For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected …
K Saurabh, S Sood, PA Kumar, U Singh… - 2022 IEEE World AI …, 2022 - ieeexplore.ieee.org
In the recent years, we have witnessed a huge growth in the number of Internet of Things (loT) and edge devices being used in our everyday activities. This demands the security of …
C Hazman, A Guezzaz, S Benkirane… - Multimedia Tools and …, 2023 - Springer
Abstract Nowadays, modern Internet of Things (IoT) applications are enabling smart cities across the world. They provide remote device monitoring, management, and control, and …
Differential evolution is a classical and effective evolutionary algorithm. In recent years, many differential evolution variants have been proposed and achieved good results on …
Abstract Internet of Things (IoT) devices in Smart Home Network (SHN) are highly vulnerable to complex botnet attacks. In this paper, we investigate the effectiveness of …
MM Salim, AK Comivi, T Nurbek, H Park, JH Park - Sensors, 2022 - mdpi.com
Resource constraints in the Industrial Internet of Things (IIoT) result in brute-force attacks, transforming them into a botnet to launch Distributed Denial of Service Attacks. The delayed …
S Maurya, S Kumar, U Garg, M Kumar - ECS Sensors Plus, 2022 - iopscience.iop.org
Abstract The Internet of Things (IoT) has become an integral requirement to equip common life. According to IDC, the number of IoT devices may increase exponentially up to a trillion …
IoT devices typically stream data such as sensor values to other devices including cloud- based services. Analyzing these streams for cyber-attacks is a challenging task. This is due …
The software-defined networking (SDN) paradigm has recently emerged as a trend to build various protocols, develop more reliable networks, enhance the data flow controlling, and …