IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things
暂无分享,去创建一个
[1] Sebastiaan H. von Solms,et al. A Multi-component View of Digital Forensics , 2010, 2010 International Conference on Availability, Reliability and Security.
[2] Paul Sant,et al. The Forensics Edge Management System: A Concept and Design , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[3] Valérie Issarny,et al. Ontologies for the internet of things , 2011, MDS '11.
[4] Payam M. Barnaghi,et al. An Internet of Things Platform for Real-World and Digital Objects , 2012, Scalable Comput. Pract. Exp..
[5] Andrew P. Martin,et al. Threat-Based Security Analysis for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.
[6] Eugene H. Spafford,et al. An Event-Based Digital Forensic Investigation Framework , 2004 .
[7] Escola Politécnica,et al. Improving Chain of Custody in Forensic Investigation of Electronic Digital Systems , 2011 .
[8] Sriram Raghavan,et al. Digital forensic research: current state of the art , 2012, CSI Transactions on ICT.
[9] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[10] Simson L. Garfinkel,et al. Digital forensics research: The next 10 years , 2010, Digit. Investig..
[11] Damir Isovic. Components in Real-Time Systems , 2002 .
[12] Shahrin Sahib,et al. Mapping Process of Digital Forensic Investigation Framework , 2008 .
[13] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[14] Peter G. Neumann,et al. Reliability and Security , 1995 .
[15] Xu Xiaohui,et al. Study on Security Problems and Key Technologies of the Internet of Things , 2013, 2013 International Conference on Computational and Information Sciences.
[16] Issa Traoré,et al. The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review , 2011, ISA.
[17] Gregory Epiphaniou,et al. Internet of Things Forensics: Challenges and approaches , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[18] Hung-Min Sun,et al. Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[19] Baber Aslam,et al. Digital forensics: Latest challenges and response , 2013, 2013 2nd National Conference on Information Assurance (NCIA).
[20] Kim-Kwang Raymond Choo,et al. An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..
[21] Ragib Hasan,et al. FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things , 2015, 2015 IEEE International Conference on Services Computing.
[22] Djamel Tandjaoui,et al. Internet of Things: Concept, Building blocks, Applications and Challenges , 2014, ArXiv.
[23] Richard C. Linger,et al. Computational Evaluation of Software Security Attributes , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[24] Mark Taylor,et al. Digital evidence in cloud computing systems , 2010, Comput. Law Secur. Rev..
[25] Sonja Meyer,et al. Introducing Entity-Based Concepts to Business Process Modeling , 2011, BPMN.
[26] B.J.B. Bredenoord,et al. Authentication and Authorization for the Internet of Things for Health , 2019 .
[27] Miroslav Bača,et al. An Ontological Approach to Study and Manage Digital Chain of Custody of Digital Evidence , 2011 .
[28] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[29] Ralf Huuck,et al. IoT: The internet of threats and static program analysis defense , 2015 .
[30] Changguang Wang,et al. The Research of Security Technology in the Internet of Things , 2011, CSISE.
[31] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[32] Paul Fergus,et al. SCCIR: Smart Cities Critical Infrastructure Response Framework , 2011, 2011 Developments in E-systems Engineering.
[33] Felix C. Freiling,et al. A Common Process Model for Incident Response and Computer Forensics , 2007, IMF.
[34] Ghita Mezzour,et al. Securing the Internet of Things (IoT) , 2018, 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM).
[35] Giuseppe Lipari,et al. Toward Parametric Timed Interfaces for Real-Time Components , 2014, SynCoP.
[36] Eugene H. Spafford,et al. Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..
[37] Zubair A. Baig. Securing the Internet of Things Infrastructure - Standards and Techniques , 2014 .
[38] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[39] Muhammad Saad,et al. Cyber security in internet of things , 2019, Review of Computer Engineering Studies.