M. , A. , and R. Kishore, Forensics framework for cloud computing, Computers and Electrical Engineering, vol.60, pp.193-205, 2017.

A. Ariffin, J. Slay, and K. Choo, Data recovery from proprietary formatted CCTV hard disks, Advances in Digital Forensics IX, pp.213-223, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01460629

E. Blumenthal and E. Weise, Hacked home devices caused massive Internet outage, USA Today, 2016.

E. Casey, Network traffic as a source of evidence: Tool strengths, weaknesses and future needs, Digital Investigation, vol.1, issue.1, pp.28-43, 2004.

J. Clover, Apple watches shipping to customers confirmed to have covered diagnostic port, MacRumors, 2015.

J. Dykstra and A. Sherman, Understanding issues in cloud forensics: Two hypothetical case studies, Proceedings of the ADSL Conference on Digital Forensics, Security and Law, pp.45-54, 2011.

E. Edwards and U. S. , Supreme Court to hear appeal in Microsoft warrant case, The Irish Times, 2017.

R. Gomm, N. Le-khac, M. Scanlon, and M. Kechadi, An analytical approach to the recovery of data from third-party proprietary CCTV file systems, Proceedings of the Fifteenth European Conference on Cyber Warfare and Security, 2016.

R. Hegarty, D. Lamb, and A. Attwood, Digital evidence challenges in the Internet of Things, Proceedings of the Tenth International Network Conference, pp.163-172, 2014.

R. Joshi and E. Pilli, Fundamentals of Network Forensics: A Research Perspective, 2016.

D. Lillis, B. Becker, T. O'sullivan, and M. Scanlon, Current challenges and future research areas for digital forensic investigations, Proceedings of the ADFSL Conference on Digital Forensics, Security and Law, 2016.

C. Liu, A. Singhal, and D. Wijesekera, Identifying evidence for cloud forensic analysis, Advances in Digital Forensics XIII, pp.111-130, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01716407

L. Morrison, H. Read, K. Xynos, and I. Sutherland, Forensic evaluation of an Amazon Fire TV Stick, Advances in Digital Forensics XIII, pp.63-79, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01716402

E. Oriwoh, D. Jazani, G. Epiphaniou, and P. Sant, Internet of Things forensics: Challenges and approaches, Proceedings of the Ninth IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.608-615, 2013.

S. O'shaughnessy and A. Keane, Impact of cloud computing on digital forensic investigations, Advances in Digital Forensics IX, pp.291-303, 2013.

H. Pajouh, R. Javidan, R. Khayami, D. Ali, and K. Choo, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks, IEEE Transactions on Emerging Topics in Computing, p.99, 2016.

S. Perumal, N. Norwawi, and V. Raman, Internet of Things (IoT) digital forensic investigation model: Top-down forensic approach methodology, Proceedings of the Fifth International Conference on Digital Information Processing and Communications, pp.19-23, 2015.

B. Popken, Hacked home devices can spy on you, NBC News, October 26, 2017.

K. Ruan, J. Carthy, T. Kechadi, M. Crosbie, and C. Forensics, Advances in Digital Forensics VII, pp.35-46, 2011.

S. Ryder and N. Le-khac, The end of effective law enforcement in the cloud? To encrypt or not to encrypt, Proceedings of the Ninth IEEE International Conference on Cloud Computing, pp.904-907, 2016.

, Cybersecurity Vulnerabilities Identified in St. Jude Medical's Implantable Cardiac Devices and Merlin@home Transmitter: FDA Safety Communication, 2017.

Z. Zhang, M. Cho, C. Wang, C. Hsu, C. Chen et al., IoT security: Ongoing challenges and research opportunities, Proceedings of the Seventh IEEE International Conference on Service-Oriented Computing and Applications, pp.230-234, 2014.
DOI : 10.1109/soca.2014.58