Efficient and reliable forensics using intelligent edge computing

[1]  L. Javier García-Villalba,et al.  A machine learning forensics technique to detect post-processing in digital videos , 2020, Future Gener. Comput. Syst..

[2]  T. Sakthivel,et al.  Enhanced Forensic Process for Improving Mobile Cloud Traceability in Cloud-Based Mobile Applications , 2020 .

[3]  Mauro Conti,et al.  LEChain: A blockchain-based lawful evidence management scheme for digital forensics , 2021, Future Gener. Comput. Syst..

[4]  Deevi Radha Rani,et al.  Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN , 2020, Comput. Commun..

[5]  Keping Yu,et al.  Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV , 2020, IEEE Transactions on Vehicular Technology.

[6]  Alecsandru Patrascu,et al.  Logging framework for cloud computing forensic environments , 2014, 2014 10th International Conference on Communications (COMM).

[7]  Helge Janicke,et al.  A novel principle to validate digital forensic models , 2020, Digit. Investig..

[8]  Ainuddin Wahid Abdul Wahab,et al.  SIDNFF: Source identification network forensics framework for cloud computing , 2015, 2015 IEEE International Conference on Consumer Electronics - Taiwan.

[9]  Laurence T. Yang,et al.  LSTM and Edge Computing for Big Data Feature Recognition of Industrial Electrical Equipment , 2019, IEEE Transactions on Industrial Informatics.

[10]  Gautam Srivastava,et al.  Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments , 2021, IEEE Internet of Things Journal.

[11]  Thar Baker,et al.  Improving fog computing performance via Fog-2-Fog collaboration , 2019, Future Gener. Comput. Syst..

[12]  H. T. Mouftah,et al.  Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[13]  Paul Sant,et al.  The Forensics Edge Management System: A Concept and Design , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[14]  Graeme Horsman,et al.  Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics , 2018, Comput. Secur..

[15]  Xiaohui Yang and Yue Yu DDoS Attacks Defense Mechanism based on Secure Routing Alliance , 2018 .

[16]  Muhammad Shahid,et al.  A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment , 2015 .

[17]  Saurabh Shah,et al.  Exploration of Vulnerabilities, Threats and Forensic Issues and its impact on the Distributed Environment of Cloud and its mitigation , 2020 .

[18]  Azzedine Boukerche,et al.  Generalizing AI: Challenges and Opportunities for Plug and Play AI Solutions , 2021, IEEE Network.

[19]  Ray Hunt New developments in network forensics — Tools and techniques , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[20]  Xin Jiang,et al.  Cloud computing-based forensic analysis for collaborative network security management system , 2013 .

[21]  Elena Sitnikova,et al.  A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework , 2020, Future Gener. Comput. Syst..

[22]  Mohamed Elhoseny,et al.  Secure Automated Forensic Investigation for Sustainable Critical Infrastructures Compliant with Green Computing Requirements , 2020, IEEE Transactions on Sustainable Computing.

[23]  M. Shamim Hossain,et al.  Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics , 2019, IEEE Transactions on Industrial Informatics.

[24]  Laurence T. Yang,et al.  Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices , 2020, IEEE Transactions on Industrial Informatics.

[25]  Gang Yan,et al.  AR-Net: Adaptive Attention and Residual Refinement Network for Copy-Move Forgery Detection , 2020, IEEE Transactions on Industrial Informatics.

[26]  H. T. Mouftah,et al.  A continuous diversified vehicular cloud service availability framework for smart cities , 2018, Comput. Networks.

[27]  Balasubramaniam Natarajan,et al.  A Framework for Efficient Information Aggregation in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.

[28]  Corrado Federici AlmaNebula: A Computer Forensics Framework for the Cloud , 2013, ANT/SEIT.