The Experts below are selected from a list of 840 Experts worldwide ranked by ideXlab platform
Nitin Agarwal - One of the best experts on this subject based on the ideXlab platform.
-
social Cyber Forensics leveraging open source information and social network analysis to advance Cyber security informatics
Computational and Mathematical Organization Theory, 2019Co-Authors: Samer Alkhateeb, Nitin AgarwalAbstract:In this paper, we introduce the concept of social Cyber Forensics and its usability. Then, we introduce a tool, i.e., Maltego that can be used to study the cross-media affiliation and uncover hidden relations among various online groups. We also provide three stepwise methodologies that leverage Maltego and various open source information to uncover the hidden relationship among (1) Twitter accounts and a set of websites/blogs; (2) websites/blogs and other websites/blogs; or (3) infer the ownership of a set of websites/blogs. These methodologies have been tested during many Cyber propaganda campaigns that were projected against NATO forces. A high-level view of these case studies that leveraged the concepts and methodologies provided in this paper are briefly highlighted here while the details of each case were published in various venues which are pointed out for interested readers.
-
social Cyber Forensics scf uncovering hidden relationships
2019Co-Authors: Samer Alkhateeb, Nitin AgarwalAbstract:In this chapter, we will introduce the concept of social Cyber Forensics (SCF) and its usability. Then, we will introduce a tool, i.e., Maltego that can be used to study the cross-media affiliation and uncover hidden relations among different ODGs . In Sect. 4.2 we will provide three stepwise methodologies that can be followed to reach the desired outcome of analysis (e.g., uncovering the hidden relationship between Twitter accounts and a set of websites or blog sites, websites or blog sites and other websites or blog sites, and infer the ownership of a set of websites or blog sites). These methodologies have been tested during many Cyber propaganda campaigns to associate and infer the relationships between different online groups. We also provide hands-on exercises to practice each of the methodologies introduced.
-
leveraging social network analysis and Cyber Forensics approaches to study Cyber propaganda campaigns
2019Co-Authors: Samer Alkhateeb, Muhammad Nihal Hussain, Nitin AgarwalAbstract:In today’s information technology age, our political discourse is shrinking to fit our smartphone screens. Further, with the availability of inexpensive and ubiquitous mass communication tools like social media, disseminating false information and propaganda is both convenient and effective. Groups use social media to coordinate Cyber propaganda campaigns in order to achieve strategic and political goals, influence mass thinking, and steer behaviors or perspectives about an event. In this research, we study the online deviant groups (ODGs) who created a lot of Cyber propaganda that were projected against the NATO’s Trident Juncture Exercise 2015 (TRJE 2015) on both Twitter and blogs. Anti-NATO narratives were observed on social media websites that got stronger as the TRJE 2015 event approached. Call for civil disobedience, planned protests, and direct action against TRJE 2015 propagated on social media websites. We employ computational social network analysis and Cyber Forensics informed methodologies to study information competitors who seek to take the initiative and the strategic message away from NATO in order to further their own agenda. Through social Cyber Forensics tools, e.g., Maltego, we extract metadata associated with propaganda-riddled websites. The extracted metadata helps in the collection of social network information (i.e., friends and followers) and communication network information (i.e., network depicting the flow of information such as tweets, retweets, mentions, and hyperlinks). Through computational social network analysis, we identify influential users and powerful groups (or the focal structures) coordinating the Cyber propaganda campaigns. The study examines 21 blogs having over 18,000 blog posts dating back to 1997 and over 9000 Twitter users for the period between August 3, 2014, and September 12, 2015. These blogs were identified, crawled, and stored in our database that is accessible through the Blogtrackers tool. Blogtrackers tool further helped us identify the activity patterns of blogs, keyword patterns, and the influence a blog or a blogger has on the community, and analyze the sentiment diffusion in the community.
-
social Cyber Forensics approach to study twitter s and blogs influence on propaganda campaigns
International Conference on Social Computing, 2017Co-Authors: Samer Alkhateeb, Muhammad Nihal Hussain, Nitin AgarwalAbstract:In today’s information technology age our political discourse is shrinking to fit our smartphone screens. Online Deviant Groups (ODGs) use social media to coordinate Cyber propaganda campaigns to achieve strategic and political goals, influence mass thinking, and steer behaviors. In this research, we study the ODGs who conducted Cyber propaganda campaigns against NATO’s Trident Juncture Exercise 2015 (TRJE 2015) and how they used Twitter and blogs to drive the campaigns. Using a blended Social Network Analysis (SNA) and Social Cyber Forensics (SCF) approaches, “anti-NATO” narratives were identified on blogs. The narratives intensified as the TRJE 2015 approached. The most influential narrative identified by the proposed methodology called for civil disobedience and direct actions against TRJE 2015 specifically and NATO in general. We use SCF analysis to extract metadata associated with propaganda-riddled websites. The metadata helps in the collection of social and communication network information. By applying SNA on the data, we identify influential users and powerful groups (or, focal structures) coordinating the propaganda campaigns. Data for this research (including blogs and metadata) is accessible through our in-house developed Blogtrackers tool.
-
SBP-BRiMS - Social Cyber Forensics Approach to Study Twitter’s and Blogs’ Influence on Propaganda Campaigns
Social Cultural and Behavioral Modeling, 2017Co-Authors: Samer Al-khateeb, Muhammad Nihal Hussain, Nitin AgarwalAbstract:In today’s information technology age our political discourse is shrinking to fit our smartphone screens. Online Deviant Groups (ODGs) use social media to coordinate Cyber propaganda campaigns to achieve strategic and political goals, influence mass thinking, and steer behaviors. In this research, we study the ODGs who conducted Cyber propaganda campaigns against NATO’s Trident Juncture Exercise 2015 (TRJE 2015) and how they used Twitter and blogs to drive the campaigns. Using a blended Social Network Analysis (SNA) and Social Cyber Forensics (SCF) approaches, “anti-NATO” narratives were identified on blogs. The narratives intensified as the TRJE 2015 approached. The most influential narrative identified by the proposed methodology called for civil disobedience and direct actions against TRJE 2015 specifically and NATO in general. We use SCF analysis to extract metadata associated with propaganda-riddled websites. The metadata helps in the collection of social and communication network information. By applying SNA on the data, we identify influential users and powerful groups (or, focal structures) coordinating the propaganda campaigns. Data for this research (including blogs and metadata) is accessible through our in-house developed Blogtrackers tool.
Elfadil Sabeil - One of the best experts on this subject based on the ideXlab platform.
-
Cyber Forensics competency-based framework – a review
International journal of new computer architectures and their applications, 2020Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini IsmailAbstract:Lack of Cyber Forensics experts is a huge challenge facing the world today. It comes due to the fancy of Cyber Forensics training or education. The multidisciplinary nature of Cyber Forensics proliferates to diverse training programmes, from a handful day’s workshop to Postgraduate in Cyber Forensics. Consequently, this paper concentrates on analyzing the Cyber Forensics training programmes in terms of Competency-Based Framework. The study proves that Cyber Forensics training or education has improper Competency-Based Framework.
-
AMLTA - Development of Malaysian Digital Forensics Investigator Competency Identification Methods
Communications in Computer and Information Science, 2012Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini IsmailAbstract:Cyber Forensics Investigations and its training/education are relatively new. The nature of Cyber Forensics is complex that requires multidisciplinary skills, knowledge and abilities. Although there are proliferations training/ education programs, from a handful of day’s workshop to Masters Degree in Cyber Forensics, the world lacks of Cyber Forensics Investigators due to some factors. Consequently, this paper focuses on Competency Identification Requirements. The majority of the respondents (average of 95.66%) agreed that various stakeholders should carry out the Competency Identification stage, while, 86.7% of the respondents supported the characteristics of Competency Identification. Moreover, there is a significant relationship between Competency Identification and Cyber Forensics Investigator Proficiency.
-
trainees competency based assessment methods in Cyber Forensics education or training programmes a review
International Conference on Software Engineering and Computer Systems, 2011Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini Ismail, Mohamed AbasAbstract:Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day’s workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the trainees’ Competency Based-Assessment implementation. The study finds that Cyber Forensics training or education has inappropriate trainees’ Competency Based-Assessment below 50%.
-
ICSECS (1) - Trainees’ Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes – A Review
Software Engineering and Computer Systems, 2011Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini Ismail, Mohamed AbasAbstract:Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day’s workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the trainees’ Competency Based-Assessment implementation. The study finds that Cyber Forensics training or education has inappropriate trainees’ Competency Based-Assessment below 50%.
-
Cyber Forensics competency based framework a review
International journal of new computer architectures and their applications, 2011Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini IsmailAbstract:Lack of Cyber Forensics experts is a huge challenge facing the world today. It comes due to the fancy of Cyber Forensics training or education. The multidisciplinary nature of Cyber Forensics proliferates to diverse training programmes, from a handful day’s workshop to Postgraduate in Cyber Forensics. Consequently, this paper concentrates on analyzing the Cyber Forensics training programmes in terms of Competency-Based Framework. The study proves that Cyber Forensics training or education has improper Competency-Based Framework.
Zuraini Ismail - One of the best experts on this subject based on the ideXlab platform.
-
Cyber Forensics competency-based framework – a review
International journal of new computer architectures and their applications, 2020Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini IsmailAbstract:Lack of Cyber Forensics experts is a huge challenge facing the world today. It comes due to the fancy of Cyber Forensics training or education. The multidisciplinary nature of Cyber Forensics proliferates to diverse training programmes, from a handful day’s workshop to Postgraduate in Cyber Forensics. Consequently, this paper concentrates on analyzing the Cyber Forensics training programmes in terms of Competency-Based Framework. The study proves that Cyber Forensics training or education has improper Competency-Based Framework.
-
AMLTA - Development of Malaysian Digital Forensics Investigator Competency Identification Methods
Communications in Computer and Information Science, 2012Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini IsmailAbstract:Cyber Forensics Investigations and its training/education are relatively new. The nature of Cyber Forensics is complex that requires multidisciplinary skills, knowledge and abilities. Although there are proliferations training/ education programs, from a handful of day’s workshop to Masters Degree in Cyber Forensics, the world lacks of Cyber Forensics Investigators due to some factors. Consequently, this paper focuses on Competency Identification Requirements. The majority of the respondents (average of 95.66%) agreed that various stakeholders should carry out the Competency Identification stage, while, 86.7% of the respondents supported the characteristics of Competency Identification. Moreover, there is a significant relationship between Competency Identification and Cyber Forensics Investigator Proficiency.
-
trainees competency based assessment methods in Cyber Forensics education or training programmes a review
International Conference on Software Engineering and Computer Systems, 2011Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini Ismail, Mohamed AbasAbstract:Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day’s workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the trainees’ Competency Based-Assessment implementation. The study finds that Cyber Forensics training or education has inappropriate trainees’ Competency Based-Assessment below 50%.
-
ICSECS (1) - Trainees’ Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes – A Review
Software Engineering and Computer Systems, 2011Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini Ismail, Mohamed AbasAbstract:Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day’s workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the trainees’ Competency Based-Assessment implementation. The study finds that Cyber Forensics training or education has inappropriate trainees’ Competency Based-Assessment below 50%.
-
Cyber Forensics competency based framework a review
International journal of new computer architectures and their applications, 2011Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini IsmailAbstract:Lack of Cyber Forensics experts is a huge challenge facing the world today. It comes due to the fancy of Cyber Forensics training or education. The multidisciplinary nature of Cyber Forensics proliferates to diverse training programmes, from a handful day’s workshop to Postgraduate in Cyber Forensics. Consequently, this paper concentrates on analyzing the Cyber Forensics training programmes in terms of Competency-Based Framework. The study proves that Cyber Forensics training or education has improper Competency-Based Framework.
Mohamed Abas - One of the best experts on this subject based on the ideXlab platform.
-
trainees competency based assessment methods in Cyber Forensics education or training programmes a review
International Conference on Software Engineering and Computer Systems, 2011Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini Ismail, Mohamed AbasAbstract:Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day’s workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the trainees’ Competency Based-Assessment implementation. The study finds that Cyber Forensics training or education has inappropriate trainees’ Competency Based-Assessment below 50%.
-
ICSECS (1) - Trainees’ Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes – A Review
Software Engineering and Computer Systems, 2011Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini Ismail, Mohamed AbasAbstract:Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day’s workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the trainees’ Competency Based-Assessment implementation. The study finds that Cyber Forensics training or education has inappropriate trainees’ Competency Based-Assessment below 50%.
Azizah Abdul Manaf - One of the best experts on this subject based on the ideXlab platform.
-
Cyber Forensics competency-based framework – a review
International journal of new computer architectures and their applications, 2020Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini IsmailAbstract:Lack of Cyber Forensics experts is a huge challenge facing the world today. It comes due to the fancy of Cyber Forensics training or education. The multidisciplinary nature of Cyber Forensics proliferates to diverse training programmes, from a handful day’s workshop to Postgraduate in Cyber Forensics. Consequently, this paper concentrates on analyzing the Cyber Forensics training programmes in terms of Competency-Based Framework. The study proves that Cyber Forensics training or education has improper Competency-Based Framework.
-
AMLTA - Development of Malaysian Digital Forensics Investigator Competency Identification Methods
Communications in Computer and Information Science, 2012Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini IsmailAbstract:Cyber Forensics Investigations and its training/education are relatively new. The nature of Cyber Forensics is complex that requires multidisciplinary skills, knowledge and abilities. Although there are proliferations training/ education programs, from a handful of day’s workshop to Masters Degree in Cyber Forensics, the world lacks of Cyber Forensics Investigators due to some factors. Consequently, this paper focuses on Competency Identification Requirements. The majority of the respondents (average of 95.66%) agreed that various stakeholders should carry out the Competency Identification stage, while, 86.7% of the respondents supported the characteristics of Competency Identification. Moreover, there is a significant relationship between Competency Identification and Cyber Forensics Investigator Proficiency.
-
trainees competency based assessment methods in Cyber Forensics education or training programmes a review
International Conference on Software Engineering and Computer Systems, 2011Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini Ismail, Mohamed AbasAbstract:Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day’s workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the trainees’ Competency Based-Assessment implementation. The study finds that Cyber Forensics training or education has inappropriate trainees’ Competency Based-Assessment below 50%.
-
ICSECS (1) - Trainees’ Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes – A Review
Software Engineering and Computer Systems, 2011Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini Ismail, Mohamed AbasAbstract:Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day’s workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the trainees’ Competency Based-Assessment implementation. The study finds that Cyber Forensics training or education has inappropriate trainees’ Competency Based-Assessment below 50%.
-
Cyber Forensics competency based framework a review
International journal of new computer architectures and their applications, 2011Co-Authors: Elfadil Sabeil, Azizah Abdul Manaf, Zuraini IsmailAbstract:Lack of Cyber Forensics experts is a huge challenge facing the world today. It comes due to the fancy of Cyber Forensics training or education. The multidisciplinary nature of Cyber Forensics proliferates to diverse training programmes, from a handful day’s workshop to Postgraduate in Cyber Forensics. Consequently, this paper concentrates on analyzing the Cyber Forensics training programmes in terms of Competency-Based Framework. The study proves that Cyber Forensics training or education has improper Competency-Based Framework.