A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues
M Stoyanova, Y Nikoloudakis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Today is the era of the Internet of Things (IoT). The recent advances in hardware and
information technology have accelerated the deployment of billions of interconnected, smart …
information technology have accelerated the deployment of billions of interconnected, smart …
Machine learning aided static malware analysis: A survey and tutorial
Malware analysis and detection techniques have been evolving during the last decade as a
reflection to development of different malware techniques to evade network-based and host …
reflection to development of different malware techniques to evade network-based and host …
Att-Net: Enhanced emotion recognition system using lightweight self-attention module
S Kwon - Applied Soft Computing, 2021 - Elsevier
Speech emotion recognition (SER) is an active research field of digital signal processing
and plays a crucial role in numerous applications of Human–computer interaction (HCI) …
and plays a crucial role in numerous applications of Human–computer interaction (HCI) …
Machine learning in digital forensics: a systematic literature review
T Nayerifard, H Amintoosi, AG Bafghi… - arXiv preprint arXiv …, 2023 - arxiv.org
Development and exploitation of technology have led to the further expansion and
complexity of digital crimes. On the other hand, the growing volume of data and …
complexity of digital crimes. On the other hand, the growing volume of data and …
Fuzzy granular classification based on the principle of justifiable granularity
Fuzzy rule-based classifiers have been used in many applications showing better
performance due to simple modular architectures and significant interpretability. Generally …
performance due to simple modular architectures and significant interpretability. Generally …
MEML: Resource-aware MQTT-based machine learning for network attacks detection on IoT edge devices
A Shalaginov, O Semeniuta, M Alazab - Proceedings of the 12th IEEE …, 2019 - dl.acm.org
Growing number of Smart Applications in recent years bring a completely new landscape of
cyber-attacks and exploitation scenario that have not been seen in wild before. Devices in …
cyber-attacks and exploitation scenario that have not been seen in wild before. Devices in …
Predicting likelihood of legitimate data loss in email DLP
MF Faiz, J Arshad, M Alazab, A Shalaginov - Future Generation Computer …, 2020 - Elsevier
The volume and variety of data collected for modern organisations has increased
significantly over the last decade necessitating the detection and prevention of disclosure of …
significantly over the last decade necessitating the detection and prevention of disclosure of …
A network forensic scheme using correntropy-variation for attack detection
N Moustafa, J Slay - Advances in Digital Forensics XIV: 14th IFIP WG 11.9 …, 2018 - Springer
Network forensic techniques help track cyber attacks by monitoring and analyzing network
traffic. However, due to the large volumes of data in modern networks and sophisticated …
traffic. However, due to the large volumes of data in modern networks and sophisticated …
Rule-based granular classification: A hypersphere information granule-based method
As fundamental abstract constructs supporting the human-centered way of Granular
Computing (GrC), information granules can be used to distinguish different classes of data …
Computing (GrC), information granules can be used to distinguish different classes of data …
Toward the internet of things forensics: A data analytics perspective
The widespread use of networked, intelligent, and adaptable devices in various domains,
such as smart cities and home automation, climate control, manufacturing and logistics …
such as smart cities and home automation, climate control, manufacturing and logistics …