[HTML][HTML] Systematic review of deep learning solutions for malware detection and forensic analysis in IoT

SU Qureshi, J He, S Tunio, N Zhu, A Nazir… - Journal of King Saud …, 2024 - Elsevier
The swift proliferation of Internet of Things (IoT) devices has presented considerable
challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract …

An efficient IoT-based patient monitoring and heart disease prediction system using deep learning modified neural network

SS Sarmah - Ieee access, 2020 - ieeexplore.ieee.org
The leading causes of death worldwide are chronic illnesses suchlike diabetes, Heart
Disease (HD), cancer as well as chronic respiratory malady. It is remarkably intricate to …

Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction

AA Khan, AA Shaikh, AA Laghari… - International …, 2022 - inderscienceonline.com
Digital forensics (DF) is the scientific investigation of digital criminal activities, illegal
attempts, and cyber-attacks through computer systems. It is becoming a crucial aspect of law …

Secure storage model for digital forensic readiness

A Singh, RA Ikuesan, H Venter - IEEE Access, 2022 - ieeexplore.ieee.org
Securing digital evidence is a key factor that contributes to evidence admissibility during
digital forensic investigations, particularly in establishing the chain of custody of digital …

Efficient and reliable forensics using intelligent edge computing

A Razaque, M Aloqaily, M Almiani, Y Jararweh… - Future Generation …, 2021 - Elsevier
Due to the increasing awareness and use of cloud and edge computing, society and
industries are beginning to understand the benefits they can provide. Cloud and Edge are …

[Retracted] Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications

S Raghavendra, P Srividya, M Mohseni… - Security and …, 2022 - Wiley Online Library
Using cloud computing, businesses can adopt IT without incurring a significant upfront cost.
The Internet has numerous benefits, but model security remains a concern, which affects …

Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC

DVK Vengala, D Kavitha, APS Kumar - Cluster Computing, 2020 - Springer
The cloud computing (CC) model is diverse as well as has broad phenomena because of
which it is being preferred widely. Due to security challenges, the user cannot utilize CC to …

Security enhancement of the cloud paradigm using a novel optimized crypto mechanism

KK Singh, VK Jha - Multimedia Tools and Applications, 2023 - Springer
Nowadays, medical enterprises are gradually attracted to store their data in the cloud
paradigm and distribute the data between the authorized person due to the enormous …

Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment

DVK Vengala, D Kavitha, APS Kumar - Complex & Intelligent Systems, 2023 - Springer
Cloud computing (CC) is a technology that delivers its service by means of the internet. In
the modern scenario, cloud storage services have gained attention. The cloud environment …

Improved elliptical curve cryptography and chaotic mapping with fruitfly optimization algorithm for secure data transmission

MI Reddy, MP Reddy, RO Reddy, A Praveen - Wireless Networks, 2024 - Springer
Cryptography is required while interacting through an insecure media, such as internet.
Unauthorised individuals have the ability to view and alter data as it is being transferred from …