Digital investigations for IPv6-based Wireless Sensor Networks
Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new s...
Ausführliche Beschreibung
Autor*in: |
Kumar, Vijay [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2014transfer abstract |
---|
Schlagwörter: |
---|
Umfang: |
10 |
---|
Übergeordnetes Werk: |
Enthalten in: Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security - Xue, Liming ELSEVIER, 2023, the international journal of digital forensics & incident response, Amsterdam [u.a.] |
---|---|
Übergeordnetes Werk: |
volume:11 ; year:2014 ; pages:66-75 ; extent:10 |
Links: |
---|
DOI / URN: |
10.1016/j.diin.2014.05.005 |
---|
Katalog-ID: |
ELV022638105 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV022638105 | ||
003 | DE-627 | ||
005 | 20230625135811.0 | ||
007 | cr uuu---uuuuu | ||
008 | 180603s2014 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.diin.2014.05.005 |2 doi | |
028 | 5 | 2 | |a GBVA2014009000001.pica |
035 | |a (DE-627)ELV022638105 | ||
035 | |a (ELSEVIER)S1742-2876(14)00048-6 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | |a 610 | |
082 | 0 | 4 | |a 610 |q DE-600 |
082 | 0 | 4 | |a 620 |q VZ |
084 | |a 83.65 |2 bkl | ||
100 | 1 | |a Kumar, Vijay |e verfasserin |4 aut | |
245 | 1 | 0 | |a Digital investigations for IPv6-based Wireless Sensor Networks |
264 | 1 | |c 2014transfer abstract | |
300 | |a 10 | ||
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. | ||
520 | |a Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. | ||
650 | 7 | |a Contiki Operating System |2 Elsevier | |
650 | 7 | |a RAM and flash memory extraction |2 Elsevier | |
650 | 7 | |a Wireless sensor forensics |2 Elsevier | |
650 | 7 | |a RAM content analysis |2 Elsevier | |
650 | 7 | |a Internet of Things |2 Elsevier | |
650 | 7 | |a Wireless Sensor Networks |2 Elsevier | |
700 | 1 | |a Oikonomou, George |4 oth | |
700 | 1 | |a Tryfonas, Theo |4 oth | |
700 | 1 | |a Page, Dan |4 oth | |
700 | 1 | |a Phillips, Iain |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier |a Xue, Liming ELSEVIER |t Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security |d 2023 |d the international journal of digital forensics & incident response |g Amsterdam [u.a.] |w (DE-627)ELV009711430 |
773 | 1 | 8 | |g volume:11 |g year:2014 |g pages:66-75 |g extent:10 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.diin.2014.05.005 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
936 | b | k | |a 83.65 |j Versorgungswirtschaft |q VZ |
951 | |a AR | ||
952 | |d 11 |j 2014 |h 66-75 |g 10 |y 11.2014, S66-, (10 S.) | ||
953 | |2 045F |a 610 |
author_variant |
v k vk |
---|---|
matchkey_str |
kumarvijayoikonomougeorgetryfonastheopag:2014----:iiaivsiainfrp6aewrl |
hierarchy_sort_str |
2014transfer abstract |
bklnumber |
83.65 |
publishDate |
2014 |
allfields |
10.1016/j.diin.2014.05.005 doi GBVA2014009000001.pica (DE-627)ELV022638105 (ELSEVIER)S1742-2876(14)00048-6 DE-627 ger DE-627 rakwb eng 610 610 DE-600 620 VZ 83.65 bkl Kumar, Vijay verfasserin aut Digital investigations for IPv6-based Wireless Sensor Networks 2014transfer abstract 10 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. Contiki Operating System Elsevier RAM and flash memory extraction Elsevier Wireless sensor forensics Elsevier RAM content analysis Elsevier Internet of Things Elsevier Wireless Sensor Networks Elsevier Oikonomou, George oth Tryfonas, Theo oth Page, Dan oth Phillips, Iain oth Enthalten in Elsevier Xue, Liming ELSEVIER Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security 2023 the international journal of digital forensics & incident response Amsterdam [u.a.] (DE-627)ELV009711430 volume:11 year:2014 pages:66-75 extent:10 https://doi.org/10.1016/j.diin.2014.05.005 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 83.65 Versorgungswirtschaft VZ AR 11 2014 66-75 10 11.2014, S66-, (10 S.) 045F 610 |
spelling |
10.1016/j.diin.2014.05.005 doi GBVA2014009000001.pica (DE-627)ELV022638105 (ELSEVIER)S1742-2876(14)00048-6 DE-627 ger DE-627 rakwb eng 610 610 DE-600 620 VZ 83.65 bkl Kumar, Vijay verfasserin aut Digital investigations for IPv6-based Wireless Sensor Networks 2014transfer abstract 10 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. Contiki Operating System Elsevier RAM and flash memory extraction Elsevier Wireless sensor forensics Elsevier RAM content analysis Elsevier Internet of Things Elsevier Wireless Sensor Networks Elsevier Oikonomou, George oth Tryfonas, Theo oth Page, Dan oth Phillips, Iain oth Enthalten in Elsevier Xue, Liming ELSEVIER Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security 2023 the international journal of digital forensics & incident response Amsterdam [u.a.] (DE-627)ELV009711430 volume:11 year:2014 pages:66-75 extent:10 https://doi.org/10.1016/j.diin.2014.05.005 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 83.65 Versorgungswirtschaft VZ AR 11 2014 66-75 10 11.2014, S66-, (10 S.) 045F 610 |
allfields_unstemmed |
10.1016/j.diin.2014.05.005 doi GBVA2014009000001.pica (DE-627)ELV022638105 (ELSEVIER)S1742-2876(14)00048-6 DE-627 ger DE-627 rakwb eng 610 610 DE-600 620 VZ 83.65 bkl Kumar, Vijay verfasserin aut Digital investigations for IPv6-based Wireless Sensor Networks 2014transfer abstract 10 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. Contiki Operating System Elsevier RAM and flash memory extraction Elsevier Wireless sensor forensics Elsevier RAM content analysis Elsevier Internet of Things Elsevier Wireless Sensor Networks Elsevier Oikonomou, George oth Tryfonas, Theo oth Page, Dan oth Phillips, Iain oth Enthalten in Elsevier Xue, Liming ELSEVIER Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security 2023 the international journal of digital forensics & incident response Amsterdam [u.a.] (DE-627)ELV009711430 volume:11 year:2014 pages:66-75 extent:10 https://doi.org/10.1016/j.diin.2014.05.005 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 83.65 Versorgungswirtschaft VZ AR 11 2014 66-75 10 11.2014, S66-, (10 S.) 045F 610 |
allfieldsGer |
10.1016/j.diin.2014.05.005 doi GBVA2014009000001.pica (DE-627)ELV022638105 (ELSEVIER)S1742-2876(14)00048-6 DE-627 ger DE-627 rakwb eng 610 610 DE-600 620 VZ 83.65 bkl Kumar, Vijay verfasserin aut Digital investigations for IPv6-based Wireless Sensor Networks 2014transfer abstract 10 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. Contiki Operating System Elsevier RAM and flash memory extraction Elsevier Wireless sensor forensics Elsevier RAM content analysis Elsevier Internet of Things Elsevier Wireless Sensor Networks Elsevier Oikonomou, George oth Tryfonas, Theo oth Page, Dan oth Phillips, Iain oth Enthalten in Elsevier Xue, Liming ELSEVIER Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security 2023 the international journal of digital forensics & incident response Amsterdam [u.a.] (DE-627)ELV009711430 volume:11 year:2014 pages:66-75 extent:10 https://doi.org/10.1016/j.diin.2014.05.005 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 83.65 Versorgungswirtschaft VZ AR 11 2014 66-75 10 11.2014, S66-, (10 S.) 045F 610 |
allfieldsSound |
10.1016/j.diin.2014.05.005 doi GBVA2014009000001.pica (DE-627)ELV022638105 (ELSEVIER)S1742-2876(14)00048-6 DE-627 ger DE-627 rakwb eng 610 610 DE-600 620 VZ 83.65 bkl Kumar, Vijay verfasserin aut Digital investigations for IPv6-based Wireless Sensor Networks 2014transfer abstract 10 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. Contiki Operating System Elsevier RAM and flash memory extraction Elsevier Wireless sensor forensics Elsevier RAM content analysis Elsevier Internet of Things Elsevier Wireless Sensor Networks Elsevier Oikonomou, George oth Tryfonas, Theo oth Page, Dan oth Phillips, Iain oth Enthalten in Elsevier Xue, Liming ELSEVIER Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security 2023 the international journal of digital forensics & incident response Amsterdam [u.a.] (DE-627)ELV009711430 volume:11 year:2014 pages:66-75 extent:10 https://doi.org/10.1016/j.diin.2014.05.005 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 83.65 Versorgungswirtschaft VZ AR 11 2014 66-75 10 11.2014, S66-, (10 S.) 045F 610 |
language |
English |
source |
Enthalten in Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security Amsterdam [u.a.] volume:11 year:2014 pages:66-75 extent:10 |
sourceStr |
Enthalten in Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security Amsterdam [u.a.] volume:11 year:2014 pages:66-75 extent:10 |
format_phy_str_mv |
Article |
bklname |
Versorgungswirtschaft |
institution |
findex.gbv.de |
topic_facet |
Contiki Operating System RAM and flash memory extraction Wireless sensor forensics RAM content analysis Internet of Things Wireless Sensor Networks |
dewey-raw |
610 |
isfreeaccess_bool |
false |
container_title |
Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security |
authorswithroles_txt_mv |
Kumar, Vijay @@aut@@ Oikonomou, George @@oth@@ Tryfonas, Theo @@oth@@ Page, Dan @@oth@@ Phillips, Iain @@oth@@ |
publishDateDaySort_date |
2014-01-01T00:00:00Z |
hierarchy_top_id |
ELV009711430 |
dewey-sort |
3610 |
id |
ELV022638105 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV022638105</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625135811.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.diin.2014.05.005</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2014009000001.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV022638105</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1742-2876(14)00048-6</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">610</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">610</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">83.65</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kumar, Vijay</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital investigations for IPv6-based Wireless Sensor Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2014transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">10</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Contiki Operating System</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">RAM and flash memory extraction</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless sensor forensics</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">RAM content analysis</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet of Things</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless Sensor Networks</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oikonomou, George</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tryfonas, Theo</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Page, Dan</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Phillips, Iain</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Xue, Liming ELSEVIER</subfield><subfield code="t">Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security</subfield><subfield code="d">2023</subfield><subfield code="d">the international journal of digital forensics & incident response</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV009711430</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:11</subfield><subfield code="g">year:2014</subfield><subfield code="g">pages:66-75</subfield><subfield code="g">extent:10</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.diin.2014.05.005</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">83.65</subfield><subfield code="j">Versorgungswirtschaft</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">11</subfield><subfield code="j">2014</subfield><subfield code="h">66-75</subfield><subfield code="g">10</subfield><subfield code="y">11.2014, S66-, (10 S.)</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">610</subfield></datafield></record></collection>
|
author |
Kumar, Vijay |
spellingShingle |
Kumar, Vijay ddc 610 ddc 620 bkl 83.65 Elsevier Contiki Operating System Elsevier RAM and flash memory extraction Elsevier Wireless sensor forensics Elsevier RAM content analysis Elsevier Internet of Things Elsevier Wireless Sensor Networks Digital investigations for IPv6-based Wireless Sensor Networks |
authorStr |
Kumar, Vijay |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV009711430 |
format |
electronic Article |
dewey-ones |
610 - Medicine & health 620 - Engineering & allied operations |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
610 610 DE-600 620 VZ 83.65 bkl Digital investigations for IPv6-based Wireless Sensor Networks Contiki Operating System Elsevier RAM and flash memory extraction Elsevier Wireless sensor forensics Elsevier RAM content analysis Elsevier Internet of Things Elsevier Wireless Sensor Networks Elsevier |
topic |
ddc 610 ddc 620 bkl 83.65 Elsevier Contiki Operating System Elsevier RAM and flash memory extraction Elsevier Wireless sensor forensics Elsevier RAM content analysis Elsevier Internet of Things Elsevier Wireless Sensor Networks |
topic_unstemmed |
ddc 610 ddc 620 bkl 83.65 Elsevier Contiki Operating System Elsevier RAM and flash memory extraction Elsevier Wireless sensor forensics Elsevier RAM content analysis Elsevier Internet of Things Elsevier Wireless Sensor Networks |
topic_browse |
ddc 610 ddc 620 bkl 83.65 Elsevier Contiki Operating System Elsevier RAM and flash memory extraction Elsevier Wireless sensor forensics Elsevier RAM content analysis Elsevier Internet of Things Elsevier Wireless Sensor Networks |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
g o go t t tt d p dp i p ip |
hierarchy_parent_title |
Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security |
hierarchy_parent_id |
ELV009711430 |
dewey-tens |
610 - Medicine & health 620 - Engineering |
hierarchy_top_title |
Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV009711430 |
title |
Digital investigations for IPv6-based Wireless Sensor Networks |
ctrlnum |
(DE-627)ELV022638105 (ELSEVIER)S1742-2876(14)00048-6 |
title_full |
Digital investigations for IPv6-based Wireless Sensor Networks |
author_sort |
Kumar, Vijay |
journal |
Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security |
journalStr |
Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
600 - Technology |
recordtype |
marc |
publishDateSort |
2014 |
contenttype_str_mv |
zzz |
container_start_page |
66 |
author_browse |
Kumar, Vijay |
container_volume |
11 |
physical |
10 |
class |
610 610 DE-600 620 VZ 83.65 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Kumar, Vijay |
doi_str_mv |
10.1016/j.diin.2014.05.005 |
dewey-full |
610 620 |
title_sort |
digital investigations for ipv6-based wireless sensor networks |
title_auth |
Digital investigations for IPv6-based Wireless Sensor Networks |
abstract |
Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. |
abstractGer |
Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. |
abstract_unstemmed |
Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U |
title_short |
Digital investigations for IPv6-based Wireless Sensor Networks |
url |
https://doi.org/10.1016/j.diin.2014.05.005 |
remote_bool |
true |
author2 |
Oikonomou, George Tryfonas, Theo Page, Dan Phillips, Iain |
author2Str |
Oikonomou, George Tryfonas, Theo Page, Dan Phillips, Iain |
ppnlink |
ELV009711430 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth oth |
doi_str |
10.1016/j.diin.2014.05.005 |
up_date |
2024-07-06T16:46:57.367Z |
_version_ |
1803848953225019392 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV022638105</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625135811.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.diin.2014.05.005</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2014009000001.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV022638105</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1742-2876(14)00048-6</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">610</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">610</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">83.65</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kumar, Vijay</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital investigations for IPv6-based Wireless Sensor Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2014transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">10</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can be directly reached from the Internet. This has a series of advantages but also introduces new security vulnerabilities and exposes sensor deployments to attack. A compromised Internet host can send malicious information to the system and trigger incorrect actions. Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or about the attackr's identity. In this paper we critically assess and analyse information retrieved from a device used for IoT networking, in order to identify the factors which may have contributed to a security breach. To achieve this, we present an approach for the extraction of RAM and flash contents from a sensor node. Subsequently, we analyse extracted network connectivity information and we investigate the possibility of correlating information gathered from multiple devices in order to reconstruct the network topology. Further, we discuss experiments and analyse how much information can be retrieved in different scenarios. Our major contribution is a mechanism for the extraction, analysis and correlation of forensic data for IPv6-based WSN deployments, accompanied by a tool which can analyse RAM dumps from devices running the Contiki Operating System (OS) and powered by 8051-based, 8-bit micro-controllers.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Contiki Operating System</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">RAM and flash memory extraction</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless sensor forensics</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">RAM content analysis</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet of Things</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless Sensor Networks</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oikonomou, George</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tryfonas, Theo</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Page, Dan</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Phillips, Iain</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Xue, Liming ELSEVIER</subfield><subfield code="t">Applying GeoDetector to disentangle the contributions of the 4-As evaluation indicators to the spatial differentiation of coal resource security</subfield><subfield code="d">2023</subfield><subfield code="d">the international journal of digital forensics & incident response</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV009711430</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:11</subfield><subfield code="g">year:2014</subfield><subfield code="g">pages:66-75</subfield><subfield code="g">extent:10</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.diin.2014.05.005</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">83.65</subfield><subfield code="j">Versorgungswirtschaft</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">11</subfield><subfield code="j">2014</subfield><subfield code="h">66-75</subfield><subfield code="g">10</subfield><subfield code="y">11.2014, S66-, (10 S.)</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">610</subfield></datafield></record></collection>
|
score |
7.400522 |