Digital Forensics and Internet of Things

(DF-IOT.AE1)
Lessons
Lab
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Preface

2

Face Recognition

  • Introduction
  • Image Processing
  • Deep Learning
  • Methodology
  • Conclusion
3

Smart Healthcare Monitoring System: An IoT-Based Approach

  • Introduction
  • Healthcare at Clinics
  • Remote Healthcare
  • Technological Framework
  • Standard UIs, Shows, and User Requirements
  • Cloud-Based Health Monitoring Using IoT
  • Information Acquisition
  • The Processing of Cloud
  • IoT-Based Health Monitoring Using Raspberry Pi
  • IoT-Based Health Monitoring Using RFID
  • Arduino and IoT-Based Health Monitoring System
  • IoT-Based Health Monitoring System Using ECG Signal
  • IoT-Based Health Monitoring System Using Android App
  • Conclusion and Future Perspectives
4

Design of Gesture-Based Hand Gloves Using Arduino UNO: A Grace to Abled Mankind

  • Introduction
  • Result and Discussion
  • Conclusion
  • Future Scope
5

Playing With Genes: A Pragmatic Approach in Genetic Engineering

  • Introduction
  • Literature Review
  • Methodology
  • Food and Agriculture
  • Impact on Farmers
  • Diseases: Gene Editing and Curing
  • Conclusion
  • Future Scope
6

Digital Investigative Model in IoT: Forensic View

  • Introduction
  • Application of AI for Different Purposes in Forensic Science
  • Future of AI
  • Challenges While Implementing AI
  • Conclusion
7

Internet of Things Mobility Forensics

  • Introduction
  • Smart Device and IoT
  • Relation of Internet of Things with Mobility Forensics
  • Mobility Forensics IoT Investigation Model
  • Internet of Things Mobility Forensics: A Source of Information
  • Drawbacks in IoT Devices Data Extraction
  • Future Perspective of Internet of Things Mobility Forensics
  • Conclusion
8

A Generic Digital Scientific Examination System for Internet of Things

  • Introduction
  • Internet of Things
  • IoT Architecture
  • Characteristics of IoT
  • IoT Security Challenges and Factors of Threat
  • Role of Digital Forensics in Cybercrime Investigation for IoT
  • IoT Security Steps
  • Conclusion
9

IoT Sensors: Security in Network Forensics

  • Introduction
  • Cybersecurity Versus IoT Security and Cyber-Physical Systems
  • The IoT of the Future and the Need to Secure
  • Security Engineering for IoT Development
  • Building Security Into Design and Development
  • Security in Agile Developments
  • Focusing on the IoT Device in Operation
  • Cryptographic Fundamentals for IoT Security Engineering
  • Cloud Security for the IoT
  • Conclusion
10

Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime

  • Introduction
  • Literature Review
  • Proposed Work
  • Xilinx IP Core Square Root
  • RTL View of the 8-Bit Multiplier
  • RTL View of 8-Bit Down Counter
  • Up/Down Counter Simulation Results
  • Square Root Simulation Results
  • Hardware Device Utilization Reports of Binary Down Counter
  • Comparison of Proposed and Existing Work for Binary Up/Down Counter
  • Conclusion
11

Human-Robot Interaction: An Artificial Cognition-Based Study for Criminal Investigations

  • Introduction
  • Methodology
  • Architecture Models for Robots
  • Cognitive Architecture
  • Challenges in the Existing Social Robots and the Future Scopes
  • Conclusion
  • Robots in Future Pandemics
12

VANET: An IoT Forensic-Based Model for Maintaining Chain of Custody

  • Introduction
  • Cluster Performance Parameters
  • Routing Protocols in VANET
  • Internet of Vehicles
  • IoT Forensic in Vehicular Ad Hoc Networks
  • Conclusion
13

Cognitive Radio Networks: A Merit for Teleforensics

  • Introduction
  • Contribution of Work
  • Conclusion and Future Scope
  • Acknowledgement
14

Fingerprint Image Identification System: An Asset for Security of Bank Lockers

  • Introduction
  • Result and Discussion
  • Conclusion
  • Future Scope
15

IoT Forensics: Interconnection and Sensing Frameworks

  • Introduction
  • The Need for IoT Forensics
  • Various Types of Evidences Encountered
  • Protocols and Frameworks in IoT Forensics
  • IoT Forensics Process Model
  • Suggestive Solutions
  • Conclusion
16

IoT Forensics: A Pernicious Repercussions

  • Introduction: Challenges in IoT Forensics
  • Scope of the Compromise and Crime Scene Reconstruction
  • Device and Data Proliferation
  • Multiple Data Location and Jurisdiction Challenges
  • Device Type
  • Lack of Training and Weak Knowledge Management
  • Data Encryption
  • Heterogeneous Software and/or Hardware Specifications
  • Privacy and Ethical Considerations by Accessing Personal Data
  • Lack of a Common Forensic Model in IoT Devices
  • Securing the Chain of Custody
  • Lifespan Limitation
  • The Cloud Forensic Problem
  • The Minimum or Maximum Period in Which Data is Stored in the Cloud
  • Evidence Analysis and Correlation
  • Conclusion

1

Digital Investigative Model in IoT: Forensic View

  • Completing the Chain of Custody Form
  • Training an AI Model to Recognize Patterns
  • Creating a Chatbot or AI Assistant for Helping Forensic Teams
2

Internet of Things Mobility Forensics

  • Simulating Sensor-to-Processor Communication in a Smart Device
  • Simulating a MitM Attack on IoT Device Communication
  • Recreating a Forensic Case Study Using IoT Logs
  • Simulating Logical Data Extraction from a Smartphone
  • Capturing and Analyzing Communication From IoT Devices
3

A Generic Digital Scientific Examination System for Internet of Things

  • Identifying a Cyber Attack via Anomaly Detection
4

IoT Sensors: Security in Network Forensics

  • Detecting Log Tampering Using SHA-256
  • Securing IoT Data Using AES and RSA
  • Detecting Public S3 Buckets Storing IoT Data
5

Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime

  • Designing, Synthesizing, and Simulating an 8-bit Binary Multiplier using Verilog
  • Designing and Simulating an 8-bit Binary Multiplier Using Verilog

Related Courses

All Courses
scroll to top