2016
DOI: 10.14257/ijsia.2016.10.5.28
|View full text |Cite
|
Sign up to set email alerts
|

Improving Analysis Phase in Network Forensics by Using Attack Intention Analysis

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…To fully integrate the industrial and societal sectors into the Internet of Things applications, many assurances and controls that improve information security and control privacy controls are required; otherwise, there will be a threat to data integrity due to easy access to physical objects that are not subject to supervision. This danger is regarded as the primary cause of security threats to Internet of Things applications, which are likely to affect the industry and the economy; it is also anticipated to raise worries about privacy breaches [21,22,23,24].…”
Section: Security Threats Of the Internet Of Thingsmentioning
confidence: 99%
“…To fully integrate the industrial and societal sectors into the Internet of Things applications, many assurances and controls that improve information security and control privacy controls are required; otherwise, there will be a threat to data integrity due to easy access to physical objects that are not subject to supervision. This danger is regarded as the primary cause of security threats to Internet of Things applications, which are likely to affect the industry and the economy; it is also anticipated to raise worries about privacy breaches [21,22,23,24].…”
Section: Security Threats Of the Internet Of Thingsmentioning
confidence: 99%
“…FIGURE 1. Mathematical models [8] Recently, cybercrime has spread widely around the world, and has caused great material and political damage in addition to moral damage such as disclosure of data privacy and theft of information, etc [29][30][31].…”
Section: A Mathematical Proposed Model For Public Key Encryption Algo...mentioning
confidence: 99%
“…Therefore, the investigation phase is considered to be costly in terms of time and effort. Thus, the analysis of the evidence of cybercrime with high professionalism and accuracy can reduce the cost of the investigation phase [16][17][18]. Attack intention, as described in [8], provides investigators with consistent analytical data to generate accurate decision-making.…”
Section: Introductionmentioning
confidence: 99%