메뉴 건너뛰기




Volumn , Issue , 2015, Pages 19-23

Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology

Author keywords

Forensic Investigation Introduction; IoT; M2M

Indexed keywords

AUTOMATION; COMPUTER CRIME; ELECTRONIC CRIME COUNTERMEASURES; INFORMATION SCIENCE; INTERNET; INTERNET PROTOCOLS;

EID: 84962815572     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDIPC.2015.7323000     Document Type: Conference Paper
Times cited : (107)

References (30)
  • 2
    • 83455174764 scopus 로고    scopus 로고
    • February
    • Casaleggio Associati, "The Evolution of Internet of Things", February 2011, online at http://www.casaleggio.it/pubblicazioni/Focus-internet-of-things-v1.81%20-%20 eng.pdf
    • (2011) The Evolution of Internet of Things
  • 5
    • 84862023109 scopus 로고    scopus 로고
    • A wireless sensor network for intelligent building energy management based on multi communication standards - A case study
    • H. Grindvoll, O. Vermesan, T. Crosbie, R. Bahr, et al., "A wireless sensor network for intelligent building energy management based on multi communication standards - a case study", ITcon Vol. 17, pg. 43-62, http://www.itcon.org/2012/3
    • ITcon , vol.17 , pp. 43-62
    • Grindvoll, H.1    Vermesan, O.2    Crosbie, T.3    Bahr, R.4
  • 19
    • 84876943063 scopus 로고    scopus 로고
    • Internet of things (IoT): A vision, architectural elements, and future directions
    • 9
    • J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Comput. Syst., vol. 29, pp. 1645-1660, 9, 2013.
    • (2013) Future Generation Comput. Syst. , vol.29 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 21
    • 74949143896 scopus 로고    scopus 로고
    • Internet of things - new security and privacy challenges
    • 1
    • R. H. Weber, "Internet of Things - New security and privacy challenges," Computer Law & Security Review, vol. 26, pp. 23-30, 1, 2010.
    • (2010) Computer Law & Security Review , vol.26 , pp. 23-30
    • Weber, R.H.1
  • 22
    • 78651064269 scopus 로고    scopus 로고
    • A history of digital forensics
    • K. Chow and S. Shenoi, Eds. Springer Berlin Heidelberg
    • M. Pollitt, "A history of digital forensics," in Advances in Digital Forensics VI, K. Chow and S. Shenoi, Eds. Springer Berlin Heidelberg, 2010, pp. 3-15
    • (2010) Advances in Digital Forensics VI , pp. 3-15
    • Pollitt, M.1
  • 25
    • 84864576554 scopus 로고    scopus 로고
    • An automated timeline reconstruction approach for digital forensic investigations
    • C. Hargreaves and J. Patterson, "An automated timeline reconstruction approach for digital forensic investigations," Digital Investigation, vol. 9, pp. S69-S79, 2012.
    • (2012) Digital Investigation , vol.9 , pp. S69-S79
    • Hargreaves, C.1    Patterson, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.