[HTML][HTML] Systematic review of deep learning solutions for malware detection and forensic analysis in IoT

SU Qureshi, J He, S Tunio, N Zhu, A Nazir… - Journal of King Saud …, 2024 - Elsevier
The swift proliferation of Internet of Things (IoT) devices has presented considerable
challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract …

Comparative analysis of nij and nist methods for microsd investigations: A technopreneur approach

N Anwar, AM Widodo, BA Sekti, MB Ulum… - Aptisi Transactions on …, 2024 - att.aptisi.or.id
This research aims to compare the performance of two forensic investigation methods, the
National Institute of Justice (NIJ) and the National Institute of Standards and Technology …

Leading SAAS innovation within us regulatory boundaries: the role of tpms in navigating compliance

EG Chukwurah - Engineering Science & Technology Journal, 2024 - fepbl.com
Abstract The Software-as-a-Service (SaaS) industry in the United States operates within a
complex regulatory landscape, including data protection laws, intellectual property …

[PDF][PDF] Demystifying the Network and Cloud Forensics' Legal, Ethical, and Practical Considerations.

N AllahRakha - Pakistan Journal of Criminology, 2024 - pjcriminology.com
As cybercrimes grow more sophisticated, network and cloud forensics have become vital
investigative tools. However, complex legal, ethical, and practical challenges around …

Challenges for continuous, provable Security Service Level Agreement management in computing continuum

K Bocianiak, T Pawlikowski, A Podlasek, JP Wary… - IEEE …, 2024 - ieeexplore.ieee.org
Vertical industries start taking advantage of computing continuum by hosting their
applications or using additional services offered by several Cloud Service Providers …

Secure and Efficient Outsourced Computation in Cloud Computing Environments

V Dixit, D Kaur - Journal of Software Engineering and Applications, 2024 - scirp.org
Secure and efficient outsourced computation in cloud computing environments is crucial for
ensuring data confidentiality, integrity, and resource optimization. In this research, we …

[HTML][HTML] Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review

MM Alshabibi, AK Bu dookhi, MM Hafizur Rahman - Computers, 2024 - mdpi.com
Cloud computing technology delivers services, resources, and computer systems over the
internet, enabling the easy modification of resources. Each field has its challenges, and the …

Peran Teknologi Cloud Computing Dalam Meningkatkan Efisiensi Dan Keamanan Proses Akuntansi: Tinjauan Terhadap Perubahan Paradigma Dalam Manajemen …

K Marlin, K Mere, SA Fitri, DS Nugroho… - Jurnal Darma …, 2024 - ejurnal.darmaagung.ac.id
Artikel ini merupakan tinjauan tentang peran teknologi Cloud Computing dalam
meningkatkan efisiensi dan keamanan proses akuntansi, dengan fokus pada perubahan …

Forensic Science: AI-Powered Image and Audio Analysis

P Renukadevi, S John, N Shivani - 2024 5th International …, 2024 - ieeexplore.ieee.org
Forensic science demands the precise application of advanced scientific principles and
procedures to investigate crimes and ensure justice. This process involves the analysis of …

CRISP: Cloud resilient infrastructure for self-healing platforms in dynamic adaptation

S Rawas, AD Samala, A Fortuna - International Journal of Information …, 2024 - Springer
As cloud computing evolves, traditional resilience strategies must adapt to new challenges.
This paper introduces CRISP, Cloud Resilient Infrastructure for Self-Healing Platforms, a …