Results 11 to 20 of about 10,952 (116)
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S. +6 more
core +2 more sources
The inter-class classification and source identification of IoT devices has been studied by several researchers recently due to the vast amount of available IoT devices and the huge amount of data these IoT devices generate almost every minute.
Aamo Iorliam
doaj +1 more source
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study [PDF]
Cloud computing has been regarded as the technology enabler for the Internet of Things (IoT). To ensure the most effective collection of IoT-based evidence, it is vital for forensic practitioners to possess a contemporary understanding of the artefacts from different cloud services.
Yee Yang, T +3 more
openaire +3 more sources
Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges [PDF]
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that ...
Derhab, Abdelouahid +4 more
core +1 more source
It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and
Oludare Isaac Abiodun +3 more
doaj +1 more source
Digital forensics challenges and readiness for
AbstractThe development of sixth‐generation (6G) wireless communication technology is expected to provide super high‐speed data transmission, and advanced network performance than the current fifth‐generation (5G) and be fully functional by the 2030s. This development will have a significant impact and add improvements to digital extended reality (XR),
openaire +2 more sources
The constant miniaturization of hardware and an increase in power efficiency, have made possible the integration of intelligence into ordinary devices.
Nickolaos Koroniotis +2 more
doaj +1 more source
Rethinking Digital Forensics [PDF]
© IAER 2019In the modern socially-driven, knowledge-based virtual computing environment in which organisations are operating, the current digital forensics tools and practices can no longer meet the need for scientific rigour.
Jones, Andrew, Vidalis, Stilianos
core +4 more sources
A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks [PDF]
The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would ...
Alaeiyan, M +4 more
core +2 more sources
Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones [PDF]
This paper studies the secrecy performance of a wireless network (primary network) overlaid with an ambient RF energy harvesting IoT network (secondary network).
Dhillon, Harpreet S., Kishk, Mustafa A.
core +2 more sources

