Results 21 to 30 of about 10,952 (116)

Darkweb research: Past, present, and future trends and mapping to sustainable development goals

open access: yesHeliyon, 2023
The Darkweb, part of the deep web, can be accessed only through specialized computer software and used for illegal activities such as cybercrime, drug trafficking, and exploitation. Technological advancements like Tor, bitcoin, and cryptocurrencies allow
Raghu Raman   +4 more
doaj   +1 more source

Software Engineering Challenges for Investigating Cyber-Physical Incidents [PDF]

open access: yes, 2017
Cyber-Physical Systems (CPS) are characterized by the interplay between digital and physical spaces. This characteristic has extended the attack surface that could be exploited by an offender to cause harm.
Alrimawi, Faeq   +2 more
core   +1 more source

Digital Forensics in Action The Role of Digital Forensics in Cybercrime Investigations

open access: yesNUML International Journal of Engineering and Computing
The explosion of technology in recent years has revolutionized the face of cybercrime and requires new and innovative approaches to investigating digital crimes.
Hassan Shah Khan   +2 more
doaj   +5 more sources

IEEE Access special section editorial: Artificial intelligence enabled networking [PDF]

open access: yes, 2015
With today’s computer networks becoming increasingly dynamic, heterogeneous, and complex, there is great interest in deploying artificial intelligence (AI) based techniques for optimization and management of computer networks.
Imran, Muhammad Ali   +4 more
core   +1 more source

Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems [PDF]

open access: yes, 2019
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-
Günlü, Onur   +3 more
core   +2 more sources

An Efficient Forensics Architecture in Software-Defined Networking-IoT Using Blockchain Technology

open access: yesIEEE Access, 2019
A Potential solution for solving forensic is the use of blockchain in software-defined networking (SDN). The blockchain is a distributed peer-to-peer network that can be utilized on SDN-based Internet of Things (IoT) environments for security ...
Mehran Pourvahab   +1 more
doaj   +1 more source

Harnessing Federated Learning for Digital Forensics in IoT: A Survey and Introduction to the IoT-LF Framework

open access: yesIEEE Open Journal of the Communications Society
The proliferation of the Internet of Things (IoT) systems has fueled a surge in cybercrime, particularly through advanced persistent threats, such as botnets and ransomware, posing challenges for centralized Digital Forensics (DF) solutions in tracking ...
Hania Mohamed   +4 more
doaj   +1 more source

Trustee: A Trust Management System for Fog-enabled Cyber Physical Systems [PDF]

open access: yes, 2019
In this paper, we propose a lightweight trust management system (TMS) for fog-enabled cyber physical systems (Fog-CPS). Trust computation is based on multi-factor and multi-dimensional parameters, and formulated as a statistical regression problem which ...
Chowdhry, B. S.   +3 more
core   +1 more source

CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains

open access: yesIEEE Transactions on Mobile Computing
With the widespread use of Internet of Things (IoT) devices, malware detection has become a hot spot for both academic and industrial communities. Existing approaches can be roughly categorized into network-side and host-side. However, existing network-side methods are difficult to capture contextual semantics from cross-source traffic, and previous ...
Ziming Zhao   +6 more
openaire   +2 more sources

Forensik Internet Of Things pada Device Level berbasis Embedded System

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2019
Perangkat Internet of Things (IoT) merupakan perangkat cerdas yang memiliki interkoneksi dengan jaringan internet global. Investigasi kasus yang menyangkut perangkat IoT akan menjadi tantangan tersendiri bagi investigator forensik.
Eri Haryanto, Imam Riadi
doaj   +1 more source

Home - About - Disclaimer - Privacy