Digital Forensic Investigation of Internet of Things (IoT) Devices

This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furt...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Montasari, Reza. (Editor, http://id.loc.gov/vocabulary/relators/edt), Jahankhani, Hamid. (Editor, http://id.loc.gov/vocabulary/relators/edt), Hill, Richard. (Editor, http://id.loc.gov/vocabulary/relators/edt), Parkinson, Simon. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2021.
Edition:1st ed. 2021.
Series:Advanced Sciences and Technologies for Security Applications,
Subjects:
Online Access:https://doi.org/10.1007/978-3-030-60425-7
LEADER 04814nam a22006375i 4500
001 978-3-030-60425-7
003 DE-He213
005 20210623060234.0
007 cr nn 008mamaa
008 201209s2021 gw | s |||| 0|eng d
020 |a 9783030604257  |9 978-3-030-60425-7 
024 7 |a 10.1007/978-3-030-60425-7  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Digital Forensic Investigation of Internet of Things (IoT) Devices  |h [electronic resource] /  |c edited by Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson. 
250 |a 1st ed. 2021. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2021. 
300 |a VIII, 285 p. 91 illus., 85 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advanced Sciences and Technologies for Security Applications,  |x 1613-5113 
505 0 |a 1. Emulation vs Instrumentation for Android Malware Detection -- 2. Towards a Generic Approach of Quantifying Evidence Volatility in Resource Constrained Devices -- 3. Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence -- 4. Drone Forensics: The impact and Challenges -- 5. Intrusion Detection and CAN Vehicle Networks. 
520 |a This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and ‘smart’ home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics. . 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer engineering. 
650 0 |a Internet of things. 
650 0 |a Embedded computer systems. 
650 0 |a Computer crimes. 
650 0 |a System safety. 
650 1 4 |a Systems and Data Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 
650 2 4 |a Mobile and Network Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28050 
650 2 4 |a Cyber-physical systems, IoT.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/T24080 
650 2 4 |a Computer Crime.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28070 
650 2 4 |a Security Science and Technology.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/P31080 
700 1 |a Montasari, Reza.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Jahankhani, Hamid.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Hill, Richard.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Parkinson, Simon.  |e editor.  |0 (orcid)0000-0002-1747-9914  |1 https://orcid.org/0000-0002-1747-9914  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783030604240 
776 0 8 |i Printed edition:  |z 9783030604264 
776 0 8 |i Printed edition:  |z 9783030604271 
830 0 |a Advanced Sciences and Technologies for Security Applications,  |x 1613-5113 
856 4 0 |u https://doi.org/10.1007/978-3-030-60425-7 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)