Forensics framework for cloud computing, Computers and Electrical Engineering, vol.60, pp.193-205, 2017. ,
Data recovery from proprietary formatted CCTV hard disks, Advances in Digital Forensics IX, pp.213-223, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01460629
Hacked home devices caused massive Internet outage, USA Today, 2016. ,
Network traffic as a source of evidence: Tool strengths, weaknesses and future needs, Digital Investigation, vol.1, issue.1, pp.28-43, 2004. ,
Apple watches shipping to customers confirmed to have covered diagnostic port, MacRumors, 2015. ,
Understanding issues in cloud forensics: Two hypothetical case studies, Proceedings of the ADSL Conference on Digital Forensics, Security and Law, pp.45-54, 2011. ,
Supreme Court to hear appeal in Microsoft warrant case, The Irish Times, 2017. ,
An analytical approach to the recovery of data from third-party proprietary CCTV file systems, Proceedings of the Fifteenth European Conference on Cyber Warfare and Security, 2016. ,
, Digital evidence challenges in the Internet of Things, Proceedings of the Tenth International Network Conference, pp.163-172, 2014.
, Fundamentals of Network Forensics: A Research Perspective, 2016.
Current challenges and future research areas for digital forensic investigations, Proceedings of the ADFSL Conference on Digital Forensics, Security and Law, 2016. ,
Identifying evidence for cloud forensic analysis, Advances in Digital Forensics XIII, pp.111-130, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01716407
Forensic evaluation of an Amazon Fire TV Stick, Advances in Digital Forensics XIII, pp.63-79, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01716402
Internet of Things forensics: Challenges and approaches, Proceedings of the Ninth IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.608-615, 2013. ,
Impact of cloud computing on digital forensic investigations, Advances in Digital Forensics IX, pp.291-303, 2013. ,
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks, IEEE Transactions on Emerging Topics in Computing, p.99, 2016. ,
Internet of Things (IoT) digital forensic investigation model: Top-down forensic approach methodology, Proceedings of the Fifth International Conference on Digital Information Processing and Communications, pp.19-23, 2015. ,
Hacked home devices can spy on you, NBC News, October 26, 2017. ,
, Advances in Digital Forensics VII, pp.35-46, 2011.
The end of effective law enforcement in the cloud? To encrypt or not to encrypt, Proceedings of the Ninth IEEE International Conference on Cloud Computing, pp.904-907, 2016. ,
, Cybersecurity Vulnerabilities Identified in St. Jude Medical's Implantable Cardiac Devices and Merlin@home Transmitter: FDA Safety Communication, 2017.
IoT security: Ongoing challenges and research opportunities, Proceedings of the Seventh IEEE International Conference on Service-Oriented Computing and Applications, pp.230-234, 2014. ,
DOI : 10.1109/soca.2014.58