Author:
Alabdulsalam Saad,Schaefer Kevin,Kechadi Tahar,Le-Khac Nhien-An
Publisher
Springer International Publishing
Reference22 articles.
1. M. Alex and R. Kishore, Forensics framework for cloud computing, Computers and Electrical Engineering, vol. 60, pp. 193–205, 2017.
2. A. Ariffin, J. Slay and K. Choo, Data recovery from proprietary formatted CCTV hard disks, in Advances in Digital Forensics IX, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 213–223, 2013.
3. E. Blumenthal and E. Weise, Hacked home devices caused massive Internet outage, USA Today, October 21, 2016.
4. E. Casey, Network traffic as a source of evidence: Tool strengths, weaknesses and future needs, Digital Investigation, vol. 1(1), pp. 28–43, 2004.
5. J. Clover, Apple watches shipping to customers confirmed to have covered diagnostic port, MacRumors, April 23, 2015.
Cited by
50 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Integrating industry 4.0 technologies for the administration of courts and justice dispensation—a systematic review;Humanities and Social Sciences Communications;2024-08-23
2. Forensic Approaches to Cybersecurity Challenges;Advances in Information Security, Privacy, and Ethics;2024-06-30
3. Comparative study of IoT forensic frameworks;Forensic Science International: Digital Investigation;2024-06
4. ForensiQ: A Knowledge Graph Question Answering System for IoT Forensics;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2024
5. Integrating the edge computing paradigm into the development of IoT forensic methodologies;International Journal of Information Security;2023-11-22