USB-watch: A generalized hardware-assisted insider threat detection framework

K Denney, L Babun, AS Uluagac - Journal of Hardware and Systems …, 2020 - Springer
Today, the USB protocol is among the most widely used protocols—mostly due to its plug-
and-play nature and number of supported devices. However, the mass-proliferation of USB …

Machine-Learning Forensics: State of the Art in the Use of Machine-Learning Techniques for Digital Forensic Investigations within Smart Environments

L Tageldin, H Venter - Applied Sciences, 2023 - mdpi.com
Recently, a world-wide trend has been observed that there is widespread adoption across
all fields to embrace smart environments and automation. Smart environments include a …

Using machine learning for detection and classification of cyber attacks in edge iot

E Becker, M Gupta, K Aryal - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) devices are omnipresent due to their ease of use and level of
connectivity. Because of wide deployment, IoT network traffic security is a large issue …

A Comprehensive Review of Digital Forensics Frameworks for Internet of Things (IoT) Devices

Y Salem, M Owda, AY Owda - 2023 International Conference …, 2023 - ieeexplore.ieee.org
The development of Internet of Things (IoT) devices has brought many benefits to our daily
lives and business. Despite this, as the number of IoT devices continues to grow …

PoisonIvy: (In) secure Practices of Enterprise IoT Systems in Smart Buildings

LP Rondon, L Babun, A Aris, K Akkaya… - Proceedings of the 7th …, 2020 - dl.acm.org
The rise of IoT devices has led to the proliferation of smart buildings, offices, and homes
worldwide. Although commodity IoT devices are employed by ordinary end-users, complex …

Comparative study of IoT forensic frameworks

H Mahmood, M Arshad, I Ahmed, S Fatima… - Forensic Science …, 2024 - Elsevier
Abstract Internet of Things (IoT) systems often consist of heterogeneous, resource-
constrained devices that generate massive amounts of data. This data is important for …

Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics Enhancements

E Becker, M Gupta… - … , Intl Conf on Cloud and Big …, 2023 - ieeexplore.ieee.org
Digital forensics is a rapidly growing sub-domain of forensic science, primarily due to
technological advancements and their integration into everyday life. In this paper, our study …

A survey of machine learning applications in digital forensics

H Khan, S Hanif, B Muhammad - Trends in Computer Science and …, 2021 - engineegroup.us
A survey of machine learning applications in digital forensics Toggle navigation Practices
Collaborations Indexing Advertisement Membership Publish Now Author Guidelines Editor …

[图书][B] Smart and secure internet of healthcare things

N Gupta, J Singh, C Chakraborty, M Alazab, DT Do - 2022 - books.google.com
Internet of Healthcare Things (IoHT) is an Internet of Things (IoT)-based solution that
includes a network architecture which allows the connection between a patient and …

IoTMonitor: a hidden markov model-based security system to identify crucial attack nodes in trigger-action IoT platforms

MM Alam, MSI Sajid, W Wang… - 2022 IEEE Wireless …, 2022 - ieeexplore.ieee.org
With the emergence and fast development of trigger-action platforms in IoT settings, security
vulnerabilities caused by the interactions among IoT devices become more prevalent. The …