Results 71 to 80 of about 10,483 (192)

IoT Forensics Readiness - influencing factors

open access: yesForensic Science International: Digital Investigation
The Internet of Things (IoT) is increasingly becoming a part of people’s lives and is progressively revolutionizing our lives and businesses. From a Digital Forensics (DF) point of view, this connection turns an IoT environment into a valuable source of evidence containing diverse artifacts that could significantly aid DF investigations.
Friedl, Sabrina, Pernul, Günther
openaire   +2 more sources

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

Research on Digital Forensics Analyzing Heterogeneous Internet of Things Incident Investigations

open access: yesApplied Sciences
In the landscape of the Fourth Industrial Revolution, the integration of the Internet of Things (IoT) in smart-home technology presents intricate challenges for digital forensics.
Dong-Hyuk Shin   +3 more
doaj   +1 more source

Progress and Prospect of Integrated Microfluidic, Electrochemical, Liquid Crystal Technologies, and Machine Learning for Wearable Biosensors

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
This review highlights advances in integrating microfluidic, electrochemical, and liquid crystal technologies for wearable biosensors. These hybrid systems enable non‐invasive, real‐time monitoring of biofluids and, when coupled with machine learning, offer new opportunities for personalized healthcare diagnostics.
Milad Esfandiar   +2 more
wiley   +1 more source

Systematic review of deep learning solutions for malware detection and forensic analysis in IoT

open access: yesJournal of King Saud University: Computer and Information Sciences
The swift proliferation of Internet of Things (IoT) devices has presented considerable challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract malware attacks, necessitating advanced detection and forensic analysis ...
Siraj Uddin Qureshi   +7 more
doaj   +1 more source

Risks of Time and Chronology as an Underpinning Infrastructure for Critical Systems: Emerging Chronorisks and Chronosecurity Needs

open access: yesJournal of Critical Infrastructure Policy, Volume 7, Issue 1, Spring/Summer 2026.
ABSTRACT Time and chronology form the invisible architecture upon which modern civilization depends, governing synchronization across markets, power grids, communication networks, transportation, and defense. Yet, this shared temporal framework, engineered through atomic clocks, satellites, and digital synchronization, faces growing vulnerabilities ...
Bilal M. Ayyub
wiley   +1 more source

An Ensemble Learning-Based Prediction Model for Image Forensics From IoT Camera in Smart Cities

open access: yesIEEE Access, 2020
Recent years witnessed a surge in the number of IoT cameras in smart cities. In this article, an ensemble learning-based prediction model for image forensics from IoT camera is proposed.
Ge Xu   +7 more
doaj   +1 more source

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial

open access: yes, 2018
Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections.
Andrii Shalaginov   +8 more
core   +1 more source

Industrial IoT cross‐layer forensic investigation

open access: yesWIREs Forensic Science, 2018
Cross‐layer forensic investigation is addressed for Industrial Internet of Things (IIoT) device attacks in Critical Infrastructure (CI) applications. The operational motivation for cross‐layer investigation is provided by the desire to directly correlate bit‐level network anomaly detection with physical layer (PHY) device connectivity and/or status ...
Christopher M. Rondeau   +2 more
openaire   +1 more source

Digital Forensics for IoT and WSNs [PDF]

open access: yes, 2019
In the last decade, wireless sensor networks (WSNs) and Internet-of-Things (IoT) devices are proliferated in many domains including critical infrastructures such as energy, transportation and manufacturing. Consequently, most of the daily operations now rely on the data coming from wireless sensors or IoT devices and their actions.
Karabiyik, Umit, Akkaya, Kemal
openaire   +2 more sources

Home - About - Disclaimer - Privacy