Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …
it enables its consumers to improve their lifestyles and professionally keep up with the …
Digital forensics subdomains: the state of the art and future directions
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …
scientifically proven digital forensic investigation techniques to corroborate a suspected …
Green environment and circular economy: A state-of-the-art analysis
J Li, G Song, M Cai, J Bian, BS Mohammed - … Energy Technologies and …, 2022 - Elsevier
Structured environments are considered an essential topic in the circular economy
application. Circular techniques to purify wastewater and regenerate raw materials should …
application. Circular techniques to purify wastewater and regenerate raw materials should …
Common investigation process model for Internet of Things forensics
MA Saleh, SH Othman, A Al-Dhaqm… - … on Smart Computing …, 2021 - ieeexplore.ieee.org
Internet of Things Forensics (IoTFs) is a new discipline in digital forensics science used in
the detection, acquisition, preservation, rebuilding, analyzing, and the presentation of …
the detection, acquisition, preservation, rebuilding, analyzing, and the presentation of …
Application of artificial intelligence to network forensics: Survey, challenges and future directions
Network forensics focuses on the identification and investigation of internal and external
network attacks, the reverse engineering of network protocols, and the uninstrumented …
network attacks, the reverse engineering of network protocols, and the uninstrumented …
Blockchain-assisted machine learning with hybrid metaheuristics-empowered cyber attack detection and classification model
Cyber attack detection is the process of detecting and responding to malicious or
unauthorized activities in networks, computer systems, and digital environments. The …
unauthorized activities in networks, computer systems, and digital environments. The …
Machine learning in digital forensics: a systematic literature review
Development and exploitation of technology have led to the further expansion and
complexity of digital crimes. On the other hand, the growing volume of data and …
complexity of digital crimes. On the other hand, the growing volume of data and …
A vehicle-consensus information exchange scheme for traffic management in vehicular ad-hoc networks
J Gao, G Manogaran, TN Nguyen… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Vehicular Ad-Hoc Networks (VANETs) provide roadside communication for improving the
ease of driving user information exchange. It interconnects hierarchical infrastructure units …
ease of driving user information exchange. It interconnects hierarchical infrastructure units …
Research on recognition of students attention in offline classroom-based on deep learning
Online education has been expected to be the future of learning; it will never replace the
value of traditional classroom experiences fully. Technical problems have less impact on …
value of traditional classroom experiences fully. Technical problems have less impact on …
Teaching effect evaluation system of ideological and political teaching based on supervised learning
Y Tian - Journal of Interconnection Networks, 2022 - World Scientific
University students face immense challenges in current situations in ideological and political
research. Therefore, the way ideological work constantly needs to be adapted, and the …
research. Therefore, the way ideological work constantly needs to be adapted, and the …