A Fog-Based Digital Forensics Investigation Framework for IoT Systems
暂无分享,去创建一个
Juan Li | Yan Bai | Eyhab Al-Masri | Eyhab Al-Masri | Juan Li | Yan Bai
[1] Christoph Wegener,et al. Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[2] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[3] Safaa Hraiz. Challenges of digital forensic investigation in cloud computing , 2017, 2017 8th International Conference on Information Technology (ICIT).
[4] Ragib Hasan,et al. FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things , 2015, 2015 IEEE International Conference on Services Computing.
[5] Kim-Kwang Raymond Choo. Cloud computing: Challenges and future directions , 2010 .
[6] Adeel Anjum,et al. A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends , 2017, Comput. Secur..
[7] Indrakshi Ray,et al. A Generic Digital Forensic Investigation Framework for Internet of Things (IoT) , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[8] Aderemi A. Atayero,et al. Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption , 2011 .
[9] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[10] Kim-Kwang Raymond Choo,et al. Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective , 2017, IEEE Cloud Computing.
[11] Bill Nelson,et al. Guide to Computer Forensics and Investigations , 2003 .
[12] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[13] Dmitry Zegzhda,et al. Achieving Internet of Things security via providing topological sustainability , 2015, 2015 Science and Information Conference (SAI).
[14] Shaftab Ahmed,et al. Tackling cloud security issues and forensics model , 2010, 7th International Symposium on High-capacity Optical Networks and Enabling Technologies.
[15] Yuval Elovici,et al. Opening Pandora's Box: E ective Techniques for Reverse Engineering IoT Devices , 2017 .
[16] M. Mrinalni Vaknishadh,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .
[17] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[19] Robert W. Messler,et al. Reverse Engineering: Mechanisms, Structures, Systems & Materials , 2013 .
[20] Kim-Kwang Raymond Choo,et al. Healthcare-Related Data in the Cloud: Challenges and Opportunities , 2016, IEEE Cloud Computing.
[21] Norita Md Norwawi,et al. Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology , 2015, 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC).
[22] Stephen Biggs,et al. Cloud Computing: The impact on digital forensic investigations , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[23] Tom H. Luan,et al. Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.
[24] Ramjee Prasad,et al. Capability-based access control delegation model on the federated IoT network , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[25] Kim-Kwang Raymond Choo,et al. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems , 2019, IEEE Transactions on Dependable and Secure Computing.
[26] Diane Barrett,et al. Virtualization and Forensics: A Digital Forensic Investigator’s Guide to Virtual Environments , 2010 .