2019 IEEE 10th Control and System Graduate Research Colloquium (ICSGRC) 2019
DOI: 10.1109/icsgrc.2019.8837096
|View full text |Cite
|
Sign up to set email alerts
|

A Consumer-Oriented Cloud Forensic Process Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…To expedite and create continuous learning practices, modern higher education institutions have generally adopted multiple different technologies. Among these, e-learning systems are the most common [4,5], and Cloud computing based e-learning in particular has experienced significant growth in the last decade [6][7][8]. However, according to the literature, the issue of student disengagement and boredom has arisen with regard to e-learning systems [9,10].…”
Section: Introductionmentioning
confidence: 99%
“…To expedite and create continuous learning practices, modern higher education institutions have generally adopted multiple different technologies. Among these, e-learning systems are the most common [4,5], and Cloud computing based e-learning in particular has experienced significant growth in the last decade [6][7][8]. However, according to the literature, the issue of student disengagement and boredom has arisen with regard to e-learning systems [9,10].…”
Section: Introductionmentioning
confidence: 99%
“…There are two ways of removing noise from collected sound data. That is with the use threshold based de-noising method [35,36,37] and recursive least squares adaptive filtering method [38,39]. However, the first is adopted in our work for its suitability of smart devices.…”
Section: Pre-processingmentioning
confidence: 99%
“…With the proliferation of cloud services, ensuring data security and privacy has become paramount. Enterprises, especially those dealing with sensitive information, face challenges in relinquishing control over their data when it resides in the cloud [7]. Concerns arise regarding data security in transit, processing, and storage.…”
Section: Introduction 1overviewmentioning
confidence: 99%