標(biāo)題: Titlebook: Handbook of Big Data and IoT Security; Ali Dehghantanha,Kim-Kwang Raymond Choo Book 2019 Springer Nature Switzerland AG 2019 big data secu [打印本頁] 作者: 惡化 時間: 2025-3-21 17:48
書目名稱Handbook of Big Data and IoT Security影響因子(影響力)
書目名稱Handbook of Big Data and IoT Security影響因子(影響力)學(xué)科排名
書目名稱Handbook of Big Data and IoT Security網(wǎng)絡(luò)公開度
書目名稱Handbook of Big Data and IoT Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Handbook of Big Data and IoT Security被引頻次
書目名稱Handbook of Big Data and IoT Security被引頻次學(xué)科排名
書目名稱Handbook of Big Data and IoT Security年度引用
書目名稱Handbook of Big Data and IoT Security年度引用學(xué)科排名
書目名稱Handbook of Big Data and IoT Security讀者反饋
書目名稱Handbook of Big Data and IoT Security讀者反饋學(xué)科排名
作者: encomiast 時間: 2025-3-21 21:24
Towards Indeterminacy-Tolerant Access Control in IoT,access control models, even those that introduce some form of resiliency into the access decision process, cannot make a correct access decision in unpredicted scenarios, which are typically found in IoT due to its inherent characteristics that amplify indeterminacy. Therefore, this work stresses th作者: Carcinoma 時間: 2025-3-22 02:49
Distributed Filesystem Forensics: Ceph as a Case Study, become a priority in Ceph file system. In this paper, we are presenting residual evidences of users’ activities on Ceph file system on Linux Ubuntu 12.4 operating system and discuss the forensics relevance and importance of detected evidences. This research follows a well-known cloud forensics fram作者: CALL 時間: 2025-3-22 05:35 作者: AGOG 時間: 2025-3-22 10:54
Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications,puts used during the test and how these samples were collected or created. In this paper, we introduce a technique to leverage from the different crashes discovered from two fuzzing approaches to improve fuzzers by concentrating on utilised test cases. The code coverage is used as an efficiency metr作者: Altitude 時間: 2025-3-22 14:36
Therapy and Emotions in Film and Televisionaccess control models, even those that introduce some form of resiliency into the access decision process, cannot make a correct access decision in unpredicted scenarios, which are typically found in IoT due to its inherent characteristics that amplify indeterminacy. Therefore, this work stresses th作者: Fester 時間: 2025-3-22 17:30
Infectious Diseases: Bacterial Infections, become a priority in Ceph file system. In this paper, we are presenting residual evidences of users’ activities on Ceph file system on Linux Ubuntu 12.4 operating system and discuss the forensics relevance and importance of detected evidences. This research follows a well-known cloud forensics fram作者: 上釉彩 時間: 2025-3-22 22:17 作者: 拍下盜公款 時間: 2025-3-23 04:25
Scott F. M. Duncan,Christopher W. Flowersputs used during the test and how these samples were collected or created. In this paper, we introduce a technique to leverage from the different crashes discovered from two fuzzing approaches to improve fuzzers by concentrating on utilised test cases. The code coverage is used as an efficiency metr作者: 礦石 時間: 2025-3-23 06:15
Book 2019tern noise from the captured image..?In addition to the IoT access control and?forensic frameworks, this handbook covers a?cyber defense triage process for nine advanced?persistent threat (APT) groups targeting IoT?infrastructure, namely: APT1, Molerats, Silent?Chollima, Shell Crew, NetTraveler,?Pro作者: 迫擊炮 時間: 2025-3-23 11:08
https://doi.org/10.1007/978-3-030-10543-3big data security; IoT security; cyber threat intelligence; cyber threat hunting; cyber security; digital作者: 含糊其辭 時間: 2025-3-23 16:30
Ali Dehghantanha,Kim-Kwang Raymond ChooProvides a unique and interdisciplinary view to security challenge in both IoT and Big Data platforms.Covers all aspects of system defense from attack detection to prevention and analysis.Offers foren作者: 開始從未 時間: 2025-3-23 20:26 作者: OTTER 時間: 2025-3-24 00:18
Springer Nature Switzerland AG 2019作者: Crater 時間: 2025-3-24 05:56 作者: 可忽略 時間: 2025-3-24 10:02 作者: apropos 時間: 2025-3-24 12:20 作者: jungle 時間: 2025-3-24 18:19
Christoph Seeger,Qing Zhu,Ju-Tao Guoysis, and presentation of key evidential data from both client and server environments. Using the proposed framework to guide the investigation of Seafile, a popular open-source private cloud storage service, we demonstrate the types of client and server side artefacts that can be forensically recovered.作者: exceptional 時間: 2025-3-24 20:54
Horacio J. Adrogué,Wadi N. SukiPTs must be able to research and analyse previous attacks by the groups in order to tailor a cyber defence triage process based on the attacker’s modus operandi. In this paper we attempt to do just that using Diamond Model and kill chain analysis to craft a course of action matrix for three example APT groups.作者: 編輯才信任 時間: 2025-3-24 23:16
Liv Kraemer,Angela M. Christianons. The study found that despite the complex nature of some adversaries, often straightforward methods could be employed at various levels in a networked environment to detract from the ability presented by some of the known threats.作者: LASH 時間: 2025-3-25 05:22
Private Cloud Storage Forensics: Seafile as a Case Study,ysis, and presentation of key evidential data from both client and server environments. Using the proposed framework to guide the investigation of Seafile, a popular open-source private cloud storage service, we demonstrate the types of client and server side artefacts that can be forensically recovered.作者: 放棄 時間: 2025-3-25 09:54
Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, SilenPTs must be able to research and analyse previous attacks by the groups in order to tailor a cyber defence triage process based on the attacker’s modus operandi. In this paper we attempt to do just that using Diamond Model and kill chain analysis to craft a course of action matrix for three example APT groups.作者: 神化怪物 時間: 2025-3-25 14:56 作者: engrave 時間: 2025-3-25 16:28
Sequencing in Short-Term Psychotherapy,ing in their proportional contribution to the dataset whereas the established leader in production, China, is decreasing in dominance. Trends in keyword use showed that the proportion of research relating to Wireless Sensor Networks and RFID technology is decreasing, while the proportion of research into the area of IoT privacy is growing.作者: 前兆 時間: 2025-3-25 23:13 作者: seruting 時間: 2025-3-26 02:11
https://doi.org/10.1007/978-981-287-748-2methods of assessment. The carried out analysis used one of the popular models for identifying cyber threats named Cyber Kill Chain. We proposed a hierarchy based on dataset sample in different stage of malware lifecycle.作者: evasive 時間: 2025-3-26 08:16 作者: Cholecystokinin 時間: 2025-3-26 08:53
There Is No Theory of Everythingbotnet detection have been reduced recently, which could be because of overwhelming existing literature in the field. Asia is the most active and most productive continent in botnet research and computer science is the research area with most publications related to botnet detection as expected.作者: 小木槌 時間: 2025-3-26 13:55
A Bibliometric Analysis of Authentication and Access Control in IoT Devices,ing in their proportional contribution to the dataset whereas the established leader in production, China, is decreasing in dominance. Trends in keyword use showed that the proportion of research relating to Wireless Sensor Networks and RFID technology is decreasing, while the proportion of research into the area of IoT privacy is growing.作者: 微生物 時間: 2025-3-26 18:31 作者: 招募 時間: 2025-3-26 21:23
A Cyber Kill Chain Based Analysis of Remote Access Trojans,methods of assessment. The carried out analysis used one of the popular models for identifying cyber threats named Cyber Kill Chain. We proposed a hierarchy based on dataset sample in different stage of malware lifecycle.作者: 小卷發(fā) 時間: 2025-3-27 02:18
Bibliometric Analysis on the Rise of Cloud Security,research areas, keywords, and also highly cited articles. We found that countries of China, India and United States are the top contributor of the findings. Trends in number of publication in the area of cloud security increases and the number of related keywords increases as well.作者: RAGE 時間: 2025-3-27 07:55 作者: 比喻好 時間: 2025-3-27 10:56
Privacy of Big Data: A Review,uitful researches are made in privacy preservation. This book chapter lays emphases on the state-of-art privacy preserving data mining mechanisms and reviews the application of these mechanisms in big data environment.作者: Infuriate 時間: 2025-3-27 16:39 作者: Myosin 時間: 2025-3-27 20:18 作者: ARC 時間: 2025-3-28 00:37 作者: Bridle 時間: 2025-3-28 02:14 作者: lattice 時間: 2025-3-28 08:33
Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case St, we simulate the scenario of a typical Minecraft setting, using a Linux Ubuntu 16.04.3 machine, acting as the MMOG server, and client devices running Minecraft. Then, we forensically examine both server and client devices to reveal the type and extent of evidential artefacts that can be extracted.作者: 厚顏無恥 時間: 2025-3-28 12:52 作者: addict 時間: 2025-3-28 15:59
Big Data and Internet of Things Security and Forensics: Challenges and Opportunities,rk, we need to be able to effectively utilize big data analytical techniques and solutions and ensure the security and privacy of IoT data and services against the broad range of attackers. Further complicating the challenge is the increasing number of nodes and complexity of the IoT network and eco作者: 亞當(dāng)心理陰影 時間: 2025-3-28 20:42
Privacy of Big Data: A Review,s generated in the digital era. But, this huge data can be tracked and used for monetary benefits which thwart individual’s privacy. Hence numerous fruitful researches are made in privacy preservation. This book chapter lays emphases on the state-of-art privacy preserving data mining mechanisms and 作者: 潛伏期 時間: 2025-3-28 23:44 作者: acclimate 時間: 2025-3-29 05:12 作者: AUGER 時間: 2025-3-29 10:25
Private Cloud Storage Forensics: Seafile as a Case Study,, Google Drive, and iCloud). Existing research generally focuses on public cloud forensics (e.g., client device forensics), rather than private cloud forensics (e.g., both client and server forensics). In this paper, we aim to address the gap by proposing a framework for forensics investigations of 作者: Aspiration 時間: 2025-3-29 13:56
Distributed Filesystem Forensics: Ceph as a Case Study, medium enterprises (SMEs). Depending on the business requirements there are various Cloud solution providers and services, yet because of this it becomes increasingly difficult for a digital investigator to collect and analyse all the relevant data when there is a need. Due to the complexity and in作者: 圣人 時間: 2025-3-29 16:28
Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case St popular, particularly with younger audiences, it is no surprise that the interactive nature of Minecraft has facilitated the commission of criminal activities such as denial of service attacks against gamers, cyberbullying, swatting, sexual communication, and online child grooming. In this research作者: frozen-shoulder 時間: 2025-3-29 23:16
Big Data Forensics: Hadoop Distributed File Systems as a Case Study,nsics investigators. The Hadoop Distributed File System (HDFS) is one of the most favourable big data platforms within the market, providing an unparalleled service with regards to parallel processing and data analytics. However, HDFS is not without its risks, having been reportedly targeted by cybe作者: Hiatus 時間: 2025-3-30 00:50 作者: 走路左晃右晃 時間: 2025-3-30 06:52
Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silenent adversaries. These groups are known as advanced persistent threats and they are a growing concern for governments and industries around the world. APTs may be backed by terrorist organisations, hacktivists or even nation state actors, conducting covert cyber-warfare against other countries. Due 作者: 抓住他投降 時間: 2025-3-30 08:52 作者: 火光在搖曳 時間: 2025-3-30 12:30
A Cyber Kill Chain Based Analysis of Remote Access Trojans,yber attackers the opportunity to think about attacking, damaging or hindering the working process of important infrastructures of the country. Figuring out these threats and weak points which are used by malwares like Trojans, considering the evolution of used techniques for preventing identificati作者: Odyssey 時間: 2025-3-30 17:25
Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications,Enhancing fuzzing performance and efficiency to enable testing these software samples is a challenge. Fuzzing is an automated technique widely used to provide software quality assurance during testing to find flaws and bugs by providing random or invalid inputs to a computer software. However, the t作者: vanquish 時間: 2025-3-30 23:11
Bibliometric Analysis on the Rise of Cloud Security,research is directed toward securing cloud platforms. Majority of cloud security related research or studies are emphasising on looking into prevention, detection, and mitigation methods against the threat in cloud computing. Although there are many research studies in this area, there are still no 作者: 小樣他閑聊 時間: 2025-3-31 01:36
A Bibliometric Analysis of Botnet Detection Techniques,ing, click fraud, and so on. As of late, detecting botnet has been an intriguing research topic in relation to cybercrime analysis and cyber-threat prevention. This paper is an analysis of publications related to botnet detection techniques. We analyse 194 botnet related papers published between 200