A systematic survey on cloud forensics challenges, solutions, and future directions

B Manral, G Somani, KKR Choo, M Conti… - ACM Computing …, 2019 - dl.acm.org
The challenges of cloud forensics have been well-documented by both researchers and
government agencies (eg, US National Institute of Standards and Technology), although …

Context-based access control management in ubiquitous environments

A Corrad, R Montanari, D Tibaldi - Third IEEE International …, 2004 - ieeexplore.ieee.org
Wireless connectivity and the widespread diffusion of portable devices raise new challenges
for ubiquitous service provisioning. Mobility of users causes frequent and unpredictable …

[HTML][HTML] Network forensic investigation in OpenFlow networks with ForCon

D Spiekermann, J Keller, T Eggendorfer - Digital Investigation, 2017 - Elsevier
To resolve the challenges of forensic investigation in virtual networks, we present a new
forensic framework called “Virtual Network Forensic Process”. Based on this framework we …

Challenges of network forensic investigation in virtual networks

D Spiekermann, T Eggendorfer - Journal of Cyber …, 2016 - journals.riverpublishers.com
The evolution of virtualization techniques is changing operating principles in today's
datacenters. Virtualization of servers, networks and storage increases the flexibility and …

Feature extraction and visualization for network pcapng traces

R Velea, C Ciobanu, F Gurzau… - 2017 21st International …, 2017 - ieeexplore.ieee.org
Network engineers and security experts are constantly confronted with new threats that have
yet to be handled. Mitigation of zero day attacks requires the implementation of machine …

Towards digital investigation in virtual networks: a study of challenges and open problems

D Spiekermann, T Eggendorfer - 2016 11th International …, 2016 - ieeexplore.ieee.org
The evolution of virtualization techniques is still changing operating principles in today's
datacenters (DC). The virtualization of ordinary servers was just the first step, which …

Forensics in the cloud: A literature analysis and classification

PR Agbedanu, P Wang, RN Nortey… - 2019 5th International …, 2019 - ieeexplore.ieee.org
Although cloud, fog and edge computing have established their strengths and usefulness
through characteristics such as low cost, reliability, location sensitivity, wireless connectivity …

2024 World Scientific Publishing Company

SS Akter, MS Rahman - Practical Guide On Security And Privacy …, 2023 - books.google.com
Cloud computing is a web-based utility model that is becoming popular every day with the
emergence of 4th Industrial Revolution; therefore, cybercrimes that affect web-based …

Using open source based distributed agents to perform digital investigation in virtual environments

D Spiekermann, J Keller, T Eggendorfer - INFORMATIK 2017, 2017 - dl.gi.de
To solve the challenges of digital investigation in virtual environments, we propose the use
of distributed agents to ensure valid and continuous network traffic observations in these …

Cloud Forensic: Issues, Challenges, and Solution Models

SS Akter, MS Rahman - A Practical Guide on Security and Privacy in …, 2024 - World Scientific
Cloud computing is a web-based utility model that is becoming popular every day with the
emergence of 4th Industrial Revolution; therefore, cybercrimes that affect web-based …