Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Front Matter Big Data and Internet of Things Security and Forensics: Challenges and Opportunities Privacy of Big Data: A Review A Bibliometric Analysis of Authentication and Access Control in IoT Devices Towards Indeterminacy-Tolerant Access Control in IoT Private Cloud Storage Forensics: Seafile as a Case Study Distributed Filesystem Forensics: Ceph as a Case Study Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study Big Data Forensics: Hadoop Distributed File Systems as a Case Study Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study A Cyber Kill Chain Based Analysis of Remote Access Trojans Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications Bibliometric Analysis on the Rise of Cloud Security A Bibliometric Analysis of Botnet Detection Techniques Security in Online Games: Current Implementations and Challenges
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion