Analyzing Security Vulnerability and Forensic Investigation of ROS2: A Case Study.
Yash PatelParag H. RughaniDhruvil DesaiPublished in: ICRAI (2022)
Keyphrases
- digital forensics
- forensic analysis
- risk assessment
- security vulnerabilities
- network security
- computer security
- information security
- computer forensics
- buffer overflow
- security mechanisms
- case study
- security systems
- test bed
- security problems
- information assurance
- security requirements
- security issues
- law enforcement agencies
- intrusion detection
- penetration testing
- security level
- statistical databases
- security policies
- law enforcement
- security risks
- forensic science
- neural network
- security management
- national security
- lightweight
- access control
- information systems