[go: up one dir, main page]

Cho et al., 2025 - Google Patents

Conversational AI forensics: A case study on ChatGPT, Gemini, Copilot, and Claude

Cho et al., 2025

Document ID
9028659497429215718
Author
Cho K
Park Y
Kim J
Kim B
Jeong D
Publication year
Publication venue
Forensic Science International: Digital Investigation

External Links

Snippet

Recent advances in conversational AI services have attracted interest from both specialized technical communities and the general public. Major IT companies such as OpenAI, Microsoft, and Google are actively developing and enhancing conversational AI …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/14Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
    • G06F17/141Discrete Fourier transforms

Similar Documents

Publication Publication Date Title
Samtani et al. Linking exploits from the dark web to known vulnerabilities for proactive cyber threat intelligence: An attention-based deep structured semantic model
Martinez-Caro et al. A comparative study of web content management systems
Quick et al. Cloud storage forensics
RU2637477C1 (en) System and method for detecting phishing web pages
Cho et al. Conversational AI forensics: A case study on ChatGPT, Gemini, Copilot, and Claude
Harichandran et al. CuFA: A more formal definition for digital forensic artifacts
Mirza et al. Mobile cyber forensic investigations of web3 wallets on android and ios
Riadi et al. Forensic investigation technique on android's blackberry messenger using nist framework
Pandey et al. Efficient usage of web forensics, disk forensics and email forensics in successful investigation of cyber crime
Ghanem et al. D2WFP: a novel protocol for forensically identifying, extracting, and analysing deep and dark web browsing activities
Pandela et al. Browser forensics on web-based tiktok applications
Hughes et al. Browsers’ private mode: is it what we were promised?
Barros et al. Forensic analysis of the bumble dating app for android
Krishnan et al. Interplay of digital forensics in ediscovery
Javed et al. Analyzing Tor browser artifacts for enhanced web forensics, anonymity, cybersecurity, and privacy in Windows-Based systems
Walkow et al. Systematically Searching for Identity-Related Information in the Internet with OSINT Tools
Manzoor et al. Challenges of Data Extraction from Facebook & WhatsApp Applications
US20240037157A1 (en) Increasing security of a computer program using unstructured text
Spreitzenbarth et al. Mastering python forensics
Liu et al. A research and analysis method of open source threat intelligence data
Hunton Managing the technical resource capability of cybercrime investigation: a UK law enforcement perspective
Tyagi et al. Forensic analysis and privacy implications of LLM mobile apps: A case study of ChatGPT, Copilot, and Gemini
Sharma et al. IoT forensics in ambient intelligence environments: Legal issues, research challenges and future directions
Hyder et al. Towards digital forensics investigation of wordpress applications running over kubernetes
David et al. A two-stage model for social network investigations in digital forensics