2014
DOI: 10.1016/j.diin.2014.03.003
|View full text |Cite
|
Sign up to set email alerts
|

Practical use of Approximate Hash Based Matching in digital investigations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…As discussed by Bjelland et al (2014), there are scenarios where headers share relevant information: "similar conversation" (i.e., caused by the 'from', 'to' and 'cc' fields in the header). Therefore, we changed our preprocessing so that now only header information is considered.…”
Section: Assessment For E-mail (Metadata)mentioning
confidence: 99%
See 2 more Smart Citations
“…As discussed by Bjelland et al (2014), there are scenarios where headers share relevant information: "similar conversation" (i.e., caused by the 'from', 'to' and 'cc' fields in the header). Therefore, we changed our preprocessing so that now only header information is considered.…”
Section: Assessment For E-mail (Metadata)mentioning
confidence: 99%
“…X-Headers are additional personalized information in the header that can be added. An example is given in the following: As indicated by Bjelland et al (2014), "the majority of the resulting matches fell into one of these three manually defined categories:…”
Section: E-mail Structure and Their Similaritymentioning
confidence: 99%
See 1 more Smart Citation
“…One can use them in identifying new versions of documents and software, embedded objects (e.g., jpg file inside a word document), objects in network packets (without reconstructing the packet flow), locating variants of malware families, clustering, code reuse (intellectual property protection and/or bug detection), detection of deleted objects (fragments remaining on disk), deduplication on storage systems (e.g., cloud computing: save storage and bandwidth), and cross-device deduplication, among others [10][11][12]. Also, Bjelland et al [13] present other common scenarios in which approximate matching can be used, showing practical experiments in which forensics can benefit from this technology. In one experiment, they look for emails using a small set given as leads to figure out other similar ones.…”
Section: Applicationsmentioning
confidence: 99%
“…13) , in this case, is the load factor (0 ≤ ≤ 1) used to express the percentage of the filter currently used.…”
Section: A7 Mrsh-cfmentioning
confidence: 99%