Digital Forensics and Internet of Things. Группа авторов

Digital Forensics and Internet of Things - Группа авторов


Скачать книгу
target="_blank" rel="nofollow" href="#u5099c0a5-48b0-57a2-b139-d78f1d8cf011">8 IoT Sensors: Security in Network Forensics 8.1 Introduction 8.2 Cybersecurity Versus IoT Security and Cyber-Physical Systems 8.3 The IoT of the Future and the Need to Secure 8.4 Security Engineering for IoT Development 8.5 Building Security Into Design and Development 8.6 Security in Agile Developments 8.7 Focusing on the IoT Device in Operation 8.8 Cryptographic Fundamentals for IoT Security Engineering 8.9 Cloud Security for the IoT 8.10 Conclusion References

      13  9 Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime 9.1 Introduction 9.2 Literature Review 9.3 Proposed Work 9.4 Xilinx IP Core Square Root 9.5 RTL View of the 8-Bit Multiplier 9.6 RTL View of 8-Bit Down Counter 9.7 Up/Down Counter Simulation Results 9.8 Square Root Simulation Results 9.9 Hardware Device Utilization Reports of Binary Down Counter 9.10 Comparison of Proposed and Existing Work for Binary Up/Down Counter 9.11 Conclusion References

      14  10 Human-Robot Interaction: An Artificial Cognition-Based Study for Criminal Investigations 10.1 Introduction 10.2 Methodology 10.3 Architecture Models for Robots 10.4 Cognitive Architecture 10.5 Challenges in the Existing Social Robots and the Future Scopes 10.6 Conclusion 10.7 Robots in Future Pandemics References

      15  11 VANET: An IoT Forensic-Based Model for Maintaining Chain of Custody 11.1 Introduction 11.2 Cluster Performance Parameters 11.3 Routing Protocols in VANET 11.4 Internet of Vehicles 11.5 IoT Forensic in Vehicular Ad Hoc Networks 11.6 Conclusion References

      16  12 Cognitive Radio Networks: A Merit for Teleforensics 12.1 Introduction 12.2 Contribution of Work 12.3 Conclusion and Future Scope Acknowledgement References

      17  13 Fingerprint Image Identification System: An Asset for Security of Bank Lockers 13.1 Introduction 13.2 Result and Discussion 13.3 Conclusion 13.4 Future Scope References

      18  14 IoT Forensics: Interconnection and Sensing Frameworks 14.1 Introduction 14.2 The Need for IoT Forensics 14.3 Various Types of Evidences Encountered 14.4 Protocols and Frameworks in IoT Forensics 14.5 IoT Forensics Process Model 14.6 Suggestive Solutions 14.7 Conclusion References

      19  15 IoT Forensics: A Pernicious Repercussions 15.1 Introduction: Challenges in IoT Forensics 15.2 Scope of the Compromise and Crime Scene Reconstruction 15.3 Device and Data Proliferation 15.4 Multiple Data Location and Jurisdiction Challenges 15.5 Device Type 15.6 Lack of Training and Weak Knowledge Management 15.7 Data Encryption 15.8 Heterogeneous Software and/or Hardware Specifications Скачать книгу