بحث بسيط
السجلات المعروضة 1 -- 6 من 6
Understanding Digital Forensic Characteristics of Smart Speaker Ecosystems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
With a built-in intelligent personal voice assistant providing QA services, smart speaker ecosystems combine multiple compatible components, including the internet of things (IoT) technology, mobile devices, and cloud ...
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
With the widespread use of Android devices, research on their security has attracted increasing attention. However, at present, digital forensics for investigating attacks, such as social engineering attacks and phishing ...
Haddle: A framework for investigating data leakage attacks in hadoop
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Nowadays Hadoop is popular among businesses and individuals for its low costs, convenience, and fast speed. However, this also makes it the goal of data leakage attacks as sensitive data stored with an HDFS infrastructure ...
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of cloud computing and wireless networks, cloud storage services are widely used in daily life. People can get access to cloud storage anytime and anywhere. Cloud storage forensics is a computer forensic ...
A design of firewall based on feedback of intrusion detection system in cloud environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Systems(IDS) ...
Cloud database encryption technology based on combinatorial encryption
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ...