Results 131 to 140 of about 31,287 (164)
Some of the next articles are maybe not open access.

UAV FORENSICS

Cybersecurity & Cybercrime
The aim of this article is to present current methods of obtaining and investigative analysis of data from unmanned aerial vehicles (UAVs), taking into account the problems that must be faced in such a dynamic field of technology.
Łukasz Grzyb, Karol Gazda
semanticscholar   +1 more source

Forensics Analysis of Android Social Networking Application: Tencent QQ Revisited

International Symposium on Networks, Computers and Communications
Tencent QQ, founded in 1999, is a widely used instant messaging application globally. At its peak, it had 900 million users. Although numerous similar applications have emerged, such as WeChat, QQ continues to maintain its competitiveness in business and
Yufeng Gong, Umit Karabiyik
semanticscholar   +1 more source

Mitigating Voice Assistant Eavesdropping via Event Source Review on Mobile Devices

IEEE Transactions on Information Forensics and Security
Voice assistants have been widely adopted for their ability to provide non-touch human-computer interaction. However, while they offer convenience, their continuous listening for specific wake-up words raises privacy concerns, as it may lead to ...
Wenbin Huang   +5 more
semanticscholar   +1 more source

Comparison of IDS in IoT, Mobile and Cloud based Systems

International Symposium on Digital Forensics and Security
This study is meant to research the evolution of intrusion detection and network monitoring within computer, cloud-based systems, IIoT, and mobile environments. The source has outlined the novel technologies in IDS, from “Fast Learning Network” to hybrid
Görkem Gök   +2 more
semanticscholar   +1 more source

Cyberattack Pattern Analysis on Mobile Device Data Forensic Investigations

2024 International Conference on Electrical and Computer Engineering Researches (ICECER)
Mobile device data forensics investigations using open-source tools for cyberattack pattern analysis have become inevitable due to the changing attack surface and the changing threat landscape.
Yogesh Ghimire   +5 more
semanticscholar   +1 more source

A Survey on Industrial Control System Digital Forensics: Challenges, Advances and Future Directions

IEEE Communications Surveys and Tutorials, 2023
Marco Cook   +2 more
exaly  

ExS-GAN: Synthesizing Anti-Forensics Images via Extra Supervised GAN

IEEE Transactions on Cybernetics, 2023
Feng, Zhangyi Shen, Guopu Zhu
exaly  

A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues

IEEE Communications Surveys and Tutorials, 2020
Maria Stoyanova   +2 more
exaly  

Home - About - Disclaimer - Privacy