Results 61 to 70 of about 10,483 (192)

IoT Forensics: Amazon Echo as a Use Case [PDF]

open access: yesIEEE Internet of Things Journal, 2019
Internet of Things (IoT) are increasingly common in our society, and can be found in civilian settings as well as sensitive applications such as battlefields and national security. Given the potential of these devices to be targeted by attackers, they are a valuable source in digital forensic investigations.
Shancang Li   +4 more
openaire   +2 more sources

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, Volume 34, Issue S2, Page 132-153, March 2026.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

An Efficient Forensics Architecture in Software-Defined Networking-IoT Using Blockchain Technology

open access: yesIEEE Access, 2019
A Potential solution for solving forensic is the use of blockchain in software-defined networking (SDN). The blockchain is a distributed peer-to-peer network that can be utilized on SDN-based Internet of Things (IoT) environments for security ...
Mehran Pourvahab   +1 more
doaj   +1 more source

Illicit Drug‐Derived Volatile Organic Compounds as Markers for Application in Noncontact Detection Technology

open access: yesThe Chemical Record, Volume 26, Issue 3, March 2026.
This review highlights the characteristic odor markers of illicit drugs, emphasizing volatile markers from both natural and synthetic sources, and explores the shift from canine‐based detection to emerging noncontact sensing technologies. Illicit drug use remains a global concern, requiring effective detection methods to counter evolving concealment ...
Minwoo Kim   +4 more
wiley   +1 more source

Investigating Wearable Fitness Applications: Data Privacy and Digital Forensics Analysis on Android

open access: yesApplied Sciences, 2022
Wearable devices are becoming more and more prevalent in our daily lives as people become more curious about how well they are doing in monitoring, improving, or maintaining their health and fitness.
Shinelle Hutchinson   +8 more
doaj   +1 more source

Preprint: Using RF-DNA Fingerprints To Classify OFDM Transmitters Under Rayleigh Fading Conditions

open access: yes, 2020
The Internet of Things (IoT) is a collection of Internet connected devices capable of interacting with the physical world and computer systems. It is estimated that the IoT will consist of approximately fifty billion devices by the year 2020. In addition
Fadul, Mohamed   +3 more
core  

The issues caused by misinformation—How workers and organizations deal with it: A systematic literature review. An Annual Review of Information Science and Technology (ARIST) paper

open access: yesJournal of the Association for Information Science and Technology, Volume 77, Issue 1, Page 133-162, January 2026.
Abstract In today's digital age, misinformation propagates rapidly through digital channels, blurring the lines between truth and fiction, and challenging the foundations of trust in information sources. Although affecting all spheres of life, misinformation poses a significant threat to workers highlighting a critical intersection between ...
Ashwani Malhotra   +4 more
wiley   +1 more source

Crossed-IoT Device Portability of Electromagnetic Side Channel Analysis: Challenges and Dataset

open access: yesVietnam Journal of Computer Science
Internet of Things (IoT) refers to the network of interconnected physical devices, vehicles, home appliances, and other items embedded with sensors, software, and connectivity, enabling them to collect and exchange data.
Tharindu Lakshan Yasarathna   +4 more
doaj   +1 more source

Non-Volatile Memory Forensic Analysis in Windows 10 IoT Core

open access: yesEntropy, 2019
The increase in the number of cybersecurity incidents in which internet of things (IoT) devices are involved has called for an improvement in the field of computer forensics, which needs to provide techniques in order to perform complete and efficient ...
Juan Manuel Castelo Gómez   +3 more
doaj   +1 more source

Smart Digital Forensic Readiness Model for Shadow IoT Devices

open access: yesApplied Sciences, 2022
Internet of Things (IoT) is the network of physical objects for communication and data sharing. However, these devices can become shadow IoT devices when they connect to an existing network without the knowledge of the organization’s Information ...
Funmilola Ikeolu Fagbola, Hein S. Venter
doaj   +1 more source

Home - About - Disclaimer - Privacy