"2019","unstructured":"Prasse P et al (2019) Joint detection of malicious domains and infected clients. Mach Learn 108(8):1353\u20131368","journal-title":"Mach Learn"},{"issue":"4","key":"763_CR159","first-page":"2323","volume":"2018","author":"S Falkner","year":"2018","unstructured":"Falkner S, Klein A, Hutter F (2018) BOHB: robust and efficient hyperparameter optimization at scale. Int. Conf. Mach. Learn. ICML 2018(4):2323\u20132341","journal-title":"Int. Conf. Mach. Learn. ICML"},{"key":"763_CR160","unstructured":"Eggensperger K et al (2013) Towards an empirical foundation for assessing Bayesian optimization of hyperparameters. NIPS Workshop on Bayesian Optimization in Theory and Practice Work 1-5"},{"key":"763_CR161","doi-asserted-by":"crossref","unstructured":"Shapiro J (2001) Genetic Algorithms in Machine Learning, Paliouras G. et al. (Eds.): ACAI\u201999. LNAI (2049):146-168","DOI":"10.1007\/3-540-44673-7_7"},{"key":"763_CR162","doi-asserted-by":"crossref","unstructured":"Shi Y, Eberhart R (1998) Parameter Selection in Particle Swarm Optimization. Evolutionary Programming VII 591-600","DOI":"10.1007\/BFb0040810"},{"key":"763_CR163","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.future.2020.03.042","volume":"110","author":"N Koroniotis","year":"2020","unstructured":"Koroniotis N et al (2020) A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework. Futur Gener Comput Syst 110:91\u2013106","journal-title":"Futur Gener Comput Syst"},{"key":"763_CR164","first-page":"327","volume":"41","author":"Z Jure","year":"1994","unstructured":"Jure Z (1994) Introduction to artificial neural network (ANN) methods: what they are and how to use them. Acta Chim Slov 41:327\u2013327","journal-title":"Acta Chim Slov"},{"key":"763_CR165","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-1-4615-0377-4_5","volume-title":"interdisciplinary computing in java programming","author":"SC Wang","year":"2003","unstructured":"Wang SC (2003) Artificial neural network. interdisciplinary computing in java programming. Springer, Boston, MA, pp 81\u2013100"},{"issue":"1","key":"763_CR166","first-page":"189","volume":"2","author":"AD Dongare","year":"2012","unstructured":"Dongare AD et al (2012) Introduction to Artificial Neural Network. International Journal of Engineering and Innovative Technology (IJEIT) 2(1):189\u2013194","journal-title":"International Journal of Engineering and Innovative Technology (IJEIT)"},{"key":"763_CR167","volume-title":"Discriminatory Analysis","author":"E Fix","year":"1951","unstructured":"Fix E, Hodges JL (1951) Discriminatory Analysis. Consistency Properties. USAF School of Aviation Medicine, Randolph Field, Texas, Nonparametric Discrimination"},{"issue":"3","key":"763_CR168","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","volume":"46","author":"NS Altman","year":"1992","unstructured":"Altman NS (1992) An introduction to kernel and nearest-neigbor nonparametric regression. Am Stat 46(3):175\u2013185","journal-title":"Am Stat"},{"key":"763_CR169","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jisa.2019.02.009","volume":"46","author":"MA Rami","year":"2019","unstructured":"Rami MA, Mohammed A (2019) A comparison of machine learning techniques for file system forensic analysis. Journal of Information Security and Application 46:53\u201361","journal-title":"Journal of Information Security and Application"},{"issue":"7553","key":"763_CR170","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y et al (2015) Deep Learning. In. Nature 521(7553):436\u2013444","journal-title":"Nature"},{"key":"763_CR171","unstructured":"Goodfellow IJ et al (2014) An empirical investigation of catastrophic forgetting in gradient-based neural networks. In proceedings ofthe ICLR"},{"key":"763_CR172","doi-asserted-by":"crossref","unstructured":"Dahl GE et al (2013) Improving deep neural networks for LVCSR using rectified linear units and dropout. In 2013 IEEE intl. conf. on acoustics, speech and signal processing 8609-8613","DOI":"10.1109\/ICASSP.2013.6639346"},{"issue":"1","key":"763_CR173","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TIFS.2012.2223679","volume":"8","author":"LF Nassif","year":"2013","unstructured":"Nassif LF, Hruschka ER (2013) Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection. IEEE Trans Inf Forensics Secur 8(1):46\u201354","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"763_CR174","doi-asserted-by":"publisher","first-page":"1927","DOI":"10.1016\/j.eswa.2014.10.018","volume":"42","author":"LJ Villalba","year":"2015","unstructured":"Villalba LJ et al (2015) Smartphone image clustering. Expert Syst Appl 42(4):1927\u20131940","journal-title":"Expert Syst Appl"},{"issue":"1","key":"763_CR175","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-017-0217-y","volume":"2017","author":"C Li","year":"2017","unstructured":"Li C, Lin X (2017) A fast source-oriented image clustering method for digital forensics. EURASIP Journal on Image and Video Processing 2017(1):1\u201316","journal-title":"EURASIP Journal on Image and Video Processing"},{"key":"763_CR176","doi-asserted-by":"crossref","unstructured":"Almaslukh B (2019) Forensic Analysis using Text Clustering in the Age of Large Volume Data: A Review. Intl. Journal of Advanced Computer Science and Application 10(6):71-77","DOI":"10.14569\/IJACSA.2019.0100610"},{"issue":"4","key":"763_CR177","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1017\/S1351324912000241","volume":"9","author":"R Layton","year":"2012","unstructured":"Layton R et al (2012) Evaluating authorship distance methods using the positive Silhouette coefficient. Nat Lang Eng 9(4):517\u2013535","journal-title":"Nat Lang Eng"},{"key":"763_CR178","doi-asserted-by":"crossref","unstructured":"Naik N et al (2019) A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems. Itl. Symposium on Systems Engineering (ISSE) 1-6","DOI":"10.1109\/ISSE46696.2019.8984540"}],"container-title":["KI - K\u00fcnstliche Intelligenz"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13218-022-00763-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13218-022-00763-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13218-022-00763-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T13:50:18Z","timestamp":1727185818000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13218-022-00763-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,12]]},"references-count":178,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["763"],"URL":"https:\/\/doi.org\/10.1007\/s13218-022-00763-9","relation":{},"ISSN":["0933-1875","1610-1987"],"issn-type":[{"value":"0933-1875","type":"print"},{"value":"1610-1987","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,12]]},"assertion":[{"value":"31 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 September 2022","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Missing Open Access funding information has been added in the Funding Note.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}