Academic literature on the topic 'IoT Cyber Forensics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IoT Cyber Forensics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IoT Cyber Forensics"

1

Sawarkar, Ankush D., and Anjali Deepak Hazar. "IoT Forensic Cyber Activities Detection and Prevention with Automated Machine Learning Model." Journal of Sensors, IoT & Health Sciences 2, no. 2 (2024): 1–15. http://dx.doi.org/10.69996/jsihs.2024006.

Full text
Abstract:
The Internet of Things (IoT) has been deployed in a vast range of applications with exponential increases in data size and complexity. Existing forensic techniques are not effective for the accuracy and detection rate of security issues in IoT forensics. Cyber forensic comprises huge volume constraints that are processing huge volumes of data in the Information and Communication Technology (ICT) comprised of IoT devices and platforms. Trust blockchain is effective technology those are utilized to assess the tamper-proof records in all transaction in the IoT environment. With the implementation
APA, Harvard, Vancouver, ISO, and other styles
2

Kwaku, Timothy. "Internet of Things (IoT) & Underwater Network Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 291–300. http://dx.doi.org/10.22624/aims/crp-bk3-p47.

Full text
Abstract:
The proliferation of IoT devices and technology in recent years cannot be overstated. With the diverse area of application, IoT devices will be prone to unscrupulous attacks. Applying digital forensics in this field makes it a multi-faceted area that necessarily implies a lot of challenges out to be addressed in order to ensure compatibility. This research extensively considers existing literature with the view of highlighting the application areas of IoT, underwater networks and digital areas as well the research challenges that needs attention in order to realize a robust IoT and underwater
APA, Harvard, Vancouver, ISO, and other styles
3

Omer Aziz, M. Abdullah Siraj, and Abdul Rehman. "Privacy challenges in cyber security against cybercrime in digital forensic. A systematic literature review in Pakistan." Journal of Computing & Biomedical Informatics 2, no. 02 (2021): 158–64. http://dx.doi.org/10.56979/202/2021/31.

Full text
Abstract:
Cybercrime is a criminal activity that either target or uses a computer network or a network device. IOT become the biggest domain in these days.it is difficult to adopt digital forensics tools in IoT but somehow digital forensics play an important role in cyber security of IoT. Privacy and security challenges are increased day by day in digital forensics. Cybercrime in cyber security is increased day by day in digital forensics. Privacy and security are relate with each other but difference is that privacy relate to any right you have to control your personal information and how it’s used. Lo
APA, Harvard, Vancouver, ISO, and other styles
4

Odame, Frederick Asumang. "Privacy Preserving Internet of Things (IoT) Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 109–12. http://dx.doi.org/10.22624/aims/crp-bk3-p18.

Full text
Abstract:
The Internet of Things (IoT) envisions a network of pervasive, connected, and intelligent nodes that interact autonomously and provide a variety of services. IoT objects were a perfect target for cyber assaults because of their wide dispersion, openness, and relatively high processing power. Furthermore, because many IoT nodes collect and process personal or private data, they are becoming a goldmine of information for cybercriminals. As a result, security, particularly the ability to detect compromised nodes, as well as the collection and preservation of evidence of an attack or malicious act
APA, Harvard, Vancouver, ISO, and other styles
5

Nurettin Selcuk SENOL and Amar Rasheed. "Forensic Insights into SenseCAP: A Comprehensive Examination of Technical and LoRa Connectivity Dimensions." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 595–604. https://doi.org/10.34190/iccws.20.1.3217.

Full text
Abstract:
The rapid expansion of Internet of Things (IoT) devices has reshaped various sectors by improving connectivity, efficiency, and convenience. Central to this transformation are LoRa (Long Range) and LoRaWAN (Long Range Wide Area Network) technologies, which provide reliable, low-power, long-range communication critical for IoT applications. As these systems evolve, examining security vulnerabilities and forensic challenges becomes increasingly essential. This paper explores digital forensics within IoT environments, focusing on the methodologies and tools required to secure and maintain the int
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Kyounggon, Istabraq Mohammed Alshenaifi, Sundaresan Ramachandran, Jisu Kim, Tanveer Zia, and Abdulrazaq Almorjan. "Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey." Sensors 23, no. 7 (2023): 3681. http://dx.doi.org/10.3390/s23073681.

Full text
Abstract:
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart cities, various network technologies, such as the Internet and IoT, are combined to exchange real-time information, making the everyday lives of their residents more convenient. However, there is a lack of systematic research on cybersecurity and cyber forensics in smart cities. This paper presents a comprehensive review and survey of cybersecurity and cyber forensics for smart cities. We analysed 154 papers t
APA, Harvard, Vancouver, ISO, and other styles
7

Brown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.

Full text
Abstract:
Digital Forensics investigation is the science and legal process of investigating computer/cybercrimes and digital media or objects to gather evidence. This new and fast evolving field encompasses computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics; and for this reason have digital evidence distributed widely when the need arises for crime prosecution. Digital evidence must be authentic, accurate, complete, and convincing to the jury for legal admissibility at the court of law. In many instances due to the distributed nature of digital forensic
APA, Harvard, Vancouver, ISO, and other styles
8

Ho, Shuyuan Mary, and Mike Burmester. "Cyber Forensics on Internet of Things: Slicing and Dicing Raspberry Pi." International Journal of Cyber Forensics and Advanced Threat Investigations 2, no. 1 (2021): 29–49. http://dx.doi.org/10.46386/ijcfati.v2i1.22.

Full text
Abstract:
Any device can now connect to the Internet, and Raspberry Pi is one of the more popular applications, enabling single-board computers to make robotics, devices, and appliances part of the Internet of Things (IoT). The low cost and customizability of Raspberry Pi makes it easily adopted and widespread. Unfortunately, the unprotected Raspberry Pi device—when connected to the Internet—also paves the way for cyber-attacks. Our ability to investigate, collect, and validate digital forensic evidence with confidence using Raspberry Pi has become important. This article discusses and presents techniqu
APA, Harvard, Vancouver, ISO, and other styles
9

Premanand Narasimhan and Dr. N. Kala. "Emerging Trends in Digital Forensics : Investigating Cybercrime." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3645–52. https://doi.org/10.32628/cseit251451.

Full text
Abstract:
Digital forensics is a rapidly evolving field that plays a critical role in investigating cybercrime, data breaches, and illicit activities across various domains, including blockchain, cryptocurrency, and the dark web. This paper explores key areas of digital forensics, including computer forensics, mobile forensics, network forensics, cloud forensics, IoT forensics, and embedded system forensics. Emerging trends such as drone and satellite forensics highlight the increasing scope of forensic investigations beyond traditional computing environments. Additionally, the study delves into blockch
APA, Harvard, Vancouver, ISO, and other styles
10

Raman, Jayakrishnan Anilakkad, and Vasanthi Varadharajan. "HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics." Ingénierie des systèmes d information 26, no. 3 (2021): 319–27. http://dx.doi.org/10.18280/isi.260309.

Full text
Abstract:
With the pervasive usage of sensing systems and IoT things, the importance of security has increased. Attempts towards breaching IoT security systems by attackers are on upsurge. Many intrusions in embedded systems, sensing equipment and IoT things have occurred in the past. Though there are cyber security tools like Antivirus, Intrusion detection and prevention systems available for securing the digital devices and its networks. However, a forensic methodology to be followed for the analysis and investigation to detect origin cause of network incidents is lacking. This paper derives a compreh
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "IoT Cyber Forensics"

1

Lu, Andy. "Forensic analysis on wireless medical devices." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2541.

Full text
Abstract:
The number of Internet of Things (IoT) devices is forecast to grow to over 25 billion by 2030, with the healthcare IoT market projected to grow to 25.9% of IoT devices by 2028 worldwide. However, with new and growing technologies come new types of risks. Current risk assessment and risk management methods haven’t been designed to anticipate or predict these risks. IoT risks relate to openness and lack of standardisation, linking and connectivity between the devices and the lack of skilled support for IoT devices and networks. These factors put medical IoT devices and, by extension, their users
APA, Harvard, Vancouver, ISO, and other styles
2

(11205891), Tanvi Milind Gandhi. "Forensic Analysis of GroupMe on Android and iOS Smartphones." Thesis, 2021.

Find full text
Abstract:
The growing popularity of instant messaging has led to the conception of several new applications over the span of the past decade. This has opened up an attack surface for cybercriminals to target susceptible app users. GroupMe is a free IM app widely used by students and so far, no comprehensive forensic analysis has been performed to aid forensic practitioners in recovering evidence from GroupMe on smartphones. This research performs a detailed analysis of the digital artifacts left by the app on Android and iOS devices. This was achieved by installing the app on two mobile phones (Samsung
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "IoT Cyber Forensics"

1

Buchanan, Ben. The Defender’s View. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0004.

Full text
Abstract:
This chapter examines defensive cyber operations in a fashion similar to kill chain analysis. It presents an outline of how baseline network defense is done, and what technologies and techniques contribute to that mission. This includes memory forensics, penetration testing, and incident response. It shows as well how those efforts are likely to be insufficient, and how advanced states have an incentive to go further and intrude into other states’ networks for defensive reasons—operations that are sometimes called counter-computer network exploitation. It is these intrusions, which are genuine
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "IoT Cyber Forensics"

1

Wilds, Patrick. "IoT and the role of cyber forensics1." In Cyber Forensics. CRC Press, 2021. http://dx.doi.org/10.1201/9781003057888-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Garg, Ankit, and Anuj Kumar Singh. "Internet of Things (IoT): Security, Cybercrimes, and Digital Forensics." In Internet of Things and Cyber Physical Systems. CRC Press, 2022. http://dx.doi.org/10.1201/9781003283003-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Friedl, Sabrina, Magdalena Glas, Ludwig Englbrecht, Fabian Böhm, and Günther Pernul. "ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics." In IFIP Advances in Information and Communication Technology. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08172-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mani, Jangam J. S., and Sandhya Rani Kasireddy. "Population Classification upon Dietary Data Using Machine Learning Techniques with IoT and Big Data." In Social Network Forensics, Cyber Security, and Machine Learning. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1456-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Akinsola, J. E. T., F. O. Onipede, S. O. Osonuga, et al. "Network Vulnerability Analysis for Internet of Things (IoT)-based Cyber Physical Systems (CPS) Using Digital Forensics." In Internet of Things and Cyber Physical Systems. CRC Press, 2022. http://dx.doi.org/10.1201/9781003283003-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maria Jones, G., S. Godfrey Winster, and S. V. N. Santhosh Kumar. "Analysis of Mobile Environment for Ensuring Cyber-Security in IoT-Based Digital Forensics." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-3600-3_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rathnayake, Deepashika J., and Malka Halgamuge. "Computation Time Estimation of Switches and Controllers Process on 6G-Based SDN-Cyber Security Forensics Architecture in the Blockchain-Based IoT Environment." In Blockchain Technologies. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2868-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Montasari, Reza, Fiona Carroll, Stuart Macdonald, Hamid Jahankhani, Amin Hosseinian-Far, and Alireza Daneshkhah. "Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence." In Digital Forensic Investigation of Internet of Things (IoT) Devices. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60425-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Basharat, Mahmoud. "Machine Learning in IoT and Mobile Device Forensics." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-0857-9.ch005.

Full text
Abstract:
The increasing integration of the Internet of Things (IoT) and mobile devices in everyday life has led to significant advancements in the field of digital forensics. However, the complexity and volume of data generated by these devices pose challenges for traditional forensic methods. Machine learning (ML) has emerged as a powerful tool to address these challenges by enabling the automation of data analysis, anomaly detection, and pattern recognition in IoT and mobile device forensics. This chapter explores the role of machine learning in enhancing forensic investigations, with a focus on its
APA, Harvard, Vancouver, ISO, and other styles
10

Kirmani, Mariya Shafat, and Mohammad Tariq Banday. "Digital Forensics in the Context of the Internet of Things." In Cyber Warfare and Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch069.

Full text
Abstract:
The pervasive nature of IoT, envisioned with the characteristics of diversity, heterogeneity, and complexity, is diluting the boundaries between the physical and digital worlds. IoT being widely distributed qualifies it as the breeding ground for cyber-attacks. Although remarkable work is being done to ensure security in IoT infrastructure, security vulnerabilities persist. The IoT infrastructure can either be used as a direct target in a cyber-attack or exploited as a tool to carry a cyber-attack. In either case, the security measures in IoT infrastructure is compromised. The enormous IoT dat
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IoT Cyber Forensics"

1

Luthfi, Ahmad. "Keynote Speakers: Digital Forensics in IoT Environment." In 2024 1st International Conference on Cyber Security and Computing (CyberComp). IEEE, 2024. https://doi.org/10.1109/cybercomp60759.2024.10913693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bhardwaj, Anant, and S. K. Choudhary. "AI Based Decision Support System for Cyber Forensics Investigations." In 2024 IEEE 4th International Conference on ICT in Business Industry & Government (ICTBIG). IEEE, 2024. https://doi.org/10.1109/ictbig64922.2024.10911602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Harding, Soraya, and Mo Adda. "Multi-Blockchain Model for IoT Devices Forensic Investigations on Spidernet." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Becker, Elena, Maanak Gupta, and Feras M. Awaysheh. "Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics Enhancements." In 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). IEEE, 2023. http://dx.doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sushil, Gaikwad Sarita, Rajesh K. Deshmuk, and Aparna A. Junnarkar. "Security Challenges and Cyber Forensics For IoT Driven BYOD Systems." In 2022 IEEE 7th International conference for Convergence in Technology (I2CT). IEEE, 2022. http://dx.doi.org/10.1109/i2ct54291.2022.9824368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dragonas, Evangelos, Costas Lambrinoudakis, and Michael Kotsis. "IoT Forensics: Investigating the Mobile App of Dahua Technology." In 2023 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2023. http://dx.doi.org/10.1109/csr57506.2023.10224982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brotsis, Sotirios, and Nicholas Kolokotronis. "Blockchain-Enabled Digital Forensics for the IoT: Challenges, Features, and Current Frameworks." In 2022 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2022. http://dx.doi.org/10.1109/csr54599.2022.9850327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dragonas, Evangelos, and Costas Lambrinoudakis. "IoT Forensics: Analysis of Ajax Systems' mobile app for the end user." In 2023 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2023. http://dx.doi.org/10.1109/csr57506.2023.10224992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Felix, Michael, Cutifa Safitri, and Rila Mandala. "Framework for Analyzing Intruder Behavior of IoT Cyber Attacks Based on Network Forensics by Deploying Honeypot Technology." In 2022 5th International Conference on Information and Communications Technology (ICOIACT). IEEE, 2022. http://dx.doi.org/10.1109/icoiact55506.2022.9971886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Salih, Karam Muhammed Mahdi, and Najla Badi Ibrahim. "Enhancing IoT Forensics through Deep Learning: Investigating Cyber-Attacks and Analyzing Big Data for Improved Security Measures." In 2023 4th International Conference on Big Data Analytics and Practices (IBDAP). IEEE, 2023. http://dx.doi.org/10.1109/ibdap58581.2023.10271950.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IoT Cyber Forensics"

1

Naif Arab University for Security Sciences, Centre of Excellence in Cybercrimes and Digital Forensics. Cyber-enabled Terrorism in the African and Arab Regions: Survey Report from NAUSS-UNCCT Workshop. Naif University Press, 2024. http://dx.doi.org/10.26735/iwjx5145.

Full text
Abstract:
The seventh review of the United Nations Global Counter-Terrorism Strategy (A/RES/75/291) underscored Member States' deep concern regarding the use of the Internet and other technologies for terrorist activities. Emphasizing collaboration among academia, the private sector, and civil society, the resolution sought to prevent terrorists from finding safe haven online while promoting an open, secure, and innovative Internet. In alignment with these principles, the Centre of Excellence in Cybercrimes and Digital Forensics (CoECDF) at Naif Arab University for Security Sciences (NAUSS) and UNOCT's
APA, Harvard, Vancouver, ISO, and other styles
2

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
3

Almorjan, Dr Abdulrazaq, Dr Kyounggon Kim, and Ms Norah Alilwit. NAUSS Ransomware Trends Report in Arab Countries 2020-2022. Naif University Press, 2024. http://dx.doi.org/10.26735/orro4624.

Full text
Abstract:
Threat actors, including infamous cybercrime groups and financially driven ransomware gangs, have focused on Arab countries› businesses and organizations as they grow and move toward digital transformation. In particular, ransomware is a very serious type of cyber-attack worldwide, and many organizations are severely affected by it. INTERPOL indicates that the ransomware gangs are targeting different regions such as Africa, Americas, Caribbean, Asia-Pacific, Europe, Middle East, and North Africa 1. The Center of Excellence in Cybercrime and Digital Forensics (CoECDF) at NAUSS has conducted a d
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!