001433556 000__ 04789cam\a2200781\i\4500 001433556 001__ 1433556 001433556 003__ OCoLC 001433556 005__ 20230309003612.0 001433556 006__ m\\\\\o\\d\\\\\\\\ 001433556 007__ cr\nn\nnnunnun 001433556 008__ 201209s2021\\\\sz\a\\\\ob\\\\000\0\eng\d 001433556 019__ $$a1226761356$$a1227387233$$a1228649485$$a1238203046$$a1246358727$$a1253416884 001433556 020__ $$a303060425X$$q(electronic book) 001433556 020__ $$a9783030604257$$q(electronic bk.) 001433556 020__ $$a9783030604264$$q(print) 001433556 020__ $$a3030604268 001433556 020__ $$a9783030604271$$q(print) 001433556 020__ $$a3030604276 001433556 020__ $$z9783030604240 001433556 020__ $$z3030604241 001433556 0247_ $$a10.1007/978-3-030-60425-7$$2doi 001433556 035__ $$aSP(OCoLC)1232856832 001433556 040__ $$aERF$$beng$$erda$$epn$$cERF$$dOCLCO$$dEBLCP$$dYDXIT$$dOCLCO$$dGW5XE$$dYDX$$dSFB$$dOCLCF$$dDCT$$dN$T$$dVT2$$dLIP$$dOCL$$dOCLCQ$$dOCLCO$$dOCLCQ 001433556 049__ $$aISEA 001433556 050_4 $$aHV8079.C65$$bD55 2021 001433556 08204 $$a363.25/968$$223 001433556 24500 $$aDigital forensic investigation of Internet of Things (IoT) devices /$$cReza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson, editors. 001433556 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2021] 001433556 300__ $$a1 online resource (viii, 285 pages) :$$billustrations (chiefly color) 001433556 336__ $$atext$$btxt$$2rdacontent 001433556 337__ $$acomputer$$bc$$2rdamedia 001433556 338__ $$aonline resource$$bcr$$2rdacarrier 001433556 347__ $$atext file 001433556 347__ $$bPDF 001433556 4901_ $$aAdvanced sciences and technologies for security applications,$$x1613-5113 001433556 504__ $$aIncludes bibliographical references. 001433556 5050_ $$a1. Emulation vs Instrumentation for Android Malware Detection -- 2. Towards a Generic Approach of Quantifying Evidence Volatility in Resource Constrained Devices -- 3. Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence -- 4. Drone Forensics: The impact and Challenges -- 5. Intrusion Detection and CAN Vehicle Networks. 001433556 506__ $$aAccess limited to authorized users. 001433556 520__ $$aThis book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics. 001433556 588__ $$aOnline resource; title from digital title page (viewed on February 11, 2021). 001433556 650_0 $$aDigital forensic science. 001433556 650_0 $$aComputer crimes. 001433556 650_0 $$aComputer security. 001433556 650_0 $$aComputer networks$$xSecurity measures. 001433556 650_0 $$aComputer engineering. 001433556 650_0 $$aInternet of things. 001433556 650_0 $$aEmbedded computer systems. 001433556 650_0 $$aSystem safety. 001433556 650_6 $$aCriminalité informatique. 001433556 650_6 $$aSécurité informatique. 001433556 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures. 001433556 650_6 $$aOrdinateurs$$xConception et construction. 001433556 650_6 $$aInternet des objets. 001433556 650_6 $$aSystèmes enfouis (Informatique) 001433556 650_6 $$aSécurité des systèmes. 001433556 655_0 $$aElectronic books. 001433556 7001_ $$aMontasari, Reza,$$eeditor. 001433556 7001_ $$aJahankhani, Hamid,$$eeditor. 001433556 7001_ $$aHill, Richard,$$eeditor. 001433556 7001_ $$aParkinson, Simon,$$eeditor. 001433556 77608 $$iPrint version:$$z9783030604240 001433556 830_0 $$aAdvanced sciences and technologies for security applications,$$x1613-5113 001433556 852__ $$bebk 001433556 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-60425-7$$zOnline Access$$91397441.1 001433556 909CO $$ooai:library.usi.edu:1433556$$pGLOBAL_SET 001433556 980__ $$aBIB 001433556 980__ $$aEBOOK 001433556 982__ $$aEbook 001433556 983__ $$aOnline 001433556 994__ $$a92$$bISE