![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Fog Forensics: A Comprehensive Review of Forensic Models for Fog Computing Environment
Numerous potential social advantages are offered by fog computing, including personalized healthcare, smart cities, agri technology, automated transportation, consumer IoT, and many more. Ambient computing at ...
-
Chapter and Conference Paper
Cyber Security Attack Detection Framework for DODAG Control Message Flooding in an IoT Network
Advancement in the IoT technologies and the futuristic device’s usage influences the human life in all the aspects of day-to-day activities. Moreover, human reliance on smart objects makes IoT an important too...
-
Chapter and Conference Paper
AI-ML Analytics: A Comprehensive Investigation on Sentimental Analysis for Social Media Forensics Textual Data
Individuals spend a significant portion of their time on social media. It has become a platform for expression of feelings, sharing of ideas and connecting with other individuals using video and audio posts, t...
-
Chapter and Conference Paper
Boundary-Based Fake Face Anomaly Detection in Videos Using Recurrent Neural Networks
With the surge in the videos over the internet and the spread of digital communications, the attackers are greatly benefited by creating and publishing the fake distorted videos and images known as Deepfakes. ...
-
Chapter
AI Powered Correlation Technique to Detect Virtual Machine Attacks in Private Cloud Environment
The efficacy of cyber forensic systems primarily depends on the real-time discovery and the analysis of the threats in a timely manner. This process requires the development of smart techniques with good prece...