Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …
This resulted into both human and financial losses at all IoT levels especially individual and …
Machine learning aided static malware analysis: A survey and tutorial
Malware analysis and detection techniques have been evolving during the last decade as a
reflection to development of different malware techniques to evade network-based and host …
reflection to development of different malware techniques to evade network-based and host …
Internet of Things security and forensics: Challenges and opportunities
Abstract The Internet of Things (IoT) envisions pervasive, connected, and smart nodes
interacting autonomously while offering all sorts of services. Wide distribution, openness and …
interacting autonomously while offering all sorts of services. Wide distribution, openness and …
Machine learning aided Android malware classification
N Milosevic, A Dehghantanha, KKR Choo - Computers & Electrical …, 2017 - Elsevier
The widespread adoption of Android devices and their capability to access significant
private and confidential information have resulted in these devices being targeted by …
private and confidential information have resulted in these devices being targeted by …
Android malware detection using deep learning
ON Elayan, AM Mustafa - Procedia Computer Science, 2021 - Elsevier
The Android operating system ranks first in the market share due to the system's smooth
handling and many other features that it provides to Android users, which has attracted …
handling and many other features that it provides to Android users, which has attracted …
A survey on forensics and compliance auditing for critical infrastructure protection
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study
YY Teing, A Dehghantanha, KKR Choo… - Computers & Electrical …, 2017 - Elsevier
Cloud computing can be generally regarded as the technology enabler for Internet of Things
(IoT). To ensure the most effective collection of evidence from cloud-enabled IoT …
(IoT). To ensure the most effective collection of evidence from cloud-enabled IoT …
Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations
The number of cyber attacks has increased tremendously in the last few years. This resulted
into both human and financial losses at the individual and organization levels. Recently …
into both human and financial losses at the individual and organization levels. Recently …
Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
F Daryabar, A Dehghantanha… - Australian Journal of …, 2016 - Taylor & Francis
In today's Internet-connected world, mobile devices are increasingly used to access cloud
storage services, which allow users to access data anywhere, anytime. Mobile devices have …
storage services, which allow users to access data anywhere, anytime. Mobile devices have …
Visual content privacy protection: A survey
Vision is the most important sense for people, and it is also one of the main ways of
cognition. As a result, people tend to utilize visual content to capture and share their life …
cognition. As a result, people tend to utilize visual content to capture and share their life …