Digital Forensics and Internet of Things. Группа авторов
6a766053-d804-5d0b-89c3-720e061197e9">
Table of Contents
1 Cover
4 Preface
5 1 Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling 1.1 Introduction 1.2 Image Processing 1.3 Deep Learning 1.4 Methodology 1.5 Conclusion References
6 2 Smart Healthcare Monitoring System: An IoT-Based Approach 2.1 Introduction 2.2 Healthcare at Clinics 2.3 Remote Healthcare 2.4 Technological Framework 2.5 Standard UIs, Shows, and User Requirements 2.6 Cloud-Based Health Monitoring Using IoT 2.7 Information Acquisition 2.8 The Processing of Cloud 2.9 IoT-Based Health Monitoring Using Raspberry Pi 2.10 IoT-Based Health Monitoring Using RFID 2.11 Arduino and IoT-Based Health Monitoring System 2.12 IoT-Based Health Monitoring System Using ECG Signal 2.13 IoT-Based Health Monitoring System Using Android App 2.14 Conclusion and Future Perspectives References
7 3 Design of Gesture-Based Hand Gloves Using Arduino UNO: A Grace to Abled Mankind 3.1 Introduction 3.2 Result and Discussion 3.3 Conclusion 3.4 Future Scope References
8 4 Playing With Genes: A Pragmatic Approach in Genetic Engineering 4.1 Introduction 4.2 Literature Review 4.3 Methodology 4.4 Food and Agriculture 4.5 Impact on Farmers 4.6 Diseases: Gene Editing and Curing 4.7 Conclusion 4.8 Future Scope References
9 5 Digital Investigative Model in IoT: Forensic View 5.1 Introduction 5.2 Application of AI for Different Purposes in Forensic Science 5.3 Future of AI 5.4 Challenges While Implementing AI 5.5 Conclusion References
10 6 Internet of Things Mobility Forensics 6.1 Introduction 6.2 Smart Device and IoT 6.3 Relation of Internet of Things with Mobility Forensics 6.4 Mobility Forensics IoT Investigation Model 6.5 Internet of Things Mobility Forensics: A Source of Information 6.6 Drawbacks in IoT Devices Data Extraction 6.7 Future Perspective of Internet of Things Mobility Forensics 6.8 Conclusion References
11 7 A Generic Digital Scientific Examination System for Internet of Things 7.1 Introduction 7.2 Internet of Things 7.3 IoT Architecture 7.4 Characteristics of IoT 7.5 IoT Security Challenges and Factors of Threat 7.6 Role of Digital Forensics in Cybercrime Investigation for IoT 7.7 IoT Security Steps 7.8 Conclusion References
12