Results 11 to 20 of about 10,952 (116)

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]

open access: yes, 2020
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S.   +6 more
core   +2 more sources

A Novel Additive Internet of Things (IoT) Features and Convolutional Neural Network for Classification and Source Identification of IoT Devices

open access: yesSakarya University Journal of Computer and Information Sciences, 2023
The inter-class classification and source identification of IoT devices has been studied by several researchers recently due to the vast amount of available IoT devices and the huge amount of data these IoT devices generate almost every minute.
Aamo Iorliam
doaj   +1 more source

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study [PDF]

open access: yesComputers & Electrical Engineering, 2017
Cloud computing has been regarded as the technology enabler for the Internet of Things (IoT). To ensure the most effective collection of IoT-based evidence, it is vital for forensic practitioners to possess a contemporary understanding of the artefacts from different cloud services.
Yee Yang, T   +3 more
openaire   +3 more sources

Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges [PDF]

open access: yes, 2020
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that ...
Derhab, Abdelouahid   +4 more
core   +1 more source

Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and
Oludare Isaac Abiodun   +3 more
doaj   +1 more source

Digital forensics challenges and readiness for 6G Internet of Things (IoT) networks

open access: yesWIREs Forensic Science, 2023
AbstractThe development of sixth‐generation (6G) wireless communication technology is expected to provide super high‐speed data transmission, and advanced network performance than the current fifth‐generation (5G) and be fully functional by the 2030s. This development will have a significant impact and add improvements to digital extended reality (XR),
openaire   +2 more sources

Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions

open access: yesIEEE Access, 2019
The constant miniaturization of hardware and an increase in power efficiency, have made possible the integration of intelligence into ordinary devices.
Nickolaos Koroniotis   +2 more
doaj   +1 more source

Rethinking Digital Forensics [PDF]

open access: yes, 2019
© IAER 2019In the modern socially-driven, knowledge-based virtual computing environment in which organisations are operating, the current digital forensics tools and practices can no longer meet the need for scientific rigour.
Jones, Andrew, Vidalis, Stilianos
core   +4 more sources

A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks [PDF]

open access: yes, 2020
The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would ...
Alaeiyan, M   +4 more
core   +2 more sources

Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones [PDF]

open access: yes, 2017
This paper studies the secrecy performance of a wireless network (primary network) overlaid with an ambient RF energy harvesting IoT network (secondary network).
Dhillon, Harpreet S., Kishk, Mustafa A.
core   +2 more sources

Home - About - Disclaimer - Privacy