Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman, A Chehab - Internet of Things, 2022 - Elsevier
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …

Machine learning aided static malware analysis: A survey and tutorial

A Shalaginov, S Banin, A Dehghantanha… - Cyber threat …, 2018 - Springer
Malware analysis and detection techniques have been evolving during the last decade as a
reflection to development of different malware techniques to evade network-based and host …

Internet of Things security and forensics: Challenges and opportunities

M Conti, A Dehghantanha, K Franke… - Future Generation …, 2018 - Elsevier
Abstract The Internet of Things (IoT) envisions pervasive, connected, and smart nodes
interacting autonomously while offering all sorts of services. Wide distribution, openness and …

Machine learning aided Android malware classification

N Milosevic, A Dehghantanha, KKR Choo - Computers & Electrical …, 2017 - Elsevier
The widespread adoption of Android devices and their capability to access significant
private and confidential information have resulted in these devices being targeted by …

Android malware detection using deep learning

ON Elayan, AM Mustafa - Procedia Computer Science, 2021 - Elsevier
The Android operating system ranks first in the market share due to the system's smooth
handling and many other features that it provides to Android users, which has attracted …

A survey on forensics and compliance auditing for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - IEEE Access, 2024 - ieeexplore.ieee.org
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study

YY Teing, A Dehghantanha, KKR Choo… - Computers & Electrical …, 2017 - Elsevier
Cloud computing can be generally regarded as the technology enabler for Internet of Things
(IoT). To ensure the most effective collection of evidence from cloud-enabled IoT …

Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
The number of cyber attacks has increased tremendously in the last few years. This resulted
into both human and financial losses at the individual and organization levels. Recently …

Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices

F Daryabar, A Dehghantanha… - Australian Journal of …, 2016 - Taylor & Francis
In today's Internet-connected world, mobile devices are increasingly used to access cloud
storage services, which allow users to access data anywhere, anytime. Mobile devices have …

Visual content privacy protection: A survey

R Zhao, Y Zhang, T Wang, W Wen, Y Xiang… - arXiv preprint arXiv …, 2023 - arxiv.org
Vision is the most important sense for people, and it is also one of the main ways of
cognition. As a result, people tend to utilize visual content to capture and share their life …