Please use this identifier to cite or link to this item: https://hdl.handle.net/10316/101875
DC FieldValueLanguage
dc.contributor.authorBarmpatsalou, Konstantia-
dc.contributor.authorCruz, Tiago-
dc.contributor.authorMonteiro, Edmundo-
dc.contributor.authorSimões, Paulo-
dc.date.accessioned2022-09-20T08:11:34Z-
dc.date.available2022-09-20T08:11:34Z-
dc.date.issued2018-
dc.identifier.issn2169-3536pt
dc.identifier.urihttps://hdl.handle.net/10316/101875-
dc.description.abstractCulprits' identi cation by the means of suspicious pattern detection techniques from mobile device data is one of the most important aims of the mobile forensic data analysis. When criminal activities are related to entirely automated procedures such as malware propagation, predicting the corresponding behavior is a rather achievable task. However, when human behavior is involved, such as in cases of traditional crimes, prediction and detection become more compelling. This paper introduces a combined criminal pro ling and suspicious pattern detection methodology for two criminal activities with moderate to the heavy involvement of mobile devices, cyberbullying and low-level drug dealing. Neural and Neurofuzzy techniques are applied on a hybrid original and simulated dataset. The respective performance results are measured and presented, the optimal technique is selected, and the scenarios are re-run on an actual dataset for additional testing and veri cation.pt
dc.language.isoengpt
dc.rightsopenAccesspt
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/pt
dc.subjectMobile forensicspt
dc.subjectevidence data analysispt
dc.subjectcriminal pro lingpt
dc.subjectbehavioral evidence analysispt
dc.subjectneural networkspt
dc.subjectANFISpt
dc.titleMobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidencept
dc.typearticle-
degois.publication.firstPage59705pt
degois.publication.lastPage59727pt
degois.publication.titleIEEE Accesspt
dc.peerreviewedyespt
dc.identifier.doi10.1109/ACCESS.2018.2875068pt
degois.publication.volume6pt
dc.date.embargo2018-01-01*
uc.date.periodoEmbargo0pt
item.openairetypearticle-
item.fulltextCom Texto completo-
item.languageiso639-1en-
item.grantfulltextopen-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
crisitem.author.researchunitCISUC - Centre for Informatics and Systems of the University of Coimbra-
crisitem.author.researchunitCISUC - Centre for Informatics and Systems of the University of Coimbra-
crisitem.author.researchunitCISUC - Centre for Informatics and Systems of the University of Coimbra-
crisitem.author.parentresearchunitFaculty of Sciences and Technology-
crisitem.author.parentresearchunitFaculty of Sciences and Technology-
crisitem.author.parentresearchunitFaculty of Sciences and Technology-
crisitem.author.orcid0000-0002-1097-7742-
crisitem.author.orcid0000-0001-9278-6503-
crisitem.author.orcid0000-0003-1615-2925-
crisitem.author.orcid0000-0002-5079-8327-
Appears in Collections:I&D CISUC - Artigos em Revistas Internacionais
Files in This Item:
Show simple item record

SCOPUSTM   
Citations

8
checked on Nov 17, 2022

WEB OF SCIENCETM
Citations

5
checked on Nov 15, 2022

Page view(s)

73
checked on Jul 17, 2024

Download(s)

136
checked on Jul 17, 2024

Google ScholarTM

Check

Altmetric

Altmetric


This item is licensed under a Creative Commons License Creative Commons