Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - IEEE …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman, A Chehab - Internet of Things, 2022 - Elsevier
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …

Network attacks: Taxonomy, tools and systems

N Hoque, MH Bhuyan, RC Baishya… - Journal of Network and …, 2014 - Elsevier
To prevent and defend networks from the occurrence of attacks, it is highly essential that we
have a broad knowledge of existing tools and systems available in the public domain. Based …

DNS rule-based schema to botnet detection

K Alieyan, A Almomani, M Anbar… - Enterprise Information …, 2021 - Taylor & Francis
Botnets are considered a serious issue today. They have several negative economic
impacts as well. Such impacts are affecting organizations and individuals. Recent botnets …

An emerging threat Fileless malware: a survey and research challenges

Sudhakar, S Kumar - Cybersecurity, 2020 - Springer
With the evolution of cybersecurity countermeasures, the threat landscape has also evolved,
especially in malware from traditional file-based malware to sophisticated and multifarious …

Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

[PDF][PDF] Common phases of computer forensics investigation models

Y Yusoff, R Ismail, Z Hassan - International Journal of Computer …, 2011 - dl.mcaclash.com
The increasing criminal activities using digital information as the means or targets warrant
for a structured manner in dealing with them. Since 1984 when a formalized process been …

Network forensics: Review, taxonomy, and open challenges

S Khan, A Gani, AWA Wahab, M Shiraz… - Journal of Network and …, 2016 - Elsevier
In recent years, a number of network forensics techniques have been proposed to
investigate the increasing number of cybercrimes. Network forensics techniques assist in …

Digital forensics subdomains: the state of the art and future directions

A Al-Dhaqm, RA Ikuesan, VR Kebande… - IEEE …, 2021 - ieeexplore.ieee.org
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …

Investigating brute force attack patterns in IoT network

D Stiawan, MY Idris, RF Malik… - Journal of Electrical …, 2019 - Wiley Online Library
Internet of Things (IoT) devices may transfer data to the gateway/application server through
File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at …