Machine learning aided static malware analysis: A survey and tutorial

A Shalaginov, S Banin, A Dehghantanha… - Cyber threat …, 2018 - Springer
Malware analysis and detection techniques have been evolving during the last decade as a
reflection to development of different malware techniques to evade network-based and host …

A systematic survey on cloud forensics challenges, solutions, and future directions

B Manral, G Somani, KKR Choo, M Conti… - ACM Computing …, 2019 - dl.acm.org
The challenges of cloud forensics have been well-documented by both researchers and
government agencies (eg, US National Institute of Standards and Technology), although …

Cloud forensics: technical challenges, solutions and comparative analysis

A Pichan, M Lazarescu, ST Soh - Digital investigation, 2015 - Elsevier
Cloud computing is arguably one of the most significant advances in information technology
(IT) services today. Several cloud service providers (CSPs) have offered services that have …

[HTML][HTML] Cloud and edge computing-based computer forensics: Challenges and open problems

V Prakash, A Williams, L Garg, C Savaglio, S Bawa - Electronics, 2021 - mdpi.com
In recent years, there has been a dramatic change in attitude towards computers and the
use of computer resources in general. Cloud and Edge computing have emerged as the …

Intrusion detection in intelligent transportation system and its applications using blockchain technology

AM Krishna, AK Tyagi - 2020 international conference on …, 2020 - ieeexplore.ieee.org
Privacy and Trust are critical issues in automation systems/transportation systems. Today's
Vehicle is need of everyone for moving one place to another. Together this, data security …

Cloud-based framework for performing digital forensic investigations

V Prakash, A Williams, L Garg, P Barik… - International Journal of …, 2022 - Springer
Cloud computing has created paradigm transitions from traditional computing. Acquisition
rates increase with benefits such as lower costs and better utilization of resources. However …

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study

YY Teing, A Dehghantanha, KKR Choo… - Computers & Electrical …, 2017 - Elsevier
Cloud computing can be generally regarded as the technology enabler for Internet of Things
(IoT). To ensure the most effective collection of evidence from cloud-enabled IoT …

[PDF][PDF] Cloud forensics: Challenges and blockchain based solutions

O Akter, A Akther, MA Uddin, MM Islam - International Journal of …, 2020 - academia.edu
With the advancement in digital forensics, digital forensics has been evolved in Cloud
computing. A common process of digital forensics mainly includes five steps: defining …

On digital forensic readiness in the cloud using a distributed agent-based solution: issues and challenges

VR Kebande, HS Venter - Australian Journal of Forensic Sciences, 2018 - Taylor & Francis
The need to perform digital investigations has, over the years, led to the exponential growth
of the field of Digital Forensics (DF). However, quite a number of challenges face the act of …

Cloud storage forensics: MEGA as a case study

F Daryabar, A Dehghantanha… - Australian Journal of …, 2017 - Taylor & Francis
The increasing use of smartphones and cloud storage apps allows users to access their
data anywhere, anytime. Due to the potential of mobile devices being used and/or targeted …