Academic literature on the topic 'Iot forensics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Iot forensics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Iot forensics"

1

Stuff, Michael Acquah. "Integration of Cloud in Mobile Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 24, 2022): 125–30. http://dx.doi.org/10.22624/aims/crp-bk3-p21.

Full text
Abstract:
With emerging technology and the connection of electronic devices to the internet, Internet of Things (IoT) has become part of human life. From the development of smartphones to smartwatches and smart-homes, electronic devices now have the capability of performing human activities or aiding humans in performing activities such as turning hall lights on or off with their voice. Although a large number of people use these devices for the greater good, a few individuals or group of people hide behind these devices to perform malicious activities. In order to apprehend and prosecute perpetuators who hide behind smart devices for evil gains, forensic examinations or investigations must be conducted. This review aims to identify digital forensic challenges in IoT. The inclusion criteria for this paper were international journals, articles, conference papers and case studies published from 2019 to 2022. Thematic analysis was used to analyze and synthesis the literature. Three themes emerged from the analysis; automated compromised smart-home tracer; data volatility and reconstruction; IoT forensic investigation framework. This integrative review combines evidence of digital forensic challenges in diverse IoT devices. Keyword IoT forensics, IoT challenges, Digital forensics, Smart-home forensics.
APA, Harvard, Vancouver, ISO, and other styles
2

Quist, Albert. "Digital Forensic Challenges in Internet of Things (IoT)." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 23, 2022): 119–24. http://dx.doi.org/10.22624/aims/crp-bk3-p20.

Full text
Abstract:
With emerging technology and the connection of electronic devices to the internet, Internet of Things (IoT) has become part of human life. From the development of smartphones to smartwatches and smart-homes, electronic devices now have the capability of performing human activities or aiding humans in performing activities such as turning hall lights on or off with their voice. Although a large number of people use these devices for the greater good, a few individuals or group of people hide behind these devices to perform malicious activities. In order to apprehend and prosecute perpetuators who hide behind smart devices for evil gains, forensic examinations or investigations must be conducted. This review aims to identify digital forensic challenges in IoT. The inclusion criteria for this paper were international journals, articles, conference papers and case studies published from 2019 to 2022. Thematic analysis was used to analyze and synthesis the literature. Three themes emerged from the analysis; automated compromised smart-home tracer; data volatility and reconstruction; IoT forensic investigation framework. This integrative review combines evidence of digital forensic challenges in diverse IoT devices. Keyword IoT forensics, IoT challenges, Digital forensics, Smart-home forensics.
APA, Harvard, Vancouver, ISO, and other styles
3

Liang, Guangjun, Jianfang Xin, Qun Wang, Xueli Ni, and Xiangmin Guo. "Research on IoT Forensics System Based on Blockchain Technology." Security and Communication Networks 2022 (June 15, 2022): 1–14. http://dx.doi.org/10.1155/2022/4490757.

Full text
Abstract:
In recent years, mobile edge computing (MEC) has become a research hotspot in academia. The Internet of Things (IoT) is an excellent way to build the infrastructure required for a MEC environment. Its rich digital tracking repository can provide insights into people's daily activities at home and elsewhere. Meanwhile, due to the open connectivity of the Internet of things devices, they can easily become the target of network attacks and be used by criminals as criminal tools. As a result, civil and criminal cases have increased year by year. This article conducts in-depth research on IoT forensics. By comparing its difference with traditional digital forensics (DF), the definition of IoT forensics is given. We have systematically sorted out the research results since the concept of IoT forensics was proposed in 2013 and proposed a generalized IoT forensics model. By studying blockchain technology and introducing it into the IoT forensics framework, a blockchain-based IoT forensics architecture is further proposed. Further, an alliance chain IoT forensics system is proposed. From the perspective of the data provider and the data visitor, the process of evidence storage and forensics of the IoT system is discussed. Finally, taking Unmanned Aerial Vehicle (UAV) forensics as an example, we give an experiment of IoT forensics analysis.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Yan, Qindong Sun, Dongzhu Rong, Shancang Li, and Li Da Xu. "Image Source Identification Using Convolutional Neural Networks in IoT Environment." Wireless Communications and Mobile Computing 2021 (September 10, 2021): 1–12. http://dx.doi.org/10.1155/2021/5804665.

Full text
Abstract:
Digital image forensics is a key branch of digital forensics that based on forensic analysis of image authenticity and image content. The advances in new techniques, such as smart devices, Internet of Things (IoT), artificial images, and social networks, make forensic image analysis play an increasing role in a wide range of criminal case investigation. This work focuses on image source identification by analysing both the fingerprints of digital devices and images in IoT environment. A new convolutional neural network (CNN) method is proposed to identify the source devices that token an image in social IoT environment. The experimental results show that the proposed method can effectively identify the source devices with high accuracy.
APA, Harvard, Vancouver, ISO, and other styles
5

Hassan, Mohammad, Ghassan Samara, and Mohammad Fadda. "IoT Forensic Frameworks (DFIF, IoTDOTS, FSAIoT): A Comprehensive Study." International Journal of Advances in Soft Computing and its Applications 14, no. 1 (March 28, 2022): 73–83. http://dx.doi.org/10.15849/ijasca.220328.06.

Full text
Abstract:
Abstract In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, the other concerning aspect is the achievement of privacy and security in this connection, especially given the rapid increase in the number of existing and new IoT devices. Concerns, threats, and assaults related to IoT security have been regarded as a potential and problematic area of research. This necessitates the quick development or creation of suitable technologies with the nature of crimes in the IoT environment. On the other hand, criminal investigation specialists encounter difficulties and hurdles due to various locations, data types, instruments used, and device recognition. This paper provides an in-depth explanation of the criminal content of the Internet of Things. It compares its stages to the detailed stages of traditional digital forensics in terms of similarities and differences, the frameworks used in dealing with electronic crimes, and the techniques used in both types. This paper presents previous discussions of researchers in the field of digital forensics. For the IoT, which brings us to the most important parts of this paper, which is a comprehensive study of the IoT criminal frameworks that are used to protect communication in the field of IoT, such as Digital Forensic Investigation Framework (DFIF), Digital Forensic Framework for Smart Environments (IoTDOTS), Forensic State Acquisition from the Internet of Things (FSAIoT), and discusses the challenges in their general frameworks and provides solutions and strategies. Keywords: digital forensic, FSAIoT, IoT, IoT Challenges, IoT Forensic, IoT Framework, IOTDOTS.
APA, Harvard, Vancouver, ISO, and other styles
6

Kwaku, Timothy. "Internet of Things (IoT) & Underwater Network Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 291–300. http://dx.doi.org/10.22624/aims/crp-bk3-p47.

Full text
Abstract:
The proliferation of IoT devices and technology in recent years cannot be overstated. With the diverse area of application, IoT devices will be prone to unscrupulous attacks. Applying digital forensics in this field makes it a multi-faceted area that necessarily implies a lot of challenges out to be addressed in order to ensure compatibility. This research extensively considers existing literature with the view of highlighting the application areas of IoT, underwater networks and digital areas as well the research challenges that needs attention in order to realize a robust IoT and underwater forensics regime. These recommendations as well policy directions were also added Keywords: Internet of Things (IoT), Underwater Network Forensics, Cybersecurity, Compatibility BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Timothy Kwaku (2022): Internet of Things (IoT) & Underwater Network Forensics Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 291-300 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P47
APA, Harvard, Vancouver, ISO, and other styles
7

Haryanto, Eri, and Imam Riadi. "Forensik Internet Of Things pada Device Level berbasis Embedded System." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 6 (December 2, 2019): 703. http://dx.doi.org/10.25126/jtiik.2019661828.

Full text
Abstract:
<p>Perangkat Internet of Things (IoT) merupakan perangkat cerdas yang memiliki interkoneksi dengan jaringan internet global. Investigasi kasus yang menyangkut perangkat IoT akan menjadi tantangan tersendiri bagi investigator forensik. Keberagaman jenis perangkat dan teknologi akan memunculkan tantangan baru bagi investigator forensik. Dalam penelitian ini dititikberatkan forensik di level internal device perangkat IoT. Belum banyak bahkan belum penulis temukan penelitian sejenis yang fokus dalam analisis forensik perangkat IoT pada level device. Penelitian yang sudah dilakukan sebelumnya lebih banyak pada level jaringan dan level cloud server perangkat IoT. Pada penelitian ini dibangun environment perangkat IoT berupa prototype smart home sebagai media penelitian dan kajian tentang forensik level device. Pada penelitian ini digunakan analisis model forensik yang meliputi collection, examination, analysis, dan reporting dalam investigasi forensik untuk menemukan bukti digital. Penelitian ini berhasil mengungkap benar-benar ada serangan berupa injeksi malware terhadap perangkat IoT yang memiliki sistem operasi Raspbian, Fedberry dan Ubuntu Mate. Pengungkapan fakta kasus mengalami kesulitan pada perangkat IoT yang memiliki sistem operasi Kali Linux. Ditemukan 1 IP Address komputer penyerang yang diduga kuat menanamkan malware dan mengganggu sistem kerja perangkat IoT.</p><p><em><strong>Abstract</strong></em></p><p class="Abstract"><em>The Internet of Things (IoT) is an smart device that has interconnection with global internet networks. Investigating cases involving IoT devices will be a challenge for forensic investigators. The diversity of types of equipment and technology will create new challenges for forensic investigators. In this study focused on forensics at the IoT device's internal device level, there have not been many similar research that focuses on forensic analysis of IoT devices at the device level. Previous research has been done more at the network level and cloud level of IoT device's. In this study an IoT environment was built a smart home prototype as a object for research and studies on forensic level devices. This study, using forensic model analysis which includes collection, examination, analysis, and reporting in finding digital evidence. This study successfully revealed that there was really an attack in the form of malware injection against IoT devices that have Raspbian, Fedberry and Ubuntu Mate operating systems. Disclosure of the fact that the case has difficulties with IoT devices that have the Kali Linux operating system. Found 1 IP Address of an attacker's computer that is allegedly strongly infusing malware and interfering with the work system of IoT devices.</em></p><p><em><strong><br /></strong></em></p>
APA, Harvard, Vancouver, ISO, and other styles
8

Preda, Marius. "Digital Forensics of Internet of Things Smart Heating System Investigation." Journal of Military Technology 3, no. 1 (June 26, 2020): 23–28. http://dx.doi.org/10.32754/jmt.2020.1.04.

Full text
Abstract:
The Internet of Things (IoT) integrates the Internet and electronic devices with applicability to a large spectrum of domains, from smart home automation, industrial processes, military applications, to health and environmental monitoring. Despite the clear advantages, from a forensically sound perspective, IoT can improve the accuracy and integrity of forensic investigations, but still requires extensive scientific validation in practice. In this paper, we review selected stateof-the-art challenges corresponding to digital forensics of IoT environments, and we present an empirical method on how to investigate a security incident reported for an IoT specific case - Smart Heating system.
APA, Harvard, Vancouver, ISO, and other styles
9

Saleh, Muhammed, Siti Hajar Othman, Maha Driss, Arafat Al-dhaqm, Abdulalem Ali, Wael M. S. Yafooz, and Abdel-Hamid M. Emara. "A Metamodeling Approach for IoT Forensic Investigation." Electronics 12, no. 3 (January 19, 2023): 524. http://dx.doi.org/10.3390/electronics12030524.

Full text
Abstract:
The Internet of Things (IoT) Investigation of Forensics (IoTFI) is one of the subdomains of Digital Forensics that aims to record and evaluate incidents involving the Internet of Things (IoT). Because of the many different standards, operating systems, and infrastructure-based aspects that make up the Internet of Things industry, this sector is extremely varied, ambiguate, and complicated. Many distinct IoTFI models and frameworks were developed, each one based on a unique set of investigation procedures and activities tailored to a particular IoT scenario. Because of these models, the domain becomes increasingly complicated and disorganized among those who perform domain forensics. As a result, the IoTFI domain does not have a general model for managing, sharing, and reusing the processes and activities that it offers. With the use of the metamodeling development process, this work aims to create an Internet of Things Forensic Investigation Metamodel (IoTFIM) for the IoTFI domain. Utilizing the metamodeling development process allows for the construction and validation of a metamodel and the verification that the metamodel is both comprehensive and consistent. The IoTFIM is divided into two phases: the first phase identifies the problem, and the second phase develops the IoTFIM. It is utilized to structure and organize IoTFI domain knowledge, which makes it easier for domain forensic practitioners to manage, organize, share, and reuse IoTFI domain knowledge. The purpose of this is to detect, recognize, extract, and match various IoTFI processes, concepts, activities, and tasks from various IoTFI models in an IoTFIM that was established, facilitating the process of deriving and instantiating solution models for domain practitioners. Utilizing several metamodeling methodologies, we were able to validate the generated IoTFMI’s consistency as well as its applicability (comparison against other models, frequency-based selection). Based on the findings, it can be concluded that the built IoTFIM is consistent and coherent. This makes it possible for domain forensic practitioners to simply instantiate new solution models by picking and combining concept elements (attribute and operations) based on the requirements of their models.
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Soram, Myungseo Park, Sehoon Lee, and Jongsung Kim. "Smart Home Forensics—Data Analysis of IoT Devices." Electronics 9, no. 8 (July 28, 2020): 1215. http://dx.doi.org/10.3390/electronics9081215.

Full text
Abstract:
A smart home is a residence that provides a variety of automation services based on Internet of Things (IoT) devices equipped with sensors, cameras, and lights. These devices can be remotely controlled through controllers such as smartphones and smart speakers. In a smart home, IoT devices collect and process data related to motion, temperature, lighting control, and other factors and store more diverse and complex user data. This data can be useful in forensic investigations but it is a challenge to extract meaningful data from various smart home devices because they have different data storage methods. Therefore, data collection from different smart home devices and identification and analysis of data that can be used in digital forensics is crucial. This study focuses on how to acquire, classify, and analyze smart home data from Google Nest Hub, Samsung SmartThings, and Kasa cam for forensic purposes. We thus analyzed the smart home data collected using companion apps, Web interfaces, and APIs to identify meaningful data available for the investigation. Moreover, the paper discusses various types of smart home data and their usage as core evidence in some forensic scenarios.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Iot forensics"

1

Kruger, Jaco-Louis. "Digital forensic readiness for IOT devices." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/73385.

Full text
Abstract:
The Internet of Things (IoT) has evolved to be an important part of modern society. IoT devices can be found in several environments such as smart homes, transportation, the health sector, smart cities and even facilitates automation in organisations. The increasing dependence on IoT devices increases the possibility of security incidents in the physical or cyber environment. Traditional methods of digital forensic (DF) investigations are not always applicable to IoT devices due to their limited data processing resources. A possible solution for conducting forensic investigations on IoT devices is to utilise a proactive approach known as digital forensic readiness (DFR). This dissertation firstly aims to conduct a thorough review of the available literature in the current body of knowledge to identify a clear process that can be followed to implement DFR tailored for IoT devices. This dissertation then formulates requirements for DFR in IoT based on existing forensic techniques. The requirements for DFR in IoT give rise to the development of a model for DFR in IoT, which is then implemented in a prototype for IoT devices. The prototype is subsequently tested and evaluated on IoT devices that conduct proactive DFR in a simulation of a smart home system. Finally, the dissertation illustrates the feasibility of the DFR processes for IoT and serves as a basis for future research with regards to DFR in IoT. This dissertation will impact future research with regards to developing a standard for DFR in IoT.
Dissertation (MSc)--University of Pretoria, 2019.
Computer Science
MSc
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
2

Lu, Andy. "Forensic analysis on wireless medical devices." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2541.

Full text
Abstract:
The number of Internet of Things (IoT) devices is forecast to grow to over 25 billion by 2030, with the healthcare IoT market projected to grow to 25.9% of IoT devices by 2028 worldwide. However, with new and growing technologies come new types of risks. Current risk assessment and risk management methods haven’t been designed to anticipate or predict these risks. IoT risks relate to openness and lack of standardisation, linking and connectivity between the devices and the lack of skilled support for IoT devices and networks. These factors put medical IoT devices and, by extension, their users at risk from cyber threats. Additionally, the attack surface for the medical IoT has not been fully mapped, nor have the risks been fully assessed. The lack of coverage means increased risk for manufacturers, medical facilities, and potentially, patients. This project evaluates the effectiveness of how new and emerging wireless and connected medical devices can be managed and analysed through a digital forensic framework. An initial analysis of the currently available frameworks showed that they did not address the nuances of implementing a wireless or connected medical device into a healthcare organisation. Digital forensic frameworks that were deemed relevant to wireless medical devices were selected and tested against several currently available wireless medical devices. Four frameworks were tested across four devices each. The outcome was that none of the frameworks was fully able to effectively manage wireless medical devices (at least in terms of the objectives of digital forensics), with each missing elements that would aid an investigator or a hospital organisation in the case of a cyber-related incident. These results led to the synthesis and testing of a framework that addressed the missing elements. The framework emphasises forensic readiness planning and risk management. The synthesised framework was tested against a new device. The results of the test found that the synthesised framework was effective in both the proactive digital forensics approach and reactive approach. The testing found that the framework performed better than the other tested frameworks, containing additional phases and steps that were advantageous in preparing and reacting to incidents involving wireless medical devices.
APA, Harvard, Vancouver, ISO, and other styles
3

Shakir, Amer, Muhammad Hammad, and Muhammad Kamran. "Comparative Analysis & Study of Android/iOS MobileForensics Tools." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44797.

Full text
Abstract:
This report aims to draw a comparison between two commercial mobile forensics and recovery tools, Magnet AXIOM and MOBILedit. A thorough look at previously done studies was helpful to know what aspects of the data extractions must be compared and which areas are the most important ones to focus upon. This work focuses on how the data extracted from one tool compares with another and provides comprehensive extraction based on different scenarios, circumstances, and aspects. Performances of both tools are compared based on various benchmarks and criteria. This study has helped establish that MOBILedit has been able to outperform Magnet AXIOM on more data extraction and recovery aspects. It is a comparatively better tool to get your hands on.
APA, Harvard, Vancouver, ISO, and other styles
4

Ohlsson, Oliver. "En forensisk analys av iOS." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23783.

Full text
Abstract:
Sedan Apple introducerade sin iPhone 2007 har användadet av smarta telefoner ökat ständigt. De används inte bara i hemmet utan även på företag och i militären. På företagsmobiler finns det mer och mer viktig information såsom mail, sms och viktiga filer. För en hacker skulle det därför vara möjligt att komma åt hela företaget genom att gå in på en mobiltelefon som används i verksamheten. För att motverka det har det implementerats säkerhetsfunktioner i dagens mobiltelefoner som tex kryptering. I detta arbetet har målet varit att undersöka dessa säkerhetsfunktioner och vad för information som går att utvinna ur en iPhone. Genom att undersöka vilka säkerhetsfunktioner som implementerats och hur mycket information som går att få ut kommer frågeställningarna besvaras. Det har skrivits ett antal arbeten om iOS-säkerhet, men de flesta är skrivna om äldre versioner av operativsystemet. I det här arbetet kommer det senaste, iOS 6.1.4, testas i programmet XRY.
APA, Harvard, Vancouver, ISO, and other styles
5

Ovens, Kenneth Martin. "Digital forensic analysis of communication applications on Apple iOS devices." Thesis, Glasgow Caledonian University, 2017. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.743916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alatram, Ala'a A. M. "A forensic framework for detecting denial-of-service attacks in IoT networks using the MQTT protocol." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2561.

Full text
Abstract:
In the domain of the Internet of Things (IoT), The Message Queueing Telemetry Protocol (MQTT) is the most widely used protocol for applications across a wide range of realms, including industrial automation, healthcare, smart homes, and smart cities; MQTT is also used in many other critical real-world applicastions. An example is BMW’s Car Sharing application, that uses MQTT to provide reliable connectivity. However, due to a lack of security considerations during the design of the MQTT protocol, all the networks implementing it are prone to cyberattacks, such as denial-of-service (DoS) attacks. While the research community has a primary focus on MQTT vulnerabilities from the perspective of intrusion detection, digital forensic considerations of the protocol have yet to be addressed. This work attempts to address this issue, specifically by generating a novel dataset based on data captured from a testbed in an IoT setting, and the application of optimised Machine Learning (ML) algorithms to differentiate between cyberattacks and benign network traffic. The philosophical assumptions guiding the conduct of this research are Positivist Paradigm, Quantitative Methodology, Experimental Research Mode, and Quasi-Experimental as a Sub-category. As a result of the IoT testbed construction, a substantial quantity of IoT data was produced, including standard MQTT data and ten different DoS and DDoS attack scenarios. In addition, a network forensic analysis of the collected data shows specific information that can be extracted and the differences between attacks and normal data. Also, eight different ML algorithms were compared, resulting in the suggestions of Random Forest (RF), XGBoost, and Artificial Neural Network (ANN) for use in the proposed framework. Gray Wolf Optimiser (GWO) was selected to combine RF and ANN in a core component of the framework. It has been demonstrated that RF with GWO and ANN with GWO can optimise results. The output of this research can have a potential impact on the implementations of MQTT-powered networks globally, thereby improving the security of modern networks that use this protocol.
APA, Harvard, Vancouver, ISO, and other styles
7

Jonah, Tosin Mobolaji. "Selective Sensing of Ions and Ion Pairs of Environmental and Forensic Significance." FIU Digital Commons, 2017. https://digitalcommons.fiu.edu/etd/3498.

Full text
Abstract:
Dual-host combinations of cation and anion sensors have unique potential for selective detection of ion pairs, such as NH4NO3, via solvent extraction. Selective sensors for NH4+ and NO3- were synthesized and used together for ion-pair sensing of ammonium nitrate both in organic solvents (using Bu4N+NO3 - and NH4+PF6-) and in extraction of NH4NO3 from water into dichloromethane. A fluorescent sensor for NH4+ based on 1,3,5-triethylbenzene shows remarkable binding and sensing selectivity for NH4+ vs. K+. Fluorescence and 1H-NMR titrations reveal surprising differences in sensing properties and binding constants for the tris-(3,5-dimethyl)pyrazole vs. the tris(3,5-diphenyl)pyrazole. The role of ion pairing and solvation is revealed by X-ray and theoretical DFT studies. We have also demonstrated a unique dual-host extraction-based ion-pair sensing paradigm using Förster Resonance Energy Transfer (FRET), showing selectivity for NH4NO3. The fluorescence emission of the NH4+ sensor tris-(3,5-dimethyl)pyrazole (305-340 nm), is compatible with the excitation wavelength of the dansyl fluorophore of the nitrate sensor 1,3,5-Tris-(5-dimethylamino-1-naphthalenesulfonamido)methyl]-2,4,6-triethylbenzene, thus resulting in FRET emission upon combined use of these two sensors for the NH4NO3 ion pair. Contact of dichloromethane solutions containing the two hosts with aqueous solutions of NH4NO3 (1 x 10-5 M to 1 x 10-4 M ), resulted in FRET fluorescence enhancements at 510 nm, with increasing concentrations of NH4NO3, while NaNO3, KNO3, NaCl and KCl showed only minimal fluorescence responses, under identical conditions. The ability of the tris-pyrazole to bind cations, such as NH4+, was also exploited in a detailed fluorescence and 1H-NMR Ln(III), binding study using tris-pyrazoles with varying substitution patterns. The dependence of fluorescence responses on pyrazole substitution that had been observed for NH4+ was also observed for different Ln(III), indicating the significant role of ion pairing for Ln(III) binding and fluorescence sensing. Likewise, the tris-dansyl nitrate receptor, in its deprotonated form, was also found to be an efficient Hg(II) fluorescent sensor. An X-ray crystal structure showed the ability of the trianionic version of this receptor to bind three Hg(II) atoms, also containing three CH3COO- counteranions. The X-ray crystal structure of the same receptor with HgCl2 gave a 2:1 complexation pattern, with one Hg atom complexed by two bis-deprotonated receptor molecules
APA, Harvard, Vancouver, ISO, and other styles
8

Russell, Paul. "Membrane properties and calcium ion activity in skeletal muscle fibres of the dystrophic mouse." Thesis, University of Central Lancashire, 1993. http://clok.uclan.ac.uk/20630/.

Full text
Abstract:
The ReJI29 murine model of muscular dystrophy was employed to investigate the properties of skeletal muscle plasmalemma and calcium ion movements during muscle wastage, with the intention of determining the route of calcium influx, and the efficacy of calcium ion blockers in preventing this influx. Electrophysiological parameters (Resting membrane potential [RMP] and input resistance) reached adult magnitude in normal soleus and extensor digitorum longus (EDL) by 4 weeks and 3 weeks respectively. Electrophysiological parameters in dystrophic soleus developed in a similar maimer to normal muscle, but RMP in dystrophic EDL was reduced and input resistance was elevated suggesting the presence of a population of regenerating fibres. Twitch and contracture tension development reached mature levels by 4 weeks in normal soleus muscle, but development was prolonged to 10 weeks in EDL, due to the slower development of type II fibres. Contracture tension was markedly smaller in EDL possibly due to fibre type-related differences in the concentrations of calcium sequestering proteins. Twitch and contracture tension in dystrophic soleus was identical to normal. In dystrophic EDL, 4 week old muscle did not generate tension from either electrical or chemical stimulation. Older muscles generated tension but smaller than their normal counterparts. Twitch and contracture tomography revealed similarities between dystrophic EDL and immature normal EDL corroborating with the conclusions made from the electrophysiological experiments. Caffeine contractures generated in glycinerated normal soleus muscle, incubated in low calcium saline, and then bathed in high calcium saline reached 115-185% the magnitude of caffeine contractures generated prior to incubation. 4 week dystrophic soleus attained similar sized contractures, but contractures were reduced to 77-90% in older muscles. This technique was found to be inappropriate in the study of EDL. Caffeine contractures generated by normal soleus in normal saline, after incubation in low calcium saline, reached the magnitude of contractures generated in high calcium saline after 30 minutes. Contractures generated by dystrophic soleus remained identical to those generated in high calcium saline suggesting that the sarcoplasmic reticulum in these fibres was unable to cope with a high calcium load. This result gave the first indication that soleus muscle was affected by muscular dystrophy. Membrane bound calcium derived from 45Calcium influx studies was 2nmoles/mg tissue/30 minutes in soleus and 1 Snmoles/mg tissue weight/30 minutes in EDL. Intracellular influx was 0.5-0.6nmoles/mg tissue weight/ 30 minutes in both muscles. Membrane bound calcium was elevated in dystrophic EDL to 2.5-3.8nmoles/mg tissue weight/30 minutes, but influx was normal in both dystrophic soleus and EDL, casting doubt on whether the plasmalemma is more permeable to calcium. The increase in membrane bound calcium may be artefactual. Cadmium blocked influx in both normal and dystrophic muscles. Blot weights showed continual growth in normal muscles although the rate decreased after 10 weeks. In dystrophic muscles growth ceased after 10 weeks. NCP data was limited but did show a decrease in dystrophic muscle, followed by an increase. Tension as a function of tissue mass, revealed that the contractile apparatus in normal soleus matured within 2 weeks, and by 10 weeks in EDL due to the differences in myosin isoforms present in each fibre type. These ratios were elevated in dystrophic muscle indicating calcium accumulation in the sarcoplasmic reticulum. The results showed that EDL muscle was more severely affected by muscular dystrophy. Between 2 and 4 weeks, the muscle underwent degeneration via an unidentified process. There was regeneration, and the regenerating fibres appeared to be normal. Soleus muscle appeared resistant to the disease but succumbed under unusual chemical stresses. Some aspects of development of normal muscle were also considered.
APA, Harvard, Vancouver, ISO, and other styles
9

Buxton, Tricia L. "Solving Problems in Ion Mobility Measurements of Forensic Samples with Thermal Desorption and Dynamic Modeling." Ohio University / OhioLINK, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1019244669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lu, Yao. "Forensic Applications of Gas Chromatography-Differential Mobility Spectrometry, Gas Chromatography/Mass Spectrometry, and Ion Mobility Spectrometry with Chemometric Analysis." Ohio University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1267816777.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Iot forensics"

1

Montasari, Reza, Fiona Carroll, Ian Mitchell, Sukhvinder Hara, and Rachel Bolton-King, eds. Privacy, Security And Forensics in The Internet of Things (IoT). Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91218-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kelmen, Davies. Forensic ICT investigation. Nairobi, Kenya: LawAfrica, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Montasari, Reza, Hamid Jahankhani, Richard Hill, and Simon Parkinson, eds. Digital Forensic Investigation of Internet of Things (IoT) Devices. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60425-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Amelia, Phillips, and Steuart Christopher, eds. Guide to computer forensics and investigations. Princeton, N.J: Recording for the Blind & Dyslexic, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Clarke, Nathan. Computer forensics: A pocket guide. Ely: IT Governance Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Digital evidence and computer crime: Forensic science, computers and the Internet. 3rd ed. Waltham, MA: Academic Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Katie, Strzempka, ed. iPhone and iOS forensics: Investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices. Waltham, MA: Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shishkina, Elena. Tactical and forensic support of investigative activities. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1246682.

Full text
Abstract:
The textbook is devoted to the study of the main means of tactical support for the activities of the investigator in the investigation of crimes. The author's position on the concept, essence and content of tactical means of investigative activity — tactical techniques, tactical operations and tactical combinations, tactical decisions and tactics of individual investigative actions is presented. The paper deals with the issues of tactical and forensic support of individual, the most common investigative actions - inspection, interrogation, verification of testimony on the spot, etc. It is intended for law students studying in the specialties 40.05.01 "Legal support of national security", 40.05.04 "Judicial and prosecutorial activities", as well as for undergraduates studying in the areas of training in the field of jurisprudence.
APA, Harvard, Vancouver, ISO, and other styles
9

Karagodin, Valeriy, and Nikolay Karepanov. Features of investigation of fraud committed by Bank employees in the field of lending. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1064906.

Full text
Abstract:
The monograph is devoted to the study of legal, theoretical and forensic issues that arise in the investigation of fraud committed by Bank employees in the field of lending. The features of their solution are defined, specific recommendations are developed aimed at forming an effective mechanism for investigating the analyzed type of crimes. The results of the studied practical material are presented. It is a complete scientific study and is intended for forensic scientists, law enforcement officers, teachers, graduate students and students of law schools and faculties who are interested in the problems of investigating certain types of crimes.
APA, Harvard, Vancouver, ISO, and other styles
10

Shishkina, Elena. Tactical and forensic support of investigative activities: a workshop. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1546031.

Full text
Abstract:
The workshop is a set of educational and methodological materials intended for the development of the course "Tactical and forensic support of investigative activities". For each topic of the course, there is a list of studied and control questions, a list of recommended literature, as well as a set of control and measuring materials-test tasks, situational tasks. As elements of the methodological support of the course, the workshop contains samples of scenarios of business games and other interactive forms of conducting practical classes (discussions on problematic issues of the course), materials for performing creative tasks. Practical tasks are compiled on the basis of materials of investigative and judicial practice. Samples of tasks for correspondence students and methodological recommendations for their implementation, as well as sample topics of abstracts and other research papers of students are presented. Meets the requirements of the federal state educational standards of higher education of the latest generation. For students and undergraduates of law schools and faculties studying under the programs of specialized training of investigative workers. It may also be of interest to the teaching staff of universities as a methodological support for training programs for specialists in various fields of law enforcement activity.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Iot forensics"

1

Mrdovic, Sasa. "IoT Forensics." In Security of Ubiquitous Computing Systems, 215–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_13.

Full text
Abstract:
AbstractThis chapter provides an overview of research opportunities and issues in IoT forensics. It gives a quick introduction to forensics and digital forensics. Key specifics of IoT forensics are explained. Issues that arise from IoT related challenges in all phases of a forensic investigation are presented. Some opportunities that IoT brings to forensics are pointed out. An example of an IoT forensics case is provided. A detailed research overview is given, providing information on the main research directions with a brief overview of relevant papers. The chapter concludes with some ideas for future research.
APA, Harvard, Vancouver, ISO, and other styles
2

Wilds, Patrick. "IoT and the role of cyber forensics1." In Cyber Forensics, 35–86. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003057888-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hemdan, Ezz El-Din, and D. H. Manjaiah. "Internet of Nano-Things Forensics: Performing Digital Forensics in Nanoscale Systems." In Internet of Things (IoT), 119–38. Boca Raton : Taylor & Francis, CRC Press, 2018.: CRC Press, 2017. http://dx.doi.org/10.1201/9781315269849-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chawla, Indu, and Archana Purwar. "Big Data and IoT Forensics." In Securing IoT and Big Data, 85–107. First edition. | Boca Raton : CRC Press, 2021.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003009092-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Karabiyik, Umit, and Kemal Akkaya. "Digital Forensics for IoT and WSNs." In Mission-Oriented Sensor Networks and Systems: Art and Science, 171–207. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-92384-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nanda, Sunpreet Kaur, and Deepika Ghai. "Future of Video Forensics in IoT." In Electronic Devices and Circuit Design, 113–33. Boca Raton: Apple Academic Press, 2021. http://dx.doi.org/10.1201/9781003145776-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Atlam, Hany F., Ahmed Alenezi, Madini O. Alassafi, Abdulrahman A. Alshdadi, and Gary B. Wills. "Security, Cybercrime and Digital Forensics for IoT." In Intelligent Systems Reference Library, 551–77. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33596-0_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Grojek, Alexander E., and Leslie F. Sikos. "Ontology-Driven Artificial Intelligence in IoT Forensics." In Breakthroughs in Digital Biometrics and Forensics, 257–86. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10706-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Abdel-Basset, Mohamed, Nour Moustafa, Hossam Hawash, and Weiping Ding. "Digital Forensics in Internet of Things." In Deep Learning Techniques for IoT Security and Privacy, 113–30. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89025-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ma, Wendan, and Ran Li. "Digital Forensics for Frame Rate Up-Conversion in Wireless Sensor Network." In Artificial Intelligence in IoT, 151–66. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04110-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Iot forensics"

1

Marsh, Robert, Sana Belguith, and Tooska Dargahi. "IoT Database Forensics." In ICFNDS '19: 3rd International Conference on Future Networks and Distributed Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3341325.3341993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kruger, Jaco-Louis, and Hein Venter. "Requirements for IoT Forensics." In 2019 Conference on Next Generation Computing Applications (NextComp). IEEE, 2019. http://dx.doi.org/10.1109/nextcomp.2019.8883615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

MacDermott, Aine, Thar Baker, and Qi Shi. "Iot Forensics: Challenges for the Ioa Era." In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2018. http://dx.doi.org/10.1109/ntms.2018.8328748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gudlur, Venkata Venugopal Rao, Vikneswara Abirama Shanmugan, Sundresan Perumal, and Radin Maya Saphira Radin Mohammed. "IoT- Supply Chain Forensics and Vulnerabilities." In 2019 1st International Conference on Artificial Intelligence and Data Sciences (AiDAS). IEEE, 2019. http://dx.doi.org/10.1109/aidas47888.2019.8970765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nieto, Ana, Ruben Rios, and Javier Lopez. "A Methodology for Privacy-Aware IoT-Forensics." In 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017. http://dx.doi.org/10.1109/trustcom/bigdatase/icess.2017.293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Tina, Frank Breitinger, and Ibrahim Baggili. "IoT Ignorance is Digital Forensics Research Bliss." In ARES '19: 14th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3339252.3340504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Banday, Mehroush. "Enhancing the security of IOT in forensics." In 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN). IEEE, 2017. http://dx.doi.org/10.1109/ic3tsn.2017.8284475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Choo, Kim-Kwang Raymond. "Internet of Things (IoT) Security and Forensics." In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3462633.3484691.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mercan, Suat, Mumin Cebe, Ege Tekiner, Kemal Akkaya, Melissa Chang, and Selcuk Uluagac. "A Cost-efficient IoT Forensics Framework with Blockchain." In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2020. http://dx.doi.org/10.1109/icbc48266.2020.9169397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Jigang, Ryoichi Sasaki, and Tetsutaro Uehara. "Towards a Holistic Approach to Medical IoT Forensics." In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 2020. http://dx.doi.org/10.1109/qrs-c51114.2020.00121.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Iot forensics"

1

Johnson, Erik B. Li-Ion Batteries for Forensic Neutron Dosimetry. Fort Belvoir, VA: Defense Technical Information Center, March 2016. http://dx.doi.org/10.21236/ad1005451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Baruzzini, Matthew Louis. Improved sample utilization in thermal ionization mass spectrometry isotope ratio measurements: refined development of porous ion emitters for nuclear forensic applications. Office of Scientific and Technical Information (OSTI), May 2017. http://dx.doi.org/10.2172/1356166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Norsworthy, Sarah, Rebecca Shute, Crystal M. Daye, and Paige Presler-Jur. National Institute of Justice’s Forensic Technology Center of Excellence 2019 National Opioid and Emerging Drug Threats Policy and Practice Forum. Edited by Jeri D. Ropero-Miller and Hope Smiley-McDonald. RTI Press, July 2020. http://dx.doi.org/10.3768/rtipress.2020.cp.0011.2007.

Full text
Abstract:
The National Institute of Justice (NIJ) and its Forensic Technology Center of Excellence (FTCoE) hosted the National Opioid and Emerging Drug Threats Policy and Practice Forum on July 18–19, 2019, in Washington, DC. The forum explored ways in which government agencies and programs, law enforcement officials, forensic laboratory personnel, medical examiners and coroners, researchers, and other experts can cooperate to respond to problems associated with drug abuse and misuse. Panelists from these stakeholder groups discussed ways to address concerns such as rapidly expanding crime laboratory caseloads; workforce shortages and resiliency programs; analytical challenges associated with fentanyl analogs and drug mixtures; laboratory quality control; surveillance systems to inform response; and policy related to stakeholder, research, and resource constraints. The NIJ Policy and Practice Forum built off the momentum of previous stakeholder meetings convened by NIJ and other agencies to discuss the consequences of this national epidemic, including the impact it has had on public safety, public health, and the criminal justice response. The forum discussed topics at a policy level and addressed best practices used across the forensic community.
APA, Harvard, Vancouver, ISO, and other styles
4

Eberle, Caitlyn, and Oscar Higuera Roa. Technical Report: Mediterranean wildfires. United Nations University - Institute for Environment and Human Security (UNU-EHS), August 2022. http://dx.doi.org/10.53324/vceb1752.

Full text
Abstract:
In summer 2021, drought and low humidity combined with record-breaking heat of up to 48.8°C (119.8°F) led to fire outbreaks across the Mediterranean countries, killing more than 100 people and burning more than 620,000 ha of land in July and August. As forests are often fiercely protected areas, the common approach to wildfire management in the Mediterranean is to extinguish every fire as it appears, but counterintuitively this supports the formation of “mega-fires” that burn beyond our capacity to control. Fires are not yet seen as integral to ecosystem functioning, and the management of fires and fires are often disconnected. This technical background report for the 2021/2022 edition of the Interconnected Disaster Risks report analyses the root causes, drivers, impacts and potential solutions for the Mediterranean wildfires through a forensic analysis of academic literature, media articles and expert interviews.
APA, Harvard, Vancouver, ISO, and other styles
5

Estrada, Jorge. Ruthless Desires of Living Together in Roberto Bolaño’s 2666: Conviviality between Potestas and Potentia. Maria Sibylla Merian Centre Conviviality-Inequality in Latin America, March 2022. http://dx.doi.org/10.46877/estrada.2022.42.

Full text
Abstract:
A desire to live together is perhaps a key idea in Roberto Bolaño’s narratives. His characters are constantly negotiating their involvement in diverse societies amid the historical catastrophes of the twentieth century, so this desire becomes highly differentiated. It undergoes perspectival shifts and creates “mirror games”, which express scepticism towards universalising forms and trigger reflections on history and modernity. In this working paper, I examine how, in 2666, the cosmopolitan desire of a self-legislating and self-authorizing individual is disassembled and superseded by a convivial framework and a relational subject that is crossed by diverse determining forces. This transition is correlated to Bolaño’s diagnosis of late capitalism, in which a matrix of domination that worked with the logic of potestas is replaced by the channelling of potentia, i.e. an apparatus for capturing a flow of lives whose features only come to light in forensic discourse and project the fictional city of Santa Teresa.
APA, Harvard, Vancouver, ISO, and other styles
6

Narvaez, Liliana, Sally Janzen, Caitlyn Eberle, and Zita Sebesvari. Technical Report: Taiwan drought. United Nations University - Institute for Environment and Human Security (UNU-EHS), August 2022. http://dx.doi.org/10.53324/ujzw5639.

Full text
Abstract:
During the 2020-2021 typhoon season, for the first time in 56 years, no typhoon made landfall on Taiwan, leading to one of the worst droughts in the island’s history. As reservoirs fell below 5% capacity, more than one million households and businesses had to ration water. This water rationing was not without controversy, especially for the island’s most water-intensive industries: rice farming and semiconductor manufacturing. Taiwan’s case exemplifies the challenges of water stress and related risk across value chains that could emerge as a result. It also shows stark choices that governments and authorities may have to face in rationing water resources. Water management in a changing climate is incredibly important to ensure the life, health and prosperity of people and ecosystems on our planet.This technical background report for the 2021/2022 edition of the Interconnected Disaster Risks report analyses the root causes, drivers, impacts and potential solutions for the Taiwan drought through a forensic analysis of academic literature, media articles and expert interviews.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography