Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic survey on cloud forensics challenges, solutions, and future directions
The challenges of cloud forensics have been well-documented by both researchers and
government agencies (eg, US National Institute of Standards and Technology), although …
government agencies (eg, US National Institute of Standards and Technology), although …
Cyber forensics tools: A review on mechanism and emerging challenges
V Fernando - 2021 11th IFIP International Conference on New …, 2021 - ieeexplore.ieee.org
With the development of technology," Data", also interpreted as" Information" has become a
major role played in the field of Cyber Forensics. One of the most crucial incidents which …
major role played in the field of Cyber Forensics. One of the most crucial incidents which …
Blockchain-based digital forensics investigation framework in the internet of things and social systems
The decentralized nature of blockchain technologies can well match the needs of integrity
and provenances of evidences collecting in digital forensics (DF) across jurisdictional …
and provenances of evidences collecting in digital forensics (DF) across jurisdictional …
Big data and internet of things security and forensics: Challenges and opportunities
A Azmoodeh, A Dehghantanha, KKR Choo - … of big data and IoT security, 2019 - Springer
With millions to billions of connected Internet of Things (IoT) devices and systems sending
heterogeneous raw and processed data through the IoT network, we need to be able to …
heterogeneous raw and processed data through the IoT network, we need to be able to …
A systematic literature review on forensics in cloud, IoT, AI & blockchain
NSG Ganesh, NGM Venkatesh, DVV Prasad - Illumination of Artificial …, 2022 - Springer
In the growing diversified software applications, cybersecurity plays a vital role in preserving
and avoiding the loss of data in terms of money, knowledge, and assets of businesses and …
and avoiding the loss of data in terms of money, knowledge, and assets of businesses and …
CloudMe forensics: A case of big data forensic investigation
YY Teing, A Dehghantanha… - … : Practice and Experience, 2018 - Wiley Online Library
The significant increase in the volume, variety, and velocity of data complicates cloud
forensic efforts, and such (big) evidential data will, at some point, become too …
forensic efforts, and such (big) evidential data will, at some point, become too …
Emerging from the cloud: A bibliometric analysis of cloud forensics studies
J Baldwin, OMK Alhawi, S Shaughnessy, A Akinbi… - Cyber threat …, 2018 - Springer
Emergence of cloud computing technologies have changed the way we store, retrieve, and
archive our data. With the promise of unlimited, reliable and always-available storage, a lot …
archive our data. With the promise of unlimited, reliable and always-available storage, a lot …
Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study
Abstract Minecraft, a Massively Multiplayer Online Game (MMOG), has reportedly millions of
players from different age groups worldwide. With Minecraft being so popular, particularly …
players from different age groups worldwide. With Minecraft being so popular, particularly …
Protecting IoT and ICS platforms against advanced persistent threat actors: analysis of APT1, silent chollima and molerats
S Grooby, T Dargahi, A Dehghantanha - Handbook of big data and IoT …, 2019 - Springer
One of the greatest threats to cyber security is the relatively recent increase in intrusion
campaigns conducted by well trained, well-funded and patient adversaries. These groups …
campaigns conducted by well trained, well-funded and patient adversaries. These groups …
Forensics investigation of openflow-based SDN platforms
MK Pandya, S Homayoun, A Dehghantanha - Cyber Threat Intelligence, 2018 - Springer
Abstract Software Defined Networking (SDN) is an increasingly common implementation for
virtualization of networking functionalities. Although security of SDNs has been investigated …
virtualization of networking functionalities. Although security of SDNs has been investigated …