Data-driven decision support for optimizing cyber forensic investigations
Cyber attacks consisting of several attack actions can present considerable challenge to
forensic investigations. Consider the case where a cybersecurity breach is suspected …
forensic investigations. Consider the case where a cybersecurity breach is suspected …
Learner-space knowledge awareness map in computer supported ubiquitous learning
While a learner is doing a task to practice what he has learnt, he usually needs some help
and instructions. In this research, a computer supported collaboration learning in ubiquitous …
and instructions. In this research, a computer supported collaboration learning in ubiquitous …
[HTML][HTML] Research communities in cyber security: A comprehensive literature review
In order to provide a coherent overview of cyber security research, the Scopus academic
abstract and citation database was mined to create a citation graph of 98,373 authors active …
abstract and citation database was mined to create a citation graph of 98,373 authors active …
Experts reviews of a cloud forensic readiness framework for organizations
Cloud computing has drastically altered the ways in which it is possible to deliver
information technologies (ITs) to consumers as a service. In addition, the concept has given …
information technologies (ITs) to consumers as a service. In addition, the concept has given …
IoT forensic: bridging the challenges in digital forensic and the internet of things
The smart devices have been used in the most major domain like the healthcare,
transportation, smart home, smart city and more. However, this technology has been …
transportation, smart home, smart city and more. However, this technology has been …