• Coffee forensics — Reconstructing data in IoT devices running Contiki OS 

      Sandvik, Jens-Petter; Franke, Katrin; Abie, Habtamu; Årnes, Andrè (Peer reviewed; Journal article, 2021)
      The ability to examine evidence and reconstruct files from novel IoT operating systems, such as Contiki with its Coffee File System, is becoming vital in digital forensic investigations. Two main challenges for an investigator ...
    • A Cognitive Digital Twin Architecture for Cybersecurity in IoT-Based Smart Homes 

      Pirbhulal, Sandeep; Abie, Habtamu; Shukla, Ankur; Katt, Basel (Peer reviewed; Journal article, 2023)
      Home Sensing Technology Conference paper A Cognitive Digital Twin Architecture for Cybersecurity in IoT-Based Smart Homes Sandeep Pirbhulal, Habtamu Abie, Ankur Shukla & Basel Katt Conference paper First Online: 09 April ...
    • Evidence in the fog – Triage in fog computing systems 

      Sandvik, Jens-Petter; Franke, Katrin; Abie, Habtamu; Årnes, Andre (Journal article; Peer reviewed, 2023)
      Fog computing promises improved service scalability and lower latency for IoT systems. The concept closes the gap between full computing capabilities at the network's edge and cloud systems' centrally located processing ...
    • Quantifying data volatility for IoT forensics with examples from Contiki OS 

      Sandvik, Jens-Petter; Franke, Katrin; Abie, Habtamu; Årnes, Andrè (Journal article; Peer reviewed, 2022)
      Forensic investigations are often conducted under limited resource availability such as time, equipment, and people. As data acquisition is resource-demanding already, a higher emphasis needs to be put on prioritizing the ...
    • Towards a Novel Framework for Reinforcing Cybersecurity using Digital Twins in IoT-based Healthcare Applications 

      Pirbhulal, Sandeep; Abie, Habtamu; Shukla, Ankur (Peer reviewed; Journal article, 2022)
      In recent years, the cybersecurity attacks on the internet of things (IoT)-based healthcare systems became the major concern for researchers and health organizations. With time, the sophistication of these attacks is ...