Security aspects of Internet of Things aided smart grids: A bibliometric survey
Security aspects of Internet of Things aided smart grids: A bibliometric survey Abstract: The integration of sensors and communication technology
Read more.
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments Abstract: Current authentication protocols seek to
Read more.
A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids
A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids Abstract: Smart grid technology increases
Read more.
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking Abstract: Security is one of the most challenging issues in
Read more.
A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment
A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment Abstract: Vulnerability assessment (e.g., vulnerability
Read more.
Fuzzy pattern tree for edge malware detection and categorization in IoT
Fuzzy pattern tree for edge malware detection and categorization in IoT Abstract: The surging pace of Internet of Things (IoT)
Read more.
A systematic literature review of blockchain cyber security
A systematic literature review of blockchain cyber security Abstract: Since the publication of Satoshi Nakamoto’s white paper on Bitcoin in
Read more.
An opcode‐based technique for polymorphic Internet of Things malware detection
An opcode‐based technique for polymorphic Internet of Things malware detection Abstract: The increasing popularity of Internet of Things (IoT) devices
Read more.
Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study
Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study Abstract: Minecraft, a Massively Multiplayer Online
Read more.
An analysis of anti-forensic capabilities of B-tree file system (Btrfs)
An analysis of anti-forensic capabilities of B-tree file system (Btrfs) Abstract: Anti-forensic techniques aim to prevent, hinder or corrupt the
Read more.
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer Abstract: Ransomware, a malware designed to encrypt data
Read more.
Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as
Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as
Read more.
Security in Online Games: Current Implementations and Challenges
Security in Online Games: Current Implementations and Challenges Abstract: Security in online gaming is a growing target for hackers due
Read more.
Bibliometric Analysis on the Rise of Cloud Security
Bibliometric Analysis on the Rise of Cloud Security Abstract: Cloud storage systems are becoming a gold mine for cyber attackers
Read more.
A Bibliometric Analysis of Botnet Detection Techniques
A Bibliometric Analysis of Botnet Detection Techniques Abstract: Botnets are rising as a platform for many unlawful cyber activities such
Read more.
Private Cloud Storage Forensics: Seafile as a Case Study
Private Cloud Storage Forensics: Seafile as a Case Study Abstract: Cloud storage forensics is an active research area, and this
Read more.
A Bibliometric Analysis of Authentication and Access Control in IoT Devices
A Bibliometric Analysis of Authentication and Access Control in IoT Devices Abstract:   In order to be considered secure, the
Read more.
Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform
Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform Abstract: The
Read more.
A Cyber Kill Chain Based Analysis of Remote Access Trojans
A Cyber Kill Chain Based Analysis of Remote Access Trojans Abstract: Computer networks and industrial systems are always under cyber
Read more.
Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications
Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications Abstract: The proliferation of Internet of Things
Read more.
Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats
Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats Abstract: One of
Read more.
Big Data Forensics: Hadoop Distributed File Systems as a Case Study
Big Data Forensics: Hadoop Distributed File Systems as a Case Study Abstract: Big Data has fast become one of the
Read more.
Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin
Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin Abstract: Many
Read more.
A hierarchical key pre-distribution scheme for fog networks
A hierarchical key pre-distribution scheme for fog networks Abstract: Security in fog computing is multi‐faceted, and one particular challenge is
Read more.
A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure
A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure Abstract: Insider attacks
Read more.
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting Abstract: Internet of Things (IoT) devices
Read more.
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning Abstract: Internet of Things (IoT) in military
Read more.
Forensics Investigation of OpenFlow-Based SDN Platforms
Forensics Investigation of OpenFlow-Based SDN Platforms Abstract: Software Defined Networking (SDN) is an increasingly common implementation for virtualization of networking
Read more.
BoTShark: A Deep Learning Approach for Botnet Traffic Detection
BoTShark: A Deep Learning Approach for Botnet Traffic Detection Abstract: While botnets have been extensively studied, bot malware is constantly
Read more.
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies Abstract: Various researchers have
Read more.
Cyber Threat Intelligence: Challenges and Opportunities
Cyber Threat Intelligence: Challenges and Opportunities Abstract: The ever increasing number of cyber attacks requires the cyber security and forensic
Read more.
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence Abstract: Darknet technology such as Tor has been used by various threat actors
Read more.
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial Abstract: Malware analysis and detection techniques have been evolving during
Read more.
Mobile Forensics: A Bibliometric Analysis
Mobile Forensics: A Bibliometric Analysis Abstract: In the past few years mobile devices have advanced in a variety of ways
Read more.
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection Abstract: Ransomware has become a significant global threat with the
Read more.
CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction
CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction Abstract: Data extraction from files is a prevalent activity
Read more.
On the Understanding of Gamification in Blockchain Systems
On the Understanding of Gamification in Blockchain Systems Abstract: Blockchain is a new trend rising fast from the community and
Read more.
Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security
Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security Abstract: Blockchain is a promising infrastructural technology
Read more.
Torture-free cyberspace – a human right
Torture-free cyberspace – a human right Abstract: Definitions of torture range from the emotive to the legal. The media sometimes
Read more.
Intelligent OS X malware threat detection with code inspection
Intelligent OS X malware threat detection with code inspection Abstract: With the increasing market share of Mac OS X operating
Read more.
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. Abstract: Emergence of crypto-ransomware has significantly changed
Read more.
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks Abstract: The physical
Read more.
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence Abstract: Malware such as banking Trojans are
Read more.
CloudMe forensics: A case of big data forensic investigation
CloudMe forensics: A case of big data forensic investigation Abstract: The significant increase in the volume, variety, and velocity of
Read more.
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
Detecting crypto-ransomware in IoT networks based on energy consumption footprint Abstract: An Internet of Things (IoT) architecture generally consists of
Read more.
Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study
Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study Abstract: The pervasive nature of cloud-enabled big data storage
Read more.
Machine learning aided Android malware classification
Machine learning aided Android malware classification Abstract: The widespread adoption of Android devices and their capability to access significant private
Read more.
Experimenting with docker: Linux container and base OS attack surfaces
Experimenting with docker: Linux container and base OS attack surfaces Abstract: Linux containers showed great superiority when compared to virtual
Read more.
A Closer Look at Syncany Windows and Ubuntu Clients’ Residual Artefacts
A Closer Look at Syncany Windows and Ubuntu Clients’ Residual Artefacts Abstract: In this paper, we seek to determine the
Read more.
Cloud Storage Forensic: hubiC as a Case-Study
Cloud Storage Forensic: hubiC as a Case-Study Abstract: In today’s society where we live in a world of constant connectivity,
Read more.
Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine
Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine Abstract: Instant messaging applications (apps) are one
Read more.
Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as
Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as
Read more.
Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies
Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies Abstract: The development of a mobile
Read more.
Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors
Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors Abstract: This paper uses a scenario-based,
Read more.
Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model
Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model Abstract: The increasing pervasiveness of Internet-connected
Read more.
Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud
Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud Abstract: STorage as a Service (STaaS) cloud services
Read more.
Ubuntu One investigation: Detecting evidences on client machines
Ubuntu One investigation: Detecting evidences on client machines Abstract: STorage as a Service (STaaS) cloud services have been adopted by
Read more.
Investigating the antecedents to the adoption of SCRM technologies by start-up companies
Investigating the antecedents to the adoption of SCRM technologies by start-up companies Abstract: Despite their fairly recent emergence, start-up companies
Read more.
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks Abstract: With increasing reliance
Read more.
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study Abstract: Cloud
Read more.
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing Abstract: Widespread adoption of cloud computing has increased the
Read more.
Digital forensics: the missing piece of the Internet of Things promise
Digital forensics: the missing piece of the Internet of Things promise Abstract: As technology advances at a blinding pace, the
Read more.
Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study
Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study Abstract: Researchers envisioned Storage as a Service (StaaS)
Read more.
Cloud storage forensics: MEGA as a case study
Cloud storage forensics: MEGA as a case study Abstract: The increasing use of smartphones and cloud storage apps allows users
Read more.
Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies
Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies Abstract: Instant messaging (IM) has changed the way people
Read more.
Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices Abstract: In today’s Internet-connected world, mobile
Read more.
SugarSync forensic analysis
SugarSync forensic analysis Abstract: Cloud storage services are popular with both individuals and businesses as they offer cost-effective, large capacity
Read more.
Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms
Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms Abstract: The
Read more.
Privacy-respecting digital investigation
Privacy-respecting digital investigation Abstract: The forensics investigation requirements are in direct conflict with the privacy rights of those whose actions
Read more.
Exploit Kits: The production line of the Cybercrime Economy?
Exploit Kits: The production line of the Cybercrime Economy? Abstract: The annual cost of Cybercrime to the global economy is
Read more.
Machine learning aided Android malware classification
Machine learning aided Android malware classification Abstract: The widespread adoption of Android devices and their capability to access significant private
Read more.
M0Droid: An Android Behavioral-Based Malware Detection Model
M0Droid: An Android Behavioral-Based Malware Detection Model Abstract:Anti-mobile malware has attracted the attention of the research and security community in
Read more.