Darkweb research: Past, present, and future trends and mapping to sustainable development goals
The Darkweb, part of the deep web, can be accessed only through specialized computer software and used for illegal activities such as cybercrime, drug trafficking, and exploitation. Technological advancements like Tor, bitcoin, and cryptocurrencies allow
Raghu Raman +4 more
doaj +1 more source
Software Engineering Challenges for Investigating Cyber-Physical Incidents [PDF]
Cyber-Physical Systems (CPS) are characterized by the interplay between digital and physical spaces. This characteristic has extended the attack surface that could be exploited by an offender to cause harm.
Alrimawi, Faeq +2 more
core +1 more source
Digital Forensics in Action The Role of Digital Forensics in Cybercrime Investigations
The explosion of technology in recent years has revolutionized the face of cybercrime and requires new and innovative approaches to investigating digital crimes.
Hassan Shah Khan +2 more
doaj +5 more sources
IEEE Access special section editorial: Artificial intelligence enabled networking [PDF]
With today’s computer networks becoming increasingly dynamic, heterogeneous, and complex, there is great interest in deploying artificial intelligence (AI) based techniques for optimization and management of computer networks.
Imran, Muhammad Ali +4 more
core +1 more source
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems [PDF]
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-
Günlü, Onur +3 more
core +2 more sources
An Efficient Forensics Architecture in Software-Defined Networking-IoT Using Blockchain Technology
A Potential solution for solving forensic is the use of blockchain in software-defined networking (SDN). The blockchain is a distributed peer-to-peer network that can be utilized on SDN-based Internet of Things (IoT) environments for security ...
Mehran Pourvahab +1 more
doaj +1 more source
The proliferation of the Internet of Things (IoT) systems has fueled a surge in cybercrime, particularly through advanced persistent threats, such as botnets and ransomware, posing challenges for centralized Digital Forensics (DF) solutions in tracking ...
Hania Mohamed +4 more
doaj +1 more source
Trustee: A Trust Management System for Fog-enabled Cyber Physical Systems [PDF]
In this paper, we propose a lightweight trust management system (TMS) for fog-enabled cyber physical systems (Fog-CPS). Trust computation is based on multi-factor and multi-dimensional parameters, and formulated as a statistical regression problem which ...
Chowdhry, B. S. +3 more
core +1 more source
CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains
With the widespread use of Internet of Things (IoT) devices, malware detection has become a hot spot for both academic and industrial communities. Existing approaches can be roughly categorized into network-side and host-side. However, existing network-side methods are difficult to capture contextual semantics from cross-source traffic, and previous ...
Ziming Zhao +6 more
openaire +2 more sources
Forensik Internet Of Things pada Device Level berbasis Embedded System
Perangkat Internet of Things (IoT) merupakan perangkat cerdas yang memiliki interkoneksi dengan jaringan internet global. Investigasi kasus yang menyangkut perangkat IoT akan menjadi tantangan tersendiri bagi investigator forensik.
Eri Haryanto, Imam Riadi
doaj +1 more source

