Subject
Law,Computer Networks and Communications,General Business, Management and Accounting
Reference25 articles.
1. A fog-based digital forensics investigation framework for IoT systems;Al-Masri,2018
2. Analyzing and detecting emerging internet of things malware: a graph-based approach;Alasmary;IEEE Int. Things J.,2019
3. Fog computing and its role in the internet of things;Bonomi,2012
4. The Post office horizon IT scandal and the presumption of the dependability of computer evidence;Christie;Digital Evid. Electron. Signature Law Review,2020
5. Bitcoin transaction graph analysis;Fleder,2019
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Comprehensive Exploration of Digital Forensics Investigations in Embedded Systems, Ubiquitous Computing, Fog Computing, and Edge Computing;2024 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD);2024-08-01
2. Out of the fog: fog computing-enabled AI to support smart marketing management;Management Review Quarterly;2024-05-27
3. The Future of Digital Forensic Investigations: Keeping the Pace with Technological Advancements;2024 47th MIPRO ICT and Electronics Convention (MIPRO);2024-05-20
4. Fog Forensics: A Comprehensive Review of Forensic Models for Fog Computing Environment;Lecture Notes in Electrical Engineering;2023-11-02
5. Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions;Computer Science Review;2023-08