Open Access
Issue |
SHS Web Conf.
Volume 177, 2023
International Conference Legal Perspectives on the Internet. COPEJI 6.0. The Right to the Confluence of Two Universes: Where to?
|
|
---|---|---|
Article Number | 03002 | |
Number of page(s) | 13 | |
Section | Virtual Criminality and Criminal Proceeding in the Context of the Digital World | |
DOI | https://doi.org/10.1051/shsconf/202317703002 | |
Published online | 22 September 2023 |
- M. Karyda, L. Mitrou, Internet Forensics: Legal and Technical Issues, Second International Workshop on Digital Forensics and Incident Analysis, 3-12, DOI: 10.1109/WDFIA.2007.4299368, (2007) [Google Scholar]
- B. Martini, Q. Do, K.K.R. Choo, Trends and Issues in Crime and Criminal Justice 512, 1-16, DOI: 10.3316/agispt.2017556 (2006) [Google Scholar]
- D. Savu, M. Tomescu, L. Băjenaru, Revista Română de Informatică şi Automatică, 27(1), 514 (2017) [Google Scholar]
- J. Wise, Earthweb, December 4, URL: https://earthweb.com/how-many-iot-devices-are-there/, accesed12.12.2022, (2022) [Google Scholar]
- L.S. Vailshery, Internet of Things (IoT) statistics & facts. Statista, August 1st, https://www.statista.com/topics/2637/internet-of-things/#topicOverview, accessed: 12.12.2022, (2022) [Google Scholar]
- M. Shafiq, Z. Gu, O. Cheikhrouhou, W. Alhakami, H. Hamam, Wireless Communications and Mobile Computing, 2022, 1-12, DOI: 10.1155/2022/8669348, (2022) [CrossRef] [Google Scholar]
- S. Kumar, P. Tiwari, M. Zymbler, J. Big Data, 6, 1-12, DOI: 10.1186/s40537-019-0268-2 (2019) [CrossRef] [Google Scholar]
- L. Atzori, A. Iera, G. Morabito, Ad Hoc Networks, 56, 122-140, DOI: 10.1016/j.adhoc.2016.12.004, (2017) [CrossRef] [Google Scholar]
- European Parliament, The Internet of Things. Opportunities and challenges, URL: https://www.europarl.europa.eu/RegData/etudes/BRIE/2015/557012/EPRS_BRI(2015)557012_EN.pdf, accessed: 16.12.2022, (2019) [Google Scholar]
- European Commission, Report from the Commission to the Council and the European Parliament. Final report sector inquiry into consumer Internet of Things, URL: https://competition-policy.ec.europa.eu/system/files/2022-01/internet-of-things_final_report_2022_en.pdf, accessed: 16.12.2022, (2022) [Google Scholar]
- J. Abbate, Internet Histories, 1(1-2), 8-14, DOI: 10.1080/24701475.2017.1305836, (2017) [CrossRef] [Google Scholar]
- P.K. Verma, R. Verma, A. Prakash, A. Agrawal, K. Naik, R. Tripathi, M. Alsabaan, T. Khalifa, T. Abdelkader, A. Abogharaf, J Network and Computer Applications, 66, 83-105, DOI: 10.1016/j.jnca.2016.02.016, (2016) [CrossRef] [Google Scholar]
- J.Q Li, F.R. Yu, G. Deng, C. Luo, Z. Ming, Q. Yan, Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges, IEEE Communications Surveys & Tutorials 19 (3), 1504-1526, DOI: 10.1109/COMST.2017.2691349, (2017) [CrossRef] [Google Scholar]
- Q. Wei, C. Siqi, P. Mugen, Digital Communications and Networks, 6(1), 1-13, DOI: 10.1016/j.dcan.2019.07.001, (2020) [CrossRef] [Google Scholar]
- S. Latif, M. Driss, W. Boulila, Z. e Huma, S.S. Jamal, Z. Idrees, J. Ahmad, Sensors 21(22):7518, 1-45, DOI: 10.3390/s21227518, (2021) [Google Scholar]
- D. Guinard, V. Trifa, F. Mattern, E. Wilde, From the Internet of Things to the Web of Things: Resource-oriented Architecture and Best Practices, in D. Uckelmann, M. Harrison, F. Michahelles, (eds) Architecting the Internet of Things, 97-129, DOI: 10.1007/978-3-64219157-2_5, (Springer, Berlin, Heidelberg, 2011) [Google Scholar]
- D.J. Langley, J. van Doorn, I.C.L. Ng, S. Stieglitz, S., A. Lazovik, A. Boonstra, J. Business Research, 122, 853-863, DOI: 10.1016/j.jbusres.2019.12.035, (2021) [CrossRef] [Google Scholar]
- K. Ashton, RFID Journal, 22, 97-114, (2009) [Google Scholar]
- X. Jia, Q. Feng, T. Fan, Q. Lei, RFID technology and its applications in Internet of Things (IoT), 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), 1282-1285, DOI: 10.1109/CECNet.2012.6201508, (2012) [Google Scholar]
- Cisco Umbrella, https://umbrella.cisco.com/info/2021-cyber-security-threat-trends-phishing-crypto-top-the-list, accessed: 18.12.2022, (2021) [Google Scholar]
- M. Conti, A. Dehghantanha, K. Franke, S. Watson, Future Generation Computer Systems 78, (2) 544-546, DOI: 10.1016/j.future.2017.07.060, (2017) [Google Scholar]
- B. Jovanovic, Internet of Things statistics for 2022 – Taking things apart. DataProt, May 13, URL: https://dataprot.net/statistics/iot-statistics/, accessed: 20.12.2022, (2022) [Google Scholar]
- I. Yaqoob, I.A.T. Hashem, A. Ahmed, S.M.A. Kazmi, C.S Hong, Future Generation Computer Systems, 92, 265-275, DOI: 10.1016/j.future.2018.09.058, (2019) [CrossRef] [Google Scholar]
- M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis, E. Markakis, A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues, IEEE Communications Surveys & Tutorials, 22(2), 1191–1221, DOI: 10.1109/COMST.2019.2962586.S2CID213028057, (2019) [Google Scholar]
- H.F. Atlam, E. El-Din Hemdan, A. Alenezi, M.O. Alassafi, G.B. Wills, Internet of Things 11, 1-10, DOI: 10.1016/j.iot.2020.100220, (2020) [CrossRef] [Google Scholar]
- J.M. Castelo Gómez, J. Carrillo Mondéjar, J. Roldán Gómez, J.L. Martínez, Forensic Science International: Digital Inv., 36, Supplement, 1-3, DOI: 10.1016/j.fsidi.2021.301114, (2021) [Google Scholar]
- M.S. Gal, D.L. Rubinfeld, NYU Law Rev., 94, 737-770, DOI: 10.2139/ssrn.3326377, (2019) [Google Scholar]
- T. White, Educational St. in Mathematics, 72, 17–37, DOI: 10.1007/s10649-008-9180-y, (2009) [CrossRef] [Google Scholar]
- T. Das, Data Corruption: What is it and How to Prevent it?, Data Management, December 23, URL: https://geekflare.com/data-corruption/, accessed: 14.01.2023, (2022) [Google Scholar]
- M.B. Seyyar, Z.J.M.H. Geradts, Forensic Science International: Digital Inv., 33, 1-9, DOI: 10.1016/j.fsidi.2020.200906, (2020) [Google Scholar]
- S. Zawoad, R. Hasan, FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things, IEEE International Conference on Services Computing, 279–284, DOI:10.1109/SCC.2015.46, (New York City, NY, USA: IEEE, 2015) [Google Scholar]
- J. Hou, Y. Li, J. Yu, W. Shi, IEEE Internet of Things J., 7(1), 1-15, DOI: 10.1109/JIOT.2019.2940713, (2019) [Google Scholar]
- U. Karabiyik, K. Akkaya, Digital Forensics for IoT and WSNs, in: H. Ammari (eds) Mission-Oriented Sensor Networks and Systems: Art and Science. Studies in Systems, Decision and Control, 2, 171-207, DOI: 10.1007/978-3-319-92384-0_6, (Springer, Cham, 2018) [Google Scholar]
- S. Mrdovic, IoT Forensics, in: G. Avoine, J. Hernandez-Castro, J. (eds), Security of Ubiquitous Computing Systems, 215–229, DOI: 10.1007/978-3-030-10591-4_13, (Springer, Cham., 2019) [Google Scholar]
- S. Brotsis, N. Kolokotronis, K. Limniotis, S. Shiaeles, D. Kavallieros, E. Bellini, C. Pavue, Blockchain Solutions for Forensic Evidence Preservation in IoT Environments, IEEE Conference on Network Softwarization (NetSoft), 110-114, DOI: 10.1109/NETSOFT.2019.8806675, (2019) [Google Scholar]
- L.F. Sikos, Forensic Science International: Digital Inv., 32, 1-12, DOI: 10.1016/j.fsidi.2019.200892, (2019) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.