A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues

M Stoyanova, Y Nikoloudakis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Today is the era of the Internet of Things (IoT). The recent advances in hardware and
information technology have accelerated the deployment of billions of interconnected, smart …

Machine learning aided static malware analysis: A survey and tutorial

A Shalaginov, S Banin, A Dehghantanha… - Cyber threat …, 2018 - Springer
Malware analysis and detection techniques have been evolving during the last decade as a
reflection to development of different malware techniques to evade network-based and host …

Att-Net: Enhanced emotion recognition system using lightweight self-attention module

S Kwon - Applied Soft Computing, 2021 - Elsevier
Speech emotion recognition (SER) is an active research field of digital signal processing
and plays a crucial role in numerous applications of Human–computer interaction (HCI) …

Machine learning in digital forensics: a systematic literature review

T Nayerifard, H Amintoosi, AG Bafghi… - arXiv preprint arXiv …, 2023 - arxiv.org
Development and exploitation of technology have led to the further expansion and
complexity of digital crimes. On the other hand, the growing volume of data and …

Fuzzy granular classification based on the principle of justifiable granularity

C Fu, W Lu, W Pedrycz, J Yang - Knowledge-Based Systems, 2019 - Elsevier
Fuzzy rule-based classifiers have been used in many applications showing better
performance due to simple modular architectures and significant interpretability. Generally …

MEML: Resource-aware MQTT-based machine learning for network attacks detection on IoT edge devices

A Shalaginov, O Semeniuta, M Alazab - Proceedings of the 12th IEEE …, 2019 - dl.acm.org
Growing number of Smart Applications in recent years bring a completely new landscape of
cyber-attacks and exploitation scenario that have not been seen in wild before. Devices in …

Predicting likelihood of legitimate data loss in email DLP

MF Faiz, J Arshad, M Alazab, A Shalaginov - Future Generation Computer …, 2020 - Elsevier
The volume and variety of data collected for modern organisations has increased
significantly over the last decade necessitating the detection and prevention of disclosure of …

A network forensic scheme using correntropy-variation for attack detection

N Moustafa, J Slay - Advances in Digital Forensics XIV: 14th IFIP WG 11.9 …, 2018 - Springer
Network forensic techniques help track cyber attacks by monitoring and analyzing network
traffic. However, due to the large volumes of data in modern networks and sophisticated …

Rule-based granular classification: A hypersphere information granule-based method

C Fu, W Lu, W Pedrycz, J Yang - Knowledge-Based Systems, 2020 - Elsevier
As fundamental abstract constructs supporting the human-centered way of Granular
Computing (GrC), information granules can be used to distinguish different classes of data …

Toward the internet of things forensics: A data analytics perspective

P Khanpara, I Shah, S Tanwar, A Verma… - Security and …, 2023 - Wiley Online Library
The widespread use of networked, intelligent, and adaptable devices in various domains,
such as smart cities and home automation, climate control, manufacturing and logistics …