Results 21 to 30 of about 10,483 (192)

A behavioral health needs assessment and general psychological well-being of digital and multimedia forensic examiners. [PDF]

open access: yesJ Forensic Sci
Abstract Research shows that digital forensic examiners experience high stress levels due to the nature of their jobs involving exposure to disturbing media. This study conducted a needs analysis by examining digital and multimedia forensic examiners' psychological well‐being, coping mechanisms, social support, and attitudes toward and experiences with
Tyagi S, Seigfried-Spellar KC.
europepmc   +2 more sources

IoT Forensics [PDF]

open access: yes, 2021
AbstractThis chapter provides an overview of research opportunities and issues in IoT forensics. It gives a quick introduction to forensics and digital forensics. Key specifics of IoT forensics are explained. Issues that arise from IoT related challenges in all phases of a forensic investigation are presented.
openaire   +1 more source

A Study on the Digital Forensic Investigation Method of Clever Malware in IoT Devices

open access: yesIEEE Access, 2020
As IoT devices are always connected to mobile devices or other computing devices via the Internet, clever malwares targeting IoT devices or other computing devices connected to IoT devices are emerging.
Dohyun Kim, Yi Pan, Jong Hyuk Park
doaj   +1 more source

Rethinking Digital Forensics [PDF]

open access: yes, 2019
© IAER 2019In the modern socially-driven, knowledge-based virtual computing environment in which organisations are operating, the current digital forensics tools and practices can no longer meet the need for scientific rigour.
Jones, Andrew, Vidalis, Stilianos
core   +4 more sources

Digital Forensic Tools: A Literature Review [PDF]

open access: yesمجلة التربية والعلم, 2023
Digital forensics is a process of collection, identification, extraction, and documentation of electronic evidence which is used in a court of law. There are a large number of tools that help us to make this process easy and simple.
Karam Salih, Najla Dabagh
doaj   +1 more source

Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges [PDF]

open access: yes, 2020
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that ...
Derhab, Abdelouahid   +4 more
core   +1 more source

A Novel Additive Internet of Things (IoT) Features and Convolutional Neural Network for Classification and Source Identification of IoT Devices

open access: yesSakarya University Journal of Computer and Information Sciences, 2023
The inter-class classification and source identification of IoT devices has been studied by several researchers recently due to the vast amount of available IoT devices and the huge amount of data these IoT devices generate almost every minute.
Aamo Iorliam
doaj   +1 more source

Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions

open access: yesIEEE Access, 2019
The constant miniaturization of hardware and an increase in power efficiency, have made possible the integration of intelligence into ordinary devices.
Nickolaos Koroniotis   +2 more
doaj   +1 more source

A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks [PDF]

open access: yes, 2020
The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would ...
Alaeiyan, M   +4 more
core   +2 more sources

Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems [PDF]

open access: yes, 2019
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-
Günlü, Onur   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy