A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues
Tóm tắt
Từ khóa
Tài liệu tham khảo
2019, ISO/IEC 30121 2015—Information Technology—Governance of Digital Forensic Risk Framework
2019, ISO/IEC 27018 2019—Information Technology—Security Techniques—Code of Practice for Protection of Personally Identifiable Information (PII) in Public Clouds Acting as PII Processors
2019, ISO/IEC 27017 2015—Information Technology—Security Techniques—Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services
2019, ISO/IEC WD 27031—Information Technology—Guidelines for ICT Readiness for Business Continuity
2014, ISO/IEC 27031 2011 BSI—Information Technology—Security Techniques—Guidelines for Information and Communication Technology Readiness for Business Continuity
2019, ISO/IEC 20546 2019—Information Technology—Big Data—Overview and Vocabulary
2019, ISO/IEC WD 27030—Information Technology—Security Techniques—Guidelines for Security and Privacy in Internet of Things (IoT) Title Missing
2019, ISO 22320 2018—Security and Resilience—Emergency Management—Guidelines for Incident Management
krivchenkov, 2019, Intelligent Methods in Digital Forensics State of the Art, 1
2019, ISO/IEC 27050-1 2016—Information Technology—Security Techniques—Electronic Discovery—Part 1 Overview and Concepts
2019, ISO/IEC FDIS 27050-1—Information Technology—Electronic Discovery—Part 1 Overview and Concepts
lillis, 2016, Current challenges and future research areas for digital forensic investigation, The 11th ADFSL Conference on Digital Forensics Security and Law (CDFSL)
hossain, 2018, Towards a holistic framework for secure, privacy-aware, and trustworthy Internet of Things using resource-efficient cryptographic schemes
2017, 2017 Cost of Data Breach Study Global Overview, 1
chapman, 2018, Intruder detection through pattern matching and provenance driven data recovery, Proc of IEEE Cloud Computing, 58
serenhov, 2018, Forensic breach response in compliance with GDPR
zhao, 2018, Could block chain technology help resolve the cloud forensic problem?, Proc 9th Int Conf Cloud Comput GRIDs Virtual Cloud Comput, 39
wen, 2013, Forensics-as-a-service (FaaS): Computer forensic workflow management and processing using cloud, Proc of IEEE Cloud Computing, 208
du, 2017, Evaluation of digital forensic process models with respect to digital forensics as a service, Proc 15th Eur Conf Cyber Warfare Security (ECCWS), 573
shalaginov, 2017, Big Data Analytics by Automated Generation of Fuzzy Rules for Network Forensics Readiness, 52
adeel, 2019, A Survey on the Role of Wireless Sensor Networks and IoT in Disaster Management, 57
2019, Small Unmanned Air System (SUAS) Assessment
2019, Gatwick Airport in Fresh Drone Drama as Flights Are Forced to Divert to Stansted When Device Is Spotted Nearby
rahman, 2016, Internet of Things mobility forensics, Proc Inf Security Res Educ (INSuRE) Conf (INSuRECon), 1
joseph, 2019, An analysis of digital forensics in cyber security, Proc Adv Intell Syst Comput, 815, 701, 10.1007/978-981-13-1580-0_67
lone, 2017, Forensic-chain: Ethereum blockchain based digital forensics, Sci Practical Cyber Secur J, 1, 21
nieto, 2018, IoT-forensics meets privacy: Towards cooperative digital investigations, SENSORS, 18, 492e, 10.3390/s18020492
2019, ISO/IEC 27042 2015—Information Technology—Security Techniques—Guidelines for the Analysis and Interpretation of Digital Evidence
2014, ISO/IEC 27041—Guidance on Assuring Suitability and Adequacy of Incident Investigative Methods
2015, ISO/IEC 27040 2015(E)—Information Technology—Security Techniques—Storage Security
2005, ISO/IEC 27001 2005 Information Technology—Security Techniques—Specification for an Information Security Management System
2014, ISO/IEC 27037 2012—Information Technology—Security Techniques—Guidelines for Identification Collection Acquisition and Preservation of Digital Evidence
2019, ISO/IEC WD 27035-2—Information Technology—Security Techniques—Information Security Incident Management—Part 2 Guidelines to Plan and Prepare for Incident Management
2019, ISO/IEC 27035-2 2016—Information Technology—Security Techniques—Information Security Incident Management—Part 2 Guidelines to Plan and Prepare for Incident Response
2019, ISO/IEC WD 27035-1—Information Technology—Security Techniques—Information Security Incident Management—Part 1 Principles of Incident Management
lally, 2018, Towards a Framework for Testing the Security of IoT Devices Consistently, 88
2018, Global Economic Crime and Fraud Survey 2018
2019, ISO/IEC 27035–1 2016—Information Technology—Security Techniques—Information Security Incident Management—Part 1 Principles of Incident Management
2019, Scientific Working Group on Digital Evidence
leverett, 2017, Standardisation and certification of safety, security and privacy in the ‘Internet of Things
alenezi, 2017, The impact of cloud forensic readiness on security, Proc 7th Int Conf Cloud Comput Services Sci, 539, 10.5220/0006332705390545
feng, 2018, A new digital forensics model of smart city automated vehicles, Proc IEEE Int Conf Internet Things IEEE Green Comput Commun IEEE Cyber Phys Soc Comput IEEE Smart Data iThings-GreenCom-CPSCom-SmartData, 274
abdul-ghani, 2018, A comprehensive IoT attacks survey based on a building-blocked reference model, Int J Adv Comput Sci Appl, 9, 355
chi, 2019, A framework for IoT data acquisition and forensics analysis, Proc IEEE Int Conf Big Data, 5142
2017, Discover Key Trends & Insights on Disruptive Technologies & IoT Innovations
2019, Industrial IoT (IIoT) Market Size & Forecast to 2026
patel, 2013, Forensic investigation life cycle (FILC) using 6 ‘R’policy for digital evidence collection and legal prosecution, Int J Emerg Trends Sci Technol, 2, 129
cosic, 2012, Chain of custody and life cycle of digital evidence, Comput Technol Apl, 3, 126
joshi, 2016, Computer Communications and Networks Fundamentals of Network Forensics A Research Perspective
2019, Major DDoS Attacks Involving IoT Devices
2019, Cybersecurity Vulnerabilities Identified in St Jude Medical’s Implantable Cardiac Devices and Merlin home Transmitter FDA Safety Communication
james, 2017, Jurisdictional issues in cloud forensics, Proc Int Symp Hum Aspects Inf Secur Assurance (HAISA), 225
2019, YouTube Hours of Video Uploaded Every Minute 2019—Statista
2018, Top 10 Strategic IoT Technologies and Trends
rughani, 2017, IoT evidence acquisition—Issues and challenges, Res India Publ, 10, 1285
garfinkel, 2006, Forensic feature extraction and cross-drive analysis, Journal of digital investigation, 3, 71, 10.1016/j.diin.2006.06.007
2015, National Technical Authority for Information Assurance “Good Practice Forensics Readiness Guideline ”
hegarty, 2014, Digital evidence challenges in the Internet of Things, Proc 10th Int Netw Conf (INC), 163
kamble, 2015, Digital forensic tools: A comparative approach, Journal of Advanced Science and Engineering Research, 4, 157
arshad, 2018, Digital forensics: Review of issues in scientific validation of digital evidence, J Inf Process Syst, 14, 346
2014, Cloud Computing Forensic Science Challenges—Draft NISTIR 8006
2019, Merit Medical Endotek—Products
2018, Autonomous Vehicle Sales Forecast 2018
toldinas, 2016, Suitability of the digital forensic tools for investigation of cyber crime in the Internet of Things and Services, Proc 3rd Int Virtual Res Conf Tech Discip, 3, 86
2019, The Drone Market Report 2019 Commercial Drone Market Size and Forecast (2019–2024)
rana, 2017, Taxonomy of digital forensics: Investigation tools and challenges, arXiv 1709 06529
2019, Smart Home Report 2019
2019, Digital Health Market Share Trends 2019–2025 Growth Forecast Report
2018, Forecast Wearable electronic devices worldwide
blanchard, 2019, Brexit GDPR and Data Protection What Happens If the U K Becomes a Third Country—Data Protection Network
oriwoh, 2014, Internet of Things: The argument for smart forensics, Handbook of Research on Digital Crime, 42, 1
2015, Forensics Science International
adjei, 2018, A review of digital forensic challenges in the Internet of Things (IoT), Int J Mech Eng Technol, 9, 915
2015, ISO/IEC-27043—Information Technology—Security Techniques—Incident Investigation Principles and Processes
2019, ISO/IEC 29100 2011/Amd 1 2018—Information Technology—Security Techniques—Privacy Framework—Amendment 1 Clarifications
babun, 2018, IoTDots: A digital forensics framework for smart environments
oham, 2018, A blockchain based liability attribution framework for autonomous vehicles, arXiv preprint arxiv 1802 05807
jonsson, 2019, Ericsson mobility report, 28
2018, Internet Security Threat Report (ISTR) Volume 23
verma, 2018, DF 2.0: Designing an automated, privacy preserving, and efficient digital forensic framework, Proc ADFSL Conf Digit Forensics Secur Law, 127
le, 2019, BIFF: A blockchain-based IoT forensics framework with identity privacy, Proc IEEE Int Conf TENCON, 2372
ejaz, 2019, Blockchain Technology for Security and Privacy in Internet of Things, 47
balogun, 2013, Privacy impacts of data encryption on the efficiency of digital forensics technology, Int J Adv Comput Sci Appl, 4, 36
2018, The State Of GDPR Readiness
2019, First Overview on the Implementation of the GDPR and the Roles and Means of the National Supervisory Authorities
duncan, 2018, Using unikernels to address the cloud forensic problem and help achieve EU GDPR compliance, Proc 9th Int Conf Cloud Comput GRIDs Virtual Cloud Comput, 71
cook, 2018, Internet of Cloud Security and Privacy Issues, 271
2016, JOURNEY to CLOUD
2016, Cloud Computing Top Threats in 2016
2018, Forecast Public Cloud Services Worldwide (2010–2016)
c?olakovi?, 2018, Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues, Comput Netw, 144, 17, 10.1016/j.comnet.2018.07.017
ahmed, 2017, Minimization of security issues in cloud computing, J Inf Commun Technol Robot Appl, 3, 1
hou, 2019, IaaS vs PaaS vs SaaS Enter the Ecommerce Vernacular What You Need to Know Examples & More
2019, The Definitive Guide to Encryption Key Management Fundamentals
stoyanov, 2014, An approach to use the Web services and open source software to store and share user applications and data, Proc Annu Univ Sci Conf NVU, 9, 92