A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues

M Stoyanova, Y Nikoloudakis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Today is the era of the Internet of Things (IoT). The recent advances in hardware and
information technology have accelerated the deployment of billions of interconnected, smart …

Future challenges for smart cities: Cyber-security and digital forensics

ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay… - Digital …, 2017 - Elsevier
Smart cities are comprised of diverse and interconnected components constantly
exchanging data and facilitating improved living for a nation's population. Our view of a …

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing

O Osanaiye, H Cai, KKR Choo… - EURASIP Journal on …, 2016 - Springer
Widespread adoption of cloud computing has increased the attractiveness of such services
to cybercriminals. Distributed denial of service (DDoS) attacks targeting the cloud's …

Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - IEEE …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

Multimedia big data computing and Internet of Things applications: A taxonomy and process model

A Kumari, S Tanwar, S Tyagi, N Kumar… - Journal of Network and …, 2018 - Elsevier
With an exponential increase in the provisioning of multimedia devices over the Internet of
Things (IoT), a significant amount of multimedia data (also referred to as multimedia big data …

Copy-move forgery detection: survey, challenges and future directions

NB Abd Warif, AWA Wahab, MYI Idris, R Ramli… - Journal of Network and …, 2016 - Elsevier
The authenticity and reliability of digital images are increasingly important due to the ease in
modifying such images. Thus, the capability to identify image manipulation is a current …

Current challenges and future research areas for digital forensic investigation

D Lillis, B Becker, T O'Sullivan, M Scanlon - arXiv preprint arXiv …, 2016 - arxiv.org
Given the ever-increasing prevalence of technology in modern life, there is a corresponding
increase in the likelihood of digital devices being pertinent to a criminal investigation or civil …

A survey of information security incident handling in the cloud

NH Ab Rahman, KKR Choo - computers & security, 2015 - Elsevier
Incident handling strategy is one key strategy to mitigate risks to the confidentiality, integrity
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …

Big data for cybersecurity: Vulnerability disclosure trends and dependencies

MJ Tang, M Alazab, Y Luo - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
Complex Big Data systems in modern organisations are progressively becoming attack
targets by existing and emerging threat agents. Elaborate and specialised attacks will …

Efficient and privacy-preserving outsourced calculation of rational numbers

X Liu, KKR Choo, RH Deng, R Lu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we propose a framework for efficient and privacy-preserving outsourced
calculation of rational numbers, which we refer to as POCR. Using POCR, a user can …