Cybercrime Investigations in the Era of Smart Applications: Way Forward Through Big Data
暂无分享,去创建一个
[1] Asif Iqbal,et al. Digital Forensic Analysis of Industrial Control Systems Using Sandboxing: A Case of WAMPAC Applications in the Power Systems , 2019, Energies.
[2] Imad Jawhar,et al. UAVs for smart cities: Opportunities and challenges , 2014, 2014 International Conference on Unmanned Aircraft Systems (ICUAS).
[3] Andrii Shalaginov,et al. Advancing Neuro-Fuzzy Algorithm for Automated Classification in Largescale Forensic and Cybercrime Investigations: Adaptive Machine Learning for Big Data Forensic , 2018 .
[4] Katrin Franke,et al. Cyber crime investigations in the era of big data , 2017, 2017 IEEE International Conference on Big Data (Big Data).
[5] Antonio Iera,et al. SIoT: Giving a Social Structure to the Internet of Things , 2011, IEEE Communications Letters.
[6] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[7] Asif Iqbal,et al. Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power Sector , 2017, ICDF2C.
[8] Salvatore Catanese,et al. Crawling Facebook for social network analysis purposes , 2011, WIMS '11.
[9] Friedemann Mattern,et al. Living in a smart environment - implications for the coming ubiquitous information society , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[10] Kim-Kwang Raymond Choo,et al. Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix , 2018, Future Gener. Comput. Syst..
[11] Ahmed Khattab,et al. Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey , 2018, 2018 International Conference on Computer and Applications (ICCA).
[12] Andrii Shalaginov. Soft Computing and Hybrid Intelligence for Decision Support in Forensics Science , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[13] Min Chen,et al. A Survey on Internet of Things From Industrial Market Perspective , 2015, IEEE Access.
[14] Brett A. Becker,et al. Current Challenges and Future Research Areas for Digital Forensic Investigation , 2016, ArXiv.
[15] Ali Dehghantanha,et al. Machine Learning Aided Static Malware Analysis: A Survey and Tutorial , 2018, ArXiv.
[16] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[17] Ahmad Diab,et al. Darknet and deepnet mining for proactive cybersecurity threat intelligence , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[18] Paulo F. Pires,et al. Towards an IoT ecosystem , 2013, SESoS.
[19] Eric T. Matson,et al. Drone forensic framework: Sensor and data identification and verification , 2017, 2017 IEEE Sensors Applications Symposium (SAS).
[20] Asif Iqbal,et al. Intelligent analysis of digital evidences in large-scale logs in power systems attributed to the attacks , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[21] Anthony Skjellum,et al. Using machine learning to secure IoT systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[22] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[23] Muhammad Atif Tahir,et al. Towards cloud based big data analytics for smart future cities , 2013, 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing.
[24] Nicole J Watkins. Situational Crime Prevention in Schools: Implications for Victimization, Delinquency, and Avoidance Behaviors , 2015 .
[25] H. Farhangi,et al. The path of the smart grid , 2010, IEEE Power and Energy Magazine.
[26] Clara Aguirre Hernando. Backstage to the Panama Papers: big data analytics and collaborative journalism , 2017 .
[27] Kim-Kwang Raymond Choo,et al. Smart vehicle forensics: Challenges and case study , 2020, Future Gener. Comput. Syst..
[28] Bo Luo,et al. Cyber-physical security for smart cars: taxonomy of vulnerabilities, threats, and attacks , 2015, ICCPS.
[29] Xin Huang,et al. Use of Machine Learning in Detecting Network Security of Edge Computing System , 2019, 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA).
[30] Ali Dehghantanha,et al. Digital forensics: the missing piece of the Internet of Things promise , 2016 .
[31] Marco Manca,et al. eHealth, Care and Quality of Life , 2013 .
[32] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[33] Rajkumar Buyya,et al. Internet of Things: An Overview , 2017, ArXiv.