Results 31 to 40 of about 10,952 (116)
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro +2 more
core +1 more source
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers [PDF]
It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of ...
Guri, Mordechai
core +1 more source
Research on Digital Forensics Analyzing Heterogeneous Internet of Things Incident Investigations
In the landscape of the Fourth Industrial Revolution, the integration of the Internet of Things (IoT) in smart-home technology presents intricate challenges for digital forensics.
Dong-Hyuk Shin +3 more
doaj +1 more source
Internet of Things Security and Forensics: Challenges and Opportunities
The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for ...
Conti, Mauro +3 more
core +1 more source
Crossed-IoT Device Portability of Electromagnetic Side Channel Analysis: Challenges and Dataset
Internet of Things (IoT) refers to the network of interconnected physical devices, vehicles, home appliances, and other items embedded with sensors, software, and connectivity, enabling them to collect and exchange data.
Tharindu Lakshan Yasarathna +4 more
doaj +1 more source
The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities.
Mohamed Chahine Ghanem +4 more
doaj +1 more source
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections.
Andrii Shalaginov +8 more
core +1 more source
Secure management of logs in internet of things [PDF]
Ever since the advent of computing, managing data has been of extreme importance. With innumerable devices getting added to network infrastructure, there has been a proportionate increase in the data which needs to be stored.
Gupta, Udit
core
Feasibility Study of Location Authentication for IoT Data Using Power Grid Signatures
Ambient signatures related to the power grid offer an under-utilized opportunity to verify the time and location of sensing data collected by the Internet-of-Things (IoT).
Mudi Zhang +3 more
doaj +1 more source
Investigating the tension between cloud-related actors and individual privacy rights [PDF]
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob +2 more
core

