Efficient and reliable forensics using intelligent edge computing
暂无分享,去创建一个
Yaser Jararweh | Gautam Srivastava | Abdul Razaque | Moayad Aloqaily | Muder Almiani | Gautam Srivastava | A. Razaque | M. Aloqaily | Y. Jararweh | Muder Almiani | Moayad Aloqaily
[1] L. Javier García-Villalba,et al. A machine learning forensics technique to detect post-processing in digital videos , 2020, Future Gener. Comput. Syst..
[2] T. Sakthivel,et al. Enhanced Forensic Process for Improving Mobile Cloud Traceability in Cloud-Based Mobile Applications , 2020 .
[3] Mauro Conti,et al. LEChain: A blockchain-based lawful evidence management scheme for digital forensics , 2021, Future Gener. Comput. Syst..
[4] Deevi Radha Rani,et al. Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN , 2020, Comput. Commun..
[5] Keping Yu,et al. Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV , 2020, IEEE Transactions on Vehicular Technology.
[6] Alecsandru Patrascu,et al. Logging framework for cloud computing forensic environments , 2014, 2014 10th International Conference on Communications (COMM).
[7] Helge Janicke,et al. A novel principle to validate digital forensic models , 2020, Digit. Investig..
[8] Ainuddin Wahid Abdul Wahab,et al. SIDNFF: Source identification network forensics framework for cloud computing , 2015, 2015 IEEE International Conference on Consumer Electronics - Taiwan.
[9] Laurence T. Yang,et al. LSTM and Edge Computing for Big Data Feature Recognition of Industrial Electrical Equipment , 2019, IEEE Transactions on Industrial Informatics.
[10] Gautam Srivastava,et al. Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments , 2021, IEEE Internet of Things Journal.
[11] Thar Baker,et al. Improving fog computing performance via Fog-2-Fog collaboration , 2019, Future Gener. Comput. Syst..
[12] H. T. Mouftah,et al. Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[13] Paul Sant,et al. The Forensics Edge Management System: A Concept and Design , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[14] Graeme Horsman,et al. Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics , 2018, Comput. Secur..
[15] Xiaohui Yang and Yue Yu. DDoS Attacks Defense Mechanism based on Secure Routing Alliance , 2018 .
[16] Muhammad Shahid,et al. A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment , 2015 .
[17] Saurabh Shah,et al. Exploration of Vulnerabilities, Threats and Forensic Issues and its impact on the Distributed Environment of Cloud and its mitigation , 2020 .
[18] Azzedine Boukerche,et al. Generalizing AI: Challenges and Opportunities for Plug and Play AI Solutions , 2021, IEEE Network.
[19] Ray Hunt. New developments in network forensics — Tools and techniques , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[20] Xin Jiang,et al. Cloud computing-based forensic analysis for collaborative network security management system , 2013 .
[21] Elena Sitnikova,et al. A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework , 2020, Future Gener. Comput. Syst..
[22] Mohamed Elhoseny,et al. Secure Automated Forensic Investigation for Sustainable Critical Infrastructures Compliant with Green Computing Requirements , 2020, IEEE Transactions on Sustainable Computing.
[23] M. Shamim Hossain,et al. Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics , 2019, IEEE Transactions on Industrial Informatics.
[24] Laurence T. Yang,et al. Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices , 2020, IEEE Transactions on Industrial Informatics.
[25] Gang Yan,et al. AR-Net: Adaptive Attention and Residual Refinement Network for Copy-Move Forgery Detection , 2020, IEEE Transactions on Industrial Informatics.
[26] H. T. Mouftah,et al. A continuous diversified vehicular cloud service availability framework for smart cities , 2018, Comput. Networks.
[27] Balasubramaniam Natarajan,et al. A Framework for Efficient Information Aggregation in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.
[28] Corrado Federici. AlmaNebula: A Computer Forensics Framework for the Cloud , 2013, ANT/SEIT.