Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Front Matter
Big Data and Internet of Things Security and Forensics: Challenges and Opportunities
Privacy of Big Data: A Review
A Bibliometric Analysis of Authentication and Access Control in IoT Devices
Towards Indeterminacy-Tolerant Access Control in IoT
Private Cloud Storage Forensics: Seafile as a Case Study
Distributed Filesystem Forensics: Ceph as a Case Study
Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study
Big Data Forensics: Hadoop Distributed File Systems as a Case Study
Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform
Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats
Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study
A Cyber Kill Chain Based Analysis of Remote Access Trojans
Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications
Bibliometric Analysis on the Rise of Cloud Security
A Bibliometric Analysis of Botnet Detection Techniques
Security in Online Games: Current Implementations and Challenges
← Prev
Back
Next →
← Prev
Back
Next →