Results 31 to 40 of about 10,483 (192)
Digital Investigation of IoT Devices in the Criminal Scene [PDF]
The Internet of Things (IoT) is everywhere around us. Smart communicating objects are offering the digitalization of lives. They create new opportunities within criminal investigations. In recent years, the scientific community sought to develop a common
François Bouchaud +3 more
doaj +3 more sources
Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS
The emergence of the Internet of Things technologies and the increase and convenience of smart home devices have contributed to the growth of self-installed home security systems. While home security devices have become more accessible and can help users
Shinelle Hutchinson +4 more
doaj +1 more source
Iot Forensics: Challenges for the Ioa Era [PDF]
Challenges for IoT-based forensic investigations include the increasing amount of objects of forensic interest, relevance of identified and collected devices, blurry network boundaries, and edgeless networks. As we look ahead to a world of expanding ubiquitous computing, the challenge of forensic processes such as data acquisition (logical and physical)
Mac Dermott, AM, Baker, T, Shi, Q
openaire +1 more source
Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones [PDF]
This paper studies the secrecy performance of a wireless network (primary network) overlaid with an ambient RF energy harvesting IoT network (secondary network).
Dhillon, Harpreet S., Kishk, Mustafa A.
core +2 more sources
Software Engineering Challenges for Investigating Cyber-Physical Incidents [PDF]
Cyber-Physical Systems (CPS) are characterized by the interplay between digital and physical spaces. This characteristic has extended the attack surface that could be exploited by an offender to cause harm.
Alrimawi, Faeq +2 more
core +1 more source
It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and
Oludare Isaac Abiodun +3 more
doaj +1 more source
The importance of IoT in everyday life and in law enforcement [PDF]
Every day, we leave behind more and more digital data, which is related to the use of modern technical devices as well. This can speed up the flow of information.
Endre NYITRAI
doaj +1 more source
Digital Forensics Subdomains: The State of the Art and Future Directions
For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident.
Arafat Al-Dhaqm +7 more
doaj +1 more source
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks
We expect an increase in the frequency and severity of cyber-attacks that comes along with the need for efficient security countermeasures. The process of attributing a cyber-attack helps to construct efficient and targeted mitigating and preventive ...
Karafili, Erisa +2 more
core +1 more source
Challenges and opportunities for wearable IoT forensics: TomTom Spark 3 as a case study
Wearable IoT devices like fitness trackers and smartwatches continue to create opportunities and challenges for forensic investigators in the acquisition and analysis of evidential artefacts in scenarios where such devices are a witness to a crime ...
Liam Dawson, Alex Akinbi
doaj +1 more source

