Author:
Shalaginov Andrii,Iqbal Asif,Olegård Johannes
Publisher
Springer International Publishing
Reference31 articles.
1. The application of reverse engineering techniques against the Arduino microcontroller to acquire uploaded applications (2014). Accessed 19 Nov 2019
2. Ahlberg, F.: esptool (2020). https://github.com/espressif/esptool. Accessed 29 May 2020
3. Alenezi, A., Atlam, H., Alsagri, R., Alassafi, M., Wills, G.: IoT forensics: a state-of-the-art review, challenges and future directions. In: Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk (2019)
4. Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX Security Symposium, pp. 1093–1110 (2017)
5. Damshenas, M., Dehghantanha, A., Mahmoud, R., bin Shamsuddin, S.: Forensics investigation challenges in cloud computing environments. In: Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 190–194. IEEE (2012)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Challenges of Network Forensic Investigation in Fog and Edge Computing;Future Internet;2023-10-18
2. Digital Forensic Analysis of Hologram Projection Fans;2023 International Conference on Information Technology (ICIT);2023-08-09
3. Smart Home IoT Forensics: Current Status, Challenges, and Future Directions;2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT);2023-05-05
4. Cyber security threats in IoT: A review;Journal of High Speed Networks;2023-04-21
5. Cloud forensics and digital ledger investigation: a new era of forensics investigation;International Journal of Electronic Security and Digital Forensics;2023