Big data analysis and compression for indoor air quality
K Sansanwal, G Shrivastava, R Anand… - Handbook of IoT and …, 2019 - taylorfrancis.com
With the gradual growing concern for the safe environment, the importance of the air quality
inside buildings, office spaces, and so on has drawn significant concern as the deterioration …
inside buildings, office spaces, and so on has drawn significant concern as the deterioration …
Role of cyber security and cyber forensics in India
This chapter describes cyber forensics, also known as computer forensics, which is a
subdivision of digital forensic science, relating to evidence detection in computers and …
subdivision of digital forensic science, relating to evidence detection in computers and …
An insight review on multimedia forensics technology
Crime will turn into the principle issue step by step of our general public so it is important to
find a few ways to beat the issue; that is the reason the expression “media legal” is …
find a few ways to beat the issue; that is the reason the expression “media legal” is …
Approaches of network forensic model for investigation
G Shrivastava - International Journal of Forensic …, 2017 - inderscienceonline.com
Universally, the security and forensic workforce keeps up tab through newest technology of
attack tools and modus operandi adopted by attackers. There is a plethora of free tools …
attack tools and modus operandi adopted by attackers. There is a plethora of free tools …
Network forensics: Today and tomorrow
G Shrivastava, K Sharma… - 2016 3rd International …, 2016 - ieeexplore.ieee.org
Whenever Intrusion is detected over the internet a network forensic is used to capture,
record all the evidence, maintain documentation, and lastly perform analysis. It collects all …
record all the evidence, maintain documentation, and lastly perform analysis. It collects all …
An encapsulated approach of forensic model for digital investigation
G Shrivastava, BB Gupta - 2014 IEEE 3rd Global Conference …, 2014 - ieeexplore.ieee.org
Digital forensic investigation is the methodical restoration of evidences collected as a
consequence of exploration of concrete happenings based on digital data. After analyzing …
consequence of exploration of concrete happenings based on digital data. After analyzing …
[PDF][PDF] Digital forensics evidence acquisition and chain of custody in cloud computing
MM Nasreldin, M El-Hennawy, HK Aslan… - … International Journal of …, 2015 - academia.edu
The new cloud computing concept delivers an adaptable service to many users. This is due
to the fact that cloud computing offers an economic solution based on pay-per use idea. At …
to the fact that cloud computing offers an economic solution based on pay-per use idea. At …
A Comparative analysis of cloud forensic techniques in IaaS
P Santra, A Roy, K Majumder - … : Proceedings of ICCCCS 2016, Volume 2, 2018 - Springer
With the growth of cloud users, various criminal activities, attacks, suspicious, or malicious
activities in cloud environment are growing day by day. It is the responsibility of cloud …
activities in cloud environment are growing day by day. It is the responsibility of cloud …
A pattern-based multi-factor authentication system
User authentication is an indispensable part of a secure system. The traditional
authentication methods have been proved to be vulnerable to different types of security …
authentication methods have been proved to be vulnerable to different types of security …
A two-tier security solution for storing data across public cloud
Background: Data integrity protection in Cloud Computing becomes very challenging since
the user no longer has the possession of their own data. This makes cloud data storage …
the user no longer has the possession of their own data. This makes cloud data storage …