Cloud Forensics Issues and Opportunities
暂无分享,去创建一个
Ali Dehghantanha | Mohsen Damshenas | Mohd Taufik Abdullah | Asou Aminnezhad | A. Dehghantanha | Mohsen Damshenas | Asou Aminnezhad
[1] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[2] Ali Dehghantanha,et al. Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems , 2011, CISIS.
[3] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[4] Ali Dehghantanha,et al. Towards a Pervasive Formal Privacy Language , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.
[5] Ali Dehghantanha,et al. Utilizing trusted platform module to mitigate botnet attacks , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.
[6] Ali Dehghantanha. Xml-Based Privacy Model in Pervasive Computing , 2008 .
[7] Stephen Biggs,et al. Cloud Computing: The impact on digital forensic investigations , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[8] Ali Dehghantanha,et al. Framework of digital forensics for the Samsung Star Series phone , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[9] Ali Dehghantanha,et al. Forensics investigation challenges in cloud computing environments , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[10] John Zic,et al. A Cloud Architecture of Virtual Trusted Platform Modules , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[11] Reza Boostani,et al. A New Hybrid Algorithm to Solve the Task Scheduling Problem in Grid Computing , 2013 .
[12] Ali Dehghantanha,et al. UPM: User-Centered Privacy Model in Pervasive Computing Systems , 2009, 2009 International Conference on Future Computer and Communication.
[13] Mark Taylor,et al. Digital evidence in cloud computing systems , 2010, Comput. Law Secur. Rev..
[14] Shaftab Ahmed,et al. Tackling cloud security issues and forensics model , 2010, 7th International Symposium on High-capacity Optical Networks and Enabling Technologies.
[15] Catherine Everett,et al. Cloud computing – A question of trust , 2009 .
[16] Ali Dehghantanha,et al. Volatile memory acquisition using backup for forensic investigation , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[17] Ali Dehghantanha,et al. Towards green frameworks for digital forensics investigation , 2013 .
[18] Tetsutaro Uehara,et al. Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.
[19] Kim-Kwang Raymond Choo,et al. An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..
[20] Richard Morrell,et al. Cloud computing: new challenges and opportunities , 2011, Netw. Secur..
[21] Ali Dehghantanha,et al. VoIP evidence model: A new forensic method for investigating VoIP malicious attacks , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[22] Chris Wren,et al. Cloud computing: Forensic challenges for law enforcement , 2010, 2010 International Conference for Internet Technology and Secured Transactions.
[23] Farzad Sabahi,et al. Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[24] Hong Guo,et al. Forensic investigations in Cloud environments , 2012, 2012 International Conference on Computer Science and Information Processing (CSIP).
[25] Ali Dehghantanha,et al. A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS , 2014 .
[26] Jooyoung Lee,et al. Pervasive Forensic Analysis Based on Mobile Cloud Computing , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.
[27] Christoph Wegener,et al. Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[28] Stephen Mason,et al. Digital evidence and 'cloud' computing , 2011, Comput. Law Secur. Rev..
[29] Kirit J. Modi,et al. Cloud computing - concepts, architecture and challenges , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).
[30] Roger Clarke,et al. Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..
[31] Ali Dehghantanha,et al. User-centered Privacy and Trust Model in Cloud Computing Systems , 2009 .
[32] Ali Dehghantanha,et al. Defusing the Hazards of Social Network Services , 2011 .
[33] Ali Dehghantanha,et al. Investigation of bypassing malware defences and malware detections , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[34] Nur Izura Udzir,et al. A XML based, user-centered privacy model in pervasivecomputing systems , 2009 .
[35] Farid Daryabar,et al. INVESTIGATION OF MALWARE DEFENCE AND DETECTION TECHNIQUES , 2011 .
[36] SeyedHossein Mohtasebi,et al. SMARTPHONE FORENSICS: A CASE STUDY WITH NOKIA E5-00 MOBILE PHONE , 2011 .
[37] Hiroyuki Sato,et al. A Cloud Trust Model in a Security Aware Cloud , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.
[38] Abha Belorkar,et al. Regeneration of events using system snapshots for cloud forensic analysis , 2011, 2011 Annual IEEE India Conference.
[39] ChengYan. Cybercrime forensic system in cloud computing , 2011 .
[40] Ali Dehghantanha,et al. Analysis of virtual honeynet and VLAN-based virtual networks , 2011, 2011 International Symposium on Humanities, Science and Engineering Research.
[41] Gary C. Kessler,et al. Anti-Forensics and the Digital Investigator , 2007 .
[42] Ali Dehghantanha,et al. A Framework of TPM, SVM and Boot Control for Securing Forensic Logs , 2012 .
[43] Ali Dehghantanha,et al. A User-Centered Context-Sensitive Privacy Model in Pervasive Systems , 2010, 2010 Second International Conference on Communication Software and Networks.
[44] Tyler Moore. The Economics of Digital Forensics , 2006, WEIS.
[45] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.