mirror of
https://github.com/frankwxu/digital-forensics-lab.git
synced 2026-02-20 13:40:40 +00:00
add CIKM2024 tutorial PPTs
This commit is contained in:
BIN
AI4Forensics/CKIM2024/CIKM2024_PPTs.pdf
Normal file
BIN
AI4Forensics/CKIM2024/CIKM2024_PPTs.pdf
Normal file
Binary file not shown.
@@ -27,7 +27,7 @@ By fostering a collaborative learning environment, this tutorial aims to empower
|
||||
|
||||
---
|
||||
|
||||
## Table of Contents
|
||||
## Table of Contents [PPT](CIKM2024_PPTs.pdf)
|
||||
|
||||
- Introduction
|
||||
- [Forensic evidence entity recognition (hands-on lab)](#forensic-evidence-analysis)
|
||||
@@ -46,9 +46,9 @@ By fostering a collaborative learning environment, this tutorial aims to empower
|
||||
|
||||
### Forensic Evidence Analysis
|
||||
|
||||
The cyber incident report documents a conversation between an IT Security Specialist and an Employee about an email phishing attack. We use LLMs to identify evidence entities and relationships and to construct digital forensic knowledge graphs.
|
||||
The [Cyber incident report](PhishingAttack/PhishingAttackScenarioDemo/conversation.txt) documents a conversation between an IT Security Specialist and an Employee about an email phishing attack. We use LLMs to identify evidence entities and relationships and to construct digital forensic knowledge graphs.
|
||||
|
||||
Here is an example of a reconstructed digital forensics knowledge graph:
|
||||
Here is an example of a reconstructed digital forensics knowledge graph using an LLM only:
|
||||
|
||||
<img src="PhishingAttack/PhishingAttackScenarioDemo/05_output_viz.png" width="400">
|
||||
|
||||
|
||||
Reference in New Issue
Block a user