[HTML][HTML] IoT based agriculture (Ag-IoT): A detailed study on architecture, security and forensics
S Rudrakar, P Rughani - Information Processing in Agriculture, 2023 - Elsevier
Abstract IoT based agriculture (Ag-IoT) is an emerging communication technology that is
widely adopted by agricultural entrepreneurs and farmers to perform agricultural agro …
widely adopted by agricultural entrepreneurs and farmers to perform agricultural agro …
Digital forensics subdomains: the state of the art and future directions
A Al-Dhaqm, RA Ikuesan, VR Kebande… - IEEE …, 2021 - ieeexplore.ieee.org
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …
scientifically proven digital forensic investigation techniques to corroborate a suspected …
Development of rough-TOPSIS algorithm as hybrid MCDM and its implementation to predict diabetes
S Sengupta, D Datta, SS Rajest… - International …, 2023 - inderscienceonline.com
In this work, an innovative approach of multi-criteria decision-making method guided by
rough set theory is researched to predict diabetes. Diabetes is the root cause of various …
rough set theory is researched to predict diabetes. Diabetes is the root cause of various …
A Metamodeling Approach for IoT Forensic Investigation
The Internet of Things (IoT) Investigation of Forensics (IoTFI) is one of the subdomains of
Digital Forensics that aims to record and evaluate incidents involving the Internet of Things …
Digital Forensics that aims to record and evaluate incidents involving the Internet of Things …
A novel security framework to mitigate and avoid unexpected security threats in saudi arabia
A Alshammari - Engineering, Technology & Applied Science Research, 2023 - etasr.com
Many organizations around the world suffer large losses due to unexpected risks which can
have a profound impact on their survival. This paper presents a novel security framework to …
have a profound impact on their survival. This paper presents a novel security framework to …
[PDF][PDF] A novel framework for mobile forensics investigation process
Investigating digital evidence by gathering, examining, and maintaining evidence that was
stored in smartphones has attracted tremendous attention and become a key part of digital …
stored in smartphones has attracted tremendous attention and become a key part of digital …
[Retracted] Effective of Smart Mathematical Model by Machine Learning Classifier on Big Data in Healthcare Fast Response
MA Al-Khasawneh, A Bukhari… - … Methods in Medicine, 2022 - Wiley Online Library
In the past few years, big data related to healthcare has become more important, due to the
abundance of data, the increasing cost of healthcare, and the privacy of healthcare. Create …
abundance of data, the increasing cost of healthcare, and the privacy of healthcare. Create …
A Comprehensive Review of Digital Forensics Frameworks for Internet of Things (IoT) Devices
The development of Internet of Things (IoT) devices has brought many benefits to our daily
lives and business. Despite this, as the number of IoT devices continues to grow …
lives and business. Despite this, as the number of IoT devices continues to grow …
A Cybersecurity Awareness Model for the Protection of Saudi Students from Social Media Attacks
G Alotibi - Engineering, Technology & Applied Science Research, 2024 - etasr.com
Social engineering addresses a broad category of techniques aiming to persuade someone
to reveal data or perform actions for criminal purposes, such as disclosing personal …
to reveal data or perform actions for criminal purposes, such as disclosing personal …
A Detection and Investigation Model for the Capture and Analysis of Network Crimes
IS Alansari - Engineering, Technology & Applied Science Research, 2023 - etasr.com
Investigation in the field of network forensics involves examining network traffic to identify,
capture, preserve, reconstruct, analyze, and document network crimes. Although there are …
capture, preserve, reconstruct, analyze, and document network crimes. Although there are …