Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT)
暂无分享,去创建一个
[1] A. Reshma,et al. INTERNET OF THINGS AND SECURITY ISSUES , 2016 .
[2] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[3] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[4] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[5] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[6] Ben Laurie. Network Forensics , 2004, ACM Queue.
[7] Norita Md Norwawi,et al. Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology , 2015, 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC).
[8] Ainuddin Wahid Abdul Wahab,et al. Network forensics: Review, taxonomy, and open challenges , 2016, J. Netw. Comput. Appl..
[9] Robert Hegarty,et al. Digital Evidence Challenges in the Internet of Things , 2014, INC.
[10] Ling Zhihao,et al. The research and implement of smart home system based on Internet of Things , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).
[11] Aleksandar Valjarevic,et al. A Comprehensive and Harmonized Digital Forensic Investigation Process Model , 2015, Journal of forensic sciences.
[12] Ragib Hasan,et al. FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things , 2015, 2015 IEEE International Conference on Services Computing.
[13] Marianne Winslett,et al. The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance , 2009, FAST.
[14] Weizhe Zhang,et al. Security Architecture of the Internet of Things Oriented to Perceptual Layer , 2013 .
[15] Indrakshi Ray,et al. A Generic Digital Forensic Investigation Framework for Internet of Things (IoT) , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[16] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[17] Paul Sant,et al. The Forensics Edge Management System: A Concept and Design , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[18] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[19] Manuel Díaz,et al. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing , 2016, J. Netw. Comput. Appl..
[20] M. Shamim Hossain,et al. Toward end-to-end biomet rics-based security for IoT infrastructure , 2016, IEEE Wireless Communications.
[21] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[22] Dhiren Patel,et al. A Survey on Internet of Things: Security and Privacy Issues , 2014 .
[23] Ragib Hasan,et al. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.
[24] Jeffrey M. Voas,et al. Learning Internet-of-Things Security "Hands-On" , 2016, IEEE Security & Privacy.