Results 31 to 40 of about 10,483 (192)

Digital Investigation of IoT Devices in the Criminal Scene [PDF]

open access: yesJournal of Universal Computer Science, 2019
The Internet of Things (IoT) is everywhere around us. Smart communicating objects are offering the digitalization of lives. They create new opportunities within criminal investigations. In recent years, the scientific community sought to develop a common
François Bouchaud   +3 more
doaj   +3 more sources

Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS

open access: yesJournal of Cybersecurity and Privacy, 2023
The emergence of the Internet of Things technologies and the increase and convenience of smart home devices have contributed to the growth of self-installed home security systems. While home security devices have become more accessible and can help users
Shinelle Hutchinson   +4 more
doaj   +1 more source

Iot Forensics: Challenges for the Ioa Era [PDF]

open access: yes2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018
Challenges for IoT-based forensic investigations include the increasing amount of objects of forensic interest, relevance of identified and collected devices, blurry network boundaries, and edgeless networks. As we look ahead to a world of expanding ubiquitous computing, the challenge of forensic processes such as data acquisition (logical and physical)
Mac Dermott, AM, Baker, T, Shi, Q
openaire   +1 more source

Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones [PDF]

open access: yes, 2017
This paper studies the secrecy performance of a wireless network (primary network) overlaid with an ambient RF energy harvesting IoT network (secondary network).
Dhillon, Harpreet S., Kishk, Mustafa A.
core   +2 more sources

Software Engineering Challenges for Investigating Cyber-Physical Incidents [PDF]

open access: yes, 2017
Cyber-Physical Systems (CPS) are characterized by the interplay between digital and physical spaces. This characteristic has extended the attack surface that could be exploited by an offender to cause harm.
Alrimawi, Faeq   +2 more
core   +1 more source

Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and
Oludare Isaac Abiodun   +3 more
doaj   +1 more source

The importance of IoT in everyday life and in law enforcement [PDF]

open access: yesAnalele Universităţii din Oradea. Relaţii Internaţionale şi Studii Europene, 2023
Every day, we leave behind more and more digital data, which is related to the use of modern technical devices as well. This can speed up the flow of information.
Endre NYITRAI
doaj   +1 more source

Digital Forensics Subdomains: The State of the Art and Future Directions

open access: yesIEEE Access, 2021
For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident.
Arafat Al-Dhaqm   +7 more
doaj   +1 more source

An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks

open access: yes, 2020
We expect an increase in the frequency and severity of cyber-attacks that comes along with the need for efficient security countermeasures. The process of attributing a cyber-attack helps to construct efficient and targeted mitigating and preventive ...
Karafili, Erisa   +2 more
core   +1 more source

Challenges and opportunities for wearable IoT forensics: TomTom Spark 3 as a case study

open access: yesForensic Science International: Reports, 2021
Wearable IoT devices like fitness trackers and smartwatches continue to create opportunities and challenges for forensic investigators in the acquisition and analysis of evidential artefacts in scenarios where such devices are a witness to a crime ...
Liam Dawson, Alex Akinbi
doaj   +1 more source

Home - About - Disclaimer - Privacy