[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

The internet of modular robotic things: Issues, limitations, challenges, & solutions

JPA Yaacoub, HN Noura, B Piranda - Internet of Things, 2023 - Elsevier
The world is becoming more digitized with the rise of modular robotic systems. Therefore,
with the increasing demands and needs for robotics, the modular robotic domain was …

[HTML][HTML] Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions

JPA Yaacoub, HN Noura, O Salman - Internet of Things and Cyber-Physical …, 2023 - Elsevier
Abstract Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a
reputation for not only building Machine Learning (ML) models that rely on distributed …

Latest technologies in criminal investigation (testing of foreign practices in Ukraine)

YP Tymoshenko, OI Kozachenko… - Amazonia …, 2022 - amazoniainvestiga.info
The aim of the article was to identify a set of innovative technologies in the field of
investigation of crimes that can be tested in Ukraine. The leading research methods were …

Understanding Issues and Challenges of DFR Implementation in SDN Platform

H Munkhondya, RA Ikuesan, A Singh… - Procedia Computer …, 2023 - Elsevier
Abstract Software-Defined Networking (SDN) is an evolutionary networking paradigm that
offers simplified and agile network configuration and management capabilities. However …

Towards a Conflict Resolution Protocol for Cloud Forensics Investigation

AM Alashjaee - IEEE Access, 2024 - ieeexplore.ieee.org
In cloud forensics, both the provider and consumer can independently collect evidence from
cloud resources. Any inconsistencies between the forensic data supplied by the provider …

Investigating the Impact on Data Recovery in Computer Forensics

S Yulianto, B Soewito - 2023 IEEE International Conference on …, 2023 - ieeexplore.ieee.org
Defragmentation can potentially be employed as a tactic by perpetrators to conceal,
misrepresent, or eliminate digital evidence. This study explores the effects of minor …

Digital Forensic Evidence Analysis In Revealing Defamation On Social Media (Twitter) Using The Static Forensics Method

R Badillah, AY Muniar, A Rahman… - Ceddi Journal of …, 2023 - journal.ceddi.id
This research addresses the persistent challenge of defamation, notably prevalent on the
Twitter platform, where the discovery of digital evidence is hampered by robust privacy …

[HTML][HTML] The Influence of Mobile Technology Advancements on Digital Forensics Investigations Practices and Procedures: A Generic Qualitative Inquiry

ED Ward - 2021 - search.proquest.com
The purpose of the generic qualitative inquiry was to explore how digital forensics
investigators (DFIs) are applying improvised practices and procedures to consistently extract …

Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation.

W Halboob, J Almuhtadi - Computer Systems Science & …, 2023 - search.ebscohost.com
Privacy preservation (PP) in Digital forensics (DF) is a conflicted and non-trivial issue.
Existing solutions use the searchable encryption concept and, as a result, are not efficient …