-
1
-
-
84928114546
-
CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances
-
Li B, Li J, Liu L. CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances. Concurrency and Computation: Practice and Experience 2015; 27(8):1861–1885.
-
(2015)
Concurrency and Computation: Practice and Experience
, vol.27
, Issue.8
, pp. 1861-1885
-
-
Li, B.1
Li, J.2
Liu, L.3
-
3
-
-
84928750893
-
Cloud attack and risk assessment taxonomy
-
Juliadotter NV, Choo K-KR. Cloud attack and risk assessment taxonomy. IEEE Cloud Computing 2015; 2(1):14–20. doi:10.1109/MCC.2015.2.
-
(2015)
IEEE Cloud Computing
, vol.2
, Issue.1
, pp. 14-20
-
-
Juliadotter, N.V.1
Choo, K.-K.R.2
-
4
-
-
84951824554
-
Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data
-
In, Springer International Publishing
-
Yang Y, Liu J, Liang A, Choo K-KR, Zhou J. Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. In Proceedings of 20th European Symposium on Research in Computer Security (Lecture Notes in Computer Science, vol. 9327/2015). Springer International Publishing, 2015; 146–166.
-
(2015)
Proceedings of 20th European Symposium on Research in Computer Security (Lecture Notes in Computer Science, vol. 9327/2015)
, pp. 146-166
-
-
Yang, Y.1
Liu, J.2
Liang, A.3
Choo, K.-K.R.4
Zhou, J.5
-
5
-
-
84916918767
-
A survey of information security incident handling in the cloud
-
Ab Rahman NH, Choo K-KR. A survey of information security incident handling in the cloud. Computer & Security 2015; 49:45–69. doi:10.1016/j.cose.2014.11.006.
-
(2015)
Computer & Security
, vol.49
, pp. 45-69
-
-
Ab Rahman, N.H.1
Choo, K.-K.R.2
-
6
-
-
85032429238
-
-
Kent K, Chevaliar S, Grance T, Dang H. Guide to integrating forensic techniques into incident response. Available from: http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf [20 November 2015].
-
-
-
-
7
-
-
85050883948
-
Integrating digital forensic practices in cloud incident handling: a conceptual cloud incident handling model
-
In, Ko R, Choo K-KR, (eds)., Syngress, an Imprint of Elsevier, Waltham, MA
-
Ab Rahman NH, Choo K-KR. Integrating digital forensic practices in cloud incident handling: a conceptual cloud incident handling model. In Cloud Security Ecosystem, Ko R, Choo K-KR (eds). Syngress, an Imprint of Elsevier: Waltham, MA, 2015; 383–400.
-
(2015)
Cloud Security Ecosystem
, pp. 383-400
-
-
Ab Rahman, N.H.1
Choo, K.-K.R.2
-
8
-
-
84963728330
-
Forensic-by-design framework for cyber-physical cloud systems
-
Ab Rahman NH, Glisson WB, Yang Y, Choo K-KR. Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Computing 2016; 3(1):50–59.
-
(2016)
IEEE Cloud Computing
, vol.3
, Issue.1
, pp. 50-59
-
-
Ab Rahman, N.H.1
Glisson, W.B.2
Yang, Y.3
Choo, K.-K.R.4
-
9
-
-
85032431259
-
-
Dropbox for Business Security. (Available from: https://www.dropbox.com/static/business/resources/dfb_security_whitepaper.pdf [25 November 2015]).
-
-
-
-
10
-
-
85032427209
-
-
Google's Approach to IT Security. (Available from: https://static.googleusercontent.com/media/www.google.com/en/AU/work/pdf/whygoogle/google-common-security-whitepaper.pdf [25 November 2015]).
-
-
-
-
11
-
-
85032431364
-
-
Security and Compliance: Office 365. (Available from: http://www.microsoft.com/en-us/download/confirmation.aspx?id=26552 [25 November 2015]).
-
-
-
-
12
-
-
84921347272
-
Cloud computing architecture
-
In, Morgan Kaufmann, an Imprint of Elsevier, Waltham, MA
-
Buyya R, Vecchiola C, Selvi ST. Cloud computing architecture. In Mastering Cloud Computing: Technologies and Applications Programming. Morgan Kaufmann, an Imprint of Elsevier: Waltham, MA, 2013; 111–140.
-
(2013)
Mastering Cloud Computing: Technologies and Applications Programming
, pp. 111-140
-
-
Buyya, R.1
Vecchiola, C.2
Selvi, S.T.3
-
13
-
-
84970003207
-
Trustworthy processing of healthcare big data in hybrid clouds
-
Nepal S, Ranjan R, Choo K-KR. Trustworthy processing of healthcare big data in hybrid clouds. IEEE Cloud Computing 2015; 2(2):78–84.
-
(2015)
IEEE Cloud Computing
, vol.2
, Issue.2
, pp. 78-84
-
-
Nepal, S.1
Ranjan, R.2
Choo, K.-K.R.3
-
14
-
-
85002778113
-
-
Martini B, Do Q, Choo K-KR. Digital forensics in the cloud era: the decline of passwords and the need for legal reform. Trends & Issues in Crime and Criminal Justice 2016[In press].
-
-
-
-
15
-
-
84995549442
-
-
Leom MD, Choo K-KR, Hunt R. Remote wiping and secure deletion on mobile devices: a review. Journal of Forensic Sciences 2016[In press].
-
-
-
-
17
-
-
84863932631
-
Dark clouds on the horizon : using cloud storage as attack vector and online slack space
-
Mulazzani M, Schrittwieser S, Leithner M, Huber M, Weippl ER. Dark clouds on the horizon : using cloud storage as attack vector and online slack space. Proceedings of 20th USENIX Security Symposium 2011; 65–76.
-
(2011)
Proceedings of 20th USENIX Security Symposium
, pp. 65-76
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.R.5
-
18
-
-
84881295724
-
Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform
-
Dykstra J, Sherman AT. Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform. digital Investigation 2013; 10:87–95. doi:10.1016/j.diin.2013.06.010.
-
(2013)
digital Investigation
, vol.10
, pp. 87-95
-
-
Dykstra, J.1
Sherman, A.T.2
-
19
-
-
84937458413
-
LiveCloudInspector: towards integrated IaaS forensics in the cloud
-
In, Bessani A, Bouchenak S, (eds)., Springer International Publishing, Basel
-
Zach J, Reiser HP. LiveCloudInspector: towards integrated IaaS forensics in the cloud. In Distributed Applications and Interoperable Systems (Lecture Notes in Computer Science, vol. 9038), Bessani A, Bouchenak S (eds). Springer International Publishing: Basel, 2015; 207–220.
-
(2015)
Distributed Applications and Interoperable Systems (Lecture Notes in Computer Science, vol. 9038)
, pp. 207-220
-
-
Zach, J.1
Reiser, H.P.2
-
20
-
-
85032428121
-
-
Quick D, Martini B, Choo K-KR. Cloud Storage Forensics, Syngress. an Imprint of Elsevier, Waltham: MA, 2014.
-
-
-
-
22
-
-
85013192181
-
Recovering residual forensic data from smartphone interactions with cloud storage providers
-
In, Ko R, Choo K-KR, (eds)., Syngress, an Imprint of Elsevier, WalthamMA
-
Grispos G, Glisson WB, Storer T. Recovering residual forensic data from smartphone interactions with cloud storage providers. In Cloud Security Ecosystem, Ko R, Choo K-KR (eds). Syngress, an Imprint of Elsevier: Waltham:MA, 2015; 347–382.
-
(2015)
Cloud Security Ecosystem
, pp. 347-382
-
-
Grispos, G.1
Glisson, W.B.2
Storer, T.3
-
23
-
-
85018181307
-
Mobile cloud forensics: an analysis of seven popular android apps
-
In, Ko R, Choo K-KR, (eds)., Syngress, an Imprint of Elsevier, WalthamMA
-
Martini B, Do Q, Choo K-KR. Mobile cloud forensics: an analysis of seven popular android apps. In Cloud Security Ecosystem, Ko R, Choo K-KR (eds). Syngress, an Imprint of Elsevier: Waltham:MA, 2015; 309–345.
-
(2015)
Cloud Security Ecosystem
, pp. 309-345
-
-
Martini, B.1
Do, Q.2
Choo, K.-K.R.3
-
26
-
-
85032090752
-
-
Cahyani N D W, Martini B, Choo K-K R. Effectiveness of multimedia presentations in improving understanding of technical terminologies and concepts: a pilot study. Australian Journal of Forensic Sciences [In press] DOI: 10.1080/00450618.2015.1128968
-
-
-
-
27
-
-
19844379355
-
A hierarchical, objectives-based framework for the digital investigations process
-
Beebe NL, Clark JG. A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation 2005; 2(2):147–167. doi:10.1016/j.diin.2005.04.002.
-
(2005)
Digital Investigation
, vol.2
, Issue.2
, pp. 147-167
-
-
Beebe, N.L.1
Clark, J.G.2
-
28
-
-
84904615617
-
A complete formalized knowledge representation model for advanced digital forensics timeline analysis
-
Chabot Y, Bertaux A, Nicolle C, Kechadi MT. A complete formalized knowledge representation model for advanced digital forensics timeline analysis. Digital Investigation 2014; 11:95–105. doi:10.1016/j.diin.2014.05.009.
-
(2014)
Digital Investigation
, vol.11
, pp. 95-105
-
-
Chabot, Y.1
Bertaux, A.2
Nicolle, C.3
Kechadi, M.T.4
-
29
-
-
84884589497
-
Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata?
-
Quick D, Choo K-KR. Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata? Digital Investigation 2013; 10(3):266–277. doi:10.1016/j.diin.2013.07.001.
-
(2013)
Digital Investigation
, vol.10
, Issue.3
, pp. 266-277
-
-
Quick, D.1
Choo, K.-K.R.2
-
30
-
-
85032428803
-
-
Amazon Web Services (AWS) Shared Responsibility Model. (Available from: https://aws.amazon.com/compliance/shared-responsibility-model/ [5 February 2016]).
-
-
-
-
31
-
-
84963615203
-
-
Ab Rahman NH, Choo K-KR. Factors influencing the adoption of cloud incident handling strategy: a preliminary study in Malaysia. Proceedings of 21st Americas Conference on Information Systems (AMCIS) 2015.
-
-
-
-
32
-
-
85032428204
-
-
The treacherous 12: cloud computing top threats in 2016. (Available from: https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf / [31 March 2016].)
-
-
-
-
33
-
-
84957849367
-
Tor does not stink: use and abuse of the tor anonymity network from the perspective of law
-
Minárik T, Osula AM. Tor does not stink: use and abuse of the tor anonymity network from the perspective of law. Computer Law & Security Review 2016; 32(1):111–127. doi:10.1016/j.clsr.2015.12.002.
-
(2016)
Computer Law & Security Review
, vol.32
, Issue.1
, pp. 111-127
-
-
Minárik, T.1
Osula, A.M.2
-
34
-
-
84870254680
-
Digital forensic investigation of cloud storage services
-
Chung H, Park J, Lee S, Kang C. Digital forensic investigation of cloud storage services. Digital Investigation 2012; 9(2):81–95.
-
(2012)
Digital Investigation
, vol.9
, Issue.2
, pp. 81-95
-
-
Chung, H.1
Park, J.2
Lee, S.3
Kang, C.4
-
36
-
-
84957103995
-
Cloud computing reference architecture and its forensic implications : a preliminary analysis
-
In, Springer, Berlin Heidelberg
-
Ruan K, Carthy J. Cloud computing reference architecture and its forensic implications : a preliminary analysis. In Digital Forensics and Cyber Crime. Springer: Berlin Heidelberg, 2013; 1–21.
-
(2013)
Digital Forensics and Cyber Crime
, pp. 1-21
-
-
Ruan, K.1
Carthy, J.2
-
37
-
-
84889083567
-
Cloud storage forensics: ownCloud as a case study
-
Martini B, Choo K-KR. Cloud storage forensics: ownCloud as a case study. Digital Investigation 2013; 10(4):1–13.
-
(2013)
Digital Investigation
, vol.10
, Issue.4
, pp. 1-13
-
-
Martini, B.1
Choo, K.-K.R.2
-
39
-
-
84888060581
-
Towards a forensic-based service oriented architecture framework for auditing of cloud logs
-
Thorpe S, Grandison T, Campbell A, Williams J, Burrell K, Ray I. Towards a forensic-based service oriented architecture framework for auditing of cloud logs. Proceedings of the 9th World Congress on Services 2013; 75–83.
-
(2013)
Proceedings of the 9th World Congress on Services
, pp. 75-83
-
-
Thorpe, S.1
Grandison, T.2
Campbell, A.3
Williams, J.4
Burrell, K.5
Ray, I.6
-
40
-
-
84864596423
-
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques
-
Dykstra J, Sherman AT. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digital Investigation 2012; 9:90–98.
-
(2012)
Digital Investigation
, vol.9
, pp. 90-98
-
-
Dykstra, J.1
Sherman, A.T.2
-
42
-
-
85032430449
-
-
Cahyani N D W, Martini B, Choo K-K R, Al-Azhar MH. Forensic data acquisition from cloud-of-things devices: Windows smartphones as a case study. Concurrency and Computation: Practice and Experience [In press]
-
-
-
-
43
-
-
84961817119
-
-
Quick D, Choo K-K R. Big forensic data reduction: digital forensic images and electronic evidence. Cluster Computing [In press]. DOI: 10.1007/s10586-016-0553-1
-
-
-
|