Big data and internet of things security and forensics: Challenges and opportunities
A Azmoodeh, A Dehghantanha, KKR Choo - … of Big Data and IoT Security, 2019 - Springer
With millions to billions of connected Internet of Things (IoT) devices and systems sending
heterogeneous raw and processed data through the IoT network, we need to be able to …
heterogeneous raw and processed data through the IoT network, we need to be able to …
Iot privacy, security and forensics challenges: an unmanned aerial vehicle (uav) case study
I Diaz Linares, A Pardo, E Patch… - Handbook of Big Data …, 2022 - Springer
Continuing advances in technologies such as sensors, automatic identification and tracking,
embedded computing, wireless communications, broadband Internet access and distributed …
embedded computing, wireless communications, broadband Internet access and distributed …
Evaluating performance of scalable fair clustering machine learning techniques in detecting cyber attacks in industrial control systems
A Handa, P Semwal - Handbook of Big Data Analytics and Forensics, 2022 - Springer
The widespread use of machine learning to build intelligent systems which can make real-
life decisions has led to the introduction of fairness notion in the machine learning …
life decisions has led to the introduction of fairness notion in the machine learning …
A comparison of state-of-the-art machine learning models for OpCode-based IoT malware detection
W Peters, A Dehghantanha, RM Parizi… - Handbook of Big Data …, 2020 - Springer
Abstract The Internet of Things is dramatically changing the face of our modern world. A
number of significant organizations are leveraging this onset of IoT to enhance the quality …
number of significant organizations are leveraging this onset of IoT to enhance the quality …
Three dimensional denoising filter for effective source smartphone video identification and verification
A Lawgaly, F Khelifi, A Bouridane… - Proceedings of the …, 2022 - dl.acm.org
The field of digital image and video forensics has recently seen significant advances and
has attracted attention from a growing number of researchers given the availability of …
has attracted attention from a growing number of researchers given the availability of …
Sensor pattern noise estimation using non-textured video frames for efficient source smartphone identification and verification
A Lawgaly, F Khelifi, A Bouridane… - 2021 International …, 2021 - ieeexplore.ieee.org
Photo response non-uniformity (PRNU) noise is a sensor pattern noise characterizing the
imaging device. It has been broadly used in the literature for image authentication and …
imaging device. It has been broadly used in the literature for image authentication and …
PRNU estimation based on weighted averaging for source smartphone video identification
A Lawgaly, F Khelifi, A Bouridane… - … on Control, Decision …, 2022 - ieeexplore.ieee.org
Photo response non-uniformity (PRNU) noise is a sensor pattern noise characterizing
imperfections in the imaging device. The PRNU is a unique noise for each sensor device …
imperfections in the imaging device. The PRNU is a unique noise for each sensor device …
[PDF][PDF] Performance Evaluation of Deep Learning Techniques in The Detection of IOT Malware
AT Salim, BM Khammas - Iraqi Journal of Information and Communication …, 2023 - iasj.net
Internet of Things (IoT) equipment is rapidly being used in a variety of businesses and for a
variety of reasons (for example, sensing and collecting data from the environment in both …
variety of reasons (for example, sensing and collecting data from the environment in both …
Evaluation of scalable fair clustering machine learning methods for threat hunting in cyber-physical systems
D Sahoo, A Upadhyay - Handbook of Big Data Analytics and Forensics, 2022 - Springer
With a rapid increase in the automation of industrial control systems, it has become vital to
defend them against cyberattacks. Clustering is a widely used, unsupervised machine …
defend them against cyberattacks. Clustering is a widely used, unsupervised machine …
Semi-blind source scanner identification
CB Rabah, G Coatrieux… - … Conference on Internet …, 2019 - ieeexplore.ieee.org
In this paper, we focus on the identification of a scanner at the origin of a given scanned
document provided by a public or private organization. Such documents have generally a …
document provided by a public or private organization. Such documents have generally a …