Results 31 to 40 of about 10,952 (116)

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers [PDF]

open access: yes, 2020
It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of ...
Guri, Mordechai
core   +1 more source

Research on Digital Forensics Analyzing Heterogeneous Internet of Things Incident Investigations

open access: yesApplied Sciences
In the landscape of the Fourth Industrial Revolution, the integration of the Internet of Things (IoT) in smart-home technology presents intricate challenges for digital forensics.
Dong-Hyuk Shin   +3 more
doaj   +1 more source

Internet of Things Security and Forensics: Challenges and Opportunities

open access: yes, 2018
The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for ...
Conti, Mauro   +3 more
core   +1 more source

Crossed-IoT Device Portability of Electromagnetic Side Channel Analysis: Challenges and Dataset

open access: yesVietnam Journal of Computer Science
Internet of Things (IoT) refers to the network of interconnected physical devices, vehicles, home appliances, and other items embedded with sensors, software, and connectivity, enabling them to collect and exchange data.
Tharindu Lakshan Yasarathna   +4 more
doaj   +1 more source

Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine

open access: yesIoT
The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities.
Mohamed Chahine Ghanem   +4 more
doaj   +1 more source

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial

open access: yes, 2018
Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections.
Andrii Shalaginov   +8 more
core   +1 more source

Secure management of logs in internet of things [PDF]

open access: yes, 2015
Ever since the advent of computing, managing data has been of extreme importance. With innumerable devices getting added to network infrastructure, there has been a proportionate increase in the data which needs to be stored.
Gupta, Udit
core  

Feasibility Study of Location Authentication for IoT Data Using Power Grid Signatures

open access: yesIEEE Open Journal of Signal Processing
Ambient signatures related to the power grid offer an under-utilized opportunity to verify the time and location of sensing data collected by the Internet-of-Things (IoT).
Mudi Zhang   +3 more
doaj   +1 more source

Investigating the tension between cloud-related actors and individual privacy rights [PDF]

open access: yes, 2019
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob   +2 more
core  

Home - About - Disclaimer - Privacy