To see the other types of publications on this topic, follow the link: IoT Cyber Forensics.

Journal articles on the topic 'IoT Cyber Forensics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IoT Cyber Forensics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sawarkar, Ankush D., and Anjali Deepak Hazar. "IoT Forensic Cyber Activities Detection and Prevention with Automated Machine Learning Model." Journal of Sensors, IoT & Health Sciences 2, no. 2 (2024): 1–15. http://dx.doi.org/10.69996/jsihs.2024006.

Full text
Abstract:
The Internet of Things (IoT) has been deployed in a vast range of applications with exponential increases in data size and complexity. Existing forensic techniques are not effective for the accuracy and detection rate of security issues in IoT forensics. Cyber forensic comprises huge volume constraints that are processing huge volumes of data in the Information and Communication Technology (ICT) comprised of IoT devices and platforms. Trust blockchain is effective technology those are utilized to assess the tamper-proof records in all transaction in the IoT environment. With the implementation
APA, Harvard, Vancouver, ISO, and other styles
2

Kwaku, Timothy. "Internet of Things (IoT) & Underwater Network Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 291–300. http://dx.doi.org/10.22624/aims/crp-bk3-p47.

Full text
Abstract:
The proliferation of IoT devices and technology in recent years cannot be overstated. With the diverse area of application, IoT devices will be prone to unscrupulous attacks. Applying digital forensics in this field makes it a multi-faceted area that necessarily implies a lot of challenges out to be addressed in order to ensure compatibility. This research extensively considers existing literature with the view of highlighting the application areas of IoT, underwater networks and digital areas as well the research challenges that needs attention in order to realize a robust IoT and underwater
APA, Harvard, Vancouver, ISO, and other styles
3

Omer Aziz, M. Abdullah Siraj, and Abdul Rehman. "Privacy challenges in cyber security against cybercrime in digital forensic. A systematic literature review in Pakistan." Journal of Computing & Biomedical Informatics 2, no. 02 (2021): 158–64. http://dx.doi.org/10.56979/202/2021/31.

Full text
Abstract:
Cybercrime is a criminal activity that either target or uses a computer network or a network device. IOT become the biggest domain in these days.it is difficult to adopt digital forensics tools in IoT but somehow digital forensics play an important role in cyber security of IoT. Privacy and security challenges are increased day by day in digital forensics. Cybercrime in cyber security is increased day by day in digital forensics. Privacy and security are relate with each other but difference is that privacy relate to any right you have to control your personal information and how it’s used. Lo
APA, Harvard, Vancouver, ISO, and other styles
4

Odame, Frederick Asumang. "Privacy Preserving Internet of Things (IoT) Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 109–12. http://dx.doi.org/10.22624/aims/crp-bk3-p18.

Full text
Abstract:
The Internet of Things (IoT) envisions a network of pervasive, connected, and intelligent nodes that interact autonomously and provide a variety of services. IoT objects were a perfect target for cyber assaults because of their wide dispersion, openness, and relatively high processing power. Furthermore, because many IoT nodes collect and process personal or private data, they are becoming a goldmine of information for cybercriminals. As a result, security, particularly the ability to detect compromised nodes, as well as the collection and preservation of evidence of an attack or malicious act
APA, Harvard, Vancouver, ISO, and other styles
5

Nurettin Selcuk SENOL and Amar Rasheed. "Forensic Insights into SenseCAP: A Comprehensive Examination of Technical and LoRa Connectivity Dimensions." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 595–604. https://doi.org/10.34190/iccws.20.1.3217.

Full text
Abstract:
The rapid expansion of Internet of Things (IoT) devices has reshaped various sectors by improving connectivity, efficiency, and convenience. Central to this transformation are LoRa (Long Range) and LoRaWAN (Long Range Wide Area Network) technologies, which provide reliable, low-power, long-range communication critical for IoT applications. As these systems evolve, examining security vulnerabilities and forensic challenges becomes increasingly essential. This paper explores digital forensics within IoT environments, focusing on the methodologies and tools required to secure and maintain the int
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Kyounggon, Istabraq Mohammed Alshenaifi, Sundaresan Ramachandran, Jisu Kim, Tanveer Zia, and Abdulrazaq Almorjan. "Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey." Sensors 23, no. 7 (2023): 3681. http://dx.doi.org/10.3390/s23073681.

Full text
Abstract:
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart cities, various network technologies, such as the Internet and IoT, are combined to exchange real-time information, making the everyday lives of their residents more convenient. However, there is a lack of systematic research on cybersecurity and cyber forensics in smart cities. This paper presents a comprehensive review and survey of cybersecurity and cyber forensics for smart cities. We analysed 154 papers t
APA, Harvard, Vancouver, ISO, and other styles
7

Brown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.

Full text
Abstract:
Digital Forensics investigation is the science and legal process of investigating computer/cybercrimes and digital media or objects to gather evidence. This new and fast evolving field encompasses computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics; and for this reason have digital evidence distributed widely when the need arises for crime prosecution. Digital evidence must be authentic, accurate, complete, and convincing to the jury for legal admissibility at the court of law. In many instances due to the distributed nature of digital forensic
APA, Harvard, Vancouver, ISO, and other styles
8

Ho, Shuyuan Mary, and Mike Burmester. "Cyber Forensics on Internet of Things: Slicing and Dicing Raspberry Pi." International Journal of Cyber Forensics and Advanced Threat Investigations 2, no. 1 (2021): 29–49. http://dx.doi.org/10.46386/ijcfati.v2i1.22.

Full text
Abstract:
Any device can now connect to the Internet, and Raspberry Pi is one of the more popular applications, enabling single-board computers to make robotics, devices, and appliances part of the Internet of Things (IoT). The low cost and customizability of Raspberry Pi makes it easily adopted and widespread. Unfortunately, the unprotected Raspberry Pi device—when connected to the Internet—also paves the way for cyber-attacks. Our ability to investigate, collect, and validate digital forensic evidence with confidence using Raspberry Pi has become important. This article discusses and presents techniqu
APA, Harvard, Vancouver, ISO, and other styles
9

Premanand Narasimhan and Dr. N. Kala. "Emerging Trends in Digital Forensics : Investigating Cybercrime." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3645–52. https://doi.org/10.32628/cseit251451.

Full text
Abstract:
Digital forensics is a rapidly evolving field that plays a critical role in investigating cybercrime, data breaches, and illicit activities across various domains, including blockchain, cryptocurrency, and the dark web. This paper explores key areas of digital forensics, including computer forensics, mobile forensics, network forensics, cloud forensics, IoT forensics, and embedded system forensics. Emerging trends such as drone and satellite forensics highlight the increasing scope of forensic investigations beyond traditional computing environments. Additionally, the study delves into blockch
APA, Harvard, Vancouver, ISO, and other styles
10

Raman, Jayakrishnan Anilakkad, and Vasanthi Varadharajan. "HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics." Ingénierie des systèmes d information 26, no. 3 (2021): 319–27. http://dx.doi.org/10.18280/isi.260309.

Full text
Abstract:
With the pervasive usage of sensing systems and IoT things, the importance of security has increased. Attempts towards breaching IoT security systems by attackers are on upsurge. Many intrusions in embedded systems, sensing equipment and IoT things have occurred in the past. Though there are cyber security tools like Antivirus, Intrusion detection and prevention systems available for securing the digital devices and its networks. However, a forensic methodology to be followed for the analysis and investigation to detect origin cause of network incidents is lacking. This paper derives a compreh
APA, Harvard, Vancouver, ISO, and other styles
11

Santos, Ricardo Serras. "Digital Forensics on trending technologies: A systematic literature review." ARIS2 - Advanced Research on Information Systems Security 4, no. 2 (2024): 4–15. https://doi.org/10.56394/aris2.v4i2.40.

Full text
Abstract:
Currently enterprises tend to approach Cyber-Security using a prevent/mitigate approach. However, when an attack happens it is of extreme importance to do extensive digital forensic investigation. This investigation will allow to know exactly, where, how and what went wrong. Moreover, digital forensics face difficult challenges such as, the evolution of technology (Cloud Computing, Internet of Things (IoT), etc.) and the ingenuity of attackers that always encounter new ideas to achieve their objectives. Thus, this work’s main goal is to do a systematic literature review of publicly available a
APA, Harvard, Vancouver, ISO, and other styles
12

Wu, Chao, Yuan'an Liu, Fan Wu, et al. "A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources." International Journal of Digital Crime and Forensics 12, no. 1 (2020): 109–30. http://dx.doi.org/10.4018/ijdcf.2020010106.

Full text
Abstract:
Network security and network forensics technologies for the Internet of Things (IoT) need special consideration due to resource-constraints. Cybercrimes conducted in IoT focus on network information and energy sources. Graph theory is adopted to analyze the IoT network and a hybrid Intrusion Detection System (IDS) is proposed. The hybrid IDS consists of Centralized and Active Malicious Node Detection (CAMD) and Distributed and Passive EEA (Energy Exhaustion Attack) Resistance (DPER). CAMD is integrated in the genetic algorithm-based data gathering scheme. CAMD detects malicious nodes manipulat
APA, Harvard, Vancouver, ISO, and other styles
13

Dr., Suman Thapaliya. "IOT Cyber Forensics: Leveraging Big Data Analytics and Deep Learning-Based Feature Fusion." International Journal of Multidisciplinary and Innovative Research 01, no. 02 (2024): 58–62. https://doi.org/10.5281/zenodo.14326145.

Full text
Abstract:
The rapid proliferation of Internet of Things (IoT) devices has expanded the digital ecosystem, offering unprecedented connectivity while simultaneously increasing vulnerability to cyber threats. Investigating cybercrimes in IoT environments is challenging due to the heterogeneous nature of devices, the massive volume of data generated, and the complexity of attack vectors. This paper introduces a novel forensic investigation framework that integrates big data analytics and deep learning-based feature fusion to address these challenges. The framework processes multi-modal IoT data, leveraging
APA, Harvard, Vancouver, ISO, and other styles
14

Ohipeni, Edwin Angmor Kofi. "5G Cellular Network Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 181–84. http://dx.doi.org/10.22624/aims/crp-bk3-p29.

Full text
Abstract:
The fifth generation (5G) of cellular networks will bring 10Gbps user speeds, have a wider bandwidth which can accommodate 1000 times what the fourth generation (4G) could and 100 times faster than the previous 4G cellular network. This paper’s focus is to highlight on the legal aspects of the 5G cellular network. That is, the health issues, privacy, and security issues on Africans. Most crimes currently are facilitated by cellular network devices and with the improvement that the 5G cellular network brings, there is going to be an increase in cybercrime and hence the need for forensics. These
APA, Harvard, Vancouver, ISO, and other styles
15

Dr., Suman Thapaliya, and Saroj Ghimire Er. "Optimized Deep Neuro-Fuzzy Networks for Enhanced Cyber Forensic Analysis in Iot-Driven Big Data Ecosystems." International Journal of Multidisciplinary and Innovative Research 01, no. 02 (2024): 88–92. https://doi.org/10.5281/zenodo.14561061.

Full text
Abstract:
The rapid expansion of Internet of Things (IoT) ecosystems has significantly increased the complexity and scale of cyber forensic investigations, necessitating innovative and efficient analytical methods. This study proposes an Optimized Deep Neuro-Fuzzy Network (DNFN) framework designed to enhance forensic capabilities in IoT-driven big data environments. The framework synergizes the feature extraction strengths of deep learning with the interpretative advantages of fuzzy logic, while employing optimization algorithms to fine-tune its parameters for improved performance. The DNFN framework ad
APA, Harvard, Vancouver, ISO, and other styles
16

Konika Abid. "Adaptive Random Mac Strategy for IoT Security Through Network Forensics Investigation." Journal of Electrical Systems 20, no. 7s (2024): 1740–48. http://dx.doi.org/10.52783/jes.3774.

Full text
Abstract:
In the rapidly evolving landscape of digital systems and networks, ensuring robust cyber security measures is of paramount importance. This study delves into the evaluation of a proposed security method's efficiency through a comprehensive comparative analysis conducted under diverse security breach simulations. The objective is to discern the method's effectiveness in safeguarding sensitive information and maintaining system integrity.The research methodology involves the selection of representative security breach scenarios, each emulating distinct attack vectors and potential vulnerabilitie
APA, Harvard, Vancouver, ISO, and other styles
17

Malik, Basit Ahmad. "Provocations Open Problems Encountered By Digital Forensics Ensuing Trends in Near Future." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 879–83. https://doi.org/10.31142/ijtsrd16955.

Full text
Abstract:
There has been a substantial and extensive use of Internet and technology in present day life which relatively has made the digital devices apropos to criminal investigations or legal prosecutions. Investigating huge amount of digital evidence consisting of data in various formats requires a digital forensic analysis or cyber forensics . As the number of cases keeps on growing continuously, it is expected that the digital forensic analysis will increase significantly in near future. The forensic process involves the examination of digital devices which include computers, cell phones, devices s
APA, Harvard, Vancouver, ISO, and other styles
18

Alhashmi, Noora, Bashaer Aljneibi, Mahra Alameri, Richard Ikuesan, and Farkhund Iqbal. "Forensic Examinations of Alexa for Smart Home Privacy and Cybercrime Investigation." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 8–17. https://doi.org/10.34190/iccws.20.1.3390.

Full text
Abstract:
Integrating Internet of Things (IoT) devices into smart homes has necessitated the development of novel strategies to address the difficulties and complexities of cyber-attacks and privacy concerns in the current digital threat landscape. One unaddressed challenge is the lack of clarity of information collected and stored by these IoT devices in smart homes. The data storage process and privacy compliance of smart home appliances, such as security cameras, thermostats, and smart speakers, are examined in this study. More specifically, this study focuses on sensitive data storage and potential
APA, Harvard, Vancouver, ISO, and other styles
19

Rathor, Shehkar. "<b>Navigating the Digital Frontier: A Review of Emerging Technologies in Digital Forensics</b>." Journal of AI Analytics and Applications 3, no. 1 (2025): 1–18. https://doi.org/10.63646/mnsl4047.

Full text
Abstract:
In today's hyperconnected world, where digital footprints are ubiquitous and cyber threats are on the rise, digital forensics has become a critical discipline. This review paper illustrates the ever-evolving landscape of emerging technologies in digital forensics. It provides a comprehensive overview of the latest advancements, methodologies, and challenges in the field, highlighting the critical role that technology plays in modern investigations. This review explores how these innovations are reshaping the practice of digital forensics. The technologies include: blockchain, AI, IoT, cloud co
APA, Harvard, Vancouver, ISO, and other styles
20

Chhabra, Gurpal Singh, Varinder Pal Singh, and Maninder Singh. "Cyber forensics framework for big data analytics in IoT environment using machine learning." Multimedia Tools and Applications 79, no. 23-24 (2018): 15881–900. http://dx.doi.org/10.1007/s11042-018-6338-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Shin, Jiho. "Memory-Driven Forensic Analysis of SQL Server: A Buffer Pool and Page Inspection Approach." Sensors 25, no. 11 (2025): 3512. https://doi.org/10.3390/s25113512.

Full text
Abstract:
This study proposes a memory-based forensic procedure for real-time recovery of deleted data in Microsoft SQL Server environments. This approach is particularly relevant for sensor-driven and embedded systems—such as those used in IoT gateways and edge computing platforms—where lightweight SQL engines store critical operational and measurement data locally and are vulnerable to insider manipulation. Traditional approaches to deleted data recovery have primarily relied on transaction log analysis or static methods involving the examination of physical files such as .mdf and .ldf after taking th
APA, Harvard, Vancouver, ISO, and other styles
22

Gupta, Saksham, and Aditya Sharma. "CyberWatch: Deep Learning-Driven Network Intrusion Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem28322.

Full text
Abstract:
Abstract—The present era is being dominated by the digital world which has also given rise to growing cyber threats and crimes, the project introduces an innovative intrusion detection system(IDS) that deploys deep learning’s pattern recognition capabilities with a real-time algorithm approach to threats and network security. The project’s framework involves two key components: Graph theory and Artificial Neural Network (ANN). The graph theory is used to represent the IoT network structure which helps represent relations between network structures and analyze the anomalies or malicious activit
APA, Harvard, Vancouver, ISO, and other styles
23

Drosatos, George, Konstantinos Rantos, and Konstantinos Demertzis. "Advanced Technologies in Data and Information Security." Applied Sciences 12, no. 12 (2022): 5925. https://doi.org/10.3390/app12125925.

Full text
Abstract:
The protection of personal data and privacy is a timeless challenge which has intensified in the modern era. The&nbsp;digitisation that has been achieved in recent decades has radically changed the way we live, communicate and work, revealing various security and privacy issues. Specifically, the&nbsp;explosion of new technologies and the continuous developments of technologies, such as the Internet of Things (IoT) and Artificial Intelligence (AI), have led to the increased value of data, while it has raised demand and introduced new ways to obtain it. Techniques such as data analysis and proc
APA, Harvard, Vancouver, ISO, and other styles
24

Song, Jin-young, and Dea-woo Park. "Preemptive Cyber Response Strategy and IoT Forensic Evidence." International Journal of Advanced Science and Technology 117 (August 31, 2018): 129–38. http://dx.doi.org/10.14257/ijast.2018.117.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Rizal, Randi, Siti Rahayu Selamat, Mohd Zaki Mas’ud, and Nur Widiyasono. "Enhanced Readiness Forensic Framework for the Complexity of Internet of Things (IoT) Investigation Based on Artificial Intelligence." Journal of Advanced Research in Applied Sciences and Engineering Technology 50, no. 1 (2024): 121–35. http://dx.doi.org/10.37934/araset.50.1.121135.

Full text
Abstract:
The growing versatility of Internet of Things devices increases the possibility of multiple attacks occurring and being carried out continuously. The limited processing capabilities and memory capacity of Internet of Things devices pose challenges for security and forensic analysis in collecting and documenting various attacks targeting these devices during the forensic investigation process. Thus, forensic investigative analysis goes beyond expectations, offering a holistic understanding of the complex consequences arising from IoT device attacks that have occurred. These issues and challenge
APA, Harvard, Vancouver, ISO, and other styles
26

Castelo Gómez, Juan Manuel, José Roldán Gómez, José Luis Martínez Martínez, and Álvaro del Amo Mínguez. "Forensic Analysis of the IoT Operating System Ubuntu Core." Journal of Physics: Conference Series 2224, no. 1 (2022): 012082. http://dx.doi.org/10.1088/1742-6596/2224/1/012082.

Full text
Abstract:
Abstract The number of cyber incidents in which an Internet of Things (IoT) device or system is present is increasing every day, requiring the opening of forensic investigations that can shed light on what has occurred. In order to be able to provide investigators with proper solutions for performing complete and efficient examinations in this new environment, IoT systems and devices are being studied from a forensic perspective so that tools and procedures can be designed accordingly. In this article, the IoT version of one of the most used Linux distributions, namely Ubuntu, is studied to de
APA, Harvard, Vancouver, ISO, and other styles
27

Elsayed, Asmaa, and Bilal Arain. "Intervention of Innovative Technologies for Eradicating Tampering in Digital Forensics: Practicing Intelligent Decision Methodologies." Multicriteria Algorithms with Applications 4 (June 30, 2024): 53–68. http://dx.doi.org/10.61356/j.mawa.2024.4322.

Full text
Abstract:
The Industrial Internet of Things (IIoT) is one of the popular technologies of Industry 4.0. This technology involves of advanced equipment such as sensors, machines, and analytics platforms in industrial settings. The utilized equipment has been harnessed to improve efficiency, productivity, and safety. IIoT forensics is a specialized field of digital forensics that deals with the investigation of IIoT devices. In terms of digital forensics, there are several open challenges, including the need for more effective data acquisition techniques, the need for better tools and techniques for analyz
APA, Harvard, Vancouver, ISO, and other styles
28

Ali, Md Iman, Sukhkirandeep Kaur, Aditya Khamparia, et al. "Security Challenges and Cyber Forensic Ecosystem in IoT Driven BYOD Environment." IEEE Access 8 (2020): 172770–82. http://dx.doi.org/10.1109/access.2020.3024784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Dasmen, Rahmat Novrianda, and Ferry Kurniawan. "Digital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media SosialDigital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media Sosial." Techno.Com 20, no. 4 (2021): 527–39. http://dx.doi.org/10.33633/tc.v20i4.5170.

Full text
Abstract:
Cyber crime merupakan tindak kejahatan yang terjadi di dunia maya, yang mana salah satu cyber crime paling marak terjadi adalah cyberbullying pada remaja. Adapun dari hasil survei diperoleh bahwa terdapat 2 pesan instan dari media sosial yang paling sering digunakan, yaitu Facebook Messenger dan Whatsapp. Oleh sebab itu, cyber crime juga kemungkinan besar terjadi pada kedua pesan instan tersebut karena penggunanya sangat dominan. Melihat perkembangan IoT yang mempengaruhi setiap kegiatan melalui komunikasi di dunia maya, maka bukti digital dari pesan instan di media sosial saat ini telah menja
APA, Harvard, Vancouver, ISO, and other styles
30

Thapaliya, Suman, and Pawan Kumar Sharma. "Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures." International Journal of Information Security and Privacy 17, no. 1 (2023): 1–22. http://dx.doi.org/10.4018/ijisp.315819.

Full text
Abstract:
Forensic skills analysts play an imperative support to practice streaming data generated from the IoT networks. However, these sources pose size limitations that create traffic and increase big data assessment. The obtainable solutions have utilized cybercrime detection techniques based on regular pattern deviation. Here, a generalized model is devised considering the MapReduce as a backbone for detecting the cybercrime. The objective of this model is to present an automatic model, which using the misbehavior in IoT device can be manifested, and as a result the attacks exploiting the susceptib
APA, Harvard, Vancouver, ISO, and other styles
31

Jeong, Doowon, Jungheum Park, Sangjin Lee, and Chulhoon Kang. "Investigation Methodology of a Virtual Desktop Infrastructure for IoT." Journal of Applied Mathematics 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/689870.

Full text
Abstract:
Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI) for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual
APA, Harvard, Vancouver, ISO, and other styles
32

Hossain, Mahmud, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor, and S. M. Riazul Islam. "A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives." Future Internet 16, no. 2 (2024): 40. http://dx.doi.org/10.3390/fi16020040.

Full text
Abstract:
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as enablers for committing a variety of crime and e-crime. Despite ongoing research and study, there remains a significant gap in the thorough analysis of security challenges, feasible solutions, and open secure problems for IoT. To bridge this gap, we provide a comprehensive overview of the state of the art in IoT security with a critical investig
APA, Harvard, Vancouver, ISO, and other styles
33

Yankson, Benjamin, Tyler Loucks, Andrea Sampson, and Chelsea Lojano. "Robots Security Assessment and Analysis Using Open-Source Tools." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 449–56. http://dx.doi.org/10.34190/iccws.18.1.1019.

Full text
Abstract:
The Internet of things (IoT) has revolutionized many aspects of the world, including industrial systems, automobiles, home automation, and surveillance, to name a few. IoT has offered a multitude of conveniences for our daily lives, such as being able to control our thermostats remotely, view our home surveillance cameras while away, or have a smart television that can surf the web. However, the widespread adoption of IoT devices combined with their vast device vulnerabilities results in significant security risks reinforcing the need for more robust default security controls and public awaren
APA, Harvard, Vancouver, ISO, and other styles
34

Raji, Adereti Rasak, Adenomon M. O, Gilbert I. O. Aimufua, and Steven I. Bassey. "A Framework for IOC-Driven Early Warning Threat Intelligence." Kwaghe International Journal of Sciences and Technology 2, no. 2 (2025): 242–57. https://doi.org/10.58578/kijst.v2i2.6458.

Full text
Abstract:
The increasing sophistication of cyber threats necessitates a strategic transition from reactive defenses to proactive threat mitigation. Although Indicators of Compromise (IoCs) serve as essential forensic artifacts in post-incident analysis, their potential for early threat detection remains underutilized due to issues such as data overload, insufficient contextualization, and rapid obsolescence. This study proposes the IoC-Driven Early Warning (IDEW) framework to address these limitations. The IDEW framework introduces a structured, multi-stage approach that includes multi-source data aggre
APA, Harvard, Vancouver, ISO, and other styles
35

Hsu, Chien-Lung, Wei-Xin Chen, and Tuan-Vinh Le. "An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things." Sensors 20, no. 22 (2020): 6471. http://dx.doi.org/10.3390/s20226471.

Full text
Abstract:
As the Internet of Things (IoT) has become prevalent, a massive number of logs produced by IoT devices are transmitted and processed every day. The logs should contain important contents and private information. Moreover, these logs may be used as evidences for forensic investigations when cyber security incidents occur. However, evidence legality and internal security issues in existing works were not properly addressed. This paper proposes an autonomous log storage management protocol with blockchain mechanism and access control for the IoT. Autonomous model allows sensors to encrypt their l
APA, Harvard, Vancouver, ISO, and other styles
36

Ahmadi-Assalemi, Gabriela, Haider Al-Khateeb, Gregory Epiphaniou, and Carsten Maple. "Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review." Smart Cities 3, no. 3 (2020): 894–927. http://dx.doi.org/10.3390/smartcities3030046.

Full text
Abstract:
The world is experiencing a rapid growth of smart cities accelerated by Industry 4.0, including the Internet of Things (IoT), and enhanced by the application of emerging innovative technologies which in turn create highly fragile and complex cyber–physical–natural ecosystems. This paper systematically identifies peer-reviewed literature and explicitly investigates empirical primary studies that address cyber resilience and digital forensic incident response (DFIR) aspects of cyber–physical systems (CPSs) in smart cities. Our findings show that CPSs addressing cyber resilience and support for m
APA, Harvard, Vancouver, ISO, and other styles
37

Djenna, Amir, Ezedin Barka, Achouak Benchikh, and Karima Khadir. "Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics." Sensors 23, no. 14 (2023): 6302. http://dx.doi.org/10.3390/s23146302.

Full text
Abstract:
Cybercriminals are becoming increasingly intelligent and aggressive, making them more adept at covering their tracks, and the global epidemic of cybercrime necessitates significant efforts to enhance cybersecurity in a realistic way. The COVID-19 pandemic has accelerated the cybercrime threat landscape. Cybercrime has a significant impact on the gross domestic product (GDP) of every targeted country. It encompasses a broad spectrum of offenses committed online, including hacking; sensitive information theft; phishing; online fraud; modern malware distribution; cyberbullying; cyber espionage; a
APA, Harvard, Vancouver, ISO, and other styles
38

P., Rajashekhar, Thrinay Chowdary Y., and Haque Choudhury Ziaul. "Intrusion Detection for Internet of Things." International Journal of Innovative Science and Research Technology 7, no. 6 (2022): 702–6. https://doi.org/10.5281/zenodo.6804867.

Full text
Abstract:
In military systems, the Internet of Things (IoT) usually consists of many Internet-connected devices and terminals. Cyber thieves, particularly state backing or national state actors, are the major targets. Vector malware is a typical attack. We provide a detailed explanation in this article. The Internet of Things (IoT) is a means for turning into use the device&#39;s operational code (Opcode) sequencing, you may turn the Internet into a malevolent web. To convert Opcodes to vector space and identify dangerous and malicious stuff applications, we employ a deep learning approach. We demonstra
APA, Harvard, Vancouver, ISO, and other styles
39

Kosiński, Jerzy, Tomasz Gontarz, and Robert Kośla. "Cybersecurity and the Handling of Cyber Incidents." Internal Security 10, no. 2 (2019): 107–28. http://dx.doi.org/10.5604/01.3001.0013.4219.

Full text
Abstract:
The article presents interpretations of the concepts of cybersecurity and cybercrime as well as the abuse of the term cybernetic. The author refers to information as a new “centre of gravity” of the nation’s power and special attention is paid to activities aimed at ensuring a high level of information security in Poland. The assumptions of the draft Act on the national cybersecurity system are described and particular emphasis is placed on the issues of technical and organisational reporting and the handling of ICT security incidents. The author points out that handling incidents violating cy
APA, Harvard, Vancouver, ISO, and other styles
40

Olowu, Kemi, and P. Gabasa. "Financial Crime, ICT & E-Governance: Libraries Role." Advances in Social Sciences Research Journal 7, no. 1 (2020): 609–12. http://dx.doi.org/10.14738/assrj.71.7476.

Full text
Abstract:
Love of money is the root of all evil (I Tim. 6:10) More than thirty financial crime are listed in this work making it like a spaghetti bowl. The list is inexhaustive with aid of ICT which is simply “putting old wine in new bottles” Elements of financial crime, consequences of these on the society and leeway for escape from justice in this climate are listed. From clumsy adjudication, corruption in judiciary, in availability of experts ,nonexistence of e-governance, dead forensic laboratories to empower Questioned Documents Examination (QDE), dearth of criminal profiling, jurisdictional discre
APA, Harvard, Vancouver, ISO, and other styles
41

Vijay Kumar Tiwari. "Enhancing Cloud and IoT Security Using Deep Learning-Based Intrusion Detection Systems with Blockchain and Federated Learning." Journal of Information Systems Engineering and Management 10, no. 25s (2025): 324–40. https://doi.org/10.52783/jisem.v10i25s.4019.

Full text
Abstract:
This paper proposes a new model that sits in the domain of improving security mechanisms in cloud and Internet of Things (IoT) utilizing deep learning based intrusion detection systems (IDS) with a sleeping stack technological, federated learning and blockchain technology. This theoretical framework seeks to address the urgent issue of protecting decentralized systems against advanced cyber threats, upholding data integrity, and maintaining privacy. Based on deep learning algorithms, the IDS detects and classifies possible security threats on a distributed network efficiently. Blockchain is us
APA, Harvard, Vancouver, ISO, and other styles
42

Kim, Hyungchan, Yeonghun Shin, Sungbum Kim, Wooyeon Jo, Minju Kim, and Taeshik Shon. "Digital Forensic Analysis to Improve User Privacy on Android." Sensors 22, no. 11 (2022): 3971. http://dx.doi.org/10.3390/s22113971.

Full text
Abstract:
The Android platform accounts for 85% of the global smartphone operating-system market share, and recently, it has also been installed on Internet-of-Things (IoT) devices such as wearable devices and vehicles. These Android-based devices store various personal information such as user IDs, addresses, and payment information and device usage data when providing convenient functions to users. Insufficient security for the management and deletion of data stored in the device can lead to various cyber security threats such as personal information leakage and identity theft. Therefore, research on
APA, Harvard, Vancouver, ISO, and other styles
43

Pallangyo, Hakeem. "Cyber Security Challenges, its Emerging Trends on Latest Information and Communication Technology and Cyber Crime in Mobile Money Transaction Services." Tanzania Journal of Engineering and Technology 41, no. 2 (2022): 189–204. http://dx.doi.org/10.52339/tjet.v41i2.792.

Full text
Abstract:
This paper investigates the challenges emerging trends on latest Information and Communication Technology and cybercrime in mobile money transaction services in Tanzania. The objective of this is to evaluate the challenges associated with this rapid growth in ICT and to determine factors influencing Cybersecurity readiness and Cybercrimes in mobile money transaction services. Cyber Security plays a significant role in the field of Information and Communication Technology especially on mobile money transaction services. The study recognizes the provision of mobile money services by both telecom
APA, Harvard, Vancouver, ISO, and other styles
44

Tarmizi, Nursyahirah, Suhaila Saee, and Dayang Hanani Abang Ibrahim. "TOWARDS CURBING CYBER-BULLYING IN MALAYSIA BY AUTHOR IDENTIFICATION OF IBAN AND KADAZANDUSUN OSN TEXT USING DEEP LEARNING." ASEAN Engineering Journal 13, no. 2 (2023): 145–57. http://dx.doi.org/10.11113/aej.v13.19171.

Full text
Abstract:
Online Social Network (OSN) is frequently used to carry out cyber-criminal actions such as cyberbullying. As a developing country in Asia that keeps abreast of ICT advancement, Malaysia is no exception when it comes to cyberbullying. Author Identification (AI) task plays a vital role in social media forensic investigation (SMF) to unveil the genuine identity of the offender by analysing the text written in OSN by the candidate culprits. Several challenges in AI dealing with OSN text, including limited text length and informal language full of internet jargon and grammatical errors that further
APA, Harvard, Vancouver, ISO, and other styles
45

-, Sonasri S., and Blessy Priya Niranjana M. -. "CYBER FORENSICS: INVESTIGATING DIGITAL CRIMES." International Journal on Science and Technology 16, no. 2 (2025). https://doi.org/10.71097/ijsat.v16.i2.3389.

Full text
Abstract:
Cyber forensics, also known as digital forensics, is a branch of forensic science that focuses on the identification, collection, preservation, analysis, and presentation of digital evidence to investigate cybercrimes. With the increasing reliance on digital technology, cybercrimes such as hacking, identity theft, data breaches, and malware attacks have become more sophisticated, necessitating advanced forensic techniques. Cyber forensic investigations involve various phases, including evidence identification, data acquisition, analysis, documentation, and legal presentation. Several specializ
APA, Harvard, Vancouver, ISO, and other styles
46

Sharma, Pankaj, and Lalit Kumar Awasthi. "IoT forensics in ambient intelligence environments: Legal issues, research challenges and future directions." Journal of Ambient Intelligence and Smart Environments, October 31, 2023, 1–38. http://dx.doi.org/10.3233/ais-220511.

Full text
Abstract:
Due to the abundance of the Internet of Things (IoT), smart devices are widely utilized which helps to manage human surroundings and senses inside and outside environments. The huge amount of data generated from the IoT device attracts cyber-criminals in order to gain information from the significant relationship between people and smart devices. Cyber-attacks on IoT pose a severe challenge for forensic experts. Researchers have invented many techniques to solve IoT forensic challenges and to have an in-depth knowledge of all the facts internal as-well-as external architecture of IoT needs to
APA, Harvard, Vancouver, ISO, and other styles
47

Soni, Nishchal. "Digital Forensics: Confronting Modern Cyber Crimes, Technological Advancements, and Future Challenges." Journal of Forensic, Legal & Investigative Sciences 11, no. 1 (2025). https://doi.org/10.24966/flis-733x/100105.

Full text
Abstract:
Digital forensics plays an essential role in countering the growing sophistication of cybercrimes in 2025. The current state and future direction of the field are presented in this review paper, with special attention given to emerging categories of cybercrimes, cutting-edge technology, and upcoming trends. The article starts off with the historical development of computer forensics from its roots in the 1970s to its present-day multi-disciplinary focus, highlighting major milestones like the establishment of forensic standards and leveraging high-technology interfaces. It then looks into comm
APA, Harvard, Vancouver, ISO, and other styles
48

Khan, Hassan Shah, Syed Muhammad Atif, and Abeer Mustufa. "The Role of Digital Forensics in Cybercrime Investigations." NUML International Journal of Engineering and Computing 3, no. 2 (2025). https://doi.org/10.52015/nijec.v3i2.85.

Full text
Abstract:
The explosion of technology in recent years has revolutionized the face of cybercrime and requires new and innovative approaches to investigating digital crimes. In this research, we present the all-encompassing role of digital forensics in cybercrime investigations with a focus on methodologies, tools, and techniques for computer forensics, mobile forensics, network forensics, and IoT forensics solutions. With the steady growth of digital systems, and the integration of these systems, has come an increase in the importance of accurate and efficient forensic methods. This paper studies the eff
APA, Harvard, Vancouver, ISO, and other styles
49

Thapaliya, Dr Suman. "IOT Cyber Forensics: Leveraging Big Data Analytics and Deep Learning-Based Feature Fusion." International Journal of Multidisciplinary and Innovative Research 01, no. 02 (2024). https://doi.org/10.58806/ijmir.2024.v1i2n02.

Full text
Abstract:
The rapid proliferation of Internet of Things (IoT) devices has expanded the digital ecosystem, offering unprecedented connectivity while simultaneously increasing vulnerability to cyber threats. Investigating cybercrimes in IoT environments is challenging due to the heterogeneous nature of devices, the massive volume of data generated, and the complexity of attack vectors. This paper introduces a novel forensic investigation framework that integrates big data analytics and deep learning-based feature fusion to address these challenges. The framework processes multi-modal IoT data, leveraging
APA, Harvard, Vancouver, ISO, and other styles
50

Rana, Pragati, and B. P. Patil. "Cyber security threats in IoT: A review." Journal of High Speed Networks, March 30, 2023, 1–16. http://dx.doi.org/10.3233/jhs-222042.

Full text
Abstract:
The Internet of Things (IoT) is the most secure platform for making human existence easier and more comfortable. IoT has made a big contribution to a variety of software programs. The rapid proliferation of smart devices, as well as their trust in data transfer and the use of Wi-Fi mechanics, has increased their vulnerability to cyber-attacks. As a result, the cost of cybercrime is rising every day. As a result, investigating IoT security threats and possible countermeasures can assist researchers in creating acceptable ways to deal with a variety of stressful scenarios in cybercrime research.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!