Isovic, D. & Norström, C., 2002. Components in real-time
systems. Proc. of the 8th International Conference on
Real-Time Computing Systems and Applications,
Tokyo, Japan, pp.1–12.
Julian Rathke and Vladimiro Sassone, 2010. Cyber Security
in the internet of things. Cryptology and Information
Security Series, 4, pp.109–124.
Kent, K. et al., 2006. Guide to integrating forensic
techniques into incident response. NIST Special
Publication, (August), pp.800–886.
Martini, B. & Choo, K.K.R., 2012. An integrated
conceptual digital forensic framework for cloud
computing. Digital Investigation, 9(2), pp.71–80.
Miorandi, D. et al., 2012. Internet of things: Vision,
applications and research challenges. Ad Hoc Networks,
10(7), pp.1497–1516.
Oriwoh, E. et al., 2013. Internet of Things Forensics:
Challenges and Approaches. Proceedings of the 9th
IEEE International Conference on Collaborative
Computing: Networking, Applications and
Worksharing, pp.608–615. Available at:
http://eudl.eu/doi/10.4108/icst.collaboratecom.2013.25
4159.
Oriwoh, E. & Sant, P., 2013. The forensics edge
management system: A concept and design. In
Proceedings - IEEE 10th International Conference on
Ubiquitous Intelligence and Computing, UIC 2013 and
IEEE 10th International Conference on Autonomic and
Trusted Computing, ATC 2013. pp. 544–550.
Palmer, G., 2001. A Road Map for Digital Forensic
Research. Proceedings of the 2001 Digital Forensics
Research Workshop (DFRWS 2004), pp.1–42.
Available at: http://www.dfrws.org/2001/dfrws-rm-
final.pdf.
Pollitt, M., 1995. Computer forensics: An approach to
evidence in cyberspace. In Proceedings of the National
Information Systems Security Conference. pp. 487–491.
Raghavan, S., 2013. Digital forensic research: current state
of the art. CSI Transactions on ICT, 1(1), pp.91–114.
Available at: http://link.springer.com/10.1007/s40012-
012-0008-7.
Reith, M., Carr, C. & Gunsch, G., 2002. An Examination of
Digital Forensic Models. International Journal of
Digital Evidence, 1(3), pp.1–12. Available at:
https://www.utica.edu/academic/institutes/ecii/publicat
ions/articles/A04A40DC-A6F6-F2C1-
98F94F16AF57232D.pdf.
Roman, R., Najera, P. & Lopez, J., 2011. Securing the
Internet of Things (IoT). IEEE Computer, 44(9), pp.51–
58. Available at:
https://www.bbvaopenmind.com/en/securing-the-
internet-of-things-iot/.
Selamat, S.R., Yusof, R. & Sahib, S., 2008. Mapping
Process of Digital Forensic Investigation Framework.
Journal of Computer Science, 8(10), pp.163–169.
Available at:
http://paper.ijcsns.org/07_book/200810/20081025.pdf.
Sperner, K., Meyer, S. & Magerkurth, C., 2011. Introducing
entity-based concepts to business process modeling.
Lecture Notes in Business Information Processing, 95
LNBIP, pp.166–171.
Sun, H.M., Hsu, S.P. & Chen, C.M., 2007. Mobile Jamming
attack and its countermeasure in wireless sensor
networks. In Proceedings - 21st International
Conference on Advanced Information Networking and
Applications Workshops/Symposia, AINAW’07. pp.
457–462.
Sun, X. & Wang, C., 2011. The research of security
technology in the Internet of Things. Advances in
Intelligent and Soft Computing, 105, pp.113–119.
Sun, Y. et al., 2014. Toward Parametric Timed Interfaces
for Real-Time Components. Electronic Proceedings in
Theoretical Computer Science, 145, pp.49–64.
Available at: http://arxiv.org/abs/1404.0088v1.
Taylor, M. et al., 2010. Digital evidence in cloud computing
systems. Computer Law & Security Review, 26(3),
pp.304–308. Available at:
http://www.sciencedirect.com/science/article/pii/S026
736491000049X%5Cnhttp://www.sciencedirect.com.li
brary.capella.edu/science/article/pii/S02673649100004
9X%5Cnhttp://www.sciencedirect.com.library.capella.
edu/science?_ob=MiamiImageURL&_cid=271884&_
user=442178.
Vanansius Baryamureeba & Tushabe, F., 2004. Digital
Forensic Research Workshop. In Digital Forensic
Research Workshop DFRWS 2004.
Vasseur, J.-P. & Dunkels, A., 2010. Interconnecting Smart
Objects with IP, Available at:
http://www.sciencedirect.com/science/article/pii/B978
0123751652000223.
Walsh Ray, 2016. IoT Botnet Launching Massive DDoS
Attacks on Websites - BestVPN.com. Available at:
https://www.bestvpn.com/iot-botnet-mirai-ddos/
[Accessed December 14, 2016].
Walton, G.H., Longstaff, T.A. & Linger, R.C., 2009.
Computational Evaluation of Software Security
Attributes. In System Sciences, 2009. HICSS ’09.
42nd Hawaii International Conference on. pp. 1–10.
Xu, X., 2013. Study on security problems and key
technologies of the internet of things. In Proceedings
- 2013 International Conference on Computational
and Information Sciences, ICCIS 2013. pp. 407–410.
Zareen, M.S., Waqar, A. & Aslam, B., 2013. Digital
forensics: Latest challenges and response. In
Conference Proceedings - 2013 2nd National
Conference on Information Assurance, NCIA 2013.
pp. 21–29.
Zawoad, S. & Hasan, R., 2015. FAIoT: Towards Building
a Forensics Aware Eco System for the Internet of
Things. In Proceedings - 2015 IEEE International
Conference on Services Computing, SCC 2015. pp.
279–284.