A systematic survey on cloud forensics challenges, solutions, and future directions

B Manral, G Somani, KKR Choo, M Conti… - ACM Computing …, 2019 - dl.acm.org
The challenges of cloud forensics have been well-documented by both researchers and
government agencies (eg, US National Institute of Standards and Technology), although …

Cyber forensics tools: A review on mechanism and emerging challenges

V Fernando - 2021 11th IFIP International Conference on New …, 2021 - ieeexplore.ieee.org
With the development of technology," Data", also interpreted as" Information" has become a
major role played in the field of Cyber Forensics. One of the most crucial incidents which …

Blockchain-based digital forensics investigation framework in the internet of things and social systems

S Li, T Qin, G Min - IEEE Transactions on Computational Social …, 2019 - ieeexplore.ieee.org
The decentralized nature of blockchain technologies can well match the needs of integrity
and provenances of evidences collecting in digital forensics (DF) across jurisdictional …

Big data and internet of things security and forensics: Challenges and opportunities

A Azmoodeh, A Dehghantanha, KKR Choo - … of big data and IoT security, 2019 - Springer
With millions to billions of connected Internet of Things (IoT) devices and systems sending
heterogeneous raw and processed data through the IoT network, we need to be able to …

A systematic literature review on forensics in cloud, IoT, AI & blockchain

NSG Ganesh, NGM Venkatesh, DVV Prasad - Illumination of Artificial …, 2022 - Springer
In the growing diversified software applications, cybersecurity plays a vital role in preserving
and avoiding the loss of data in terms of money, knowledge, and assets of businesses and …

CloudMe forensics: A case of big data forensic investigation

YY Teing, A Dehghantanha… - … : Practice and Experience, 2018 - Wiley Online Library
The significant increase in the volume, variety, and velocity of data complicates cloud
forensic efforts, and such (big) evidential data will, at some point, become too …

Emerging from the cloud: A bibliometric analysis of cloud forensics studies

J Baldwin, OMK Alhawi, S Shaughnessy, A Akinbi… - Cyber threat …, 2018 - Springer
Emergence of cloud computing technologies have changed the way we store, retrieve, and
archive our data. With the promise of unlimited, reliable and always-available storage, a lot …

Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study

DCPJ Taylor, H Mwiki, A Dehghantanha, A Akibini… - Science & Justice, 2019 - Elsevier
Abstract Minecraft, a Massively Multiplayer Online Game (MMOG), has reportedly millions of
players from different age groups worldwide. With Minecraft being so popular, particularly …

Protecting IoT and ICS platforms against advanced persistent threat actors: analysis of APT1, silent chollima and molerats

S Grooby, T Dargahi, A Dehghantanha - Handbook of big data and IoT …, 2019 - Springer
One of the greatest threats to cyber security is the relatively recent increase in intrusion
campaigns conducted by well trained, well-funded and patient adversaries. These groups …

Forensics investigation of openflow-based SDN platforms

MK Pandya, S Homayoun, A Dehghantanha - Cyber Threat Intelligence, 2018 - Springer
Abstract Software Defined Networking (SDN) is an increasingly common implementation for
virtualization of networking functionalities. Although security of SDNs has been investigated …