A framework for evaluating Internet-of-Things platforms: Application provider viewpoint

O Mazhelis, P Tyrväinen - 2014 IEEE World Forum on Internet …, 2014 - ieeexplore.ieee.org
Widespread adoption of Internet of Things (IoT) applications assumes a sustainable
ecosystem of firms creating, distributing, and using these applications. Such an ecosystem …

[PDF][PDF] A hybrid approach using digital Forensics for attack detection in a cloud network environment

S Sachdeva, A Ali - International Journal of Future Generation …, 2021 - academia.edu
In the recent era, the web is the major means used by cyber-criminals to carry out attacks
alongside people and groups. Due to the continually increasing number of Internet users …

Extrusion detection of illegal files in cloud-based systems

R Hegarty, J Haggerty - International Journal of Space …, 2015 - inderscienceonline.com
Cloud-based architectures have become the predominant paradigm for organisational
infrastructure development due to the flexibility and scalability that these systems provide …

Forensics in the cloud: A literature analysis and classification

PR Agbedanu, P Wang, RN Nortey… - 2019 5th International …, 2019 - ieeexplore.ieee.org
Although cloud, fog and edge computing have established their strengths and usefulness
through characteristics such as low cost, reliability, location sensitivity, wireless connectivity …

SlackStick: Signature-based file identification for live digital forensics examinations

R Hegarty, J Haggerty - 2015 European Intelligence and …, 2015 - ieeexplore.ieee.org
A digital forensics investigation may involve procedures for both live forensics and for
gathering evidence from a device in a forensics laboratory. Due to the focus on capturing …