Results 131 to 140 of about 31,287 (164)
Some of the next articles are maybe not open access.
Purpose Methods and materials Results Conclusion Personal information and conflict of interest ...
openaire +1 more source
openaire +1 more source
Cybersecurity & Cybercrime
The aim of this article is to present current methods of obtaining and investigative analysis of data from unmanned aerial vehicles (UAVs), taking into account the problems that must be faced in such a dynamic field of technology.
Łukasz Grzyb, Karol Gazda
semanticscholar +1 more source
The aim of this article is to present current methods of obtaining and investigative analysis of data from unmanned aerial vehicles (UAVs), taking into account the problems that must be faced in such a dynamic field of technology.
Łukasz Grzyb, Karol Gazda
semanticscholar +1 more source
Forensics Analysis of Android Social Networking Application: Tencent QQ Revisited
International Symposium on Networks, Computers and CommunicationsTencent QQ, founded in 1999, is a widely used instant messaging application globally. At its peak, it had 900 million users. Although numerous similar applications have emerged, such as WeChat, QQ continues to maintain its competitiveness in business and
Yufeng Gong, Umit Karabiyik
semanticscholar +1 more source
Mitigating Voice Assistant Eavesdropping via Event Source Review on Mobile Devices
IEEE Transactions on Information Forensics and SecurityVoice assistants have been widely adopted for their ability to provide non-touch human-computer interaction. However, while they offer convenience, their continuous listening for specific wake-up words raises privacy concerns, as it may lead to ...
Wenbin Huang +5 more
semanticscholar +1 more source
Comparison of IDS in IoT, Mobile and Cloud based Systems
International Symposium on Digital Forensics and SecurityThis study is meant to research the evolution of intrusion detection and network monitoring within computer, cloud-based systems, IIoT, and mobile environments. The source has outlined the novel technologies in IDS, from “Fast Learning Network” to hybrid
Görkem Gök +2 more
semanticscholar +1 more source
Cyberattack Pattern Analysis on Mobile Device Data Forensic Investigations
2024 International Conference on Electrical and Computer Engineering Researches (ICECER)Mobile device data forensics investigations using open-source tools for cyberattack pattern analysis have become inevitable due to the changing attack surface and the changing threat landscape.
Yogesh Ghimire +5 more
semanticscholar +1 more source
A Survey on Industrial Control System Digital Forensics: Challenges, Advances and Future Directions
IEEE Communications Surveys and Tutorials, 2023Marco Cook +2 more
exaly
ExS-GAN: Synthesizing Anti-Forensics Images via Extra Supervised GAN
IEEE Transactions on Cybernetics, 2023Feng, Zhangyi Shen, Guopu Zhu
exaly
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues
IEEE Communications Surveys and Tutorials, 2020Maria Stoyanova +2 more
exaly

