Data-driven decision support for optimizing cyber forensic investigations

A Nisioti, G Loukas, A Laszka… - IEEE Transactions on …, 2021‏ - ieeexplore.ieee.org
Cyber attacks consisting of several attack actions can present considerable challenge to
forensic investigations. Consider the case where a cybersecurity breach is suspected …

Learner-space knowledge awareness map in computer supported ubiquitous learning

MM El-Bishouty, H Ogata, Y Yano - 2006 Fourth IEEE …, 2006‏ - ieeexplore.ieee.org
While a learner is doing a task to practice what he has learnt, he usually needs some help
and instructions. In this research, a computer supported collaboration learning in ubiquitous …

[HTML][HTML] Research communities in cyber security: A comprehensive literature review

S Katsikeas, P Johnson, M Ekstedt… - Computer Science …, 2021‏ - Elsevier
In order to provide a coherent overview of cyber security research, the Scopus academic
abstract and citation database was mined to create a citation graph of 98,373 authors active …

Experts reviews of a cloud forensic readiness framework for organizations

A Alenezi, HF Atlam, GB Wills - Journal of Cloud Computing, 2019‏ - Springer
Cloud computing has drastically altered the ways in which it is possible to deliver
information technologies (ITs) to consumers as a service. In addition, the concept has given …

IoT forensic: bridging the challenges in digital forensic and the internet of things

NHN Zulkipli, A Alenezi, GB Wills - … on Internet of Things, Big Data …, 2017‏ - scitepress.org
The smart devices have been used in the most major domain like the healthcare,
transportation, smart home, smart city and more. However, this technology has been …