Secure operations of connected and autonomous vehicles
J Han, Z Ju, X Chen, M Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With features of collaborative interaction and autonomous decision-making, connected and
autonomous vehicles (CAVs) offer a viable solution for a sustainable and efficient future of …
autonomous vehicles (CAVs) offer a viable solution for a sustainable and efficient future of …
A modified grey wolf optimization algorithm for an intrusion detection system
Cyber-attacks and unauthorized application usage have increased due to the extensive use
of Internet services and applications over computer networks, posing a threat to the service's …
of Internet services and applications over computer networks, posing a threat to the service's …
Binary improved white shark algorithm for intrusion detection systems
Intrusion Detection (ID) is an essential task in the cyberattacks domain built to secure
Internet applications and networks from malicious actors. The main shortcoming of the …
Internet applications and networks from malicious actors. The main shortcoming of the …
[HTML][HTML] Enhanced threat intelligence framework for advanced cybersecurity resilience
The increasing severity of cyber-attacks against organizations emphasizes the necessity for
efficient threat intelligence. This article presents a novel multi-layered architecture for threat …
efficient threat intelligence. This article presents a novel multi-layered architecture for threat …
Blockchain enabled intelligent digital forensics system for autonomous connected vehicles
Autonomous connected vehicles are revolutionizing the automotive industry vision and
impacting their business model. This trend will likely impact other related industries and their …
impacting their business model. This trend will likely impact other related industries and their …
Convergence of blockchain and Internet of Things: integration, security, and use cases
Abstract Internet of Things (IoT) devices are becoming increasingly ubiquitous, and their
adoption is growing at an exponential rate. However, they are vulnerable to security …
adoption is growing at an exponential rate. However, they are vulnerable to security …
Forensics and anti-forensics of a NAND flash memory: From a copy-back program perspective
This paper proposes a safe copy-back program operation in a NAND flash memory, which is
targeting digital forensics for a variety of reasons. Due to the background management …
targeting digital forensics for a variety of reasons. Due to the background management …
A framework to reconstruct digital forensics evidence via goal-oriented modeling
A Ogundiran, H Chi, J Yan… - 2023 IEEE 2nd …, 2023 - ieeexplore.ieee.org
ThDeveloping a goal-oriented model for digital forensic evidence is critical because the
reconstructed scenarios help forensic analysts not only understand steps taken by threat …
reconstructed scenarios help forensic analysts not only understand steps taken by threat …
Digital forensics meets ai: A game-changer for the 4th industrial revolution
S Malhotra - Artificial Intelligence and Blockchain in Digital …, 2023 - api.taylorfrancis.com
Digital forensics is defined as the actual process of recognizing, mining, documenting, and
safeguarding proofs, testimonials or evidence of a digital nature, which are admissible in a …
safeguarding proofs, testimonials or evidence of a digital nature, which are admissible in a …
Habits attribution and digital evidence object models based tool for cybercrime investigation
Š Grigaliūnas, J Toldinas - Baltic journal of modern computing, 2020 - epubl.ktu.edu
Abstract [eng] The amount of data stored on computers is growing rapidly every year, which
makes time-consuming investigation of digital evidence in cybercrime, because of the need …
makes time-consuming investigation of digital evidence in cybercrime, because of the need …