References
- Fox, A. et al. Above the clouds: A berkeley view of cloud computing. Dept. Electr. Eng. Comput. Sci. Univ. California, Berkeley, Rep. UCB/EECS; Pg1-26, 2009.
- Grance T, et al. Guidelines on security and privacy in public cloud computing? Public Cloud Comput Secur Priv Guidel. 2012:1–95. doi:https://doi.org/10.3233/gov-2011-0269.
- Baror OS, Venter H A taxonomy for cybercrime attack in the public cloud. In: 14th International Conference on Cyber Warfare and Security, ICCWS 2019. 505–515; 2019.
- Roukos S. Natural language understanding. Springer Handbooks Pearson; 2008. doi:https://doi.org/10.1007/978-3-540-49127-9_31.
- King BE, Reinold K. Natural language processing. Find Concept. 2014:67–78. doi:https://doi.org/10.1016/b978-1-84334-318-9.50005-3.
- Liddy E. D. Natural language processing. In: Encyclopedia of library and information science. Marcel Decker, Inc; Surface.syr.edu; 2001. p. 1–15.
- Hirschberg J, Manning CD. Advances in natural language processing. Science. 2015;349:.261–266. doi:https://doi.org/10.1126/science.aaa8685.
- Vincze EA. Challenges in digital forensics. Police Pract Res. 2016;17:183–194. doi:https://doi.org/10.1080/15614263.2015.1128163.
- Ikuesan AR, Venter HS. Digital behavioral-fingerprint for user attribution in digital forensics: are we there yet? Digit Investig. 2019;30:73–89. doi:https://doi.org/10.1016/j.diin.2019.07.003.
- Mohlala M, Ikuesan AR, Venter HS User attribution based on keystroke dynamics in digital forensic readiness process. In: 2017 IEEE Conf. Appl. Inf. Netw. Secur. AINS 2017, Miri, Sarawak Malaysia on 13–14 November 2017- Janua. 1–6; 2018.
- O’Day DR, Calix RA Text message corpus: applying natural language processing to mobile device forensics. In: Electron. Proc. 2013 IEEE Int. Conf. Multimed. Expo Work. ICMEW 2013; San Jose, CA, USA2013. doi:https://doi.org/10.1109/ICMEW.2013.6618380
- Carrier B. Open source digital forensics tools: the legal argument. Techreport, Stake; 2002.
- Carrier BD. Digital forensics works. IEEE Secur Priv. 2009;7:26–29. doi:https://doi.org/10.1109/MSP.2009.35.
- Arthur KK, Venter HS. An investigation into computer forensic tools. Issa. 2004;1(1):1–11.
- Valjarevic A, Venter HS. A comprehensive and harmonized digital forensic investigation process model. J For Sci. 2015;60:1467–1483. doi:https://doi.org/10.1111/1556-4029.12823.
- Omeleze S, Venter HS Testing the harmonised digital forensic investigation process model-using an Android mobile phone. In: 2013 Information Security for South Africa – Proceedings of the ISSA 2013 Conference; 2013. doi:https://doi.org/10.1109/ISSA.2013.6641063
- Valjarevic A, Venter HS. Introduction of concurrent processes into the digital forensic investigation process. Aust J For Sci. 2016;48:339–357. doi:https://doi.org/10.1080/00450618.2015.1052754.
- Mumba ER, Venter HS Testing and evaluating the harmonized digital forensic investigation process in post mortem digital investigations. In: Proceedings of the Conference on Digital Forensics, Security and Law. 83–98; South Africa; 2014.
- McKemmish R. When is digital evidence forensically sound? IFIP international federation for information processing. Boston, MA: Springer; 2008. p. 285.
- Martini B, Choo KKR. An integrated conceptual digital forensic framework for cloud computing. Digit Investig. 2012;9:71–80. doi:https://doi.org/10.1016/j.diin.2012.07.001.
- Omeleze S, Venter HSHS. Proof of concept of the online neighbourhood watch system. Lect Notes Inst Comp Sci. 2016;171:78–93.
- Omeleze S, Venter HSHS. Digital forensic application requirements specification process. Aust J For Sci. 2019;51:371–394. doi:https://doi.org/10.1080/00450618.2017.1374456.
- Harris MD. Introduction to natural language processing. USA: Reston Publishing Co; 1985.
- Strawson PF. Subject and predicate in logic and grammar. Routledge; 2017. doi:https://doi.org/10.4324/9781315242132.
- Allen J. Natural language understanding. Addison Wesley, Benjamin/Cumming; 1995, ISBN: 0805303340, 9780805303346.
- Wilks Y. Natural language processing. Commun ACM. 1996;39:60–62. doi:https://doi.org/10.1145/234173.234180.
- Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, et al. A view of cloud computing. Commun ACM. 2010;53:50–58. doi:https://doi.org/10.1145/1721654.1721672.
- Uschie. History & evolution of cloud computing, 2018, associate Vice President in Seasia Infotech, a CMMi Level 5 certified software development organization in its office in Mohali, Punjab. [Online]. 2018. https://www.seasiainfotech.com/blog/history-and-evolution-cloud-computing
- Pasquale L, Hanvey S, McGloin M, Nuseibeh B, Pasquale L, Hanvey S. Adaptive evidence collection in the cloud using attack scenarios. Comput Secur. 2016;59:236–254. doi:https://doi.org/10.1016/j.cose.2016.03.001.
- Pichan A, Lazarescu M, Soh ST. Cloud forensics: technical challenges, solutions and comparative analysis. Digit Investig. 2015;13:38–57. doi:https://doi.org/10.1016/j.diin.2015.03.002.
- Moore S, van der Meulen R. Gartner survey says cloud computing remains top emerging business risk. Alertify; 2018. https://alertify.eu/gartner-survey-says-cloud-computing-remains-top-emerging-business-risk/
- Kulkarni G. Cloud computing-software as service. Int J Cloud Comput Serv Sci. 2012;1:11.
- Arutyunov VV. Cloud computing: its history of development, modern state, and future considerations. Sci Tech Inf Process. 2012;39:173–178. doi:https://doi.org/10.3103/S0147688212030082.
- Zawoad S, Dutta AK, Hasan R. Towards building forensics enabled cloud through secure logging-as-a-service. IEEE Trans Depend Secur Comput. 2016;13:148–162. doi:https://doi.org/10.1109/TDSC.2015.2482484.
- Abdullah S, Abu Bakar KA, Abbas H, Maennel O, Assar S. Security and privacy challenges in cloud computing. Proc 2018 Cyber Resil Conf. 2019;8:24–31.
- Liu C, Singhal A, Wijesekera D. Identifying evidence for cloud forensic analysis. In: Research advances in cloud computing; 2017. p. 371–391. doi:https://doi.org/10.1007/978-981-10-5026-8_15.
- Garfinkel S, Farrell P, Roussev V, Dinolt G. Bringing science to digital forensics with standardized forensic corpora. DFRWS 2009 Annu Conf. 2009;6:S2—-S11.
- Prayudi Y, SN A. Digital chain of custody: state of the art. Int J Comput Appl. 2015. doi:https://doi.org/10.5120/19971-1856.
- Finklea KM, Theohary CA. Cybercrime: conceptual issues for congress and U.S. law enforcement. In: Cybercrime: conceptualized and codified. Washington, DC: Library of Congress, Congressional Research Service; 2013. p. 1–27.
- Brown CSD. Investigating and prosecuting cyber crime: forensic dependencies and barriers to justice. Int J Cyber Criminol. 2015;9:55–119.
- Omeleze Baror S, Ikuesan, Adeyemi R, Venter HS A defined digital forensic criteria for cybercrime reporting. In: Brian P, Hongyi W (eds.),ICCWS20 – Proceedings of the 15th International Conference on Cyber Warfare and Security, USA, 658. ACPIL; 2020.
- Gould C, Burger J, The NG. SAPS crime statistics: what they tell us–and what they don’t. South Afr Crime Q. 2014;42:3–12. doi:https://doi.org/10.4314/sacq.v50i1.
- Van Niekerk B. An analysis of cyber-incidents in South Africa. AfrJ Inf Commun. 2017;2017:113–132. doi:https://doi.org/10.23962/10539/23573.
- Morgan S 2017 Cybercrime report. 2017 Cyberrime report. 1–14; 2017.
- Bilder RB, Zagaris B, Clark RS. The United Nations crime prevention and criminal justice program: formulation of standards and efforts at their implementation. Am J Int Law. 1997;91:408. doi:https://doi.org/10.2307/2954230.
- Clark RS. The United Nations crime prevention and criminal justice program: formulation of standards and efforts at their implementation. Pennsylvania, USA: University of Pennsylvania Press; 1994.
- Zhou L, Burgoon JK, Nunamaker JF, Twitchell D. Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communication. Gr Decis Negot. 2004;13:81–106. doi:https://doi.org/10.1023/B:GRUP.0000011944.62889.6f.
- Hussein NH, Khalid A. A survey of cloud computing security challenges and solutions. Int J Comput Sci Inf Secur. 2016;14:52–56.
- Sammons M, Christodoulopoulos C, Kordjamshidi P, et al. Edison: feature extraction for NLP, simplified. In: Proceedings of the Tenth International Conference on Language Resources and Evaluation (LREC’16). 4085–4092, Portorož, Slovenia; 2016.
- Hussein DMEDM. A survey on sentiment analysis challenges. J King Saud Univ Eng Sci. 2018;30:330–338.
- Liu H. Feature engineering for machine learning and data analytics. Feature engineering for machine learning and data analytics. ‘ O’Reilly Media, Inc.’; 2018. doi:https://doi.org/10.1201/9781315181080.
- Arneklev BJ, Grasmick HG, Bursik RJ. Evaluating the dimensionality and invariance of ‘low self-control’. J Quant Criminol. 1999;15:.307–331. doi:https://doi.org/10.1023/A:1007528515341.
- Angeli G, Manning CD NaturalLI: natural logic inference for common sense reasoning. In: EMNLP 2014–2014 Conference on Empirical Methods in Natural Language Processing, Proceedings of the Conference; 2014. doi:https://doi.org/10.3115/v1/d14-1059
- Zellers R, Bisk Y, Schwartz R, Choi Y SWAG: a large-scale adversarial dataset for grounded commonsense inference. In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. 93–104: Association for Computational Linguistics; 2019. doi:https://doi.org/10.18653/v1/d18-1009
- Badecker W, Caramazza A. Morphological composition in the lexical output system. Cogn Neuropsychol. 1991;8:.335–367. doi:https://doi.org/10.1080/02643299108253377.
- Wang Z, Mi H, Ittycheriah A Sentence similarity learning by lexical decomposition and composition. In: COLING 2016-26th International Conference on Computational Linguistics, Proceedings of COLING 2016: Technical Papers, Osaka, Japan; 2016.
- Rasmi M, Jantan A, Al-mimi H A new approach for resolving cyber crime in network forensics based on generic process model. In: The 6th International Conference on Information Technology, Amman, Jordan; 2013.
- Heartfield R, Loukas G, Budimir S, Bezemskij A, Fontaine JRJ, Filippoupolitis A, Roesch E. A taxonomy of cyber-physical threats and impact in the smart home. Comput Secur. 2018;78:398–428. doi:https://doi.org/10.1016/j.cose.2018.07.011.
- Alex ME, Kishore R. Forensics framework for cloud computing. Comput Electr Eng. 2017;60:193–205. doi:https://doi.org/10.1016/j.compeleceng.2017.02.006.
- Manoj SKA, Bhaskari DL. Cloud forensics – a framework for investigating cyber attacks in cloud environment. Procedia Comput Sci. 2016;85:149–154. doi:https://doi.org/10.1016/j.procs.2016.05.202.
- Costello K, Gartner forecasts worldwide public cloud revenue to grow 17.5 percent in 2019. Gartner.Com. 2019:1–5. https://www.gartner.com/en/newsroom/press-releases/2019-04-02-gartner-forecasts-worldwide-public-cloud-revenue-to-g
- Ramgovind S, Eloff MM, Smith E The management of security in cloud computing. In: Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010. 1–7; 2010. doi:https://doi.org/10.1109/ISSA.2010.5588290
- Anderson R. Measuring the cost of cybercrime. In: The economics of information security and privacy. Springer; 2013. p. 265–300. doi:https://doi.org/10.1007/978-3-642-39498-0_12.
- Gañán CH, Ciere M, Van Eeten M Beyond the pretty penny: the economic impact of cybercrime. In: ACM International Conference Proceeding Series. 35–45; 2017. doi:https://doi.org/10.1145/3171533.3171535
- Wiles J, Reyes A. The best damn cybercrime and digital forensics book period. The best damn cybercrime and digital forensics book period. Printed in the United States of America 1234567890 and Published by Syngress; 2011. doi:https://doi.org/10.1016/B978-1-59749-228-7.X0001-X.
- Duren BM, Hosmer C Can digital evidence endure the test of time? In: Proceedings of the Digital Forensic Research Conference, DFRWS, Syracuse, New York, USA; 2002.
- McKenna B. Symantec’s Thompson pronounces old style IT security dead. Netw Secur. 2005;2005:1–3. doi:https://doi.org/10.1016/S1353-4858(05)00194-7.
- Satolla D, Judy HL. Towards a dynamic approach to enhancing international cooperation and collaboration in cyber security legal frameworks: reflections on the proceedings of the workshop on cybersecurity legal issues at the 2010 United Nations Internet Governance Forum. William Mitchell Law Rev. 2011;37:1745–1804.
- Wolter D. The UN takes a big step forward on cybersecurity. Arms Control Today. 2013;43:25–29.
- Schjølberg S, Ghernaouti-Hélie S. A global protocol on cybersecurity and cybercrime. Oslo: Cybercrimedata; 2011. ISBN 978-82-997274-3-3978-82-997274-3-3; 2e édition2e.
- Zissis D, Lekkas D. Addressing cloud computing security issues. Futur Gener Comput Syst. 2012;28:583–592. doi:https://doi.org/10.1016/j.future.2010.12.006.
- Schneier, B, Secrets and lies: digital security in a networked world [Books]. IEEE spectrum. Vol. 37. Hoboken, New Jersey: John Wiley & Sons; 2005.