
described in (Amato et al., 2020b) to enrich the fact
enhancement phase of post-processing with more data
correlation capabilities. To continuously support new
UCO/CASE releases, we will develop an automated
class generator from the JSON-LD ontology repre-
sentation. This will allow for hassle-free adoption of
any future iteration of the specification.
Ontologies play a crucial role in the realm of ar-
tificial intelligence, especially in automating analysis
and facilitating the deduction of new knowledge. By
structuring data in a standardized, machine-readable
format, ontologies enable AI systems to interpret
complex relationships and extract insights that might
not be readily apparent. Our current project exempli-
fies this, as we are actively engaged in processing the
provided ontology using advanced Large Language
Models (LLMs). This approach not only enhances the
depth and accuracy of analysis but also paves the way
for uncovering new patterns and connections within
the data, showcasing the powerful synergy between
ontology structures and AI capabilities.
REFERENCES
Amato, F., Castiglione, A., Cozzolino, G., and Narducci,
F. (2020a). A semantic-based methodology for digital
forensics analysis. Journal of Parallel and Distributed
Computing, 138:172–177.
Amato, F., Castiglione, A., Cozzolino, G., and Narducci,
F. (2020b). A semantic-based methodology for digital
forensics analysis. Journal of Parallel and Distributed
Computing, 138:172–177.
Ameerbakhsh, O., Ghabban, F. M., Alfadli, I. M., AbuAli,
A. N., Al-Dhaqm, A., and Al-Khasawneh, M. A.
(2021). Digital forensics domain and metamodeling
development approaches. In 2021 2nd International
Conference on Smart Computing and Electronic En-
terprise (ICSCEE), pages 67–71. IEEE.
Barnum, S., Martin, R., Worrell, B., and Kirillov, I. (2020).
Cyber observable expression (cybox™) archive web-
site.
Brinson, A., Robinson, A., and Rogers, M. (2006). A cyber
forensics ontology: Creating a new approach to study-
ing cyber forensics. digital investigation, 3:37–43.
Carvey, H. (2015). Micro- & mini-timelines. Windows In-
cident Response.
Casey, E., Back, G., and Barnum, S. (2015). Leveraging
cybox™ to standardize representation and exchange
of digital forensic information. Digital Investigation,
12:S102–S110.
Casey, E., Barnum, S., Griffith, R., Snyder, J., van Beek,
H., and Nelson, A. (2017). Advancing coordinated
cyber-investigations and tool interoperability using a
community developed specification language. Digital
Investigation, 22:14–45.
Casey, E., Barnum, S., Griffith, R., Snyder, J., van Beek,
H., and Nelson, A. (2018). The Evolution of Express-
ing and Exchanging Cyber-Investigation Information
in a Standardized Form, pages 43–58. Springer Inter-
national Publishing, Cham.
Chabot, Y., Bertaux, A., Kechadi, T., and Nicolle, C.
(2015a). Event reconstruction: A state of the art.
Handbook of Research on Digital Crime, Cyberspace
Security, and Information Assurance, pages 231–245.
Chabot, Y., Bertaux, A., Nicolle, C., and Kechadi, T.
(2015b). An ontology-based approach for the recon-
struction and analysis of digital incidents timelines.
Digital Investigation, 15:83–100.
Chikul, P., Bahsi, H., and Maennel, O. (2021). An ontology
engineering case study for advanced digital forensic
analysis. In Attiogb
´
e, C. and Ben Yahia, S., editors,
Model and Data Engineering, pages 67–74, Cham.
Springer International Publishing.
Debinski, M., Breitinger, F., and Mohan, P. (2019). Time-
line2gui: A log2timeline csv parser and training sce-
narios. Digital Investigation, 28:34–43.
Ding, Y., Wu, R., and Zhang, X. (2019). Ontology-based
knowledge representation for malware individuals and
families. Computers & Security, 87:101574.
Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones,
K., and Soulsby, H. (2015). A forensic taxonomy of
scada systems and approach to incident response. In
3rd International Symposium for ICS & SCADA Cyber
Security Research 2015 (ICS-CSR 2015) 3, pages 42–
51.
Elezaj, O., Yayilgan, S. Y., Kalemi, E., Wendelberg, L.,
Abomhara, M., and Ahmed, J. (2019). Towards de-
signing a knowledge graph-based framework for in-
vestigating and preventing crime on online social net-
works. In International Conference on e-Democracy,
pages 181–195. Springer.
Ellison, D., Ikuesan, R. A., and Venter, H. S. (2019). On-
tology for reactive techniques in digital forensics. In
2019 IEEE Conference on Application, Information
and Network Security (AINS), pages 83–88. IEEE.
Esposito, S. and Peterson, G. (2013). Creating super time-
lines in windows investigations. In IFIP Interna-
tional Conference on Digital Forensics, pages 135–
144. Springer.
Hargreaves, C. and Patterson, J. (2012). An automated time-
line reconstruction approach for digital forensic inves-
tigations. Digital Investigation, 9:S69–S79.
Javed, A. R., Ahmed, W., Alazab, M., Jalil, Z., Kifayat,
K., and Gadekallu, T. R. (2022). A comprehensive
survey on computer forensics: State-of-the-art, tools,
techniques, challenges, and future directions. IEEE
Access, 10:11065–11089.
Kahved
ˇ
zi
´
c, D. and Kechadi, T. (2009). Dialog: A frame-
work for modeling, analysis and reuse of digital foren-
sic knowledge. digital investigation, 6:S23–S33.
Kahved
ˇ
zi
´
c, D. and Kechadi, T. (2010). Semantic modelling
of digital forensic evidence. In International Con-
ference on Digital Forensics and Cyber Crime, pages
149–156. Springer.
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
580