Information security and digital forensics in the world of cyber physical systems
|
conference
|
September 2016 |
Radio Frequency Fingerprint Extraction of Radio Emitter Based on I/Q Imbalance
|
journal
|
January 2017 |
Impacts of increasing volume of digital forensic data: A survey and future research challenges
|
journal
|
December 2014 |
Cross-Layer Attack and Defense in Cognitive Radio Networks
|
conference
|
December 2010 |
A Forensic Taxonomy of SCADA Systems and Approach to Incident Response
- Eden, Peter; Blyth, Andrew; Burnap, Pete
-
3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015), Electronic Workshops in Computing
https://doi.org/10.14236/ewic/ICS2015.5
|
conference
|
September 2015 |
A review of passive forensic techniques for detection of copy-move attacks on digital videos
- Sharma, Shashank; Dhavale, Sunita V.
-
2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS ), 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)
https://doi.org/10.1109/ICACCS.2016.7586396
|
conference
|
January 2016 |
Detecting rogue attacks on commercial wireless Insteon home automation systems
|
journal
|
May 2018 |
Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints
|
journal
|
June 2015 |
System-level design solutions: Enabling the IoT explosion
|
conference
|
November 2015 |
SCADA Systems: Challenges for Forensic Investigators
|
journal
|
December 2012 |
Forensic Readiness for SCADA/ICS Incident Response
|
conference
|
August 2016 |
Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles
|
journal
|
July 2016 |
A Practical Method for Grid Structures Damage Location
|
journal
|
January 2015 |
Cross-layer design for reducing delay and maximizing lifetime in industrial wireless sensor networks
|
journal
|
March 2018 |
Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting
|
journal
|
July 2018 |
Guide to Industrial Control Systems (ICS) Security
|
report
|
May 2015 |
Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems
|
conference
|
January 2013 |
Network forensic frameworks: Survey and research challenges
|
journal
|
October 2010 |
FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things
|
conference
|
June 2015 |
Effective identification of source code authors using byte-level information
|
conference
|
January 2006 |
Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities
- Zawoad, Shams; Hasan, Ragib
-
2015 IEEE 17th International Conference on High-Performance Computing and Communications; 2015 IEEE 7th International Symposium on Cyberspace Safety and Security; and 2015 IEEE 12th International Conference on Embedded Software and Systems, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems
https://doi.org/10.1109/HPCC-CSS-ICESS.2015.305
|
conference
|
August 2015 |
An Overview of Radio Frequency Fingerprinting for Low-End Devices
|
journal
|
July 2014 |
Radio frequency fingerprinting commercial communication devices to enhance electronic security
|
journal
|
January 2008 |
Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features
|
journal
|
May 2018 |
The future for the policing of cybercrime
|
journal
|
January 2004 |
Network forensics: Review, taxonomy, and open challenges
|
journal
|
May 2016 |
Modeling the network forensics behaviors
|
conference
|
January 2005 |
A Cross-Layer Wireless Sensor Network Energy-Efficient Communication Protocol for Real-Time Monitoring of the Long-Distance Electric Transmission Lines
|
journal
|
January 2015 |
Towards a SCADA Forensics Architecture
- Wu, Tina; Disso, Jules Ferdinand Pagna; Jones, Kevin
-
1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013), Electronic Workshops in Computing
https://doi.org/10.14236/ewic/ICSCSR2013.2
|
conference
|
September 2013 |
Big forensic data reduction: digital forensic images and electronic evidence
|
journal
|
March 2016 |
Radio Frequency Fingerprint Extraction Based on Multidimension Permutation Entropy
|
journal
|
January 2017 |
Anomaly-based network intrusion detection: Techniques, systems and challenges
|
journal
|
February 2009 |
Network Forensics: An Analysis of Techniques, Tools, and Trends
|
journal
|
December 2012 |
A unified data mining solution for authorship analysis in anonymous textual communications
|
journal
|
May 2013 |
The cyber threat landscape: Challenges and future research directions
|
journal
|
November 2011 |
Radio frequency fingerprinting based on the constellation errors
|
conference
|
October 2012 |
Probabilistic Radio-Frequency Fingerprinting and Localization on the Run
|
journal
|
February 2014 |