skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics Enhancements
Award ID(s):
2230609 2226612
PAR ID:
10506507
Author(s) / Creator(s):
; ;
Publisher / Repository:
IEEE
Date Published:
ISBN:
979-8-3503-0460-2
Page Range / eLocation ID:
0991 to 0998
Format(s):
Medium: X
Location:
Abu Dhabi, United Arab Emirates
Sponsoring Org:
National Science Foundation
More Like this
  1. We develop a forensic-like framework for network structural characterization based on an analysis of their nonlinear response to mechanical deformation. For model networks, this methodology provides information about the strand degree of polymerization between cross-links, the effective cross-link functionality, the contribution of loops and entanglements to network elasticity, as well as the fraction of stress-supporting strands. For networks with trapped entanglements, we identify a transition from cross-link-controlled to entanglement-controlled network elasticity with increasing degree of polymerization of network strands between cross-links and show how specific features of this transition are manifested in changes of entanglement and structural shear moduli characterizing different modes of network deformation. In particular, this cross-link-to-entanglement transition results in saturation of the network shear modulus at small deformations and renormalization of the degree of polymerization of the effective network strands determining nonlinear elastic response in the strongly entangled networks. The developed approach enables the classification of networks according to their topology and effectiveness of stress distribution between network strands. 
    more » « less
  2. This report discusses Digital Forensics and Cyber-Security and different vulnerabilities that put the users at risk of compromising their sensitive data and making it available to attackers. With the raising of new threats aiming at technology, some people are not aware of hackers stealing their data. This study will discuss what Cyber-Security is and how many people are aware of what it all entails. This study will also recommendations on how to recognize attacks and learn basic terms to help inform the public. The study utilizes surveys of students from Hampton University so the authors can make the proper analysis and recommendations regarding the issue. 
    more » « less