Big data analysis and compression for indoor air quality

K Sansanwal, G Shrivastava, R Anand… - Handbook of IoT and …, 2019 - taylorfrancis.com
With the gradual growing concern for the safe environment, the importance of the air quality
inside buildings, office spaces, and so on has drawn significant concern as the deterioration …

Role of cyber security and cyber forensics in India

G Shrivastava, K Sharma, M Khari… - Handbook of Research …, 2018 - igi-global.com
This chapter describes cyber forensics, also known as computer forensics, which is a
subdivision of digital forensic science, relating to evidence detection in computers and …

An insight review on multimedia forensics technology

S Gupta, P Garg - Cyber Crime and Forensic Computing: Modern …, 2021 - degruyter.com
Crime will turn into the principle issue step by step of our general public so it is important to
find a few ways to beat the issue; that is the reason the expression “media legal” is …

Approaches of network forensic model for investigation

G Shrivastava - International Journal of Forensic …, 2017 - inderscienceonline.com
Universally, the security and forensic workforce keeps up tab through newest technology of
attack tools and modus operandi adopted by attackers. There is a plethora of free tools …

Network forensics: Today and tomorrow

G Shrivastava, K Sharma… - 2016 3rd International …, 2016 - ieeexplore.ieee.org
Whenever Intrusion is detected over the internet a network forensic is used to capture,
record all the evidence, maintain documentation, and lastly perform analysis. It collects all …

An encapsulated approach of forensic model for digital investigation

G Shrivastava, BB Gupta - 2014 IEEE 3rd Global Conference …, 2014 - ieeexplore.ieee.org
Digital forensic investigation is the methodical restoration of evidences collected as a
consequence of exploration of concrete happenings based on digital data. After analyzing …

[PDF][PDF] Digital forensics evidence acquisition and chain of custody in cloud computing

MM Nasreldin, M El-Hennawy, HK Aslan… - … International Journal of …, 2015 - academia.edu
The new cloud computing concept delivers an adaptable service to many users. This is due
to the fact that cloud computing offers an economic solution based on pay-per use idea. At …

A Comparative analysis of cloud forensic techniques in IaaS

P Santra, A Roy, K Majumder - … : Proceedings of ICCCCS 2016, Volume 2, 2018 - Springer
With the growth of cloud users, various criminal activities, attacks, suspicious, or malicious
activities in cloud environment are growing day by day. It is the responsibility of cloud …

A pattern-based multi-factor authentication system

A Sinha, G Shrivastava, P Kumar - Scalable Computing: Practice and …, 2019 - scpe.org
User authentication is an indispensable part of a secure system. The traditional
authentication methods have been proved to be vulnerable to different types of security …

A two-tier security solution for storing data across public cloud

K Sharma, F Rafiqui, P Attri… - Recent Patents on …, 2019 - ingentaconnect.com
Background: Data integrity protection in Cloud Computing becomes very challenging since
the user no longer has the possession of their own data. This makes cloud data storage …