Journal articles on the topic 'IoT Cyber Forensics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IoT Cyber Forensics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sawarkar, Ankush D., and Anjali Deepak Hazar. "IoT Forensic Cyber Activities Detection and Prevention with Automated Machine Learning Model." Journal of Sensors, IoT & Health Sciences 2, no. 2 (2024): 1–15. http://dx.doi.org/10.69996/jsihs.2024006.
Full textKwaku, Timothy. "Internet of Things (IoT) & Underwater Network Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 291–300. http://dx.doi.org/10.22624/aims/crp-bk3-p47.
Full textOmer Aziz, M. Abdullah Siraj, and Abdul Rehman. "Privacy challenges in cyber security against cybercrime in digital forensic. A systematic literature review in Pakistan." Journal of Computing & Biomedical Informatics 2, no. 02 (2021): 158–64. http://dx.doi.org/10.56979/202/2021/31.
Full textOdame, Frederick Asumang. "Privacy Preserving Internet of Things (IoT) Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 109–12. http://dx.doi.org/10.22624/aims/crp-bk3-p18.
Full textNurettin Selcuk SENOL and Amar Rasheed. "Forensic Insights into SenseCAP: A Comprehensive Examination of Technical and LoRa Connectivity Dimensions." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 595–604. https://doi.org/10.34190/iccws.20.1.3217.
Full textKim, Kyounggon, Istabraq Mohammed Alshenaifi, Sundaresan Ramachandran, Jisu Kim, Tanveer Zia, and Abdulrazaq Almorjan. "Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey." Sensors 23, no. 7 (2023): 3681. http://dx.doi.org/10.3390/s23073681.
Full textBrown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.
Full textHo, Shuyuan Mary, and Mike Burmester. "Cyber Forensics on Internet of Things: Slicing and Dicing Raspberry Pi." International Journal of Cyber Forensics and Advanced Threat Investigations 2, no. 1 (2021): 29–49. http://dx.doi.org/10.46386/ijcfati.v2i1.22.
Full textPremanand Narasimhan and Dr. N. Kala. "Emerging Trends in Digital Forensics : Investigating Cybercrime." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3645–52. https://doi.org/10.32628/cseit251451.
Full textRaman, Jayakrishnan Anilakkad, and Vasanthi Varadharajan. "HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics." Ingénierie des systèmes d information 26, no. 3 (2021): 319–27. http://dx.doi.org/10.18280/isi.260309.
Full textSantos, Ricardo Serras. "Digital Forensics on trending technologies: A systematic literature review." ARIS2 - Advanced Research on Information Systems Security 4, no. 2 (2024): 4–15. https://doi.org/10.56394/aris2.v4i2.40.
Full textWu, Chao, Yuan'an Liu, Fan Wu, et al. "A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources." International Journal of Digital Crime and Forensics 12, no. 1 (2020): 109–30. http://dx.doi.org/10.4018/ijdcf.2020010106.
Full textDr., Suman Thapaliya. "IOT Cyber Forensics: Leveraging Big Data Analytics and Deep Learning-Based Feature Fusion." International Journal of Multidisciplinary and Innovative Research 01, no. 02 (2024): 58–62. https://doi.org/10.5281/zenodo.14326145.
Full textOhipeni, Edwin Angmor Kofi. "5G Cellular Network Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 181–84. http://dx.doi.org/10.22624/aims/crp-bk3-p29.
Full textDr., Suman Thapaliya, and Saroj Ghimire Er. "Optimized Deep Neuro-Fuzzy Networks for Enhanced Cyber Forensic Analysis in Iot-Driven Big Data Ecosystems." International Journal of Multidisciplinary and Innovative Research 01, no. 02 (2024): 88–92. https://doi.org/10.5281/zenodo.14561061.
Full textKonika Abid. "Adaptive Random Mac Strategy for IoT Security Through Network Forensics Investigation." Journal of Electrical Systems 20, no. 7s (2024): 1740–48. http://dx.doi.org/10.52783/jes.3774.
Full textMalik, Basit Ahmad. "Provocations Open Problems Encountered By Digital Forensics Ensuing Trends in Near Future." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 879–83. https://doi.org/10.31142/ijtsrd16955.
Full textAlhashmi, Noora, Bashaer Aljneibi, Mahra Alameri, Richard Ikuesan, and Farkhund Iqbal. "Forensic Examinations of Alexa for Smart Home Privacy and Cybercrime Investigation." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 8–17. https://doi.org/10.34190/iccws.20.1.3390.
Full textRathor, Shehkar. "<b>Navigating the Digital Frontier: A Review of Emerging Technologies in Digital Forensics</b>." Journal of AI Analytics and Applications 3, no. 1 (2025): 1–18. https://doi.org/10.63646/mnsl4047.
Full textChhabra, Gurpal Singh, Varinder Pal Singh, and Maninder Singh. "Cyber forensics framework for big data analytics in IoT environment using machine learning." Multimedia Tools and Applications 79, no. 23-24 (2018): 15881–900. http://dx.doi.org/10.1007/s11042-018-6338-1.
Full textShin, Jiho. "Memory-Driven Forensic Analysis of SQL Server: A Buffer Pool and Page Inspection Approach." Sensors 25, no. 11 (2025): 3512. https://doi.org/10.3390/s25113512.
Full textGupta, Saksham, and Aditya Sharma. "CyberWatch: Deep Learning-Driven Network Intrusion Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem28322.
Full textDrosatos, George, Konstantinos Rantos, and Konstantinos Demertzis. "Advanced Technologies in Data and Information Security." Applied Sciences 12, no. 12 (2022): 5925. https://doi.org/10.3390/app12125925.
Full textSong, Jin-young, and Dea-woo Park. "Preemptive Cyber Response Strategy and IoT Forensic Evidence." International Journal of Advanced Science and Technology 117 (August 31, 2018): 129–38. http://dx.doi.org/10.14257/ijast.2018.117.11.
Full textRizal, Randi, Siti Rahayu Selamat, Mohd Zaki Mas’ud, and Nur Widiyasono. "Enhanced Readiness Forensic Framework for the Complexity of Internet of Things (IoT) Investigation Based on Artificial Intelligence." Journal of Advanced Research in Applied Sciences and Engineering Technology 50, no. 1 (2024): 121–35. http://dx.doi.org/10.37934/araset.50.1.121135.
Full textCastelo Gómez, Juan Manuel, José Roldán Gómez, José Luis Martínez Martínez, and Álvaro del Amo Mínguez. "Forensic Analysis of the IoT Operating System Ubuntu Core." Journal of Physics: Conference Series 2224, no. 1 (2022): 012082. http://dx.doi.org/10.1088/1742-6596/2224/1/012082.
Full textElsayed, Asmaa, and Bilal Arain. "Intervention of Innovative Technologies for Eradicating Tampering in Digital Forensics: Practicing Intelligent Decision Methodologies." Multicriteria Algorithms with Applications 4 (June 30, 2024): 53–68. http://dx.doi.org/10.61356/j.mawa.2024.4322.
Full textAli, Md Iman, Sukhkirandeep Kaur, Aditya Khamparia, et al. "Security Challenges and Cyber Forensic Ecosystem in IoT Driven BYOD Environment." IEEE Access 8 (2020): 172770–82. http://dx.doi.org/10.1109/access.2020.3024784.
Full textDasmen, Rahmat Novrianda, and Ferry Kurniawan. "Digital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media SosialDigital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media Sosial." Techno.Com 20, no. 4 (2021): 527–39. http://dx.doi.org/10.33633/tc.v20i4.5170.
Full textThapaliya, Suman, and Pawan Kumar Sharma. "Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures." International Journal of Information Security and Privacy 17, no. 1 (2023): 1–22. http://dx.doi.org/10.4018/ijisp.315819.
Full textJeong, Doowon, Jungheum Park, Sangjin Lee, and Chulhoon Kang. "Investigation Methodology of a Virtual Desktop Infrastructure for IoT." Journal of Applied Mathematics 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/689870.
Full textHossain, Mahmud, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor, and S. M. Riazul Islam. "A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives." Future Internet 16, no. 2 (2024): 40. http://dx.doi.org/10.3390/fi16020040.
Full textYankson, Benjamin, Tyler Loucks, Andrea Sampson, and Chelsea Lojano. "Robots Security Assessment and Analysis Using Open-Source Tools." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 449–56. http://dx.doi.org/10.34190/iccws.18.1.1019.
Full textRaji, Adereti Rasak, Adenomon M. O, Gilbert I. O. Aimufua, and Steven I. Bassey. "A Framework for IOC-Driven Early Warning Threat Intelligence." Kwaghe International Journal of Sciences and Technology 2, no. 2 (2025): 242–57. https://doi.org/10.58578/kijst.v2i2.6458.
Full textHsu, Chien-Lung, Wei-Xin Chen, and Tuan-Vinh Le. "An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things." Sensors 20, no. 22 (2020): 6471. http://dx.doi.org/10.3390/s20226471.
Full textAhmadi-Assalemi, Gabriela, Haider Al-Khateeb, Gregory Epiphaniou, and Carsten Maple. "Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review." Smart Cities 3, no. 3 (2020): 894–927. http://dx.doi.org/10.3390/smartcities3030046.
Full textDjenna, Amir, Ezedin Barka, Achouak Benchikh, and Karima Khadir. "Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics." Sensors 23, no. 14 (2023): 6302. http://dx.doi.org/10.3390/s23146302.
Full textP., Rajashekhar, Thrinay Chowdary Y., and Haque Choudhury Ziaul. "Intrusion Detection for Internet of Things." International Journal of Innovative Science and Research Technology 7, no. 6 (2022): 702–6. https://doi.org/10.5281/zenodo.6804867.
Full textKosiński, Jerzy, Tomasz Gontarz, and Robert Kośla. "Cybersecurity and the Handling of Cyber Incidents." Internal Security 10, no. 2 (2019): 107–28. http://dx.doi.org/10.5604/01.3001.0013.4219.
Full textOlowu, Kemi, and P. Gabasa. "Financial Crime, ICT & E-Governance: Libraries Role." Advances in Social Sciences Research Journal 7, no. 1 (2020): 609–12. http://dx.doi.org/10.14738/assrj.71.7476.
Full textVijay Kumar Tiwari. "Enhancing Cloud and IoT Security Using Deep Learning-Based Intrusion Detection Systems with Blockchain and Federated Learning." Journal of Information Systems Engineering and Management 10, no. 25s (2025): 324–40. https://doi.org/10.52783/jisem.v10i25s.4019.
Full textKim, Hyungchan, Yeonghun Shin, Sungbum Kim, Wooyeon Jo, Minju Kim, and Taeshik Shon. "Digital Forensic Analysis to Improve User Privacy on Android." Sensors 22, no. 11 (2022): 3971. http://dx.doi.org/10.3390/s22113971.
Full textPallangyo, Hakeem. "Cyber Security Challenges, its Emerging Trends on Latest Information and Communication Technology and Cyber Crime in Mobile Money Transaction Services." Tanzania Journal of Engineering and Technology 41, no. 2 (2022): 189–204. http://dx.doi.org/10.52339/tjet.v41i2.792.
Full textTarmizi, Nursyahirah, Suhaila Saee, and Dayang Hanani Abang Ibrahim. "TOWARDS CURBING CYBER-BULLYING IN MALAYSIA BY AUTHOR IDENTIFICATION OF IBAN AND KADAZANDUSUN OSN TEXT USING DEEP LEARNING." ASEAN Engineering Journal 13, no. 2 (2023): 145–57. http://dx.doi.org/10.11113/aej.v13.19171.
Full text-, Sonasri S., and Blessy Priya Niranjana M. -. "CYBER FORENSICS: INVESTIGATING DIGITAL CRIMES." International Journal on Science and Technology 16, no. 2 (2025). https://doi.org/10.71097/ijsat.v16.i2.3389.
Full textSharma, Pankaj, and Lalit Kumar Awasthi. "IoT forensics in ambient intelligence environments: Legal issues, research challenges and future directions." Journal of Ambient Intelligence and Smart Environments, October 31, 2023, 1–38. http://dx.doi.org/10.3233/ais-220511.
Full textSoni, Nishchal. "Digital Forensics: Confronting Modern Cyber Crimes, Technological Advancements, and Future Challenges." Journal of Forensic, Legal & Investigative Sciences 11, no. 1 (2025). https://doi.org/10.24966/flis-733x/100105.
Full textKhan, Hassan Shah, Syed Muhammad Atif, and Abeer Mustufa. "The Role of Digital Forensics in Cybercrime Investigations." NUML International Journal of Engineering and Computing 3, no. 2 (2025). https://doi.org/10.52015/nijec.v3i2.85.
Full textThapaliya, Dr Suman. "IOT Cyber Forensics: Leveraging Big Data Analytics and Deep Learning-Based Feature Fusion." International Journal of Multidisciplinary and Innovative Research 01, no. 02 (2024). https://doi.org/10.58806/ijmir.2024.v1i2n02.
Full textRana, Pragati, and B. P. Patil. "Cyber security threats in IoT: A review." Journal of High Speed Networks, March 30, 2023, 1–16. http://dx.doi.org/10.3233/jhs-222042.
Full text