Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

A Attkan, V Ranga - Complex & Intelligent Systems, 2022 - Springer
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …

Digital forensics subdomains: the state of the art and future directions

A Al-Dhaqm, RA Ikuesan, VR Kebande… - IEEE …, 2021 - ieeexplore.ieee.org
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …

Green environment and circular economy: A state-of-the-art analysis

J Li, G Song, M Cai, J Bian, BS Mohammed - … Energy Technologies and …, 2022 - Elsevier
Structured environments are considered an essential topic in the circular economy
application. Circular techniques to purify wastewater and regenerate raw materials should …

Application of artificial intelligence to network forensics: Survey, challenges and future directions

S Rizvi, M Scanlon, J Mcgibney, J Sheppard - Ieee Access, 2022 - ieeexplore.ieee.org
Network forensics focuses on the identification and investigation of internal and external
network attacks, the reverse engineering of network protocols, and the uninstrumented …

Common investigation process model for Internet of Things forensics

MA Saleh, SH Othman, A Al-Dhaqm… - … on Smart Computing …, 2021 - ieeexplore.ieee.org
Internet of Things Forensics (IoTFs) is a new discipline in digital forensics science used in
the detection, acquisition, preservation, rebuilding, analyzing, and the presentation of …

Blockchain-assisted machine learning with hybrid metaheuristics-empowered cyber attack detection and classification model

A Albakri, B Alabdullah, F Alhayan - Sustainability, 2023 - mdpi.com
Cyber attack detection is the process of detecting and responding to malicious or
unauthorized activities in networks, computer systems, and digital environments. The …

Machine learning in digital forensics: a systematic literature review

T Nayerifard, H Amintoosi, AG Bafghi… - arXiv preprint arXiv …, 2023 - arxiv.org
Development and exploitation of technology have led to the further expansion and
complexity of digital crimes. On the other hand, the growing volume of data and …

A vehicle-consensus information exchange scheme for traffic management in vehicular ad-hoc networks

J Gao, G Manogaran, TN Nguyen… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Vehicular Ad-Hoc Networks (VANETs) provide roadside communication for improving the
ease of driving user information exchange. It interconnects hierarchical infrastructure units …

Teaching effect evaluation system of ideological and political teaching based on supervised learning

Y Tian - Journal of Interconnection Networks, 2022 - World Scientific
University students face immense challenges in current situations in ideological and political
research. Therefore, the way ideological work constantly needs to be adapted, and the …

A creative approach to understanding the hidden information within the business data using Deep Learning

Y Luo, C Yao, Y Mo, B Xie, G Yang, H Gui - Information Processing & …, 2021 - Elsevier
Crucial business data is an essential asset for each business establishment. Data security is
vital when sensitive data are transmitted over the Internet in a business environment …