M Jangjou, MK Sohrabi - Archives of Computational Methods in …, 2022 - Springer
Conducting enterprise distributed computing and providing facilities such as data storage and resource sharing, along with the provision of cheap, easy, and flexible services, have …
B Cinar, JP Bharadiya - Asian Journal of Research in …, 2023 - research.send4journal.com
Cloud computing has become increasingly popular in recent years, evolving into a computing paradigm that is both cost-effective and efficient. It has the potential to be one of …
Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern …
A Asiaei, NZ Ab. Rahim - Journal of Science and Technology Policy …, 2019 - emerald.com
Purpose The purpose of this study is to develop a model to understand the relationships among technology, organizational and environmental (TOE) contexts, intention to adopt …
The rapid growth of Internet of Things (IoT) devices brings countless benefits, but it also brings new security and forensics challenges. The IoT system with billions of devices …
As more people utilize the cloud, more employment opportunities become available. With constraints such as a limited make-span, a high utilization rate of available resources …
JPB Mapetu, Z Chen, L Kong - Applied Intelligence, 2019 - Springer
With the increasing large number of cloud users, the number of tasks is growing exponentially. Scheduling and balancing these tasks amongst different heterogeneous …
The challenges of cloud forensics have been well-documented by both researchers and government agencies (eg, US National Institute of Standards and Technology), although …
K Awuson-David, T Al-Hadhrami, M Alazab… - Future Generation …, 2021 - Elsevier
Log files are the primary source of recording users, applications and protocols, activities in the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when …