Hybrid feature selection method for intrusion detection systems based on an improved intelligent water drop algorithm

E Alhenawi, H Alazzam, R Al-Sayyed… - Cybernetics and …, 2022 - sciendo.com
A critical task and a competitive research area is to secure networks against attacks. One of
the most popular security solutions is Intrusion Detection Systems (IDS). Machine learning …

A Survey on Lightweight Cryptographic Algorithms in IoT

PS Suryateja, KV Rao - Cybernetics and Information Technologies, 2024 - sciendo.com
The Internet of Things (IoT) will soon penetrate every aspect of human life. Several threats
and vulnerabilities are present due to the different devices and protocols used in an IoT …

[HTML][HTML] Simulation of network forensics model based on wireless sensor networks and inference technology

H ZHANG - Measurement: Sensors, 2024 - Elsevier
The purpose of network forensics is forensic analysis of traces after hacker attacks, obtaining
electronic evidence of Cyber Crime, and accusing hackers by electronic evidence. Both …

A Detailed Study of Advancements in Digital Forensics

G Gogia, P Rughani - The International Conference on Recent Innovations …, 2023 - Springer
Digital forensics is a complicated process with many variables. Every case tends to be
different, with varied levels of complexity. This heterogeneous nature of work comes from the …

Development Of The Intellectual System For Assessing Information Security Risks

A Barlybayev, G Akimbekova - Journal of Namibian Studies …, 2023 - namibian-studies.com
Rapid development of new digital technologies and their use, on the one hand, have
opened up new opportunities for improving the efficiency of managing technological and …

Apple Watch Digital Forensics framework (AWDFF) رسالة ماجستير‎

MAEKR Daoud - 2023 - repository.aaup.edu
The Apple Watch has become a widely used wearable device that can provide valuable
digital evidence in criminal investigations. The device's unique architecture and operating …