暂无分享,去创建一个
Ali Dehghantanha | James Baldwin | Omar M. K. Alhawi | Simone Shaughnessy | Alex Akinbi | A. Dehghantanha | A. Akinbi | James Baldwin | O. Alhawi | Simone Shaughnessy
[1] Alan T. Sherman,et al. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques , 2012, Digit. Investig..
[2] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[3] Ali Dehghantanha,et al. Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study , 2017, Journal of forensic sciences.
[4] Chris Wren,et al. Cloud computing: Forensic challenges for law enforcement , 2010, 2010 International Conference for Internet Technology and Secured Transactions.
[5] E. Garfield,et al. Can Citation Indexing Be Automated ? , 1964 .
[6] Lutz Bornmann,et al. What do citation counts measure? A review of studies on citing behavior , 2008, J. Documentation.
[7] Daniel Jones,et al. The history and meaning of the term "phoneme" , 1957 .
[8] Nasir Raza. Challenges to network forensics in cloud computing , 2015, 2015 Conference on Information Assurance and Cyber Security (CIACS).
[9] Christoph Wegener,et al. Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[10] Alice Hutchings,et al. Criminals in the Cloud: Crime, Security Threats, and Prevention Measures , 2015 .
[11] Ali Dehghantanha,et al. A Cyber Kill Chain Based Taxonomy of Banking Trojans for Evolutionary Computational Intelligence , 2017, J. Comput. Sci..
[12] Kim-Kwang Raymond Choo,et al. An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..
[13] J. Hirsch. Does the h index have predictive power? , 2007, Proceedings of the National Academy of Sciences.
[14] Ali Dehghantanha,et al. Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[15] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[16] Ali Dehghantanha,et al. Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study , 2018, IEEE Transactions on Sustainable Computing.
[17] Kim-Kwang Raymond Choo,et al. Cloud Storage Forensic Framework , 2014 .
[18] Nathan Clarke,et al. A forensic acquisition and analysis system for IaaS , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[19] Y. Iraqi,et al. A State-of-the-Art Review of Cloud Forensics , 2014, J. Digit. Forensics Secur. Law.
[20] Kim-Kwang Raymond Choo,et al. Cloud incident handling and forensic‐by‐design: cloud storage as a case study , 2017, Concurr. Comput. Pract. Exp..
[21] Ali Dehghantanha,et al. Cloud Storage Forensic: hubiC as a Case-Study , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).
[22] Leena Jain,et al. An Approach for Investigating Perspective of Cloud Software-as-a-Service (SaaS) , 2010 .
[23] Kim-Kwang Raymond Choo,et al. Cloud Storage Forensics , 2013, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.
[24] Alan T. Sherman,et al. UNDERSTANDING ISSUES IN CLOUD FORENSICS: TWO HYPOTHETICAL CASE STUDIES , 2011 .
[25] Ali Dehghantanha,et al. Intelligent OS X malware threat detection with code inspection , 2018, Journal of Computer Virology and Hacking Techniques.
[26] Sieteng Soh,et al. Cloud forensics: Technical challenges, solutions and comparative analysis , 2015, Digit. Investig..
[27] Ali Dehghantanha,et al. Forensics investigation challenges in cloud computing environments , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[28] Steven Furnell,et al. Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions , 2013, 2013 Information Security for South Africa.
[29] Kim-Kwang Raymond Choo,et al. IT standards and guides do not adequately prepare IT practitioners to appear as expert witnesses: An Australian perspective , 2016 .
[30] Nor Badrul Anuar,et al. The rise of "malware": Bibliometric analysis of malware study , 2016, J. Netw. Comput. Appl..
[31] Ali Dehghantanha,et al. Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence , 2018, IEEE Transactions on Emerging Topics in Computing.
[32] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[33] Lokman I. Meho,et al. Impact of data sources on citation counts and rankings of LIS faculty: Web of science versus scopus and google scholar , 2007, J. Assoc. Inf. Sci. Technol..
[34] Kim-Kwang Raymond Choo,et al. Dropbox analysis: Data remnants on user machines , 2013, Digit. Investig..
[35] Ali Dehghantanha,et al. Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices , 2016 .
[36] Alan T. Sherman,et al. Design and Implementation of FROST - Digital Forensic Tools for the OpenStack Cloud Computing Platform , 2016 .
[37] Ali Dehghantanha,et al. Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study , 2017, ArXiv.
[38] Ali Dehghantanha,et al. SugarSync forensic analysis , 2016 .
[39] S. H. Mohtasebi,et al. Chapter 13 – Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud , 2017 .
[40] Ali Dehghantanha,et al. Detecting crypto-ransomware in IoT networks based on energy consumption footprint , 2018, J. Ambient Intell. Humaniz. Comput..
[41] Tooska Dargahi,et al. Investigating Storage as a Service Cloud Platform: pCloud as a Case Study , 2017, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.
[42] Mohand Tahar Kechadi,et al. Cloud Forensics , 2011, IFIP Int. Conf. Digital Forensics.
[43] E. Garfield. The history and meaning of the journal impact factor. , 2006, JAMA.
[44] Ali Dehghantanha,et al. A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..
[45] Tim Storer,et al. Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics , 2014, Int. J. Digit. Crime Forensics.
[46] Ali Dehghantanha,et al. Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies , 2017, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.
[47] E. Garfield. Citation indexes for science. A new dimension in documentation through association of ideas. 1955. , 1955, International journal of epidemiology.
[48] Nimisha Gupta,et al. Cloud Computing: Comparison with Previous Technique and Research Challenges , 2014 .
[49] Kim-Kwang Raymond Choo. Cloud computing: Challenges and future directions , 2010 .
[50] Henry Small. Visualizing science by citation mapping , 1999 .
[51] Matthew Metheny,et al. Introduction to the federal cloud computing strategy , 2013, CloudCom 2013.
[52] Xueling Wu,et al. Global research trends in landslides during 1991–2014: a bibliometric analysis , 2015, Landslides.
[53] Ali Dehghantanha,et al. Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.
[54] Simon Chapman,et al. The Association between Four Citation Metrics and Peer Rankings of Research Influence of Australian Researchers in Six Fields of Public Health , 2011, PLoS ONE.
[55] Elie Bursztein,et al. Beyond files recovery owade cloud-based forensic , 2011 .
[56] Ali Dehghantanha,et al. Cloud storage forensics: MEGA as a case study , 2017 .
[57] Latesh G. Malik,et al. Cloud Forensics: Issues and Challenges , 2013, 2013 6th International Conference on Emerging Trends in Engineering and Technology.
[58] Shaftab Ahmed,et al. Tackling cloud security issues and forensics model , 2010, 7th International Symposium on High-capacity Optical Networks and Enabling Technologies.