{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:23:09Z","timestamp":1763810589303,"version":"3.28.0"},"reference-count":130,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1109\/isdfs52919.2021.9486354","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:37:12Z","timestamp":1626813432000},"page":"1-9","source":"Crossref","is-referenced-by-count":28,"title":["Review of NLP-based Systems in Digital Forensics and Cybersecurity"],"prefix":"10.1109","author":[{"given":"David Okore","family":"Ukwen","sequence":"first","affiliation":[]},{"given":"Murat","family":"Karabatak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/366173.366190","article-title":"Natural language processing for information assurance and security: an overview and implementations","author":"atallah","year":"2001","journal-title":"Proceedings of the 2000 Workshop on New Security Paradigms"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"125","DOI":"10.17148\/IJARCCE.2018.71127","article-title":"Overview of Cyber Security","volume":"7","author":"s","year":"2018","journal-title":"Ijarcce"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004876"},{"key":"ref32","first-page":"26","article-title":"Computational Forensic Linguistics: An Overview of Computational Applications in Forensic Contexts","volume":"5","author":"sousa-silva","year":"2018","journal-title":"Language and the Law"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-4218-3_40"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2991\/pntim-19.2019.27"},{"journal-title":"Toward a Safer and More Secure Cyberspace","year":"2007","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/835"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2008.4565032"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2274728"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/fi6030584"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.35"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2018.00115"},{"journal-title":"Deloitte Insights","article-title":"Using AI to unleash the power of unstructured government data","year":"0","key":"ref20"},{"journal-title":"Deep learning a practitioner&#x2019;s approach","year":"2017","author":"patterson","key":"ref22"},{"journal-title":"Foundations of Machine Learning","year":"2018","author":"mohri","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931089"},{"year":"0","key":"ref23","article-title":"Natural Language Processing (NLP) Simplified?: A Step-by-step Guide"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2017.8093406"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.62915\/2472-2707.1051","article-title":"Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education","volume":"2019","author":"belshaw","year":"2019","journal-title":"Journal of Cybersecurity Education Research and Practice"},{"key":"ref100","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1007\/978-3-642-33167-1_47","article-title":"Detecting Phishing Emails the Natural Language Way","author":"verma","year":"2012","journal-title":"Computer Security &#x2013; ESORICS 2012"},{"journal-title":"The Basics of Digital Forensics The Primer for Getting Started in Digital Forensics","year":"2012","author":"sammons","key":"ref25"},{"key":"ref50","first-page":"2","article-title":"BitCurator NLP Demo: Applying Natural Language Processing to Processing and Accessing Digital Collections","author":"lee","year":"0"},{"journal-title":"An Exploration of Natural Language Processing in Archival Appraisal","article-title":"What is on this disk","year":"0","key":"ref51"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.008"},{"key":"ref58","first-page":"64","article-title":"Fileprints: identifying file types by n-gram analysis","author":"li","year":"2005","journal-title":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.17781\/P002609"},{"journal-title":"Android Messaging Investigator Forensic text analysis tool for SMS Kik and Hangouts conversations","year":"2018","author":"pettersson","key":"ref56"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622267"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW.2013.6618380"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258177"},{"year":"0","key":"ref52","article-title":"Distributed File System Digital Forensic Triage Integration - ProQuest"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3115\/1118754.1118757"},{"first-page":"82","article-title":"Cost of a Data Breach Report 2020","year":"0","key":"ref4"},{"year":"0","key":"ref3","article-title":"Study: Hackers Attack Every 39 Seconds | A. James Clark School of Engineering, University of Maryland"},{"year":"0","key":"ref6","article-title":"Evolution of MARF and its NLP framework | Proceedings of the Third C* Conference on Computer Science and Software Engineering"},{"key":"ref5","first-page":"3","article-title":"Big Data Analytics in Cyber Security","volume":"5","author":"arya","year":"2017","journal-title":"International Journal of Engine Research"},{"key":"ref8","first-page":"50","article-title":"Artificially Intelligent Cyberattacks","author":"zouave","year":"0"},{"article-title":"Forensic Examinations: Computational Analysis and Information Extraction","year":"2014","author":"trivilini","key":"ref49"},{"article-title":"A Guide To The Top Ten Open Source Tools For Network Defense And Improved Security","year":"2019","author":"brett","key":"ref7"},{"year":"0","key":"ref9","article-title":"theHarvester"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/978-3-319-24123-4_4","article-title":"AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS","volume":"462","author":"yang","year":"2015","journal-title":"Advances in Digital Forensics XI"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04155-6_2"},{"key":"ref48","first-page":"6","article-title":"Extracting Meaningful Entities from Police Narrative Reports","author":"chau","year":"0"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1216262.1216281"},{"article-title":"Information security applications of natural language processing techniques","year":"2007","author":"atallah","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3115\/1628275.1628289"},{"key":"ref44","first-page":"54","article-title":"Information Extraction of Security related entities and concepts from unstructured text","author":"lal","year":"2013"},{"article-title":"The Use of WordNet in Information Retrieval","year":"1998","author":"rila","key":"ref43"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2017.43"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.3390\/app10051692"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2015.42"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2010.5484783"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO48877.2020.9197818"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4305-4"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1080\/00450618.2020.1789742"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.5120\/17856-8715"},{"article-title":"BadNL: Backdoor Attacks Against NLP Models","year":"2020","author":"chen","key":"ref130"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/IC4.2015.7375722"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.040"},{"year":"0","author":"umale","key":"ref75"},{"journal-title":"Heuristic Approach for Document Clustering in Forensic Analysis","year":"0","key":"ref78"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.437"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2823697"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2013.2291689"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.525"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2603960"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-815458-8.00005-0"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102210"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110559"},{"key":"ref67","first-page":"10","article-title":"MemTri: Memory Forensics Triage Tool (Extended Abstract)","author":"michalas","year":"0"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.06.023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.005"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-03371-2_17"},{"year":"0","key":"ref1","article-title":"Internet Live Stats - Internet Usage & Social Media Statistics"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2019.000-7"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3301326.3301336"},{"journal-title":"A Multi-Level Ransomware Detection Framework using Natural Language Processing and Machine Learning","year":"2019","author":"poudyal","key":"ref108"},{"article-title":"eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys","year":"2017","author":"saxe","key":"ref94"},{"key":"ref107","first-page":"442","article-title":"Deep learning LSTM based ransomware detection","author":"maniath","year":"2017","journal-title":"2015 International Conference on Recent Developments in Control Automation and Power Engineering (RDCAPE)"},{"key":"ref93","first-page":"6","article-title":"Using Lexical Features for Malicious URL Detection - A Machine Learning Approach","author":"joshi","year":"0"},{"key":"ref106","first-page":"6","article-title":"ON THE EFFICACY OF ANDROID RANSOMWARE DETECTION TECHNIQUES: A SURVEY","author":"mohan","year":"0"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62582-5_21"},{"key":"ref105","article-title":"Detecting Phishing Attacks using NLP","volume":"12","author":"khan","year":"2021","journal-title":"Turk J Comput Math Educ TURCOMAT"},{"article-title":"URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection","year":"2018","author":"le","key":"ref91"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2016.95"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101792"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/INISTA49547.2020.9194623"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2018.00056"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978315"},{"journal-title":"Place of publication not identified C S R E A PR","year":"2018","key":"ref112"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308387"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.03.107"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57024-8_7"},{"key":"ref96","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1007\/978-3-319-78813-5_22","article-title":"A Deep Learning Based Online Malicious URL and DNS Detection Scheme","author":"jiang","year":"2018","journal-title":"Security and Privacy in Communication Networks Cham"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9109-6"},{"journal-title":"SpiderFoot","article-title":"SpiderFoot: OSINT Automation","year":"0","key":"ref10"},{"first-page":"8","article-title":"The Next Paradigm Shift: AI-Driven Cyber-Attacks","year":"0","key":"ref11"},{"key":"ref12","first-page":"20:1","article-title":"The AI-Based Cyber Threat Landscape: A Survey","volume":"53","author":"kaloudi","year":"2020","journal-title":"ACM Comput Surv"},{"journal-title":"Monkey","article-title":"Natural Language Processing (NLP): What Is It & How Does it Work?","year":"0","key":"ref13"},{"key":"ref14","first-page":"15","article-title":"Natural Language Processing","author":"liddy","year":"0"},{"journal-title":"Natural Language Processing","year":"2011","author":"kumar","key":"ref15"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1147"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-35958-8_1"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8488987"},{"key":"ref117","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1109\/EuroSP.2018.00039","article-title":"ChainSmith: Automatically Learning the Semantics of Malicious Campaigns by Mining Threat Intelligence Reports","author":"zhu","year":"2018","journal-title":"2018 IEEE European Symposium on Security and Privacy (EuroS P)"},{"journal-title":"Medium","article-title":"Top Applications of NLP in 2021","year":"2021","key":"ref17"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"year":"0","key":"ref18","article-title":"Applications Of Natural Language Processing (NLP)"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308268"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/580"},{"year":"0","key":"ref19","article-title":"Social Network for Programmers and Developers"},{"article-title":"Network Intrusion Detection based on LSTM and Feature Embedding","year":"2019","author":"gwon","key":"ref83"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587343"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2018.00030"},{"key":"ref116","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE51399.2021.00309","article-title":"A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence","author":"gao","year":"2021"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258516"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.3390\/fi13020040"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230845"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S18-1113"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2997134"},{"key":"ref122","first-page":"326","article-title":"The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities","author":"mokhov","year":"2014","journal-title":"Advances in Artificial Intelligence Cham"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2017.8322752"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.02.013"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7399288"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/IESYS.2017.8233569"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771228"}],"event":{"name":"2021 9th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2021,6,28]]},"location":"Elazig, Turkey","end":{"date-parts":[[2021,6,29]]}},"container-title":["2021 9th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9486290\/9486287\/09486354.pdf?arnumber=9486354","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:55:48Z","timestamp":1725468948000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9486354\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":130,"URL":"https:\/\/doi.org\/10.1109\/isdfs52919.2021.9486354","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]}}}