Results 11 to 20 of about 10,483 (192)

Forensic analysis of IoT ecosystem [PDF]

open access: yes2021 8th International Conference on Future Internet of Things and Cloud (FiCloud), 2021
Connected toys, home automation appliances and wearable devices are all part of the Internet of Things (IoT), They digitize our lives and generate massive data transfer. This phenomenon brings many opportunities for police investigations, with a rich source of evidence11In this paper, the term ‘evidence’ must be understood in legal and forensic sense.,
Bouchaud, François   +2 more
openaire   +2 more sources

An Enhanced Blockchain-Based IoT Digital Forensics Architecture Using Fuzzy Hash

open access: yesIEEE Access, 2021
Due to businesses’ growing use of IoT services in their day-to-day operations and the increased use of smart devices, digital forensic investigations involving such systems will need increasingly sophisticated digital evidence collection and ...
Wael A. Mahrous   +2 more
doaj   +1 more source

The Internet of Things (IoT) Forensic Investigation Process

open access: yesJournal of Information Security and Cybercrimes Research, 2023
The Internet of Things (IoT), a rapidly evolving network of connected devices, is expected to grow to an astounding 41.6 billion units by 2025. This exponential growth, while beneficial in terms of data collection and exchange, has also increased the ...
Mariam Al-Shaer   +2 more
doaj   +1 more source

IoT Database Forensics [PDF]

open access: yesProceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019
The data that are generated by several devices in the IoT realmrequire careful and real time processing. Recently, researchers haveconcentrated on the usage of cloud databases for storing such datato improve efficiency. HarperDB aims at producing a DBMS that isrelational and non-relational simultaneously, to help journeymendevelopers creating products ...
Marsh, R, Belguith, S, Dargahi, T
openaire   +2 more sources

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]

open access: yes, 2020
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S.   +6 more
core   +2 more sources

IoT Forensic A digital investigation framework for IoT systems [PDF]

open access: yes2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2018
Paper presented at 10th International Conference on Electronics, Computers and Artificial Intelligence, , ECAI 2018 - 28-30 June 2018 - Iasi ...
Sathwara, Snehal   +2 more
openaire   +2 more sources

IoT forensics

open access: yes, 2023
Η διδακτορική διατριβή με θέμα «Ψηφιακή Εγκληματολογία στο Διαδίκτυο των Πραγμάτων» επικεντρώνεται στην εγκληματολογική εξέταση πλήθους συσκευών που ανήκουν στον ψηφιακό «κόσμο» του Διαδικτύου των Πραγμάτων (ΔτΠ). Κίνητρο για την παρούσα διατριβή, αποτέλεσε πρωτίστως η παρατήρηση ότι στο ΔτΠ δραστηριοποιούνται πάρα πολλοί κατασκευαστές, με πλήθος ...
openaire   +3 more sources

Joining Federated Learning to Blockchain for Digital Forensics in IoT

open access: yesComputers, 2023
In present times, the Internet of Things (IoT) is becoming the new era in technology by including smart devices in every aspect of our lives. Smart devices in IoT environments are increasing and storing large amounts of sensitive data, which attracts a ...
Wejdan Almutairi, Tarek Moulahi
doaj   +1 more source

A New Network Digital Forensics Approach for Internet of Things Environment Based on Binary Owl Optimizer

open access: yesCybernetics and Information Technologies, 2022
The Internet of Things (IoT) is widespread in our lives these days (e.g., Smart homes, smart cities, etc.). Despite its significant role in providing automatic real-time services to users, these devices are highly vulnerable due to their design ...
Alazzam Hadeel   +4 more
doaj   +1 more source

An Automated and Comprehensive Framework for IoT Botnet Detection and Analysis (IoT-BDA)

open access: yesIEEE Access, 2021
The proliferation of insecure Internet-connected devices gave rise to the IoT botnets which can grow very large rapidly and may perform high-impact cyber-attacks.
Tolijan Trajanovski, Ning Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy