[HTML][HTML] Systematic review of deep learning solutions for malware detection and forensic analysis in IoT
SU Qureshi, J He, S Tunio, N Zhu, A Nazir… - Journal of King Saud …, 2024 - Elsevier
The swift proliferation of Internet of Things (IoT) devices has presented considerable
challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract …
challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract …
An enhanced phishing detection tool using deep learning from URL
Cybersecurity and phishing attacks become critical and important for the global economy
because there are many areas and businesses that rely mainly on computer and Internet …
because there are many areas and businesses that rely mainly on computer and Internet …
An Integrated Framework Implementation For Cloud Forensics Investigation Using Logging Tool
Today, straightforward computer and network forensics techniques cannon satisfactory
performance for cloud forensics in conventional cloud based systems. The complexity of …
performance for cloud forensics in conventional cloud based systems. The complexity of …
[HTML][HTML] Exploring user requirements of network forensic tools
Network forensic tools enable security professionals to monitor network performance and
compromises. These tools are used to monitor internal and external network attacks …
compromises. These tools are used to monitor internal and external network attacks …
[PDF][PDF] Digital Forensics Tools Used in Cybercrime Investigation-Comparative Analysis
N Hamad, D Eleyan - Journal of Xi'an University of Architecture & …, 2022 - researchgate.net
Increased data storage and use in today's environment increases the possibility of data
being abused. As a result, devices, smart phones, and computers are exposed to a variety of …
being abused. As a result, devices, smart phones, and computers are exposed to a variety of …
Comparison of Digital Forensic Tools for Drug Trafficking Cases on Instagram Messenger using NIST Method
MFM Nahdli, I Riadi, MK Biddinika - Scientific Journal of …, 2024 - journal.unnes.ac.id
Purpose: Cybercrime is an unlawful act that utilizes computer technology and the
development of the internet. Cybercrime can occur on all electronic devices, including …
development of the internet. Cybercrime can occur on all electronic devices, including …
Smart home forensics
L Pullagura, NV Kumari… - Cyber Forensics and …, 2024 - benthamdirect.com
The Internet of Things (IoT) has unquestionably exploded into the forefront of everyone's
lives, whether they realise it or not. Internet of Things (IoT) technology is now used in …
lives, whether they realise it or not. Internet of Things (IoT) technology is now used in …
Social engineering in social network: a systematic literature review
Social engineering is hacking and manipulating people's minds to obtain access to networks
and systems in order to acquire sensitive data. A social engineering attack happens when …
and systems in order to acquire sensitive data. A social engineering attack happens when …
Cybersecurity in Fitness Devices-A Systematic Literature Review
Wearable devices are becoming increasingly popular, with users adopting them for a wide
range of purposes. For example, fitness equipment can now perform new functions such as …
range of purposes. For example, fitness equipment can now perform new functions such as …
A Survey of Digital Forensic Tools for Android and iOS Smart Phones
S Ntshangase, N Nelufule, D Mulihase… - … on Cyber Security …, 2024 - ieeexplore.ieee.org
Mobile theft has been an increasing problem in South African cities and townships. This is
also motivated by the black market for cellphone sales, but it has recently emerged that in …
also motivated by the black market for cellphone sales, but it has recently emerged that in …