Pub Date : 1900-01-01DOI: 10.1007/978-3-030-10543-3_6
Krzysztof Nagrabski, Michael Hopkins, Milda Petraityte, A. Dehghantanha, R. Parizi, G. Epiphaniou, Mohammad Hammoudeh
{"title":"Distributed Filesystem Forensics: Ceph as a Case Study","authors":"Krzysztof Nagrabski, Michael Hopkins, Milda Petraityte, A. Dehghantanha, R. Parizi, G. Epiphaniou, Mohammad Hammoudeh","doi":"10.1007/978-3-030-10543-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-10543-3_6","url":null,"abstract":"","PeriodicalId":389627,"journal":{"name":"Handbook of Big Data and IoT Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125157621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-10543-3_15
Shehu Amina, Raúl Vera, T. Dargahi, A. Dehghantanha
{"title":"A Bibliometric Analysis of Botnet Detection Techniques","authors":"Shehu Amina, Raúl Vera, T. Dargahi, A. Dehghantanha","doi":"10.1007/978-3-030-10543-3_15","DOIUrl":"https://doi.org/10.1007/978-3-030-10543-3_15","url":null,"abstract":"","PeriodicalId":389627,"journal":{"name":"Handbook of Big Data and IoT Security","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128200181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-10543-3_1
Amin Azmoodeh, A. Dehghantanha, Kim-Kwang Raymond Choo
{"title":"Big Data and Internet of Things Security and Forensics: Challenges and Opportunities","authors":"Amin Azmoodeh, A. Dehghantanha, Kim-Kwang Raymond Choo","doi":"10.1007/978-3-030-10543-3_1","DOIUrl":"https://doi.org/10.1007/978-3-030-10543-3_1","url":null,"abstract":"","PeriodicalId":389627,"journal":{"name":"Handbook of Big Data and IoT Security","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-10543-3_11
Paul J. Taylor, T. Dargahi, A. Dehghantanha
{"title":"Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study","authors":"Paul J. Taylor, T. Dargahi, A. Dehghantanha","doi":"10.1007/978-3-030-10543-3_11","DOIUrl":"https://doi.org/10.1007/978-3-030-10543-3_11","url":null,"abstract":"","PeriodicalId":389627,"journal":{"name":"Handbook of Big Data and IoT Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117236587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-10543-3_4
Mohammad Heydari, Alexios Mylonas, Vasileios Katos, D. Gritzalis
{"title":"Towards Indeterminacy-Tolerant Access Control in IoT","authors":"Mohammad Heydari, Alexios Mylonas, Vasileios Katos, D. Gritzalis","doi":"10.1007/978-3-030-10543-3_4","DOIUrl":"https://doi.org/10.1007/978-3-030-10543-3_4","url":null,"abstract":"","PeriodicalId":389627,"journal":{"name":"Handbook of Big Data and IoT Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121797236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}