A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues
M Stoyanova, Y Nikoloudakis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Today is the era of the Internet of Things (IoT). The recent advances in hardware and
information technology have accelerated the deployment of billions of interconnected, smart …
information technology have accelerated the deployment of billions of interconnected, smart …
Future challenges for smart cities: Cyber-security and digital forensics
Smart cities are comprised of diverse and interconnected components constantly
exchanging data and facilitating improved living for a nation's population. Our view of a …
exchanging data and facilitating improved living for a nation's population. Our view of a …
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
O Osanaiye, H Cai, KKR Choo… - EURASIP Journal on …, 2016 - Springer
Widespread adoption of cloud computing has increased the attractiveness of such services
to cybercriminals. Distributed denial of service (DDoS) attacks targeting the cloud's …
to cybercriminals. Distributed denial of service (DDoS) attacks targeting the cloud's …
Research trends, challenges, and emerging topics in digital forensics: A review of reviews
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …
researchers and practitioners alike. The ever increasing sophistication of modern …
Multimedia big data computing and Internet of Things applications: A taxonomy and process model
With an exponential increase in the provisioning of multimedia devices over the Internet of
Things (IoT), a significant amount of multimedia data (also referred to as multimedia big data …
Things (IoT), a significant amount of multimedia data (also referred to as multimedia big data …
Copy-move forgery detection: survey, challenges and future directions
The authenticity and reliability of digital images are increasingly important due to the ease in
modifying such images. Thus, the capability to identify image manipulation is a current …
modifying such images. Thus, the capability to identify image manipulation is a current …
Current challenges and future research areas for digital forensic investigation
Given the ever-increasing prevalence of technology in modern life, there is a corresponding
increase in the likelihood of digital devices being pertinent to a criminal investigation or civil …
increase in the likelihood of digital devices being pertinent to a criminal investigation or civil …
A survey of information security incident handling in the cloud
NH Ab Rahman, KKR Choo - computers & security, 2015 - Elsevier
Incident handling strategy is one key strategy to mitigate risks to the confidentiality, integrity
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …
Big data for cybersecurity: Vulnerability disclosure trends and dependencies
MJ Tang, M Alazab, Y Luo - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
Complex Big Data systems in modern organisations are progressively becoming attack
targets by existing and emerging threat agents. Elaborate and specialised attacks will …
targets by existing and emerging threat agents. Elaborate and specialised attacks will …
Efficient and privacy-preserving outsourced calculation of rational numbers
In this paper, we propose a framework for efficient and privacy-preserving outsourced
calculation of rational numbers, which we refer to as POCR. Using POCR, a user can …
calculation of rational numbers, which we refer to as POCR. Using POCR, a user can …