Blockchain-based Data Provenance for the Internet of Things
As more and more applications and services depend on data collected and provided by Internet of Things (IoT) devices, it is of importance that such data can be trusted.
Bertino E. +5 more
core +1 more source
The flourishing of the Internet of Things (IoT) has not only improved our lives in smart homes and healthcare but also made us more susceptible to cyberattacks.
Ruuhwan +4 more
doaj +1 more source
Zero-day intrusions on IoT endpoints demand defenses that curtail attacker impact and persistence after breach. This article presents Fine-Grained Runtime Containment Agent (FG-RCA), a lightweight post-exploitation containment system that learns least ...
Fouad Ailabouni +2 more
doaj +1 more source
IoT Forensics: Challenges For The IoA Era [PDF]
Challenges for IoT-based forensic investigations include the increasing amount of objects of forensic interest, relevance of identified and collected devices, blurry network boundaries, and edgeless networks.
Baker, T, Mac Dermott, AM, Shi, Q
core
Blockchain-Enhanced Network Scanning and Monitoring (BENSAM) Framework
In recent years, the convergence of advanced technologies has enabled real-time data access and sharing across diverse devices and networks, significantly amplifying cybersecurity risks. For organizations with digital infrastructures, network security is
Syed Wasif Abbas Hamdani +2 more
doaj +1 more source
Digital Forensics Investigation Framework Based on the Blockchain, IOT, and Social Networks
Digital forensics involves the identification, preservation, analysis, and presentation of digital evidence to support legal investigations. This paper introduces a novel blockchain-based framework for digital forensics (DF) within the context of Internet of Things (IoT) and social systems.
openaire +1 more source
Design of an AI-driven secure 5G-SDN framework with federated reinforcement learning for anomaly detection, mitigation, and attack forensics. [PDF]
Shameli R, Rajkumar S.
europepmc +1 more source
The admissibility of digital evidence from open-source forensic tools: Development of a framework for legal acceptance. [PDF]
Ismail I, Akram Zainol Ariffin K.
europepmc +1 more source
Safeguarding against external intrusions utilizing adaptive bio-inspired multi-population anomaly detection for IoT network. [PDF]
Dwivedi S +3 more
europepmc +1 more source
Non-local attention enhanced deep learning for robust cyberattack detection in industrial IoT-based SCADA systems. [PDF]
Yilmaz MT, Polat O, Algul E, Doğan F.
europepmc +1 more source

