Abstract is missing.
- Big Data and Internet of Things Security and Forensics: Challenges and OpportunitiesAmin Azmoodeh, Ali Dehghantanha, Kim-Kwang Raymond Choo. 1-4 [doi]
- Privacy of Big Data: A ReviewS. Sangeetha, G. Sudha Sadasivam. 5-23 [doi]
- A Bibliometric Analysis of Authentication and Access Control in IoT DevicesSamuel Grooby, Tooska Dargahi, Ali Dehghantanha. 25-51 [doi]
- Towards Indeterminacy-Tolerant Access Control in IoTMohammad Heydari, Alexios Mylonas, Vasileios Katos, Dimitris Gritzalis. 53-71 [doi]
- Private Cloud Storage Forensics: Seafile as a Case StudyYee-Yang Teing, Sajad Homayoun, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi, Mohammad Hammoudeh, Gregory Epiphaniou. 73-127 [doi]
- Distributed Filesystem Forensics: Ceph as a Case StudyKrzysztof Nagrabski, Michael Hopkins, Milda Petraityte, Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou, Mohammad Hammoudeh. 129-151 [doi]
- Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case StudyPaul J. Taylor, Henry Mwiki, Ali Dehghantanha, Alex Akinbi, Kim-Kwang Raymond Choo, Mohammad Hammoudeh, Reza M. Parizi. 153-177 [doi]
- Big Data Forensics: Hadoop Distributed File Systems as a Case StudyMohammed Asim, Dean Richard McKinnel, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Gregory Epiphaniou. 179-210 [doi]
- Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet TransformKimia Bolouri, Amin Azmoodeh, Ali Dehghantanha, Mohammad Firouzmand. 211-223 [doi]
- Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and MoleratsSamuel Grooby, Tooska Dargahi, Ali Dehghantanha. 225-255 [doi]
- Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case StudyPaul J. Taylor, Tooska Dargahi, Ali Dehghantanha. 257-272 [doi]
- A Cyber Kill Chain Based Analysis of Remote Access TrojansReyhaneh HosseiniNejad, Hamed Haddad Pajouh, Ali Dehghantanha, Reza M. Parizi. 273-299 [doi]
- Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT ApplicationsOmar M. K. Alhawi, Alex Akinbi, Ali Dehghantanha. 301-327 [doi]
- Bibliometric Analysis on the Rise of Cloud SecurityLim Sze Thiam, Tooska Dargahi, Ali Dehghantanha. 329-344 [doi]
- A Bibliometric Analysis of Botnet Detection TechniquesShehu Amina, Raul Vera, Tooska Dargahi, Ali Dehghantanha. 345-365 [doi]
- Security in Online Games: Current Implementations and ChallengesReza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Mohammad Hammoudeh, Gregory Epiphaniou. 367-384 [doi]