@article{lens.org/000-068-323-180-757, author = {Kanishka Joshi}, title = {Industrial Internet Of Things \& Security Aspects}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {February}, doi = {10.46293/4n6/2021.03.01.07}, date = {2021-02-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.01.07}", url = {https://lens.org/000-068-323-180-757} } @article{lens.org/000-092-244-624-751, author = {Tri Rochmadi}, title = {LIVE FORENSIK UNTUK ANALISA ANTI FORENSIK PADA WEB BROWSER STUDI KASUS BROWZAR}, journal = {Indonesian Journal of Business Intelligence (IJUBI)}, year = {2019}, volume = {1}, number = {1}, pages = {32--}, month = {February}, doi = {10.21927/ijubi.v1i1.878}, date = {2019-02-15}, note = "\url{https://ejournal.almaata.ac.id/index.php/IJUBI/article/viewFile/878/1126} ; \url{https://core.ac.uk/download/268505205.pdf}", url = {https://lens.org/000-092-244-624-751} } @article{lens.org/000-360-120-513-679, author = {R.B. van Baar and H.M.A. van Beek and E.J. van Eijk}, title = {Digital Forensics as a Service: A game changer}, journal = {Digital Investigation}, year = {2014}, volume = {11}, pages = {S54--S62}, doi = {10.1016/j.diin.2014.03.007}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1742287614000127} ; \url{https://core.ac.uk/display/82501077} ; \url{http://www.sciencedirect.com/science/article/pii/S1742287614000127} ; \url{https://dx.doi.org/10.1016/j.diin.2014.03.007} ; \url{http://dx.doi.org/10.1016/j.diin.2014.03.007}", url = {https://lens.org/000-360-120-513-679} } @article{lens.org/000-402-272-421-776, author = { Baskar}, title = {Combating Insider Threats using 'User Behavioural Analytics'}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {February}, doi = {10.46293/4n6/2021.03.01.09}, date = {2021-02-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.01.09}", url = {https://lens.org/000-402-272-421-776} } @article{lens.org/000-534-406-835-275, author = {Sungsu Lim and Byeongyeong Yoo and Jungheum Park and Keun Duck Byun and Sangjin Lee}, title = {A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine}, journal = {Mathematical and Computer Modelling}, year = {2012}, volume = {55}, number = {1}, pages = {151--160}, doi = {10.1016/j.mcm.2011.02.011}, note = "\url{https://dblp.uni-trier.de/db/journals/mcm/mcm55.html#LimYPBL12} ; \url{https://www.sciencedirect.com/science/article/pii/S0895717711001014} ; \url{https://koreauniv.pure.elsevier.com/en/publications/a-research-on-the-investigation-method-of-digital-forensics-for-a}", url = {https://lens.org/000-534-406-835-275} } @article{lens.org/000-616-206-600-091, author = {Arjan Mieremet}, title = {Camera-identification and common-source identification: The correlation values of mismatches}, journal = {Forensic science international}, year = {2019}, volume = {301}, pages = {46--54}, month = {May}, doi = {10.1016/j.forsciint.2019.05.008}, date = {2019-05-10}, note = "\url{https://www.sciencedirect.com/science/article/pii/S0379073819301847} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/31128408}", url = {https://lens.org/000-616-206-600-091} } @article{lens.org/000-910-549-617-511, author = {Nicholas Bruin}, title = {The Use of Forensic Science Methods in Digital Forensics}, journal = {SSRN Electronic Journal}, year = {2018}, doi = {10.2139/ssrn.3185591}, note = "\url{https://papers.ssrn.com/abstract=3185591}", url = {https://lens.org/000-910-549-617-511} } @article{lens.org/001-217-010-056-328, author = {Sakshi Singh and Suresh Kumar}, title = {Qualitative Assessment of Digital Forensic Tools}, journal = {Asian Journal of Electrical Sciences}, year = {2020}, volume = {9}, number = {1}, pages = {25--32}, month = {May}, doi = {10.51983/ajes-2020.9.1.2372}, date = {2020-05-05}, url = {https://lens.org/001-217-010-056-328} } @article{lens.org/001-334-079-265-518, author = {Graeme Horsman}, title = {Opinion: Does the field of digital forensics have a consistency problem?}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {300970--}, doi = {10.1016/j.fsidi.2020.300970}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2666281720300445} ; \url{https://research.tees.ac.uk/en/publications/opinion-does-the-field-of-digital-forensics-have-a-consistency-pr} ; \url{https://dblp.uni-trier.de/db/journals/di/di33.html#Horsman20a}", url = {https://lens.org/001-334-079-265-518} } @article{lens.org/001-349-955-609-387, author = {Doddy Teguh Yuwono and Yunanri W}, title = {Analisis Perbandingan File Carving Dengan Metode Nist}, journal = {Jurnal Sains Komputer dan Teknologi Informasi}, year = {2020}, volume = {2}, number = {2}, pages = {1--6}, month = {May}, doi = {10.33084/jsakti.v2i2.1472}, date = {2020-05-06}, note = "\url{http://journal.umpalangkaraya.ac.id/index.php/jsakti/article/download/1472/1294} ; \url{https://core.ac.uk/download/pdf/327226713.pdf}", url = {https://lens.org/001-349-955-609-387} } @article{lens.org/001-619-826-695-028, author = {Nilay Mistry and Tanaya Vaishnav and Kaivashin Shethna}, title = {Threat Matrix – Critical Infrastructure}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, volume = {5}, number = {1}, pages = {08--22}, month = {February}, doi = {10.46293/4n6/2020.02.01}, date = {2020-02-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.01}", url = {https://lens.org/001-619-826-695-028} } @article{lens.org/001-660-853-267-816, author = {Graeme Horsman and Angela King}, title = {Policing and Crime Act 2017: Changes to pre-charge bail and the impact on digital forensic analysis}, journal = {Computer Law \& Security Review}, year = {2018}, volume = {34}, number = {5}, pages = {1139--1143}, doi = {10.1016/j.clsr.2018.04.005}, note = "\url{https://dblp.uni-trier.de/db/journals/clsr/clsr34.html#HorsmanK18} ; \url{https://research.tees.ac.uk/ws/files/4192050/621946.pdf} ; \url{https://research.tees.ac.uk/en/publications/policing-and-crime-act-2017-changes-to-pre-charge-bail-and-the-im} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S0267364918300840} ; \url{https://core.ac.uk/download/pdf/196165653.pdf}", url = {https://lens.org/001-660-853-267-816} } @article{lens.org/001-868-759-629-801, author = {Jae-Ung Lee and Wooyoung Soh}, title = {Comparative analysis on integrated digital forensic tools for digital forensic investigation}, journal = {IOP Conference Series: Materials Science and Engineering}, year = {2020}, volume = {834}, number = {1}, pages = {012034--}, month = {April}, doi = {10.1088/1757-899x/834/1/012034}, date = {2020-04-01}, note = "\url{https://iopscience.iop.org/article/10.1088/1757-899X/834/1/012034/pdf} ; \url{https://ui.adsabs.harvard.edu/abs/2020MS&E..834a2034L/abstract} ; \url{https://iopscience.iop.org/article/10.1088/1757-899X/834/1/012034}", url = {https://lens.org/001-868-759-629-801} } @article{lens.org/001-888-175-704-116, author = {Ikuesan Richard Adeyemi and Shukor Abd Razak and Mazleena Salleh and Hein S. Venter}, title = {Leveraging human thinking style for user attribution in digital forensic process}, journal = {International Journal on Advanced Science, Engineering and Information Technology}, year = {2017}, volume = {7}, number = {1}, pages = {198--206}, month = {February}, doi = {10.18517/ijaseit.7.1.1383}, date = {2017-02-02}, note = "\url{https://core.ac.uk/display/90874512} ; \url{http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=1383} ; \url{https://repository.up.ac.za/handle/2263/65805} ; \url{http://eprints.utm.my/id/eprint/66172/} ; \url{https://core.ac.uk/download/pdf/296921841.pdf}", url = {https://lens.org/001-888-175-704-116} } @article{lens.org/002-214-848-360-115, author = {Dianne Dietrich and Frank Adelstein}, title = {Archival science, digital forensics, and new media art}, journal = {Digital Investigation}, year = {2015}, volume = {14}, pages = {S137--S145}, doi = {10.1016/j.diin.2015.05.004}, note = "\url{https://doi.org/10.1016/j.diin.2015.05.004} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2015.05.004} ; \url{https://core.ac.uk/display/82761998} ; \url{https://dblp.uni-trier.de/db/journals/di/di14.html#DietrichA15} ; \url{https://dx.doi.org/10.1016/j.diin.2015.05.004} ; \url{http://dx.doi.org/10.1016/j.diin.2015.05.004} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287615000493}", url = {https://lens.org/002-214-848-360-115} } @article{lens.org/002-288-892-034-343, author = {Nina Sunde and Itiel E. Dror}, title = {A hierarchy of expert performance (HEP) applied to digital forensics: Reliability and biasability in digital forensics decision making}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {37}, pages = {301175--}, doi = {10.1016/j.fsidi.2021.301175}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di37.html#SundeD21} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281721000834}", url = {https://lens.org/002-288-892-034-343} } @article{lens.org/002-328-258-595-526, author = {Christopher A. Lee}, title = {Archival application of digital forensics methods for authenticity, description and access provision}, journal = {Comma}, year = {2012}, volume = {2012}, number = {2}, pages = {133--140}, doi = {10.3828/comma.2012.2.14}, note = "\url{http://ica2012.ica.org/files/pdf/Full%20papers%20upload/ica12Final00290.pdf} ; \url{https://liverpooluniversitypress.co.uk/journals/article/30509/} ; \url{https://online.liverpooluniversitypress.co.uk/doi/abs/10.3828/comma.2012.2.14}", url = {https://lens.org/002-328-258-595-526} } @article{lens.org/002-464-138-461-933, author = {Nikolaos Serketzis and Vasilios Katos and Christos Ilioudis and Dimitrios Baltatzis and George J. Pangalos}, title = {Actionable threat intelligence for digital forensics readiness}, journal = {Information \& Computer Security}, year = {2019}, volume = {27}, number = {2}, pages = {273--291}, month = {June}, doi = {10.1108/ics-09-2018-0110}, date = {2019-06-12}, note = "\url{https://www.emerald.com/insight/content/doi/10.1108/ICS-09-2018-0110/full/html} ; \url{http://eprints.bournemouth.ac.uk/31484/} ; \url{https://dblp.uni-trier.de/db/journals/imcs/imcs27.html#SerketzisKIBP19} ; \url{https://core.ac.uk/download/161865225.pdf}", url = {https://lens.org/002-464-138-461-933} } @article{lens.org/002-625-978-577-247, author = {Mohamed Abd elgabar Ahmed Elyas and Sean B. Maynard and Atif Ahmad and Andrew Lonie}, title = {Towards A Systemic Framework for Digital Forensic Readiness}, journal = {Journal of Computer Information Systems}, year = {2014}, volume = {54}, number = {3}, pages = {97--105}, doi = {10.1080/08874417.2014.11645708}, note = "\url{https://www.researchgate.net/profile/Sean_Maynard/publication/264898131_Towards_a_Systematic_Framework_for_Digital_Forensic_Readiness/links/5614765a08ae4ce3cc63c76e.pdf} ; \url{https://findanexpert.unimelb.edu.au/scholarlywork/745351-towards-a-systemic-framework-for-digital-forensic-readiness} ; \url{https://www.tandfonline.com/doi/abs/10.1080/08874417.2014.11645708} ; \url{https://dblp.uni-trier.de/db/journals/jcis/jcis54.html#ElyasMAL14} ; \url{https://doi.org/10.1080/08874417.2014.11645708}", url = {https://lens.org/002-625-978-577-247} } @article{lens.org/002-634-071-189-646, author = {Graeme Horsman}, title = {A case study on anonymised sharing platforms and digital traces left by their usage.}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2020}, volume = {61}, number = {1}, pages = {97--106}, month = {September}, doi = {10.1016/j.scijus.2020.09.002}, date = {2020-09-09}, note = "\url{https://research.tees.ac.uk/en/publications/a-case-study-on-anonymised-sharing-platforms-and-digital-traces-l} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/33357832} ; \url{https://www.sciencedirect.com/science/article/pii/S1355030620302793}", url = {https://lens.org/002-634-071-189-646} } @article{lens.org/002-828-312-621-651, author = {Graeme Horsman}, title = {Defining ‘service levels’ for digital forensic science organisations}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301178--}, doi = {10.1016/j.fsidi.2021.301178}, note = "\url{https://www.sciencedirect.com/science/article/pii/S266628172100086X} ; \url{https://doi.org/10.1016/j.fsidi.2021.301178}", url = {https://lens.org/002-828-312-621-651} } @article{lens.org/002-887-236-141-671, title = {Recovering Evidentiary E-mail for Non-Repudiation Forensics}, journal = {International Journal of Innovative Technology and Exploring Engineering}, year = {2019}, volume = {8}, number = {11S2}, pages = {551--557}, month = {October}, doi = {10.35940/ijitee.k1085.09811s219}, date = {2019-10-26}, url = {https://lens.org/002-887-236-141-671} } @article{lens.org/002-926-024-983-956, author = {Peter Oppong Baafi}, title = {Tools For Cyber Forensics}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {285--290}, doi = {10.22624/aims/crp-bk3-p46}, url = {https://lens.org/002-926-024-983-956} } @article{lens.org/002-953-265-272-980, author = { Riadi and null Sunardi and Panggah Widiandana}, title = {Investigating Cyberbullying on WhatsApp Using Digital Forensics Research Workshop}, journal = {Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)}, year = {2020}, volume = {4}, number = {4}, pages = {730--735}, month = {August}, doi = {10.29207/resti.v4i4.2161}, date = {2020-08-20}, note = "\url{http://jurnal.iaii.or.id/index.php/RESTI/article/view/2161} ; \url{https://www.jurnal.iaii.or.id/index.php/RESTI/article/download/2161/285}", url = {https://lens.org/002-953-265-272-980} } @article{lens.org/003-206-474-001-578, author = {Е. Р. Россинская}, title = {Цифровизация справочно-информационных фондов криминалистического и судебно-экспертного назначения как часть учения о цифровизации криминалистической регистрации}, journal = {Courier of Kutafin Moscow State Law University (MSAL))}, year = {2020}, number = {6}, pages = {23--32}, month = {July}, doi = {10.17803/2311-5998.2020.70.6.023-032}, date = {2020-07-31}, note = "\url{https://cyberleninka.ru/article/n/tsifrovizatsiya-spravochno-informatsionnyh-fondov-kriminalisticheskogo-i-sudebno-ekspertnogo-naznacheniya-kak-chast-ucheniya-o} ; \url{https://vestnik.msal.ru/jour/article/view/1129} ; \url{https://cyberleninka.ru/article/n/tsifrovizatsiya-spravochno-informatsionnyh-fondov-kriminalisticheskogo-i-sudebno-ekspertnogo-naznacheniya-kak-chast-ucheniya-o/pdf} ; \url{https://vestnik.msal.ru/jour/article/download/1129/1150}", url = {https://lens.org/003-206-474-001-578} } @article{lens.org/003-232-363-219-004, author = {Paul Reedy}, title = {Interpol review of digital evidence 2016 - 2019.}, journal = {Forensic science international. Synergy}, year = {2020}, volume = {2}, pages = {489--520}, month = {March}, doi = {10.1016/j.fsisyn.2020.01.015}, date = {2020-03-19}, note = "\url{http://www.sciencedirect.com/science/article/pii/S2589871X20300152} ; \url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7770434} ; \url{https://www.sciencedirect.com/science/article/pii/S2589871X20300152}", url = {https://lens.org/003-232-363-219-004} } @article{lens.org/003-307-307-119-790, author = {Gang Zeng}, title = {Data Handling of Digital Forensics Cloud Computing}, journal = {Advanced Materials Research}, year = {2013}, volume = {756-759}, pages = {1739--1743}, doi = {10.4028/www.scientific.net/amr.756-759.1739}, note = "\url{https://www.scientific.net/AMR.756-759.1739}", url = {https://lens.org/003-307-307-119-790} } @article{lens.org/003-563-396-724-10X, author = {Bruce J. Nikkel}, title = {Fintech forensics: Criminal investigation and digital evidence in financial technologies}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {200908--}, doi = {10.1016/j.fsidi.2020.200908}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di33.html#Nikkel20} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S2666281720300287} ; \url{https://doi.org/10.1016/j.fsidi.2020.200908}", url = {https://lens.org/003-563-396-724-10X} } @article{lens.org/003-585-400-908-778, author = {Gurinder Singh and Kulbir Singh}, title = {Digital image forensic approach based on the second-order statistical analysis of CFA artifacts}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {200899--}, doi = {10.1016/j.fsidi.2019.200899}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1742287619302397}", url = {https://lens.org/003-585-400-908-778} } @article{lens.org/003-767-240-799-740, title = {Editorial Board}, journal = {Digital Investigation}, year = {2015}, volume = {12}, pages = {i--i}, doi = {10.1016/s1742-2876(15)00023-7}, note = "\url{https://core.ac.uk/download/pdf/82745273.pdf}", url = {https://lens.org/003-767-240-799-740} } @article{lens.org/004-095-036-114-529, author = {Piotr Lewulis}, title = {Digital forensic standards and digital evidence in Polish criminal proceedings. An updated definition of digital evidence in forensic science}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2021}, volume = {13}, number = {4}, pages = {403--403}, doi = {10.1504/ijesdf.2021.116024}, url = {https://lens.org/004-095-036-114-529} } @article{lens.org/004-200-813-216-207, author = {Jan Collie}, title = {Digital forensic evidence-Flaws in the criminal justice system.}, journal = {Forensic science international}, year = {2018}, volume = {289}, pages = {154--155}, month = {May}, doi = {10.1016/j.forsciint.2018.05.014}, date = {2018-05-26}, note = "\url{https://europepmc.org/abstract/MED/29864602} ; \url{https://www.sciencedirect.com/science/article/pii/S0379073818302378} ; \url{http://oro.open.ac.uk/70043/} ; \url{https://pubmed.ncbi.nlm.nih.gov/29864602/} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/29864602}", url = {https://lens.org/004-200-813-216-207} } @article{lens.org/004-260-804-798-107, author = {Manghui Tu and Dianxiang Xu and Cristian Balan and Kyle Cronin}, title = {On the Development of Digital Forensics Curriculum}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2012}, volume = {7}, number = {3}, pages = {13--32}, month = {September}, date = {2012-09-30}, note = "\url{https://doaj.org/article/631a85689a0340a59f03ebdaa5ead70b} ; \url{https://doi.org/10.15394/jdfsl.2012.1126}", url = {https://lens.org/004-260-804-798-107} } @article{lens.org/004-270-164-263-436, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {42}, pages = {301435--}, doi = {10.1016/s2666-2817(22)00116-0}, url = {https://lens.org/004-270-164-263-436} } @article{lens.org/004-376-985-680-005, author = {Ludwig Englbrecht and Stefan Meier and Günther Pernul}, title = {Towards a capability maturity model for digital forensic readiness}, journal = {Wireless Networks}, year = {2019}, volume = {26}, number = {7}, pages = {4895--4907}, month = {January}, doi = {10.1007/s11276-018-01920-5}, date = {2019-01-01}, note = "\url{https://link.springer.com/article/10.1007/s11276-018-01920-5} ; \url{https://epub.uni-regensburg.de/40028/} ; \url{https://dblp.uni-trier.de/db/journals/winet/winet26.html#EnglbrechtMP20} ; \url{https://doi.org/10.1007/s11276-018-01920-5} ; \url{https://link.springer.com/content/pdf/10.1007/s11276-018-01920-5.pdf}", url = {https://lens.org/004-376-985-680-005} } @article{lens.org/004-596-788-564-958, author = {Muhammad Ali Qureshi and El-Sayed M. El-Alfy}, title = {Bibliography of digital image anti-forensics and anti-anti-forensics techniques}, journal = {IET Image Processing}, year = {2019}, volume = {13}, number = {11}, pages = {1811--1823}, doi = {10.1049/iet-ipr.2018.6587}, note = "\url{https://doi.org/10.1049/iet-ipr.2018.6587} ; \url{https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/iet-ipr.2018.6587} ; \url{https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8853452} ; \url{https://dblp.uni-trier.de/db/journals/iet-ipr/iet-ipr13.html#QureshiE19} ; \url{https://digital-library.theiet.org/content/journals/10.1049/iet-ipr.2018.6587}", url = {https://lens.org/004-596-788-564-958} } @article{lens.org/004-655-797-294-715, author = {Anil Dada Warbhe and Rajiv V. Dharaskar and Vilas M. Thakare}, title = {Computationally Efficient Digital Image Forensic Method for Image Authentication}, journal = {Procedia Computer Science}, year = {2016}, volume = {78}, pages = {464--470}, doi = {10.1016/j.procs.2016.02.089}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1877050916000910} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1877050916000910} ; \url{https://core.ac.uk/display/82404167} ; \url{https://core.ac.uk/download/pdf/82404167.pdf}", url = {https://lens.org/004-655-797-294-715} } @article{lens.org/004-670-548-978-249, author = {Nadeem Alherbawi and Zarina Shukur and Rossilawati Sulaiman}, title = {Systematic Literature Review on Data Carving in Digital Forensic}, journal = {Procedia Technology}, year = {2013}, volume = {11}, pages = {86--92}, doi = {10.1016/j.protcy.2013.12.165}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2212017313003198} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S2212017313003198} ; \url{https://core.ac.uk/display/82179735} ; \url{https://core.ac.uk/download/pdf/82179735.pdf}", url = {https://lens.org/004-670-548-978-249} } @article{lens.org/004-778-686-619-011, author = {Mehrdad Tajbakhsh and Elaheh Homayounvala and Sajjad Shokouhyar}, title = {Forensically ready digital identity management systems, issues of digital identity life cycle and context of usage}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2017}, volume = {9}, number = {1}, pages = {62--83}, doi = {10.1504/ijesdf.2017.081781}, note = "\url{https://research.gold.ac.uk/id/eprint/27057/} ; \url{https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2017.081781} ; \url{https://dl.acm.org/doi/10.1504/IJESDF.2017.081781} ; \url{https://core.ac.uk/download/228123558.pdf}", url = {https://lens.org/004-778-686-619-011} } @article{lens.org/004-782-456-024-313, author = {Mohd Asrarul Haque and Aneequa Khayal and Javed Khan}, title = {Impact of digital transformation in teaching and learning (TL) process of forensic medicine \& other medical subjects due to COVID 19 lockdown: Medical student’s perspective}, journal = {Indian Journal of Forensic and Community Medicine}, year = {2021}, volume = {8}, number = {2}, pages = {104--108}, month = {July}, doi = {10.18231/j.ijfcm.2021.021}, date = {2021-07-15}, note = "\url{https://www.ijfcm.org/article-details/14252} ; \url{https://www.ijfcm.org/journal-article-file/14252}", url = {https://lens.org/004-782-456-024-313} } @article{lens.org/004-806-187-092-505, title = {Likelihood ratios, Health Apps, Artificial Intelligence and Deepfakes}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {41}, pages = {301394--301394}, doi = {10.1016/j.fsidi.2022.301394}, url = {https://lens.org/004-806-187-092-505} } @article{lens.org/004-935-188-787-369, author = {Elizabeth K. Hawthorne and Rose Shumba}, title = {TEACHING DIGITAL FORENSICS AND CYBER INVESTIGATIONS ONLINE : OUR EXPERIENCES}, journal = {European Scientific Journal, ESJ}, year = {2014}, volume = {10}, number = {10}, month = {September}, date = {2014-09-18}, note = "\url{https://eujournal.org/index.php/esj/article/download/4150/3986} ; \url{https://eujournal.org/index.php/esj/article/view/4150} ; \url{https://eujournal.org/index.php/esj/article/viewFile/4150/3986} ; \url{https://paperity.org/p/58986318/teaching-digital-forensics-and-cyber-investigations-online-our-experiences}", url = {https://lens.org/004-935-188-787-369} } @article{lens.org/004-974-971-514-268, author = {Adesoji Adesina and Ayodele Adebiyi and Charles Ayo}, title = {Detection and extraction of digital footprints from the iDrive cloud storage using web browser forensics analysis}, journal = {Indonesian Journal of Electrical Engineering and Computer Science}, year = {2022}, volume = {26}, number = {1}, pages = {550--550}, month = {April}, doi = {10.11591/ijeecs.v26.i1.pp550-559}, date = {2022-04-01}, url = {https://lens.org/004-974-971-514-268} } @article{lens.org/005-152-967-244-975, author = {Tri Rochmadi and Dadang Heksaputra}, title = {Forensic Analysis in Cloud Storage with Live Forensics in Windows (Adrive CaseStudy)}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2019}, volume = {8}, number = {4}, pages = {292--297}, doi = {10.17781/p002637}, note = "\url{http://www.sdiwc.net/digital-library/forensic-analysis-in-cloud-storage-with-live-forensics-in-windows-adrive-casestudy}", url = {https://lens.org/005-152-967-244-975} } @article{lens.org/005-155-472-420-600, author = {Graeme Horsman and David Errickson}, title = {When finding nothing may be evidence of something: Anti-forensics and digital tool marks.}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2019}, volume = {59}, number = {5}, pages = {565--572}, month = {June}, doi = {10.1016/j.scijus.2019.06.004}, date = {2019-06-03}, note = "\url{https://research.tees.ac.uk/en/publications/when-finding-nothing-may-be-evidence-of-something-anti-forensics-} ; \url{https://www.sciencedirect.com/science/article/pii/S1355030619300085} ; \url{https://dspace.lib.cranfield.ac.uk/bitstream/1826/14256/4/anti-forensic_and_digital_tool_marks-2019.pdf} ; \url{https://pubmed.ncbi.nlm.nih.gov/31472802/} ; \url{https://europepmc.org/article/MED/31472802} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/31472802} ; \url{https://dspace.lib.cranfield.ac.uk/handle/1826/14256}", url = {https://lens.org/005-155-472-420-600} } @article{lens.org/005-178-307-029-511, author = {Afif Nur Ichsan and Riadi}, title = {Mobile Forensic on Android-based IMO Messenger Services using Digital Forensic Research Workshop (DFRWS) Method}, journal = {International Journal of Computer Applications}, year = {2021}, volume = {174}, number = {18}, pages = {34--40}, month = {February}, doi = {10.5120/ijca2021921076}, date = {2021-02-16}, note = "\url{http://dx.doi.org/10.5120/ijca2021921076}", url = {https://lens.org/005-178-307-029-511} } @article{lens.org/005-218-778-359-342, author = {Sonu Mandecha and M. George Christopher Kumarshankar Raychaudhuri}, title = {A Comparative Study of the Performance of Open-Source and Proprietary Disk Forensic Tools in Recovery of Anti-Forensically Doctored Data}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2019}, volume = {8}, number = {4}, pages = {250--261}, doi = {10.17781/p002624}, note = "\url{http://sdiwc.net/digital-library/a-comparative-study-of-the-performance-of-opensource-and-proprietary-disk-forensic-tools-in-recovery-of-antiforensically-doctored-data}", url = {https://lens.org/005-218-778-359-342} } @article{lens.org/005-232-046-693-557, author = {Gillian Tully and Neil Cohen and David Compton and Gareth Davies and Roy Isbell and Tim Watson}, title = {Quality standards for digital forensics: Learning from experience in England \& Wales}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {200905--}, doi = {10.1016/j.fsidi.2020.200905}, note = "\url{https://doi.org/10.1016/j.fsidi.2020.200905} ; \url{https://wrap.warwick.ac.uk/132247/} ; \url{https://www.sciencedirect.com/science/article/pii/S2666282519300374}", url = {https://lens.org/005-232-046-693-557} } @article{lens.org/005-390-140-295-540, author = {Aman Chowdhry and Keya Sircar and Deepika Bablani Popli and Ankita Tandon}, title = {Image manipulation: Fraudulence in digital dental records: Study and review.}, journal = {Journal of forensic dental sciences}, year = {2014}, volume = {6}, number = {1}, pages = {31--35}, doi = {10.4103/0975-1475.127767}, note = "\url{http://europepmc.org/articles/PMC3970385} ; \url{http://www.jfds.org/article.asp?issn=0975-1475;year=2014;volume=6;issue=1;spage=31;epage=35;aulast=Chowdhry} ; \url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3970385} ; \url{https://pubmed.ncbi.nlm.nih.gov/24696587/} ; \url{http://www.jfds.org/text.asp?2014/6/1/31/127767} ; \url{https://www.jfds.org/article.asp?issn=0975-1475;year=2014;volume=6;issue=1;spage=31;epage=35;aulast=Chowdhry;type=0}", url = {https://lens.org/005-390-140-295-540} } @article{lens.org/005-412-116-848-795, author = {Guangyong Gao and Zhao Feng and Tingting Han}, title = {Data Authentication for Wireless Sensor Networks with High Detection Efficiency Based on Reversible Watermarking}, journal = {Wireless Communications and Mobile Computing}, year = {2021}, volume = {2021}, pages = {1--13}, month = {June}, doi = {10.1155/2021/6651137}, date = {2021-06-28}, note = "\url{https://www.hindawi.com/journals/wcmc/2021/6651137/} ; \url{https://doi.org/10.1155/2021/6651137} ; \url{https://dblp.uni-trier.de/db/journals/wicomm/wicomm2021.html#GaoFH21} ; \url{https://downloads.hindawi.com/journals/wcmc/2021/6651137.pdf} ; \url{http://downloads.hindawi.com/journals/wcmc/2021/6651137.pdf}", url = {https://lens.org/005-412-116-848-795} } @article{lens.org/005-445-629-762-090, author = {Yuri Gubanov}, title = {Federal Agencies Can Get Your iPhone Data without Apple’s Help}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, pages = {48--49}, month = {May}, doi = {10.46293/4n6/2020.02.02.08}, date = {2020-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.02.08}", url = {https://lens.org/005-445-629-762-090} } @article{lens.org/005-465-138-684-882, author = {Smita M. Nirkhi and Rajiv V. Dharaskar and V. M. Thakre}, title = {DATA MINING : A P ROSPECTIVE APPROACH FOR DIGITAL FORENSICS}, journal = {International Journal of Data Mining \& Knowledge Management Process}, year = {2012}, volume = {2}, number = {6}, pages = {41--48}, month = {November}, doi = {10.5121/ijdkp.2012.2604}, date = {2012-11-30}, note = "\url{https://www.researchgate.net/profile/Smita_Nirkhi/publication/269994354_DATA_MINING__A_PROSPECTIVE_APPROACH_FOR_DIGITAL_FORENSICS/links/549d7eb80cf2b803713a77ae.pdf} ; \url{http://www.airccse.org/journal/ijdkp/papers/2612ijdkp04.pdf}", url = {https://lens.org/005-465-138-684-882} } @article{lens.org/005-533-992-170-241, author = {Muhamad Arsad Adam and Nur Widiyasono and Husni Mubarok}, title = {Analisis Data Digital Evidence pada Layanan Voice Over Internet Protocol (VoIP)}, journal = {Jurnal Edukasi dan Penelitian Informatika (JEPIN)}, year = {2016}, volume = {2}, number = {2}, month = {November}, doi = {10.26418/jp.v2i2.17578}, date = {2016-11-29}, note = "\url{https://core.ac.uk/display/88097420} ; \url{https://doaj.org/article/08508940e99f4ec3a8577e503320f771} ; \url{https://core.ac.uk/download/pdf/294888994.pdf}", url = {https://lens.org/005-533-992-170-241} } @article{lens.org/005-643-950-059-083, author = {Amamath Mishra}, title = {Digital Rape: A Medico-Legal Perspective}, journal = {Journal of Punjab Academy of Forensic Medicine \& Toxicology}, year = {2022}, volume = {22}, number = {1}, pages = {5--6}, doi = {10.5958/0974-083x.2022.00001.2}, url = {https://lens.org/005-643-950-059-083} } @article{lens.org/005-722-494-318-234, author = {Soowoong Eo and Wooyeon Jo and Seokjun Lee and Taeshik Shon}, title = {Ensuring the Admissibility of Mobile Forensic Evidence in Digital Investigation}, journal = {Journal of the Korea Institute of Information Security and Cryptology}, year = {2016}, volume = {26}, number = {1}, pages = {135--152}, month = {February}, doi = {10.13089/jkiisc.2016.26.1.135}, date = {2016-02-29}, note = "\url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002085969} ; \url{http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2016_v26n1_135}", url = {https://lens.org/005-722-494-318-234} } @article{lens.org/005-830-218-526-852, title = {The Proceedings of the Seventh Annual DFRWS Europe Conference}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {300944--300944}, doi = {10.1016/j.fsidi.2020.300944}, url = {https://lens.org/005-830-218-526-852} } @article{lens.org/005-966-023-558-670, author = {Ilham Taufiqurrohman and Nur Widiyasono and Husni Mubarok}, title = {Pemanfaatan Raspberry Pi untuk Hacking dan Forensic}, journal = {Jurnal Teknik Informatika dan Sistem Informasi}, year = {2017}, volume = {3}, number = {2}, pages = {141192--}, month = {August}, doi = {10.28932/jutisi.v3i2.604}, date = {2017-08-10}, note = "\url{https://www.neliti.com/publications/141192/pemanfaatan-raspberry-pi-untuk-hacking-dan-forensic} ; \url{https://media.neliti.com/media/publications/141192-ID-pemanfaatan-raspberry-pi-untuk-hacking-d.pdf}", url = {https://lens.org/005-966-023-558-670} } @article{lens.org/006-113-875-322-387, author = {Muhammad Fajar Sidiq and Muhammad Nur Faiz}, title = {Review Tools Web Browser Forensics untuk Mendukung Pencarian Bukti Digital}, journal = {Jurnal Edukasi dan Penelitian Informatika (JEPIN)}, year = {2019}, volume = {5}, number = {1}, pages = {67--}, month = {April}, doi = {10.26418/jp.v5i1.31430}, date = {2019-04-23}, note = "\url{http://repository.ittelkom-pwt.ac.id/5433/} ; \url{https://core.ac.uk/download/pdf/294889016.pdf}", url = {https://lens.org/006-113-875-322-387} } @article{lens.org/006-138-917-123-177, author = {Ana Nieto and Ruben Rios and Javier Lopez}, title = {IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations}, journal = {Sensors (Basel, Switzerland)}, year = {2018}, volume = {18}, number = {2}, pages = {492--}, month = {February}, doi = {10.3390/s18020492}, date = {2018-02-07}, note = "\url{https://dblp.uni-trier.de/db/journals/sensors/sensors18.html#NietoRL18} ; \url{https://pubmed.ncbi.nlm.nih.gov/29414864/} ; \url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5856102} ; \url{https://core.ac.uk/display/151107539} ; \url{https://www.nics.uma.es/sites/default/files/papers/nrlSensors2018.pdf} ; \url{https://doi.org/10.3390/s18020492} ; \url{https://www.mdpi.com/1424-8220/18/2/492/pdf} ; \url{https://www.mdpi.com/1424-8220/18/2/492} ; \url{https://www.nics.uma.es/biblio/citekey/nrlsensors2018} ; \url{http://europepmc.org/articles/PMC5856102}", url = {https://lens.org/006-138-917-123-177} } @article{lens.org/006-486-319-923-968, author = {Vindy Arista Yuliani and Riadi}, title = {Forensic Analysis WhatsApp Mobile Application On Android-Based Smartphones Using National Institute of Standard and Technology (NIST) Framework}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2019}, volume = {8}, number = {3}, pages = {223--231}, doi = {10.17781/p002615}, note = "\url{http://sdiwc.net/digital-library/forensic-analysis-whatsapp-mobile-application-on-androidbased-smartphones-using-national-institute-of-standard-and-technology-nist-framework}", url = {https://lens.org/006-486-319-923-968} } @article{lens.org/006-542-673-151-415, author = {Руслан Абдуллин}, title = {О РОЛИ ЦИФРОВИЗАЦИИ В РЕГУЛИРОВАНИИ ПЕРЕЧНЯ СУДЕБНЫХ ЭКСПЕРТИЗ, ПРОВОДИМЫХ ВНЕ ГОСУДАРСТВЕННЫХ СУДЕБНО-ЭКСПЕРТНЫХ ОРГАНИЗАЦИЙ}, journal = {The rule-of-law state: theory and practice}, year = {2020}, volume = {16}, number = {4-2}, pages = {223--232}, month = {April}, doi = {10.33184/pravgos-2020.4.38}, date = {2020-04-01}, note = "\url{https://pravgos.ru/index.php/journal/article/view/132} ; \url{https://cyberleninka.ru/article/n/o-roli-tsifrovizatsii-v-regulirovanii-perechnya-sudebnyh-ekspertiz-provodimyh-vne-gosudarstvennyh-sudebno-ekspertnyh-organizatsiy} ; \url{https://pravgos.ru/index.php/journal/article/download/132/132}", url = {https://lens.org/006-542-673-151-415} } @article{lens.org/006-794-410-339-126, author = {Park Nam In and JiWoo Lee and Lim Seong Ho and Byun Jun Seok and Gi-Hyun Na and Oc-Yeub Jeon and Jung Hwan Lee}, title = {Energy-based linear PCM audio recovery method of impaired MP4 file stored in dashboard camera memory}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {39}, pages = {301274--}, doi = {10.1016/j.fsidi.2021.301274}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S266628172100192X}", url = {https://lens.org/006-794-410-339-126} } @article{lens.org/006-913-837-645-666, author = {Oleg S. Kuchin and Yaroslava O. Kuchina}, title = {The Definition of Digital Criminalistics as the Origin of a Misleading Direction in Science. Part 1}, journal = {Legal education and science}, year = {2021}, volume = {2}, pages = {20--29}, month = {February}, doi = {10.18572/1813-1190-2021-2-20-29}, date = {2021-02-18}, note = "\url{http://dx.doi.org/10.18572/1813-1190-2021-2-20-29}", url = {https://lens.org/006-913-837-645-666} } @article{lens.org/006-933-430-647-14X, author = {Graeme Horsman}, title = {Raiders of the lost artefacts:: championing the need for digital forensics research}, journal = {Forensic Science International: Reports}, year = {2019}, volume = {1}, pages = {100003--}, doi = {10.1016/j.fsir.2019.100003}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2665910719300039} ; \url{https://research.tees.ac.uk/ws/files/8434501/Raiders_of_the_lost_artefacts.pdf} ; \url{https://research.tees.ac.uk/en/publications/raiders-of-the-lost-artefacts-championing-the-need-for-digital-fo} ; \url{https://core.ac.uk/download/pdf/228323042.pdf}", url = {https://lens.org/006-933-430-647-14X} } @article{lens.org/007-109-733-072-858, title = {EU_2023_Ad}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {42}, pages = {301425--301425}, doi = {10.1016/s2666-2817(22)00106-8}, url = {https://lens.org/007-109-733-072-858} } @article{lens.org/007-130-011-487-396, author = {Amudha L and T. M. Nithya and J. Ramya}, title = {COMPUTATIONAL INTELLIGENCE IN IDENTIFYING COUNTERFEIT DOCUMENTS}, journal = {Journal of emerging technologies and innovative research}, year = {2017}, volume = {4}, number = {4}, pages = {217-219--217-219}, month = {April}, date = {2017-04-01}, note = "\url{https://www.jetir.org/view?paper=JETIR1704054} ; \url{https://www.jetir.org/papers/JETIR1704054.pdf}", url = {https://lens.org/007-130-011-487-396} } @article{lens.org/007-418-655-737-904, author = {Priyanka V. Kayarkar and Prashant Ricchariaya and Anand Motwani}, title = {Mining Frequent Sequences for Emails in Cyber Forensics Investigation}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {85}, number = {17}, pages = {1--6}, month = {January}, doi = {10.5120/14930-3332}, date = {2014-01-16}, note = "\url{https://research.ijcaonline.org/volume85/number17/pxc3893332.pdf} ; \url{https://www.ijcaonline.org/archives/volume85/number17/14930-3332}", url = {https://lens.org/007-418-655-737-904} } @article{lens.org/007-458-480-072-061, author = { Riadi and Rusydi Umar and Muhammad Irwan Syahib}, title = {Akuisisi Bukti Digital Viber Messenger Android Menggunakan Metode National Institute of Standards and Technology (NIST)}, journal = {Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)}, year = {2021}, volume = {5}, number = {1}, pages = {45--54}, month = {February}, doi = {10.29207/resti.v5i1.2626}, date = {2021-02-14}, note = "\url{http://jurnal.iaii.or.id/index.php/RESTI/article/view/2626} ; \url{http://jurnal.iaii.or.id/index.php/RESTI/article/download/2626/366}", url = {https://lens.org/007-458-480-072-061} } @article{lens.org/007-542-115-031-618, author = {Mohammed I. Alghamdi}, title = {Digital forensics in cyber security - recent trends, threats, and opportunities}, journal = {Periodicals of Engineering and Natural Sciences (PEN)}, year = {2020}, volume = {8}, number = {3}, pages = {1321--1330}, month = {July}, date = {2020-07-08}, note = "\url{http://pen.ius.edu.ba/index.php/pen/article/download/1463/616} ; \url{http://pen.ius.edu.ba/index.php/pen/article/view/1463}", url = {https://lens.org/007-542-115-031-618} } @article{lens.org/007-708-977-086-804, author = {Byoung-Chul Kim}, title = {A Study on the Cases of Applying 3D Modeling for Forensic Video}, journal = {Journal of Digital Contents Society}, year = {2020}, volume = {21}, number = {11}, pages = {1947--1956}, month = {November}, doi = {10.9728/dcs.2020.21.11.1947}, date = {2020-11-30}, note = "\url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002651332}", url = {https://lens.org/007-708-977-086-804} } @article{lens.org/007-868-297-443-532, author = {H.M.A. van Beek and J. van den Bos and A. Boztas and E.J. van Eijk and R. Schramp and M. Ugen}, title = {Digital forensics as a service: Stepping up the game}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {35}, pages = {301021--}, doi = {10.1016/j.fsidi.2020.301021}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2666281720300706} ; \url{https://dblp.uni-trier.de/db/journals/di/di35.html#BeekBBESU20}", url = {https://lens.org/007-868-297-443-532} } @article{lens.org/007-898-145-584-667, author = {Timothy Bollé and Eoghan Casey}, title = {Using computed similarity of distinctive digital traces to evaluate non-obvious links and repetitions in cyber-investigations}, journal = {Digital Investigation}, year = {2018}, volume = {24}, pages = {S2--S9}, doi = {10.1016/j.diin.2018.01.002}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1742287618300343} ; \url{https://dblp.uni-trier.de/db/journals/di/di24.html#BolleC18} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287618300343} ; \url{https://serval.unil.ch/resource/serval:BIB_2F1A43ACD87E.P001/REF.pdf} ; \url{https://serval.unil.ch/notice/serval:BIB_2F1A43ACD87E} ; \url{https://core.ac.uk/download/226982669.pdf}", url = {https://lens.org/007-898-145-584-667} } @article{lens.org/008-064-732-553-166, author = {Felix Emeakpore Eboibi and Inetimi Mac-Barango}, title = {Law and Judicial Application of Digital Forensic Evidence in Nigeria}, journal = {Journal of Law, Policy and Globalization}, year = {2020}, volume = {96}, pages = {61--75}, month = {May}, date = {2020-05-12}, note = "\url{https://iiste.org/Journals/index.php/JLPG/article/view/52494}", url = {https://lens.org/008-064-732-553-166} } @article{lens.org/008-243-103-276-518, author = {Asanka Sayakkara and Nhien-An Le-Khac and Mark Scanlon}, title = {Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {301003--}, doi = {10.1016/j.fsidi.2020.301003}, note = "\url{https://dfrws.org/wp-content/uploads/2020/10/2020_USA_paper-facilitating_electromagnetic_side-channel_analysis_for_iot_investigation__evaluating_the_emvidence_framework.pdf} ; \url{https://forensicsandsecurity.com/papers/EvaluatingEMvidence.pdf} ; \url{https://dfrws.org/presentation/facilitating-electromagnetic-side-channel-analysis-for-iot-investigation-evaluating-the-emvidence-framework/} ; \url{https://forensicsandsecurity.com/papers/EvaluatingEMvidence.php} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281720302523}", url = {https://lens.org/008-243-103-276-518} } @article{lens.org/008-280-449-967-861, author = {Dinesh N. Patil and Bandu B. Meshram}, title = {Digital Forensic Analysis of Ubuntu File System}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2016}, volume = {5}, number = {4}, pages = {175--186}, doi = {10.17781/p002213}, note = "\url{http://www.sdiwc.net/digital-library/digital-forensic-analysis-of-ubuntu-file-system.html}", url = {https://lens.org/008-280-449-967-861} } @article{lens.org/008-346-665-933-569, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {300940--300940}, doi = {10.1016/s2666-2817(20)30102-5}, url = {https://lens.org/008-346-665-933-569} } @article{lens.org/008-782-115-725-766, author = {Jacobus Gerhardus Nortje and Daniel Christoffel Myburgh}, title = {The Search and Seizure of Digital Evidence by Forensic Investigators in South Africa}, journal = {Potchefstroom Electronic Law Journal}, year = {2019}, volume = {22}, number = {1}, pages = {1--42}, month = {April}, doi = {10.17159/1727-3781/2019/v22i0a4886}, date = {2019-04-25}, note = "\url{https://perjournal.co.za/article/download/4886/7609} ; \url{http://www.scielo.org.za/scielo.php?script=sci_arttext&pid=S1727-37812019000100015} ; \url{http://www.scielo.org.za/pdf/pelj/v22n1/15.pdf} ; \url{https://perjournal.co.za/article/view/4886} ; \url{https://doaj.org/article/c71c56d0c79f497bba7b913364a54d72} ; \url{https://repository.nwu.ac.za/handle/10394/32469} ; \url{https://dspace.nwu.ac.za/handle/10394/32469} ; \url{https://www.ajol.info/index.php/pelj/article/view/216461}", url = {https://lens.org/008-782-115-725-766} } @article{lens.org/009-386-221-930-423, author = {Yu-Jong Jang and Jin Kwak}, title = {Digital forensics investigation methodology applicable for social network services}, journal = {Multimedia Tools and Applications}, year = {2014}, volume = {74}, number = {14}, pages = {5029--5040}, month = {July}, doi = {10.1007/s11042-014-2061-8}, date = {2014-07-19}, note = "\url{https://link.springer.com/article/10.1007/s11042-014-2061-8} ; \url{https://link.springer.com/content/pdf/10.1007%2Fs11042-014-2061-8.pdf} ; \url{https://dblp.uni-trier.de/db/journals/mta/mta74.html#JangK15}", url = {https://lens.org/009-386-221-930-423} } @article{lens.org/009-512-003-529-193, author = {Eoghan Casey}, title = {The chequered past and risky future of digital forensics}, journal = {Australian Journal of Forensic Sciences}, year = {2019}, volume = {51}, number = {6}, pages = {649--664}, month = {February}, doi = {10.1080/00450618.2018.1554090}, date = {2019-02-02}, note = "\url{https://www.tandfonline.com/doi/full/10.1080/00450618.2018.1554090}", url = {https://lens.org/009-512-003-529-193} } @article{lens.org/009-705-592-114-017, author = {Shelby O. Abraham and Gargi Jani and Vineet Vinay and William R. Belcher and Abraham Johnson}, title = {A preliminary study to quantify the efficacy of 3D data acquisition for human bone replication.}, journal = {Journal of forensic and legal medicine}, year = {2021}, volume = {83}, pages = {102244--}, month = {August}, doi = {10.1016/j.jflm.2021.102244}, date = {2021-08-21}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1752928X21001293}", url = {https://lens.org/009-705-592-114-017} } @article{lens.org/009-722-526-338-869, author = {Ameer Al-Nemrat and George R. S. Weir}, title = {Special Issue: on cybercrime prevention, detection and response}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2013}, volume = {5}, number = {2}, note = "\url{https://strathprints.strath.ac.uk/52489/} ; \url{https://pureportal.strath.ac.uk/en/publications/special-issue-on-cybercrime-prevention-detection-and-response}", url = {https://lens.org/009-722-526-338-869} } @article{lens.org/009-862-177-957-585, author = {Nana Rachmana Syambas and Naufal El Farisi}, title = {Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics}, journal = {Journal of ICT Research and Applications}, year = {2014}, volume = {8}, number = {2}, pages = {141--156}, doi = {10.5614/itbj.ict.res.appl.2014.8.2.5}, note = "\url{https://doaj.org/article/c635faa0a742491a8ce8f42bde6aeb72} ; \url{https://core.ac.uk/download/pdf/291851383.pdf}", url = {https://lens.org/009-862-177-957-585} } @article{lens.org/009-885-874-541-907, author = {Darren Quick and Kim-Kwang Raymond Choo}, title = {Data reduction and data mining framework for digital forensic evidence: Storage, intelligence, review and archive}, journal = {Trends and issues in crime and criminal justice}, year = {2014}, number = {480}, pages = {1--}, month = {September}, date = {2014-09-17}, note = "\url{https://apo.org.au/sites/default/files/resource-files/2014-09/apo-nid41334.pdf} ; \url{https://www.questia.com/library/journal/1P3-3455023131/data-reduction-and-data-mining-framework-for-digital} ; \url{https://apo.org.au/node/41334}", url = {https://lens.org/009-885-874-541-907} } @article{lens.org/009-992-277-433-362, author = {Pooja Kadam}, title = {Artificial Intelligence In Digital Forensics}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.01}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.01}", url = {https://lens.org/009-992-277-433-362} } @article{lens.org/010-061-391-662-193, author = {Nina Sunde and Graeme Horsman}, title = {Part 2: The Phase-oriented Advice and Review Structure (PARS) for Digital Forensic Investigations}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {36}, pages = {301074--}, doi = {10.1016/j.fsidi.2020.301074}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di36.html#SundeH21} ; \url{https://research.tees.ac.uk/en/publications/part-2-the-phase-oriented-advice-and-review-structure-pars-for-di} ; \url{https://doi.org/10.1016/j.fsidi.2020.301074} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281720303711}", url = {https://lens.org/010-061-391-662-193} } @article{lens.org/010-127-508-296-844, author = {Wicher Minnaard}, title = {The Linux FAT32 allocator and file creation order reconstruction}, journal = {Digital Investigation}, year = {2014}, volume = {11}, number = {3}, pages = {224--233}, doi = {10.1016/j.diin.2014.06.008}, note = "\url{https://doi.org/10.1016/j.diin.2014.06.008} ; \url{http://www.sciencedirect.com/science/article/pii/S1742287614000826} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287614000826}", url = {https://lens.org/010-127-508-296-844} } @article{lens.org/010-307-492-365-961, author = {Aditi Solanki}, title = {OSINT as Tool of information Gathering In Digital Forensics}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {February}, doi = {10.46293/4n6/2021.03.01.06}, date = {2021-02-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.01.06}", url = {https://lens.org/010-307-492-365-961} } @article{lens.org/010-490-168-139-514, author = {Victor R. Kebande and Nickson Karie Menza and Hein S. Venter}, title = {Functional Requirements for Adding Digital Forensic Readiness as a Security Component in IoT Environments}, journal = {International Journal on Advanced Science, Engineering and Information Technology}, year = {2018}, volume = {8}, number = {2}, pages = {342--349}, month = {March}, doi = {10.18517/ijaseit.8.2.2121}, date = {2018-03-31}, note = "\url{https://dx.doi.org/10.18517/ijaseit.8.2.2121} ; \url{https://repository.up.ac.za/handle/2263/66569} ; \url{http://dx.doi.org/10.18517/ijaseit.8.2.2121} ; \url{http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=2121} ; \url{https://core.ac.uk/download/pdf/296919940.pdf}", url = {https://lens.org/010-490-168-139-514} } @article{lens.org/010-607-170-706-481, author = {Raymond J. Johansen and C. Michael Bowers}, title = {Positive dental identification using tooth anatomy and digital superimposition.}, journal = {Journal of forensic sciences}, year = {2012}, volume = {58}, number = {2}, pages = {534--536}, month = {December}, doi = {10.1111/1556-4029.12040}, date = {2012-12-27}, note = "\url{https://pubmed.ncbi.nlm.nih.gov/23278438/} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/23278438} ; \url{https://www.onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.12040}", url = {https://lens.org/010-607-170-706-481} } @article{lens.org/010-620-450-221-40X, author = {Eoghan Casey and Thomas R. Souvignet}, title = {Digital transformation risk management in forensic science laboratories.}, journal = {Forensic science international}, year = {2020}, volume = {316}, pages = {110486--}, month = {September}, doi = {10.1016/j.forsciint.2020.110486}, date = {2020-09-03}, note = "\url{https://serval.unil.ch/en/notice/serval:BIB_6189637BB7F5} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/32919163} ; \url{https://pubmed.ncbi.nlm.nih.gov/32919163/} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S0379073820303480} ; \url{https://www.sciencedirect.com/science/article/pii/S0379073820303480}", url = {https://lens.org/010-620-450-221-40X} } @article{lens.org/010-687-471-708-90X, author = {Shweta Tripathi}, title = {Digital Forensic Investigation on File System And Database Tampering}, journal = {IOSR Journal of Engineering}, year = {2012}, volume = {02}, number = {02}, pages = {2142--221}, doi = {10.9790/3021-0202214221}, note = "\url{http://www.iosrjen.org/Papers/vol2_issue2/G022214221.pdf}", url = {https://lens.org/010-687-471-708-90X} } @article{lens.org/010-841-975-744-659, author = {Damien Rhumorbarbe and Ludovic Staehli and Julian Broséus and Quentin Rossy and Pierre Esseiva}, title = {Buying drugs on a Darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data}, journal = {Forensic science international}, year = {2016}, volume = {267}, pages = {173--182}, month = {August}, doi = {10.1016/j.forsciint.2016.08.032}, date = {2016-08-31}, note = "\url{http://www.sciencedirect.com/science/article/pii/S0379073816303620} ; \url{https://www.sciencedirect.com/science/article/pii/S0379073816303620} ; \url{https://core.ac.uk/display/77172586} ; \url{https://serval.unil.ch/notice/serval:BIB_670B021B4620} ; \url{https://serval.unil.ch/resource/serval:BIB_670B021B4620.P001/REF.pdf} ; \url{https://europepmc.org/article/MED/27611957} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/27611957/} ; \url{https://core.ac.uk/download/77172586.pdf}", url = {https://lens.org/010-841-975-744-659} } @article{lens.org/010-963-610-208-920, author = {Nina Sunde and Itiel E. Dror}, title = {Cognitive and human factors in digital forensics: Problems, challenges, and the way forward}, journal = {Digital Investigation}, year = {2019}, volume = {29}, pages = {101--108}, doi = {10.1016/j.diin.2019.03.011}, note = "\url{https://phs.brage.unit.no/phs-xmlui/handle/11250/2675988} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287619300441} ; \url{https://www.duo.uio.no/handle/10852/78868} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287619300441}", url = {https://lens.org/010-963-610-208-920} } @article{lens.org/010-985-077-415-59X, author = {Simson L. Garfinkel}, title = {Digital media triage with bulk data analysis and bulk_extractor}, journal = {Computers \& Security}, year = {2013}, volume = {32}, pages = {56--72}, doi = {10.1016/j.cose.2012.09.011}, note = "\url{https://dl.acm.org/doi/10.5555/2748150.2748581} ; \url{https://simson.net/clips/academic/2013.COSE.bulk_extractor.pdf} ; \url{https://core.ac.uk/display/82510361} ; \url{http://digitalcorpora.org/downloads/bulk_extractor/doc/2013.COSE.bulk_extractor.pdf} ; \url{https://www.sciencedirect.com/science/article/pii/S0167404812001472} ; \url{http://www.sciencedirect.com/science/article/pii/S0167404812001472} ; \url{https://dblp.uni-trier.de/db/journals/compsec/compsec32.html#Garfinkel13} ; \url{https://core.ac.uk/download/pdf/82510361.pdf}", url = {https://lens.org/010-985-077-415-59X} } @article{lens.org/011-013-554-923-15X, author = {Nixon Paulson and Jefin Francis and Christy Mathew}, title = {Red-Teaming Labs}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {May}, doi = {10.46293/4n6/2021.03.02.10}, date = {2021-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.02.10}", url = {https://lens.org/011-013-554-923-15X} } @article{lens.org/011-051-740-313-213, author = {Simson L. Garfinkel}, title = {Digital forensics XML and the DFXML toolset}, journal = {Digital Investigation}, year = {2012}, volume = {8}, number = {3}, pages = {161--174}, doi = {10.1016/j.diin.2011.11.002}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1742287611000910} ; \url{https://dblp.uni-trier.de/db/journals/di/di8.html#Garfinkel12} ; \url{http://simson.net/ref/2011/dfxml.pdf} ; \url{https://core.ac.uk/display/36736443}", url = {https://lens.org/011-051-740-313-213} } @article{lens.org/011-115-133-098-072, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {43}, pages = {301466--301466}, doi = {10.1016/s2666-2817(22)00147-0}, url = {https://lens.org/011-115-133-098-072} } @article{lens.org/011-153-981-274-232, author = {Gary C. Kessler and Gregory H. Carlton}, title = {Exploring Myths in Digital Forensics: Separating Science From Ritual}, journal = {International Journal of Interdisciplinary Telecommunications and Networking}, year = {2017}, volume = {9}, number = {4}, pages = {1--9}, month = {October}, doi = {10.4018/ijitn.2017100101}, date = {2017-10-01}, note = "\url{https://works.bepress.com/gary_kessler/82/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=2766&context=publication} ; \url{https://dl.acm.org/doi/10.4018/IJITN.2017100101} ; \url{https://commons.erau.edu/publication/1614/} ; \url{https://dblp.uni-trier.de/db/journals/ijitn/ijitn9.html#KesslerC17} ; \url{https://ideas.repec.org/a/igg/jitn00/v9y2017i4p1-9.html} ; \url{https://www.igi-global.com/chapter/exploring-myths-in-digital-forensics/252700} ; \url{https://doi.org/10.4018/IJITN.2017100101}", url = {https://lens.org/011-153-981-274-232} } @article{lens.org/011-285-275-099-160, author = {N Kala Baskar}, title = {Cyber attacks on IoT devices and preparedness for Industry 4.0}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.16}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.16}", url = {https://lens.org/011-285-275-099-160} } @article{lens.org/011-452-215-957-659, author = {Chan-Youn Lee and Sangjin Lee}, title = {The analysis of Windows 7·8 IconCache.db and its application}, journal = {Journal of the Korea Institute of Information Security and Cryptology}, year = {2014}, volume = {24}, number = {1}, pages = {135--144}, month = {February}, doi = {10.13089/jkiisc.2014.24.1.135}, date = {2014-02-28}, note = "\url{http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2014_v24n1_135} ; \url{http://koreascience.or.kr:80/article/JAKO201409739050479.pdf}", url = {https://lens.org/011-452-215-957-659} } @article{lens.org/011-687-923-266-863, author = {Graeme Horsman}, title = {What’s in the Cloud? - An examination of the impact of cloud storage usage on the browser cache.}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2020}, volume = {15}, number = {1}, pages = {3--}, doi = {10.15394/jdfsl.2020.1592}, note = "\url{https://research.tees.ac.uk/en/publications/whats-in-the-cloud-an-examination-of-the-impact-of-cloud-storage-} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1592&context=jdfsl} ; \url{https://commons.erau.edu/jdfsl/vol15/iss1/3/}", url = {https://lens.org/011-687-923-266-863} } @article{lens.org/011-755-498-862-139, author = {Fahad E. Salamh and Umit Karabiyik and Marcus K. Rogers}, title = {RPAS Forensic Validation Analysis Towards a Technical Investigation Process: A Case Study of Yuneec Typhoon H.}, journal = {Sensors (Basel, Switzerland)}, year = {2019}, volume = {19}, number = {15}, pages = {3246--}, month = {July}, doi = {10.3390/s19153246}, date = {2019-07-24}, note = "\url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6695682} ; \url{http://ui.adsabs.harvard.edu/abs/2019Senso..19.3246S/abstract} ; \url{https://doi.org/10.3390/s19153246} ; \url{https://dblp.uni-trier.de/db/journals/sensors/sensors19.html#SalamhKR19} ; \url{https://pubmed.ncbi.nlm.nih.gov/31344784/} ; \url{https://www.mdpi.com/1424-8220/19/15/3246/htm} ; \url{https://www.mdpi.com/1424-8220/19/15/3246/pdf} ; \url{http://dblp.uni-trier.de/db/journals/sensors/sensors19.html#SalamhKR19}", url = {https://lens.org/011-755-498-862-139} } @article{lens.org/011-811-399-982-358, author = {Junji Morishita and Noriaki Ikeda and Yasuyuki Ueda Yongsu Yoon and Akiko Tsuji}, title = {Personal Identification Using Radiological Technology and Advanced Digital Imaging: Expectations and Challenges}, journal = {Journal of Forensic Research}, year = {2021}, volume = {12}, number = {8}, pages = {1--3}, month = {October}, date = {2021-10-21}, note = "\url{https://www.hilarispublisher.com/open-access/personal-identification-using-radiological-technology-and-advanced-digital-imaging-expectations-and-challenges.pdf} ; \url{https://www.hilarispublisher.com/abstract/personal-identification-using-radiological-technology-and-rnadvanced-digital-imaging-expectations-and-challenges-75138.html}", url = {https://lens.org/011-811-399-982-358} } @article{lens.org/012-089-942-653-099, author = {Philip Penrose and William J Buchanan and Richard Macfarlane}, title = {Fast contraband detection in large capacity disk drives}, journal = {Digital Investigation}, year = {2015}, volume = {12}, pages = {S22--S29}, doi = {10.1016/j.diin.2015.01.007}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di12.html#PenroseBM15} ; \url{https://core.ac.uk/display/81123678} ; \url{https://doi.org/10.1016/j.diin.2015.01.007} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287615000080} ; \url{https://core.ac.uk/download/74028968.pdf}", url = {https://lens.org/012-089-942-653-099} } @article{lens.org/012-100-302-576-245, author = {Shi Shao-pei}, title = {The Application of Exif in Digital Photo Authentication}, journal = {Chinese Journal of Forensic Sciences}, year = {2012}, note = "\url{http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201205011.htm}", url = {https://lens.org/012-100-302-576-245} } @article{lens.org/012-408-224-860-371, author = {Sunardi Sunardi and Riadi and Rusydi Umar and Muhammad Fauzan Gustafi}, title = {Audio Forensics on Smartphone with Digital Forensics Research Workshop (DFRWS) Method}, journal = {CommIT (Communication and Information Technology) Journal}, year = {2021}, volume = {15}, number = {1}, pages = {41--47}, month = {March}, doi = {10.21512/commit.v15i1.6739}, date = {2021-03-20}, note = "\url{https://journal.binus.ac.id/index.php/commit/article/view/6739} ; \url{https://journal.binus.ac.id/index.php/commit/article/download/6739/4061}", url = {https://lens.org/012-408-224-860-371} } @article{lens.org/012-459-130-312-50X, author = {Vishal R. Ambhire}, title = {Digital Forensic Tools}, journal = {IOSR Journal of Engineering}, year = {2012}, volume = {02}, number = {03}, pages = {392--398}, doi = {10.9790/3021-0203392398}, note = "\url{http://www.iosrjen.org/Papers/vol2_issue3/D023392398.pdf}", url = {https://lens.org/012-459-130-312-50X} } @article{lens.org/012-515-256-028-110, author = {Sher-Lin Chiam}, title = {A note on digital dental radiography in forensic odontology.}, journal = {Journal of forensic dental sciences}, year = {2014}, volume = {6}, number = {3}, pages = {197--201}, doi = {10.4103/0975-1475.137072}, note = "\url{http://www.jfds.org/article.asp?issn=0975-1475;year=2014;volume=6;issue=3;spage=197;epage=201;aulast=} ; \url{http://www.jfds.org/article.asp?issn=0975-1475;year=2014;volume=6;issue=3;spage=197;epage=201;aulast=;type=2} ; \url{https://pubmed.ncbi.nlm.nih.gov/25177144/} ; \url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4142412}", url = {https://lens.org/012-515-256-028-110} } @article{lens.org/012-564-492-558-122, author = {Nickson M. Karie and Victor R. Kebande}, title = {Knowledge Management as a Strategic Asset in Digital Forensic Investigations}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {1}, pages = {10--20}, doi = {10.17781/p002311}, note = "\url{http://www.sdiwc.net/digital-library/knowledge-management-as-a-strategic-asset-in-digital-forensic-investigations.html}", url = {https://lens.org/012-564-492-558-122} } @article{lens.org/012-676-496-211-536, author = {Eoghan Casey and Lam Nguyen and Jeffrey Mates and Scott Lalliss}, title = {Crowdsourcing forensics: Creating a curated catalog of digital forensic artifacts.}, journal = {Journal of forensic sciences}, year = {2022}, volume = {67}, number = {5}, pages = {1846--1857}, month = {July}, doi = {10.1111/1556-4029.15053}, date = {2022-07-11}, url = {https://lens.org/012-676-496-211-536} } @article{lens.org/012-713-966-070-716, author = {Mohd Najwadi Yusoff and Ramlan Mahmod and Ali Dehghantanha and Mohd Taufik Abdullah}, title = {Advances of mobile forensic procedures in Firefox OS}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2014}, volume = {3}, number = {4}, pages = {183--199}, doi = {10.17781/p001338}, note = "\url{http://psasir.upm.edu.my/id/eprint/36337/} ; \url{http://sdiwc.net/digital-library/advances-of-mobile-forensic-procedures-in-firefox-os} ; \url{https://usir.salford.ac.uk/id/eprint/33890/?template=banner} ; \url{https://usir.salford.ac.uk/33890/1/advances%2Dof%2Dmobile%2Dforensic%2Dprocedures%2Din%2Dfirefox%2Dos.pdf} ; \url{https://core.ac.uk/download/153816801.pdf}", url = {https://lens.org/012-713-966-070-716} } @article{lens.org/012-753-117-168-379, author = {C. Annemieke Romein and Max Kemman and Julie M. Birkholz and James Baker and Michel de Gruijter and Albert Meroño-Peñuela and Thorsten Ries and Ruben Ros and Stefania Scagliola}, title = {State of the Field: Digital History}, journal = {History}, year = {2020}, volume = {105}, number = {365}, pages = {291--312}, month = {May}, doi = {10.1111/1468-229x.12969}, date = {2020-05-14}, note = "\url{https://onlinelibrary.wiley.com/doi/pdf/10.1111/1468-229X.12969} ; \url{https://onlinelibrary.wiley.com/doi/full/10.1111/1468-229X.12969} ; \url{https://www.narcis.nl/publication/RecordID/oai%3Aresearch.vu.nl%3Apublications%2F9bb52f83-56b9-4b03-b4b7-c9402a7ae95f} ; \url{https://biblio.ugent.be/publication/8639239/file/8704801.pdf} ; \url{http://sro.sussex.ac.uk/id/eprint/89927/} ; \url{https://biblio.ugent.be/publication/8639239} ; \url{https://research.vu.nl/en/publications/state-of-the-field-digital-history} ; \url{https://core.ac.uk/download/287601121.pdf}", url = {https://lens.org/012-753-117-168-379} } @article{lens.org/012-772-407-519-521, author = {Geeta Karyakarte and Alka Dive and Ashish Bodhade and Shubhangi Khandekar}, title = {Digital image fraudulence: A curse to forensic odontology.}, journal = {Journal of forensic dental sciences}, year = {2018}, volume = {10}, number = {2}, pages = {67--70}, doi = {10.4103/jfo.jfds_16_18}, note = "\url{https://www.jfds.org/article.asp?issn=0975-1475;year=2018;volume=10;issue=2;spage=67;epage=70;aulast=Karyakarte;type=2} ; \url{https://europepmc.org/article/PMC/PMC6344785} ; \url{https://pubmed.ncbi.nlm.nih.gov/30745779/} ; \url{http://www.jfds.org/article.asp?issn=0975-1475;year=2018;volume=10;issue=2;spage=67;epage=70;aulast=Karyakarte} ; \url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6344785}", url = {https://lens.org/012-772-407-519-521} } @article{lens.org/012-976-343-182-644, author = {Fauzan Novaldi Suteja and Eka Wahyu Hidayat and Nur Widiyasono}, title = {Implementation of Image Enhancement Algorithm for Image Forensics using Mathlab}, journal = {Jurnal Online Informatika}, year = {2020}, volume = {4}, number = {2}, pages = {79--84}, month = {February}, doi = {10.15575/join.v4i2.314}, date = {2020-02-14}, note = "\url{http://join.if.uinsgd.ac.id/index.php/join/article/view/314} ; \url{https://join.if.uinsgd.ac.id/index.php/join/article/download/314/137} ; \url{https://core.ac.uk/download/pdf/295600540.pdf}", url = {https://lens.org/012-976-343-182-644} } @article{lens.org/013-063-668-345-122, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {36}, pages = {301158--301158}, doi = {10.1016/s2666-2817(21)00063-9}, url = {https://lens.org/013-063-668-345-122} } @article{lens.org/013-370-475-929-519, author = {Rizdqi Akbar Ramadhan and Panji Rachmat Setiawan and Dedy Hariyadi}, title = {Digital Forensic Investigation for Non-Volatile Memory Architecture by Hybrid Evaluation Based on ISO/IEC 27037:2012 and NIST SP800-86 Framework}, journal = {IT Journal Research and Development}, year = {2022}, pages = {162--168}, month = {February}, doi = {10.25299/itjrd.2022.8968}, date = {2022-02-22}, url = {https://lens.org/013-370-475-929-519} } @article{lens.org/013-473-351-226-135, author = {Erhan Akbal and Sengul Dogan and Turker Tuncer}, title = {An automated multispecies bioacoustics sound classification method based on a nonlinear pattern: Twine-pat}, journal = {Ecological Informatics}, year = {2022}, volume = {68}, pages = {101529--101529}, doi = {10.1016/j.ecoinf.2021.101529}, url = {https://lens.org/013-473-351-226-135} } @article{lens.org/013-481-527-037-718, author = {Rafal Korycki}, title = {Authenticity examination of compressed audio recordings using detection of multiple compression and encoders' identification.}, journal = {Forensic science international}, year = {2014}, volume = {238}, pages = {33--46}, month = {February}, doi = {10.1016/j.forsciint.2014.02.008}, date = {2014-02-18}, note = "\url{https://www.sciencedirect.com/science/article/pii/S0379073814000693} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/24637036}", url = {https://lens.org/013-481-527-037-718} } @article{lens.org/013-561-858-296-271, author = {Bikash Kumar Das}, title = {Augment Agricultural Production Through AI}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.09}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.09}", url = {https://lens.org/013-561-858-296-271} } @article{lens.org/013-587-039-432-597, author = {Djalma Fonseca}, title = {Extraction And Examination Of Evidences Using Chip-Off Forensic}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.04}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.04}", url = {https://lens.org/013-587-039-432-597} } @article{lens.org/013-725-723-735-829, author = {Igor Mikhaylov}, title = {Checkm8: An Apple iOS Exploit Reviews}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.03}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.03}", url = {https://lens.org/013-725-723-735-829} } @article{lens.org/013-829-755-696-381, author = {Gary C. Kessler and Gregory H. Carlton}, title = {An Analysis of Forensic Imaging in the Absence of Write-Blockers}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2014}, volume = {9}, number = {3}, pages = {51--58}, month = {September}, date = {2014-09-01}, note = "\url{https://doi.org/10.15394/jdfsl.2014.1187} ; \url{https://doaj.org/article/6758e97a517c4dd7b162e9dc82bb2c81} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#KesslerC14}", url = {https://lens.org/013-829-755-696-381} } @article{lens.org/013-969-775-246-876, author = {Eoghan Casey}, title = {Editorial – Delivering digital forensic science as a service}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {35}, pages = {301095--}, doi = {10.1016/j.fsidi.2020.301095}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di35.html#Casey20d} ; \url{https://doi.org/10.1016/j.fsidi.2020.301095}", url = {https://lens.org/013-969-775-246-876} } @article{lens.org/013-991-866-178-240, author = {Gregory H. Carlton and Gary C. Kessler}, title = {Disconnects of Specialized Mobile Digital Forensics within the Generalized Field of Digital Forensic Science}, journal = {International Journal of Interdisciplinary Telecommunications and Networking}, year = {2018}, volume = {10}, number = {3}, pages = {62--65}, month = {July}, doi = {10.4018/ijitn.2018070106}, date = {2018-07-01}, note = "\url{https://jglobal.jst.go.jp/detail?JGLOBAL_ID=201802228345200270} ; \url{https://works.bepress.com/gary_kessler/86/} ; \url{https://dblp.uni-trier.de/db/journals/ijitn/ijitn10.html#CarltonK18a} ; \url{https://ideas.repec.org/a/igg/jitn00/v10y2018i3p62-65.html} ; \url{https://www.igi-global.com/article/disconnects-of-specialized-mobile-digital-forensics-within-the-generalized-field-of-digital-forensic-science/204579}", url = {https://lens.org/013-991-866-178-240} } @article{lens.org/014-168-575-959-392, author = {Keungi Lee and Seongjin Hwang and Changhoon Lee and Sangjin Lee}, title = {Study on advanced analysis method based on timeline chart for Digital Forensic Investigation}, journal = {The Journal of Korea Navigation Institute}, year = {2014}, volume = {18}, number = {1}, pages = {50--55}, month = {February}, doi = {10.12673/jkoni.2014.18.1.50}, date = {2014-02-28}, note = "\url{http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=HHHHBI_2014_v18n1_50}", url = {https://lens.org/014-168-575-959-392} } @article{lens.org/014-305-699-069-963, author = {Yuri Gubanov}, title = {Keychain Extraction In Belkasoft Evidence Center (BEC)}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.02}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.02}", url = {https://lens.org/014-305-699-069-963} } @article{lens.org/014-514-641-367-15X, author = {Gary D Cantrell and David A. Dampier}, title = {Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model}, journal = {Journal of Digital Forensics, Security and Law}, year = {2012}, volume = {7}, number = {4}, pages = {99--116}, doi = {10.15394/jdfsl.2012.1135}, note = "\url{https://commons.erau.edu/jdfsl/vol7/iss4/5/} ; \url{https://oaji.net/articles/2014/1095-1408808426.pdf} ; \url{https://core.ac.uk/display/92036529} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1135&context=jdfsl} ; \url{https://doi.org/10.15394/jdfsl.2012.1135} ; \url{https://mds.marshall.edu/wdcs_faculty/66/}", url = {https://lens.org/014-514-641-367-15X} } @article{lens.org/014-767-056-602-687, author = {Hussam J. Mohammed and Nathan Clarke and Fudong Li}, title = {An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data}, journal = {Journal of Digital Forensics, Security and Law}, year = {2016}, volume = {11}, number = {2}, pages = {137--152}, doi = {10.15394/jdfsl.2016.1384}, note = "\url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1384&context=jdfsl} ; \url{https://core.ac.uk/display/81695607} ; \url{https://paperity.org/p/84115528/an-automated-approach-for-digital-forensic-analysis-of-heterogeneous-big-data} ; \url{https://commons.erau.edu/jdfsl/vol11/iss2/9/} ; \url{https://doi.org/10.15394/jdfsl.2016.1384} ; \url{https://ro.ecu.edu.au/ecuworkspost2013/2548/} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#MohammedCL16} ; \url{http://commons.erau.edu/jdfsl/vol11/iss2/9/} ; \url{https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=3554&context=ecuworkspost2013} ; \url{https://core.ac.uk/download/81695607.pdf}", url = {https://lens.org/014-767-056-602-687} } @article{lens.org/014-859-901-321-603, author = {Thomas Gloe and André Fischer and Matthias Kirchner}, title = {Forensic analysis of video file formats}, journal = {Digital Investigation}, year = {2014}, volume = {11}, pages = {S68--S76}, doi = {10.1016/j.diin.2014.03.009}, note = "\url{https://dfrws.org/presentation/forensic-analysis-of-video-file-formats/} ; \url{http://www.sciencedirect.com/science/article/pii/S1742287614000140} ; \url{https://core.ac.uk/display/82097955} ; \url{https://doi.org/10.1016/j.diin.2014.03.009} ; \url{https://dfrws.org/wp-content/uploads/2019/06/2014_EU_paper-forensic_analysis_of_video_file_formats.pdf} ; \url{https://www.wi.uni-muenster.de/de/forschung/publikationen/98281} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287614000140} ; \url{https://core.ac.uk/download/pdf/82097955.pdf}", url = {https://lens.org/014-859-901-321-603} } @article{lens.org/014-864-005-189-321, author = {Mukesh Sharma}, title = {Digital Data Stealing from ATM using Data Skimmers: Challenge to the Forensic Examiner}, journal = {Journal of Forensic Sciences \& Criminal Investigation}, year = {2017}, volume = {1}, number = {4}, month = {January}, doi = {10.19080/jfsci.2017.01.555567}, date = {2017-01-19}, note = "\url{https://juniperpublishers.com/jfsci/JFSCI.MS.ID.555567.php}", url = {https://lens.org/014-864-005-189-321} } @article{lens.org/014-997-104-384-746, author = {Turker Tuncer and Sengul Dogan and Fatih Ertam}, title = {Automatic voice based disease detection method using one dimensional local binary pattern feature extraction network}, journal = {Applied Acoustics}, year = {2019}, volume = {155}, pages = {500--506}, doi = {10.1016/j.apacoust.2019.05.023}, note = "\url{https://www.sciencedirect.com/science/article/pii/S0003682X19304633}", url = {https://lens.org/014-997-104-384-746} } @article{lens.org/015-093-633-802-899, author = {Andrew Marrington}, title = {First Annual DFRWS APAC Conference}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301304--}, doi = {10.1016/j.fsidi.2021.301304}, note = "\url{https://api.elsevier.com/content/article/PII:S2666281721002274?httpAccept=text/xml}", url = {https://lens.org/015-093-633-802-899} } @article{lens.org/015-123-182-480-038, author = {Tim Thompson and Paul Norris}, title = {A new method for the recovery and evidential comparison of footwear impressions using 3D structured light scanning}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2018}, volume = {58}, number = {3}, pages = {237--243}, month = {February}, doi = {10.1016/j.scijus.2018.02.001}, date = {2018-02-06}, note = "\url{https://core.ac.uk/display/151186262} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/29685306} ; \url{https://www.sciencedirect.com/science/article/pii/S1355030618300261} ; \url{https://research.tees.ac.uk/ws/files/4358613/621670.pdf} ; \url{https://research.tees.ac.uk/en/publications/a-new-method-for-the-recovery-and-evidential-comparison-of-footwe} ; \url{https://core.ac.uk/download/pdf/196166430.pdf}", url = {https://lens.org/015-123-182-480-038} } @article{lens.org/015-340-476-560-675, author = {Nikolaos Serketzis and Vasilios Katos and Christos Ilioudis and Dimitrios Baltatzis and G. Pangalos}, title = {Improving Forensic Triage Efficiency through Cyber Threat Intelligence}, journal = {Future Internet}, year = {2019}, volume = {11}, number = {7}, pages = {162--}, month = {July}, doi = {10.3390/fi11070162}, date = {2019-07-23}, note = "\url{http://eprints.bournemouth.ac.uk/32570/} ; \url{https://www.mdpi.com/1999-5903/11/7/162} ; \url{https://dblp.uni-trier.de/db/journals/fi/fi11.html#SerketzisKIBP19} ; \url{https://www.mdpi.com/1999-5903/11/7/162/pdf} ; \url{https://doaj.org/article/57748e69a34d417bb9a2efba0274d641} ; \url{https://core.ac.uk/download/222828992.pdf}", url = {https://lens.org/015-340-476-560-675} } @article{lens.org/015-436-998-822-923, author = {Roman Rak and Dagmar Kopencová and Miroslav Felcan}, title = {Digital vehicle identity – Digital VIN in forensic and technical practice}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {39}, pages = {301307--}, doi = {10.1016/j.fsidi.2021.301307}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2666281721002328}", url = {https://lens.org/015-436-998-822-923} } @article{lens.org/015-455-002-340-996, author = {Inikpi O Ademu and Chris Imafidon and David Preston}, title = {Intelligent Software Agent Applied To Digital Forensic and Its Usefulness}, journal = {International Journal of Computer Science and Informatics}, year = {2013}, pages = {277--280}, doi = {10.47893/ijcsi.2013.1105}, note = "\url{http://dx.doi.org/10.47893/ijcsi.2013.1105}", url = {https://lens.org/015-455-002-340-996} } @article{lens.org/015-592-284-127-528, author = {Irfan Febrian Editia Kurdiat and Nur Widiyasono and Husni Mubarok}, title = {Analisis Proses Investigasi Dekstop PC Yang Terhubung Layanan Private Cloud}, journal = {Jurnal Teknik Informatika dan Sistem Informasi}, year = {2016}, volume = {2}, number = {2}, pages = {134419--}, month = {August}, doi = {10.28932/jutisi.v2i2.463}, date = {2016-08-05}, note = "\url{https://www.neliti.com/id/publications/134419/analisis-proses-investigasi-dekstop-pc-yang-terhubung-layanan-private-cloud} ; \url{https://media.neliti.com/media/publications/134419-ID-analisis-proses-investigasi-dekstop-pc-y.pdf}", url = {https://lens.org/015-592-284-127-528} } @article{lens.org/015-687-713-380-145, author = {Graeme Horsman}, title = {ACPO principles for digital evidence: Time for an update?}, journal = {Forensic Science International: Reports}, year = {2020}, volume = {2}, pages = {100076--}, doi = {10.1016/j.fsir.2020.100076}, note = "\url{https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202102259523808363} ; \url{https://research.tees.ac.uk/en/publications/acpo-principles-for-digital-evidence-time-for-an-update} ; \url{https://www.sciencedirect.com/science/article/pii/S2665910720300220}", url = {https://lens.org/015-687-713-380-145} } @article{lens.org/015-858-904-277-590, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {Toward Effective and Reliable Digital Forensics}, journal = {The Computer Journal}, year = {2012}, volume = {55}, number = {6}, pages = {651--652}, month = {February}, doi = {10.1093/comjnl/bxs012}, date = {2012-02-16}, note = "\url{https://academic.oup.com/comjnl/article-pdf/55/6/651/989417/bxs012.pdf} ; \url{https://dblp.uni-trier.de/db/journals/cj/cj55.html#MazurczykS12}", url = {https://lens.org/015-858-904-277-590} } @article{lens.org/016-039-721-963-229, author = {Muhammad Nur Faiz and Rusydi Umar and Anton Yudhana}, title = {Analisis Live Forensics untuk Perbandingan Kemananan Email pada Sistem Operasi Proprietary}, journal = {ILKOM Jurnal Ilmiah}, year = {2016}, volume = {8}, number = {3}, pages = {242--247}, month = {December}, doi = {10.33096/ilkom.v8i3.79.242-247}, date = {2016-12-11}, note = "\url{http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/download/79/54} ; \url{http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/view/79} ; \url{https://www.neliti.com/publications/258808/analisis-live-forensics-untuk-perbandingan-kemananan-email-pada-sistem-operasi-p} ; \url{https://core.ac.uk/download/pdf/228866261.pdf}", url = {https://lens.org/016-039-721-963-229} } @article{lens.org/016-073-660-398-930, author = {Corrado Federici}, title = {ANT/SEIT - AlmaNebula: A Computer Forensics Framework for the Cloud}, journal = {Procedia Computer Science}, year = {2013}, volume = {19}, pages = {139--146}, doi = {10.1016/j.procs.2013.06.023}, note = "\url{https://doi.org/10.1016/j.procs.2013.06.023} ; \url{https://core.ac.uk/display/82174877} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1877050913006315} ; \url{https://www.sciencedirect.com/science/article/pii/S1877050913006315} ; \url{https://dblp.uni-trier.de/db/conf/ant/ant2013.html#Federici13} ; \url{https://core.ac.uk/download/pdf/82174877.pdf}", url = {https://lens.org/016-073-660-398-930} } @article{lens.org/016-180-173-990-746, author = {David Billard}, title = {Blockchain-based digital evidence inventory}, journal = {Journal of Advances in Information Technology}, year = {2019}, volume = {10}, number = {2}, pages = {41--47}, doi = {10.12720/jait.10.2.41-47}, note = "\url{https://hesso.tind.io/record/3610} ; \url{https://hesso.tind.io/record/3610/files/Author%20postprint.pdf} ; \url{http://www.jait.us/uploadfile/2019/0529/20190529042106499.pdf}", url = {https://lens.org/016-180-173-990-746} } @article{lens.org/016-217-772-478-804, author = {Weon Geun Oh}, title = {Technologies for Forensic Marking Certification}, journal = {Journal of Broadcast Engineering}, year = {2013}, volume = {18}, number = {2}, pages = {196--203}, month = {March}, doi = {10.5909/jbe.2013.18.2.196}, date = {2013-03-30}, note = "\url{http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=BSGHC3_2013_v18n2_196} ; \url{http://www.ndsl.kr/soc_img/society/ksbe/BSGHC3/2013/v18n2/BSGHC3_2013_v18n2_196.pdf}", url = {https://lens.org/016-217-772-478-804} } @article{lens.org/016-316-214-363-950, author = {Ahmad Luthfi and Yudi Prayudi}, title = {Design Architecture of Digital Evidence Case Management (DECMa): A Proposed Model for Virtual Environment Digital Forensics Examination}, journal = {Advanced Science Letters}, year = {2017}, volume = {23}, number = {5}, pages = {4192--4196}, month = {May}, doi = {10.1166/asl.2017.8261}, date = {2017-05-01}, note = "\url{https://www.ingentaconnect.com/content/asp/asl/2017/00000023/00000005/art00083}", url = {https://lens.org/016-316-214-363-950} } @article{lens.org/016-441-011-219-628, author = {Tian Zhihon}, title = {A Digital Evidence Fusion Method in Network Forensics Systems with Dempster-Shafer Theory}, journal = {China Communications}, year = {2014}, note = "\url{http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZGTO201405010.htm}", url = {https://lens.org/016-441-011-219-628} } @article{lens.org/016-732-863-869-866, author = {Sharique Raza and Feon Jaison}, title = {A Comparative Study between Vulnerability Assessment and Penetration Testing}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {May}, doi = {10.46293/4n6/2021.03.02.08}, date = {2021-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.02.08}", url = {https://lens.org/016-732-863-869-866} } @article{lens.org/017-060-167-812-521, author = {Aleksandar Valjarevic and Hein S. Venter}, title = {Introduction of concurrent processes into the digital forensic investigation process}, journal = {Australian Journal of Forensic Sciences}, year = {2015}, volume = {48}, number = {3}, pages = {339--357}, month = {July}, doi = {10.1080/00450618.2015.1052754}, date = {2015-07-06}, note = "\url{https://repository.up.ac.za/bitstream/2263/50300/1/Valjarevic_Introduction_2016.pdf} ; \url{https://www.tandfonline.com/doi/full/10.1080/00450618.2015.1052754} ; \url{https://repository.up.ac.za/handle/2263/50300}", url = {https://lens.org/017-060-167-812-521} } @article{lens.org/017-383-422-065-276, author = {Galih Fanani and Imam Riadi and Anton Yudhana}, title = {Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research Workshop}, journal = {JURNAL MEDIA INFORMATIKA BUDIDARMA}, year = {2022}, volume = {6}, number = {2}, pages = {1263--}, month = {April}, doi = {10.30865/mib.v6i2.3946}, date = {2022-04-25}, url = {https://lens.org/017-383-422-065-276} } @article{lens.org/017-661-025-008-689, author = {Prajesh Barde}, title = {Cyber Insurance - Decoding the Dynamics}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.12}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.12}", url = {https://lens.org/017-661-025-008-689} } @article{lens.org/017-779-541-978-693, author = {Andrew Jones and Stilianos Vidalis}, title = {Rethinking Digital Forensics}, journal = {Annals of Emerging Technologies in Computing}, year = {2019}, volume = {3}, number = {2}, pages = {41--53}, month = {April}, doi = {10.33166/aetic.2019.02.005}, date = {2019-04-01}, note = "\url{http://www.aetic.theiaer.org/archive/v3/v3n2/p5.html} ; \url{http://aetic.theiaer.org/archive/v3/v3n2/p5.pdf} ; \url{https://ro.ecu.edu.au/ecuworkspost2013/11326/} ; \url{https://uhra.herts.ac.uk/handle/2299/21240?show=full} ; \url{https://core.ac.uk/download/287581623.pdf}", url = {https://lens.org/017-779-541-978-693} } @article{lens.org/018-309-748-539-33X, author = {Divya Vadlamudi}, title = {Cloud Computing for Analysis on Digital Forensics Challenges}, journal = {International Journal of Digital Contents and Applications for Smart Devices}, year = {2019}, volume = {6}, number = {1}, pages = {1--6}, month = {November}, doi = {10.21742/ijdcasd.2019.6.1.01}, date = {2019-11-30}, note = "\url{http://dx.doi.org/10.21742/ijdcasd.2019.6.1.01}", url = {https://lens.org/018-309-748-539-33X} } @article{lens.org/018-348-310-953-351, author = {Chad M. S. Steel}, title = {Idiographic Digital Profiling: Behavioral Analysis Based on Digital Footprints}, journal = {Journal of Digital Forensics, Security and Law}, year = {2014}, volume = {9}, number = {1}, pages = {7--18}, doi = {10.15394/jdfsl.2014.1160}, note = "\url{https://oaji.net/articles/2014/1095-1408891536.pdf} ; \url{https://doi.org/10.15394/jdfsl.2014.1160} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#Steel14} ; \url{https://commons.erau.edu/jdfsl/vol9/iss1/1/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1160&context=jdfsl}", url = {https://lens.org/018-348-310-953-351} } @article{lens.org/018-688-665-352-310, author = {Jianyu Xiao and Shancang Li and Qingliang Xu}, title = {Video-Based Evidence Analysis and Extraction in Digital Forensic Investigation}, journal = {IEEE Access}, year = {2019}, volume = {7}, pages = {55432--55442}, doi = {10.1109/access.2019.2913648}, note = "\url{https://dblp.uni-trier.de/db/journals/access/access7.html#XiaoLX19a} ; \url{https://ieeexplore.ieee.org/document/8700194} ; \url{https://uwe-repository.worktribe.com/output/3733121/video-based-evidence-analysis-and-extraction-in-digital-forensic-investigation} ; \url{https://core.ac.uk/download/323907298.pdf}", url = {https://lens.org/018-688-665-352-310} } @article{lens.org/018-700-665-539-547, author = {Nikunj Pansari and Dhruwal Kushwaha}, title = {Forensic analysis and investigation using digital forensics- An overview}, journal = {International Journal of Advance Research, Ideas and Innovations in Technology}, year = {2019}, volume = {5}, number = {1}, pages = {470--475}, month = {February}, date = {2019-02-15}, note = "\url{https://www.ijariit.com/manuscript/forensic-analysis-and-investigation-using-digital-forensics-an-overview/} ; \url{https://www.ijariit.com/manuscripts/v5i1/V5I1-1300.pdf}", url = {https://lens.org/018-700-665-539-547} } @article{lens.org/018-752-150-162-159, author = {Asgarali Bouyer and Mojtaba Zirak}, title = {Digital forensics in private Seafile cloud storage from both client and server side}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2021}, volume = {13}, number = {1}, pages = {233--267}, doi = {10.1504/ijesdf.2021.10031878}, note = "\url{https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.114954}", url = {https://lens.org/018-752-150-162-159} } @article{lens.org/018-773-609-741-377, author = { Riadi and Sunardi Sunardi and Muhamad Ermansyah Rauli}, title = {Live Forensics Analysis of Line App on Proprietary Operating System}, journal = {Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control}, year = {2019}, volume = {4}, number = {4}, pages = {305--314}, month = {October}, doi = {10.22219/kinetik.v4i4.850}, date = {2019-10-30}, note = "\url{https://kinetik.umm.ac.id/index.php/kinetik/article/view/850} ; \url{https://core.ac.uk/download/pdf/295172135.pdf}", url = {https://lens.org/018-773-609-741-377} } @article{lens.org/018-885-485-300-751, author = {John Kwaku Oppong}, title = {Evidence Confidentiality and Digital Forensic Experts}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {161--166}, month = {July}, doi = {10.22624/aims/crp-bk3-p26}, date = {2022-07-26}, url = {https://lens.org/018-885-485-300-751} } @article{lens.org/018-948-094-812-86X, author = {Victor R. Kebande and Hein S. Venter}, title = {Novel digital forensic readiness technique in the cloud environment}, journal = {Australian Journal of Forensic Sciences}, year = {2017}, volume = {50}, number = {5}, pages = {552--591}, month = {January}, doi = {10.1080/00450618.2016.1267797}, date = {2017-01-17}, note = "\url{https://www.tandfonline.com/doi/full/10.1080/00450618.2016.1267797} ; \url{https://repository.up.ac.za/handle/2263/60013} ; \url{https://repository.up.ac.za/bitstream/2263/60013/1/Kebande_Novel_2017.pdf}", url = {https://lens.org/018-948-094-812-86X} } @article{lens.org/018-967-672-830-44X, author = {Turker Tuncer and Sengul Dogan and Volkan Ataman}, title = {A novel and accurate chess pattern for automated texture classification}, journal = {Physica A: Statistical Mechanics and its Applications}, year = {2019}, volume = {536}, pages = {122584--}, doi = {10.1016/j.physa.2019.122584}, note = "\url{https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902256706843511} ; \url{http://ui.adsabs.harvard.edu/abs/2019PhyA..53622584T/abstract} ; \url{https://www.sciencedirect.com/science/article/pii/S0378437119314797}", url = {https://lens.org/018-967-672-830-44X} } @article{lens.org/018-996-827-041-158, author = {Graeme Horsman}, title = {Part 2:- Quality assurance mechanisms for digital forensic investigations: knowledge sharing and the Capsule of Digital Evidence (CODE)}, journal = {Forensic Science International: Reports}, year = {2020}, volume = {2}, pages = {100035--}, doi = {10.1016/j.fsir.2019.100035}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2665910719300350} ; \url{https://research.tees.ac.uk/ws/files/8652528/Part_2_Quality_assurance_mechanisms_for_digital_forensic_investigations_knowledge_sharing_and_the_Capsule_of_Digital_Evidence_CODE_.pdf} ; \url{http://www.sciencedirect.com/science/article/pii/S2665910719300350} ; \url{https://research.tees.ac.uk/en/publications/part-2-quality-assurance-mechanisms-for-digital-forensic-investig} ; \url{https://core.ac.uk/download/pdf/232941018.pdf}", url = {https://lens.org/018-996-827-041-158} } @article{lens.org/019-268-703-108-809, author = {Jyotirmoy Roy and M. M. Rohith and Debesh Nilendu and Abraham Johnson}, title = {Qualitative assessment of the dental groove pattern and its uniqueness for forensic identification.}, journal = {Journal of forensic dental sciences}, year = {2019}, volume = {11}, number = {1}, pages = {42--47}, doi = {10.4103/jfo.jfds_73_19}, note = "\url{https://europepmc.org/article/MED/31680755} ; \url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6822311} ; \url{https://pubmed.ncbi.nlm.nih.gov/31680755/} ; \url{https://www.jfds.org/article.asp?issn=0975-1475;year=2019;volume=11;issue=1;spage=42;epage=47;aulast=Roy}", url = {https://lens.org/019-268-703-108-809} } @article{lens.org/019-302-334-316-560, author = {David Billard}, title = {Tainted digital evidence and privacy protection in blockchain-based systems}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {300911--}, doi = {10.1016/j.fsidi.2020.300911}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2666281720300068} ; \url{https://arodes.hes-so.ch/record/5505/files/Published%20version.pdf} ; \url{https://arodes.hes-so.ch/record/5505} ; \url{https://hesso.tind.io/record/5505/files/Published%20version.pdf} ; \url{https://hesso.tind.io/record/5505}", url = {https://lens.org/019-302-334-316-560} } @article{lens.org/019-309-662-208-894, author = {Pooja Kadam and Amrit Chhetri}, title = {Top Internet Forensic Tools: An Evaluation}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.11}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.11}", url = {https://lens.org/019-309-662-208-894} } @article{lens.org/019-343-578-992-507, author = {Erhan Akbal and Turker Tuncer and Sengul Dogan}, title = {Vehicle Interior Sound Classification Based on Local Quintet Magnitude Pattern and Iterative Neighborhood Component Analysis}, journal = {Applied Artificial Intelligence}, year = {2022}, volume = {36}, number = {1}, month = {October}, doi = {10.1080/08839514.2022.2137653}, date = {2022-10-20}, url = {https://lens.org/019-343-578-992-507} } @article{lens.org/019-500-518-223-980, author = {Danish K. Chaus and Akshay J. Boramani Aayush Pathak}, title = {A Virtual Environment Forensic Tool}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {1}, pages = {63--71}, doi = {10.17781/p002333}, note = "\url{http://sdiwc.net/digital-library/a-virtual-environment-forensic-tool}", url = {https://lens.org/019-500-518-223-980} } @article{lens.org/019-508-480-187-000, author = {Eoghan Casey and Anna Zehnder}, title = {Inter-regional digital forensic knowledge management: needs, challenges, and solutions}, journal = {Journal of forensic sciences}, year = {2020}, volume = {66}, number = {2}, pages = {619--629}, month = {November}, doi = {10.1111/1556-4029.14613}, date = {2020-11-06}, note = "\url{https://pubmed.ncbi.nlm.nih.gov/33156519/} ; \url{https://onlinelibrary.wiley.com/doi/10.1111/1556-4029.14613} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/33156519}", url = {https://lens.org/019-508-480-187-000} } @article{lens.org/020-140-834-798-099, author = {Gurinder Singh and Kulbir Singh}, title = {Improved JPEG anti-forensics with better image visual quality and forensic undetectability.}, journal = {Forensic science international}, year = {2017}, volume = {277}, pages = {133--147}, month = {June}, doi = {10.1016/j.forsciint.2017.06.003}, date = {2017-06-10}, note = "\url{https://www.ncbi.nlm.nih.gov/pubmed/28648761} ; \url{https://pubmed.ncbi.nlm.nih.gov/28648761/} ; \url{https://europepmc.org/abstract/MED/28648761} ; \url{https://www.sciencedirect.com/science/article/pii/S0379073817302104}", url = {https://lens.org/020-140-834-798-099} } @article{lens.org/020-149-267-617-001, author = {Rolf J. F. Ypma and P.A. Maaskant van Wijk and Richard D. Gill and Marjan Sjerps and M. van den Berge}, title = {Calculating LRs for presence of body fluids from mRNA assay data in mixtures.}, journal = {Forensic science international. Genetics}, year = {2021}, volume = {52}, pages = {102455--}, month = {January}, doi = {10.1016/j.fsigen.2020.102455}, date = {2021-01-15}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1872497320302271} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/33461104} ; \url{https://pubmed.ncbi.nlm.nih.gov/33461104/}", url = {https://lens.org/020-149-267-617-001} } @article{lens.org/020-402-775-494-34X, author = {Graeme Horsman and Mubarak A. Bidmos and Georgina Sauzier and Martin Bodner}, title = {2020 - A new decade of forensic science}, journal = {Forensic Science International: Reports}, year = {2020}, volume = {2}, pages = {100074--}, doi = {10.1016/j.fsir.2020.100074}, note = "\url{https://research.tees.ac.uk/en/publications/2020-a-new-decade-of-forensic-science}", url = {https://lens.org/020-402-775-494-34X} } @article{lens.org/020-514-357-686-409, author = {Reza Montasari and Richard Hill and Simon Parkinson and Pekka Peltola and Amin Hosseinian-Far and Alireza Daneshkhah}, title = {Digital Forensics : Challenges and Opportunities for Future Studies}, journal = {International Journal of Organizational and Collective Intelligence}, year = {2020}, volume = {10}, number = {2}, pages = {37--53}, month = {April}, doi = {10.4018/ijoci.2020040103}, date = {2020-04-01}, note = "\url{https://www.igi-global.com/article/digital-forensics/250211} ; \url{https://pure.hud.ac.uk/en/publications/digital-forensics-challenges-and-opportunities-for-future-studies} ; \url{http://nectar.northampton.ac.uk/12638/} ; \url{https://dblp.uni-trier.de/db/journals/ijoci/ijoci10.html#MontasariHPPFD20} ; \url{http://nectar.northampton.ac.uk/id/document/28120} ; \url{https://doi.org/10.4018/IJOCI.2020040103} ; \url{https://pure.northampton.ac.uk/en/publications/digital-forensics-challenges-and-opportunities-for-future-studies} ; \url{https://core.ac.uk/download/287595994.pdf}", url = {https://lens.org/020-514-357-686-409} } @article{lens.org/020-577-952-995-503, author = {Zeng Jin-hu}, title = {Research on Methods of Audio Recorder Forensic Identification}, journal = {Chinese Journal of Forensic Sciences}, year = {2014}, note = "\url{https://en.cnki.com.cn/Article_en/CJFDTotal-SFJD201406006.htm}", url = {https://lens.org/020-577-952-995-503} } @article{lens.org/020-618-203-059-599, author = {Septyan Eka Prastya and Subhan Panji Cipta and Bayu Nugraha}, title = {ANALISIS LOG PENERBANGAN PADA UNMANNED AERIAL VEHICLE (UAV) SEBAGAI BARANG BUKTI DIGITAL}, journal = {Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM)}, year = {2020}, volume = {5}, number = {1}, pages = {11--18}, month = {April}, doi = {10.20527/jtiulm.v5i1.42}, date = {2020-04-30}, note = "\url{http://jtiulm.ti.ft.ulm.ac.id/index.php/jtiulm/article/download/42/42} ; \url{http://jtiulm.ti.ft.ulm.ac.id/index.php/JTIULM/article/view/42} ; \url{https://core.ac.uk/download/pdf/325937892.pdf}", url = {https://lens.org/020-618-203-059-599} } @article{lens.org/020-678-358-516-699, author = {Roman Pertsev}, title = {THE USE OF "SMART" TECHNOLOGIES IN FORENSICS}, journal = {Criminalistics and Forensics}, year = {2022}, number = {67}, pages = {104--113}, month = {August}, doi = {10.33994/kndise.2022.67.12}, date = {2022-08-09}, url = {https://lens.org/020-678-358-516-699} } @article{lens.org/020-753-485-976-476, author = {Anant Gangwar}, title = {Acquisition And Analysis of Cryptographic Keys In IoT Devices}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {May}, doi = {10.46293/4n6/2021.03.02.03}, date = {2021-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.02.03}", url = {https://lens.org/020-753-485-976-476} } @article{lens.org/021-032-360-247-284, author = {Pete Fussey and Ajay Sandhu}, title = {Surveillance arbitration in the era of digital policing}, journal = {Theoretical Criminology}, year = {2020}, volume = {26}, number = {1}, pages = {136248062096702--22}, month = {October}, doi = {10.1177/1362480620967020}, date = {2020-10-29}, note = "\url{https://journals.sagepub.com/doi/full/10.1177/1362480620967020} ; \url{http://repository.essex.ac.uk/29070/} ; \url{https://journals.sagepub.com/doi/pdf/10.1177/1362480620967020} ; \url{https://core.ac.uk/download/349055538.pdf}", url = {https://lens.org/021-032-360-247-284} } @article{lens.org/021-141-864-275-820, author = {Umit Karabiyik and Muhammed Abdullah Canbaz and Ahmet Aksoy and Tayfun Tuna and Esra Akbas and Bilal Gonen and Ramazan S. Aygun}, title = {A Survey of Social Network Forensics}, journal = {Journal of Digital Forensics, Security and Law}, year = {2016}, volume = {11}, number = {4}, pages = {8--}, doi = {10.15394/jdfsl.2016.1430}, note = "\url{https://commons.erau.edu/jdfsl/vol11/iss4/8/} ; \url{https://paperity.org/p/84080041/a-survey-of-social-network-forensics} ; \url{https://scholarworks.unr.edu/handle/11714/5846} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1430&context=jdfsl} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#KarabiyikCATAGA16}", url = {https://lens.org/021-141-864-275-820} } @article{lens.org/021-239-973-367-797, author = {Amrit Chhetri}, title = {Digital Forensics CTF: An Art Of Forensic Upskilling}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.08}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.08}", url = {https://lens.org/021-239-973-367-797} } @article{lens.org/021-286-019-586-450, author = {Syria McCullough and Stella Abudu and Ebere Onwubuariri and Ibrahim Baggili}, title = {Another brick in the wall: An exploratory analysis of digital forensics programs in the United States}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {37}, pages = {301187--}, doi = {10.1016/j.fsidi.2021.301187}, note = "\url{https://dfrws.org/presentation/another-brick-in-the-wall-an-exploratory-analysis-of-digital-forensics-programs-in-the-united-states/} ; \url{https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1101&context=electricalcomputerengineering-facpubs} ; \url{https://dfrws.org/wp-content/uploads/2021/09/2021-usa-paper-11-another_brick_in_the_wall_an_exploratory_analysis_of_digital_forensics_programs_in_the_united_states.pdf} ; \url{https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/100/} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281721000950}", url = {https://lens.org/021-286-019-586-450} } @article{lens.org/021-561-259-505-377, author = {Madhusmita Mishra}, title = {LDPC Codes and Digital Forensics – A Perspective Approach}, journal = {Iete Journal of Research}, year = {2019}, pages = {1--8}, month = {April}, date = {2019-04-29}, note = "\url{https://www.tandfonline.com/doi/full/10.1080/03772063.2019.1604170}", url = {https://lens.org/021-561-259-505-377} } @article{lens.org/021-688-526-901-955, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {36}, pages = {301145--301145}, doi = {10.1016/s2666-2817(21)00043-3}, url = {https://lens.org/021-688-526-901-955} } @article{lens.org/021-709-633-408-146, author = {Kamran Morovati and Sanjay Kadam}, title = {Detection of Phishing Emails with Email Forensic Analysis and Machine Learning Techniques}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2019}, volume = {8}, number = {2}, pages = {98--107}, doi = {10.17781/p002568}, note = "\url{http://sdiwc.net/digital-library/detection-of-phishing-emails-with-email-forensic-analysis-and-machine-learning-techniques}", url = {https://lens.org/021-709-633-408-146} } @article{lens.org/021-716-716-674-058, author = {Marcus Thompson and Raymond Hansen}, title = {Verification of Recovered Digital Evidence on the Amazon Kindle}, journal = {Journal of Digital Forensics, Security and Law}, year = {2016}, volume = {11}, number = {2}, pages = {175--192}, doi = {10.15394/jdfsl.2016.1386}, note = "\url{https://commons.erau.edu/jdfsl/vol11/iss2/11/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1386&context=jdfsl} ; \url{https://paperity.org/p/83910890/verification-of-recovered-digital-evidence-on-the-amazon-kindle} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#ThompsonH16} ; \url{https://doi.org/10.15394/jdfsl.2016.1386}", url = {https://lens.org/021-716-716-674-058} } @article{lens.org/021-883-413-405-000, author = {Turker Tuncer and Sengul Dogan and Fatih Ertam and Abdulhamit Subasi}, title = {A novel ensemble local graph structure based feature extraction network for EEG signal analysis}, journal = {Biomedical Signal Processing and Control}, year = {2020}, volume = {61}, pages = {102006--}, doi = {10.1016/j.bspc.2020.102006}, note = "\url{https://dblp.uni-trier.de/db/journals/bspc/bspc61.html#TuncerDES20} ; \url{https://www.sciencedirect.com/science/article/pii/S1746809420301622}", url = {https://lens.org/021-883-413-405-000} } @article{lens.org/022-036-544-197-474, author = {Budi Raharjo}, title = {SEKILAS MENGENAI FORENSIK DIGITAL}, journal = {Jurnal Sosioteknologi}, year = {2013}, volume = {12}, number = {29}, pages = {384--387}, doi = {10.5614/sostek.itbj.2013.12.29.3}, note = "\url{https://www.neliti.com/publications/41700/sekilas-mengenai-forensik-digital} ; \url{https://media.neliti.com/media/publications/41700-ID-sekilas-mengenai-forensik-digital.pdf}", url = {https://lens.org/022-036-544-197-474} } @article{lens.org/022-151-972-674-832, author = {A. M. Moiseev}, title = {DIGITALIZATION OF COLLECTIONS IN FORENSIC INVESTIGATION}, journal = {Vektor nauki Tol'attinskogo gosudarstvennogo universiteta. Seria Uridicheskie nauki}, year = {2021}, number = {1}, pages = {31--38}, doi = {10.18323/2220-7457-2021-1-31-38}, note = "\url{https://vektornaukipravo.ru/index.php/legal/article/download/27/23} ; \url{https://vektornaukipravo.ru/index.php/legal/article/view/27} ; \url{https://dx.doi.org/10.18323/2220-7457-2021-1-31-38}", url = {https://lens.org/022-151-972-674-832} } @article{lens.org/022-297-576-546-283, author = {Delia Magherescu}, title = {Enhancing procedure of using new means of technologies in criminal proceedings}, journal = {IUS ET SCIENTIA}, year = {2020}, volume = {6}, number = {1}, pages = {8--21}, doi = {10.12795/iestscientia.2020.i01.02}, note = "\url{https://revistascientificas.us.es/index.php/ies/article/view/13344} ; \url{https://dialnet.unirioja.es/servlet/articulo?codigo=7575063} ; \url{https://core.ac.uk/download/334817883.pdf}", url = {https://lens.org/022-297-576-546-283} } @article{lens.org/022-564-463-934-451, author = {Victor R. Kebande and Hein S. Venter}, title = {On digital forensic readiness in the cloud using a distributed agent-based solution : issues and challenges}, journal = {Australian Journal of Forensic Sciences}, year = {2016}, volume = {50}, number = {2}, pages = {209--238}, month = {June}, doi = {10.1080/00450618.2016.1194473}, date = {2016-06-17}, note = "\url{https://repository.up.ac.za/bitstream/2263/57045/1/Kebande_On_2018.pdf} ; \url{https://repository.up.ac.za/handle/2263/57045} ; \url{https://www.tandfonline.com/doi/full/10.1080/00450618.2016.1194473}", url = {https://lens.org/022-564-463-934-451} } @article{lens.org/022-672-893-643-900, author = {Eric Sowah Badger}, title = {Liabilities of Shared System in Forensic Analysis}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {191--196}, month = {July}, doi = {10.22624/aims/crp-bk3-p31}, date = {2022-07-26}, url = {https://lens.org/022-672-893-643-900} } @article{lens.org/023-290-127-677-354, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {35}, pages = {301098--301098}, doi = {10.1016/s2666-2817(20)30400-5}, url = {https://lens.org/023-290-127-677-354} } @article{lens.org/023-458-080-164-91X, author = {Kyla M. Jorgenson and Joshua Lanter and Andrea L. Wiens}, title = {Benefits of Utilizing Full-Body Lodox Digital Radiography in Forensic Pathology:}, journal = {Academic Forensic Pathology}, year = {2015}, volume = {5}, number = {3}, pages = {492--498}, month = {September}, doi = {10.23907/2015.054}, date = {2015-09-01}, note = "\url{https://journals.sagepub.com/doi/abs/10.23907/2015.054?journalCode=afpa}", url = {https://lens.org/023-458-080-164-91X} } @article{lens.org/023-767-546-806-478, author = {Joe T. Sylve and Andrew Case and Lodovico Marziale and Golden G. Richard}, title = {Acquisition and analysis of volatile memory from android devices}, journal = {Digital Investigation}, year = {2012}, volume = {8}, number = {3}, pages = {175--184}, doi = {10.1016/j.diin.2011.10.003}, note = "\url{https://www.504ensics.com/uploads/publications/android-memory-analysis-DI.pdf} ; \url{https://dblp.uni-trier.de/db/journals/di/di8.html#SylveCMR12} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287611000879} ; \url{http://dx.doi.org/10.1016/j.diin.2011.10.003} ; \url{http://www.dfir.org/research/android-memory-analysis-DI.pdf} ; \url{http://www.cs.uno.edu/~golden/Papers/android-memory-analysis-DI.pdf} ; \url{https://www.academia.edu/1268681/Acquisition_and_analysis_of_volatile_memory_from_android_devices} ; \url{https://dx.doi.org/10.1016/j.diin.2011.10.003} ; \url{http://www.504ensics.com/uploads/publications/android-memory-analysis-DI.pdf} ; \url{https://doi.org/10.1016/j.diin.2011.10.003}", url = {https://lens.org/023-767-546-806-478} } @article{lens.org/023-848-663-068-771, author = {Wasim Ahmad Bhat and Ali Alzahrani and Mohamad Ahtisham Wani}, title = {Can computer forensic tools be trusted in digital investigations}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2020}, volume = {61}, number = {2}, pages = {198--203}, month = {October}, doi = {10.1016/j.scijus.2020.10.002}, date = {2020-10-28}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S1355030620303002} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/33736854} ; \url{https://europepmc.org/article/MED/33736854}", url = {https://lens.org/023-848-663-068-771} } @article{lens.org/023-975-433-275-646, author = {Mamta Khanchandani and Nirali Dave}, title = {Analysis of Cloud Forensics : Review and Impact on Digital Forensics Aspects}, journal = {International Journal of Scientific Research in Science and Technology}, year = {2021}, pages = {639--646}, month = {April}, doi = {10.32628/ijsrst2182118}, date = {2021-04-25}, note = "\url{http://ijsrst.com/IJSRST2182118}", url = {https://lens.org/023-975-433-275-646} } @article{lens.org/023-978-779-072-348, author = {Victor R. Kebande and Nickson M. Karie}, title = {A Framework for Integrating Multimodal Biometrics with Digital Forensics}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2015}, volume = {4}, number = {4}, pages = {498--507}, doi = {10.17781/p001929}, note = "\url{http://sdiwc.net/digital-library/a-framework-for-integrating-multimodal-biometrics-with-digital-forensics.html}", url = {https://lens.org/023-978-779-072-348} } @article{lens.org/024-180-933-485-399, author = {Irwansyah Irwansyah and Helda Yudiastuti}, title = {ANALISIS DIGITAL FORENSIK REKAYASA IMAGE MENGGUNAKAN JPEGSNOOP DAN FORENSICALLY BETA}, journal = {Jurnal Ilmiah Matrik}, year = {2019}, volume = {21}, number = {1}, pages = {54--63}, month = {July}, doi = {10.33557/jurnalmatrik.v21i1.518}, date = {2019-07-27}, note = "\url{https://www.mendeley.com/catalogue/6ebc80ac-e667-3e70-95e6-8200914f7767/} ; \url{http://journal.binadarma.ac.id/index.php/jurnalmatrik/article/view/518} ; \url{https://core.ac.uk/download/pdf/230401338.pdf}", url = {https://lens.org/024-180-933-485-399} } @article{lens.org/024-350-847-240-124, author = {Adeyemi Richard Ikuesan and Hein S. Venter}, title = {Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?}, journal = {Digital Investigation}, year = {2019}, volume = {30}, pages = {73--89}, doi = {10.1016/j.diin.2019.07.003}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1742287619300945} ; \url{https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902230545339274} ; \url{https://repository.up.ac.za/handle/2263/73125} ; \url{https://dblp.uni-trier.de/db/journals/di/di30.html#IkuesanV19}", url = {https://lens.org/024-350-847-240-124} } @article{lens.org/024-539-327-776-880, author = {Alastair Irons and Harjinder Singh Lallie}, title = {Digital Forensics to Intelligent Forensics}, journal = {Future Internet}, year = {2014}, volume = {6}, number = {3}, pages = {584--596}, month = {September}, doi = {10.3390/fi6030584}, date = {2014-09-12}, note = "\url{https://www.mdpi.com/1999-5903/6/3/584/pdf} ; \url{https://doaj.org/article/77741ce91be44f9b94623b123f0d552f} ; \url{https://dblp.uni-trier.de/db/journals/fi/fi6.html#IronsL14} ; \url{https://www.mdpi.com/1999-5903/6/3/584} ; \url{http://sure.sunderland.ac.uk/9495/} ; \url{https://doi.org/10.3390/fi6030584} ; \url{https://core.ac.uk/display/25688666} ; \url{https://core.ac.uk/download/157851532.pdf}", url = {https://lens.org/024-539-327-776-880} } @article{lens.org/024-612-427-621-542, author = {Hana Choi and Sion Kim and Sang-Hyeon Lee and Jang-Han Lee}, title = {A Possibility of Pupil Diameter as Reliable Index for Lie Detection}, journal = {International Journal of Psychophysiology}, year = {2016}, volume = {108}, pages = {150--}, doi = {10.1016/j.ijpsycho.2016.07.435}, note = "\url{https://www.sciencedirect.com/science/article/pii/S0167876016305566}", url = {https://lens.org/024-612-427-621-542} } @article{lens.org/024-635-082-343-613, author = {Moh Riskiyadi}, title = {INVESTIGASI FORENSIK TERHADAP BUKTI DIGITAL DALAM MENGUNGKAP CYBERCRIME}, journal = {Cyber Security dan Forensik Digital}, year = {2020}, volume = {3}, number = {2}, pages = {12--21}, month = {December}, doi = {10.14421/csecurity.2020.3.2.2144}, date = {2020-12-11}, note = "\url{http://ejournal.uin-suka.ac.id/saintek/cybersecurity/article/view/2144} ; \url{http://202.0.92.5/saintek/cybersecurity/article/view/2144} ; \url{https://ejournal.uin-suka.ac.id/saintek/cybersecurity/article/download/2144/1800}", url = {https://lens.org/024-635-082-343-613} } @article{lens.org/024-680-893-076-937, author = {Tri Widodo}, title = {Pengembangan Model Digital Forensic Readiness Index (DiFRI) untuk Mencegah Kejahatan Dunia Maya}, journal = {JISKA (Jurnal Informatika Sunan Kalijaga)}, year = {2016}, volume = {1}, number = {1}, pages = {41--46}, month = {May}, doi = {10.14421/jiska.2016.11-06}, date = {2016-05-01}, note = "\url{https://ejournal.uin-suka.ac.id/saintek/JISKA/article/download/1095/1010} ; \url{http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/1095} ; \url{https://core.ac.uk/download/267117360.pdf}", url = {https://lens.org/024-680-893-076-937} } @article{lens.org/024-784-179-276-92X, author = {Abraham Johnson and Gargi Jani and Astha Pandey and Nimesh Patel}, title = {Digital tooth reconstruction: An innovative approach in forensic odontology.}, journal = {The Journal of forensic odonto-stomatology}, year = {2019}, volume = {3}, number = {37}, pages = {12--20}, month = {December}, date = {2019-12-30}, note = "\url{https://www.ncbi.nlm.nih.gov/pubmed/31894133} ; \url{http://ojs.iofos.eu/index.php/Journal/article/view/1148} ; \url{https://pubmed.ncbi.nlm.nih.gov/31894133/} ; \url{https://europepmc.org/article/MED/31894133} ; \url{https://ojs.iofos.eu/index.php/Journal/article/view/1148}", url = {https://lens.org/024-784-179-276-92X} } @article{lens.org/025-153-927-220-338, author = {Joanna Rose Del Mar-Raave and Hayretdin Bahsi and Leo Mršić and Krešimir Hausknecht}, title = {A machine learning-based forensic tool for image classification - A design science approach}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301265--}, doi = {10.1016/j.fsidi.2021.301265}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2666281721001827}", url = {https://lens.org/025-153-927-220-338} } @article{lens.org/025-195-246-113-006, author = {Nam In Park and Kyu-Sun Shim and Ji Woo Lee and Jin-Hwan Kim and Seong Ho Lim and Jun Seok Byun and Yong Jin Kim and Oc-Yeub Jeon}, title = {Advanced forensic procedure for the authentication of audio recordings generated by Voice Memos application of iOS14.}, journal = {Journal of forensic sciences}, year = {2022}, volume = {67}, number = {4}, pages = {1534--1549}, month = {March}, doi = {10.1111/1556-4029.15016}, date = {2022-03-01}, url = {https://lens.org/025-195-246-113-006} } @article{lens.org/025-296-854-506-076, author = {Shrinivas D. Desai and Prashant Narayankar}, title = {Assessment of 'Modern Tool Usage' Attribute–Computer Forensics, a Case Study}, journal = {Journal of Engineering Education Transformations}, year = {2017}, volume = {30}, number = {3}, pages = {39--46}, note = "\url{http://www.i-scholar.in/index.php/JEETRIT/article/view/139962}", url = {https://lens.org/025-296-854-506-076} } @article{lens.org/025-484-846-284-184, author = {Victor R. Kebande and Nickson M. Karie and Hein S. Venter}, title = {Adding Digital Forensic Readiness as a Security Component to the IoT Domain}, journal = {International Journal on Advanced Science, Engineering and Information Technology}, year = {2018}, volume = {8}, number = {1}, pages = {1--11}, month = {February}, doi = {10.18517/ijaseit.8.1.2115}, date = {2018-02-14}, note = "\url{http://dx.doi.org/10.18517/ijaseit.8.1.2115} ; \url{https://repository.up.ac.za/handle/2263/66602} ; \url{http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=2115} ; \url{https://dx.doi.org/10.18517/ijaseit.8.1.2115} ; \url{https://core.ac.uk/download/pdf/296920476.pdf}", url = {https://lens.org/025-484-846-284-184} } @article{lens.org/025-711-739-047-121, author = {Yongjun Ren and Xinyu Liu and Qiang Wu and Ling Wang and Weijian Zhang}, title = {Cryptographic Accumulator and Its Application: A Survey}, journal = {Security and Communication Networks}, year = {2022}, volume = {2022}, pages = {1--13}, month = {March}, doi = {10.1155/2022/5429195}, date = {2022-03-07}, url = {https://lens.org/025-711-739-047-121} } @article{lens.org/025-880-943-392-835, author = {Ate D. Kloosterman and Anna Mapes and Zeno Geradts and Erwin van Eijk and Carola Koper and Jorrit van den Berg and Saskia Verheij and Marcel van der Steen and Arian C. van Asten}, title = {The interface between forensic science and technology: how technology could cause a paradigm shift in the role of forensic institutes in the criminal justice system.}, journal = {Philosophical transactions of the Royal Society of London. Series B, Biological sciences}, year = {2015}, volume = {370}, number = {1674}, pages = {20140264--}, month = {August}, doi = {10.1098/rstb.2014.0264}, date = {2015-08-05}, note = "\url{https://pubmed.ncbi.nlm.nih.gov/26101289/} ; \url{https://core.ac.uk/display/85907193} ; \url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4581008/} ; \url{https://dare.uva.nl/personal/pure/en/publications/the-interface-between-forensic-science-and-technology(6feed386-c7ba-448f-a85f-36cd69d339ff).html} ; \url{https://royalsocietypublishing.org/doi/10.1098/rstb.2014.0264} ; \url{https://www.hbo-kennisbank.nl/details/amsterdam_pure:oai:pure.hva.nl:publications%2F48066502-97bb-41cf-b289-c080b87a73e7} ; \url{https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F6feed386-c7ba-448f-a85f-36cd69d339ff} ; \url{https://pure.uva.nl/ws/files/2563045/173358_502134.pdf} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/26101289} ; \url{https://royalsocietypublishing.org/doi/pdf/10.1098/rstb.2014.0264} ; \url{http://rstb.royalsocietypublishing.org/content/370/1674/20140264} ; \url{https://research.hva.nl/en/publications/the-interface-between-forensic-science-and-technology-how-technol} ; \url{https://europepmc.org/article/MED/26101289}", url = {https://lens.org/025-880-943-392-835} } @article{lens.org/026-126-015-902-734, author = {Mohamad Khairudin Kallil and Ahmad Che Yaacob and Nasrul Hisyam Nor Muhamad and Zulkiflee Haron}, title = {The potential problems of admissibility and relevancy of digital forensics evidence in Syariah Courts}, journal = {International Journal of Psychosocial Rehabilitation}, year = {2020}, volume = {24}, number = {5}, pages = {1027--1032}, month = {March}, doi = {10.37200/ijpr/v24i5/pr201776}, date = {2020-03-31}, note = "\url{http://eprints.utm.my/id/eprint/91694/}", url = {https://lens.org/026-126-015-902-734} } @article{lens.org/026-228-290-740-116, author = {Faisal Sumaila and Hayretdin Bahsi}, title = {Digital forensic analysis of mobile automotive maintenance applications}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {43}, pages = {301440--301440}, doi = {10.1016/j.fsidi.2022.301440}, url = {https://lens.org/026-228-290-740-116} } @article{lens.org/026-285-588-732-099, author = {Sthitaprajna Lenka and Karishma Rathor and Daebashruti Naik and Satchidananda Meher}, title = {Digital Forensic Dentistry}, journal = {Indian Journal of Forensic Medicine \& Toxicology}, year = {2019}, volume = {13}, number = {4}, pages = {1912--1915}, doi = {10.5958/0973-9130.2019.00598.x}, note = "\url{http://www.indianjournals.com/ijor.aspx?target=ijor:ijfmt&volume=13&issue=4&article=347}", url = {https://lens.org/026-285-588-732-099} } @article{lens.org/026-290-088-195-051, author = {Floris Gisolf and Anwar Malgoezar and Teun Baar and Zeno Geradts}, title = {Improving source camera identification using a simplified total variation based noise removal algorithm}, journal = {Digital Investigation}, year = {2013}, volume = {10}, number = {3}, pages = {207--214}, doi = {10.1016/j.diin.2013.08.002}, note = "\url{https://www.researchgate.net/profile/Floris_Gisolf/publication/259164871_Improving_source_camera_identification_using_a_simplified_total_variation_based_noise_removal_algorithm/links/5460fea20cf27487b452684b.pdf} ; \url{https://dare.uva.nl/personal/search?identifier=1be12d32-53f0-46eb-9e99-72c5497a9e6b} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2013.08.002} ; \url{http://dblp.uni-trier.de/db/journals/di/di10.html#GisolfMBG13} ; \url{https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F1be12d32-53f0-46eb-9e99-72c5497a9e6b} ; \url{http://dx.doi.org/10.1016/j.diin.2013.08.002} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287613000777} ; \url{https://dblp.uni-trier.de/db/journals/di/di10.html#GisolfMBG13} ; \url{https://dx.doi.org/10.1016/j.diin.2013.08.002} ; \url{https://core.ac.uk/display/132739752} ; \url{https://doi.org/10.1016/j.diin.2013.08.002}", url = {https://lens.org/026-290-088-195-051} } @article{lens.org/026-411-888-259-98X, author = {John W. Bagby and Joseph J. Schwerha}, title = {International aspects of migrating digital forensics in the cloud}, journal = {Digital Evidence and Electronic Signature Law Review}, year = {2014}, volume = {10}, number = {0}, month = {January}, doi = {10.14296/deeslr.v10i0.2026}, date = {2014-01-31}, note = "\url{https://sas-space.sas.ac.uk/5593/} ; \url{https://journals.sas.ac.uk/deeslr/article/view/2026}", url = {https://lens.org/026-411-888-259-98X} } @article{lens.org/026-431-673-944-953, author = {Raquel Torrão Valentim and Natália Bolfarini Tognoli}, title = {Convergências e divergências entre a Diplomática Digital e a Ciência Forense Digital}, journal = {Brazilian Journal of Information Science: research trends}, year = {2020}, volume = {14}, number = {4}, pages = {3--}, month = {September}, doi = {10.36311/1940-1640.2020.v14n4.10528}, date = {2020-09-25}, note = "\url{https://dialnet.unirioja.es/descarga/articulo/7586088.pdf} ; \url{https://dialnet.unirioja.es/servlet/articulo?codigo=7586088}", url = {https://lens.org/026-431-673-944-953} } @article{lens.org/026-575-338-976-096, author = {Yee Say Keat and Mohammad Ahmadi Babak Bashari Rad}, title = {Cloud Computing Security and Forensics Issues and Awareness of Cloud Storage Users in Malaysia}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2017}, volume = {6}, number = {1}, pages = {1--13}, doi = {10.17781/p002228}, note = "\url{http://sdiwc.net/digital-library/cloud-computing-security-and-forensics-issues-and-awareness-of-cloud-storage-users-in-malaysia}", url = {https://lens.org/026-575-338-976-096} } @article{lens.org/026-766-854-469-439, author = {Ipsita Mohanty and R. Leela Velusamy}, title = {Information Retrieval From Internet Applications For Digital Forensic}, journal = {International Journal of Security, Privacy and Trust Management}, year = {2012}, volume = {1}, number = {3}, pages = {15--30}, month = {August}, doi = {10.5121/ijsptm.2012.1302}, date = {2012-08-31}, note = "\url{https://arxiv.org/pdf/1209.3590} ; \url{https://ui.adsabs.harvard.edu/abs/2012arXiv1209.3590M/abstract} ; \url{https://arxiv.org/abs/1209.3590} ; \url{https://core.ac.uk/display/24765074} ; \url{http://arxiv.org/abs/1209.3590}", url = {https://lens.org/026-766-854-469-439} } @article{lens.org/026-774-296-742-022, author = {Michael Köhn and Mariki M. Eloff and Jan H. P. Eloff}, title = {Integrated digital forensic process model}, journal = {Computers \& Security}, year = {2013}, volume = {38}, pages = {103--115}, doi = {10.1016/j.cose.2013.05.001}, note = "\url{https://repository.up.ac.za/handle/2263/41922} ; \url{https://dl.acm.org/citation.cfm?id=2622894} ; \url{http://dx.doi.org/10.1016/j.cose.2013.05.001} ; \url{https://www.sciencedirect.com/science/article/pii/S0167404813000849} ; \url{https://dblp.uni-trier.de/db/journals/compsec/compsec38.html#KohnEE13} ; \url{https://repository.up.ac.za/bitstream/2263/25433/1/dissertation.pdf} ; \url{https://dl.acm.org/doi/10.1016/j.cose.2013.05.001}", url = {https://lens.org/026-774-296-742-022} } @article{lens.org/026-828-038-317-200, author = {Damian Schofield and Ken Fowle}, title = {Technology Corner Visualising Forensic Data: Evidence (Part 1)}, journal = {Journal of Digital Forensics, Security and Law}, year = {2013}, volume = {8}, number = {1}, pages = {73--90}, doi = {10.15394/jdfsl.2013.1141}, note = "\url{https://doi.org/10.15394/jdfsl.2013.1141} ; \url{https://ro.ecu.edu.au/ecuworks2013/559/} ; \url{https://core.ac.uk/display/41530605} ; \url{https://research-repository.uwa.edu.au/en/publications/technology-corner-visualising-forensic-data-evidence-part-1} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1141&context=jdfsl} ; \url{https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1559&context=ecuworks2013} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#Schofield13} ; \url{https://research-repository.uwa.edu.au/en/publications/technology-corner-visualising-forensic-data-evidence-part-1(c9ce62f2-cf9e-4a9d-a322-5f6f9051d8a6)/export.html} ; \url{https://commons.erau.edu/jdfsl/vol8/iss1/4/} ; \url{https://core.ac.uk/download/41530605.pdf}", url = {https://lens.org/026-828-038-317-200} } @article{lens.org/026-831-743-825-769, author = {Jan Collie and Richard E. Overill}, title = {DEEP: Extending the Digital Forensics Process Model for Criminal Investigations}, journal = {ATHENS JOURNAL OF SCIENCES}, year = {2020}, volume = {7}, number = {4}, pages = {225--240}, month = {August}, doi = {10.30958/ajs.7-4-3}, date = {2020-08-10}, note = "\url{http://oro.open.ac.uk/72738/} ; \url{https://core.ac.uk/download/337616554.pdf}", url = {https://lens.org/026-831-743-825-769} } @article{lens.org/026-836-874-575-053, author = {Mahfudl Nasrulloh and Sunardi Sunardi and Riadi}, title = {Analisis Forensik Solid State Drive (SSD) Menggunakan Framework Rapid Response}, journal = {Jurnal Teknologi Informasi dan Ilmu Komputer}, year = {2019}, volume = {6}, number = {5}, pages = {509--518}, month = {October}, doi = {10.25126/jtiik.2019651516}, date = {2019-10-08}, note = "\url{https://jtiik.ub.ac.id/index.php/jtiik/article/view/1516} ; \url{https://www.mendeley.com/catalogue/025f2922-94c3-3caf-888e-7e4537f49d54/} ; \url{https://jtiik.ub.ac.id/index.php/jtiik/article/download/1516/pdf} ; \url{https://core.ac.uk/download/pdf/290148872.pdf}", url = {https://lens.org/026-836-874-575-053} } @article{lens.org/026-881-708-685-188, author = {Yves Delphin}, title = {IPv6 Issues and Benefits}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2020}, volume = {9}, number = {2}, pages = {113--125}, doi = {10.17781/p002659}, note = "\url{http://sdiwc.net/digital-library/ipv6-issues-and-benefits}", url = {https://lens.org/026-881-708-685-188} } @article{lens.org/026-909-706-129-358, author = {Yogi Pratama}, title = {MAKING OF DIGITAL FORENSIC READINESS INDEX (DiFRI) MODELS TO MALWARE ATTACKS}, journal = {Cyber Security dan Forensik Digital}, year = {2020}, volume = {3}, number = {2}, pages = {1--5}, month = {December}, doi = {10.14421/csecurity.2020.3.2.2005}, date = {2020-12-11}, note = "\url{http://ejournal.uin-suka.ac.id/saintek/cybersecurity/article/view/2005} ; \url{http://ejournal.uin-suka.ac.id/saintek/cybersecurity/article/download/2005/1798}", url = {https://lens.org/026-909-706-129-358} } @article{lens.org/027-093-995-890-019, author = {Suchitra Das}, title = {Industrial IoT(IIOT)- An Exploration}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.15}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.15}", url = {https://lens.org/027-093-995-890-019} } @article{lens.org/027-658-395-615-692, author = {Timothy Vidas and Brian Kaplan and Matthew K. Geiger}, title = {OpenLV: Empowering investigators and first-responders in the digital forensics process}, journal = {Digital Investigation}, year = {2014}, volume = {11}, pages = {S45--S53}, doi = {10.1016/j.diin.2014.03.006}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1742287614000115#!} ; \url{https://doi.org/10.1016/j.diin.2014.03.006} ; \url{https://users.ece.cmu.edu/~tvidas/papers/DFRWSEU14.pdf} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287614000115} ; \url{https://core.ac.uk/display/82096948} ; \url{https://core.ac.uk/download/pdf/82096948.pdf}", url = {https://lens.org/027-658-395-615-692} } @article{lens.org/027-687-618-241-257, author = {Richard C. Leinecker}, title = {A New Method of Image Steganography: StegBlender}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2017}, volume = {6}, number = {4}, pages = {155--161}, doi = {10.17781/p002300}, note = "\url{http://sdiwc.net/digital-library/a-new-method-of-image-steganography-stegblender.html}", url = {https://lens.org/027-687-618-241-257} } @article{lens.org/028-034-242-516-483, author = {Gareth Knight}, title = {The Forensic Curator: Digital Forensics as a Solution to Addressing the Curatorial Challenges Posed by Personal Digital Archives}, journal = {International Journal of Digital Curation}, year = {2012}, volume = {7}, number = {2}, pages = {40--63}, month = {October}, doi = {10.2218/ijdc.v7i2.228}, date = {2012-10-23}, note = "\url{https://doi.org/10.2218/ijdc.v7i2.228} ; \url{https://researchonline.lshtm.ac.uk/id/eprint/2192853/} ; \url{http://doi.org/10.2218/ijdc.v7i2.228} ; \url{https://core.ac.uk/display/42633111} ; \url{http://www.ijdc.net/article/view/218} ; \url{https://paperity.org/p/275612301/the-forensic-curator-digital-forensics-as-a-solution-to-addressing-the-curatorial} ; \url{https://dblp.uni-trier.de/db/journals/ijdc/ijdc7.html#Knight12a} ; \url{https://core.ac.uk/download/42633111.pdf}", url = {https://lens.org/028-034-242-516-483} } @article{lens.org/028-144-125-400-817, author = {Philip Anderson and Dave Sampson and Seanpaul Gilroy}, title = {Digital investigations: relevance and confidence in disclosure}, journal = {ERA Forum}, year = {2021}, pages = {1--13}, month = {September}, date = {2021-09-21}, note = "\url{https://researchportal.northumbria.ac.uk/en/publications/digital-investigations-relevance-and-confidence-in-disclosure} ; \url{https://link.springer.com/content/pdf/10.1007/s12027-021-00687-1.pdf} ; \url{https://link.springer.com/article/10.1007/s12027-021-00687-1} ; \url{https://paperity.org/p/272916707/digital-investigations-relevance-and-confidence-in-disclosure}", url = {https://lens.org/028-144-125-400-817} } @article{lens.org/028-180-038-189-484, author = {K. K. Sindhu and Bandu B. Meshram}, title = {Digital Forensics and Cyber Crime Datamining}, journal = {Journal of Information Security}, year = {2012}, volume = {3}, number = {3}, pages = {196--201}, doi = {10.4236/jis.2012.33024}, note = "\url{http://doi.org/10.4236/jis.2012.33024} ; \url{http://dx.doi.org/10.4236/jis.2012.33024} ; \url{https://doi.org/10.4236/jis.2012.33024} ; \url{https://file.scirp.org/Html/3-7800083_21340.htm} ; \url{https://m.scirp.org/papers/21340} ; \url{https://www.scirp.org/Journal/PaperInformation.aspx?paperID=21340} ; \url{https://file.scirp.org/pdf/JIS20120300002_13729911.pdf} ; \url{https://www.scirp.org/Journal/PaperDownload.aspx?paperID=21340} ; \url{http://www.scirp.org/Journal/PaperInformation.aspx?paperID=21340} ; \url{https://dblp.uni-trier.de/db/journals/jisec/jisec3.html#SindhuM12}", url = {https://lens.org/028-180-038-189-484} } @article{lens.org/028-254-822-298-261, author = {Gareth Davies and Kim Smith}, title = {The Feasibility of Creating a Universal Digital Forensics Framework}, journal = {Forensic, Legal \& Investigative Sciences}, year = {2019}, volume = {5}, number = {1}, pages = {1--9}, month = {August}, doi = {10.24966/flis-733x/100027}, date = {2019-08-05}, note = "\url{http://dx.doi.org/10.24966/flis-733x/100027}", url = {https://lens.org/028-254-822-298-261} } @article{lens.org/028-274-575-795-698, author = {Graeme Horsman and Aney Biju Mammen}, title = {A glance at digital forensic academic research demographics.}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2020}, volume = {60}, number = {5}, pages = {399--402}, month = {June}, doi = {10.1016/j.scijus.2020.06.003}, date = {2020-06-18}, note = "\url{https://research.tees.ac.uk/en/publications/a-glance-at-digital-forensic-academic-research-demographics} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1355030620301623} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/32873378}", url = {https://lens.org/028-274-575-795-698} } @article{lens.org/028-399-721-856-065, author = {Alex Biedermann and Kyriakos N. Kotsoglou}, title = {Digital evidence exceptionalism? A review and discussion of conceptual hurdles in digital evidence transformation.}, journal = {Forensic science international. Synergy}, year = {2020}, volume = {2}, pages = {262--274}, month = {August}, doi = {10.1016/j.fsisyn.2020.08.004}, date = {2020-08-28}, note = "\url{https://www.ncbi.nlm.nih.gov/pubmed/32944711} ; \url{https://serval.unil.ch/resource/serval:BIB_2D70F52A6C50.P001/REF.pdf} ; \url{https://pubmed.ncbi.nlm.nih.gov/32944711/} ; \url{https://serval.unil.ch/en/notice/serval:BIB_2D70F52A6C50} ; \url{https://researchportal.northumbria.ac.uk/en/publications/digital-evidence-exceptionalism-a-review-and-discussion-of-concep} ; \url{https://www.sciencedirect.com/science/article/pii/S2589871X2030053X} ; \url{https://core.ac.uk/download/334593742.pdf}", url = {https://lens.org/028-399-721-856-065} } @article{lens.org/028-659-014-565-320, author = {Fred Cohen}, title = {Science Column: Reconstruction: The Experimental Side of Digital Forensics}, journal = {Journal of Digital Forensics, Security and Law}, year = {2013}, volume = {8}, number = {4}, pages = {49--56}, doi = {10.15394/jdfsl.2013.1155}, note = "\url{https://core.ac.uk/display/92189626} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#Cohen13a} ; \url{https://commons.erau.edu/jdfsl/vol8/iss4/3/} ; \url{https://doaj.org/article/02612ed83f68498ab3c56377b490d9d7} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1155&context=jdfsl} ; \url{https://oaji.net/articles/2014/1095-1408891324.pdf}", url = {https://lens.org/028-659-014-565-320} } @article{lens.org/028-703-682-549-92X, author = {Didik Sudyana and Bambang Sugiantoro and Ahmad Luthfi}, title = {Instrumen Evaluasi Framework Investigasi Forensika Digital Menggunakan SNI 27037:2014}, journal = {JISKA (Jurnal Informatika Sunan Kalijaga)}, year = {2016}, volume = {1}, number = {2}, pages = {75--83}, month = {November}, doi = {10.14421/jiska.2016.12-03}, date = {2016-11-07}, note = "\url{http://ejournal.uin-suka.ac.id/saintek/JISKA/article/download/1116/1017} ; \url{https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/12-03} ; \url{https://core.ac.uk/download/267117320.pdf}", url = {https://lens.org/028-703-682-549-92X} } @article{lens.org/028-874-299-732-939, author = {Yudi Prayudi and Ahmad Ashari and Tri Kuntoro Priyambodo}, title = {A Proposed Digital Forensics Business Model to Support Cybercrime Investigation in Indonesia}, journal = {International Journal of Computer Network and Information Security}, year = {2015}, volume = {7}, number = {11}, pages = {1--8}, month = {October}, doi = {10.5815/ijcnis.2015.11.01}, date = {2015-10-08}, note = "\url{http://www.mecs-press.org/ijcnis/ijcnis-v7-n11/IJCNIS-V7-N11-1.pdf} ; \url{http://www.mecs-press.org/ijcnis/ijcnis-v7-n11/v7n11-1.html}", url = {https://lens.org/028-874-299-732-939} } @article{lens.org/028-880-210-585-719, author = {Ikhsan Zuhriyanto and Anton Yudhana and Riadi}, title = {Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method}, journal = {Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)}, year = {2020}, volume = {4}, number = {5}, pages = {829--836}, month = {October}, doi = {10.29207/resti.v4i5.2152}, date = {2020-10-30}, note = "\url{https://jurnal.iaii.or.id/index.php/RESTI/article/download/2152/310} ; \url{http://jurnal.iaii.or.id/index.php/RESTI/article/view/2152}", url = {https://lens.org/028-880-210-585-719} } @article{lens.org/029-025-254-650-825, author = {Vedanta Kapoor and Sanya Taneja and Kakelli Anil Kumar}, title = {Digital Forensics Tools}, journal = {International Journal of Engineering and Advanced Technology}, year = {2019}, volume = {9}, number = {2}, pages = {3965--3969}, month = {December}, doi = {10.35940/ijeat.b3980.129219}, date = {2019-12-30}, url = {https://lens.org/029-025-254-650-825} } @article{lens.org/029-051-761-190-391, author = {Yuri Gubanov}, title = {Mitigating security Risks Using Belkasoft Evidence Center}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.10}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.10}", url = {https://lens.org/029-051-761-190-391} } @article{lens.org/029-200-392-412-396, author = {Joshua I. James and Yunsik Jake Jang}, title = {Practical and Legal Challenges of Cloud Investigations}, journal = {The Journal of the Institute of Webcasting, Internet and Telecommunication}, year = {2014}, volume = {14}, number = {6}, pages = {33--39}, month = {December}, doi = {10.7236/jiibc.2014.14.6.33}, date = {2014-12-31}, note = "\url{https://arxiv.org/pdf/1502.01133.pdf} ; \url{https://ui.adsabs.harvard.edu/abs/2015arXiv150201133J/abstract} ; \url{https://www.arxiv.org/abs/1502.01133} ; \url{http://arxiv.org/abs/1502.01133}", url = {https://lens.org/029-200-392-412-396} } @article{lens.org/029-268-367-041-280, author = {Joshua I. James and Pavel Gladyshev}, title = {Automated inference of past action instances in digital investigations}, journal = {International Journal of Information Security}, year = {2014}, volume = {14}, number = {3}, pages = {249--261}, month = {July}, doi = {10.1007/s10207-014-0249-6}, date = {2014-07-01}, note = "\url{https://dblp.uni-trier.de/db/journals/ijisec/ijisec14.html#JamesG15} ; \url{https://arxiv.org/abs/1407.5714} ; \url{https://core.ac.uk/display/25044554} ; \url{https://link.springer.com/article/10.1007/s10207-014-0249-6} ; \url{https://rd.springer.com/article/10.1007/s10207-014-0249-6} ; \url{https://dblp.uni-trier.de/db/journals/corr/corr1407.html#JamesG14} ; \url{https://doi.org/10.1007/s10207-014-0249-6} ; \url{https://link.springer.com/article/10.1007/s10207-014-0249-6/fulltext.html} ; \url{http://arxiv.org/abs/1407.5714}", url = {https://lens.org/029-268-367-041-280} } @article{lens.org/029-358-230-855-979, author = {Елена Россинская}, title = {THE DOCTRINE OF FORENSIC ACTIVITIES DIGITALIZATION AND THE PROBLEMS OF FORENSIC DIDACTICS}, journal = {The rule-of-law state: theory and practice}, year = {2020}, volume = {16}, number = {4-1}, pages = {88--101}, month = {April}, doi = {10.33184/pravgos-2020.4.9}, date = {2020-04-01}, note = "\url{https://pravgos.ru/index.php/journal/article/download/103/103}", url = {https://lens.org/029-358-230-855-979} } @article{lens.org/029-686-297-425-327, author = {K. Sitara and Babu M. Mehtre}, title = {Detection of inter-frame forgeries in digital videos.}, journal = {Forensic science international}, year = {2018}, volume = {289}, pages = {186--206}, month = {May}, doi = {10.1016/j.forsciint.2018.04.056}, date = {2018-05-26}, note = "\url{https://europepmc.org/article/MED/29894923} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S0379073818302809} ; \url{http://www.sciencedirect.com/science/article/pii/S0379073818302809} ; \url{https://www.sciencedirect.com/science/article/pii/S0379073818302809#!}", url = {https://lens.org/029-686-297-425-327} } @article{lens.org/029-985-060-352-924, author = {Enos K. Mabuto and Hein S. Venter}, title = {System-Generated Digital Forensic Evidence in Graphic Design Applications}, journal = {Journal of Digital Forensics, Security and Law}, year = {2013}, volume = {8}, number = {3}, pages = {71--86}, doi = {10.15394/jdfsl.2013.1151}, note = "\url{https://core.ac.uk/display/91686147} ; \url{https://commons.erau.edu/jdfsl/vol8/iss3/4/} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#MabutoV13} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1151&context=jdfsl}", url = {https://lens.org/029-985-060-352-924} } @article{lens.org/030-031-636-555-061, author = {Moe Kosaka and Yuka Hatano and Kie Yoshida and Khongorzul Tsogtsaikhan and Isuruni Kuruppuarachchige and Toshihiko Suzuki}, title = {Analysis on unidentified cases in which dental information was collected from 2014 to 2019 in Miyagi Prefecture, Japan.}, journal = {Legal medicine (Tokyo, Japan)}, year = {2022}, volume = {55}, pages = {102015--102015}, month = {January}, doi = {10.1016/j.legalmed.2022.102015}, date = {2022-01-10}, url = {https://lens.org/030-031-636-555-061} } @article{lens.org/030-178-593-043-926, author = {Helen Page and Graeme Horsman and Anna Sarna and Julienne Foster}, title = {A review of quality procedures in the UK forensic sciences: What can the field of digital forensics learn?}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2018}, volume = {59}, number = {1}, pages = {83--92}, month = {September}, doi = {10.1016/j.scijus.2018.09.006}, date = {2018-09-23}, note = "\url{https://research.tees.ac.uk/en/publications/a-review-of-quality-procedures-in-the-uk-forensic-sciences-what-c} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/30654972} ; \url{http://europepmc.org/abstract/MED/30654972} ; \url{https://research.tees.ac.uk/ws/files/6504479/DF_FP_and_DNA_Standards_1_.pdf} ; \url{https://www.sciencedirect.com/science/article/pii/S1355030618302211} ; \url{https://core.ac.uk/download/pdf/196167610.pdf}", url = {https://lens.org/030-178-593-043-926} } @article{lens.org/030-264-284-537-878, author = {Alastair Irons and Jacques Ophoff}, title = {Aspects of Digital Forensics in South Africa}, journal = {Interdisciplinary Journal of Information, Knowledge, and Management}, year = {2016}, volume = {11}, pages = {273--283}, doi = {10.28945/3576}, note = "\url{https://rke.abertay.ac.uk/en/publications/aspects-of-digital-forensics-in-south-africa} ; \url{https://sure.sunderland.ac.uk/id/eprint/6806} ; \url{https://www.informingscience.org/Publications/3576} ; \url{https://core.ac.uk/display/88802163} ; \url{http://www.ijikm.org/Volume11/IJIKMv11p273-283Irons2689.pdf} ; \url{https://core.ac.uk/download/74369166.pdf}", url = {https://lens.org/030-264-284-537-878} } @article{lens.org/030-290-105-311-611, author = {Haris Richard Adrian Taruma Selej}, title = {Investigasi Aplikasi Messager Pada Smartphone Berbasis Android}, journal = {Jurnal Rekayasa Sistem \& Industri (JRSI)}, year = {2016}, volume = {4}, number = {02}, month = {December}, doi = {10.25124/jrsi.v4i02.147}, date = {2016-12-20}, note = "\url{https://jrsi.sie.telkomuniversity.ac.id/index.php/JRSI/article/view/147}", url = {https://lens.org/030-290-105-311-611} } @article{lens.org/030-333-349-393-032, author = {Benjamin Aziz}, title = {Modelling and refinement of forensic data acquisition specifications}, journal = {Digital Investigation}, year = {2014}, volume = {11}, number = {2}, pages = {90--101}, doi = {10.1016/j.diin.2014.04.001}, note = "\url{https://researchportal.port.ac.uk/en/publications/modelling-and-refinement-of-forensic-data-acquisition-specificati} ; \url{https://puredev.port.ac.uk/en/publications/modelling-and-refinement-of-forensic-data-acquisition-specificati} ; \url{https://researchportal.port.ac.uk/portal/files/1151700/elsarticle_template_4_harv.pdf} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287614000346} ; \url{http://www.sciencedirect.com/science/article/pii/S1742287614000346} ; \url{https://core.ac.uk/download/29587147.pdf}", url = {https://lens.org/030-333-349-393-032} } @article{lens.org/030-497-462-266-28X, author = {F. Chevonne Thomas Dancer}, title = {Manual Analysis Phase for (PIFPM): Platform Independent Forensics Process Model for Smartphones}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2017}, volume = {6}, number = {3}, pages = {101--108}, doi = {10.17781/p002274}, note = "\url{https://sdiwc.net/digital-library/manual-analysis-phase-for-pifpm-platform-independent-forensics-process-model-for-smartphones.html}", url = {https://lens.org/030-497-462-266-28X} } @article{lens.org/030-549-796-030-148, author = {Moses Ashawa and Morris Ntonja}, title = {Design and Implementation of Linux based Workflow for Digital Forensics Investigation}, journal = {International Journal of Computer Applications}, year = {2019}, volume = {181}, number = {49}, pages = {40--46}, month = {April}, doi = {10.5120/ijca2019918684}, date = {2019-04-11}, note = "\url{https://dspace.lib.cranfield.ac.uk/handle/1826/14412} ; \url{https://www.ijcaonline.org/archives/volume181/number49/ashawa-2019-ijca-918684.pdf} ; \url{https://www.ijcaonline.org/archives/volume181/number49/30491-2019918684}", url = {https://lens.org/030-549-796-030-148} } @article{lens.org/030-688-016-727-252, author = {Aftab Ahmad and Preeti Misra and Frank Ono and Cody Priest and Jessica Suarez and Alexander Urcioli}, title = {The information privacy domain}, journal = {International Journal of Information Privacy, Security and Integrity}, year = {2016}, volume = {2}, number = {4}, pages = {307--329}, doi = {10.1504/ijipsi.2016.10003023}, note = "\url{https://doi.org/10.1504/IJIPSI.2016.10003023} ; \url{https://www.inderscienceonline.com/doi/abs/10.1504/IJIPSI.2016.082124} ; \url{https://dblp.uni-trier.de/db/journals/ijipsi/ijipsi2.html#AhmadMOPSU16} ; \url{http://www.inderscience.com/link.php?id=82124} ; \url{http://doi.org/10.1504/IJIPSI.2016.10003023}", url = {https://lens.org/030-688-016-727-252} } @article{lens.org/030-700-786-844-876, author = {David A. Dampier}, title = {The usefulness of models in digital forensics}, journal = {Journal of Forensic Research}, year = {2012}, volume = {1}, number = {S1}, doi = {10.4172/2157-7145.s1.001}, note = "\url{https://www.omicsonline.org/proceedings/evolution-in-forensic-dna-analysis-workflows-for-single-source-and-evidence-samples-4359.html} ; \url{https://www.omicsonline.org/2157-7145/2157-7145-S1.001-003.pdf}", url = {https://lens.org/030-700-786-844-876} } @article{lens.org/030-873-326-014-594, author = {Azra Parveen and Zishan H. Khan and Syed Naseem Ahmad}, title = {Classification and evaluation of digital forensic tools}, journal = {TELKOMNIKA (Telecommunication Computing Electronics and Control)}, year = {2020}, volume = {18}, number = {6}, pages = {3096--3106}, month = {December}, doi = {10.12928/telkomnika.v18i6.15295}, date = {2020-12-01}, note = "\url{http://journal.uad.ac.id/index.php/TELKOMNIKA/article/view/15295/9288} ; \url{https://core.ac.uk/download/pdf/349572707.pdf}", url = {https://lens.org/030-873-326-014-594} } @article{lens.org/030-941-913-345-349, author = {Jason Jordaan}, title = {Ensuring the Legality of the Digital Forensics Process in South Africa}, journal = {International Journal of Computer Applications}, year = {2013}, volume = {68}, number = {23}, pages = {36--39}, month = {April}, doi = {10.5120/11722-7432}, date = {2013-04-18}, note = "\url{https://research.ijcaonline.org/volume68/number23/pxc3887432.pdf} ; \url{http://ui.adsabs.harvard.edu/abs/2013IJCA...68w..36J/abstract} ; \url{http://www.lex-informatica.org/Ensuring%20the%20Legality%20of%20the%20Digital%20Forensics%20Process%20in%20South%20Africa.pdf} ; \url{https://www.ijcaonline.org/archives/volume68/number23/11722-7432}", url = {https://lens.org/030-941-913-345-349} } @article{lens.org/031-065-083-951-858, author = {Vijaya S. Waghmare and B. B. Meshram}, title = {Mobile Forensic Process and Associated Key Challenges}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2020}, volume = {9}, number = {1}, pages = {42--54}, doi = {10.17781/p002651}, note = "\url{http://sdiwc.net/digital-library/mobile-forensic-process-and-associated-key-challenges}", url = {https://lens.org/031-065-083-951-858} } @article{lens.org/031-084-814-192-60X, author = {Roy Janssen-Bouwmeester and Christiaan Bremmer and Linda Koomen and Shermayne Siem-Gorré and Marcel de Puit}, title = {Positive control tests for fingermark development reagents.}, journal = {Forensic science international}, year = {2020}, volume = {310}, pages = {110259--110259}, month = {March}, doi = {10.1016/j.forsciint.2020.110259}, date = {2020-03-16}, note = "\url{https://europepmc.org/article/MED/32224429} ; \url{https://pubmed.ncbi.nlm.nih.gov/32224429/} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S0379073820301213} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/32224429} ; \url{https://pubag.nal.usda.gov/catalog/6873781}", url = {https://lens.org/031-084-814-192-60X} } @article{lens.org/031-522-316-310-252, author = {Gary D Cantrell and David A. Dampier and Yoginder S. Dandass and Nan Niu and A. Chris Bogen}, title = {Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model}, journal = {Computer and Information Science}, year = {2012}, volume = {5}, number = {2}, pages = {29--38}, month = {February}, doi = {10.5539/cis.v5n2p29}, date = {2012-02-28}, note = "\url{https://mds.marshall.edu/wdcs_faculty/61/} ; \url{https://works.bepress.com/david-dampier/1/} ; \url{https://www.ccsenet.org/journal/index.php/cis/article/view/13527/10382} ; \url{https://mds.marshall.edu/cgi/viewcontent.cgi?article=1060&context=wdcs_faculty} ; \url{https://www.ccsenet.org/journal/index.php/cis/article/download/13527/10382}", url = {https://lens.org/031-522-316-310-252} } @article{lens.org/031-586-036-745-174, author = {Arafat Al-Dhaqm and Richard Adeyemi Ikuesan and Victor R. Kebande and Shukor Abd Razak and George Grispos and Kim-Kwang Raymond Choo and Bander Ali Saleh Al-rimy and AbdulRahman A. Alsewari}, title = {Digital Forensics Subdomains: The State of the Art and Future Directions}, journal = {IEEE Access}, year = {2021}, volume = {9}, pages = {152476--152502}, doi = {10.1109/access.2021.3124262}, note = "\url{https://experts.nebraska.edu/en/publications/digital-forensics-subdomains-the-state-of-the-art-and-future-dire} ; \url{https://dblp.uni-trier.de/db/journals/access/access9.html#Al-DhaqmIKRGCAA21}", url = {https://lens.org/031-586-036-745-174} } @article{lens.org/031-655-872-268-787, author = {Graeme Horsman}, title = {Triaging digital device content at-scene:- Formalising the decision-making process.}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2021}, volume = {62}, number = {1}, pages = {86--93}, month = {December}, doi = {10.1016/j.scijus.2021.12.001}, date = {2021-12-09}, url = {https://lens.org/031-655-872-268-787} } @article{lens.org/031-800-007-340-922, author = {Anahita Farjamfar and Mohd Taufik Abdullah and Ramlan Mahmod and Nur Izura Udzir}, title = {A Review on Mobile Device's Digital Forensic Process Models}, journal = {Research Journal of Applied Sciences, Engineering and Technology}, year = {2014}, volume = {8}, number = {3}, pages = {358--366}, month = {July}, doi = {10.19026/rjaset.8.981}, date = {2014-07-15}, note = "\url{https://maxwellsci.com/jp/mspabstract.php?jid=RJASET&doi=rjaset.8.981} ; \url{http://psasir.upm.edu.my/id/eprint/36269/} ; \url{https://core.ac.uk/display/153816752} ; \url{https://core.ac.uk/download/153816752.pdf}", url = {https://lens.org/031-800-007-340-922} } @article{lens.org/031-935-242-453-239, author = {Graeme Horsman}, title = {An "order of data acquisition" for digital forensic investigations.}, journal = {Journal of forensic sciences}, year = {2022}, volume = {67}, number = {3}, pages = {1215--1220}, month = {January}, doi = {10.1111/1556-4029.14979}, date = {2022-01-07}, url = {https://lens.org/031-935-242-453-239} } @article{lens.org/031-973-009-227-195, author = {A R Jayakrishnan and V. Vasanthi}, title = {Empirical Survey on Advances of Network Forensics in the Emerging Networks}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {1}, pages = {38--46}, doi = {10.17781/p002320}, note = "\url{http://sdiwc.net/digital-library/empirical-survey-on-advances-of-network-forensics-in-the-emerging-networks}", url = {https://lens.org/031-973-009-227-195} } @article{lens.org/032-020-765-108-099, author = {Bhagyashri R Hanji and Abhishek Srinivas Murthy and Abheetha Pradhan}, title = {Spatial Computing-Entering The Next Dimension Of Computing}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {May}, doi = {10.46293/4n6/2021.03.02.06}, date = {2021-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.02.06}", url = {https://lens.org/032-020-765-108-099} } @article{lens.org/032-173-768-139-787, author = {Santosh Sitaram Varpe}, title = {Forensic science steps to applying on computer to process and analyze digital evidence}, journal = {International Journal of Advance Research and Innovative Ideas in Education}, year = {2016}, volume = {2}, number = {6}, pages = {286--289}, note = "\url{https://ijariie.com/AdminUploadPdf/Forensic_science_steps_to_applying_on_computer_to_process_and_analyze_digital_evidence_ijariie3311.pdf} ; \url{https://ijariie.com/FormDetails.aspx?MenuScriptId=2201}", url = {https://lens.org/032-173-768-139-787} } @article{lens.org/032-373-300-951-303, author = {James Allen-Robertson}, title = {The materiality of digital media: The hard disk drive, phonograph, magnetic tape and optical media in technical close-up}, journal = {New Media \& Society}, year = {2016}, volume = {19}, number = {3}, pages = {455--470}, month = {July}, doi = {10.1177/1461444815606368}, date = {2016-07-10}, note = "\url{http://repository.essex.ac.uk/14709/} ; \url{https://dblp.uni-trier.de/db/journals/nms/nms19.html#Allen-Robertson17} ; \url{https://journals.sagepub.com/doi/abs/10.1177/1461444815606368} ; \url{http://journals.sagepub.com/doi/abs/10.1177/1461444815606368?papetoc=} ; \url{https://core.ac.uk/download/74372881.pdf}", url = {https://lens.org/032-373-300-951-303} } @article{lens.org/032-451-540-235-796, author = {Graeme Horsman and Christopher Laing and Paul Vickers}, title = {A case-based reasoning method for locating evidence during digital forensic device triage}, journal = {Decision Support Systems}, year = {2014}, volume = {61}, number = {61}, pages = {69--78}, doi = {10.1016/j.dss.2014.01.007}, note = "\url{https://research.tees.ac.uk/en/publications/a-case-based-reasoning-method-for-locating-evidence-during-digita} ; \url{https://dblp.uni-trier.de/db/journals/dss/dss61.html#HorsmanLV14} ; \url{https://core.ac.uk/display/19479046} ; \url{http://nrl.northumbria.ac.uk/15186/} ; \url{https://researchportal.northumbria.ac.uk/en/publications/a-case-based-reasoning-method-for-locating-evidence-during-digita} ; \url{http://nrl.northumbria.ac.uk/15186/1/Horsman_et_al_Author_Accepted_Manuscript.pdf} ; \url{https://northumbria-test.eprints-hosting.org/id/document/264093} ; \url{https://www.sciencedirect.com/science/article/pii/S0167923614000086}", url = {https://lens.org/032-451-540-235-796} } @article{lens.org/032-568-430-960-830, author = {Leslie F. Sikos}, title = {AI in digital forensics: Ontology engineering for cybercrime investigations}, journal = {WIREs Forensic Science}, year = {2020}, volume = {3}, number = {3}, doi = {10.1002/wfs2.1394}, note = "\url{https://onlinelibrary.wiley.com/doi/10.1002/wfs2.1394} ; \url{https://wires.onlinelibrary.wiley.com/doi/epdf/10.1002/wfs2.1394} ; \url{https://ro.ecu.edu.au/ecuworkspost2013/9822/}", url = {https://lens.org/032-568-430-960-830} } @article{lens.org/033-006-319-734-503, author = {Nahruddien Akbar. M}, title = {IMPLEMENTASI AKUNTANSI FORENSIK DAN AUDIT INVESTIGASI DALAM MENDETEKSI FRAUD DI LINGKUNGAN DIGITAL}, journal = {Jurnal Co Management}, year = {2020}, volume = {2}, number = {1}, pages = {165--174}, month = {August}, doi = {10.32670/comanagement.v2i1.164}, date = {2020-08-20}, url = {https://lens.org/033-006-319-734-503} } @article{lens.org/033-096-629-217-984, author = {Sean McKeown and Gordon Russell and Petra Leimich}, title = {Fingerprinting JPEGs With Optimised Huffman Tables}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2018}, volume = {13}, number = {2}, pages = {7--}, doi = {10.15394/jdfsl.2018.1451}, note = "\url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1451&context=jdfsl} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl13.html#McKeown0L18} ; \url{https://commons.erau.edu/jdfsl/vol13/iss2/7/} ; \url{https://core.ac.uk/download/161865936.pdf}", url = {https://lens.org/033-096-629-217-984} } @article{lens.org/033-161-651-925-256, author = {Sonali Ekhande and Uttam Patil and Kshama Vishwanath Kulhalli}, title = {Review on effectiveness of deep learning approach in digital forensics}, journal = {International Journal of Electrical and Computer Engineering (IJECE)}, year = {2022}, volume = {12}, number = {5}, pages = {5481--5481}, month = {October}, doi = {10.11591/ijece.v12i5.pp5481-5592}, date = {2022-10-01}, url = {https://lens.org/033-161-651-925-256} } @article{lens.org/033-194-605-427-505, author = {Beijing Chen and Xin Liu and Yuhui Zheng and Guoying Zhao and Yun-Qing Shi}, title = {A Robust GAN-Generated Face Detection Method Based on Dual-Color Spaces and an Improved Xception}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, year = {2022}, volume = {32}, number = {6}, pages = {3527--3538}, doi = {10.1109/tcsvt.2021.3116679}, url = {https://lens.org/033-194-605-427-505} } @article{lens.org/033-394-274-571-989, author = {Nickson M. Karie and Simon M Karume}, title = {Digital Forensic Readiness in Organizations: Issues and Challenges}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2017}, volume = {12}, number = {4}, pages = {43--54}, doi = {10.15394/jdfsl.2017.1436}, note = "\url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1436&context=jdfsl} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#KarieK17} ; \url{https://commons.erau.edu/jdfsl/vol12/iss4/5/}", url = {https://lens.org/033-394-274-571-989} } @article{lens.org/033-449-704-006-134, author = {Priyanka V. Kayarkar and Prashant Ricchariaya}, title = {An Enhanced Approach for Digital Forensics using Innovative GSP Algorithm}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {103}, number = {6}, pages = {18--22}, month = {October}, doi = {10.5120/18078-8308}, date = {2014-10-18}, note = "\url{https://research.ijcaonline.org/volume103/number6/pxc3898308.pdf} ; \url{https://ui.adsabs.harvard.edu/abs/2014IJCA..103f..18K/abstract} ; \url{https://www.ijcaonline.org/archives/volume103/number6/18078-8308}", url = {https://lens.org/033-449-704-006-134} } @article{lens.org/033-545-629-141-925, author = {Tiago Carvalho}, title = {Illumination Inconsistency Sleuthing for Exposing Fauxtography and Uncovering Composition Telltales in Digital Images}, journal = {ELCVIA Electronic Letters on Computer Vision and Image Analysis}, year = {2015}, volume = {14}, number = {3}, pages = {4--5}, month = {December}, doi = {10.5565/rev/elcvia.707}, date = {2015-12-19}, note = "\url{http://www.bibliotecadigital.unicamp.br/document/?code=000932513} ; \url{http://elcvia.cvc.uab.es/article/view/v14-n3-caravalho} ; \url{https://dialnet.unirioja.es/servlet/articulo?codigo=5302829} ; \url{https://ddd.uab.cat/pub/elcvia/elcvia_a2015v14n3/elcvia_a2015v14n3p4.pdf} ; \url{https://core.ac.uk/display/39021688} ; \url{https://ddd.uab.cat/record/144998} ; \url{https://elcvia.cvc.uab.es/article/view/707} ; \url{https://elcvia.cvc.uab.es/article/download/v14-n3-caravalho/pdf_33} ; \url{https://core.ac.uk/download/pdf/39021688.pdf}", url = {https://lens.org/033-545-629-141-925} } @article{lens.org/033-624-790-871-700, author = { Riadi and Sunardi Sunardi and Muhamad Ermansyah Rauli}, title = {Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics}, journal = {Jurnal Teknik Elektro}, year = {2018}, volume = {10}, number = {1}, pages = {18--22}, month = {June}, doi = {10.15294/jte.v10i1.14070}, date = {2018-06-20}, note = "\url{https://journal.unnes.ac.id/nju/index.php/jte/article/view/14070/7872} ; \url{https://journal.unnes.ac.id/nju/index.php/jte/article/download/14070/7872}", url = {https://lens.org/033-624-790-871-700} } @article{lens.org/033-656-031-457-388, author = {Евгений Афанасьев and Александр Арутюнов}, title = {ON THE USE OF DIGITAL PHOTOGRAPHY DURING THE INCIDENT SITE INSPECTION IN MODERN CONDITIONS}, journal = {Bulletin of the Institute of Law of the Bashkir State University}, year = {2020}, volume = {3}, number = {4}, pages = {102--114}, month = {April}, doi = {10.33184/vest-law-bsu-2020.8.16}, date = {2020-04-01}, note = "\url{http://vestlaw-bsu.bashedu.ru/index.php/journal/article/download/76/65}", url = {https://lens.org/033-656-031-457-388} } @article{lens.org/033-729-014-380-088, author = {M. George Christopher and Kumarshankar Raychaudhuri}, title = {A Digital Forensic Approach for Examination and Analysis of Frozen Hard Disk of Virtual Machine}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2019}, volume = {8}, number = {4}, pages = {262--272}, doi = {10.17781/p002625}, note = "\url{http://sdiwc.net/digital-library/a-digital-forensic-approach-for-examination-and-analysis-of-frozen-hard-disk-of-virtual-machine}", url = {https://lens.org/033-729-014-380-088} } @article{lens.org/033-740-867-472-387, author = {Gulshan Shrivastava}, title = {Approaches of network forensic model for investigation}, journal = {International Journal of Forensic Engineering}, year = {2017}, volume = {3}, number = {3}, pages = {195--}, doi = {10.1504/ijfe.2017.082977}, note = "\url{https://www.inderscienceonline.com/doi/abs/10.1504/IJFE.2017.082977}", url = {https://lens.org/033-740-867-472-387} } @article{lens.org/033-782-124-307-044, author = {Doowon Jeong and Sangjin Lee}, title = {Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts}, journal = {Digital Investigation}, year = {2019}, volume = {29}, pages = {21--27}, doi = {10.1016/j.diin.2019.02.004}, note = "\url{https://koreauniv.pure.elsevier.com/en/publications/forensic-signature-for-tracking-storage-devices-analysis-of-uefi-} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287618303293}", url = {https://lens.org/033-782-124-307-044} } @article{lens.org/034-296-835-734-643, title = {Fourteenth Annual DFRWS Conference}, journal = {Digital Investigation}, year = {2014}, volume = {11}, pages = {S1--S2}, doi = {10.1016/j.diin.2014.06.005}, note = "\url{https://core.ac.uk/download/pdf/82091462.pdf}", url = {https://lens.org/034-296-835-734-643} } @article{lens.org/034-572-333-745-447, author = {Min Wook Lee and Jong Seong Yoon and Sang Jin Lee}, title = {Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application}, journal = {KIPS Transactions on Computer and Communication Systems}, year = {2016}, volume = {5}, number = {4}, pages = {95--102}, month = {April}, doi = {10.3745/ktccs.2016.5.4.95}, date = {2016-04-30}, note = "\url{http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBCRIN_2016_v5n4_95} ; \url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002104450} ; \url{http://ktccs.kips.or.kr/journals/ktccs/digital-library/4827}", url = {https://lens.org/034-572-333-745-447} } @article{lens.org/034-651-507-138-790, author = {Priya R. Yadav}, title = {Review Paper on Introduction to Cyber Forensics}, journal = {International Journal for Research in Applied Science and Engineering Technology}, year = {2021}, volume = {9}, number = {8}, pages = {1939--1942}, month = {August}, doi = {10.22214/ijraset.2021.37684}, date = {2021-08-31}, note = "\url{http://dx.doi.org/10.22214/ijraset.2021.37684}", url = {https://lens.org/034-651-507-138-790} } @article{lens.org/034-738-249-460-761, author = {Sei-Youen Oh}, title = {The application of digital forensic investigation for response of cyber-crimes}, journal = {Journal of Digital Convergence}, year = {2015}, volume = {13}, number = {4}, pages = {81--87}, month = {April}, doi = {10.14400/jdc.2015.13.4.81}, date = {2015-04-28}, note = "\url{http://www.koreascience.or.kr:80/article/JAKO201514039404333.pdf} ; \url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001984469} ; \url{http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=DJTJBT_2015_v13n4_81}", url = {https://lens.org/034-738-249-460-761} } @article{lens.org/035-031-257-128-045, author = {Eoghan Casey and Sean Barnum and Ryan Griffith and Jonathan Snyder and Harm van Beek and Alexander J. Nelson}, title = {Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language}, journal = {Digital investigation}, year = {2017}, volume = {22}, pages = {14--45}, doi = {10.1016/j.diin.2017.08.002}, note = "\url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6774392/} ; \url{https://pubmed.ncbi.nlm.nih.gov/31579279/} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2017.08.002} ; \url{https://www.nist.gov/publications/advancing-coordinated-cyber-investigations-and-tool-interoperability-using-community} ; \url{https://europepmc.org/article/MED/31579279} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287617301007} ; \url{https://csrc.nist.gov/publications/detail/journal-article/2017/advancing-coordinated-cyber-investigations} ; \url{https://doi.org/10.1016/j.diin.2017.08.002} ; \url{https://dblp.uni-trier.de/db/journals/di/di22.html#CaseyBGSBN17} ; \url{http://www.sciencedirect.com/science/article/pii/S1742287617301007} ; \url{https://core.ac.uk/download/226978171.pdf}", url = {https://lens.org/035-031-257-128-045} } @article{lens.org/035-078-138-939-96X, author = {Junho Kim and Sangjin Lee and Doowon Jeong}, title = {Digital forensic investigation methodology for Storage Space: Based on the NIST digital forensic process.}, journal = {Journal of forensic sciences}, year = {2022}, volume = {67}, number = {3}, pages = {989--1001}, month = {January}, doi = {10.1111/1556-4029.14992}, date = {2022-01-28}, url = {https://lens.org/035-078-138-939-96X} } @article{lens.org/035-126-027-906-691, author = {Graeme Horsman and Brett Shavers}, title = {Who is the digital forensic expert and what is their expertise?}, journal = {WIREs Forensic Science}, year = {2022}, volume = {4}, number = {5}, month = {January}, doi = {10.1002/wfs2.1453}, date = {2022-01-26}, url = {https://lens.org/035-126-027-906-691} } @article{lens.org/035-274-013-659-639, author = {Tae-Yi Kang and Joong Lee and Byung-Wook Park}, title = {Use of atomic force microscopy in the forensic application of chronological order of toners and stamping inks in questioned documents}, journal = {Forensic science international}, year = {2016}, volume = {261}, number = {261}, pages = {26--32}, month = {February}, doi = {10.1016/j.forsciint.2016.01.033}, date = {2016-02-01}, note = "\url{https://www.infona.pl/resource/bwmeta1.element.elsevier-0ca132fe-7216-3612-ae68-d86378c6da01} ; \url{https://pure.mpg.de/pubman/faces/ViewItemOverviewPage.jsp?itemId=item_2401538} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/26874052} ; \url{https://core.ac.uk/display/84018700} ; \url{https://pubmed.ncbi.nlm.nih.gov/26874052/} ; \url{http://www.sciencedirect.com/science/article/pii/S037907381630007X} ; \url{http://europepmc.org/abstract/MED/26874052} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S037907381630007X}", url = {https://lens.org/035-274-013-659-639} } @article{lens.org/035-299-026-735-777, author = {Traian Fulea-Magarit and Helen Page and Graeme Horsman}, title = {Placing the suspect at a PC: A preliminary study involving fingerprints on keyboards and mice.}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2020}, volume = {61}, number = {1}, pages = {89--96}, month = {July}, doi = {10.1016/j.scijus.2020.07.003}, date = {2020-07-11}, note = "\url{https://www.ncbi.nlm.nih.gov/pubmed/33357831} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1355030620300290}", url = {https://lens.org/035-299-026-735-777} } @article{lens.org/035-403-667-600-781, author = {Marius Preda}, title = {Digital Forensics of Internet of Things Smart Heating System Investigation}, journal = {Journal of Military Technology}, year = {2020}, volume = {3}, number = {1}, pages = {23--28}, month = {June}, doi = {10.32754/jmt.2020.1.04}, date = {2020-06-26}, note = "\url{http://dx.doi.org/10.32754/jmt.2020.1.04}", url = {https://lens.org/035-403-667-600-781} } @article{lens.org/035-410-610-655-824, author = {Akash A Thakar and Kapil Kumar and Baldev Patel}, title = {Next Generation Digital Forensic Investigation Model (NGDFIM) - Enhanced, Time Reducing and Comprehensive Framework}, journal = {Journal of Physics: Conference Series}, year = {2021}, volume = {1767}, number = {1}, pages = {012054--}, month = {February}, doi = {10.1088/1742-6596/1767/1/012054}, date = {2021-02-01}, note = "\url{https://robots.iopscience.iop.org/article/10.1088/1742-6596/1767/1/012054/pdf} ; \url{https://ui.adsabs.harvard.edu/abs/2021JPhCS1767a2054T/abstract} ; \url{https://robots.iopscience.iop.org/article/10.1088/1742-6596/1767/1/012054}", url = {https://lens.org/035-410-610-655-824} } @article{lens.org/035-706-160-923-256, title = {Sixteenth Annual DFRWS Conference}, journal = {Digital Investigation}, year = {2016}, volume = {18}, pages = {S1--S2}, doi = {10.1016/j.diin.2016.06.002}, note = "\url{https://core.ac.uk/download/pdf/82658261.pdf}", url = {https://lens.org/035-706-160-923-256} } @article{lens.org/035-724-816-551-336, author = {بندر فقيها}, title = {Digital Forensics:, Crimes And Challenges In Online Social Networks Forensics}, journal = {مجلة الجامعة العربية الأمريكية للبحوث}, year = {2020}, pages = {15--}, doi = {10.35517/1309-006-001-009}, note = "\url{http://dx.doi.org/10.35517/1309-006-001-009}", url = {https://lens.org/035-724-816-551-336} } @article{lens.org/035-890-043-115-551, author = {Ezer Osei Yeboah-Boateng}, title = {An Assessment of Corporate Security Policy Violations Using Live Forensics Analysis}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2015}, volume = {4}, number = {1}, pages = {262--271}, doi = {10.17781/p001385}, url = {https://lens.org/035-890-043-115-551} } @article{lens.org/036-261-108-424-166, author = {Eoghan Casey}, title = {Maturation of digital forensics}, journal = {Digital Investigation}, year = {2019}, volume = {29}, pages = {1--A2}, doi = {10.1016/j.diin.2019.05.002}, note = "\url{https://api.elsevier.com/content/article/PII:S1742287619302087?httpAccept=text/xml} ; \url{https://doi.org/10.1016/j.diin.2019.05.002} ; \url{http://dblp.uni-trier.de/db/journals/di/di29.html#Casey19a}", url = {https://lens.org/036-261-108-424-166} } @article{lens.org/036-418-827-030-131, author = {Ashish Kumar Kushwaha and Avinash P. Wadhe}, title = {Video Forensic Framework for VideoForgeries}, journal = {International Journal of Innovative Research in Computer and Communication Engineering}, year = {2015}, volume = {3}, number = {4}, pages = {3828--3834}, month = {July}, date = {2015-07-25}, note = "\url{https://www.rroij.com/open-access/video-forensic-framework-for-videoforgeries.php?aid=56697} ; \url{https://www.omicsonline.org/peer-reviewed/video-forensic-framework-for-videoforgeries-56697.html} ; \url{https://www.rroij.com/open-access/video-forensic-framework-for-videoforgeries.pdf}", url = {https://lens.org/036-418-827-030-131} } @article{lens.org/036-504-399-650-860, author = {Fietyata Yudha}, title = {Perancangan Nenggala Disk Duplicator (Ndd) untuk Mendukung Proses Investigasi Forensik Digital}, journal = {Teknoin}, year = {2018}, volume = {24}, number = {1}, pages = {29--40}, month = {March}, doi = {10.20885/teknoin.vol24.iss1.art4}, date = {2018-03-01}, note = "\url{https://www.neliti.com/publications/276235/perancangan-nenggala-disk-duplicator-ndd-untuk-mendukung-proses-investigasi-fore} ; \url{https://jurnal.uii.ac.id/jurnal-teknoin/article/view/11214} ; \url{http://jurnal.uii.ac.id/jurnal-teknoin/article/view/11214} ; \url{https://journal.uii.ac.id/jurnal-teknoin/article/view/11214} ; \url{https://journal.uii.ac.id/jurnal-teknoin/article/download/11214/8554}", url = {https://lens.org/036-504-399-650-860} } @article{lens.org/036-522-909-357-939, author = {Lukic Tatjana}, title = {Digital evidence}, journal = {Zbornik radova Pravnog fakulteta, Novi Sad}, year = {2012}, volume = {46}, number = {2}, pages = {177--192}, doi = {10.5937/zrpfns46-1971}, url = {https://lens.org/036-522-909-357-939} } @article{lens.org/036-549-696-564-159, author = {Bismark Boateng}, title = {Mobile Device's Digital Forensic Process Model}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {267--272}, month = {July}, doi = {10.22624/aims/crp-bk3-p43}, date = {2022-07-26}, url = {https://lens.org/036-549-696-564-159} } @article{lens.org/036-650-222-027-323, author = {Rui YANG and JiWu HUANG and WeiQi LUO}, title = {多媒体取证}, journal = {SCIENTIA SINICA Informationis}, year = {2013}, volume = {43}, number = {12}, pages = {1654--1672}, month = {December}, doi = {10.1360/n112013-00059}, date = {2013-12-01}, url = {https://lens.org/036-650-222-027-323} } @article{lens.org/036-807-324-358-708, author = {D. V. Zav’yalova}, title = {Current Capacities of Digital Forensics for Investigations of Different Types of Crimes}, journal = {Theory and Practice of Forensic Science}, year = {2020}, volume = {15}, number = {3}, pages = {89--97}, month = {October}, doi = {10.30764/1819-2785-2020-3-89-97}, date = {2020-10-23}, note = "\url{https://doaj.org/article/0894a5f713f64c10b965a5de5fda4f26} ; \url{https://www.tipse.ru/jour/article/view/606/531} ; \url{https://www.tipse.ru/jour/article/download/606/531}", url = {https://lens.org/036-807-324-358-708} } @article{lens.org/037-171-889-387-368, author = {Michael Acquah Stuff}, title = {Integration of Cloud in Mobile Forensics}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {125--130}, month = {July}, doi = {10.22624/aims/crp-bk3-p21}, date = {2022-07-24}, url = {https://lens.org/037-171-889-387-368} } @article{lens.org/037-201-519-764-108, author = {Elena Mishkareva}, title = {Analyzing Multiple Video Streams Files Using Belkasoft X}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {May}, doi = {10.46293/4n6/2021.03.02.11}, date = {2021-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.02.11}", url = {https://lens.org/037-201-519-764-108} } @article{lens.org/037-231-006-037-033, author = {Gyu-Sang Cho}, title = {A New Timestamp Digital Forensic Method Using a Modified Superincreasing Sequence}, journal = {International Journal of Digital Crime and Forensics}, year = {2016}, volume = {8}, number = {3}, pages = {11--33}, month = {July}, doi = {10.4018/ijdcf.2016070102}, date = {2016-07-01}, note = "\url{https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf8.html#Cho16} ; \url{https://doi.org/10.4018/IJDCF.2016070102} ; \url{https://www.igi-global.com/article/a-new-timestamp-digital-forensic-method-using-a-modified-superincreasing-sequence/158899}", url = {https://lens.org/037-231-006-037-033} } @article{lens.org/037-231-682-829-255, author = {Yuri Gubanov}, title = {Dealing with Apple's USB Restricted Mode}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.11}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.11}", url = {https://lens.org/037-231-682-829-255} } @article{lens.org/037-516-922-562-182, author = {Surbhi Gupta and Neeraj Mohan}, title = {Color Channel Characteristics (CCC) for Efficient Digital Image Forensics}, journal = {Engineering, Technology \& Applied Science Research}, year = {2018}, volume = {8}, number = {1}, pages = {2555--2561}, month = {February}, doi = {10.48084/etasr.1744}, date = {2018-02-20}, note = "\url{https://etasr.com/index.php/ETASR/article/view/1744}", url = {https://lens.org/037-516-922-562-182} } @article{lens.org/037-847-762-163-743, author = {Umit Karabiyik and Tugba Karabiyik}, title = {A Game Theoretic Approach for Digital Forensic Tool Selection}, journal = {Mathematics}, year = {2020}, volume = {8}, number = {5}, pages = {774--}, month = {May}, doi = {10.3390/math8050774}, date = {2020-05-12}, note = "\url{https://www.mdpi.com/2227-7390/8/5/774/pdf} ; \url{https://www.mdpi.com/2227-7390/8/5/774}", url = {https://lens.org/037-847-762-163-743} } @article{lens.org/038-052-594-652-085, author = {Asanka Sayakkara and Nhien-An Le-Khac and Mark Scanlon}, title = {EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {300907--}, doi = {10.1016/j.fsidi.2020.300907}, note = "\url{https://forensicsandsecurity.com/papers/EMvidence.php} ; \url{https://doi.org/10.1016/j.fsidi.2020.300907} ; \url{https://markscanlon.co/papers/EMvidence.pdf} ; \url{https://markscanlon.co/papers/EMvidence.php} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281720300020}", url = {https://lens.org/038-052-594-652-085} } @article{lens.org/039-305-224-842-577, author = {Yulida Army Nurcahya}, title = {Mitigation of the potential fraud in the era of business digitalization in the covid 19 pandemic: exploration of accountant's role and challenges}, journal = {Fair Value: Jurnal Ilmiah Akuntansi dan Keuangan}, year = {2022}, volume = {4}, number = {11}, pages = {5117--5123}, month = {June}, doi = {10.32670/fairvalue.v4i11.1801}, date = {2022-06-25}, url = {https://lens.org/039-305-224-842-577} } @article{lens.org/039-365-534-871-351, author = {M. Bas Seyyar and Zeno Geradts}, title = {Privacy impact assessment in large-scale digital forensic investigations}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {200906--}, doi = {10.1016/j.fsidi.2020.200906}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2666281720300263} ; \url{https://www.narcis.nl/publication/RecordID/oai%3Apure.rug.nl%3Apublications%2Fbe024331-9605-46fc-a10c-522ee11f3067} ; \url{https://www.rug.nl/research/portal/files/130268174/1_s2.0_S2666281720300263_main.pdf} ; \url{https://dblp.uni-trier.de/db/journals/di/di33.html#SeyyarG20} ; \url{https://pure.rug.nl/ws/files/130268174/1_s2.0_S2666281720300263_main.pdf} ; \url{https://research.rug.nl/en/publications/privacy-impact-assessment-in-large-scale-digital-forensic-investi}", url = {https://lens.org/039-365-534-871-351} } @article{lens.org/039-607-217-533-77X, author = {Gasokpo Adjorlolo Jonathan}, title = {Improving Image Interpretation in Digital Forensics}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {23--28}, month = {July}, doi = {10.22624/aims/crp-bk3-p4}, date = {2022-07-20}, url = {https://lens.org/039-607-217-533-77X} } @article{lens.org/039-886-656-324-835, author = {Arpita Singh and S. K. Singh and Sandeep Kumar Nayak and Nilu Singh}, title = {Cyber-Crime and Digital Forensic: Challenges Resolution}, journal = {Solid State Technology}, year = {2021}, volume = {64}, number = {2}, pages = {166--176}, month = {January}, date = {2021-01-19}, note = "\url{http://solidstatetechnology.us/index.php/JSST/article/view/8653}", url = {https://lens.org/039-886-656-324-835} } @article{lens.org/039-999-270-718-277, author = {Hyunji Chung and Jungheum Park and Sangjin Lee}, title = {Digital forensic approaches for Amazon Alexa ecosystem}, journal = {Digital Investigation}, year = {2017}, volume = {22}, pages = {S15--S25}, doi = {10.1016/j.diin.2017.06.010}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S1742287617301974} ; \url{https://www.mendeley.com/catalogue/f24b68e0-402b-3038-b66d-9abf092ffa6c/} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2017.06.010} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287617301974} ; \url{https://doi.org/10.1016/j.diin.2017.06.010} ; \url{https://koreauniv.pure.elsevier.com/en/publications/digital-forensic-approaches-for-amazon-alexa-ecosystem} ; \url{http://ui.adsabs.harvard.edu/abs/2017arXiv170708696C/abstract} ; \url{https://dblp.uni-trier.de/db/journals/corr/corr1707.html#ChungPL17} ; \url{https://arxiv.org/abs/1707.08696} ; \url{http://arxiv.org/abs/1707.08696}", url = {https://lens.org/039-999-270-718-277} } @article{lens.org/040-012-113-608-784, author = {Anubhav Kumar Vaid and Yogendra P. S. Maravi and Jitendra Singh Verma}, title = {Survey of Forensic and Analysis Tools based on Grouping of Digital Evidence using Metadata Functionality}, journal = {International Journal of Computer Applications}, year = {2016}, volume = {142}, number = {3}, pages = {28--34}, month = {May}, doi = {10.5120/ijca2016909718}, date = {2016-05-17}, note = "\url{https://www.ijcaonline.org/archives/volume142/number3/24878-2016909718} ; \url{https://www.ijcaonline.org/archives/volume142/number3/vaid-2016-ijca-909718.pdf}", url = {https://lens.org/040-012-113-608-784} } @article{lens.org/040-130-649-501-691, author = {Arie Kouwen and Mark Scanlon and Kim-Kwang Raymond Choo and Nhien-An Le-Khac}, title = {Digital forensic investigation of two-way radio communication equipment and services}, journal = {Digital Investigation}, year = {2018}, volume = {26}, number = {1}, pages = {S77--S86}, doi = {10.1016/j.diin.2018.04.007}, note = "\url{https://dblp.uni-trier.de/db/journals/corr/corr1807.html#abs-1807-08264} ; \url{https://www.sciencedirect.com/science/article/pii/S174228761830183X} ; \url{https://markscanlon.co/papers/TwoWayRadioForensics.php} ; \url{https://forensicsandsecurity.com/papers/RadioTraces.pdf} ; \url{https://arxiv.org/abs/1807.08264} ; \url{https://www.mendeley.com/catalogue/digital-forensic-investigation-twoway-radio-communication-equipment-services/} ; \url{https://markscanlon.co/papers/TwoWayRadioForensics.pdf} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S174228761830183X} ; \url{https://forensicsandsecurity.com/papers/TwoWayRadioForensics.pdf} ; \url{https://doi.org/10.1016/j.diin.2018.04.007} ; \url{http://arxiv.org/abs/1807.08264}", url = {https://lens.org/040-130-649-501-691} } @article{lens.org/040-245-551-920-273, author = {Reza Montasari and Richard Hill and Farshad Montaseri and Hamid Jahankhani and Amin Hosseinian-Far}, title = {Internet of things devices: digital forensic process and data reduction}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2020}, volume = {12}, number = {1}, pages = {424--436}, doi = {10.1504/ijesdf.2020.10030308}, note = "\url{https://doi.org/10.1504/IJESDF.2020.110676} ; \url{https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf12.html#MontasariHMJF20} ; \url{https://pure.northampton.ac.uk/en/publications/internet-of-things-devices-digital-forensic-process-and-data-redu} ; \url{https://pure.hud.ac.uk/en/publications/internet-of-things-devices-digital-forensic-process-and-data-redu} ; \url{https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2020.110676} ; \url{https://cronfa.swan.ac.uk/Record/cronfa54936}", url = {https://lens.org/040-245-551-920-273} } @article{lens.org/040-294-130-451-422, author = {M. Adimoolam and A. John and M. Gunashanthi}, title = {Anti-Piracy for movies using Forensic Watermarking}, journal = {International Journal of Computer Applications}, year = {2013}, volume = {63}, number = {4}, pages = {26--32}, month = {February}, doi = {10.5120/10454-5161}, date = {2013-02-15}, note = "\url{https://research.ijcaonline.org/volume63/number4/pxc3885161.pdf} ; \url{https://www.ijcaonline.org/archives/volume63/number4/10454-5161} ; \url{https://ui.adsabs.harvard.edu/abs/2013IJCA...63d..26A/abstract}", url = {https://lens.org/040-294-130-451-422} } @article{lens.org/040-364-376-631-053, author = {Mario Piccinelli and Paolo Gubian}, title = {Detecting Hidden Encrypted Volume Files via Statistical Analysis}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2014}, volume = {3}, number = {1}, pages = {30--37}, doi = {10.17781/p001103}, note = "\url{https://sdiwc.net/digital-library/detecting-hidden-encrypted-volume-files-via-statistical-analysis.html} ; \url{https://oaji.net/articles/2014/541-1394066042.pdf}", url = {https://lens.org/040-364-376-631-053} } @article{lens.org/040-401-854-612-632, author = {Yugal Pathak and Himani Rawat}, title = {Industry 5.0: Modern Era Of Crime And Its Control}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.10}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.10}", url = {https://lens.org/040-401-854-612-632} } @article{lens.org/040-508-720-001-625, author = {Amartya Tagore}, title = {Cloud Computing And Incident Response}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.12}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.12}", url = {https://lens.org/040-508-720-001-625} } @article{lens.org/040-586-986-714-001, author = {May A. Alotaibi and Mohammed A. AlZain and Ben Soh and Mehedi Masud and Jehad Al-Amri}, title = {Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection}, journal = {International Journal of Communication Networks and Information Security (IJCNIS)}, year = {2022}, volume = {11}, number = {3}, month = {April}, doi = {10.17762/ijcnis.v11i3.4407}, date = {2022-04-17}, url = {https://lens.org/040-586-986-714-001} } @article{lens.org/040-821-386-092-947, author = {More Swami Das and A. Govardhan and Vijaya Lakshmi Doddapaneni}, title = {A Model of Cloud Forensic Application With Assurance of Cloud Log}, journal = {International Journal of Digital Crime and Forensics}, year = {2021}, volume = {13}, number = {5}, pages = {114--129}, doi = {10.4018/ijdcf.20210901.oa7}, note = "\url{https://www.igi-global.com/article/a-model-of-cloud-forensic-application-with-assurance-of-cloud-log/283130}", url = {https://lens.org/040-821-386-092-947} } @article{lens.org/041-018-610-330-094, author = {Muhammad Abulaish and Nur Al Hasan Haldar}, title = {Advances in Digital Forensics Frameworks and Tools: A Comparative Insight and Ranking}, journal = {International Journal of Digital Crime and Forensics}, year = {2018}, volume = {10}, number = {2}, pages = {95--119}, doi = {10.4018/ijdcf.2018040106}, note = "\url{https://dl.acm.org/citation.cfm?id=3212825} ; \url{https://doi.org/10.4018/IJDCF.2018040106} ; \url{https://dl.acm.org/doi/10.4018/IJDCF.2018040106} ; \url{https://www.igi-global.com/article/advances-in-digital-forensics-frameworks-and-tools/201538} ; \url{https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf10.html#AbulaishH18}", url = {https://lens.org/041-018-610-330-094} } @article{lens.org/041-061-538-346-924, author = {Ibtesam Al Awadhi and Janet C. Read and Andrew Marrington and Virginia N. L. Franqueira}, title = {Factors influencing digital forensic investigations: Empirical evaluation of 12 years of Dubai police cases}, journal = {Journal of Digital Forensics, Security and Law}, year = {2015}, volume = {10}, number = {4}, pages = {7--16}, doi = {10.15394/jdfsl.2015.1207}, note = "\url{https://zuscholars.zu.ac.ae/works/1642/} ; \url{https://commons.erau.edu/jdfsl/vol10/iss4/1/} ; \url{https://derby.openrepository.com/handle/10545/600540} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1207&context=jdfsl} ; \url{http://derby.openrepository.com/derby/bitstream/10545/600540/1/361-1320-1-PB.pdf} ; \url{https://zuscholars.zu.ac.ae/cgi/viewcontent.cgi?article=2641&context=works} ; \url{https://core.ac.uk/display/46171175} ; \url{https://derby.aws.openrepository.com/handle/10545/600540} ; \url{https://doi.org/10.15394/jdfsl.2015.1207} ; \url{http://clok.uclan.ac.uk/18386/} ; \url{https://core.ac.uk/download/46171175.pdf}", url = {https://lens.org/041-061-538-346-924} } @article{lens.org/041-109-469-858-984, author = {Aaron Sparling}, title = {Twenty first Annual DFRWS Conference}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {37}, pages = {301262--}, doi = {10.1016/j.fsidi.2021.301262}, note = "\url{https://api.elsevier.com/content/article/PII:S2666281721001785?httpAccept=text/xml} ; \url{http://dblp.uni-trier.de/db/journals/di/di37S.html#Sparling21} ; \url{https://doi.org/10.1016/j.fsidi.2021.301262}", url = {https://lens.org/041-109-469-858-984} } @article{lens.org/041-147-445-040-229, author = {Ashu Goyal and Sudhir Shukla and R.K. Sarin}, title = {A comparative study of audio latency feature of Motorola and Samsung mobile phones in forensic identification}, journal = {Indian Journal of Science and Technology}, year = {2021}, volume = {14}, number = {4}, pages = {319--324}, month = {January}, doi = {10.17485/ijst/v14i4.2108}, date = {2021-01-30}, note = "\url{https://indjst.org/articles/a-comparative-study-of-audio-latency-feature-of-motorola-and-samsung-mobile-phones-in-forensic-identification}", url = {https://lens.org/041-147-445-040-229} } @article{lens.org/041-177-651-830-165, author = {A. Arrifin and H. Jazri and Jill Slay and I. Lee}, title = {Digital Forensics Institute in Malaysia: The way forward}, journal = {Digital Evidence and Electronic Signature Law Review}, year = {2014}, volume = {9}, number = {0}, month = {January}, doi = {10.14296/deeslr.v9i0.1989}, date = {2014-01-28}, note = "\url{https://journals.sas.ac.uk/deeslr/article/view/1989} ; \url{https://ir.nust.na/jspui/bitstream/10628/349/1/Slay.%20Digital%20Forensics%20Institute%20in%20Malaysia.pdf} ; \url{https://ir.nust.na/xmlui/handle/10628/349} ; \url{https://sas-space.sas.ac.uk/5407/}", url = {https://lens.org/041-177-651-830-165} } @article{lens.org/041-324-428-460-736, author = {Beatriz Parra and Marcela Vegetti and Horacio Pascual Leone}, title = {Advances in the application of Ontologies in the area of Digital Forensic Electronic Mail}, journal = {IEEE Latin America Transactions}, year = {2019}, volume = {17}, number = {10}, pages = {1694--1705}, doi = {10.1109/tla.2019.8986448}, note = "\url{https://ieeexplore.ieee.org/abstract/document/8986448/} ; \url{https://ri.conicet.gov.ar/handle/11336/108980}", url = {https://lens.org/041-324-428-460-736} } @article{lens.org/041-584-529-699-093, author = {Shinpei Matsuda and Hisato Yoshida and Kiyokadzu Ebata and Ichiroh Shimada and Hitoshi Yoshimura}, title = {Forensic odontology with digital technologies: A systematic review}, journal = {Journal of forensic and legal medicine}, year = {2020}, volume = {74}, pages = {102004--}, month = {July}, doi = {10.1016/j.jflm.2020.102004}, date = {2020-07-01}, note = "\url{https://www.ncbi.nlm.nih.gov/pubmed/32658766} ; \url{https://pubmed.ncbi.nlm.nih.gov/32658766/} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1752928X20301116}", url = {https://lens.org/041-584-529-699-093} } @article{lens.org/041-585-451-530-646, author = {Brianne Morgan and Andrew Ford and Martin J. Smith}, title = {Standard methods for creating digital skeletal models using structure-from-motion photogrammetry.}, journal = {American journal of physical anthropology}, year = {2019}, volume = {169}, number = {1}, pages = {152--160}, month = {February}, doi = {10.1002/ajpa.23803}, date = {2019-02-19}, note = "\url{https://onlinelibrary.wiley.com/doi/full/10.1002/ajpa.23803} ; \url{https://pubmed.ncbi.nlm.nih.gov/30784038/} ; \url{https://europepmc.org/article/MED/30784038} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/30784038} ; \url{https://onlinelibrary.wiley.com/doi/abs/10.1002/ajpa.23803} ; \url{http://eprints.bournemouth.ac.uk/32161/} ; \url{https://core.ac.uk/download/195353782.pdf}", url = {https://lens.org/041-585-451-530-646} } @article{lens.org/041-681-884-186-668, author = {Bhushan Ghode and Akhlesh Kumar and Khevna Maniar and S. K. Jain}, title = {A Forensic Approach on Data Retrieval from IC/eMMC of Damaged Windows Mobile Phone using Easy JTagPlus Box tool and Magnet Forensic Axiom}, journal = {International Journal of Scientific Research in Science and Technology}, year = {2021}, pages = {499--508}, month = {October}, doi = {10.32628/ijsrst218568}, date = {2021-10-16}, note = "\url{https://ijsrst.com/IJSRST218568}", url = {https://lens.org/041-681-884-186-668} } @article{lens.org/042-046-448-317-063, author = {Seyyed Sajjad Kazemi and Sajjad Heidari}, title = {Digital forensics and its role in promoting criminal prosecution}, journal = {Revista Eletrônica em Gestão, Educação e Tecnologia Ambiental}, year = {2021}, volume = {25}, pages = {5--}, month = {March}, doi = {10.5902/2236117063798}, date = {2021-03-22}, note = "\url{https://periodicos.ufsm.br/reget/article/view/63798} ; \url{https://periodicos.ufsm.br/reget/article/download/63798/pdf}", url = {https://lens.org/042-046-448-317-063} } @article{lens.org/042-177-113-700-263, author = {Hriday Raval}, title = {Artificial Intelligence Forensics, Machine Learning Forensics and Digital Forensics}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.05}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.05}", url = {https://lens.org/042-177-113-700-263} } @article{lens.org/042-388-684-756-121, author = {Alexandra Boucherie and Marie Louise Jørkov and Martin J. Smith}, title = {Wounded to the bone: Digital microscopic analysis of traumas in a medieval mass grave assemblage (Sandbjerget, Denmark, AD 1300-1350).}, journal = {International journal of paleopathology}, year = {2017}, volume = {19}, pages = {66--79}, month = {November}, doi = {10.1016/j.ijpp.2017.10.005}, date = {2017-11-02}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1879981716300730} ; \url{https://core.ac.uk/display/132195733} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/29198401} ; \url{http://eprints.bournemouth.ac.uk/30028/} ; \url{https://difusion.ulb.ac.be/vufind/Record/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/261791/Details} ; \url{https://core.ac.uk/download/132195733.pdf}", url = {https://lens.org/042-388-684-756-121} } @article{lens.org/042-746-308-855-318, author = {Julien Longhi}, title = {Using digital humanities and linguistics to help with terrorism investigations.}, journal = {Forensic science international}, year = {2020}, volume = {318}, pages = {110564--110564}, month = {November}, doi = {10.1016/j.forsciint.2020.110564}, date = {2020-11-06}, note = "\url{https://europepmc.org/article/MED/33218794} ; \url{https://pubmed.ncbi.nlm.nih.gov/33218794/} ; \url{https://hal.archives-ouvertes.fr/hal-03083645} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/33218794} ; \url{https://www.sciencedirect.com/science/article/pii/S0379073820304266}", url = {https://lens.org/042-746-308-855-318} } @article{lens.org/042-767-661-429-064, author = {Darren Quick and Kim-Kwang Raymond Choo}, title = {Big forensic data reduction: digital forensic images and electronic evidence}, journal = {Cluster Computing}, year = {2016}, volume = {19}, number = {2}, pages = {723--740}, month = {March}, doi = {10.1007/s10586-016-0553-1}, date = {2016-03-21}, note = "\url{https://dl.acm.org/doi/10.1007/s10586-016-0553-1} ; \url{https://link.springer.com/article/10.1007/s10586-016-0553-1/fulltext.html} ; \url{https://dblp.uni-trier.de/db/journals/cluster/cluster19.html#QuickC16} ; \url{https://link.springer.com/article/10.1007/s10586-016-0553-1}", url = {https://lens.org/042-767-661-429-064} } @article{lens.org/042-776-427-483-657, author = {Wojciech Mazurczyk and Luca Caviglione and Steffen Wendzel}, title = {Recent Advancements in Digital Forensics}, journal = {IEEE Security \& Privacy}, year = {2017}, volume = {15}, number = {6}, pages = {10--11}, doi = {10.1109/msp.2017.4251106}, note = "\url{https://ieeexplore.ieee.org/document/8123495} ; \url{https://dblp.uni-trier.de/db/journals/ieeesp/ieeesp15.html#MazurczykCW17} ; \url{https://www.computer.org/csdl/api/v1/periodical/mags/sp/2017/06/msp2017060010/13rRUx0xPSh/download-article/pdf} ; \url{https://www.computer.org/csdl/magazine/sp/2017/06/msp2017060010/13rRUx0xPSh}", url = {https://lens.org/042-776-427-483-657} } @article{lens.org/043-127-893-811-79X, author = {Firmansyah Gustav Hikmatyar and Bambang Sugiantoro}, title = {Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases}, journal = {IJID (International Journal on Informatics for Development)}, year = {2019}, volume = {7}, number = {2}, pages = {64--67}, month = {January}, doi = {10.14421/ijid.2018.07204}, date = {2019-01-07}, note = "\url{http://ejournal.uin-suka.ac.id/saintek/ijid/article/download/1335/1620} ; \url{http://ejournal.uin-suka.ac.id/saintek/ijid/article/view/1335} ; \url{https://core.ac.uk/download/267117037.pdf}", url = {https://lens.org/043-127-893-811-79X} } @article{lens.org/043-184-565-697-319, author = {Александр Александрович СМИРНОВ}, title = {USE OF CRIMINALLY SIGNIFICANT INFORMATION POSTED ON SOCIAL NETWORKS IN CRIME DETECTION AND INVESTIGATION}, journal = {Расследование преступлений: проблемы и пути их решения}, year = {2022}, number = {4(34)}, pages = {114--118}, month = {April}, doi = {10.54217/2411-1627.2021.34.4.019}, date = {2022-04-14}, url = {https://lens.org/043-184-565-697-319} } @article{lens.org/043-253-906-424-260, author = {Zhang Da-zhi}, title = {A Primary of Study on the General Method of Forensic Digital Image Enhancement And Restoration}, journal = {Chinese Journal of Forensic Sciences}, year = {2012}, note = "\url{https://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201204009.htm}", url = {https://lens.org/043-253-906-424-260} } @article{lens.org/043-261-465-467-889, author = {Park Nam In and JiWoo Lee and Kyu-Sun Shim and Byun Jun Seok and Oc-Yeub Jeon}, title = {A method of forensic authentication of audio recordings generated using the Voice Memos application in the iPhone.}, journal = {Forensic science international}, year = {2021}, volume = {320}, pages = {110702--110702}, month = {January}, doi = {10.1016/j.forsciint.2021.110702}, date = {2021-01-23}, note = "\url{https://pubag.nal.usda.gov/catalog/7259989} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S0379073821000220} ; \url{https://europepmc.org/article/MED/33561789} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/33561789}", url = {https://lens.org/043-261-465-467-889} } @article{lens.org/043-664-411-083-202, author = {Fietyata Yudha and Ahmad Luthfi and Yudi Prayudi}, title = {A Proposed Model for Investigating on Web Whatsapp Application}, journal = {Advanced Science Letters}, year = {2017}, volume = {23}, number = {5}, pages = {4050--4054}, month = {May}, doi = {10.1166/asl.2017.8308}, date = {2017-05-01}, note = "\url{https://www.ingentaconnect.com/content/asp/asl/2017/00000023/00000005/art00051}", url = {https://lens.org/043-664-411-083-202} } @article{lens.org/043-810-977-349-13X, author = {Saurabh Kumar and S.K. Pathak and Jagendra Singh}, title = {A Comprehensive Study of XSS Attack and the Digital Forensic Models to Gather the Evidence}, journal = {ECS Transactions}, year = {2022}, volume = {107}, number = {1}, pages = {7153--7163}, month = {April}, doi = {10.1149/10701.7153ecst}, date = {2022-04-24}, url = {https://lens.org/043-810-977-349-13X} } @article{lens.org/043-827-643-358-90X, author = {Kristin Norell and Klas Brorsson Läthén and Peter Bergström and Allyson Rice and Vaidehi Natu and Alice J. O'Toole}, title = {The effect of image quality and forensic expertise in facial image comparisons.}, journal = {Journal of forensic sciences}, year = {2014}, volume = {60}, number = {2}, pages = {331--340}, month = {December}, doi = {10.1111/1556-4029.12660}, date = {2014-12-23}, note = "\url{http://onlinelibrary.wiley.com/doi/10.1111/1556-4029.12660/full} ; \url{https://www.researchgate.net/profile/Vaidehi_Natu/publication/260249007_The_Effect_of_Image_Quality_and_Forensic_Expertise_in_Facial_Image_Comparisons/links/54ac39ad0cf2479c2ee78da8.pdf} ; \url{https://pubmed.ncbi.nlm.nih.gov/25537273/} ; \url{http://doi.wiley.com/10.1111/1556-4029.12660} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/25537273} ; \url{https://www.infona.pl/resource/bwmeta1.element.wiley-jfo-v-60-i-2-jfo12660} ; \url{https://dialnet.unirioja.es/servlet/articulo?codigo=5233095}", url = {https://lens.org/043-827-643-358-90X} } @article{lens.org/043-865-919-965-282, author = {Amirul Putra Justicia and Riadi}, title = {Analysis of Forensic Video in Storage Data Using Tampering Method}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {3}, pages = {328--335}, doi = {10.17781/p002471}, note = "\url{http://www.sdiwc.net/digital-library/analysis-of-forensic-video-in-storage-data-using-tampering-method.html}", url = {https://lens.org/043-865-919-965-282} } @article{lens.org/044-016-316-658-216, author = {Kingson Chinedu Odogwu and Pavel Gladyshev and Babak Habibnia}, title = {PNG Data Detector for DECA}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {300910--}, doi = {10.1016/j.fsidi.2020.300910}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2666281720300056}", url = {https://lens.org/044-016-316-658-216} } @article{lens.org/044-021-303-931-726, author = {Dedy Saputra and Riadi}, title = {Network Forensics Analysis of Man in the Middle Attack Using Live Forensics Method}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2019}, volume = {8}, number = {1}, pages = {66--73}, doi = {10.17781/p002558}, note = "\url{http://sdiwc.net/digital-library/network-forensics-analysis-of-man-in-the-middle-attack-using-live-forensics-method}", url = {https://lens.org/044-021-303-931-726} } @article{lens.org/044-212-524-673-427, author = {Dhanshri P. Patil}, title = {Forensic Technique for Detecting Image Tampering using Statistical Intrinsic Fingerprints-A Survey}, journal = {International Journal of Scientific Engineering and Technology}, year = {2014}, volume = {3}, number = {7}, pages = {919--920}, note = "\url{https://www.indianjournals.com/ijor.aspx?target=ijor:ijset1&volume=3&issue=7&article=020}", url = {https://lens.org/044-212-524-673-427} } @article{lens.org/044-295-409-596-282, author = {Graeme Horsman}, title = {Decision support for first responders and digital device prioritisation}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301219--}, doi = {10.1016/j.fsidi.2021.301219}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S266628172100127X}", url = {https://lens.org/044-295-409-596-282} } @article{lens.org/044-617-125-816-983, title = {Ethics in forensic science: Renewed commitments and a call for papers across the Forensic Science International family}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {37}, pages = {301207--301207}, doi = {10.1016/j.fsidi.2021.301207}, url = {https://lens.org/044-617-125-816-983} } @article{lens.org/044-896-919-263-756, author = {Shariful Haque and Travis Atkison}, title = {A Forensic Enabled Data Provenance Model for Public Cloud}, journal = {Journal of Digital Forensics, Security and Law}, year = {2018}, volume = {13}, number = {3}, pages = {47--66}, doi = {10.15394/jdfsl.2018.1570}, note = "\url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl13.html#HaqueA18} ; \url{https://commons.erau.edu/jdfsl/vol13/iss3/7/} ; \url{https://paperity.org/p/179699027/a-forensic-enabled-data-provenance-model-for-public-cloud} ; \url{https://doi.org/10.15394/jdfsl.2018.1570}", url = {https://lens.org/044-896-919-263-756} } @article{lens.org/045-098-715-794-977, author = {Jan Collie}, title = {A Strategic Model for Forensic Readiness}, journal = {Athens Journal of Sciences}, year = {2018}, volume = {5}, number = {2}, pages = {167--182}, month = {June}, doi = {10.30958/ajs.5-2-4}, date = {2018-06-01}, note = "\url{http://oro.open.ac.uk/70042/} ; \url{https://core.ac.uk/download/305114201.pdf}", url = {https://lens.org/045-098-715-794-977} } @article{lens.org/045-159-209-851-330, author = {Sanjeev Naira}, title = {CAPABLE ARTIFICIAL INTELLIGENCE:DESIGNING AI FOR HUMAN VALUES AND SOCIETY}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.06}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.06}", url = {https://lens.org/045-159-209-851-330} } @article{lens.org/045-199-576-491-919, author = {Patricio Domingues and Luis Miguel Andrade and Miguel Frade}, title = {Microsoft's Your Phone environment from a digital forensic perspective}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301177--}, doi = {10.1016/j.fsidi.2021.301177}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2666281721000858}", url = {https://lens.org/045-199-576-491-919} } @article{lens.org/045-245-164-124-762, author = {Audrey Samson}, title = {Erasure, an attempt to surpass datafication}, journal = {A Peer-Reviewed Journal About}, year = {2019}, volume = {4}, number = {1}, pages = {44--55}, month = {September}, doi = {10.7146/aprja.v4i1.116104}, date = {2019-09-24}, note = "\url{https://research.gold.ac.uk/id/eprint/27541} ; \url{https://gala.gre.ac.uk/id/eprint/17176/} ; \url{https://core.ac.uk/download/237430438.pdf}", url = {https://lens.org/045-245-164-124-762} } @article{lens.org/045-367-733-413-464, author = {Chen Guang-xua}, title = {Research of Digital Forensics under Cloud Computing Environment}, journal = {Netinfo Security}, year = {2013}, note = "\url{https://en.cnki.com.cn/Article_en/CJFDTOTAL-XXAQ201308028.htm}", url = {https://lens.org/045-367-733-413-464} } @article{lens.org/045-434-062-171-544, author = {Jeferson dos Santos Almeida and Diógenes Antonio Marques José Leonardo de Santana Nascimento}, title = {Computer Forensics: A Linux Case Study Applied to Pedophilia CrimeInvestigation in Brazil}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2019}, volume = {8}, number = {1}, pages = {31--42}, doi = {10.17781/p002543}, note = "\url{http://sdiwc.net/digital-library/computer-forensics-a-linux-case-study-applied-to-pedophilia-crimerninvestigation-in-brazil}", url = {https://lens.org/045-434-062-171-544} } @article{lens.org/045-521-021-813-200, author = {S. Awan and M. M. Rind and Mazhar Ali Dootio and Abdullah Ayub Khan and Aftab Ahmed Shaikh and Asif Ali Laghari}, title = {Digital Forensics and Cyber Forensics Investigation: Security Challenges, Limitations, Open Issues, and Future Direction}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2022}, volume = {1}, number = {1}, pages = {1--}, doi = {10.1504/ijesdf.2022.10037882}, note = "\url{http://www.inderscienceonline.com/doi/full/10.1504/IJESDF.2022.10037882}", url = {https://lens.org/045-521-021-813-200} } @article{lens.org/045-553-653-288-228, author = {Ali Dehghantanha and Ramlan Mahmoud Mohsen Damshenas}, title = {A Survey on Digital Forensics Trends}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2014}, volume = {3}, number = {4}, pages = {209--234}, doi = {10.17781/p001347}, note = "\url{https://sdiwc.us/digitlib/journal_paper.php?paper=00001141.pdf} ; \url{http://sdiwc.us/digitlib/journal_paper.php?paper=00001141.pdf} ; \url{http://sdiwc.net/digital-library/a-survey-on-digital-forensics-trends} ; \url{https://core.ac.uk/download/153811846.pdf}", url = {https://lens.org/045-553-653-288-228} } @article{lens.org/045-625-431-295-190, author = {Vineet Mehan and Renu Dhir and Yadwinder Singh Brar}, title = {A Spatial Domain Approach of Fingerprinting for Colored Digital Images}, journal = {INTERNATIONAL JOURNAL OF COMPUTERS \& TECHNOLOGY}, year = {2013}, volume = {11}, number = {1}, pages = {2156--2160}, month = {October}, doi = {10.24297/ijct.v11i1.1185}, date = {2013-10-25}, note = "\url{https://www.rajpub.com/index.php/ijct/article/download/1185/pdf_231} ; \url{https://core.ac.uk/download/322473297.pdf}", url = {https://lens.org/045-625-431-295-190} } @article{lens.org/045-639-857-637-749, author = {Igor Michailov}, title = {PC3000 Portable III In Digital Forensics}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.03}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.03}", url = {https://lens.org/045-639-857-637-749} } @article{lens.org/045-987-509-678-377, author = {Djalma Fonseca}, title = {Methods to Acquire an Image from “Bricked” Android Device.}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, pages = {40--43}, month = {May}, doi = {10.46293/4n6/2020.02.02.06}, date = {2020-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.02.06}", url = {https://lens.org/045-987-509-678-377} } @article{lens.org/045-998-921-549-343, author = {IJSREM Journal}, title = {A Computer in Digital Forensic: Computer Forensic}, journal = {INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT}, year = {2022}, volume = {6}, number = {6}, month = {June}, doi = {10.55041/ijsrem14213}, date = {2022-06-06}, url = {https://lens.org/045-998-921-549-343} } @article{lens.org/046-034-142-979-678, author = {Ashu Goyal and S.K. Shukla and R.K. Sarin}, title = {Identification of source mobile hand sets using audio latency feature.}, journal = {Forensic science international}, year = {2019}, volume = {298}, pages = {332--335}, month = {February}, doi = {10.1016/j.forsciint.2019.02.031}, date = {2019-02-25}, note = "\url{https://www.ncbi.nlm.nih.gov/pubmed/30927719} ; \url{https://www.sciencedirect.com/science/article/pii/S0379073819300635} ; \url{https://pubag.nal.usda.gov/catalog/6339544}", url = {https://lens.org/046-034-142-979-678} } @article{lens.org/046-339-711-582-310, author = {Primož Cigoj and Borka Jerman Blažič}, title = {An Advanced Educational Tool for Digital Forensic Engineering}, journal = {International Journal of Emerging Technologies in Learning (iJET)}, year = {2016}, volume = {11}, number = {03}, pages = {15--23}, month = {March}, doi = {10.3991/ijet.v11i03.5294}, date = {2016-03-30}, note = "\url{http://dblp.uni-trier.de/db/journals/ijet/ijet11.html#CigojB16} ; \url{https://online-journals.org/index.php/i-jet/article/view/5294} ; \url{https://www.learntechlib.org/p/172227} ; \url{https://dblp.uni-trier.de/db/journals/ijet/ijet11.html#CigojB16} ; \url{http://www.learntechlib.org/p/172227}", url = {https://lens.org/046-339-711-582-310} } @article{lens.org/046-357-391-782-442, author = {Kim-Kwang Raymond Choo and Christian Esposito and Aniello Castiglione}, title = {Evidence and Forensics in the Cloud: Challenges and Future Research Directions}, journal = {IEEE Cloud Computing}, year = {2017}, volume = {4}, number = {3}, pages = {14--19}, doi = {10.1109/mcc.2017.39}, note = "\url{https://ieeexplore.ieee.org/abstract/document/7962121} ; \url{https://doi.org/10.1109/MCC.2017.39} ; \url{https://www.computer.org/csdl/magazine/cd/2017/03/mcd2017030014/13rRUyekIZn} ; \url{http://ieeexplore.ieee.org/document/7962121} ; \url{https://dblp.uni-trier.de/db/journals/cloudcomp/cloudcomp4.html#ChooEC17}", url = {https://lens.org/046-357-391-782-442} } @article{lens.org/046-651-457-949-450, author = {Anwar Khan and Savita Rathore}, title = {Novel Approach for Forensics Investigation in Cloud Computing Environments}, journal = {International Journal of Management, IT, and Engineering}, year = {2016}, volume = {6}, number = {4}, pages = {27--38}, note = "\url{http://www.indianjournals.com/ijor.aspx?target=ijor:ijmie&volume=6&issue=4&article=003}", url = {https://lens.org/046-651-457-949-450} } @article{lens.org/046-729-995-059-874, author = {Graeme Horsman}, title = {Considering 'technically possible' alternative meanings for data traces found during a digital forensic examination}, journal = {Australian Journal of Forensic Sciences}, year = {2022}, pages = {1--10}, month = {May}, doi = {10.1080/00450618.2022.2071988}, date = {2022-05-09}, url = {https://lens.org/046-729-995-059-874} } @article{lens.org/046-814-931-566-523, author = {Santosh Khadsare}, title = {Grouping of Professionals in Cyber Forensics}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.15}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.15}", url = {https://lens.org/046-814-931-566-523} } @article{lens.org/046-857-308-211-173, author = {Christopher Stelly and Vassil Roussev}, title = {Nugget: A digital forensics language}, journal = {Digital Investigation}, year = {2018}, volume = {24}, pages = {S38--S47}, doi = {10.1016/j.diin.2018.01.006}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1742287618300380} ; \url{https://doi.org/10.1016/j.diin.2018.01.006} ; \url{https://dblp.uni-trier.de/db/journals/di/di24.html#StellyR18}", url = {https://lens.org/046-857-308-211-173} } @article{lens.org/046-941-310-744-835, author = {Zeno Geradts}, title = {Crossing Borders: Forensic Science and the Fourth Industrial Revolution.}, journal = {Journal of forensic sciences}, year = {2019}, volume = {65}, number = {1}, pages = {6--7}, month = {November}, doi = {10.1111/1556-4029.14236}, date = {2019-11-19}, note = "\url{https://onlinelibrary.wiley.com/doi/pdf/10.1111/1556-4029.14236} ; \url{https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.14236} ; \url{https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F4a409571-a5c0-4033-a8ea-cfe9fc341b48} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/31743448}", url = {https://lens.org/046-941-310-744-835} } @article{lens.org/047-221-550-114-462, author = {Darren Quick and Kim-Kwang Raymond Choo}, title = {Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data}, journal = {Software: Practice and Experience}, year = {2016}, volume = {47}, number = {8}, pages = {1095--1109}, month = {July}, doi = {10.1002/spe.2429}, date = {2016-07-22}, note = "\url{https://dblp.uni-trier.de/db/journals/spe/spe47.html#QuickC17} ; \url{https://onlinelibrary.wiley.com/doi/10.1002/spe.2429} ; \url{https://dl.acm.org/doi/10.1002/spe.2429} ; \url{https://doi.org/10.1002/spe.2429}", url = {https://lens.org/047-221-550-114-462} } @article{lens.org/047-325-648-776-516, author = {Aymen Akremi and Hassen Sallay and Mohsen Rouached and Rafik Bouaziz}, title = {Applying Digital Forensics to Service Oriented Architecture}, journal = {International Journal of Web Services Research}, year = {2020}, volume = {17}, number = {1}, pages = {17--42}, doi = {10.4018/ijwsr.2020010102}, note = "\url{https://www.igi-global.com/article/applying-digital-forensics-to-service-oriented-architecture/245307} ; \url{https://dblp.uni-trier.de/db/journals/jwsr/jwsr17.html#AkremiSRB20}", url = {https://lens.org/047-325-648-776-516} } @article{lens.org/047-386-524-667-691, author = {Graeme Horsman}, title = {Tool testing and reliability issues in the field of digital forensics}, journal = {Digital Investigation}, year = {2019}, volume = {28}, pages = {163--175}, doi = {10.1016/j.diin.2019.01.009}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1742287618303062} ; \url{https://dblp.uni-trier.de/db/journals/di/di28.html#Horsman19a} ; \url{https://doi.org/10.1016/j.diin.2019.01.009} ; \url{https://research.tees.ac.uk/en/publications/tool-testing-and-reliability-issues-in-the-field-of-digital-foren}", url = {https://lens.org/047-386-524-667-691} } @article{lens.org/047-506-171-504-11X, author = {D’yia Sarah Md Shukri and Hishammuddin Asmuni and Razib M. Othman and Rohayanti Hassan}, title = {An improved multiscale retinex algorithm for motion-blurred iris images to minimize the intra-individual variations}, journal = {Pattern Recognition Letters}, year = {2013}, volume = {34}, number = {9}, pages = {1071--1077}, doi = {10.1016/j.patrec.2013.02.017}, note = "\url{https://www.sciencedirect.com/science/article/pii/S0167865513000755} ; \url{https://dblp.uni-trier.de/db/journals/prl/prl34.html#ShukriAOH13} ; \url{https://ui.adsabs.harvard.edu/abs/2013PaReL..34.1071M/abstract} ; \url{https://doi.org/10.1016/j.patrec.2013.02.017}", url = {https://lens.org/047-506-171-504-11X} } @article{lens.org/047-592-632-721-234, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {300938--300938}, doi = {10.1016/s2666-2817(20)30100-1}, url = {https://lens.org/047-592-632-721-234} } @article{lens.org/047-907-955-930-528, author = {Hriday Raval}, title = {Social Network Forensics For LEA}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {May}, doi = {10.46293/4n6/2021.03.02.07}, date = {2021-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.02.07}", url = {https://lens.org/047-907-955-930-528} } @article{lens.org/047-939-884-728-387, title = {Law and Judicial Application of Digital Forensic Evidence in Nigeria}, journal = {Journal of Law, Policy and Globalization}, year = {2020}, doi = {10.7176/jlpg/96-08}, note = "\url{https://core.ac.uk/download/pdf/327151750.pdf}", url = {https://lens.org/047-939-884-728-387} } @article{lens.org/048-228-308-826-291, author = {Inikpi O Ademu and Chris Imafidon}, title = {The Need for a New Data Processing Interface for Digital Forensic Examination}, journal = {International Journal of Advanced Research in Artificial Intelligence}, year = {2012}, volume = {1}, number = {4}, doi = {10.14569/ijarai.2012.010402}, note = "\url{https://thesai.org/Publications/ViewPaper?Volume=1&Issue=4&Code=IJARAI&SerialNo=2} ; \url{https://thesai.org/Downloads/IJARAI/Volume1No4/Paper_2-The_Need_for_a_New_Data_Processing_Interface_for_Digital_Forensic_Examination.pdf}", url = {https://lens.org/048-228-308-826-291} } @article{lens.org/048-250-488-210-056, author = {Eoghan Casey}, title = {Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science}, journal = {Journal of forensic sciences}, year = {2017}, volume = {63}, number = {5}, pages = {1383--1391}, month = {December}, doi = {10.1111/1556-4029.13722}, date = {2017-12-28}, note = "\url{https://www.ncbi.nlm.nih.gov/pubmed/29284066} ; \url{https://dialnet.unirioja.es/servlet/articulo?codigo=6583741} ; \url{https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.13722} ; \url{http://europepmc.org/abstract/MED/29284066} ; \url{https://core.ac.uk/download/226984361.pdf}", url = {https://lens.org/048-250-488-210-056} } @article{lens.org/048-256-115-288-552, author = {Priya S. Patil and A. S. Kapse}, title = {Survey on Different Phases of DigitalForensics Investigation Models}, journal = {International Journal of Innovative Research in Computer and Communication Engineering}, year = {2015}, volume = {3}, number = {3}, pages = {1529--1534}, month = {March}, doi = {10.15680/ijircce.2015.0303018}, date = {2015-03-30}, note = "\url{https://www.omicsonline.org/peer-reviewed/survey-on-different-phases-of-digitalforensics-investigation-models-53809.html} ; \url{https://www.rroij.com/open-access/survey-on-different-phases-of-digitalforensics-investigation-models.pdf} ; \url{https://www.rroij.com/open-access/survey-on-different-phases-of-digitalforensics-investigation-models.php?aid=53809}", url = {https://lens.org/048-256-115-288-552} } @article{lens.org/048-391-273-328-232, author = {Eoghan Casey}, title = {Editorial - Crisis or opportunity?}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {300961--}, doi = {10.1016/j.fsidi.2020.300961}, note = "\url{https://doi.org/10.1016/j.fsidi.2020.300961} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281720301396}", url = {https://lens.org/048-391-273-328-232} } @article{lens.org/048-915-789-168-246, author = {Olga Nedashkivska}, title = {Expert didactics in the conditions of the third digital revolution}, journal = {Issues of Forensic Science}, year = {2020}, volume = {308}, pages = {65--68}, doi = {10.34836/pk.2020.308.4}, note = "\url{http://dx.doi.org/10.34836/pk.2020.308.4}", url = {https://lens.org/048-915-789-168-246} } @article{lens.org/049-034-573-414-379, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301384--301384}, doi = {10.1016/s2666-2817(22)00065-8}, url = {https://lens.org/049-034-573-414-379} } @article{lens.org/049-040-456-790-093, author = {Rosemond O. Addo-Sampong}, title = {Application Information for Forensic Analysis Considerations for Registered Host / Users / Device Name \& Bearer Tokens}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {167--172}, month = {July}, doi = {10.22624/aims/crp-bk3-p27}, date = {2022-07-15}, url = {https://lens.org/049-040-456-790-093} } @article{lens.org/049-049-045-343-425, author = {Imam Riadi and Herman Herman and Irhash Ainur Rafiq}, title = {Mobile Forensic Investigation of Fake News Cases on Instagram Applications with Digital Forensics Research Workshop Framework}, journal = {International Journal of Artificial Intelligence Research}, year = {2022}, volume = {6}, number = {2}, month = {July}, doi = {10.29099/ijair.v6i2.311}, date = {2022-07-20}, url = {https://lens.org/049-049-045-343-425} } @article{lens.org/049-182-076-079-260, author = {Cinthya Grajeda and Laura Sanchez and Ibrahim Baggili and Devon R. Clark and Frank Breitinger}, title = {Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time}, journal = {Digital Investigation}, year = {2018}, volume = {26}, pages = {S47--S58}, doi = {10.1016/j.diin.2018.04.021}, note = "\url{https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1077&context=electricalcomputerengineering-facpubs} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287618302007} ; \url{https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/76/} ; \url{https://dblp.uni-trier.de/db/journals/di/di26.html#GrajedaSBCB18} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287618302007}", url = {https://lens.org/049-182-076-079-260} } @article{lens.org/049-324-711-593-551, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {36}, pages = {301160--301160}, doi = {10.1016/s2666-2817(21)00065-2}, url = {https://lens.org/049-324-711-593-551} } @article{lens.org/049-415-256-346-121, author = {John B. Minor}, title = {Forensic Cell Site Analysis: A Validation \& Error Mitigation Methodology}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2017}, volume = {12}, number = {2}, pages = {7--}, doi = {10.15394/jdfsl.2017.1474}, note = "\url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#Minor17} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1474&context=jdfsl} ; \url{https://commons.erau.edu/jdfsl/vol12/iss2/7/}", url = {https://lens.org/049-415-256-346-121} } @article{lens.org/049-979-701-385-094, author = {Marnix Kaart and C. Klaver and R.B. van Baar}, title = {Forensic access to Windows Mobile pim.vol and other Embedded Database (EDB) volumes}, journal = {Digital Investigation}, year = {2013}, volume = {9}, number = {3}, pages = {170--192}, doi = {10.1016/j.diin.2012.12.002}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di9.html#KaartKB13} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287612000874}", url = {https://lens.org/049-979-701-385-094} } @article{lens.org/050-015-650-841-609, author = {Graeme Horsman}, title = {Digital forensics: Understanding the development of criminal law in England and Wales on images depicting child sexual abuse}, journal = {Computer Law \& Security Review}, year = {2016}, volume = {32}, number = {3}, pages = {419--432}, doi = {10.1016/j.clsr.2016.02.002}, note = "\url{https://core.ac.uk/display/153535686} ; \url{https://dblp.uni-trier.de/db/journals/clsr/clsr32.html#Horsman16} ; \url{http://www.sciencedirect.com/science/article/pii/S0267364916300309} ; \url{https://sure.sunderland.ac.uk/id/eprint/6232} ; \url{https://www.sciencedirect.com/science/article/pii/S0267364916300309} ; \url{https://doi.org/10.1016/j.clsr.2016.02.002} ; \url{https://research.tees.ac.uk/en/publications/digital-forensics-understanding-the-development-of-criminal-law-i} ; \url{https://core.ac.uk/download/74368782.pdf}", url = {https://lens.org/050-015-650-841-609} } @article{lens.org/050-109-368-175-830, author = {Suneeta Satpathy and Sateesh Kumar Pradhan and B. N. B. Ray}, title = {Application of data fusion methodology for computer forensics dataset analysis to resolve data quality issues in predictive digital evidence}, journal = {The International Journal of Forensic Computer Science}, year = {2012}, pages = {16--23}, month = {May}, doi = {10.5769/j201201002}, date = {2012-05-21}, note = "\url{https://www.ijofcs.org/abstract-v07n1-pp02.html} ; \url{http://www.ijofcs.org/V07N1-PP02-APPLICATION-DATA-FUSION.pdf}", url = {https://lens.org/050-109-368-175-830} } @article{lens.org/050-213-824-812-128, author = {Jelena Maravić}, title = {Digitalna forenzika iOS uređaja}, journal = {Zbornik radova Fakulteta tehničkih nauka u Novom Sadu}, year = {2020}, volume = {36}, number = {01}, pages = {87--90}, month = {December}, doi = {10.24867/11be14maravic}, date = {2020-12-25}, note = "\url{http://www.ftn.uns.ac.rs/ojs/index.php/zbornik/article/download/1222/1242} ; \url{http://www.ftn.uns.ac.rs/ojs/index.php/zbornik/article/view/1222}", url = {https://lens.org/050-213-824-812-128} } @article{lens.org/050-296-813-523-597, author = {Alex Biedermann and Joëlle Vuille}, title = {Digital evidence, 'absence' of data and ambiguous patterns of reasoning}, journal = {Digital Investigation}, year = {2016}, volume = {16}, pages = {S86--S95}, doi = {10.1016/j.diin.2016.01.011}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S1742287616300056} ; \url{https://serval.unil.ch/notice/serval:BIB_71F2C58C8DB2} ; \url{https://www.unil.ch/esc/files/live/sites/esc/files/Fichiers%202016/Biedermann_Vuille_2016.pdf} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287616300056} ; \url{https://serval.unil.ch/resource/serval:BIB_71F2C58C8DB2.P001/REF.pdf} ; \url{https://core.ac.uk/display/77170769} ; \url{https://core.ac.uk/download/77170769.pdf}", url = {https://lens.org/050-296-813-523-597} } @article{lens.org/050-433-166-102-072, author = {Gregory H. Carlton}, title = {A Simple Experiment with Microsoft Office 2010 and Windows 7 Utilizing Digital Forensic Methodology}, journal = {Journal of Digital Forensics, Security and Law}, year = {2013}, volume = {8}, number = {1}, pages = {17--38}, doi = {10.15394/jdfsl.2013.1139}, note = "\url{https://commons.erau.edu/jdfsl/vol8/iss1/2/} ; \url{https://oaji.net/articles/2014/1095-1408889347.pdf} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#Carlton13} ; \url{https://core.ac.uk/display/91847763} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1139&context=jdfsl}", url = {https://lens.org/050-433-166-102-072} } @article{lens.org/050-694-164-774-292, author = {Christopher S. Meffert and Ibrahim Baggili and Frank Breitinger}, title = {Deleting collected digital evidence by exploiting a widely adopted hardware write blocker}, journal = {Digital Investigation}, year = {2016}, volume = {18}, pages = {S87--S96}, doi = {10.1016/j.diin.2016.04.004}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1742287616300354} ; \url{https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/56/} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2016.04.004} ; \url{https://core.ac.uk/display/82539065} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287616300354} ; \url{https://core.ac.uk/download/pdf/82539065.pdf}", url = {https://lens.org/050-694-164-774-292} } @article{lens.org/050-759-663-355-409, author = {Hamid Jahankhani}, title = {Digital Forensic Investigation For The Internet Of Medical Things (IoMT)}, journal = {Journal of Forensic, Legal \& Investigative Sciences}, year = {2019}, volume = {5}, number = {2}, pages = {1--6}, month = {August}, doi = {10.24966/flis-733x/100029}, date = {2019-08-31}, note = "\url{http://dx.doi.org/10.24966/flis-733x/100029}", url = {https://lens.org/050-759-663-355-409} } @article{lens.org/050-770-394-368-814, author = {Prinkle Sharma and James Gillanders}, title = {Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art}, journal = {IEEE Access}, year = {2022}, pages = {1--1}, doi = {10.1109/access.2022.3213843}, url = {https://lens.org/050-770-394-368-814} } @article{lens.org/050-857-984-627-89X, author = {Hwihang An and Sangjin Lee}, title = {The analysis of data structure to digital forensic of dashboard camera}, journal = {Journal of the Korea Institute of Information Security and Cryptology}, year = {2015}, volume = {25}, number = {6}, pages = {1495--1502}, month = {December}, doi = {10.13089/jkiisc.2015.25.6.1495}, date = {2015-12-31}, note = "\url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002070698} ; \url{http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2015_v25n6_1495}", url = {https://lens.org/050-857-984-627-89X} } @article{lens.org/051-785-078-933-787, author = {Joseph Ricci and Ibrahim Baggili and Frank Breitinger}, title = {Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef?}, journal = {IEEE Security \& Privacy}, year = {2019}, volume = {17}, number = {1}, pages = {34--42}, doi = {10.1109/msec.2018.2875877}, note = "\url{https://dblp.uni-trier.de/db/journals/ieeesp/ieeesp17.html#RicciBB19} ; \url{https://www.computer.org/csdl/api/v1/periodical/mags/sp/2019/01/08674173/18GGpVrSQRW/download-article/pdf} ; \url{https://ieeexplore.ieee.org/abstract/document/8674173} ; \url{https://doi.org/10.1109/MSEC.2018.2875877}", url = {https://lens.org/051-785-078-933-787} } @article{lens.org/051-832-649-225-696, author = {Sarunas Grigaliunas and Jevgenijus Toldinas and Algimantas Venčkauskas}, title = {An Ontology-Based Transformation Model for the Digital Forensics Domain}, journal = {Elektronika ir Elektrotechnika}, year = {2017}, volume = {23}, number = {3}, pages = {78--82}, month = {June}, doi = {10.5755/j01.eie.23.3.18337}, date = {2017-06-15}, note = "\url{https://eejournal.ktu.lt/index.php/elt/article/view/18337/8800} ; \url{https://eejournal.ktu.lt/index.php/elt/article/view/18337} ; \url{https://core.ac.uk/display/144875785} ; \url{https://core.ac.uk/download/pdf/144875785.pdf}", url = {https://lens.org/051-832-649-225-696} } @article{lens.org/052-054-657-975-487, author = {Nur Iman and Aris Susanto and Rahmat Inggi}, title = {Analisa Perkembangan Digital Forensik dalam Penyelidikan Cybercrime di Indonesia (Systematic Review)}, journal = {Jurnal Telekomunikasi dan Komputer}, year = {2020}, volume = {9}, number = {3}, pages = {186--192}, month = {January}, doi = {10.22441/incomtech.v9i3.7210}, date = {2020-01-04}, note = "\url{https://www.mendeley.com/catalogue/db3b364e-2779-3df0-ac22-f70dc1853772/} ; \url{http://publikasi.mercubuana.ac.id/index.php/Incomtech/article/view/7210} ; \url{https://publikasi.mercubuana.ac.id/index.php/Incomtech/article/view/7210} ; \url{https://publikasi.mercubuana.ac.id/index.php/Incomtech/article/download/7210/3098} ; \url{https://incomtech.mercubuana.ac.id/id/publications/293930/analisa-perkembangan-digital-forensik-dalam-penyelidikan-cybercrime-di-indonesia}", url = {https://lens.org/052-054-657-975-487} } @article{lens.org/052-114-633-106-705, author = {Elizabeth Schweinsberg}, title = {Fifteenth Annual DFRWS Conference}, journal = {Digital Investigation}, year = {2015}, volume = {14}, pages = {S1--S2}, doi = {10.1016/j.diin.2015.07.001}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di14.html#Schweinsberg15} ; \url{https://doi.org/10.1016/j.diin.2015.07.001} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287615000729} ; \url{https://core.ac.uk/display/82783794} ; \url{https://core.ac.uk/download/pdf/82783794.pdf}", url = {https://lens.org/052-114-633-106-705} } @article{lens.org/052-722-033-105-281, author = {Ashok Kumar Mohan}, title = {Forensically Sound Piecewise Hashing: Integrity checks with DEIC}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, pages = {63--70}, month = {May}, doi = {10.46293/4n6/2020.02.02.14}, date = {2020-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.02.14}", url = {https://lens.org/052-722-033-105-281} } @article{lens.org/053-447-315-738-012, author = {Muhammad Akhtar and Tao Feng}, title = {Using Blockchain to Ensure the Integrity of Digital Forensic Evidence in an IoT Environment}, journal = {EAI Endorsed Transactions on Creative Technologies}, year = {2022}, pages = {174089--174089}, month = {June}, doi = {10.4108/eai.3-6-2022.174089}, date = {2022-06-03}, url = {https://lens.org/053-447-315-738-012} } @article{lens.org/053-514-971-073-351, author = {R.I. Ferguson and Karen Renaud and Sara Wilford and Alastair Irons}, title = {PRECEPT: a framework for ethical digital forensics investigations}, journal = {Journal of Intellectual Capital}, year = {2020}, volume = {21}, number = {2}, pages = {257--290}, month = {March}, doi = {10.1108/jic-05-2019-0097}, date = {2020-03-09}, note = "\url{https://dora.dmu.ac.uk/handle/2086/18943} ; \url{https://pureportal.strath.ac.uk/en/publications/precept-a-framework-for-ethical-digital-forensics-investigations} ; \url{https://rke.abertay.ac.uk/ws/files/23352644/Renaud_PRECEPT_Accepted_2019.pdf} ; \url{https://www.emerald.com/insight/content/doi/10.1108/JIC-05-2019-0097/full/pdf?title=precept-a-framework-for-ethical-digital-forensics-investigations} ; \url{https://dora.dmu.ac.uk/bitstream/2086/18943/1/PRECEPT%20A%20Framework%20for%20Ethical%20Digital%20Forensics%20Investigations.pdf} ; \url{https://rke.abertay.ac.uk/en/publications/precept-a-framework-for-ethical-digital-forensics-investigations} ; \url{https://strathprints.strath.ac.uk/75129/} ; \url{https://www.emerald.com/insight/content/doi/10.1108/JIC-05-2019-0097/full/html} ; \url{https://sure.sunderland.ac.uk/id/eprint/12067/} ; \url{https://core.ac.uk/download/287585744.pdf}", url = {https://lens.org/053-514-971-073-351} } @article{lens.org/054-004-313-233-495, author = {Angus M. Marshall and Richard F. Paige}, title = {Requirements in digital forensics method definition : Observations from a UK study}, journal = {Digital Investigation}, year = {2018}, volume = {27}, pages = {23--29}, doi = {10.1016/j.diin.2018.09.004}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di27.html#MarshallP18} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287618302718} ; \url{https://eprints.whiterose.ac.uk/137032/} ; \url{https://core.ac.uk/download/199218336.pdf}", url = {https://lens.org/054-004-313-233-495} } @article{lens.org/054-331-725-373-265, author = {Antonis Mouhtaropoulos and Chang-Tsun Li and Marthie Grobler}, title = {Digital Forensic Readiness: Are We There Yet?}, journal = {Journal of International Commercial Law and Technology}, year = {2014}, volume = {9}, number = {3}, pages = {173--179}, month = {June}, date = {2014-06-30}, note = "\url{https://researchoutput.csu.edu.au/en/publications/digital-forensic-readiness-are-we-there-yet} ; \url{http://dro.deakin.edu.au/view/DU:30119739} ; \url{https://wrap.warwick.ac.uk/id/eprint/65196}", url = {https://lens.org/054-331-725-373-265} } @article{lens.org/054-464-741-662-365, author = {Ramakrishnan. P.N}, title = {Forensic Footwear Imprint Examination using Adobe Photoshop Digital Imaging Software - A case study}, journal = {International Journal of Criminal and Forensic Science}, year = {2017}, volume = {1}, number = {2}, pages = {28--31}, doi = {10.25141/2576-3563-2017-2.0028}, note = "\url{http://dx.doi.org/10.25141/2576-3563-2017-2.0028}", url = {https://lens.org/054-464-741-662-365} } @article{lens.org/054-471-285-379-894, author = {Bandu B. Meshram and Dinesh N. Patil}, title = {Digital Forensic Analysis of Hard Disk for Evidence Collection}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {2}, pages = {100--110}, doi = {10.17781/p002372}, note = "\url{http://www.sdiwc.net/digital-library/digital-forensic-analysis-of-hard-disk-for-evidence-collection.html}", url = {https://lens.org/054-471-285-379-894} } @article{lens.org/054-677-638-335-39X, author = {Gargi Jani and Abraham Johnson and Utsav Parekh and Tim Thompson and Astha Pandey}, title = {Effective approaches to three-dimensional digital reconstruction of fragmented human skeletal remains using laser surface scanning}, journal = {Forensic science international. Synergy}, year = {2020}, volume = {2}, pages = {215--223}, month = {July}, doi = {10.1016/j.fsisyn.2020.07.002}, date = {2020-07-31}, note = "\url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7417899} ; \url{https://europepmc.org/article/MED/32803150} ; \url{https://www.sciencedirect.com/science/article/pii/S2589871X20300486}", url = {https://lens.org/054-677-638-335-39X} } @article{lens.org/055-086-544-213-027, author = {Ruuhwan Ruuhwan and Riadi and Yudi Prayudi}, title = {Analisis Kelayakan Integrated Digital Forensics Investigation Framework Untuk Investigasi Smartphone}, journal = {Jurnal Buana Informatika}, year = {2016}, volume = {7}, number = {4}, pages = {77775--}, month = {October}, doi = {10.24002/jbi.v7i4.767}, date = {2016-10-25}, note = "\url{https://www.neliti.com/publications/77775/analisis-kelayakan-integrated-digital-forensics-investigation-framework-untuk-in} ; \url{https://core.ac.uk/download/pdf/268157138.pdf}", url = {https://lens.org/055-086-544-213-027} } @article{lens.org/055-166-120-045-285, author = {Robin Verma and Jayaprakash Govindaraj and Saheb Chhabra and Gaurav Gupta}, title = {DF 2.0: An Automated, Privacy Preserving, and Efficient Digital Forensic Framework That Leverages Machine Learning for Evidence Prediction and Privacy Evaluation}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2019}, volume = {14}, number = {2}, pages = {13--44}, doi = {10.15394/jdfsl.2019.1606}, note = "\url{https://commons.erau.edu/jdfsl/vol14/iss2/3/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1606&context=jdfsl} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl14.html#VermaGCG19}", url = {https://lens.org/055-166-120-045-285} } @article{lens.org/055-248-229-344-149, author = {Miguel Vargas Lombardo and José Moreno and Isabel Leguias}, title = {Revisión sobre la forensía digital en dispositivos móvil con sistemas operativos Android}, journal = {I+D Tecnológico}, year = {2018}, volume = {14}, number = {2}, pages = {74--83}, month = {December}, doi = {10.33412/idt.v14.2.2076}, date = {2018-12-14}, note = "\url{http://revistas.utp.ac.pa/index.php/id-tecnologico/article/download/2076/3031} ; \url{https://core.ac.uk/download/pdf/234019593.pdf}", url = {https://lens.org/055-248-229-344-149} } @article{lens.org/055-628-715-083-217, author = {Nilakshi Jain}, title = {COMPARATIVE DIGITAL FORENSIC MODEL}, journal = {International Journal of Innovative Research in Science, Engineering and Technology}, year = {2013}, volume = {2}, number = {8}, pages = {3414--3419}, note = "\url{https://www.rroij.com/open-access/comparative-digital-forensic-model.pdf} ; \url{https://www.omicsonline.org/peer-reviewed/comparative-digital-forensic-model-46459.html} ; \url{https://www.rroij.com/open-access/comparative-digital-forensic-model-.php?aid=46459} ; \url{http://ijirset.com/upload/august/6_COMPARATIVE.pdf} ; \url{https://ijirset.com/upload/august/6_COMPARATIVE.pdf}", url = {https://lens.org/055-628-715-083-217} } @article{lens.org/055-778-828-584-716, author = {Haitao Zhang and Beijing Chen and Jinwei Wang and Guoying Zhao}, title = {A Local Perturbation Generation Method for GAN-generated Face Anti-forensics}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, year = {2022}, pages = {1--1}, doi = {10.1109/tcsvt.2022.3207310}, url = {https://lens.org/055-778-828-584-716} } @article{lens.org/056-254-180-340-08X, author = {Diane Barrett}, title = {Applying a Contingency Framework to Digital Forensic Processes in Cloud Based Acquisitions}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2017}, volume = {12}, number = {2}, pages = {9--}, doi = {10.15394/jdfsl.2017.1473}, note = "\url{https://doi.org/10.15394/jdfsl.2017.1473} ; \url{https://commons.erau.edu/jdfsl/vol12/iss2/9/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1473&context=jdfsl} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#Barrett17}", url = {https://lens.org/056-254-180-340-08X} } @article{lens.org/056-406-725-646-266, author = {Muh Fadli Hasa and Anton Yudhana and Abdul Fadlil}, title = {Analisis Bukti Digital pada Storage Secure Digital Card Menggunakan Metode Static Forensic}, journal = {Mobile and Forensics}, year = {2019}, volume = {1}, number = {2}, pages = {76--84}, month = {November}, doi = {10.12928/mf.v1i2.1217}, date = {2019-11-20}, note = "\url{http://journal2.uad.ac.id/index.php/mf/article/view/1217} ; \url{http://journal2.uad.ac.id/index.php/mf/article/download/1217/pdf} ; \url{https://core.ac.uk/download/pdf/267886817.pdf}", url = {https://lens.org/056-406-725-646-266} } @article{lens.org/056-522-627-812-660, author = {Tiago Carvalho and Helio Pedrini and Anderson Rocha}, title = {Visual Computing and Machine Learning Techniques for Digital Forensics}, journal = {Revista de Informática Teórica e Aplicada}, year = {2015}, volume = {22}, number = {1}, pages = {128--153}, month = {May}, doi = {10.22456/2175-2745.49492}, date = {2015-05-18}, note = "\url{https://seer.ufrgs.br/rita/article/view/RITA-VOL22-NR1-128} ; \url{https://seer.ufrgs.br/rita/article/download/RITA-VOL22-NR1-128/33866} ; \url{https://core.ac.uk/download/303970495.pdf}", url = {https://lens.org/056-522-627-812-660} } @article{lens.org/056-543-812-810-619, author = {Turker Tuncer and Erhan Akbal and Sengul Dogan}, title = {Multileveled ternary pattern and iterative ReliefF based bird sound classification}, journal = {Applied Acoustics}, year = {2021}, volume = {176}, pages = {107866--}, doi = {10.1016/j.apacoust.2020.107866}, note = "\url{https://www.sciencedirect.com/science/article/pii/S0003682X20309713}", url = {https://lens.org/056-543-812-810-619} } @article{lens.org/056-715-378-869-201, author = {R.A.F. Bhoedjang and A. R. Van Ballegooij and H.M.A. van Beek and J.C. van Schie and Feike W. Dillema and R.B. van Baar and F.A. Ouwendijk and M. Streppel}, title = {Engineering an online computer forensic service}, journal = {Digital Investigation}, year = {2012}, volume = {9}, number = {2}, pages = {96--108}, doi = {10.1016/j.diin.2012.10.001}, note = "\url{http://dx.doi.org/10.1016/j.diin.2012.10.001} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287612000655} ; \url{https://dblp.uni-trier.de/db/journals/di/di9.html#BhoedjangBBSDBOS12}", url = {https://lens.org/056-715-378-869-201} } @article{lens.org/056-760-246-560-467, author = {A. Vatsenko}, title = {Digital Forensics Techniques Overview}, journal = {Bulletin of Science and Practice}, year = {2020}, volume = {6}, number = {6}, pages = {167--174}, month = {June}, doi = {10.33619/2414-2948/55/21}, date = {2020-06-15}, note = "\url{http://dx.doi.org/10.33619/2414-2948/55/21}", url = {https://lens.org/056-760-246-560-467} } @article{lens.org/056-772-951-594-695, author = {Jarosław Bernacki}, title = {A survey on digital camera identification methods}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {34}, pages = {300983--}, doi = {10.1016/j.fsidi.2020.300983}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S2666281720300536}", url = {https://lens.org/056-772-951-594-695} } @article{lens.org/056-882-554-610-740, author = {Jorge Ponseti and Katharina Diehl and Aglaja Valentina Stirn}, title = {Is Dating Behavior in Digital Contexts Driven by Evolutionary Programs? A Selective Review.}, journal = {Frontiers in psychology}, year = {2022}, volume = {13}, pages = {678439--}, month = {February}, doi = {10.3389/fpsyg.2022.678439}, date = {2022-02-28}, url = {https://lens.org/056-882-554-610-740} } @article{lens.org/056-887-194-738-347, author = {Kanamarlapudi Venkatalakshmi Bhargavi and Aishvarya Narayanan Nair}, title = {Analytical Comparison of REFS and XFS File Systems}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.07}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.07}", url = {https://lens.org/056-887-194-738-347} } @article{lens.org/057-366-982-589-875, author = {Radina Stoykova and Stig Andersen and Katrin Franke and Stefan Axelsson}, title = {Reliability assessment of digital forensic investigations in the Norwegian police}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301351--301351}, doi = {10.1016/j.fsidi.2022.301351}, url = {https://lens.org/057-366-982-589-875} } @article{lens.org/057-630-673-457-131, author = {Anil Dada Warbhe and Rajiv V. Dharaskar and Vilas M. Thakare}, title = {A Scaling Robust Copy-Paste Tampering Detection for Digital Image Forensics}, journal = {Procedia Computer Science}, year = {2016}, volume = {79}, pages = {458--465}, doi = {10.1016/j.procs.2016.03.059}, note = "\url{http://www.sciencedirect.com/science/article/pii/S1877050916001903} ; \url{https://core.ac.uk/display/82364984} ; \url{https://www.sciencedirect.com/science/article/pii/S1877050916001903} ; \url{https://www.mendeley.com/catalogue/796d1fc0-2d74-3738-ae03-c995f66eafe9/} ; \url{https://core.ac.uk/download/pdf/82364984.pdf}", url = {https://lens.org/057-630-673-457-131} } @article{lens.org/057-810-697-639-827, author = {Agung Purnama Saputra and Nur Widiyasono}, title = {Analisis Digital Forensik pada File Steganography (Studi kasus : Peredaran Narkoba)}, journal = {Jurnal Teknik Informatika dan Sistem Informasi}, year = {2017}, volume = {3}, number = {1}, pages = {140628--}, month = {April}, doi = {10.28932/jutisi.v3i1.594}, date = {2017-04-08}, note = "\url{https://www.neliti.com/publications/140628/analisis-digital-forensik-pada-file-steganography-studi-kasus-peredaran-narkoba} ; \url{https://media.neliti.com/media/publications/140628-ID-analisis-digital-forensik-pada-file-steg.pdf}", url = {https://lens.org/057-810-697-639-827} } @article{lens.org/057-814-822-953-013, author = {G. Thilagavathi and J. Anitha}, title = {Document Clustering in Forensic Investigation by Hybrid Approach}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {91}, number = {3}, pages = {14--19}, month = {April}, doi = {10.5120/15860-4784}, date = {2014-04-18}, note = "\url{https://research.ijcaonline.org/volume91/number3/pxc3894784.pdf} ; \url{https://www.ijcaonline.org/archives/volume91/number3/15860-4784} ; \url{http://ui.adsabs.harvard.edu/abs/2014IJCA...91c..14T/abstract}", url = {https://lens.org/057-814-822-953-013} } @article{lens.org/058-200-891-793-092, author = {Khalid A Alattas and Magdy Bayoumi}, title = {Reviewing the Existing Methodologies and Tools of Cloud Forensics: Challenges and Solutions}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2020}, volume = {9}, number = {4}, pages = {147--154}, doi = {10.17781/p002677}, note = "\url{http://sdiwc.net/digital-library/reviewing-the-existing-methodologies-and-tools-of-cloud-forensics-challenges-and-solutions}", url = {https://lens.org/058-200-891-793-092} } @article{lens.org/058-329-964-903-756, author = {Nam In Park and Seong Ho Lim and Jun Seok Byun and Jin-Hwan Kim and Ji Woo Lee and Chanjun Chun and Yonggang Kim and Oc-Yeub Jeon}, title = {Forensic authentication method for audio recordings generated by Voice Recorder application on Samsung Galaxy Watch4 series.}, journal = {Journal of forensic sciences}, year = {2022}, month = {October}, doi = {10.1111/1556-4029.15158}, date = {2022-10-22}, url = {https://lens.org/058-329-964-903-756} } @article{lens.org/058-658-217-563-45X, author = {Alex Nelson}, title = {Twentieth Annual DFRWS Conference}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {301028--}, doi = {10.1016/j.fsidi.2020.301028}, note = "\url{https://doi.org/10.1016/j.fsidi.2020.301028} ; \url{https://api.elsevier.com/content/article/PII:S2666281720303115?httpAccept=text/xml} ; \url{http://dblp.uni-trier.de/db/journals/di/di33S.html#Nelson20a}", url = {https://lens.org/058-658-217-563-45X} } @article{lens.org/058-673-328-503-201, author = {Floris Gisolf and Zeno Geradts and Dennie Verhoeven and Coert Klaver}, title = {Research summary: The effects of switching the camera module from BlackBerry Curve 9360 devices}, journal = {Digital Investigation}, year = {2013}, volume = {10}, number = {1}, pages = {56--61}, doi = {10.1016/j.diin.2013.01.007}, note = "\url{https://doi.org/10.1016/j.diin.2013.01.007} ; \url{https://dblp.uni-trier.de/db/journals/di/di10.html#GisolfGVK13} ; \url{https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F07cd177c-b0b3-4a3d-8fdf-7dcc5d7bdbf4} ; \url{https://dare.uva.nl/personal/search?identifier=07cd177c-b0b3-4a3d-8fdf-7dcc5d7bdbf4} ; \url{http://dblp.uni-trier.de/db/journals/di/di10.html#GisolfGVK13} ; \url{https://core.ac.uk/display/132739753} ; \url{https://www.sciencedirect.com/science/article/pii/S174228761300008X}", url = {https://lens.org/058-673-328-503-201} } @article{lens.org/058-829-172-935-902, author = {Graeme Horsman and Helen Page and Peter Beveridge}, title = {A preliminary assessment of latent fingerprint evidence damage on mobile device screens caused by digital forensic extractions}, journal = {Digital Investigation}, year = {2018}, volume = {27}, pages = {47--56}, doi = {10.1016/j.diin.2018.10.002}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di27.html#HorsmanPB18} ; \url{https://research.tees.ac.uk/ws/files/6504500/FP_Article_V_0.1_HP_comments_and_additions_2_.pdf} ; \url{https://www.sciencedirect.com/science/article/pii/S174228761830166X} ; \url{https://research.tees.ac.uk/en/publications/a-preliminary-assessment-of-latent-fingerprint-evidence-damage-on} ; \url{https://core.ac.uk/download/pdf/196169309.pdf}", url = {https://lens.org/058-829-172-935-902} } @article{lens.org/059-002-926-336-692, author = {Harjinder Singh Lallie}, title = {Challenges in applying the ACPO principles in cloud forensic investigations}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2012}, volume = {7}, number = {1}, pages = {71--86}, month = {March}, date = {2012-03-31}, note = "\url{https://doaj.org/article/5090d506c02945faa7e69e3f3b1b14ea} ; \url{https://doi.org/10.15394/jdfsl.2012.1113}", url = {https://lens.org/059-002-926-336-692} } @article{lens.org/059-098-460-373-81X, title = {APAC2022-Print-Ad-Hybrid-Web (3)}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {42}, pages = {301424--301424}, doi = {10.1016/s2666-2817(22)00105-6}, url = {https://lens.org/059-098-460-373-81X} } @article{lens.org/059-259-578-782-71X, author = {Shuaibur Rahman and M. A. Khan}, title = {Digital Forensics through Application Behavior Analysis}, journal = {International Journal of Modern Education and Computer Science}, year = {2016}, volume = {8}, number = {6}, pages = {50--56}, month = {June}, doi = {10.5815/ijmecs.2016.06.07}, date = {2016-06-08}, note = "\url{http://www.mecs-press.org/ijmecs/ijmecs-v8-n6/IJMECS-V8-N6-7.pdf} ; \url{http://www.mecs-press.org/ijmecs/ijmecs-v8-n6/v8n6-7.html}", url = {https://lens.org/059-259-578-782-71X} } @article{lens.org/059-294-756-490-060, author = {Himani Rawat}, title = {BitScout: Remote Digital Forensics Toolkit}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, pages = {22--23}, month = {May}, doi = {10.46293/4n6/2020.02.02.03}, date = {2020-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.02.03}", url = {https://lens.org/059-294-756-490-060} } @article{lens.org/059-316-462-802-051, author = {Sajith A Johnson and S Ananthakumaran}, title = {Smart Digital Forensic Framework for Crime Analysis and Prediction using AutoML}, journal = {International Journal of Advanced Computer Science and Applications}, year = {2021}, volume = {12}, number = {3}, doi = {10.14569/ijacsa.2021.0120349}, note = "\url{https://thesai.org/Publications/ViewPaper?Volume=12&Issue=3&Code=IJACSA&SerialNo=49} ; \url{https://thesai.org/Downloads/Volume12No3/Paper_49-Smart_Digital_Forensic_Framework.pdf}", url = {https://lens.org/059-316-462-802-051} } @article{lens.org/059-397-656-514-952, author = {Richard E. Overill and Jan Collie}, title = {Quantitative evaluation of the results of digital forensic investigations: a review of progress.}, journal = {Forensic sciences research}, year = {2021}, volume = {6}, number = {1}, pages = {13--18}, month = {February}, doi = {10.1080/20961790.2020.1837429}, date = {2021-02-08}, note = "\url{http://oro.open.ac.uk/75314/} ; \url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8112825/} ; \url{https://europepmc.org/article/PMC/PMC8112825} ; \url{https://doaj.org/article/036a718d1882483896312c0a40ef8b39} ; \url{https://www.tandfonline.com/doi/full/10.1080/20961790.2020.1837429}", url = {https://lens.org/059-397-656-514-952} } @article{lens.org/059-541-479-175-841, author = {Zulfiqar Ali and Muhammad Imran and Mansour Alsulaiman}, title = {An Automatic Digital Audio Authentication/Forensics System}, journal = {IEEE Access}, year = {2017}, volume = {5}, pages = {2994--3007}, doi = {10.1109/access.2017.2672681}, note = "\url{https://dblp.uni-trier.de/db/journals/access/access5.html#AliIA17} ; \url{https://pure.ulster.ac.uk/en/publications/an-automatic-digital-audio-authenticationforensics-system} ; \url{https://doi.org/10.1109/ACCESS.2017.2672681} ; \url{https://ieeexplore.ieee.org/abstract/document/7864411} ; \url{http://repository.essex.ac.uk/27231/} ; \url{https://ulster-staging.pure.elsevier.com/en/publications/an-automatic-digital-audio-authenticationforensics-system} ; \url{https://pure.ulster.ac.uk/ws/files/71153352/audio_authen_IEEE_Access.pdf} ; \url{http://ieeexplore.ieee.org/document/7864411/} ; \url{https://core.ac.uk/download/287023576.pdf}", url = {https://lens.org/059-541-479-175-841} } @article{lens.org/059-609-113-377-949, author = {Noora Al Mutawa and Joanne Bryce and Virginia N. L. Franqueira and Andrew Marrington}, title = {Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis}, journal = {Digital Investigation}, year = {2016}, volume = {16}, number = {16}, pages = {S96--S103}, doi = {10.1016/j.diin.2016.01.012}, note = "\url{https://www.infona.pl/resource/bwmeta1.element.elsevier-796b80b4-b548-3256-90c3-0614e1e6b193} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287616300068} ; \url{https://cyberleninka.org/article/n/587101.pdf} ; \url{https://cyberleninka.org/article/n/587101} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2016.01.012} ; \url{https://derby.openrepository.com/handle/10545/608462} ; \url{http://www.sciencedirect.com/science/article/pii/S1742287616300068} ; \url{https://dl.acm.org/citation.cfm?id=2910145} ; \url{https://core.ac.uk/display/42138486} ; \url{http://clok.uclan.ac.uk/14089/} ; \url{https://core.ac.uk/download/42138486.pdf}", url = {https://lens.org/059-609-113-377-949} } @article{lens.org/059-651-348-807-199, author = {Dana Wilson-Kovacs}, title = {Digital media investigators: challenges and opportunities in the use of digital forensics in police investigations in England and Wales}, journal = {Policing: An International Journal}, year = {2021}, volume = {44}, number = {4}, pages = {669--682}, month = {May}, doi = {10.1108/pijpsm-02-2021-0019}, date = {2021-05-07}, note = "\url{https://ore.exeter.ac.uk/repository/bitstream/10871/125904/4/Wilson-Kovacs%20March%202021%20DMI.pdf} ; \url{https://www.emerald.com/insight/content/doi/10.1108/PIJPSM-02-2021-0019/full/html} ; \url{https://ore.exeter.ac.uk/repository/handle/10871/125904}", url = {https://lens.org/059-651-348-807-199} } @article{lens.org/059-667-076-144-681, author = {James Hebidzi Senanu}, title = {Libforensics For Developing Digital Forensics Applications}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {335--338}, month = {July}, doi = {10.22624/aims/crp-bk3-p53}, date = {2022-07-26}, url = {https://lens.org/059-667-076-144-681} } @article{lens.org/059-898-396-008-601, author = {M. Dumchykov}, title = {THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS}, journal = {Criminalistics and Forensics}, year = {2020}, number = {65}, pages = {100--108}, month = {May}, doi = {10.33994/kndise.2020.65.10}, date = {2020-05-18}, note = "\url{http://dx.doi.org/10.33994/kndise.2020.65.10}", url = {https://lens.org/059-898-396-008-601} } @article{lens.org/059-942-556-683-418, author = {Jongseong Yoon and Doo-Won Jung and Chul-hoon Kang and Sangjin Lee}, title = {Digital Forensic Investigation of MongoDB}, journal = {Journal of the Korea Institute of Information Security and Cryptology}, year = {2014}, volume = {24}, number = {1}, pages = {123--134}, month = {February}, doi = {10.13089/jkiisc.2014.24.1.123}, date = {2014-02-28}, note = "\url{http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2014_v24n1_123}", url = {https://lens.org/059-942-556-683-418} } @article{lens.org/060-043-515-260-052, author = {Wiger van Houten and Zeno Geradts}, title = {Using Anisotropic Diffusion for Efficient Extraction of Sensor Noise in Camera Identification}, journal = {Journal of forensic sciences}, year = {2012}, volume = {57}, number = {2}, pages = {521--527}, month = {February}, doi = {10.1111/j.1556-4029.2012.02057.x}, date = {2012-02-13}, note = "\url{https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1556-4029.2012.02057.x} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/22329355} ; \url{https://forensic.to/JOFS-10-234%20-%20AnisoDiff.pdf} ; \url{http://www.forensic.to/JOFS-10-234%20-%20AnisoDiff.pdf} ; \url{https://europepmc.org/article/MED/22329355}", url = {https://lens.org/060-043-515-260-052} } @article{lens.org/060-141-830-760-910, author = {Feng Zhou and Renlong Hang and Hui Shuai and Qingshan Liu}, title = {Hierarchical Context Network for Airborne Image Segmentation}, journal = {IEEE Transactions on Geoscience and Remote Sensing}, year = {2022}, volume = {60}, pages = {1--12}, doi = {10.1109/tgrs.2021.3133258}, url = {https://lens.org/060-141-830-760-910} } @article{lens.org/060-905-412-608-729, author = {Ghania Al Sadi}, title = {Cloud Computing Architecture and Forensic Investigation Challenges}, journal = {International Journal of Computer Applications}, year = {2015}, volume = {124}, number = {7}, pages = {20--25}, month = {August}, doi = {10.5120/ijca2015905521}, date = {2015-08-18}, note = "\url{https://www.ijcaonline.org/archives/volume124/number7/22116-22116-2015905521} ; \url{http://ui.adsabs.harvard.edu/abs/2015IJCA..124g..20A/abstract} ; \url{https://www.ijcaonline.org/research/volume124/number7/sadi-2015-ijca-905521.pdf}", url = {https://lens.org/060-905-412-608-729} } @article{lens.org/060-971-363-644-947, author = {Mohammed Khanafseh and Mohammad Qatawneh and Wesam Almobaideen}, title = {A Survey of Various Frameworks and Solutions in all Branches of Digital Forensics with a Focus on Cloud Forensics}, journal = {International Journal of Advanced Computer Science and Applications}, year = {2019}, volume = {10}, number = {8}, doi = {10.14569/ijacsa.2019.0100880}, note = "\url{https://thesai.org/Downloads/Volume10No8/Paper_80-A_Survey_of_Various_Frameworks_and_Solutions.pdf} ; \url{https://thesai.org/Publications/ViewPaper?Volume=10&Issue=8&Code=IJACSA&SerialNo=80}", url = {https://lens.org/060-971-363-644-947} } @article{lens.org/061-289-036-312-640, author = {Adesoji A. Adesina and Ayodele Ariyo Adebiyi and Charles K. Ayo}, title = {Identification of forensic artifacts from the registry of windows 10 device in relation to idrive cloud storage usage}, journal = {Bulletin of Electrical Engineering and Informatics}, year = {2022}, volume = {11}, number = {1}, pages = {521--529}, month = {February}, doi = {10.11591/eei.v11i1.3489}, date = {2022-02-01}, url = {https://lens.org/061-289-036-312-640} } @article{lens.org/061-353-104-200-573, author = {Talib M. Jawad Abbas and Ahmed Salem Abdulmajeed}, title = {Identifying Digital Forensic Frameworks Based on Processes Models}, journal = {Iraqi Journal of Science}, year = {2021}, pages = {249--258}, month = {January}, doi = {10.24996/ijs.2021.si.1.35}, date = {2021-01-14}, note = "\url{https://ijs.uobaghdad.edu.iq/index.php/eijs/article/view/3919} ; \url{http://scbaghdad.edu.iq/eijs/index.php/eijs/article/view/3919}", url = {https://lens.org/061-353-104-200-573} } @article{lens.org/061-395-179-431-451, author = {Szu-Yuan Teng and Che-Yen Wen}, title = {A forensic examination of four popular cross‐platform file‐sharing apps with Wi‐Fi P2P}, journal = {Journal of forensic sciences}, year = {2020}, volume = {66}, number = {1}, pages = {315--322}, month = {September}, doi = {10.1111/1556-4029.14574}, date = {2020-09-28}, note = "\url{https://www.ncbi.nlm.nih.gov/pubmed/32986853} ; \url{https://europepmc.org/article/MED/32986853} ; \url{https://pubmed.ncbi.nlm.nih.gov/32986853/} ; \url{https://onlinelibrary.wiley.com/doi/epdf/10.1111/1556-4029.14574}", url = {https://lens.org/061-395-179-431-451} } @article{lens.org/061-539-155-308-504, author = {Tanya Syngle}, title = {An Overview of Corporate Cybercrime in India and US}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2017}, volume = {6}, number = {2}, pages = {62--72}, doi = {10.17781/p002269}, note = "\url{http://sdiwc.net/digital-library/an-overview-of-corporate-cybercrime-in-india-and-us.html}", url = {https://lens.org/061-539-155-308-504} } @article{lens.org/061-608-339-590-942, author = {Jason Morris and Manpreet Kaur Bans}, title = {Developing digitally enabled interventions for prison and probation settings: a review}, journal = {Journal of Forensic Practice}, year = {2018}, volume = {20}, number = {2}, pages = {134--140}, month = {January}, doi = {10.1108/jfp-08-2017-0030}, date = {2018-01-09}, note = "\url{https://www.emerald.com/insight/content/doi/10.1108/JFP-08-2017-0030/full/html} ; \url{http://www.emeraldinsight.com/doi/abs/10.1108/JFP-08-2017-0030?journalCode=jfp}", url = {https://lens.org/061-608-339-590-942} } @article{lens.org/061-658-874-291-210, author = {Manish Kumar}, title = {Mobile phone forensics - a systematic approach, tools, techniques and challenges}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2020}, volume = {13}, pages = {64--87}, month = {November}, date = {2020-11-03}, note = "\url{https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.111725}", url = {https://lens.org/061-658-874-291-210} } @article{lens.org/061-759-553-863-671, author = {Guangjun Liang and Jianfang Xin and Qun Wang and Xueli Ni and Xiangmin Guo}, title = {Research on IoT Forensics System Based on Blockchain Technology}, journal = {Security and Communication Networks}, year = {2022}, volume = {2022}, pages = {1--14}, month = {June}, doi = {10.1155/2022/4490757}, date = {2022-06-15}, url = {https://lens.org/061-759-553-863-671} } @article{lens.org/062-025-688-856-405, author = {Daaman Lohia and Pranav Miglani and Swapnil Mengi and Aparajita Sinha}, title = {Credential Hunting Across Web}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.05}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.05}", url = {https://lens.org/062-025-688-856-405} } @article{lens.org/062-137-637-964-947, author = {Graeme Horsman}, title = {Can we continue to effectively police digital crime}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2017}, volume = {57}, number = {6}, pages = {448--454}, month = {June}, doi = {10.1016/j.scijus.2017.06.001}, date = {2017-06-08}, note = "\url{https://europepmc.org/article/MED/29173458} ; \url{https://research.tees.ac.uk/ws/files/6385420/621796.pdf} ; \url{https://sure.sunderland.ac.uk/7400/} ; \url{https://core.ac.uk/display/83955750} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1355030617300801} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/29173458} ; \url{http://www.sciencedirect.com/science/article/pii/S1355030617300801} ; \url{https://research.tees.ac.uk/en/publications/can-we-continue-to-effectively-police-digital-crime} ; \url{https://core.ac.uk/download/83955750.pdf}", url = {https://lens.org/062-137-637-964-947} } @article{lens.org/062-168-384-023-533, author = {Dinesh Mothi and Helge Janicke and Isabel Wagner}, title = {A novel principle to validate digital forensic models}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {200904--}, doi = {10.1016/j.fsidi.2020.200904}, note = "\url{https://dora.dmu.ac.uk/handle/2086/19374} ; \url{https://dblp.uni-trier.de/db/journals/di/di33.html#MothiJW20} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287619303469} ; \url{https://dora.dmu.ac.uk/bitstream/2086/19374/2/mothi2020using-acceptedversion.pdf}", url = {https://lens.org/062-168-384-023-533} } @article{lens.org/062-489-027-144-764, author = {Ibnu Fajar Arrochman and Dhomas Hatta Fudholi and Yudi Prayudi}, title = {PENGGUNAAN METODE STATIS DAN LIVE FORENSIK PADA UAV UNTUK MENDAPATKAN BUKTI DIGITAL}, journal = {ILKOM Jurnal Ilmiah}, year = {2019}, volume = {11}, number = {2}, pages = {152--158}, month = {August}, doi = {10.33096/ilkom.v11i2.444.152-158}, date = {2019-08-31}, note = "\url{https://dspace.uii.ac.id/handle/123456789/17446} ; \url{http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/download/444/187} ; \url{http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/view/444/187} ; \url{https://core.ac.uk/download/pdf/228866677.pdf}", url = {https://lens.org/062-489-027-144-764} } @article{lens.org/062-624-458-576-365, author = {Abdullah Ayub Khan and Aftab Ahmed Shaikh and Asif Ali Laghari and Mazhar Ali Dootio and M. Malook Rind and Shafique Ahmed Awan}, title = {Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2022}, volume = {14}, number = {2}, pages = {124--124}, doi = {10.1504/ijesdf.2022.121174}, url = {https://lens.org/062-624-458-576-365} } @article{lens.org/063-274-848-736-685, author = {Aleksandar Valjarevic and Hein S. Venter}, title = {A Comprehensive and Harmonized Digital Forensic Investigation Process Model.}, journal = {Journal of forensic sciences}, year = {2015}, volume = {60}, number = {6}, pages = {1467--1483}, month = {August}, doi = {10.1111/1556-4029.12823}, date = {2015-08-10}, note = "\url{https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.12823} ; \url{https://repository.up.ac.za/handle/2263/51445} ; \url{https://dialnet.unirioja.es/servlet/articulo?codigo=5292849} ; \url{http://onlinelibrary.wiley.com/doi/10.1111/1556-4029.12823/abstract} ; \url{https://europepmc.org/article/MED/26258644} ; \url{https://pubmed.ncbi.nlm.nih.gov/26258644/} ; \url{https://repository.up.ac.za/bitstream/2263/51445/1/Valjarevic_Comprehensive_2015.pdf}", url = {https://lens.org/063-274-848-736-685} } @article{lens.org/063-519-359-431-461, author = {Ezz El-Din Hemdan and D. H. Manjaiah}, title = {An efficient digital forensic model for cybercrimes investigation in cloud computing}, journal = {Multimedia Tools and Applications}, year = {2021}, volume = {80}, number = {9}, pages = {14255--14282}, month = {January}, doi = {10.1007/s11042-020-10358-x}, date = {2021-01-22}, note = "\url{https://link.springer.com/article/10.1007/s11042-020-10358-x} ; \url{https://dblp.uni-trier.de/db/journals/mta/mta80.html#HemdanM21} ; \url{https://doi.org/10.1007/s11042-020-10358-x}", url = {https://lens.org/063-519-359-431-461} } @article{lens.org/063-661-720-912-563, author = {Rauhulloh Ayatulloh Khomeini Noor Bintang and Rusydi Umar and Anton Yudhana}, title = {Analisis Media Sosial Facebook Lite dengan tools Forensik menggunakan Metode NIST}, journal = {Techno (Jurnal Fakultas Teknik, Universitas Muhammadiyah Purwokerto)}, year = {2020}, volume = {21}, number = {2}, pages = {125--130}, month = {November}, doi = {10.30595/techno.v21i2.8494}, date = {2020-11-17}, note = "\url{http://jurnalnasional.ump.ac.id/index.php/Techno/article/download/8494/3602} ; \url{http://jurnalnasional.ump.ac.id/index.php/Techno/article/view/8494/3602} ; \url{https://doaj.org/article/eee14c43ee4f47bf88c4da1a19962cee}", url = {https://lens.org/063-661-720-912-563} } @article{lens.org/063-682-957-318-485, author = {Zhaofeng Ma and Ming Jiang and Weihua Huang}, title = {Trusted forensics scheme based on digital watermark algorithm in intelligent VANET}, journal = {Neural Computing and Applications}, year = {2019}, volume = {32}, number = {6}, pages = {1665--1678}, month = {May}, doi = {10.1007/s00521-019-04246-1}, date = {2019-05-16}, note = "\url{https://dblp.uni-trier.de/db/journals/nca/nca32.html#MaJH20} ; \url{https://link.springer.com/article/10.1007/s00521-019-04246-1} ; \url{https://doi.org/10.1007/s00521-019-04246-1}", url = {https://lens.org/063-682-957-318-485} } @article{lens.org/063-837-705-607-866, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {300989--300989}, doi = {10.1016/s2666-2817(20)30223-7}, url = {https://lens.org/063-837-705-607-866} } @article{lens.org/063-964-488-825-120, author = {Graeme Horsman}, title = {Forming an investigative opinion in digital forensics}, journal = {WIREs Forensic Science}, year = {2022}, month = {May}, doi = {10.1002/wfs2.1460}, date = {2022-05-09}, url = {https://lens.org/063-964-488-825-120} } @article{lens.org/064-115-669-679-548, author = {Turker Tuncer and Abdulhamit Subasi and Fatih Ertam and Sengul Dogan}, title = {A novel spiral pattern and 2D M4 pooling based environmental sound classification method}, journal = {Applied Acoustics}, year = {2020}, volume = {170}, pages = {107508--}, doi = {10.1016/j.apacoust.2020.107508}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S0003682X20306125#!} ; \url{https://www.sciencedirect.com/science/article/pii/S0003682X20306125}", url = {https://lens.org/064-115-669-679-548} } @article{lens.org/064-153-704-547-354, author = {Barbora Geistová Čakovská and Nikolaos Kalantzis and Tomasz Dziedzic and Carina Fernandes and Jan Zimmer and M.J. Branco and Jonathan Heckeroth and Kristofer Axelsson Spjuth and Erich Kupferschmid and Paolo Vaccarone and Axel Kerkoff}, title = {Recommendations for capturing signatures digitally to optimize their suitability for forensic handwriting examination.}, journal = {Journal of forensic sciences}, year = {2020}, volume = {66}, number = {2}, pages = {743--747}, month = {November}, doi = {10.1111/1556-4029.14627}, date = {2020-11-18}, note = "\url{https://europepmc.org/article/MED/33206397} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/33206397} ; \url{https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.14627} ; \url{https://pubmed.ncbi.nlm.nih.gov/33206397/}", url = {https://lens.org/064-153-704-547-354} } @article{lens.org/064-203-195-549-88X, author = {Kumarshankar Raychaudhuri and M. George Christopher and Nayeem Abbas Hamdani}, title = {Comparative Study and Analysis on Integrity of Data Files Using Different Tools and Techniques}, journal = {Journal of Information Security and Cybercrimes Research}, year = {2021}, volume = {4}, number = {1}, pages = {43--54}, month = {June}, doi = {10.26735/symq8715}, date = {2021-06-01}, url = {https://lens.org/064-203-195-549-88X} } @article{lens.org/064-313-388-228-262, author = {Sameera Almulla and Youssef Iraqi and Andrew Jones}, title = {A STATE-OF-THE-ART REVIEW OF CLOUD FORENSICS}, journal = {Journal of Digital Forensics, Security and Law}, year = {2014}, volume = {9}, number = {4}, pages = {7--28}, doi = {10.15394/jdfsl.2014.1190}, note = "\url{https://commons.erau.edu/jdfsl/vol9/iss4/2/} ; \url{https://core.ac.uk/display/44209296} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1190&context=jdfsl} ; \url{https://doaj.org/article/f95b981ea64a450ba0505677d36c4c8b} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#AlmullaIJ14}", url = {https://lens.org/064-313-388-228-262} } @article{lens.org/064-398-322-820-816, author = {Seokcheol Lee and Hyunguk Yoo and Taeshik Shon}, title = {Research on Development of Digital Forensics based Digital Records Migration Procedure and Tool}, journal = {Journal of the Korea Institute of Information Security and Cryptology}, year = {2014}, volume = {24}, number = {3}, pages = {571--580}, month = {June}, doi = {10.13089/jkiisc.2014.24.3.571}, date = {2014-06-30}, note = "\url{http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2014_v24n3_571} ; \url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001891629}", url = {https://lens.org/064-398-322-820-816} } @article{lens.org/064-409-347-985-677, author = {null Monika and Mriirs Faridabad degree in Ece and Dipali Bansal and null Director-IQAC}, title = {Forensic Science Research Summary for Forgery Detection of Digital Images}, journal = {International Journal of Engineering and Advanced Technology}, year = {2020}, volume = {9}, number = {3}, pages = {1608--1618}, month = {February}, doi = {10.35940/ijeat.b2563.029320}, date = {2020-02-28}, note = "\url{https://zenodo.org/record/5575060}", url = {https://lens.org/064-409-347-985-677} } @article{lens.org/064-735-689-763-963, author = {Gary C. Kessler}, title = {The Impact of SHA-1 File Hash Collisions On Digital Forensic Imaging: A Follow-up Experiment}, journal = {Journal of Digital Forensics, Security and Law}, year = {2016}, volume = {11}, number = {4}, pages = {10--}, doi = {10.15394/jdfsl.2016.1433}, note = "\url{https://works.bepress.com/gary_kessler/91/} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#Kessler16a} ; \url{https://doi.org/10.15394/jdfsl.2016.1433} ; \url{https://commons.erau.edu/jdfsl/vol11/iss4/10/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1433&context=jdfsl}", url = {https://lens.org/064-735-689-763-963} } @article{lens.org/064-866-800-584-825, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {39}, pages = {301321--301321}, doi = {10.1016/s2666-2817(21)00247-x}, url = {https://lens.org/064-866-800-584-825} } @article{lens.org/064-938-865-982-891, author = {Miguel Cerdeira Negrão and Patricio Domingues}, title = {SpeechToText: An open-source software for automatic detection and transcription of voice recordings in digital forensics}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301223--}, doi = {10.1016/j.fsidi.2021.301223}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S2666281721001311} ; \url{https://doi.org/10.1016/j.fsidi.2021.301223}", url = {https://lens.org/064-938-865-982-891} } @article{lens.org/064-949-110-675-467, author = {Omkar Sonawane}, title = {India’s Digital Strike on China: Security Prospective}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {May}, doi = {10.46293/4n6/2021.03.02.05}, date = {2021-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.02.05}", url = {https://lens.org/064-949-110-675-467} } @article{lens.org/065-409-532-451-331, author = {Mehrdad Tajbakhsh and Elaheh Homayounvala and Sajjad Shokouhyar}, title = {Forensically ready digital identity management systems, issues of digital identity life cycle and context of usage}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2017}, volume = {9}, number = {1}, pages = {62--62}, doi = {10.1504/ijesdf.2017.10002653}, url = {https://lens.org/065-409-532-451-331} } @article{lens.org/065-517-309-064-222, author = {Sally F. Kelty and Emma J. McQueen and Carly Pymont and Nathan Green}, title = {Avoiding Burnout at the Digital Forensics Coalface: Targeted Strategies for Forensic Agencies in the Management of Job-related Stress}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301127--}, doi = {10.1016/j.fsidi.2021.301127}, note = "\url{https://dfrws.org/presentation/avoiding-burnout-at-the-digital-forensics-coalface-targeted-strategies-for-forensic-agencies-in-the-management-of-job-related-stress/} ; \url{https://researchprofiles.canberra.edu.au/en/publications/avoiding-burnout-at-the-digital-forensics-coalface-targeted-strat} ; \url{https://dfrws.org/wp-content/uploads/2021/01/2021_APAC_paper-avoiding_burnout_at_the_digital_forensics_coalface.pdf} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281721000251}", url = {https://lens.org/065-517-309-064-222} } @article{lens.org/065-671-045-136-370, author = {Eoghan Casey and Gregory Thomas Back and Sean Barnum}, title = {Leveraging CybOX to standardize representation and exchange of digital forensic information}, journal = {Digital Investigation}, year = {2015}, volume = {12}, pages = {S102--S110}, doi = {10.1016/j.diin.2015.01.014}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di12.html#CaseyBB15} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287615000158} ; \url{http://www.sciencedirect.com/science/article/pii/S1742287615000158} ; \url{https://core.ac.uk/display/82037839}", url = {https://lens.org/065-671-045-136-370} } @article{lens.org/065-873-523-989-876, author = {Nickson M. Karie and Hein S. Venter}, title = {Toward a general ontology for digital forensic disciplines.}, journal = {Journal of forensic sciences}, year = {2014}, volume = {59}, number = {5}, pages = {1231--1241}, month = {June}, doi = {10.1111/1556-4029.12511}, date = {2014-06-16}, note = "\url{https://repository.up.ac.za/handle/2263/40745} ; \url{https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.12511} ; \url{https://repository.up.ac.za/bitstream/2263/40745/1/Karie_Toward_2014.pdf} ; \url{https://pubmed.ncbi.nlm.nih.gov/24931294/} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/24931294}", url = {https://lens.org/065-873-523-989-876} } @article{lens.org/065-927-829-618-673, author = {Andreas Dewald}, title = {Characteristic evidence, counter evidence and reconstruction problems in forensic computing}, journal = {it - Information Technology}, year = {2015}, volume = {57}, number = {6}, pages = {339--346}, month = {December}, doi = {10.1515/itit-2015-0017}, date = {2015-12-01}, note = "\url{https://dblp.uni-trier.de/db/journals/it/it57.html#Dewald15} ; \url{https://www.degruyter.com/view/j/itit.2015.57.issue-6/itit-2015-0017/itit-2015-0017.xml}", url = {https://lens.org/065-927-829-618-673} } @article{lens.org/065-939-794-265-406, author = {Zivanka Miladinovic Bogavac and Djordje Spasojevic}, title = {IMPORTANCE OF FORENSICS OF MOBILE PHONES AS A TYPE OF DIGITAL FORENSICS IN THE PROCESS OF EVIDENCE}, journal = {MEST Journal}, year = {2019}, volume = {7}, number = {1}, pages = {48--52}, month = {January}, doi = {10.12709/mest.07.07.01.07}, date = {2019-01-15}, note = "\url{http://dx.doi.org/10.12709/mest.07.07.01.07}", url = {https://lens.org/065-939-794-265-406} } @article{lens.org/066-219-211-495-201, author = {Yudi Prayudi and Azhari Sn}, title = {Digital Chain of Custody: State of the Art}, journal = {International Journal of Computer Applications}, year = {2015}, volume = {114}, number = {5}, pages = {1--9}, month = {March}, doi = {10.5120/19971-1856}, date = {2015-03-18}, note = "\url{https://www.researchgate.net/profile/Yudi_Prayudi/publication/273694917_Digital_Chain_of_Custody_State_of_The_Art/links/5508eb510cf2d7a2812b6945.pdf} ; \url{https://research.ijcaonline.org/volume114/number5/pxc3901856.pdf} ; \url{https://ui.adsabs.harvard.edu/abs/2015IJCA..114e...1P/abstract} ; \url{https://www.ijcaonline.org/archives/volume114/number5/19971-1856}", url = {https://lens.org/066-219-211-495-201} } @article{lens.org/066-235-037-082-291, author = {Ben Hitchcock and Nhien-An Le-Khac and Mark Scanlon}, title = {Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists}, journal = {Digital Investigation}, year = {2016}, volume = {16}, pages = {75--85}, doi = {10.1016/j.diin.2016.01.010}, note = "\url{https://forensicsandsecurity.com/papers/TieredForensicMethodologyModelForDigitalFieldTriage.pdf} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2016.01.010} ; \url{https://researchrepository.ucd.ie/handle/10197/9253} ; \url{https://forensicsandsecurity.com/papers/TieredForensicMethodologyModelForDigitalFieldTriage.php} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287616300044} ; \url{http://ui.adsabs.harvard.edu/abs/2016arXiv160403844H/abstract} ; \url{https://www.markscanlon.co/papers/TieredForensicMethodologyModelForDigitalFieldTriage.php} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287616300044} ; \url{https://dblp.uni-trier.de/db/journals/corr/corr1604.html#HitchcockLS16} ; \url{https://researchrepository.ucd.ie/bitstream/10197/9253/1/TieredForensicMethodologyModelForDigitalFieldTriage.pdf} ; \url{https://markscanlon.co/papers/TieredForensicMethodologyModelForDigitalFieldTriage.pdf} ; \url{https://core.ac.uk/display/82007263} ; \url{https://core.ac.uk/download/pdf/82007263.pdf}", url = {https://lens.org/066-235-037-082-291} } @article{lens.org/066-249-839-004-372, author = {Matthew Lee and Karina Gerdau-Radonic}, title = {Variation within physical and digital craniometrics.}, journal = {Forensic science international}, year = {2019}, volume = {306}, pages = {110092--}, month = {November}, doi = {10.1016/j.forsciint.2019.110092}, date = {2019-11-29}, note = "\url{https://pubmed.ncbi.nlm.nih.gov/31816484/} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S0379073819305043} ; \url{https://pubag.nal.usda.gov/catalog/6785455} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/31816484}", url = {https://lens.org/066-249-839-004-372} } @article{lens.org/066-326-667-476-053, author = {Gargi Jani and Abraham Johnson and William R. Belcher}, title = {Case report: Digital restoration of fragmented non-human skull}, journal = {Forensic Science International: Reports}, year = {2020}, volume = {2}, pages = {100070--}, doi = {10.1016/j.fsir.2020.100070}, note = "\url{http://www.sciencedirect.com/science/article/pii/S2665910720300165} ; \url{https://www.sciencedirect.com/science/article/pii/S2665910720300165}", url = {https://lens.org/066-326-667-476-053} } @article{lens.org/066-372-994-493-544, author = {Gordana Buzarovska Lazetik and Olga Koshevaliska}, title = {Digital Evidence in Criminal Procedures-A Comparative Approach-}, journal = {Balkan Social Science Review}, year = {2013}, number = {2}, pages = {63--83}, month = {December}, date = {2013-12-01}, note = "\url{http://js.ugd.edu.mk/index.php/BSSR/article/download/756/730} ; \url{https://www.ceeol.com/search/article-detail?id=78558}", url = {https://lens.org/066-372-994-493-544} } @article{lens.org/066-591-536-952-520, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {300965--300965}, doi = {10.1016/s2666-2817(20)30143-8}, url = {https://lens.org/066-591-536-952-520} } @article{lens.org/066-777-702-062-597, author = {Xiang Lin and Jianhua Li and Shilin Wang and Alan-Wee-Chung Liew and Feng Cheng and Xiaosa Huang}, title = {Recent Advances in Passive Digital Image Security Forensics: A Brief Review}, journal = {Engineering}, year = {2018}, volume = {4}, number = {1}, pages = {29--39}, doi = {10.1016/j.eng.2018.02.008}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S2095809917307890} ; \url{https://doaj.org/article/dd2687b7552b4ef6a0613888c6233afa} ; \url{https://www.sciencedirect.com/science/article/pii/S2095809917307890} ; \url{https://engineering.org.cn/EN/10.1016/j.eng.2018.02.008} ; \url{https://core.ac.uk/display/155265417}", url = {https://lens.org/066-777-702-062-597} } @article{lens.org/066-786-352-814-166, author = {Jun-yu Xu and Yu-ting Su}, title = {Smoothing Filtering Detection for Digital Image Forensics: Smoothing Filtering Detection for Digital Image Forensics}, journal = {Journal of Electronics \& Information Technology}, year = {2014}, volume = {35}, number = {10}, pages = {2287--2293}, month = {February}, doi = {10.3724/sp.j.1146.2013.00131}, date = {2014-02-27}, note = "\url{http://pub.chinasciencejournal.com/article/getArticleRedirect.action?doiCode=10.3724/SP.J.1146.2013.00131}", url = {https://lens.org/066-786-352-814-166} } @article{lens.org/066-807-833-482-350, author = {Abdul Boztas and A.R.J. Riethoven and Mark Roeloffs}, title = {Smart TV forensics}, journal = {Digital Investigation}, year = {2015}, volume = {12}, pages = {S72--S80}, doi = {10.1016/j.diin.2015.01.012}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S1742287615000134} ; \url{https://doi.org/10.1016/j.diin.2015.01.012} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287615000134} ; \url{https://www.researchgate.net/profile/A_Boztas/publication/273261826_Smart_TV_forensics_Digital_traces_on_televisions/links/55acc73e08aea3d08686109b.pdf} ; \url{https://core.ac.uk/display/82823751} ; \url{https://dblp.uni-trier.de/db/journals/di/di12.html#BoztasRR15} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2015.01.012}", url = {https://lens.org/066-807-833-482-350} } @article{lens.org/067-310-016-898-527, author = {Yugal Pathak}, title = {Forensic Psychology: Profiling Criminal Mindset In Sexual Offenders}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {May}, doi = {10.46293/4n6/2021.03.02.01}, date = {2021-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.02.01}", url = {https://lens.org/067-310-016-898-527} } @article{lens.org/067-329-399-496-102, author = {Anne David and Sarah Morris and Gareth Appleby-Thomas}, title = {A Two-Stage Model for Social Network Investigations in Digital Forensics}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2020}, volume = {15}, number = {2}, pages = {1--}, doi = {10.15394/jdfsl.2020.1667}, note = "\url{https://commons.erau.edu/jdfsl/vol15/iss2/1/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1667&context=jdfsl} ; \url{https://dspace.lib.cranfield.ac.uk/handle/1826/15732}", url = {https://lens.org/067-329-399-496-102} } @article{lens.org/067-429-157-490-697, author = {Gary C. Kessler}, title = {The Impact of MD5 File Hash Collisions On Digital Forensic Imaging}, journal = {Journal of Digital Forensics, Security and Law}, year = {2016}, volume = {11}, number = {4}, pages = {9--}, doi = {10.15394/jdfsl.2016.1431}, note = "\url{https://commons.erau.edu/jdfsl/vol11/iss4/9/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1431&context=jdfsl} ; \url{https://works.bepress.com/gary_kessler/90/} ; \url{https://doi.org/10.15394/jdfsl.2016.1431} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#Kessler16} ; \url{https://works.bepress.com/gary_kessler/90/download/}", url = {https://lens.org/067-429-157-490-697} } @article{lens.org/067-475-744-304-50X, author = {Jamie K. Pringle}, title = {Educational egaming: the future for geoscience virtual learners?}, journal = {Geology Today}, year = {2014}, volume = {30}, number = {4}, pages = {147--150}, month = {July}, doi = {10.1111/gto.12058}, date = {2014-07-15}, note = "\url{https://onlinelibrary.wiley.com/doi/10.1111/gto.12058} ; \url{https://core.ac.uk/display/43759983} ; \url{https://core.ac.uk/download/43759983.pdf}", url = {https://lens.org/067-475-744-304-50X} } @article{lens.org/067-577-414-064-539, author = {Martin S. Olivier}, title = {Digital Forensic Science: A Manifesto}, journal = {South African Computer Journal}, year = {2016}, volume = {28}, number = {2}, pages = {46--49}, month = {December}, doi = {10.18489/sacj.v28i2.442}, date = {2016-12-16}, note = "\url{https://doaj.org/article/fd3996c6cd6a4b50a4c43cb3dcef8058} ; \url{https://sacj.cs.uct.ac.za/index.php/sacj/article/view/442} ; \url{https://core.ac.uk/display/90989195} ; \url{https://doi.org/10.18489/sacj.v28i2.442} ; \url{https://dblp.uni-trier.de/db/journals/saj/saj28a.html#Olivier16} ; \url{https://sacj.cs.uct.ac.za/index.php/sacj/article/download/442/194} ; \url{https://www.dspace.up.ac.za/handle/2263/60561} ; \url{https://repository.up.ac.za/handle/2263/60561}", url = {https://lens.org/067-577-414-064-539} } @article{lens.org/067-618-189-888-272, author = {Knut Kröger and Reiner Creutzburg}, title = {A practical overview and comparison of certain commercial forensic software tools for processing large-scale digital investigations}, journal = {SPIE Proceedings}, year = {2013}, volume = {8755}, pages = {875519--}, month = {May}, doi = {10.1117/12.2017906}, date = {2013-05-28}, note = "\url{https://ui.adsabs.harvard.edu/abs/2013SPIE.8755E..19K/abstract} ; \url{https://www.spiedigitallibrary.org/conference-proceedings-of-spie/8755/1/A-practical-overview-and-comparison-of-certain-commercial-forensic-software/10.1117/12.2017906.full} ; \url{https://www.researchgate.net/profile/Knut_Bellin/publication/258332973_A_practical_overview_and_comparison_of_certain_commercial_forensic_software_tools_for_processing_large-scale_digital_investigations/links/00b495293485547b83000000.pdf}", url = {https://lens.org/067-618-189-888-272} } @article{lens.org/067-840-274-503-047, author = {Reza Montasari}, title = {An ad hoc detailed review of digital forensic investigation process models}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2016}, volume = {8}, number = {3}, pages = {205--223}, doi = {10.1504/ijesdf.2016.077444}, note = "\url{https://pure.hud.ac.uk/en/publications/an-ad-hoc-detailed-review-of-digital-forensic-investigation-proce} ; \url{https://dx.doi.org/10.1504/IJESDF.2016.077444} ; \url{http://dx.doi.org/10.1504/IJESDF.2016.077444} ; \url{https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf8.html#Montasari16} ; \url{https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2016.077444} ; \url{https://dl.acm.org/citation.cfm?id=2974526} ; \url{https://dl.acm.org/doi/10.1504/IJESDF.2016.077444} ; \url{https://www.open-access.bcu.ac.uk/4547/} ; \url{http://www.inderscience.com/link.php?id=77444} ; \url{https://cronfa.swan.ac.uk/Record/cronfa54941}", url = {https://lens.org/067-840-274-503-047} } @article{lens.org/067-844-385-207-96X, author = {Halil Ibrahim Bulbul and H. Güçlü Yavuzcan and Mesut Ozel}, title = {Digital forensics: An Analytical Crime Scene Procedure Model (ACSPM)}, journal = {Forensic science international}, year = {2013}, volume = {233}, number = {1}, pages = {244--256}, month = {September}, doi = {10.1016/j.forsciint.2013.09.007}, date = {2013-09-13}, note = "\url{https://europepmc.org/article/MED/24314526} ; \url{http://www.sciencedirect.com/science/article/pii/S0379073813004155} ; \url{https://pubmed.ncbi.nlm.nih.gov/24314526/} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S0379073813004155} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/24314526}", url = {https://lens.org/067-844-385-207-96X} } @article{lens.org/068-030-546-112-691, author = {Maxim Chernyshev and Sherali Zeadally and Zubair A. Baig}, title = {Healthcare Data Breaches: Implications for Digital Forensic Readiness}, journal = {Journal of medical systems}, year = {2018}, volume = {43}, number = {1}, pages = {7--}, month = {November}, doi = {10.1007/s10916-018-1123-2}, date = {2018-11-28}, note = "\url{https://link.springer.com/article/10.1007/s10916-018-1123-2} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/30488291} ; \url{https://ro.ecu.edu.au/ecuworkspost2013/5571/} ; \url{https://pubmed.ncbi.nlm.nih.gov/30488291/} ; \url{https://doi.org/10.1007/s10916-018-1123-2} ; \url{http://dro.deakin.edu.au/view/DU:30121030} ; \url{https://dblp.uni-trier.de/db/journals/jms/jms43.html#ChernyshevZB19} ; \url{http://hdl.handle.net/10536/DRO/DU:30121030}", url = {https://lens.org/068-030-546-112-691} } @article{lens.org/068-211-549-219-606, author = {Olivier Ribaux and Thomas R. Souvignet}, title = {“Hello are you available?” Dealing with online frauds and the role of forensic science}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {300978--}, doi = {10.1016/j.fsidi.2020.300978}, note = "\url{https://doi.org/10.1016/j.fsidi.2020.300978} ; \url{https://serval.unil.ch/notice/serval:BIB_7054F13E76E6} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281720300810} ; \url{https://dblp.uni-trier.de/db/journals/di/di33.html#RibauxS20} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281720300810#!} ; \url{https://core.ac.uk/download/pdf/322688129.pdf}", url = {https://lens.org/068-211-549-219-606} } @article{lens.org/068-386-024-387-716, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301366--301366}, doi = {10.1016/s2666-2817(22)00038-5}, url = {https://lens.org/068-386-024-387-716} } @article{lens.org/068-508-915-657-575, author = {D. Abate and C. Sturdy Colls and N. Moyssi and D. Karsili and M. Faka and A. Anilir and S. Manolis}, title = {Optimizing search strategies in mass grave location through the combination of digital technologies}, journal = {Forensic science international. Synergy}, year = {2019}, volume = {1}, pages = {95--107}, month = {June}, doi = {10.1016/j.fsisyn.2019.05.002}, date = {2019-06-03}, note = "\url{http://eprints.staffs.ac.uk/5681/} ; \url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7219194} ; \url{https://www.sciencedirect.com/science/article/pii/S2589871X19300828} ; \url{https://core.ac.uk/download/pdf/210991644.pdf}", url = {https://lens.org/068-508-915-657-575} } @article{lens.org/068-558-695-475-467, author = {Hu Chen}, title = {Dilemmas in Digital Forensics for Computer Equipment Security and Maintenance in Remote Ships}, journal = {Advanced Materials Research}, year = {2012}, volume = {490-495}, pages = {1382--1386}, doi = {10.4028/www.scientific.net/amr.490-495.1382}, note = "\url{https://www.scientific.net/AMR.490-495.1382}", url = {https://lens.org/068-558-695-475-467} } @article{lens.org/068-565-513-246-053, author = {Doug Weeks and Bing Zhou}, title = {Physical security design of a digital forensic lab}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2021}, volume = {13}, number = {1}, pages = {418--444}, doi = {10.1504/ijesdf.2021.10033951}, note = "\url{https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.116017}", url = {https://lens.org/068-565-513-246-053} } @article{lens.org/068-669-641-930-403, author = {E. R. Rossinskaya}, title = {Theory of Information and Computer Support for Forensic Expert Activities as a New Private Theory of Forensic Expertology}, journal = {Courier of Kutafin Moscow State Law University (MSAL))}, year = {2022}, number = {2}, pages = {27--40}, month = {May}, doi = {10.17803/2311-5998.2022.90.2.027-040}, date = {2022-05-08}, url = {https://lens.org/068-669-641-930-403} } @article{lens.org/068-931-665-572-533, author = {Siti Rahayu Selamat and Shahrin Sahib and Nor Hafeizah and Robiah Yusof and Mohd Faizal Abdollah}, title = {A Forensic Traceability Index in Digital Forensic Investigation}, journal = {Journal of Information Security}, year = {2013}, volume = {2013}, number = {1}, pages = {19--32}, month = {January}, date = {2013-01-30}, note = "\url{https://m.scirp.org/papers/27549} ; \url{https://www.scirp.org/Journal/PaperDownload.aspx?paperID=27549} ; \url{http://eprints.utem.edu.my/6777/} ; \url{https://file.scirp.org/Html/4-7800122_27549.htm} ; \url{https://file.scirp.org/pdf/JIS_2013013014233287.pdf} ; \url{https://www.scirp.org/journal/PaperInformation.aspx?paperID=27549}", url = {https://lens.org/068-931-665-572-533} } @article{lens.org/069-051-070-055-052, author = {Ruuhwan Ruuhwan and Riadi and Yudi Prayudi}, title = {Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone}, journal = {Jurnal Edukasi dan Penelitian Informatika (JEPIN)}, year = {2016}, volume = {2}, number = {1}, month = {March}, doi = {10.26418/jp.v2i1.14369}, date = {2016-03-11}, note = "\url{https://doaj.org/article/454dedfda585445eb288e74b545be9b4} ; \url{https://core.ac.uk/display/88097479} ; \url{https://core.ac.uk/download/pdf/294889013.pdf}", url = {https://lens.org/069-051-070-055-052} } @article{lens.org/069-073-265-694-871, author = {Nick Pringle and Mikhaila Burgess}, title = {Information assurance in a distributed forensic cluster}, journal = {Digital Investigation}, year = {2014}, volume = {11}, pages = {S36--S44}, doi = {10.1016/j.diin.2014.03.005}, note = "\url{http://www.sciencedirect.com/science/article/pii/S1742287614000103} ; \url{https://doi.org/10.1016/j.diin.2014.03.005} ; \url{https://core.ac.uk/display/81935556} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287614000103} ; \url{https://core.ac.uk/download/pdf/81935556.pdf}", url = {https://lens.org/069-073-265-694-871} } @article{lens.org/069-164-282-798-000, author = {Marthie Grobler}, title = {The Need for Digital Evidence Standardisation}, journal = {International Journal of Digital Crime and Forensics}, year = {2012}, volume = {4}, number = {2}, pages = {1--12}, month = {April}, doi = {10.4018/jdcf.2012040101}, date = {2012-04-01}, note = "\url{https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf4.html#Grobler12} ; \url{https://www.igi-global.com/article/need-digital-evidence-standardisation/68406} ; \url{https://doi.org/10.4018/jdcf.2012040101}", url = {https://lens.org/069-164-282-798-000} } @article{lens.org/069-316-073-411-914, author = {Tao Biaoli and Rangding Wang and Diqun Yan and Chao Jin}, title = {Anti-Forensics of Double Compressed MP3 Audio}, journal = {International Journal of Digital Crime and Forensics}, year = {2020}, volume = {12}, number = {3}, pages = {45--57}, month = {July}, doi = {10.4018/ijdcf.2020070104}, date = {2020-07-01}, note = "\url{https://www.igi-global.com/article/anti-forensics-of-double-compressed-mp3-audio/252867} ; \url{https://doi.org/10.4018/IJDCF.2020070104} ; \url{https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf12.html#TaoWYJ20}", url = {https://lens.org/069-316-073-411-914} } @article{lens.org/069-321-740-091-392, author = {Nurul Huda Nik Zulkipli and Gary Wills}, title = {An Exploratory Study on Readiness Framework in IoT Forensics}, journal = {Procedia Computer Science}, year = {2021}, volume = {179}, pages = {966--973}, doi = {10.1016/j.procs.2021.01.086}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1877050921001186}", url = {https://lens.org/069-321-740-091-392} } @article{lens.org/069-494-497-864-636, author = {Jaime Lee Kirtz}, title = {Computers, Comics and Cult Status: A Forensics of Digital Graphic Novels.}, journal = {Digital Humanities Quarterly}, year = {2014}, volume = {8}, note = "\url{http://www.digitalhumanities.org/dhq/vol/8/3/000185/000185.html} ; \url{https://dblp.uni-trier.de/db/journals/dhq/dhq8.html#Kirtz14}", url = {https://lens.org/069-494-497-864-636} } @article{lens.org/069-498-762-346-193, author = {Mohamad Ahtisham Wani and Ali Alzahrani and Wasim Ahmad Bhat}, title = {File system anti-forensics - types, techniques and tools}, journal = {Computer Fraud \& Security}, year = {2020}, volume = {2020}, number = {3}, pages = {14--19}, doi = {10.1016/s1361-3723(20)30030-0}, note = "\url{https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002238962924261} ; \url{https://www.sciencedirect.com/science/article/pii/S1361372320300300}", url = {https://lens.org/069-498-762-346-193} } @article{lens.org/069-546-445-063-10X, author = {Jun Zhang and Lina Wang}, title = {An integrated open forensic environment for digital evidence investigation}, journal = {Wuhan University Journal of Natural Sciences}, year = {2012}, volume = {17}, number = {6}, pages = {511--515}, month = {November}, doi = {10.1007/s11859-012-0879-3}, date = {2012-11-14}, note = "\url{https://link.springer.com/article/10.1007/s11859-012-0879-3} ; \url{https://link.springer.com/content/pdf/10.1007%2Fs11859-012-0879-3.pdf}", url = {https://lens.org/069-546-445-063-10X} } @article{lens.org/069-553-351-193-961, author = {Kyoung Jea Park and Jung Min Park and Eun-jin Kim and Chang Geun Cheon and Joshua I. James}, title = {Anti-Forensic Trace Detection in Digital Forensic Triage Investigations}, journal = {Journal of Digital Forensics, Security and Law}, year = {2017}, volume = {12}, number = {1}, pages = {8--}, doi = {10.15394/jdfsl.2017.1421}, note = "\url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1421&context=jdfsl} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#ParkPKCJ17} ; \url{https://commons.erau.edu/jdfsl/vol12/iss1/8/} ; \url{https://paperity.org/p/84036003/anti-forensic-trace-detection-in-digital-forensic-triage-investigations}", url = {https://lens.org/069-553-351-193-961} } @article{lens.org/069-884-249-384-899, author = {Graeme Horsman}, title = {Digital evidence and the crime scene.}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2021}, volume = {61}, number = {6}, pages = {761--770}, month = {October}, doi = {10.1016/j.scijus.2021.10.003}, date = {2021-10-06}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1355030621001295}", url = {https://lens.org/069-884-249-384-899} } @article{lens.org/070-308-945-671-285, author = {Floris Gisolf and Pelle Barens and Ewald Snel and Anwar Malgoezar and Mark Vos and Arjan Mieremet and Zeno Geradts}, title = {Common source identification of images in large databases.}, journal = {Forensic science international}, year = {2014}, volume = {244}, pages = {222--230}, month = {September}, doi = {10.1016/j.forsciint.2014.08.034}, date = {2014-09-08}, note = "\url{https://core.ac.uk/display/132739751} ; \url{https://www.sciencedirect.com/science/article/pii/S0379073814003612} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/25279802} ; \url{https://europepmc.org/abstract/MED/25279802} ; \url{https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F6c4763b4-21b8-4d87-878d-5d8ab85c132d} ; \url{http://www.sciencedirect.com/science/article/pii/S0379073814003612}", url = {https://lens.org/070-308-945-671-285} } @article{lens.org/070-345-535-736-050, author = {Desti Mualfah and Rizdqi Akbar Ramadhan}, title = {Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital}, journal = {Digital Zone: Jurnal Teknologi Informasi dan Komunikasi}, year = {2020}, volume = {11}, number = {2}, pages = {257--267}, month = {November}, doi = {10.31849/digitalzone.v11i2.5174}, date = {2020-11-07}, note = "\url{https://journal.unilak.ac.id/index.php/dz/article/download/5174/2493}", url = {https://lens.org/070-345-535-736-050} } @article{lens.org/070-378-356-319-383, author = {Filipo Sharevski}, title = {Rules of professional responsibility in digital forensics: A comparative analysis}, journal = {Journal of Digital Forensics, Security and Law}, year = {2015}, volume = {10}, number = {2}, pages = {39--54}, doi = {10.15394/jdfsl.2015.1201}, note = "\url{https://repository.globethics.net/handle/20.500.12424/871090} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1201&context=jdfsl} ; \url{https://commons.erau.edu/jdfsl/vol10/iss2/3/}", url = {https://lens.org/070-378-356-319-383} } @article{lens.org/070-387-550-064-219, author = {Hui Wei and Gao-bo Yang and Ming Xia}, title = {A Digital Video Tampering Forensics Scheme Based on Forensics Hash: A Digital Video Tampering Forensics Scheme Based on Forensics Hash}, journal = {Journal of Electronics \& Information Technology}, year = {2014}, volume = {35}, number = {12}, pages = {2934--2941}, month = {February}, doi = {10.3724/sp.j.1146.2013.00296}, date = {2014-02-23}, note = "\url{http://pub.chinasciencejournal.com/article/getArticleRedirect.action?doiCode=10.3724/SP.J.1146.2013.00296}", url = {https://lens.org/070-387-550-064-219} } @article{lens.org/070-954-300-168-750, author = {Fietyata Yudha and Erika Ramadhani and R M Komaryan}, title = {A Prototype of Portable Digital Forensics Imaging Tools using Raspberry Device}, journal = {IOP Conference Series: Materials Science and Engineering}, year = {2021}, volume = {1077}, number = {1}, pages = {012064--}, month = {February}, doi = {10.1088/1757-899x/1077/1/012064}, date = {2021-02-01}, note = "\url{https://iopscience.iop.org/article/10.1088/1757-899X/1077/1/012064/pdf} ; \url{https://iopscience.iop.org/article/10.1088/1757-899X/1077/1/012064/meta} ; \url{https://ui.adsabs.harvard.edu/abs/2021MS&E.1077a2064Y/abstract}", url = {https://lens.org/070-954-300-168-750} } @article{lens.org/070-967-295-350-189, author = {Bhupendra Singh and Upasna Singh}, title = {Leveraging the Windows Amcache.hve File in Forensic Investigations}, journal = {Journal of Digital Forensics, Security and Law}, year = {2016}, volume = {11}, number = {4}, pages = {7--}, doi = {10.15394/jdfsl.2016.1429}, note = "\url{https://paperity.org/p/84051288/leveraging-the-windows-amcache-hve-file-in-forensic-investigations} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#SinghS16} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1429&context=jdfsl} ; \url{https://commons.erau.edu/jdfsl/vol11/iss4/7/} ; \url{https://doi.org/10.15394/jdfsl.2016.1429}", url = {https://lens.org/070-967-295-350-189} } @article{lens.org/071-061-776-249-765, author = {Athanasios Dimitriadis and Nenad Ivezic and Boonserm Kulvatunyou and Ioannis Mavridis}, title = {D4I - Digital forensics framework for reviewing and investigating cyber attacks}, journal = {Array (New York, N.Y.)}, year = {2020}, volume = {5}, pages = {100015--}, doi = {10.1016/j.array.2019.100015}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2590005619300153} ; \url{https://doi.org/10.1016/j.array.2019.100015} ; \url{http://www.sciencedirect.com/science/article/pii/S2590005619300153}", url = {https://lens.org/071-061-776-249-765} } @article{lens.org/071-182-359-615-008, author = {Graeme Horsman}, title = {Technical reporting in digital forensics.}, journal = {Journal of forensic sciences}, year = {2022}, month = {August}, doi = {10.1111/1556-4029.15108}, date = {2022-08-15}, url = {https://lens.org/071-182-359-615-008} } @article{lens.org/071-328-509-813-202, author = {Sengul Dogan and Erhan Akbal and Turker Tuncer}, title = {A novel ternary and signum kernelled linear hexadecimal pattern and hybrid feature selection based environmental sound classification method}, journal = {Measurement}, year = {2020}, volume = {166}, pages = {108151--}, doi = {10.1016/j.measurement.2020.108151}, note = "\url{https://www.sciencedirect.com/science/article/pii/S0263224120306898} ; \url{https://ui.adsabs.harvard.edu/abs/2020Meas..16608151D/abstract}", url = {https://lens.org/071-328-509-813-202} } @article{lens.org/071-363-969-812-87X, author = {Anju Bhatt and Vaishali Ajugiya and Deepika Bhandari and Neeta Khobragade}, title = {Forensic Significance of Cardiac Implantable Device (Pacemaker)}, journal = {International Journal of Scientific Research in Science, Engineering and Technology}, year = {2019}, volume = {6}, number = {3}, pages = {340--345}, month = {May}, doi = {10.32628/ijsrset196369}, date = {2019-05-20}, note = "\url{http://ijsrset.com/paper/5932.pdf}", url = {https://lens.org/071-363-969-812-87X} } @article{lens.org/071-606-104-599-241, author = {Moh Fadly Panende and Riadi and Yudi Prayudi}, title = {KONSEP ATTRIBUTE BASED ACCESS CONTROL (ABAC) PADA LEMARI PENYIMPANAN BUKTI DIGITAL (LPBD)}, journal = {JURNAL TEKNIK INFORMATIKA}, year = {2018}, volume = {11}, number = {1}, pages = {85--94}, month = {May}, doi = {10.15408/jti.v11i1.7220}, date = {2018-05-04}, note = "\url{http://journal.uinjkt.ac.id/index.php/ti/article/download/7220/pdf} ; \url{http://journal.uinjkt.ac.id/index.php/ti/article/view/7220} ; \url{https://core.ac.uk/download/pdf/290103868.pdf}", url = {https://lens.org/071-606-104-599-241} } @article{lens.org/071-788-675-518-847, author = {Neetu Singh and Abhinav Gupta and R C Jain}, title = {Adaptive Histogram Equalization Based Image Forensics Using Statistics of DC DCT Coefficients}, journal = {Advances in Electrical and Electronic Engineering}, year = {2018}, volume = {16}, number = {1}, pages = {125--134}, month = {April}, doi = {10.15598/aeee.v16i1.2647}, date = {2018-04-02}, note = "\url{http://advances.utc.sk/index.php/AEEE/article/view/2647} ; \url{http://advances.vsb.cz/index.php/AEEE/article/view/2647} ; \url{https://core.ac.uk/display/153610502} ; \url{https://core.ac.uk/download/161961697.pdf}", url = {https://lens.org/071-788-675-518-847} } @article{lens.org/071-880-034-878-967, author = {Mohammad Hassan and Ghassan Samara and Mohammad Fadda}, title = {IoT Forensic Frameworks (DFIF, IoTDOTS, FSAIoT): A Comprehensive Study}, journal = {International Journal of Advances in Soft Computing and its Applications}, year = {2022}, volume = {14}, number = {1}, pages = {73--83}, month = {March}, doi = {10.15849/ijasca.220328.06}, date = {2022-03-28}, url = {https://lens.org/071-880-034-878-967} } @article{lens.org/071-917-972-399-010, author = {Rauhulloh Noor Bintang and Rusydi Umar and Anton Yudhana}, title = {Assess of Forensic Tools on Android Based Facebook Lite with the NIST Method}, journal = {Scientific Journal of Informatics}, year = {2021}, volume = {8}, number = {1}, pages = {1--9}, month = {May}, doi = {10.15294/sji.v8i1.26744}, date = {2021-05-10}, note = "\url{https://journal.unnes.ac.id/nju/index.php/sji/article/view/26744} ; \url{https://journal.unnes.ac.id/nju/index.php/sji/article/download/26744/pdf}", url = {https://lens.org/071-917-972-399-010} } @article{lens.org/071-968-102-950-243, author = {Angus M. Marshall}, title = {Digital forensic tool verification: An evaluation of options for establishing trustworthiness}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301181--}, doi = {10.1016/j.fsidi.2021.301181}, note = "\url{https://doi.org/10.1016/j.fsidi.2021.301181} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S2666281721000895}", url = {https://lens.org/071-968-102-950-243} } @article{lens.org/071-971-352-667-536, author = {Jian Wang and Zhen Min Tang and Xian Li Jin}, title = {An OCL-Based Formal Model for Cloud Forensics}, journal = {Advanced Materials Research}, year = {2014}, volume = {989-994}, pages = {1513--1516}, doi = {10.4028/www.scientific.net/amr.989-994.1513}, note = "\url{https://zh.scientific.net/AMR.989-994.1513.pdf} ; \url{https://www.scientific.net/AMR.989-994.1513}", url = {https://lens.org/071-971-352-667-536} } @article{lens.org/072-152-153-447-327, author = {Graeme Horsman}, title = {Digital tool marks (DTMs): a forensic analysis of file wiping software}, journal = {Australian Journal of Forensic Sciences}, year = {2019}, volume = {53}, number = {1}, pages = {96--111}, month = {July}, doi = {10.1080/00450618.2019.1640793}, date = {2019-07-29}, note = "\url{https://www.tandfonline.com/doi/full/10.1080/00450618.2019.1640793} ; \url{https://research.tees.ac.uk/en/publications/digital-tool-marks-dtms-a-forensic-analysis-of-file-wiping-softwa} ; \url{https://research.tees.ac.uk/ws/files/8363337/DTMs.pdf}", url = {https://lens.org/072-152-153-447-327} } @article{lens.org/072-424-254-968-179, author = {Arjun Chetry and Moutan Sarkar}, title = {Mobile Forensics And Its Challenges}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.07}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.07}", url = {https://lens.org/072-424-254-968-179} } @article{lens.org/072-934-978-048-044, author = {Sandeepak Bhandari and Vacius Jusas}, title = {An Ontology Based on the Timeline of Log2timeline and Psort Using Abstraction Approach in Digital Forensics}, journal = {Symmetry}, year = {2020}, volume = {12}, number = {4}, pages = {642--}, month = {April}, doi = {10.3390/sym12040642}, date = {2020-04-17}, note = "\url{https://dblp.uni-trier.de/db/journals/symmetry/symmetry12.html#BhandariJ20a} ; \url{http://ui.adsabs.harvard.edu/abs/2020Symm...12..642B/abstract} ; \url{https://www.mdpi.com/2073-8994/12/4/642}", url = {https://lens.org/072-934-978-048-044} } @article{lens.org/073-052-923-626-654, author = {Yugal Pathak}, title = {Unfurl: An Entropy-Based Link Vulnerability Analysis}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.09}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.09}", url = {https://lens.org/073-052-923-626-654} } @article{lens.org/073-175-569-296-743, author = {Shivani Rai}, title = {Drone/UAV and Its Forensics Aspects}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {February}, doi = {10.46293/4n6/2021.03.01.02}, date = {2021-02-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.01.02}", url = {https://lens.org/073-175-569-296-743} } @article{lens.org/073-771-451-612-879, author = {Subekti Ningsih and Riadi Yudi Prayudi}, title = {Digital Forensics Workflow as A Mapping Model for People, Evidence, and Process in Digital Investigation}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {3}, pages = {294--304}, doi = {10.17781/p002463}, note = "\url{http://sdiwc.net/digital-library/digital-forensics-workflow-as-a-mapping-model-for-people-evidence-and-process-in-digital-investigation}", url = {https://lens.org/073-771-451-612-879} } @article{lens.org/073-790-480-897-758, author = {Graeme Horsman}, title = {Digital Evidence Certainty Descriptors (DECDs)}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {200896--}, doi = {10.1016/j.fsidi.2019.200896}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1742287619303123}", url = {https://lens.org/073-790-480-897-758} } @article{lens.org/073-997-683-020-831, author = {Didik Sudyana and Bambang Sugiantoro Yudi Prayudi}, title = {ANALYSIS AND EVALUATION DIGITAL FORENSIC INVESTIGATION FRAMEWORK USING ISO 27037:2012}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2019}, volume = {8}, number = {1}, pages = {1--14}, doi = {10.17781/p002464}, note = "\url{http://sdiwc.net/digital-library/analysis-and-evaluation-digital-forensic-investigation-framework-using-iso-270372012}", url = {https://lens.org/073-997-683-020-831} } @article{lens.org/074-136-192-673-661, author = {Tanmayee Tilekar}, title = {The Conceivability And Admissibility Of Forensic Evidence from IoT Devices in Digital Forensics}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, pages = {53--54}, month = {May}, doi = {10.46293/4n6/2020.02.02.10}, date = {2020-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.02.10}", url = {https://lens.org/074-136-192-673-661} } @article{lens.org/074-191-841-979-727, author = {Suchitra Das}, title = {AI and IoT: Empowering Things with Intelligence}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {February}, doi = {10.46293/4n6/2021.03.01.10}, date = {2021-02-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.01.10}", url = {https://lens.org/074-191-841-979-727} } @article{lens.org/074-271-546-742-17X, author = {Simson L. Garfinkel}, title = {The prevalence of encoded digital trace evidence in the nonfile space of computer media(}, journal = {Journal of forensic sciences}, year = {2014}, volume = {59}, number = {5}, pages = {1386--1393}, month = {July}, doi = {10.1111/1556-4029.12528}, date = {2014-07-23}, note = "\url{https://europepmc.org/article/PMC/PMC4263158} ; \url{https://core.ac.uk/display/36736445} ; \url{http://simson.net/clips/academic/2014.JOFS.EncodedData.pdf} ; \url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4263158} ; \url{https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.12528} ; \url{https://onlinelibrary.wiley.com/doi/pdf/10.1111/1556-4029.12528}", url = {https://lens.org/074-271-546-742-17X} } @article{lens.org/074-388-397-687-048, author = {Hoyt Harness}, title = {Magnet Axiom And APFS}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.14}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.14}", url = {https://lens.org/074-388-397-687-048} } @article{lens.org/074-665-155-258-112, author = {Jun Woo Shin}, title = {A Technology-Strategy Integrated Digital Forensic Process Framework Considering Government ICT R\&D Strategy and ICT Paradigm Shift}, journal = {Journal of the Korea Institute of Information and Communication Engineering}, year = {2014}, volume = {18}, number = {7}, pages = {1495--1504}, month = {July}, doi = {10.6109/jkiice.2014.18.7.1495}, date = {2014-07-31}, note = "\url{http://society.kisti.re.kr/sv/SV_svpsbs03V.do?method=download&cn1=JAKO201423261321915} ; \url{http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=HOJBC0_2014_v18n7_1495} ; \url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001897094} ; \url{http://www.kpubs.org/article/articleMain.kpubs?articleANo=HOJBC0_2014_v18n7_1495}", url = {https://lens.org/074-665-155-258-112} } @article{lens.org/074-706-219-689-754, author = {Dana Wilson-Kovacs}, title = {Effective resource management in digital forensics: An exploratory analysis of triage practices in four English constabularies}, journal = {Policing: An International Journal}, year = {2019}, volume = {43}, number = {1}, pages = {77--90}, month = {December}, doi = {10.1108/pijpsm-07-2019-0126}, date = {2019-12-04}, note = "\url{https://ore.exeter.ac.uk/repository/handle/10871/40462?show=full} ; \url{https://www.emerald.com/insight/content/doi/10.1108/PIJPSM-07-2019-0126/full/html} ; \url{https://ore.exeter.ac.uk/repository/bitstream/10871/40462/1/wilson-kovacs%202019%20triage.pdf} ; \url{https://www.emerald.com/insight/content/doi/10.1108/PIJPSM-07-2019-0126/full/pdf?title=effective-resource-management-in-digital-forensics-an-exploratory-analysis-of-triage-practices-in-four-english-constabularies} ; \url{https://core.ac.uk/download/286383577.pdf}", url = {https://lens.org/074-706-219-689-754} } @article{lens.org/074-708-645-166-402, author = {Wei Liu and Wen Liang Duan and Zhihong Tian and Dong Lan}, title = {The General Digital Forensics Technologies Based on Linux}, journal = {Applied Mechanics and Materials}, year = {2014}, volume = {644-650}, pages = {1992--1997}, doi = {10.4028/www.scientific.net/amm.644-650.1992}, note = "\url{https://www.scientific.net/AMM.644-650.1992}", url = {https://lens.org/074-708-645-166-402} } @article{lens.org/074-852-255-750-108, author = {Tae-Yi Kang and Joong Lee}, title = {Multiform Korean handwriting authentication by forensic document examiners}, journal = {Forensic science international}, year = {2015}, volume = {255}, pages = {133--136}, month = {July}, doi = {10.1016/j.forsciint.2015.07.002}, date = {2015-07-10}, note = "\url{https://www.ncbi.nlm.nih.gov/pubmed/26205671} ; \url{https://www.sciencedirect.com/science/article/pii/S0379073815002704} ; \url{https://europepmc.org/article/MED/26205671} ; \url{https://pubag.nal.usda.gov/catalog/5526185}", url = {https://lens.org/074-852-255-750-108} } @article{lens.org/075-119-005-863-649, author = {Valentine Machaka and Titus Balan}, title = {Investigating Proactive Digital Forensics Leveraging Adversary Emulation}, journal = {Applied Sciences}, year = {2022}, volume = {12}, number = {18}, pages = {9077--9077}, month = {September}, doi = {10.3390/app12189077}, date = {2022-09-09}, url = {https://lens.org/075-119-005-863-649} } @article{lens.org/075-171-904-217-913, author = {Gary C. Kessler}, title = {Advancing the Science of Digital Forensics}, journal = {Computer}, year = {2012}, volume = {45}, number = {12}, pages = {25--27}, doi = {10.1109/mc.2012.399}, note = "\url{https://www.computer.org/csdl/magazine/co/2012/12/mco2012120025/13rRUxly9hk} ; \url{https://ieeexplore.ieee.org/document/6383155/} ; \url{https://www.computer.org/csdl/api/v1/periodical/mags/co/2012/12/mco2012120025/13rRUxly9hk/download-article/pdf} ; \url{https://dl.acm.org/doi/abs/10.1109/MC.2012.399} ; \url{http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000006383155} ; \url{https://works.bepress.com/gary_kessler/19/} ; \url{https://dblp.uni-trier.de/db/journals/computer/computer45.html#Kessler12a} ; \url{https://www.infona.pl/resource/bwmeta1.element.ieee-art-000006383155} ; \url{http://dblp.uni-trier.de/db/journals/computer/computer45.html#Kessler12a}", url = {https://lens.org/075-171-904-217-913} } @article{lens.org/075-292-269-073-172, author = {Philipp Amann and Joshua I. James}, title = {Designing robustness and resilience in digital investigation laboratories}, journal = {Digital Investigation}, year = {2015}, volume = {12}, pages = {S111--S120}, doi = {10.1016/j.diin.2015.01.015}, note = "\url{https://www.sciencedirect.com/science/article/pii/S174228761500016X} ; \url{https://core.ac.uk/display/82404286} ; \url{https://dblp.uni-trier.de/db/journals/di/di12.html#AmannJ15} ; \url{https://doi.org/10.1016/j.diin.2015.01.015} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S174228761500016X}", url = {https://lens.org/075-292-269-073-172} } @article{lens.org/075-517-412-509-659, author = {Georgina Sauzier and Mubarak A. Bidmos and Graeme Horsman}, title = {Bolstering forensic science through extended knowledge sharing}, journal = {Forensic Science International: Reports}, year = {2019}, volume = {1}, pages = {100010--}, doi = {10.1016/j.fsir.2019.100010}, note = "\url{https://research.tees.ac.uk/en/publications/bolstering-forensic-science-through-extended-knowledge-sharing} ; \url{https://research.tees.ac.uk/ws/files/8720491/Bolstering_Forensic_Science_Through_Extended_Knowledge_Sharing.pdf} ; \url{https://core.ac.uk/download/pdf/228323040.pdf}", url = {https://lens.org/075-517-412-509-659} } @article{lens.org/075-529-701-912-32X, author = {Joshua I. James and Pavel Gladyshev}, title = {A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview}, journal = {Digital Investigation}, year = {2013}, volume = {10}, number = {2}, pages = {148--157}, doi = {10.1016/j.diin.2013.04.005}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di10.html#JamesG13} ; \url{http://www.sciencedirect.com/science/article/pii/S1742287613000340} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287613000340} ; \url{https://doi.org/10.1016/j.diin.2013.04.005} ; \url{http://dblp.uni-trier.de/db/journals/di/di10.html#JamesG13}", url = {https://lens.org/075-529-701-912-32X} } @article{lens.org/075-751-664-637-230, author = {Joel McKim}, title = {Speculative Animation: Digital Projections of Urban Past and Future:}, journal = {Animation}, year = {2017}, volume = {12}, number = {3}, pages = {287--305}, month = {November}, doi = {10.1177/1746847717729581}, date = {2017-11-29}, note = "\url{https://core.ac.uk/display/84144569} ; \url{https://journals.sagepub.com/doi/full/10.1177/1746847717729581} ; \url{https://core.ac.uk/download/84144569.pdf}", url = {https://lens.org/075-751-664-637-230} } @article{lens.org/075-857-959-319-796, author = {null FrancoisAlicia and null NisbetAlastair}, title = {Forensic analysis and data recovery from water-submerged hard drives}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2021}, volume = {13}, number = {2}, pages = {219--}, doi = {10.1504/ijesdf.2021.113374}, note = "\url{https://dl.acm.org/doi/10.1504/ijesdf.2021.113374}", url = {https://lens.org/075-857-959-319-796} } @article{lens.org/075-872-921-268-845, author = {Jin Du and Ding Liping and Guangxuan Chen}, title = {Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings}, journal = {International Journal of Digital Crime and Forensics}, year = {2020}, volume = {12}, number = {3}, pages = {111--121}, month = {July}, doi = {10.4018/ijdcf.2020070108}, date = {2020-07-01}, note = "\url{https://doi.org/10.4018/IJDCF.2020070108} ; \url{https://www.igi-global.com/article/research-on-the-rules-of-electronic-evidence-in-chinese-criminal-proceedings/252871} ; \url{https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf12.html#DuDC20}", url = {https://lens.org/075-872-921-268-845} } @article{lens.org/075-950-021-558-098, author = {Graeme Horsman}, title = {"I couldn't find it your honour, it mustn't be there!" - Tool errors, tool limitations and user error in digital forensics.}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2018}, volume = {58}, number = {6}, pages = {433--440}, month = {April}, doi = {10.1016/j.scijus.2018.04.001}, date = {2018-04-17}, note = "\url{https://www.ncbi.nlm.nih.gov/pubmed/30446072} ; \url{https://research.tees.ac.uk/ws/files/4187177/621947.pdf} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1355030617301508} ; \url{https://core.ac.uk/display/157860311} ; \url{https://research.tees.ac.uk/en/publications/i-couldnt-find-it-your-honour-it-mustnt-be-there-tool-errors-tool} ; \url{https://pubmed.ncbi.nlm.nih.gov/30446072/} ; \url{https://core.ac.uk/download/pdf/196165647.pdf}", url = {https://lens.org/075-950-021-558-098} } @article{lens.org/076-508-293-079-677, author = {Eric Gentry and Michael Soltys}, title = {KES - SEAKER: A mobile digital forensics triage device}, journal = {Procedia Computer Science}, year = {2019}, volume = {159}, pages = {1652--1661}, doi = {10.1016/j.procs.2019.09.335}, note = "\url{https://doi.org/10.1016/j.procs.2019.09.335} ; \url{https://dblp.uni-trier.de/db/conf/kes/kes2019.html#GentryS19} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1877050919315364} ; \url{https://www.sciencedirect.com/science/article/pii/S1877050919315364}", url = {https://lens.org/076-508-293-079-677} } @article{lens.org/076-526-517-597-73X, author = {Erika Ramadhani and H R Pratama and Elyza Gustri Wahyuni}, title = {Web-based expert system to determine digital forensics tool using rule-based reasoning approach}, journal = {Journal of Physics: Conference Series}, year = {2021}, volume = {1918}, number = {4}, pages = {042003--}, month = {June}, doi = {10.1088/1742-6596/1918/4/042003}, date = {2021-06-01}, note = "\url{https://iopscience.iop.org/article/10.1088/1742-6596/1918/4/042003} ; \url{https://iopscience.iop.org/article/10.1088/1742-6596/1918/4/042003/pdf} ; \url{https://ui.adsabs.harvard.edu/abs/2021JPhCS1918d2003R/abstract}", url = {https://lens.org/076-526-517-597-73X} } @article{lens.org/076-689-787-688-443, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301293--301293}, doi = {10.1016/s2666-2817(21)00211-0}, url = {https://lens.org/076-689-787-688-443} } @article{lens.org/076-736-545-734-215, author = {Shareeful Islam and Benjamin Aziz and Clive Blackwell}, title = {A Framework for Digital Forensics and Investigations: The Goal-Driven Approach}, journal = {International Journal of Digital Crime and Forensics}, year = {2013}, volume = {5}, number = {2}, pages = {1--22}, month = {April}, doi = {10.4018/jdcf.2013040101}, date = {2013-04-01}, note = "\url{https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf5.html#AzizBI13} ; \url{https://researchportal.port.ac.uk/portal/en/publications/a-framework-for-digital-forensics-and-investigations-the-goaldriven-approach(922b64de-7919-4f1a-8313-3455bd3edb36)/export.html} ; \url{https://dl.acm.org/doi/10.4018/jdcf.2013040101} ; \url{https://www.igi-global.com/article/a-framework-for-digital-forensics-and-investigations/83486}", url = {https://lens.org/076-736-545-734-215} } @article{lens.org/076-753-080-882-502, author = {Mubarak Al-Hadadi and Ali AlShidhani}, title = {Smartphone Forensics Analysis: A Case Study}, journal = {International Journal of Computer and Electrical Engineering}, year = {2013}, pages = {576--580}, doi = {10.7763/ijcee.2013.v5.776}, note = "\url{http://www.ijcee.org/index.php?m=content&c=index&a=show&catid=55&id=860} ; \url{http://ijcee.org/papers/776-S0005.pdf}", url = {https://lens.org/076-753-080-882-502} } @article{lens.org/076-771-386-025-262, author = {Barkha Shree and Parneeta Dhaliwal}, title = {Behavioural Evidence Analysis: A Paradigm Shift in Digital Forensics}, journal = {International Journal of Digital Crime and Forensics}, year = {2021}, volume = {13}, number = {5}, pages = {20--42}, doi = {10.4018/ijdcf.20210901.oa2}, note = "\url{https://www.igi-global.com/article/behavioural-evidence-analysis/283125}", url = {https://lens.org/076-771-386-025-262} } @article{lens.org/076-989-753-469-554, author = {Radina Stoykova}, title = {The Presumption of Innocence as a Source for Universal Rules on Digital Evidence — The guiding principle for digital forensics in producing digital evidence for criminal investigations}, journal = {Computer Law Review International}, year = {2021}, volume = {22}, number = {3}, pages = {74--82}, month = {June}, doi = {10.9785/cri-2021-220303}, date = {2021-06-01}, url = {https://lens.org/076-989-753-469-554} } @article{lens.org/077-218-051-852-509, author = {Yao We}, title = {Cell Forensics on Smart Phone Installed Windows Phone 7 System}, journal = {Chinese Journal of Forensic Sciences}, year = {2014}, note = "\url{http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201404012.htm}", url = {https://lens.org/077-218-051-852-509} } @article{lens.org/077-240-805-787-039, author = {Sailaja Vadlamudi}, title = {The Rise of Bots And Their Security And Privacy Challenges and Best Practices}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.13}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.13}", url = {https://lens.org/077-240-805-787-039} } @article{lens.org/077-271-947-547-85X, author = {Danilo B. Seufitelli and Michele A. Brandão and Mirella M. Moro}, title = {Exploring the Intersection between Databases and Digital Forensics}, journal = {Journal of Information and Data Management}, year = {2022}, volume = {13}, number = {3}, month = {September}, doi = {10.5753/jidm.2022.2524}, date = {2022-09-21}, url = {https://lens.org/077-271-947-547-85X} } @article{lens.org/077-416-113-129-031, author = {Fahad Alanazi and Andrew Jones and Catherine Menon}, title = {Sharia Law and Digital Forensics in Saudi Arabia}, journal = {Journal of Digital Forensics, Security and Law}, year = {2018}, volume = {13}, number = {3}, pages = {5--20}, doi = {10.15394/jdfsl.2018.1568}, note = "\url{http://uhra.herts.ac.uk/bitstream/2299/21197/1/Sharia_Law_and_Digital_Forensics_in_Saudi_Arabia.pdf} ; \url{https://uhra.herts.ac.uk/handle/2299/21197} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl13.html#0002AM18} ; \url{https://commons.erau.edu/jdfsl/vol13/iss3/5/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1568&context=jdfsl} ; \url{https://doi.org/10.15394/jdfsl.2018.1568} ; \url{https://core.ac.uk/download/287581583.pdf}", url = {https://lens.org/077-416-113-129-031} } @article{lens.org/077-590-082-657-678, author = {Joshua I. James}, title = {MULTI-STAKEHOLDER CASE PRIORITIZATION IN DIGITAL INVESTIGATIONS}, journal = {Journal of Digital Forensics, Security and Law}, year = {2014}, volume = {9}, number = {2}, pages = {59--72}, doi = {10.15394/jdfsl.2014.1171}, note = "\url{https://core.ac.uk/display/91657098} ; \url{https://commons.erau.edu/jdfsl/vol9/iss2/6/} ; \url{https://paperity.org/p/84095326/multi-stakeholder-case-prioritization-in-digital-investigations} ; \url{https://doi.org/10.15394/jdfsl.2014.1171} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#James14} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1171&context=jdfsl}", url = {https://lens.org/077-590-082-657-678} } @article{lens.org/077-603-385-952-05X, author = {Ganthan Narayana Samy and Nurazean Maarop and Doris Hooi-Ten Wong and Fiza Abdul Rahim and Noor Hafizah Hassan and Sundresan Perumal and Pritheega Magalingam and Sameer Hasan Albakri}, title = {Proposed Proactive Digital Forensic Approach for Cloud Computing Environment}, journal = {International Journal of Engineering \& Technology}, year = {2018}, volume = {7}, number = {4}, pages = {12--15}, month = {October}, doi = {10.14419/ijet.v7i4.15.21362}, date = {2018-10-07}, note = "\url{https://pure.uniten.edu.my/en/publications/proposed-proactive-digital-forensic-approach-for-cloud-computing-} ; \url{https://www.sciencepubco.com/index.php/ijet/article/viewFile/21362/10122}", url = {https://lens.org/077-603-385-952-05X} } @article{lens.org/077-604-181-180-814, author = {Juan Bernardo Montoya-Mogollón and Sonia Maria Troitiño Rodriguez}, title = {The Diplomatic and Digital Forensic Science in Born-Digital Records: The Quest for Authenticity}, journal = {Journal of Integrated OMICS}, year = {2018}, volume = {8}, number = {1}, pages = {74--76}, month = {July}, doi = {10.5584/jiomics.v8i1.219}, date = {2018-07-01}, note = "\url{http://www.jiomics.com/index.php/jio/article/view/219} ; \url{http://dx.doi.org/10.5584/jiomics.v8i1.219}", url = {https://lens.org/077-604-181-180-814} } @article{lens.org/077-923-684-553-780, author = {Thomas Göbel and Stephan Maltan and Jan Türr and Harald Baier and Florian Mann}, title = {ForTrace - A holistic forensic data set synthesis framework}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301344--301344}, doi = {10.1016/j.fsidi.2022.301344}, url = {https://lens.org/077-923-684-553-780} } @article{lens.org/077-963-490-848-763, author = {Reza Montasari}, title = {A comprehensive digital forensic investigation process model}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2016}, volume = {8}, number = {4}, pages = {285--302}, doi = {10.1504/ijesdf.2016.079430}, note = "\url{https://pure.hud.ac.uk/en/publications/a-comprehensive-digital-forensic-investigation-process-model} ; \url{https://www.open-access.bcu.ac.uk/4549/} ; \url{https://cronfa.swan.ac.uk/Record/cronfa54939} ; \url{https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2016.079430} ; \url{https://dl.acm.org/doi/10.1504/IJESDF.2016.079430} ; \url{https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf8.html#Montasari16a} ; \url{https://dl.acm.org/citation.cfm?id=3004918}", url = {https://lens.org/077-963-490-848-763} } @article{lens.org/078-095-922-471-787, author = {Victor R. Kebande and Nickson M. Karie Lindiwe M. Maake}, title = {Onto-Engineering: A Conceptual framework for Integrating Requirement Engineering Process with scientifically tuned Digital Forensics Ontologies}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2017}, volume = {6}, number = {2}, pages = {73--83}, doi = {10.17781/p002271}, note = "\url{http://sdiwc.net/digital-library/ontoengineering-a-conceptual-framework-for-integrating-requirement-engineering-process-with-scientifically-tuned-digital-forensics-ontologies}", url = {https://lens.org/078-095-922-471-787} } @article{lens.org/078-187-982-222-182, author = {Rand Swartz}, title = {Book Review: Digital Forensics Trial Graphics: Teaching the Jury through Effective Use of Visuals:}, journal = {Academic Forensic Pathology}, year = {2017}, volume = {7}, number = {3}, pages = {xii--xiii}, month = {September}, doi = {10.1177/192536211700700304}, date = {2017-09-01}, note = "\url{https://journals.sagepub.com/doi/abs/10.1177/192536211700700304}", url = {https://lens.org/078-187-982-222-182} } @article{lens.org/078-327-902-374-330, author = {Anthony Lang and Masooda Bashir and Roy H. Campbell and Lizanne DeStefano}, title = {Developing a new digital forensics curriculum}, journal = {Digital Investigation}, year = {2014}, volume = {11}, pages = {S76--S84}, doi = {10.1016/j.diin.2014.05.008}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1742287614000516} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287614000516} ; \url{https://experts.illinois.edu/en/publications/developing-a-new-digital-forensics-curriculum} ; \url{http://www.sciencedirect.com/science/article/pii/S1742287614000516}", url = {https://lens.org/078-327-902-374-330} } @article{lens.org/078-451-188-373-346, author = {HE Yi-hui}, title = {Research onTort Forensics Method Based on Asymmetric Watermarking}, journal = {Computer Simulation}, year = {2012}, note = "\url{http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJZ201210042.htm}", url = {https://lens.org/078-451-188-373-346} } @article{lens.org/078-481-282-973-45X, title = {TOWARDS ACHIEVING RELIABLE DIGITAL FORENSICS IN IAAS AND STAAS CLOUDS USING THE OPEN CLOUD FORENSICS MODEL}, journal = {Services Transactions on Cloud Computing}, year = {2016}, volume = {4}, number = {3}, doi = {10.29268/stcc.2016.4.3.2}, url = {https://lens.org/078-481-282-973-45X} } @article{lens.org/078-527-708-630-261, author = {Wei Ron}, title = {Digital Forensics on Screen Locked Android Smart Phone}, journal = {Chinese Journal of Forensic Sciences}, year = {2015}, note = "\url{http://en.cnki.com.cn/Article_en/CJFDTotal-SFJD201501015.htm}", url = {https://lens.org/078-527-708-630-261} } @article{lens.org/078-908-560-808-973, author = {S. Krishnan}, title = {Role and Impact of Digital Forensics in Cyber Crime Investigations}, journal = {INROADS- An International Journal of Jaipur National University}, year = {2019}, volume = {8}, number = {1and2}, pages = {64--75}, doi = {10.5958/2277-4912.2019.00012.2}, note = "\url{https://www.indianjournals.com/ijor.aspx?target=ijor:inroads&volume=8&issue=1and2&article=012}", url = {https://lens.org/078-908-560-808-973} } @article{lens.org/079-365-341-407-369, author = {Sanjeevani K. Shah and Punam Raskar}, title = {METHODS FOR FORGERY DETECTION IN DIGITAL FORENSICS}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2021}, volume = {1}, number = {1}, pages = {1--}, doi = {10.1504/ijesdf.2021.10035056}, url = {https://lens.org/079-365-341-407-369} } @article{lens.org/079-483-836-523-473, author = {Aliloulaye Tchaou}, title = {Phase-Oriented Advice and Review Structure (PARS) for Digital Forensic Investigations}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {173--180}, month = {July}, doi = {10.22624/aims/crp-bk3-p28}, date = {2022-07-26}, url = {https://lens.org/079-483-836-523-473} } @article{lens.org/079-499-568-978-91X, author = {Anton Yudhana and Riadi and Ikhwan Anshori}, title = {Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist}, journal = {IT JOURNAL RESEARCH AND DEVELOPMENT}, year = {2018}, volume = {3}, number = {1}, pages = {13--21}, month = {August}, doi = {10.25299/itjrd.2018.vol3(1).1658}, date = {2018-08-30}, note = "\url{http://journal.uir.ac.id/index.php/ITJRD/article/download/1658/1225} ; \url{https://core.ac.uk/download/pdf/322502217.pdf}", url = {https://lens.org/079-499-568-978-91X} } @article{lens.org/079-532-400-549-646, author = {Yasep Azzery and Nur Dwi Mulyanto and Taufik Hidayat}, title = {MEMORY FORENSIC DEVELOPMENT AND CHALLENGES IN IDENTIFYING DIGITAL CRIME : A REVIEW}, journal = {TEKNOKOM}, year = {2022}, volume = {5}, number = {1}, pages = {96--102}, month = {March}, doi = {10.31943/teknokom.v5i1.73}, date = {2022-03-02}, url = {https://lens.org/079-532-400-549-646} } @article{lens.org/079-624-398-794-48X, author = {Victor R. Kebande and Nickson M. Karie}, title = {A UML-Based Approach for Analysing Potential Digital Forensic Evidence}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {4}, pages = {354--362}, note = "\url{http://sdiwc.net/digital-library/a-umlbased-approach-for-analysing-potential-digital-forensic-evidence}", url = {https://lens.org/079-624-398-794-48X} } @article{lens.org/079-726-245-728-809, author = {Asanka Sayakkara and Nhien-An Le-Khac and Mark Scanlon}, title = {A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics}, journal = {Digital Investigation}, year = {2019}, volume = {29}, number = {1}, pages = {43--54}, doi = {10.1016/j.diin.2019.03.002}, note = "\url{https://www.markscanlon.co/papers/SurveyEMSideChannelsForensics.php} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287618303840} ; \url{https://ui.adsabs.harvard.edu/abs/2019arXiv190307703S/abstract} ; \url{https://markscanlon.co/papers/SurveyEMSideChannelsForensics.pdf} ; \url{http://arxiv.org/pdf/1903.07703.pdf} ; \url{https://doi.org/10.1016/j.diin.2019.03.002} ; \url{https://forensicsandsecurity.com/papers/SurveyEMSideChannelsForensics.php} ; \url{http://dblp.uni-trier.de/db/journals/corr/corr1903.html#abs-1903-07703} ; \url{https://forensicsandsecurity.com/papers/SurveyEMSideChannelsForensics.pdf} ; \url{https://arxiv.org/abs/1903.07703} ; \url{https://dblp.uni-trier.de/db/journals/corr/corr1903.html#abs-1903-07703} ; \url{http://arxiv.org/abs/1903.07703}", url = {https://lens.org/079-726-245-728-809} } @article{lens.org/080-282-279-211-788, author = {Arif Roid Caesarano and Riadi}, title = {Network Forensics for Detecting SQL Injection Attacks Using NIST Method}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {4}, pages = {436--443}, note = "\url{http://www.sdiwc.net/digital-library/network-forensics-for-detecting-sql-injection-attacks-using-nist-method.html}", url = {https://lens.org/080-282-279-211-788} } @article{lens.org/080-720-916-061-995, author = {Jasir Adel Altheyabi}, title = {The Digital Forensic Tools Accuracy and Specifications}, journal = {Academic Journal of Research and Scientific Publishing}, year = {2022}, volume = {3}, number = {35}, pages = {58--65}, month = {March}, doi = {10.52132/ajrsp.e.2022.35.3}, date = {2022-03-05}, url = {https://lens.org/080-720-916-061-995} } @article{lens.org/080-731-392-562-484, author = {Minseo Kim and Sang-jin Lee}, title = {Development of Windows forensic tool for verifying a set of data}, journal = {Journal of the Korea Institute of Information Security and Cryptology}, year = {2015}, volume = {25}, number = {6}, pages = {1421--1433}, month = {December}, doi = {10.13089/jkiisc.2015.25.6.1421}, date = {2015-12-31}, note = "\url{http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2015_v25n6_1421}", url = {https://lens.org/080-731-392-562-484} } @article{lens.org/080-788-467-889-236, author = {Oleg S. Kuchin and Yaroslava O. Kuchina}, title = {The Definition of Digital Criminalistics as the Origin of a Misleading Direction in Science. Part 2}, journal = {Legal education and science}, year = {2021}, volume = {3}, pages = {25--33}, month = {March}, doi = {10.18572/1813-1190-2021-3-25-33}, date = {2021-03-25}, note = "\url{http://dx.doi.org/10.18572/1813-1190-2021-3-25-33}", url = {https://lens.org/080-788-467-889-236} } @article{lens.org/081-140-064-081-587, author = {Nickson M. Karie and Victor R. Kebande}, title = {Building Ontologies for Digital Forensic Terminologies}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2016}, volume = {5}, number = {2}, pages = {75--82}, doi = {10.17781/p002032}, note = "\url{http://www.sdiwc.net/digital-library/building-ontologies-for-digital-forensic-terminologies.html}", url = {https://lens.org/081-140-064-081-587} } @article{lens.org/081-152-890-798-991, author = {Piotr Lewulis}, title = {Digital forensic standards and digital evidence in Polish criminal proceedings. An updated definition of digital evidence in forensic science}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2021}, volume = {13}, number = {1}, pages = {403--417}, doi = {10.1504/ijesdf.2021.10034988}, note = "\url{https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.116024}", url = {https://lens.org/081-152-890-798-991} } @article{lens.org/081-274-353-682-729, author = {Courtney Hassenfeldt and Jillian Jacques and Ibrahim Baggili}, title = {Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging \& Tagging of Digital Devices in Immersive Virtual Reality}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {301011--}, doi = {10.1016/j.fsidi.2020.301011}, note = "\url{https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1102&context=electricalcomputerengineering-facpubs} ; \url{https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/101/} ; \url{https://dfrws.org/wp-content/uploads/2020/10/2020_USA_paper-exploring_the_learning_efficacy_of_digital_forensics_concepts.pdf} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281720302602} ; \url{https://doi.org/10.1016/j.fsidi.2020.301011} ; \url{https://dfrws.org/presentation/is-my-digital-forensics-professor-better-in-virtual-reality-vr-exploring-learning-in-vr-versus-the-physical-world/}", url = {https://lens.org/081-274-353-682-729} } @article{lens.org/081-833-857-658-915, author = {Steve Watson and Ali Dehghantanha}, title = {Digital forensics : the missing piece of the internet of things promise}, journal = {Computer Fraud \& Security}, year = {2016}, volume = {2016}, number = {6}, pages = {5--8}, doi = {10.1016/s1361-3723(15)30045-2}, note = "\url{http://www.sciencedirect.com/science/article/pii/S1361372315300452} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1361372315300452} ; \url{https://usir.salford.ac.uk/id/eprint/39539/}", url = {https://lens.org/081-833-857-658-915} } @article{lens.org/082-140-450-245-734, author = {Anton Yudhana and Riadi and Ikhwan Anshori}, title = {IDENTIFICATION OF DIGITAL EVIDENCE FACEBOOK MESSENGER ON MOBILE PHONE WITH NATIONAL INSTITUTE OF STANDARDS TECHNOLOGY (NIST) METHOD}, journal = {Kursor}, year = {2019}, volume = {9}, number = {3}, month = {January}, doi = {10.28961/kursor.v9i3.152}, date = {2019-01-15}, note = "\url{http://kursorjournal.org/index.php/kursor/article/view/152} ; \url{https://kursorjournal.org/index.php/kursor/article/download/152/95}", url = {https://lens.org/082-140-450-245-734} } @article{lens.org/082-306-008-484-107, author = {B S Rod Englert}, title = {Review of: Practical Digital Imaging—Applications and Techniques}, journal = {Journal of Forensic Sciences}, year = {2012}, volume = {57}, number = {3}, pages = {849--849}, month = {April}, doi = {10.1111/j.1556-4029.2012.02061.x}, date = {2012-04-19}, note = "\url{http://onlinelibrary.wiley.com/doi/10.1111/j.1556-4029.2012.02061.x/abstract} ; \url{http://onlinelibrary.wiley.com/doi/10.1111/j.1556-4029.2012.02061.x/full}", url = {https://lens.org/082-306-008-484-107} } @article{lens.org/082-417-796-624-941, author = {M.A. Bihina Bella and Jan H. P. Eloff}, title = {A near-miss management system architecture for the forensic investigation of software failures.}, journal = {Forensic science international}, year = {2015}, volume = {259}, pages = {234--245}, month = {October}, doi = {10.1016/j.forsciint.2015.10.007}, date = {2015-10-28}, note = "\url{https://www.sciencedirect.com/science/article/pii/S0379073815004314} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/26727616} ; \url{https://europepmc.org/abstract/MED/26727616} ; \url{https://repository.up.ac.za/handle/2263/56011} ; \url{https://repository.up.ac.za/bitstream/2263/56011/1/Bella_NearMiss_2016.pdf}", url = {https://lens.org/082-417-796-624-941} } @article{lens.org/082-558-751-788-933, author = {Arizona Firdonsyah and Danur Wijayanto}, title = {Analisis Forensik Rekayasa Dokumen Digital dengan Metode NIST}, journal = {INFORMAL: Informatics Journal}, year = {2022}, volume = {7}, number = {2}, pages = {121--121}, month = {August}, doi = {10.19184/isj.v7i2.31198}, date = {2022-08-31}, url = {https://lens.org/082-558-751-788-933} } @article{lens.org/082-660-953-020-851, author = {Steve Gold}, title = {Feature: Challenges ahead on the digital forensics and audit trails}, journal = {Network Security}, year = {2014}, volume = {2014}, number = {6}, pages = {12--17}, doi = {10.1016/s1353-4858(14)70060-1}, note = "\url{https://doi.org/10.1016/S1353-4858(14)70060-1} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1353485814700601} ; \url{http://www.sciencedirect.com/science/article/pii/S1353485814700601} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1353485814700601#!} ; \url{https://dblp.uni-trier.de/db/journals/ns/ns2014.html#Gold14a} ; \url{https://www.infona.pl/resource/bwmeta1.element.elsevier-57a1405b-e0ff-39df-97db-9bb4da6d536f}", url = {https://lens.org/082-660-953-020-851} } @article{lens.org/082-793-334-095-933, author = {Erik Miranda Lopez and Seo Yeon Moon and Jong Hyuk Park}, title = {Scenario-Based Digital Forensics Challenges in Cloud Computing}, journal = {Symmetry}, year = {2016}, volume = {8}, number = {10}, pages = {107--}, month = {October}, doi = {10.3390/sym8100107}, date = {2016-10-20}, note = "\url{https://www.mdpi.com/2073-8994/8/10/107/pdf} ; \url{https://dblp.uni-trier.de/db/journals/symmetry/symmetry8.html#LopezMP16} ; \url{https://doaj.org/article/16744493008a4c63a18fc76483706aef} ; \url{https://ui.adsabs.harvard.edu/abs/2016Symm....8..107M/abstract} ; \url{https://core.ac.uk/display/90726715} ; \url{https://www.mdpi.com/2073-8994/8/10/107}", url = {https://lens.org/082-793-334-095-933} } @article{lens.org/082-851-209-039-37X, author = {Nicolas Hughes and Umit Karabiyik}, title = {Towards reliable digital forensics investigations through measurement science}, journal = {WIREs Forensic Science}, year = {2020}, volume = {2}, number = {4}, month = {January}, doi = {10.1002/wfs2.1367}, date = {2020-01-03}, note = "\url{https://wires.onlinelibrary.wiley.com/doi/10.1002/wfs2.1367} ; \url{https://onlinelibrary.wiley.com/doi/full/10.1002/wfs2.1367}", url = {https://lens.org/082-851-209-039-37X} } @article{lens.org/082-858-847-767-875, author = {Vivekananth. P}, title = {The Role of Social Media Forensics in Digital Forensics}, journal = {SSRN Electronic Journal}, year = {2022}, doi = {10.2139/ssrn.4202753}, url = {https://lens.org/082-858-847-767-875} } @article{lens.org/082-965-731-295-793, author = {Ali Dehghantanha and Ramlan Mahmod and Nur Izura Udzir}, title = {Towards green frameworks for digital forensics investigation}, journal = {Journal of Convergence Information Technology}, year = {2013}, volume = {8}, number = {2}, pages = {669--678}, month = {January}, doi = {10.4156/jcit.vol8.issue2.80}, date = {2013-01-31}, note = "\url{http://psasir.upm.edu.my/id/eprint/30595/} ; \url{https://core.ac.uk/display/153811845} ; \url{https://core.ac.uk/download/153811845.pdf}", url = {https://lens.org/082-965-731-295-793} } @article{lens.org/082-979-454-097-058, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {37}, pages = {301203--301203}, doi = {10.1016/s2666-2817(21)00111-6}, url = {https://lens.org/082-979-454-097-058} } @article{lens.org/083-400-942-048-619, author = { Riadi and Sunardi Sunardi and Arizona Firdonsyah}, title = {Comparative Analysis of Forensic Software on Android-based Blackberry Messenger using NIJ Framework}, journal = {Proceeding of the Electrical Engineering Computer Science and Informatics}, year = {2018}, volume = {5}, number = {1}, pages = {472--477}, month = {November}, doi = {10.11591/eecsi.v5.1615}, date = {2018-11-01}, note = "\url{http://journal.portalgaruda.org/index.php/EECSI/article/view/1615} ; \url{http://journal.portalgaruda.org/index.php/EECSI/article/download/1615/1128} ; \url{https://core.ac.uk/download/pdf/296976143.pdf}", url = {https://lens.org/083-400-942-048-619} } @article{lens.org/083-440-224-273-957, author = {Stephen Larson}, title = {Book Review: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics}, journal = {Journal of Digital Forensics, Security and Law}, year = {2014}, volume = {9}, number = {1}, pages = {83--85}, doi = {10.15394/jdfsl.2014.1165}, note = "\url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#Larson14} ; \url{https://www.mendeley.com/catalogue/053135be-1606-3571-9356-cb16e93b5830/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1165&context=jdfsl} ; \url{https://commons.erau.edu/jdfsl/vol9/iss1/6/}", url = {https://lens.org/083-440-224-273-957} } @article{lens.org/083-529-261-546-580, author = {Erika Ramadhani and Elyza Gustri Wahyuni and Hanif R. Pratama}, title = {Design of expert system for tool selection in digital forensics investigation}, journal = {IOP Conference Series: Materials Science and Engineering}, year = {2020}, volume = {852}, number = {1}, pages = {012137--}, month = {July}, doi = {10.1088/1757-899x/852/1/012137}, date = {2020-07-01}, note = "\url{http://ui.adsabs.harvard.edu/abs/2020MS&E..852a2137R/abstract} ; \url{https://iopscience.iop.org/article/10.1088/1757-899X/852/1/012137}", url = {https://lens.org/083-529-261-546-580} } @article{lens.org/084-021-092-390-691, author = {R.M. van der Knijff}, title = {Control systems/SCADA forensics, what's the difference?}, journal = {Digital Investigation}, year = {2014}, volume = {11}, number = {3}, pages = {160--174}, doi = {10.1016/j.diin.2014.06.007}, note = "\url{https://doi.org/10.1016/j.diin.2014.06.007} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287614000814} ; \url{https://dl.acm.org/citation.cfm?id=2724492} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2014.06.007} ; \url{http://www.sciencedirect.com/science/article/pii/S1742287614000814}", url = {https://lens.org/084-021-092-390-691} } @article{lens.org/084-161-464-980-559, author = {Tang Shiju}, title = {Method of Digital Content Tort Distribute and Forensics}, journal = {Video Engineering}, year = {2013}, note = "\url{http://en.cnki.com.cn/Article_en/CJFDTOTAL-DSSS201316022.htm}", url = {https://lens.org/084-161-464-980-559} } @article{lens.org/084-240-004-733-026, author = {Dhwaniket Ramesh Kamble and Nilakshi Jain and Swati Deshpande}, title = {Cybercrimes Solutions using Digital Forensic Tools}, journal = {International Journal of Wireless and Microwave Technologies}, year = {2015}, volume = {5}, number = {6}, pages = {11--18}, month = {November}, doi = {10.5815/ijwmt.2015.06.02}, date = {2015-11-08}, note = "\url{http://www.mecs-press.org/ijwmt/ijwmt-v5-n6/v5n6-2.html} ; \url{http://www.mecs-press.org/ijwmt/ijwmt-v5-n6/IJWMT-V5-N6-2.pdf}", url = {https://lens.org/084-240-004-733-026} } @article{lens.org/084-366-417-503-417, author = {Zeng Jin-hu}, title = {The State of Art in Digital Audio Forensic Authentication}, journal = {Chinese Journal of Forensic Sciences}, year = {2014}, note = "\url{http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201404013.htm}", url = {https://lens.org/084-366-417-503-417} } @article{lens.org/084-473-799-141-231, author = {Regner Sabillon and Jordi Serra-Ruiz and Víctor Cavaller and Jeimy J. Cano}, title = {Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies}, journal = {International Journal of Information Security and Privacy}, year = {2017}, volume = {11}, number = {2}, pages = {25--37}, doi = {10.4018/ijisp.2017040103}, note = "\url{https://doi.org/10.4018/IJISP.2017040103} ; \url{https://dl.acm.org/doi/10.4018/IJISP.2017040103} ; \url{https://www.ideas.repec.org/a/igg/jisp00/v11y2017i2p25-37.html} ; \url{https://dl.acm.org/citation.cfm?id=3077898} ; \url{http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.2017040103} ; \url{https://dblp.uni-trier.de/db/journals/ijisp/ijisp11.html#SabillonSCC17} ; \url{https://www.igi-global.com/article/digital-forensic-analysis-of-cybercrimes/178643}", url = {https://lens.org/084-473-799-141-231} } @article{lens.org/084-624-696-297-925, author = {Alisha Asquith and Graeme Horsman}, title = {Let the robots do it! – Taking a look at Robotic Process Automation and its potential application in digital forensics}, journal = {Forensic Science International: Reports}, year = {2019}, volume = {1}, pages = {100007--}, doi = {10.1016/j.fsir.2019.100007}, note = "\url{https://research.tees.ac.uk/ws/files/8028012/Let_the_robots_do_it.pdf} ; \url{https://research.tees.ac.uk/en/publications/let-the-robots-do-it-taking-a-look-at-robotic-process-automation-} ; \url{https://www.sciencedirect.com/science/article/pii/S2665910719300076} ; \url{https://core.ac.uk/download/pdf/225624897.pdf}", url = {https://lens.org/084-624-696-297-925} } @article{lens.org/084-939-441-327-367, author = {Jennifer Newman and Li Lin and Wenhao Chen and Stephanie Reinders and Yangxiao Wang and Min Wu and Yong Guan}, title = {Media Watermarking, Security, and Forensics - StegoAppDB: a Steganography Apps Forensics Image Database}, journal = {electronic imaging}, year = {2019}, volume = {2019}, number = {5}, pages = {536-1--536-12}, month = {January}, date = {2019-01-13}, note = "\url{https://www.ingentaconnect.com/content/ist/ei/2019/00002019/00000005/art00011} ; \url{https://dblp.uni-trier.de/db/journals/corr/corr1904.html#abs-1904-09360} ; \url{https://lib.dr.iastate.edu/cgi/viewcontent.cgi?article=1005&context=csafe_conf} ; \url{https://lib.dr.iastate.edu/csafe_pubs/61/} ; \url{https://doi.org/10.2352/ISSN.2470-1173.2019.5.MWSF-536}", url = {https://lens.org/084-939-441-327-367} } @article{lens.org/085-204-724-336-334, author = {Hriday Raval}, title = {Computer Forensic Methodology and Tools}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, pages = {15--20}, month = {May}, doi = {10.46293/4n6/2020.02.02.02}, date = {2020-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.02.02}", url = {https://lens.org/085-204-724-336-334} } @article{lens.org/085-666-602-084-614, author = {Spyridon Dosis and Irvin Homem and Oliver Popov}, title = {KES - Semantic Representation and Integration of Digital Evidence}, journal = {Procedia Computer Science}, year = {2013}, volume = {22}, pages = {1266--1275}, doi = {10.1016/j.procs.2013.09.214}, note = "\url{https://doi.org/10.1016/j.procs.2013.09.214} ; \url{https://dblp.uni-trier.de/db/conf/kes/kes2013.html#DosisHP13} ; \url{https://core.ac.uk/display/82030201} ; \url{http://su.diva-portal.org/smash/record.jsf?pid=diva2%3A676278} ; \url{http://www.sciencedirect.com/science/article/pii/S1877050913010077} ; \url{http://www.diva-portal.org/smash/record.jsf?pid=diva2:676278} ; \url{https://www.sciencedirect.com/science/article/pii/S1877050913010077} ; \url{https://core.ac.uk/download/pdf/82030201.pdf}", url = {https://lens.org/085-666-602-084-614} } @article{lens.org/085-816-961-933-906, author = {Matthew C. Stamm and W. S. Lin and K.J.R. Liu}, title = {Temporal Forensics and Anti-Forensics for Motion Compensated Video}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2012}, volume = {7}, number = {4}, pages = {1315--1329}, doi = {10.1109/tifs.2012.2205568}, note = "\url{http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000006222325} ; \url{https://dblp.uni-trier.de/db/journals/tifs/tifs7.html#StammLL12} ; \url{http://dx.doi.org/10.1109/TIFS.2012.2205568} ; \url{https://ieeexplore.ieee.org/document/6222325/} ; \url{https://dl.acm.org/doi/10.1109/TIFS.2012.2205568} ; \url{https://www.infona.pl/resource/bwmeta1.element.ieee-art-000006222325} ; \url{https://dx.doi.org/10.1109/TIFS.2012.2205568} ; \url{http://ieeexplore.ieee.org/document/6222325/} ; \url{http://sig.umd.edu/publications/Stamm_TIFS_201208.pdf}", url = {https://lens.org/085-816-961-933-906} } @article{lens.org/086-018-338-372-932, author = {Muhammad Nur Faiz and Rusydi Umar and Anton Yudhana}, title = {Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email}, journal = {JISKA (Jurnal Informatika Sunan Kalijaga)}, year = {2017}, volume = {1}, number = {3}, pages = {108--114}, month = {March}, doi = {10.14421/jiska.2017.13-02}, date = {2017-03-30}, note = "\url{https://conference.uin-suka.ac.id/saintek/JISKA/article/view/1113} ; \url{http://ejournal.uin-suka.ac.id/saintek/JISKA/article/download/13-02/1025} ; \url{https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/13-02} ; \url{http://202.0.92.5/saintek/JISKA/article/view/13-02} ; \url{https://core.ac.uk/download/267117312.pdf}", url = {https://lens.org/086-018-338-372-932} } @article{lens.org/086-248-055-124-414, title = {Sample Preparation For Pesticide Analysis in A Forensic Toxicology Laboratory: A Review}, journal = {Journal of Forensic Sciences and Digital Investigation}, year = {2018}, pages = {27--45}, month = {May}, doi = {10.29199/2637-7136/fsdi-101016}, date = {2018-05-07}, url = {https://lens.org/086-248-055-124-414} } @article{lens.org/086-653-920-850-621, author = {Graeme Horsman and James R. Lyle}, title = {Dataset construction challenges for digital forensics}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301264--}, doi = {10.1016/j.fsidi.2021.301264}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S2666281721001815}", url = {https://lens.org/086-653-920-850-621} } @article{lens.org/086-705-619-249-214, author = {Jason Bengtson}, title = {Preparing for the age of the digital palimpsest}, journal = {Library Hi Tech}, year = {2012}, volume = {30}, number = {3}, pages = {513--522}, month = {August}, doi = {10.1108/07378831211266636}, date = {2012-08-31}, note = "\url{https://dblp.uni-trier.de/db/journals/lht/lht30.html#Bengtson12} ; \url{https://www.emerald.com/insight/content/doi/10.1108/07378831211266636/full/html} ; \url{https://core.ac.uk/display/33381889} ; \url{https://www.emeraldinsight.com/doi/abs/10.1108/07378831211266636} ; \url{https://core.ac.uk/download/33381889.pdf}", url = {https://lens.org/086-705-619-249-214} } @article{lens.org/086-772-265-875-364, author = {Ellen Akongwin Abanga}, title = {Evidence Based Reconstruction for Digital Forensics}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {185--190}, month = {July}, doi = {10.22624/aims/crp-bk3-p30}, date = {2022-07-15}, url = {https://lens.org/086-772-265-875-364} } @article{lens.org/086-941-914-029-374, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {300991--300991}, doi = {10.1016/s2666-2817(20)30225-0}, url = {https://lens.org/086-941-914-029-374} } @article{lens.org/087-342-951-350-054, author = {Eoghan Casey and Olivier Ribaux and Claude Roux}, title = {The Kodak Syndrome: Risks and Opportunities Created by Decentralization of Forensic Capabilities.}, journal = {Journal of forensic sciences}, year = {2018}, volume = {64}, number = {1}, pages = {127--136}, month = {July}, doi = {10.1111/1556-4029.13849}, date = {2018-07-05}, note = "\url{https://europepmc.org/abstract/MED/29975983} ; \url{https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.13849} ; \url{https://dialnet.unirioja.es/servlet/articulo?codigo=6794302} ; \url{https://serval.unil.ch/notice/serval:BIB_9B5E17694E54} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/29975983} ; \url{https://pubmed.ncbi.nlm.nih.gov/29975983/}", url = {https://lens.org/087-342-951-350-054} } @article{lens.org/087-597-848-929-337, author = {Michael AdjeiFrempong and Kamal Kant Hiran}, title = {Awareness and Understanding of Computer Forensics in the Ghana Legal System}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {89}, number = {20}, pages = {54--59}, month = {March}, doi = {10.5120/15752-4640}, date = {2014-03-26}, note = "\url{http://ui.adsabs.harvard.edu/abs/2014IJCA...89t..54A/abstract} ; \url{https://research.ijcaonline.org/volume89/number20/pxc3894640.pdf} ; \url{https://www.ijcaonline.org/archives/volume89/number20/15752-4640}", url = {https://lens.org/087-597-848-929-337} } @article{lens.org/087-687-602-305-742, author = {Tracy Walraven}, title = {Making it Work! Adding a Digital Forensics Unit to Your Laboratory}, journal = {Forensic Science International: Synergy}, year = {2022}, volume = {4}, pages = {100256--100256}, doi = {10.1016/j.fsisyn.2022.100256}, url = {https://lens.org/087-687-602-305-742} } @article{lens.org/087-788-401-737-824, author = {Gary C. Kessler and Gregory H. Carlton}, title = {A STUDY OF FORENSIC IMAGING IN THE ABSENCE OF WRITE-BLOCKERS}, journal = {Journal of Digital Forensics, Security and Law}, year = {2014}, volume = {9}, number = {3}, pages = {51--58}, doi = {10.15394/jdfsl.2014.1187}, note = "\url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1187&context=jdfsl} ; \url{https://core.ac.uk/display/108502354} ; \url{https://works.bepress.com/gary_kessler/22/} ; \url{https://commons.erau.edu/db-security-studies/28/}", url = {https://lens.org/087-788-401-737-824} } @article{lens.org/088-597-318-557-237, author = {Andrew Fetherston and Tim Gollins}, title = {Towards the Development of a Test Corpus of Digital Objects for the Evaluation of File Format Identification Tools and Signatures}, journal = {International Journal of Digital Curation}, year = {2012}, volume = {7}, number = {1}, pages = {16--26}, month = {March}, doi = {10.2218/ijdc.v7i1.211}, date = {2012-03-09}, note = "\url{http://www.ijdc.net/index.php/ijdc/article/download/201/270} ; \url{http://www.ijdc.net/index.php/ijdc/article/view/201} ; \url{https://core.ac.uk/display/91041797} ; \url{https://dblp.uni-trier.de/db/journals/ijdc/ijdc7.html#FetherstonG12} ; \url{https://dx.doi.org/10.2218/ijdc.v7i1.211} ; \url{http://dx.doi.org/10.2218/ijdc.v7i1.211} ; \url{https://core.ac.uk/download/pdf/162675717.pdf}", url = {https://lens.org/088-597-318-557-237} } @article{lens.org/088-648-039-264-770, author = {Monjur Alam}, title = {SBBox: A Tamper-Resistant Digital Archiving System}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2016}, volume = {5}, number = {3}, pages = {122--131}, doi = {10.17781/p002085}, note = "\url{http://sdiwc.net/digital-library/sbbox-a-tamperresistant-digital-archiving-system.html} ; \url{https://gnosis.library.ucy.ac.cy/handle/7/42727}", url = {https://lens.org/088-648-039-264-770} } @article{lens.org/089-380-540-556-832, author = {Nicole R. Odom and Jesse M. Lindmar and John Hirt and Josh Brunty}, title = {Forensic Inspection of Sensitive User Data and Artifacts from Smartwatch Wearable Devices}, journal = {Journal of forensic sciences}, year = {2019}, volume = {64}, number = {6}, pages = {1673--1686}, month = {June}, doi = {10.1111/1556-4029.14109}, date = {2019-06-10}, note = "\url{https://dialnet.unirioja.es/servlet/articulo?codigo=7121547} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/31674672} ; \url{https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.14109}", url = {https://lens.org/089-380-540-556-832} } @article{lens.org/089-419-432-581-673, author = {Jianwei Hou and Yuewei Li and Jingyang Yu and Wenchang Shi}, title = {A Survey on Digital Forensics in Internet of Things}, journal = {IEEE Internet of Things Journal}, year = {2020}, volume = {7}, number = {1}, pages = {1--15}, doi = {10.1109/jiot.2019.2940713}, note = "\url{https://doi.org/10.1109/JIOT.2019.2940713} ; \url{https://ieeexplore.ieee.org/document/8831387} ; \url{https://dblp.uni-trier.de/db/journals/iotj/iotj7.html#HouLYS20}", url = {https://lens.org/089-419-432-581-673} } @article{lens.org/089-695-854-791-989, author = {Shahzad Saleem and Oliver Popov and Ibrahim Baggili}, title = {A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis}, journal = {Digital Investigation}, year = {2016}, volume = {16}, pages = {S55--S64}, doi = {10.1016/j.diin.2016.01.008}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S1742287616300020} ; \url{https://core.ac.uk/display/82434076} ; \url{https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/52/} ; \url{https://doi.org/10.1016/j.diin.2016.01.008} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2016.01.008} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287616300020} ; \url{http://www.diva-portal.org/smash/record.jsf?pid=diva2:806835} ; \url{http://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1052&context=electricalcomputerengineering-facpubs} ; \url{https://core.ac.uk/download/pdf/82434076.pdf}", url = {https://lens.org/089-695-854-791-989} } @article{lens.org/090-632-465-818-866, author = {Tina Wu and Frank Breitinger and Stephen Niemann}, title = {IoT network traffic analysis: Opportunities and challenges for forensic investigators?}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301123--}, doi = {10.1016/j.fsidi.2021.301123}, note = "\url{https://dfrws.org/presentation/iot-network-traffic-analysis-opportunities-and-challenges-for-forensic-investigators/} ; \url{https://dfrws.org/wp-content/uploads/2021/01/2021_APAC_paper-iot_network_traffic_analysis_opportunities_and_challenges_for_forensic_investigators.pdf}", url = {https://lens.org/090-632-465-818-866} } @article{lens.org/090-980-715-883-62X, author = {Shams Zawoad and Ragib Hasan}, title = {Trustworthy Digital Forensics in the Cloud}, journal = {Computer}, year = {2016}, volume = {49}, number = {3}, pages = {78--81}, doi = {10.1109/mc.2016.89}, note = "\url{https://dblp.uni-trier.de/db/journals/computer/computer49.html#ZawoadH16} ; \url{http://ieeexplore.ieee.org/document/7433340/} ; \url{https://ieeexplore.ieee.org/document/7433340/} ; \url{https://www.computer.org/csdl/magazine/co/2016/03/mco2016030078/13rRUwwslxu} ; \url{https://doi.org/10.1109/MC.2016.89}", url = {https://lens.org/090-980-715-883-62X} } @article{lens.org/091-023-567-376-838, author = {Salvador Villena and Miguel Vega and Javier Mateos and Duska Rosenberg and Fionn Murtagh and Rafael Molina and Aggelos K. Katsaggelos}, title = {Image super-resolution for outdoor digital forensics. Usability and legal aspects}, journal = {Computers in Industry}, year = {2018}, volume = {98}, pages = {34--47}, doi = {10.1016/j.compind.2018.02.004}, note = "\url{https://pure.hud.ac.uk/ws/files/12535345/Villena_et_al_Image_super_resolution_for_outdoor_digital_forensics_ComputersInIndustry_Feb2018.pdf} ; \url{https://pure.hud.ac.uk/en/publications/image-super-resolution-for-outdoor-digital-forensics-usability-an} ; \url{https://doi.org/10.1016/j.compind.2018.02.004} ; \url{https://www.scholars.northwestern.edu/en/publications/image-super-resolution-for-outdoor-digital-forensics-usability-an} ; \url{https://www.sciencedirect.com/science/article/pii/S0166361517306358} ; \url{https://core.ac.uk/download/237460172.pdf}", url = {https://lens.org/091-023-567-376-838} } @article{lens.org/091-095-676-173-055, author = {Massimo Leone}, title = {From Fingers to Faces: Visual Semiotics and Digital Forensics.}, journal = {International journal for the semiotics of law = Revue internationale de semiotique juridique}, year = {2020}, volume = {34}, number = {2}, pages = {579--599}, month = {September}, doi = {10.1007/s11196-020-09766-x}, date = {2020-09-08}, note = "\url{https://link.springer.com/article/10.1007/s11196-020-09766-x} ; \url{https://europepmc.org/article/PMC/PMC7902585} ; \url{http://www.ncbi.nlm.nih.gov/pubmed/33679005} ; \url{https://link.springer.com/content/pdf/10.1007/s11196-020-09766-x.pdf} ; \url{https://philpapers.org/rec/LEOFFT-2}", url = {https://lens.org/091-095-676-173-055} } @article{lens.org/091-282-514-263-879, author = {Linda K. Lau}, title = {Book Review: The X-Ways Forensics Practitioner's Guide}, journal = {Journal of Digital Forensics, Security and Law}, year = {2014}, volume = {9}, number = {3}, pages = {59--61}, doi = {10.15394/jdfsl.2014.1188}, note = "\url{https://core.ac.uk/display/92098202} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#Lau14} ; \url{https://commons.erau.edu/jdfsl/vol9/iss3/5/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1188&context=jdfsl}", url = {https://lens.org/091-282-514-263-879} } @article{lens.org/091-341-449-257-890, author = {Lisa Andergassen}, title = {Digging Up the Narrative: Forensic Practices between Objectivity and Interpretation}, journal = {Membrana Journal of Photography}, year = {2016}, number = {Vol. 1, no. 1}, pages = {48--51}, doi = {10.47659/m1.048.art}, note = "\url{http://dx.doi.org/10.47659/m1.048.art}", url = {https://lens.org/091-341-449-257-890} } @article{lens.org/091-454-341-452-919, author = {Danish Rehman and Er. Jasdeep Singh}, title = {A Study of Minimization of Cybercrimes by the Implementation of Cyber Forensics Tool Kit}, journal = {International Journal for Research in Applied Science and Engineering Technology}, year = {2022}, volume = {10}, number = {3}, pages = {1335--1345}, month = {March}, doi = {10.22214/ijraset.2022.40867}, date = {2022-03-31}, url = {https://lens.org/091-454-341-452-919} } @article{lens.org/091-619-263-117-914, author = {George Grispos and Tim Storer and William Bradley Glisson}, title = {Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics}, journal = {International Journal of Digital Crime and Forensics}, year = {2012}, volume = {4}, number = {2}, pages = {28--48}, month = {April}, doi = {10.4018/jdcf.2012040103}, date = {2012-04-01}, note = "\url{https://arxiv.org/pdf/1410.2123} ; \url{https://dblp.uni-trier.de/db/journals/corr/corr1410.html#GrisposSG14} ; \url{http://eprints.gla.ac.uk/68013/1/ID68013.pdf} ; \url{http://eprints.gla.ac.uk/68013/} ; \url{https://digitalcommons.unomaha.edu/cgi/viewcontent.cgi?article=1043&context=interdiscipinformaticsfacpub} ; \url{https://ui.adsabs.harvard.edu/abs/2014arXiv1410.2123G/abstract} ; \url{https://shsu-ir.tdl.org/handle/20.500.11875/3196} ; \url{https://experts.nebraska.edu/en/publications/calm-before-the-storm-the-challenges-of-cloud-computing-in-digita-2} ; \url{https://dx.doi.org/10.4018/jdcf.2012040103} ; \url{http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf} ; \url{https://www.igi-global.com/article/calm-before-storm/68408} ; \url{https://arxiv.org/abs/1410.2123} ; \url{https://works.bepress.com/george-grispos/2/} ; \url{https://digitalcommons.unomaha.edu/interdiscipinformaticsfacpub/44/} ; \url{https://core.ac.uk/download/pdf/296143974.pdf}", url = {https://lens.org/091-619-263-117-914} } @article{lens.org/091-696-315-070-855, author = {Abiodun A. Solanke}, title = {Explainable digital forensics AI: Towards mitigating distrust in AI-based digital forensics analysis using interpretable models}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {42}, pages = {301403--301403}, doi = {10.1016/j.fsidi.2022.301403}, url = {https://lens.org/091-696-315-070-855} } @article{lens.org/091-892-724-900-950, author = {Ward van Helmond and Chris Jan Kuijpers and Elise Van Diejen and Jincey Spiering and Brent Maagdelijn and Marcel de Puit}, title = {Amino acid profiling from fingerprints, a novel methodology using UPLC-MS}, journal = {Analytical Methods}, year = {2017}, volume = {9}, number = {38}, pages = {5697--5702}, doi = {10.1039/c7ay01603d}, note = "\url{https://hbo-kennisbank.nl/resolve/hogeschoolamsterdam/eyJoIjogImRmN2Q4MTFlZTJlMTFiMmE5MzI3Y2FmYzI5MzVhNGI1OThhZGYzYzA5MGY4NWI3OWY5NzRhNzA1MjI0YWM0OTciLCAidSI6ICJodHRwczovL3B1cmUuaHZhLm5sL3dzL2ZpbGVzLzQzNzU1NDgvYzdheTAxNjAzZC5wZGYifQ==} ; \url{https://repository.tudelft.nl/islandora/object/uuid%3A07404946-1ecd-4d88-927b-a644e2c8b7b1/datastream/OBJ/download} ; \url{http://pubs.rsc.org/en/content/articlelanding/2017/ay/c7ay01603d} ; \url{https://pure.hva.nl/ws/files/4375548/c7ay01603d.pdf} ; \url{http://pubs.rsc.org/en/content/articlehtml/2017/ay/c7ay01603d?page=search} ; \url{https://repository.tudelft.nl/islandora/object/uuid%3A07404946-1ecd-4d88-927b-a644e2c8b7b1} ; \url{http://xlink.rsc.org/?DOI=C7AY01603D} ; \url{https://research.tudelft.nl/en/publications/amino-acid-profiling-from-fingerprints-a-novel-methodology-using-} ; \url{https://www.narcis.nl/publication/RecordID/oai%3Atudelft.nl%3Auuid%3A07404946-1ecd-4d88-927b-a644e2c8b7b1} ; \url{https://pubs.rsc.org/en/content/articlepdf/2017/ay/c7ay01603d} ; \url{https://pubs.rsc.org/en/content/articlelanding/2017/ay/c7ay01603d}", url = {https://lens.org/091-892-724-900-950} } @article{lens.org/091-934-600-025-114, author = {M. (Marouschka) Vink and M.J. (Marjan) Sjerps and A. (Abdul) Boztas and J.P. (Jan Peter) van Zandwijk}, title = {Likelihood ratio method for the interpretation of iPhone health app data in digital forensics}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {41}, pages = {301389--301389}, doi = {10.1016/j.fsidi.2022.301389}, url = {https://lens.org/091-934-600-025-114} } @article{lens.org/091-946-490-975-722, author = { Riadi and Anton Yudhana and Wicaksono Yuli Sulistyo}, title = {Deteksi Pemalsuan Foto Digital Menggunakan Image Forensics}, journal = {Mobile and Forensics}, year = {2019}, volume = {1}, number = {1}, pages = {13--21}, month = {September}, doi = {10.12928/mf.v1i1.703}, date = {2019-09-26}, note = "\url{http://journal2.uad.ac.id/index.php/mf/article/download/703/pdf} ; \url{http://journal2.uad.ac.id/index.php/mf/article/view/703} ; \url{https://core.ac.uk/download/pdf/267886815.pdf}", url = {https://lens.org/091-946-490-975-722} } @article{lens.org/091-995-132-929-145, author = {Sailaja Vadlamudi}, title = {New Era of Cloud Forensics-Challenges and Opportunities}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {February}, doi = {10.46293/4n6/2021.03.01.08}, date = {2021-02-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.01.08}", url = {https://lens.org/091-995-132-929-145} } @article{lens.org/092-046-002-157-986, author = {Sergey Zuev and Dmitry Bakhteev}, title = {Digital Forensic Logistics: The Basics of Scientific Theory}, journal = {International Journal of Law and Society}, year = {2021}, volume = {4}, number = {2}, pages = {83--}, doi = {10.11648/j.ijls.20210402.14}, note = "\url{https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijls.20210402.14.pdf} ; \url{https://membership.sciencepublishinggroup.com/journal/paperinfo?journalid=306&doi=10.11648/j.ijls.20210402.14} ; \url{http://www.sciencepublishinggroup.com/journal/paperinfo?journalid=306&doi=10.11648/j.ijls.20210402.14}", url = {https://lens.org/092-046-002-157-986} } @article{lens.org/092-223-657-810-83X, author = {Mohamad Khairudin Kallil and Ahmad Che Yaacob}, title = {THE INTEGRATION OF DIGITAL FORENSICS SCIENCE AND ISLAMIC EVIDENCE LAWS}, journal = {International Journal of Law, Government and Communication}, year = {2019}, volume = {4}, number = {17}, pages = {61--70}, month = {December}, doi = {10.35631/ijlgc.417006}, date = {2019-12-15}, note = "\url{http://dx.doi.org/10.35631/ijlgc.417006}", url = {https://lens.org/092-223-657-810-83X} } @article{lens.org/092-461-654-973-880, author = {Talib M. Jawad Abbas}, title = {Studying the Documentation Process in Digital Forensic Investigation Frameworks/ Models}, journal = {Journal of Al-Nahrain University-Science}, year = {2015}, volume = {18}, number = {4}, pages = {153--162}, doi = {10.22401/jnus.18.4.21}, note = "\url{https://anjs.edu.iq/index.php/anjs/article/download/299/1699} ; \url{https://anjs.edu.iq/index.php/anjs/article/view/299} ; \url{https://www.iasj.net/iasj?func=fulltext&aId=107014}", url = {https://lens.org/092-461-654-973-880} } @article{lens.org/092-506-898-894-624, author = {Amir Mohamed Talib and Fahad Omar Alomary}, title = {Towards a Comprehensive Ontology Based-Investigation for Digital Forensics Cybercrime}, journal = {International Journal on Communications Antenna and Propagation (IRECAP)}, year = {2015}, volume = {5}, number = {5}, pages = {263--268}, month = {October}, doi = {10.15866/irecap.v5i5.6112}, date = {2015-10-31}, note = "\url{https://www.praiseworthyprize.org/jsm/index.php?journal=irecap&page=article&op=view&path%5B%5D=17418}", url = {https://lens.org/092-506-898-894-624} } @article{lens.org/092-704-658-903-701, author = {Antonis Mouhtaropoulos}, title = {Digital Forensic Readiness of Information Systems: A cost-benefit variable analysis}, journal = {International Journal on Cyber Situational Awareness}, year = {2022}, volume = {6}, number = {1}, month = {February}, doi = {10.22619/ijcsa.2021.100136}, date = {2022-02-04}, url = {https://lens.org/092-704-658-903-701} } @article{lens.org/092-765-349-680-750, author = {Graeme Horsman}, title = {The different types of reports produced in digital forensic investigations.}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2021}, volume = {61}, number = {5}, pages = {627--634}, month = {June}, doi = {10.1016/j.scijus.2021.06.009}, date = {2021-06-27}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S1355030621000927}", url = {https://lens.org/092-765-349-680-750} } @article{lens.org/092-878-184-623-918, author = {Mohammad A. Alsmirat and Ruba A. Al-Hussien and Walaa Al-Sarayrah and Yaser Jararweh and Morad Etier}, title = {Digital video forensics: a comprehensive survey}, journal = {International Journal of Advanced Intelligence Paradigms}, year = {2019}, volume = {15}, number = {3}, pages = {437--456}, note = "\url{https://www.inderscienceonline.com/doi/abs/10.1504/IJAIP.2020.106040} ; \url{https://dblp.uni-trier.de/db/journals/ijaip/ijaip15.html#AlsmiratAAJE20} ; \url{http://dblp.uni-trier.de/db/journals/ijaip/ijaip15.html#AlsmiratAAJE20} ; \url{https://doi.org/10.1504/IJAIP.2020.106040}", url = {https://lens.org/092-878-184-623-918} } @article{lens.org/093-098-656-285-339, author = {Rahul Pandey}, title = {Paytm Digital Wallet And Online Transactions Security Measures}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, pages = {58--62}, month = {May}, doi = {10.46293/4n6/2020.02.02.12}, date = {2020-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.02.12}", url = {https://lens.org/093-098-656-285-339} } @article{lens.org/093-327-100-232-043, author = {null Sunardi and Riadi and Muh. Hajar Akbar}, title = {Application of Static Forensics Method for Extracting Steganographic Files on Digital Evidence Using the DFRWS Framework}, journal = {Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)}, year = {2020}, volume = {4}, number = {3}, pages = {576--583}, month = {June}, doi = {10.29207/resti.v4i3.1906}, date = {2020-06-20}, note = "\url{http://jurnal.iaii.or.id/index.php/RESTI/article/view/1906} ; \url{http://jurnal.iaii.or.id/index.php/RESTI/article/download/1906/265}", url = {https://lens.org/093-327-100-232-043} } @article{lens.org/093-431-358-523-075, author = {null B.Vidhya and R. Priya Vaijayanthi}, title = {Enhancing Digital Forensic Analysis throughDocument Clustering}, journal = {International Journal of Innovative Research in Computer and Communication Engineering}, year = {2014}, volume = {2}, number = {1}, pages = {2496--2501}, note = "\url{http://www.rroij.com/open-access/enhancing-digital-forensic-analysis-throughdocument-clustering.pdf} ; \url{https://www.rroij.com/open-access/enhancing-digital-forensic-analysis-throughdocument-clustering.pdf}", url = {https://lens.org/093-431-358-523-075} } @article{lens.org/093-441-380-401-516, author = {Nora Lizarti and Bambang Sugiantoro and Yudi Prayudi}, title = {PENERAPAN COMPOSITE LOGIC DALAM MENGKOLABORASIKAN FRAMEWORK TERKAIT MULTIMEDIA FORENSIK}, journal = {JISKA (Jurnal Informatika Sunan Kalijaga)}, year = {2017}, volume = {2}, number = {1}, pages = {26--33}, month = {August}, doi = {10.14421/jiska.2017.21-04}, date = {2017-08-29}, note = "\url{http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/21-04} ; \url{https://ejournal.uin-suka.ac.id/saintek/JISKA/article/download/21-04/1061} ; \url{https://core.ac.uk/download/267117302.pdf}", url = {https://lens.org/093-441-380-401-516} } @article{lens.org/093-622-612-071-02X, author = {Stephen Campbell}, title = {Maintaining Continuity of Evidence Within Forensic Labs Through Training, Accreditation, and Developing Better Digital Communication with Investigators and Prosecutors}, journal = {Forensic Science International: Synergy}, year = {2019}, volume = {1}, pages = {S4--}, doi = {10.1016/j.fsisyn.2019.02.006}, note = "\url{https://api.elsevier.com/content/article/PII:S2589871X19300075?httpAccept=text/xml}", url = {https://lens.org/093-622-612-071-02X} } @article{lens.org/093-958-345-280-896, title = {Welcome to the 9th annual DFRWS Europe conference!}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301356--301356}, doi = {10.1016/j.fsidi.2022.301356}, url = {https://lens.org/093-958-345-280-896} } @article{lens.org/094-142-794-127-63X, author = {Graeme Horsman}, title = {The COLLECTORS ranking scale for 'at-scene' digital device triage.}, journal = {Journal of forensic sciences}, year = {2020}, volume = {66}, number = {1}, pages = {179--189}, month = {October}, doi = {10.1111/1556-4029.14582}, date = {2020-10-09}, note = "\url{https://www.ncbi.nlm.nih.gov/pubmed/33034896} ; \url{https://onlinelibrary.wiley.com/doi/epdf/10.1111/1556-4029.14582} ; \url{https://research.tees.ac.uk/en/publications/the-collectors-ranking-scale-for-atscene-digital-device-triage}", url = {https://lens.org/094-142-794-127-63X} } @article{lens.org/094-631-307-774-31X, author = {Miranda Moore and Simon Iveson}, title = {Digital Forensics Specialist Group}, journal = {Digital Evidence and Electronic Signature Law Review}, year = {2014}, volume = {9}, number = {0}, month = {January}, doi = {10.14296/deeslr.v9i0.1995}, date = {2014-01-28}, note = "\url{https://journals.sas.ac.uk/deeslr/article/view/1995} ; \url{https://sas-space.sas.ac.uk/5418/}", url = {https://lens.org/094-631-307-774-31X} } @article{lens.org/094-926-047-905-405, author = {Venkata Satish Guttula}, title = {BIMI - Brand Indicators for Message Identification}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.04}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.04}", url = {https://lens.org/094-926-047-905-405} } @article{lens.org/095-686-500-915-641, author = {Ahmad S. Salim and Asmaa A. Abdall}, title = {Application of Adobe® Photoshop® CC 2018 for Identifying the Source of HP® Color Laser Printouts}, journal = {Arab Journal of Forensic Sciences \& Forensic Medicine}, year = {2019}, volume = {1}, number = {9}, pages = {1164--1164}, month = {June}, doi = {10.26735/16586794.2019.002}, date = {2019-06-15}, note = "\url{https://repository.nauss.edu.sa/handle/123456789/66175}", url = {https://lens.org/095-686-500-915-641} } @article{lens.org/095-691-114-276-825, author = {Ben Martini and Kim-Kwang Raymond Choo}, title = {An integrated conceptual digital forensic framework for cloud computing}, journal = {Digital Investigation}, year = {2012}, volume = {9}, number = {2}, pages = {71--80}, doi = {10.1016/j.diin.2012.07.001}, note = "\url{http://www.sciencedirect.com/science/article/pii/S174228761200059X} ; \url{http://dx.doi.org/10.1016/j.diin.2012.07.001} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S174228761200059X} ; \url{https://www.infona.pl/resource/bwmeta1.element.elsevier-f6af9062-2002-39d9-b1f2-0f2f2e2559b0} ; \url{https://doi.org/10.1016/j.diin.2012.07.001} ; \url{https://fenix.tecnico.ulisboa.pt/downloadFile/563568428736506/Martini2012.pdf} ; \url{https://dblp.uni-trier.de/db/journals/di/di9.html#MartiniC12} ; \url{https://dx.doi.org/10.1016/j.diin.2012.07.001}", url = {https://lens.org/095-691-114-276-825} } @article{lens.org/095-847-865-864-079, author = {Ankit Srivastava and Pratik Vatsal}, title = {Forensic Importance of SIM Cards as a Digital Evidence}, journal = {Journal of Forensic Research}, year = {2016}, volume = {7}, number = {2}, pages = {1--4}, doi = {10.4172/2157-7145.1000322}, note = "\url{https://www.hilarispublisher.com/open-access/forensic-importance-of-sim-cards-as-a-digital-evidence-2157-7145-1000322.pdf} ; \url{https://www.hilarispublisher.com/abstract/forensic-importance-of-sim-cards-as-a-digital-evidence-36355.html} ; \url{https://www.omicsonline.org/open-access/forensic-importance-of-sim-cards-as-a-digital-evidence-2157-7145-1000322.pdf} ; \url{https://www.mendeley.com/catalogue/e95a0629-9d1f-3e8a-9e81-8ab38be513b3/}", url = {https://lens.org/095-847-865-864-079} } @article{lens.org/095-972-507-485-24X, author = {Hongying Jin}, title = {Research of Blind Forensics Algorithm on Digital Image Tampering}, journal = {Indonesian Journal of Electrical Engineering and Computer Science}, year = {2014}, volume = {12}, number = {7}, pages = {5399--5407}, month = {July}, date = {2014-07-01}, note = "\url{http://ijeecs.iaescore.com/index.php/IJEECS/article/download/3643/1923} ; \url{http://ijeecs.iaescore.com/index.php/IJEECS/article/view/3643} ; \url{http://iaesjournal.com/online/index.php/TELKOMNIKA/article/view/5373}", url = {https://lens.org/095-972-507-485-24X} } @article{lens.org/096-483-556-640-313, author = {Eoghan Casey}, title = {Editorial: The epic story of scientific interpretation in digital investigations}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {34}, pages = {301063--}, doi = {10.1016/j.fsidi.2020.301063}, note = "\url{https://doi.org/10.1016/j.fsidi.2020.301063}", url = {https://lens.org/096-483-556-640-313} } @article{lens.org/096-655-404-701-429, author = {Jens Elstner and Mark Roeloffs}, title = {Forensic analysis of newer TomTom devices}, journal = {Digital Investigation}, year = {2016}, volume = {16}, number = {16}, pages = {29--37}, doi = {10.1016/j.diin.2016.01.016}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di16.html#ElstnerR16} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2016.01.016} ; \url{https://www.sciencedirect.com/science/article/pii/S174228761630010X#!} ; \url{https://www.infona.pl/resource/bwmeta1.element.elsevier-256ee770-72a8-3a3e-add9-0e0e37f2b710} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S174228761630010X} ; \url{https://dl.acm.org/citation.cfm?id=2906705}", url = {https://lens.org/096-655-404-701-429} } @article{lens.org/096-725-651-767-207, author = {Hannah J Larsen and Matthew R. Bennett}, title = {Empirical Evaluation of the Reliability of Photogrammetry Software in the Recovery of Three‐Dimensional Footwear Impressions}, journal = {Journal of forensic sciences}, year = {2020}, volume = {65}, number = {5}, pages = {1722--1729}, month = {May}, doi = {10.1111/1556-4029.14455}, date = {2020-05-14}, note = "\url{https://pubmed.ncbi.nlm.nih.gov/32407555/} ; \url{https://www.onlinelibrary.wiley.com/doi/pdf/10.1111/1556-4029.14455} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/32407555} ; \url{https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.14455} ; \url{http://eprints.bournemouth.ac.uk/34012/} ; \url{https://europepmc.org/article/MED/32407555} ; \url{https://core.ac.uk/download/323108559.pdf}", url = {https://lens.org/096-725-651-767-207} } @article{lens.org/096-899-831-703-200, author = {D.J.E. Masvosvere and Hein S. Venter}, title = {Using a standard approach to the design of next generation e-Supply Chain Digital Forensic Readiness systems}, journal = {SAIEE Africa Research Journal}, year = {2016}, volume = {107}, number = {2}, pages = {104--120}, doi = {10.23919/saiee.2016.8531546}, note = "\url{https://ieeexplore.ieee.org/document/8531546}", url = {https://lens.org/096-899-831-703-200} } @article{lens.org/096-993-850-376-090, author = {Muhammad Shamraiz Bashir and M. A. Khan and Shaheed Zulfikar and Ali Bhutto}, title = {Triage in Live Digital Forensic Analysis}, journal = {The International Journal of Forensic Computer Science}, year = {2013}, volume = {8}, number = {1}, pages = {35--44}, month = {July}, doi = {10.5769/j201301005}, date = {2013-07-02}, note = "\url{http://www.ijofcs.org/V08N1-PP05-TRIAGE-IN-LIVE-DIGITAL.pdf} ; \url{http://www.ijofcs.org/abstract-v08n1-pp05.html}", url = {https://lens.org/096-993-850-376-090} } @article{lens.org/097-034-132-251-966, author = {Ilane Cunha and Ahmed Patel and Jefferson Cavalcante}, title = {A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2017}, volume = {9}, number = {3}, pages = {209--209}, doi = {10.1504/ijesdf.2017.10005633}, url = {https://lens.org/097-034-132-251-966} } @article{lens.org/097-610-747-427-14X, author = {Shreya Pai and Madhavi Bhilegaonkar and Vipul Borhade and Shweta Tripathi}, title = {The PRNU Algorithm of Video Forensics}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, pages = {72--78}, month = {May}, doi = {10.46293/4n6/2020.02.02.15}, date = {2020-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.02.15}", url = {https://lens.org/097-610-747-427-14X} } @article{lens.org/097-729-559-656-234, author = {Aparna Chaturvedi and Ashish Awasthi}, title = {Cyber Forensic – A Literature Review}, journal = {Trinity Journal of Management, IT \& Media}, year = {2019}, volume = {10}, number = {1}, pages = {24--29}, doi = {10.48165/tjmitm.2019.1002}, url = {https://lens.org/097-729-559-656-234} } @article{lens.org/097-817-585-854-322, author = { Hanji}, title = {Internet Epoch Intelligence-Evolution of Open-Source Intelligence}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {February}, doi = {10.46293/4n6/2021.03.01.03}, date = {2021-02-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.01.03}", url = {https://lens.org/097-817-585-854-322} } @article{lens.org/097-848-147-291-445, author = {John W. Coffey}, title = {Proceduralization in Cybersecurity: A Socio-Technical Systems Perspective}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2020}, volume = {9}, number = {3}, pages = {126--138}, doi = {10.17781/p002660}, note = "\url{http://sdiwc.net/digital-library/proceduralization-in-cybersecurity-a-sociotechnical-systems-perspective}", url = {https://lens.org/097-848-147-291-445} } @article{lens.org/097-939-114-561-254, author = {Francesco Servida and Eoghan Casey}, title = {IoT forensic challenges and opportunities for digital traces}, journal = {Digital Investigation}, year = {2019}, volume = {28}, pages = {S22--S29}, doi = {10.1016/j.diin.2019.01.012}, note = "\url{https://www.mendeley.com/catalogue/e3cf9d1d-4196-3739-9172-1f7e473d2f3e/} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287619300222} ; \url{https://dfrws.org/wp-content/uploads/2021/05/2019_EU_paper-iot_forensic_challenges_and_opportunities_for_digital_traces.pdf} ; \url{https://dfrws.org/presentation/iot-forensic-challenges-and-opportunities-for-digital-traces/} ; \url{https://doi.org/10.1016/j.diin.2019.01.012} ; \url{https://core.ac.uk/download/226982753.pdf}", url = {https://lens.org/097-939-114-561-254} } @article{lens.org/098-259-555-485-151, author = {Felix C. Freiling}, title = {From IT forensics to forensic computing}, journal = {it - Information Technology}, year = {2015}, volume = {57}, number = {6}, pages = {337--338}, month = {December}, doi = {10.1515/itit-2015-0039}, date = {2015-12-01}, note = "\url{https://dblp.uni-trier.de/db/journals/it/it57.html#Freiling15}", url = {https://lens.org/098-259-555-485-151} } @article{lens.org/098-397-152-347-251, author = {Santosh Khadsare}, title = {Digital Forensic Report}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.01}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.01}", url = {https://lens.org/098-397-152-347-251} } @article{lens.org/098-711-946-154-008, author = {A. A. Sarkisian}, title = {Legal Regulation thе Forensic Activities in Digitalization}, journal = {Courier of Kutafin Moscow State Law University (MSAL))}, year = {2022}, number = {2}, pages = {157--160}, month = {May}, doi = {10.17803/2311-5998.2022.90.2.157-160}, date = {2022-05-09}, url = {https://lens.org/098-711-946-154-008} } @article{lens.org/098-748-261-333-651, author = {Sriram Raghavan}, title = {Digital forensic research: current state of the art}, journal = {CSI Transactions on ICT}, year = {2012}, volume = {1}, number = {1}, pages = {91--114}, month = {November}, doi = {10.1007/s40012-012-0008-7}, date = {2012-11-13}, note = "\url{https://link.springer.com/content/pdf/10.1007%2Fs40012-012-0008-7.pdf} ; \url{https://link.springer.com/article/10.1007/s40012-012-0008-7/fulltext.html} ; \url{https://paperity.org/p/33082795/digital-forensic-research-current-state-of-the-art} ; \url{https://securecyberspace.org/yahoo_site_admin/assets/docs/df-survey.334154504.pdf} ; \url{https://link.springer.com/article/10.1007/s40012-012-0008-7} ; \url{http://securecyberspace.org/yahoo_site_admin/assets/docs/df-survey.334154504.pdf}", url = {https://lens.org/098-748-261-333-651} } @article{lens.org/098-758-324-126-430, author = {null MatveevaVesta}, title = {Assessment of uniformity of byte distribution in a file based on the wavelet transform as an approach to search encrypted data}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2015}, month = {May}, date = {2015-05-01}, note = "\url{https://dl.acm.org/doi/10.5555/2787057.2787060}", url = {https://lens.org/098-758-324-126-430} } @article{lens.org/098-789-704-370-365, title = {An Analysis of Zinc-Toxicological Profiling from Forensic Biological Evidence-Urine}, journal = {Journal of Forensic Sciences and Digital Investigation}, year = {2019}, pages = {55--59}, month = {April}, doi = {10.29199/2637-7136/fsdi-201023}, date = {2019-04-25}, url = {https://lens.org/098-789-704-370-365} } @article{lens.org/098-818-169-461-619, author = {Sekie Amanuel Majore and Hyunguk Yoo and Taeshik Shon}, title = {Secure and reliable electronic record management system using digital forensic technologies}, journal = {The Journal of Supercomputing}, year = {2014}, volume = {70}, number = {1}, pages = {149--165}, month = {March}, doi = {10.1007/s11227-014-1137-6}, date = {2014-03-08}, note = "\url{https://dblp.uni-trier.de/db/journals/tjs/tjs70.html#MajoreYS14} ; \url{http://dblp.uni-trier.de/db/journals/tjs/tjs70.html#MajoreYS14} ; \url{https://link.springer.com/article/10.1007/s11227-014-1137-6} ; \url{https://rd.springer.com/article/10.1007/s11227-014-1137-6} ; \url{https://doi.org/10.1007/s11227-014-1137-6}", url = {https://lens.org/098-818-169-461-619} } @article{lens.org/098-869-712-584-566, author = {Kumarshankar Raychaudhuri}, title = {A Comparative Study of Analysis and Extraction of Digital Forensic Evidences from exhibits using Disk Forensic Tools}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2019}, volume = {8}, number = {3}, pages = {194--205}, doi = {10.17781/p002608}, note = "\url{http://sdiwc.net/digital-library/a-comparative-study-of-analysis-and-extraction-of-digital-forensic-evidences-from-exhibits-using-disk-forensic-tools}", url = {https://lens.org/098-869-712-584-566} } @article{lens.org/098-880-940-361-257, author = {F. Mitchell}, title = {The use of Artificial Intelligence in digital forensics: An introduction}, journal = {Digital Evidence and Electronic Signature Law Review}, year = {2014}, volume = {7}, number = {0}, pages = {35--41}, month = {January}, doi = {10.14296/deeslr.v7i0.1922}, date = {2014-01-27}, note = "\url{https://pureportal.coventry.ac.uk/en/publications/the-use-of-artificial-intelligence-in-digital-forensics-an-introd} ; \url{https://sas-space.sas.ac.uk/5533/} ; \url{https://journals.sas.ac.uk/deeslr/article/view/1922/1859} ; \url{https://core.ac.uk/download/228154935.pdf}", url = {https://lens.org/098-880-940-361-257} } @article{lens.org/098-901-576-786-493, author = {Bery Actoriano and Riadi}, title = {Forensic Investigation on Whatsapp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2.}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {4}, pages = {410--419}, month = {October}, date = {2018-10-01}, note = "\url{http://sdiwc.net/digital-library/forensic-investigation-on-whatsapp-web-using-framework-integrated-digital-forensic-investigation-framework-version-2}", url = {https://lens.org/098-901-576-786-493} } @article{lens.org/099-085-540-086-878, author = {Gandeva Bayu Satrya and Febrian Kurniawan}, title = {A Novel Android Memory Forensics for Discovering Remnant Data}, journal = {International Journal on Advanced Science, Engineering and Information Technology}, year = {2020}, volume = {10}, number = {3}, pages = {1008--1015}, month = {June}, doi = {10.18517/ijaseit.10.3.9363}, date = {2020-06-13}, note = "\url{https://dx.doi.org/10.18517/ijaseit.10.3.9363} ; \url{http://dx.doi.org/10.18517/ijaseit.10.3.9363} ; \url{http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=9363} ; \url{https://core.ac.uk/download/pdf/325990748.pdf}", url = {https://lens.org/099-085-540-086-878} } @article{lens.org/099-331-890-581-992, author = {Michael Fairhurst and Cheng Li and Marjory Da Costa-Abreu}, title = {Predictive biometrics: a review and analysis of predicting personal characteristics from biometric data}, journal = {IET Biometrics}, year = {2017}, volume = {6}, number = {6}, pages = {369--378}, month = {July}, doi = {10.1049/iet-bmt.2016.0169}, date = {2017-07-13}, note = "\url{https://dblp.uni-trier.de/db/journals/iet-bmt/iet-bmt6.html#FairhurstLA17} ; \url{https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/iet-bmt.2016.0169} ; \url{http://dblp.uni-trier.de/db/journals/iet-bmt/iet-bmt6.html#FairhurstLA17} ; \url{https://digital-library.theiet.org/content/journals/10.1049/iet-bmt.2016.0169} ; \url{https://shura.shu.ac.uk/25394/} ; \url{https://doi.org/10.1049/iet-bmt.2016.0169} ; \url{https://core.ac.uk/download/pdf/286269435.pdf}", url = {https://lens.org/099-331-890-581-992} } @article{lens.org/099-377-733-522-116, author = {Graeme Horsman and Nina Sunde}, title = {Part 1: The need for peer review in digital forensics}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {35}, pages = {301062--}, doi = {10.1016/j.fsidi.2020.301062}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di35.html#HorsmanS20} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281720303590} ; \url{https://research.tees.ac.uk/en/publications/part-1-the-need-for-peer-review-in-digital-forensics} ; \url{https://core.ac.uk/download/362894515.pdf}", url = {https://lens.org/099-377-733-522-116} } @article{lens.org/099-446-510-492-905, author = {Philip Anderson and Dave Sampson and Seanpaul Gilroy}, title = {Digital investigations: relevance and confidence in disclosure}, journal = {ERA Forum}, year = {2021}, volume = {22}, number = {4}, pages = {587--599}, month = {September}, doi = {10.1007/s12027-021-00687-1}, date = {2021-09-21}, url = {https://lens.org/099-446-510-492-905} } @article{lens.org/099-681-525-938-447, author = {Tanmayee Tilekar and Avinash Kumar}, title = {Artificial Intelligence: An Expedition from Archaic to Advanced Technologies}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.08}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.08}", url = {https://lens.org/099-681-525-938-447} } @article{lens.org/099-820-647-132-182, author = {Zlatko Jakjovski}, title = {A Detailed Study to Examine Digital Forensics and Cyber Security: Trends and Pattern in India}, journal = {International Journal of Forensic Sciences}, year = {2020}, volume = {5}, number = {2}, doi = {10.23880/ijfsc-16000184}, url = {https://lens.org/099-820-647-132-182} } @article{lens.org/099-824-336-659-348, author = {Ahmad Muhammad Ridho and Nuril Anwar}, title = {Cloud Forensics Investigation in Cloud Storage Using IDFIF V2 Method}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2019}, volume = {8}, number = {3}, pages = {232--240}, doi = {10.17781/p002621}, note = "\url{http://sdiwc.net/digital-library/cloud-forensics-investigation-in-cloud-storage-using-idfif-v2-method}", url = {https://lens.org/099-824-336-659-348} } @article{lens.org/100-154-746-639-394, author = {Joseph MbuguaChahira and Jane KinanuKiruki and Peter KipronoKemei}, title = {A Proactive Approach in Network Forensic Investigation Process}, journal = {International Journal of Computer Applications Technology and Research}, year = {2016}, volume = {5}, number = {5}, pages = {304--311}, month = {May}, doi = {10.7753/ijcatr0505.1012}, date = {2016-05-23}, note = "\url{http://ijcat.com/archives/volume5/issue5/ijcatr05051012.pdf}", url = {https://lens.org/100-154-746-639-394} } @article{lens.org/100-166-340-709-899, author = {Navpreet Kaur and R.K Chaudhary and Pankaj Gupta and Baljeet Singh}, title = {Digital Autopsy: Moving From Fiction to Reality}, journal = {Journal of Indian Academy of Forensic Medicine}, year = {2014}, volume = {36}, number = {2}, pages = {195--198}, note = "\url{http://www.indianjournals.com/ijor.aspx?target=ijor:jiafm&volume=36&issue=2&article=017&type=pdf}", url = {https://lens.org/100-166-340-709-899} } @article{lens.org/100-289-225-534-501, author = {Muhammad Sufyian Mohd Azmi and Labeeb Mohsin Abdullah Abdulrahman H. Altalhi and Zailani Mohamed Sidek}, title = {Challenges and Requirements of Digital Forensics Investigation in Wireless Ad-hoc Networks}, journal = {International Journal of Advanced Research in Computer Science}, year = {2012}, volume = {3}, number = {1}, pages = {26--30}, note = "\url{https://www.ijarcs.info/index.php/Ijarcs/article/view/980}", url = {https://lens.org/100-289-225-534-501} } @article{lens.org/100-812-050-439-994, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {34}, pages = {301068--301068}, doi = {10.1016/s2666-2817(20)30365-6}, url = {https://lens.org/100-812-050-439-994} } @article{lens.org/100-852-334-797-730, author = {Jun Su and Liang Liu and Shaohua Zhu and Hongmei Dong and Man Liang and Qian Liu}, title = {Value and prospects of constructing digital slides data of forensic medicine}, journal = {Chinese Journal of Medical Education Research}, year = {2013}, volume = {12}, number = {01}, pages = {39--41}, month = {January}, date = {2013-01-20}, note = "\url{http://rs.yiigle.com/CN116021201301/216148.htm}", url = {https://lens.org/100-852-334-797-730} } @article{lens.org/101-083-734-725-35X, author = {Pantaleon Lutta and Mohamed Sedky and Mohamed Hassan and Uchitha Jayawickrama and Benhur Bakhtiari Bastaki}, title = {The complexity of internet of things forensics: A state-of-the-art review}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301210--}, doi = {10.1016/j.fsidi.2021.301210}, note = "\url{http://eprints.staffs.ac.uk/6934/} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S2666281721001189} ; \url{https://repository.lboro.ac.uk/articles/journal_contribution/The_complexity_of_internet_of_things_forensics_A_state-of-the-art_review/14884137/1}", url = {https://lens.org/101-083-734-725-35X} } @article{lens.org/101-313-419-021-994, author = {Kam-Pui Chow and Frank Y. W. Law and Y. H. Mai}, title = {Understanding Computer Forensics Requirements in China via the “Panda Burning Incense” Virus Case}, journal = {Journal of Digital Forensics, Security and Law}, year = {2014}, volume = {9}, number = {2}, pages = {51--58}, doi = {10.15394/jdfsl.2014.1170}, note = "\url{https://core.ac.uk/display/91667418} ; \url{https://doaj.org/article/d8d352362129465b89a2631dfcac16ab} ; \url{https://commons.erau.edu/jdfsl/vol9/iss2/5/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1170&context=jdfsl} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#ChowLM14} ; \url{https://www.mendeley.com/catalogue/5cc31364-f57d-3fb0-8321-cb4f4a8f7c35/}", url = {https://lens.org/101-313-419-021-994} } @article{lens.org/101-417-271-073-240, author = {Sungmi Park and Nikolay Akatyev and Yunsik Jake Jang and Jisoo Hwang and Dong-Hyun Kim and Woonseon Yu and Hyun Woo Shin and Changhee Han and Jonghyun Kim}, title = {A comparative study on data protection legislations and government standards to implement Digital Forensic Readiness as mandatory requirement}, journal = {Digital Investigation}, year = {2018}, volume = {24}, pages = {S93--S100}, doi = {10.1016/j.diin.2018.01.012}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di24.html#ParkAJHKYSHK18} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287618300446} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287618300446}", url = {https://lens.org/101-417-271-073-240} } @article{lens.org/101-448-987-380-635, author = {Meryem Ammi and Shatha Alarabi and Elhadj Benkhelifa}, title = {Customized blockchain-based architecture for secure smart home for lightweight IoT}, journal = {Information Processing \& Management}, year = {2021}, volume = {58}, number = {3}, pages = {102482--}, doi = {10.1016/j.ipm.2020.102482}, note = "\url{https://dblp.uni-trier.de/db/journals/ipm/ipm58.html#AmmiAB21} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S0306457320309717}", url = {https://lens.org/101-448-987-380-635} } @article{lens.org/101-549-415-202-81X, author = {Eoghan Casey}, title = {Standardization of forming and expressing preliminary evaluative opinions on digital evidence}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {200888--}, doi = {10.1016/j.fsidi.2019.200888}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S1742287619303147} ; \url{https://doi.org/10.1016/j.fsidi.2019.200888}", url = {https://lens.org/101-549-415-202-81X} } @article{lens.org/101-711-086-084-623, author = {Manar Abu Talib and Reem Alnanih and Adel Khelifi}, title = {Application of quality in use model to assess the user experience of open source digital forensics tools}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2020}, volume = {12}, number = {1}, pages = {43--43}, doi = {10.1504/ijesdf.2020.103870}, url = {https://lens.org/101-711-086-084-623} } @article{lens.org/101-819-655-568-965, author = {Nuril Anwar and Riadi}, title = {Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web}, journal = {Jurnal Ilmiah Teknik Elektro Komputer dan Informatika}, year = {2017}, volume = {3}, number = {1}, pages = {1--10}, month = {June}, doi = {10.26555/jiteki.v3i1.6643}, date = {2017-06-30}, note = "\url{http://dx.doi.org/10.26555/jiteki.v3i1.6643} ; \url{http://journal.uad.ac.id/index.php/JITEKI/article/download/6643/3530} ; \url{https://dx.doi.org/10.26555/jiteki.v3i1.6643} ; \url{http://journal.uad.ac.id/index.php/JITEKI/article/view/6643/3530} ; \url{https://core.ac.uk/download/pdf/295348216.pdf}", url = {https://lens.org/101-819-655-568-965} } @article{lens.org/101-875-322-318-577, author = {Yu Jong Jang and Jin Kwak}, title = {Mobile Digital Forensic Procedure for Crime Investigation in Social Network Service}, journal = {The Journal of Korea Navigation Institute}, year = {2013}, volume = {17}, number = {3}, pages = {325--331}, month = {June}, doi = {10.12673/jkoni.2013.17.3.325}, date = {2013-06-30}, note = "\url{http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=HHHHBI_2013_v17n3_325}", url = {https://lens.org/101-875-322-318-577} } @article{lens.org/101-894-461-425-579, author = {Pritheega Magalingam and Azizah Abdul Manaf and Zuraimi Yahya and Rabiah Ahmad}, title = {A New Digital Evidence Retrieval Model for Gambling Machine Forensic Investigation}, journal = {Jurnal Teknologi}, year = {2012}, volume = {54}, number = {1}, pages = {55--69}, month = {January}, doi = {10.11113/jt.v54.91}, date = {2012-01-20}, note = "\url{http://jurnalteknologi.utm.my/index.php/jurnalteknologi/article/view/91} ; \url{https://www.researchgate.net/profile/Pritheega_Magalingam/publication/269758697_A_New_Digital_Evidence_Retrieval_Model_For_Gambling_Machine_Forensic_Investigation/links/557a3f2108ae75363756ffdf.pdf} ; \url{https://core.ac.uk/display/42912128} ; \url{https://journals.utm.my/jurnalteknologi/article/view/91} ; \url{http://www.ijofcs.org/V04N1-PP05%20-%20A%20New%20Digital%20Evidence%20Retrieval%20Model%20for%20Gambling%20Machine.pdf} ; \url{http://eprints.utm.my/id/eprint/44692/}", url = {https://lens.org/101-894-461-425-579} } @article{lens.org/102-117-623-922-990, author = {Alessandro Guarino}, title = {ISSE - Digital Forensics as a Big Data Challenge}, journal = {ISSE 2013 Securing Electronic Business Processes}, year = {2013}, pages = {197--203}, doi = {10.1007/978-3-658-03371-2_17}, note = "\url{https://doi.org/10.1007/978-3-658-03371-2_17} ; \url{https://rd.springer.com/chapter/10.1007/978-3-658-03371-2_17} ; \url{http://www.studioag.pro/wp-content/uploads/2013/10/DigitalForensicsBigData.pdf} ; \url{https://link.springer.com/chapter/10.1007/978-3-658-03371-2_17} ; \url{https://dblp.uni-trier.de/db/conf/isse/isse2013.html#Guarino13}", url = {https://lens.org/102-117-623-922-990} } @article{lens.org/102-169-873-723-040, author = {Graeme Horsman}, title = {Reconstructing streamed video content: A case study on YouTube and Facebook Live stream content in the Chrome web browser cache}, journal = {Digital Investigation}, year = {2018}, volume = {26}, pages = {S30--S37}, doi = {10.1016/j.diin.2018.04.017}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S1742287618301932} ; \url{https://dblp.uni-trier.de/db/journals/di/di26.html#Horsman18a} ; \url{https://research.tees.ac.uk/en/publications/reconstructing-streamed-video-content-a-case-study-on-youtube-and} ; \url{https://doi.org/10.1016/j.diin.2018.04.017} ; \url{https://research.tees.ac.uk/ws/files/6554397/621817.pdf} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287618301932} ; \url{https://core.ac.uk/download/322331504.pdf}", url = {https://lens.org/102-169-873-723-040} } @article{lens.org/102-243-142-344-71X, author = {Graeme Horsman}, title = {Formalising investigative decision making in digital forensics: Proposing the Digital Evidence Reporting and Decision Support (DERDS) framework}, journal = {Digital Investigation}, year = {2019}, volume = {28}, pages = {146--151}, doi = {10.1016/j.diin.2019.01.007}, note = "\url{https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902227595710700} ; \url{https://research.tees.ac.uk/en/publications/formalising-investigative-decision-making-in-digital-forensics-pr} ; \url{https://dblp.uni-trier.de/db/journals/di/di28.html#Horsman19} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287618302731}", url = {https://lens.org/102-243-142-344-71X} } @article{lens.org/102-385-975-365-674, author = {Matthew Davies and Huw Read and Konstantinos Xynos and Iain Sutherland}, title = {Forensic analysis of a Sony PlayStation 4}, journal = {Digital Investigation}, year = {2015}, volume = {12}, pages = {S81--S89}, doi = {10.1016/j.diin.2015.01.013}, note = "\url{https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1939&context=ecuworkspost2013} ; \url{https://core.ac.uk/display/82136117} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287615000146} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287615000146} ; \url{https://www.mendeley.com/catalogue/09696697-6a81-3f40-ae11-bde85b2dac7f/} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2015.01.013} ; \url{https://doi.org/10.1016/j.diin.2015.01.013} ; \url{https://dblp.uni-trier.de/db/journals/di/di12.html#DaviesRXS15} ; \url{https://ro.ecu.edu.au/ecuworkspost2013/938/} ; \url{https://core.ac.uk/download/pdf/82136117.pdf}", url = {https://lens.org/102-385-975-365-674} } @article{lens.org/102-410-389-190-13X, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {300967--300967}, doi = {10.1016/s2666-2817(20)30145-1}, url = {https://lens.org/102-410-389-190-13X} } @article{lens.org/102-562-783-311-06X, author = {Fahad Mazaed Alotaibi and Arafat Al-Dhaqm and Yasser D Al-Otaibi and Abdulrahman A Alsewari}, title = {A Comprehensive Collection and Analysis Model for the Drone Forensics Field.}, journal = {Sensors (Basel, Switzerland)}, year = {2022}, volume = {22}, number = {17}, pages = {6486--6486}, month = {August}, doi = {10.3390/s22176486}, date = {2022-08-29}, url = {https://lens.org/102-562-783-311-06X} } @article{lens.org/102-664-242-084-236, author = {Erhan Akbal and Ibrahim Baloglu and Turker Tuncer and Sengul Dogan}, title = {Forensic analysis of BiP Messenger on android smartphones}, journal = {Australian Journal of Forensic Sciences}, year = {2019}, volume = {52}, number = {5}, pages = {590--609}, month = {May}, doi = {10.1080/00450618.2019.1610064}, date = {2019-05-06}, note = "\url{https://www.tandfonline.com/doi/full/10.1080/00450618.2019.1610064}", url = {https://lens.org/102-664-242-084-236} } @article{lens.org/102-814-076-156-265, author = {Veronica Schmitt and Jason Jordaan}, title = {Establishing the Validity of Md5 and Sha-1 Hashing in Digital Forensic Practice in Light of Recent Research Demonstrating Cryptographic Weaknesses in these Algorithms}, journal = {International Journal of Computer Applications}, year = {2013}, volume = {68}, number = {23}, pages = {40--43}, month = {April}, doi = {10.5120/11723-7433}, date = {2013-04-18}, note = "\url{http://www.lex-informatica.org/2%20Ensuring%20the%20Legality%20of%20the%20Digital%20Forensics%20Process%20in%20South%20Africa.pdf} ; \url{https://www.ijcaonline.org/archives/volume68/number23/11723-7433} ; \url{https://research.ijcaonline.org/volume68/number23/pxc3887433.pdf} ; \url{https://www.ijcaonline.org/archives/volume68/number23/11723-7433?format=pdf}", url = {https://lens.org/102-814-076-156-265} } @article{lens.org/103-294-378-905-305, author = {Horsman Graeme}, title = {Part 1:- quality assurance mechanisms for digital forensic investigations: Introducing the Verification of Digital Evidence (VODE) framework}, journal = {Forensic Science International: Reports}, year = {2020}, volume = {2}, pages = {100038--}, doi = {10.1016/j.fsir.2019.100038}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2665910719300386} ; \url{https://research.tees.ac.uk/en/publications/part-1-quality-assurance-mechanisms-for-digital-forensic-investig} ; \url{https://core.ac.uk/download/pdf/232941017.pdf}", url = {https://lens.org/103-294-378-905-305} } @article{lens.org/103-309-873-918-823, author = {Kyung-Shick Choi and Lou Chitkushev and Kyung-Seok Choo and Claire Lee}, title = {Bureau of Justice Assistance Student Computer and Digital Forensics Educational Opportunities Program}, journal = {International Conference on Cyber Warfare and Security}, year = {2022}, volume = {17}, number = {1}, pages = {36--44}, month = {March}, doi = {10.34190/iccws.17.1.30}, date = {2022-03-02}, url = {https://lens.org/103-309-873-918-823} } @article{lens.org/104-464-081-213-100, author = {Amrit Chhetri}, title = {Cyber Forensic Challenges: Escaping Holes for Cyber Attackers Series 01: Extracting Forensic Evidences from Non- Functional Computer Devices}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, pages = {50--52}, month = {May}, doi = {10.46293/4n6/2020.02.02.09}, date = {2020-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.02.09}", url = {https://lens.org/104-464-081-213-100} } @article{lens.org/104-787-005-142-28X, author = {Parag H. Rughani}, title = {ARTIFICIAL INTELLIGENCE BASED DIGITAL FORENSICS FRAMEWORK}, journal = {International Journal of Advanced Research in Computer Science}, year = {2017}, volume = {8}, number = {8}, pages = {10--14}, month = {October}, doi = {10.26483/ijarcs.v8i8.4571}, date = {2017-10-20}, note = "\url{http://www.ijarcs.info/index.php/Ijarcs/article/download/4571/4116} ; \url{http://ijarcs.info/index.php/Ijarcs/article/view/4571}", url = {https://lens.org/104-787-005-142-28X} } @article{lens.org/105-095-237-899-969, author = {Wahdah Prasetya and Puti Priyana}, title = {Pertimbangan Hakim Atas Penghadiran Bukti Digital Forensik dalam Perkara Kejahatan Fraud}, journal = {Wajah Hukum}, year = {2021}, volume = {5}, number = {2}, pages = {448--459}, month = {October}, doi = {10.33087/wjh.v5i2.472}, date = {2021-10-15}, note = "\url{http://wajahhukum.unbari.ac.id/index.php/wjhkm/article/view/472} ; \url{https://wajahhukum.unbari.ac.id/index.php/wjhkm/article/download/472/172}", url = {https://lens.org/105-095-237-899-969} } @article{lens.org/105-101-095-930-34X, author = {Sanjay Sahay}, title = {Digital Forensics}, journal = {Advanced Computing and Communications}, year = {2020}, month = {December}, doi = {10.34048/2020.4.f2}, date = {2020-12-30}, url = {https://lens.org/105-101-095-930-34X} } @article{lens.org/105-295-175-724-974, author = {Barbara Burton and Eric Y. Drogin}, title = {Acquisition and Interpretation of Digital Information in Forensic Assessments.}, journal = {Harvard review of psychiatry}, year = {2021}, volume = {29}, number = {3}, pages = {234--239}, month = {March}, doi = {10.1097/hrp.0000000000000291}, date = {2021-03-04}, note = "\url{https://www.ncbi.nlm.nih.gov/pubmed/33660624} ; \url{https://europepmc.org/article/MED/33660624} ; \url{https://pubmed.ncbi.nlm.nih.gov/33660624/}", url = {https://lens.org/105-295-175-724-974} } @article{lens.org/106-021-721-854-935, author = {Raahat Devender Singh}, title = {The Art and Science of Digital Visual Media Forensics}, journal = {Forensic, Legal \& Investigative Sciences}, year = {2018}, volume = {4}, pages = {1--6}, month = {December}, doi = {10.24966/flis-733x/100021}, date = {2018-12-26}, note = "\url{http://dx.doi.org/10.24966/flis-733x/100021} ; \url{https://dx.doi.org/10.24966/flis-733x/100021}", url = {https://lens.org/106-021-721-854-935} } @article{lens.org/106-169-386-186-36X, author = {Muhammad Abulaish and Nur Al Hasan Haldar and Jahiruddin Jahiruddin}, title = {P2DF: A Privacy-Preserving Digital Forensics Framework}, journal = {International Journal of Digital Crime and Forensics}, year = {2021}, volume = {13}, number = {6}, pages = {1--15}, month = {November}, doi = {10.4018/ijdcf.288547}, date = {2021-11-01}, note = "\url{https://www.igi-global.com/viewtitle.aspx?TitleId=288547}", url = {https://lens.org/106-169-386-186-36X} } @article{lens.org/106-181-462-850-018, author = {Jean-Paul Van Belle}, title = {Anti-Forensics: A Practitioner Perspective}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2015}, volume = {4}, number = {2}, pages = {390--403}, doi = {10.17781/p001593}, url = {https://lens.org/106-181-462-850-018} } @article{lens.org/106-326-322-500-176, author = {Hany Farid}, title = {Digital forensics in a post-truth age.}, journal = {Forensic science international}, year = {2018}, volume = {289}, pages = {268--269}, month = {June}, doi = {10.1016/j.forsciint.2018.05.047}, date = {2018-06-06}, note = "\url{https://pubmed.ncbi.nlm.nih.gov/29909299/} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/29909299}", url = {https://lens.org/106-326-322-500-176} } @article{lens.org/106-327-211-472-998, author = {Radina Stoykova}, title = {The Presumption of Innocence as a Source for Universal Rules on Digital Evidence: The guiding principle for digital forensics in producing digital evidence for criminal investigations}, journal = {Computer law review international}, year = {2021}, volume = {22}, number = {3}, pages = {74--82}, month = {August}, date = {2021-08-11}, note = "\url{https://research.rug.nl/en/publications/the-presumption-of-innocence-as-a-source-for-universal-rules-on-d} ; \url{https://www.narcis.nl/publication/RecordID/oai%3Apure.rug.nl%3Apublications%2F4164567c-4dc7-4e5e-a050-6b3ca0f42833}", url = {https://lens.org/106-327-211-472-998} } @article{lens.org/106-335-104-403-831, author = {Turker Tuncer and Sengul Dogan and Fatih Ertam}, title = {A novel neural network based image descriptor for texture classification}, journal = {Physica A: Statistical Mechanics and its Applications}, year = {2019}, volume = {526}, pages = {120955--}, doi = {10.1016/j.physa.2019.04.191}, note = "\url{https://www.sciencedirect.com/science/article/pii/S0378437119305497} ; \url{http://ui.adsabs.harvard.edu/abs/2019PhyA..52620955T/abstract}", url = {https://lens.org/106-335-104-403-831} } @article{lens.org/106-438-149-842-522, author = {Graeme Horsman}, title = {“Scaffolding” responses to digital forensic inquiries}, journal = {WIREs Forensic Science}, year = {2021}, volume = {4}, number = {4}, month = {November}, doi = {10.1002/wfs2.1451}, date = {2021-11-27}, note = "\url{https://wires.onlinelibrary.wiley.com/doi/pdf/10.1002/wfs2.1451}", url = {https://lens.org/106-438-149-842-522} } @article{lens.org/106-997-247-556-643, author = {Farid Daryabar and Ali Dehghantanha}, title = {A review on impacts of cloud computing and digital forensics}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2014}, volume = {2}, number = {2}, pages = {77--94}, note = "\url{http://sdiwc.net/digital-library/a-review-on-impacts-of-cloud-computing-on-digital-forensics.html} ; \url{https://usir.salford.ac.uk/34013/}", url = {https://lens.org/106-997-247-556-643} } @article{lens.org/107-291-552-186-572, author = {Ravin Kumar and Animesh Kumar Agrawal}, title = {Drone GPS data analysis for flight path reconstruction: A study on DJI, Parrot \& Yuneec make drones}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301182--}, doi = {10.1016/j.fsidi.2021.301182}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2666281721000901} ; \url{https://doi.org/10.1016/j.fsidi.2021.301182}", url = {https://lens.org/107-291-552-186-572} } @article{lens.org/107-338-245-292-063, author = {Mohammed Alzaabi and Thomas Martin and Kamal Taha and Andrew Jones}, title = {THE USE OF ONTOLOGIES IN FORENSIC ANALYSIS OF SMARTPHONE CONTENT}, journal = {Journal of Digital Forensics, Security and Law}, year = {2015}, volume = {10}, number = {4}, pages = {105--114}, doi = {10.15394/jdfsl.2015.1215}, note = "\url{https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=3507&context=ecuworkspost2013} ; \url{https://commons.erau.edu/jdfsl/vol10/iss4/9/} ; \url{https://core.ac.uk/display/81695325} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1215&context=jdfsl} ; \url{https://ro.ecu.edu.au/ecuworkspost2013/2496/} ; \url{https://core.ac.uk/download/81695325.pdf}", url = {https://lens.org/107-338-245-292-063} } @article{lens.org/107-814-078-721-776, author = {Min Su Park and Jung Heum Park and Sang Jin Lee}, title = {Record File Carving Technique for Efficient File Recovery in Digital Forensic Investigation}, journal = {KIPS Transactions on Computer and Communication Systems}, year = {2013}, volume = {2}, number = {2}, pages = {93--102}, month = {February}, doi = {10.3745/ktccs.2013.2.2.093}, date = {2013-02-28}, note = "\url{http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBCRIN_2013_v2n2_93} ; \url{http://www.ndsl.kr/soc_img/society/kips/JBCRIN/2013/v2n2/JBCRIN_2013_v2n2_93.pdf} ; \url{http://koreascience.or.kr/journal/view.jsp?kj=JBCRIN&py=2013&vnc=v2n2&sp=93} ; \url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001743148} ; \url{http://ktccs.kips.or.kr/digital-library/4660}", url = {https://lens.org/107-814-078-721-776} } @article{lens.org/107-992-128-750-519, author = {Muhammad Saleh Jafri and Suwanto Raharjo and M. Rudiyanto Arief}, title = {Implementation of ACPO Framework for Digital Evidence Acquisition in Smartphones}, journal = {CCIT Journal}, year = {2022}, volume = {15}, number = {1}, pages = {82--105}, month = {February}, doi = {10.33050/ccit.v15i1.1586}, date = {2022-02-07}, url = {https://lens.org/107-992-128-750-519} } @article{lens.org/108-070-913-448-812, author = {Corinne Rogers}, title = {From time theft to time stamps: mapping the development of digital forensics from law enforcement to archival authority}, journal = {International Journal of Digital Humanities}, year = {2019}, volume = {1}, number = {1}, pages = {13--28}, month = {March}, doi = {10.1007/s42803-019-00002-y}, date = {2019-03-04}, note = "\url{https://link.springer.com/article/10.1007/s42803-019-00002-y}", url = {https://lens.org/108-070-913-448-812} } @article{lens.org/108-082-937-872-755, author = {Gregory Wiedeman}, title = {Practical Digital Forensics at Accession for Born-Digital Institutional Records}, journal = {Code4Lib Journal}, year = {2016}, number = {31}, month = {January}, date = {2016-01-28}, note = "\url{https://journal.code4lib.org/articles/11239}", url = {https://lens.org/108-082-937-872-755} } @article{lens.org/108-429-571-486-082, author = {Davidson C. Onwubiko and Felix E. Eboibi}, title = {The application of forensics examination in crime-related prosecution}, journal = {Digital Evidence and Electronic Signature Law Review}, year = {2020}, pages = {83--93}, month = {November}, doi = {10.14296/deeslr.v17i0.5228}, date = {2020-11-02}, note = "\url{https://journals.sas.ac.uk/deeslr/article/download/5228/5075}", url = {https://lens.org/108-429-571-486-082} } @article{lens.org/108-433-759-883-41X, author = {Yoon-Bin Lim and Myung-Sub Shin and Dong-Joo Park}, title = {A Recovery Technique against File Wiping for Digital Forensic on NAND Flash Memory}, journal = {Journal of KIISE:Databases}, year = {2012}, volume = {39}, number = {2}, pages = {100--108}, note = "\url{http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBGHEH_2012_v39n2_100} ; \url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001652284}", url = {https://lens.org/108-433-759-883-41X} } @article{lens.org/108-757-813-890-372, author = {Himani Rawat}, title = {ABHED - Artificial Intelligence Based Human Efface Detection}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.13}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.13}", url = {https://lens.org/108-757-813-890-372} } @article{lens.org/109-348-478-867-966, author = {Kathryn C. Seigfried-Spellar}, title = {Assessing the Psychological Well-being and Coping Mechanisms of Law Enforcement Investigators vs. Digital Forensic Examiners of Child Pornography Investigations}, journal = {Journal of Police and Criminal Psychology}, year = {2017}, volume = {33}, number = {3}, pages = {215--226}, month = {December}, doi = {10.1007/s11896-017-9248-7}, date = {2017-12-04}, note = "\url{https://link.springer.com/article/10.1007%2Fs11896-017-9248-7} ; \url{https://link.springer.com/content/pdf/10.1007%2Fs11896-017-9248-7.pdf}", url = {https://lens.org/109-348-478-867-966} } @article{lens.org/109-597-940-114-831, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301382--301382}, doi = {10.1016/s2666-2817(22)00063-4}, url = {https://lens.org/109-597-940-114-831} } @article{lens.org/109-629-313-549-75X, author = {Funminiyi Olajide and Richard Trafford}, title = {FALI: Time Memory Information of Windows Computer Systems}, journal = {International Journal of Intelligent Computing Research}, year = {2013}, volume = {4}, number = {4}, pages = {354--357}, month = {December}, doi = {10.20533/ijicr.2042.4655.2013.0046}, date = {2013-12-01}, note = "\url{http://infonomics-society.org/wp-content/uploads/ijicr/published-papers/volume-4-2013/FALI-Time-Memory-Information-of-Windows-Computer-Systems.pdf}", url = {https://lens.org/109-629-313-549-75X} } @article{lens.org/109-904-428-698-679, author = {Paul Gooding and Jos Smith and Justine Mann}, title = {The forensic imagination: interdisciplinary approaches to tracing creativity in writers' born-digital archives}, journal = {Archives and Manuscripts}, year = {2019}, volume = {47}, number = {3}, pages = {374--390}, month = {August}, doi = {10.1080/01576895.2019.1608837}, date = {2019-08-11}, note = "\url{http://eprints.gla.ac.uk/184018/} ; \url{https://www.tandfonline.com/doi/full/10.1080/01576895.2019.1608837} ; \url{https://ueaeprints.uea.ac.uk/70967/} ; \url{https://research-portal.uea.ac.uk/en/publications/the-forensic-imagination-interdisciplinary-approaches-to-tracing-} ; \url{https://core.ac.uk/download/200201245.pdf}", url = {https://lens.org/109-904-428-698-679} } @article{lens.org/110-131-476-217-052, author = {Prashant Khobragade* and Pranay Saraf and Preeti Thakre and Priya maidamwar}, title = {Data Mining Technique to Data Collection and Analysis for Cyber Forensic}, journal = {International Journal of Recent Technology and Engineering (IJRTE)}, year = {2020}, volume = {8}, number = {5}, pages = {2786--2789}, month = {January}, doi = {10.35940/ijrte.d8543.018520}, date = {2020-01-30}, url = {https://lens.org/110-131-476-217-052} } @article{lens.org/110-142-835-904-035, author = {Sarunas Grigaliunas and Jevgenijus Toldinas and Algimantas Venčkauskas and Nerijus Morkevicius and Robertas Damasevicius}, title = {Digital Evidence Object Model for Situation Awareness and Decision Making in Digital Forensics Investigation}, journal = {IEEE Intelligent Systems}, year = {2021}, volume = {36}, number = {05}, pages = {39--48}, month = {September}, doi = {10.1109/mis.2020.3020008}, date = {2021-09-01}, note = "\url{https://www.computer.org/csdl/magazine/ex/2021/05/09178959/1mDpBvAEzn2} ; \url{https://ieeexplore.ieee.org/abstract/document/9178959/} ; \url{https://dblp.uni-trier.de/db/journals/expert/expert36.html#GrigaliunasTVMD21}", url = {https://lens.org/110-142-835-904-035} } @article{lens.org/110-377-139-748-215, author = {Christopher Neale and Ian Kennedy and Blaine Price and Yijun Yu and Bashar Nuseibeh}, title = {The case for Zero Trust Digital Forensics}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301352--301352}, doi = {10.1016/j.fsidi.2022.301352}, url = {https://lens.org/110-377-139-748-215} } @article{lens.org/111-488-239-742-003, author = {Graeme Horsman}, title = {Framework for Reliable Experimental Design (FRED):: A research framework to ensure the dependable interpretation of digital data for digital forensics}, journal = {Computers \& Security}, year = {2018}, volume = {73}, pages = {294--306}, doi = {10.1016/j.cose.2017.11.009}, note = "\url{https://doi.org/10.1016/j.cose.2017.11.009} ; \url{https://research.tees.ac.uk/en/publications/framework-for-reliable-experimental-design-fred-a-research-framew} ; \url{https://research.tees.ac.uk/ws/files/4355231/621551.pdf} ; \url{https://dblp.uni-trier.de/db/journals/compsec/compsec73.html#Horsman18} ; \url{https://www.sciencedirect.com/science/article/pii/S0167404817302468} ; \url{https://core.ac.uk/download/pdf/196166325.pdf}", url = {https://lens.org/111-488-239-742-003} } @article{lens.org/112-744-755-472-229, author = {Bandar Saleh Mouhammed ِAlmaslukh}, title = {Forensic Analysis using Text Clustering in the Age of Large Volume Data: A Review}, journal = {International Journal of Advanced Computer Science and Applications}, year = {2019}, volume = {10}, number = {6}, doi = {10.14569/ijacsa.2019.0100610}, note = "\url{https://thesai.org/Publications/ViewPaper?Volume=10&Issue=6&Code=IJACSA&SerialNo=10} ; \url{https://thesai.org/Downloads/Volume10No6/Paper_10-Forensic_Analysis_using_Text_Clustering.pdf} ; \url{https://repository.psau.edu.sa/xmlui/handle/123456789/92614}", url = {https://lens.org/112-744-755-472-229} } @article{lens.org/112-917-373-753-714, author = {Bruce Nikkel}, title = {Editorial}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301388--301388}, doi = {10.1016/j.fsidi.2022.301388}, url = {https://lens.org/112-917-373-753-714} } @article{lens.org/112-972-498-965-560, author = {Sachin Arun Thanekar and K. Subrahmanyam and A. B. Bagwan}, title = {A Study on Digital Forensics in Hadoop}, journal = {Indonesian Journal of Electrical Engineering and Computer Science}, year = {2016}, volume = {4}, number = {2}, pages = {473--478}, month = {November}, doi = {10.11591/ijeecs.v4.i2.pp473-478}, date = {2016-11-01}, note = "\url{http://ijeecs.iaescore.com/index.php/IJEECS/article/view/5989} ; \url{http://ijeecs.iaescore.com/index.php/IJEECS/article/download/5989/5324} ; \url{https://www.iaescore.com/journals/index.php/IJEECS/article/view/5989/5324}", url = {https://lens.org/112-972-498-965-560} } @article{lens.org/112-973-164-071-334, author = {Muhammad Naim Al Jumah and Bambang Sugiantoro and Yudi Prayudi}, title = {PENERAPAN METODE COMPOSITE LOGIC UNTUK PERANCANGAN FRAMEWORK PENGUMPULAN BUKTI DIGITAL PADA MEDIA SOSIAL}, journal = {ILKOM Jurnal Ilmiah}, year = {2019}, volume = {11}, number = {2}, pages = {135--142}, month = {August}, doi = {10.33096/ilkom.v11i2.442.135-142}, date = {2019-08-31}, note = "\url{http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/download/442/185} ; \url{http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/view/442} ; \url{https://doaj.org/article/efcb636576584f61b976088a5506c006} ; \url{https://core.ac.uk/download/pdf/228866360.pdf}", url = {https://lens.org/112-973-164-071-334} } @article{lens.org/113-231-146-599-024, author = {Yanjun Cao and Tiegang Gao and Guorui Sheng and Li Fan and Lin Gao}, title = {A new anti-forensic scheme--hiding the single JPEG compression trace for digital image.}, journal = {Journal of forensic sciences}, year = {2014}, volume = {60}, number = {1}, pages = {197--205}, month = {December}, doi = {10.1111/1556-4029.12618}, date = {2014-12-01}, note = "\url{https://dialnet.unirioja.es/servlet/articulo?codigo=5215319} ; \url{https://www.onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.12618} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/25442510}", url = {https://lens.org/113-231-146-599-024} } @article{lens.org/114-090-829-194-843, author = {Shahzad Saleem and Oliver Popov and Ibrahim Bagilli}, title = {KES - Extended abstract digital forensics model with preservation and protection as umbrella principles}, journal = {Procedia Computer Science}, year = {2014}, volume = {35}, pages = {812--821}, doi = {10.1016/j.procs.2014.08.246}, note = "\url{https://dblp.uni-trier.de/db/conf/kes/kes2014.html#SaleemPB14} ; \url{https://core.ac.uk/display/82554968} ; \url{http://www.diva-portal.org/smash/record.jsf?pid=diva2:773761} ; \url{https://www.researchgate.net/profile/Ibrahim_Baggili/publication/265848150_Extended_abstract_digital_forensics_model_with_preservation_and_protection_as_umbrella_principles/links/541e2d720cf2218008d1dd10.pdf} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1877050914012113} ; \url{https://www.sciencedirect.com/science/article/pii/S1877050914012113} ; \url{https://core.ac.uk/download/pdf/82554968.pdf}", url = {https://lens.org/114-090-829-194-843} } @article{lens.org/114-239-357-516-674, author = { Riadi and Abdul Fadlil and Ammar Fauzan}, title = {A Study of Mobile Forensic Tools Evaluation on Android-Based LINE Messenger}, journal = {International Journal of Advanced Computer Science and Applications}, year = {2018}, volume = {9}, number = {10}, doi = {10.14569/ijacsa.2018.091024}, note = "\url{https://thesai.org/Publications/ViewPaper?Volume=9&Issue=10&Code=IJACSA&SerialNo=24} ; \url{https://thesai.org/Downloads/Volume9No10/Paper_24-A_Study_of_Mobile_Forensic_Tools.pdf}", url = {https://lens.org/114-239-357-516-674} } @article{lens.org/114-473-027-477-559, author = {Gurpal Singh Chhabra and Prashant Kumar Singh}, title = {Distributed Network Forensics Framework: A Systematic Review}, journal = {International Journal of Computer Applications}, year = {2015}, volume = {119}, number = {19}, pages = {31--35}, month = {June}, doi = {10.5120/21178-4201}, date = {2015-06-18}, note = "\url{https://www.ijcaonline.org/archives/volume119/number19/21178-4201} ; \url{https://research.ijcaonline.org/volume119/number19/pxc3904201.pdf} ; \url{http://ui.adsabs.harvard.edu/abs/2015IJCA..119s..31S/abstract}", url = {https://lens.org/114-473-027-477-559} } @article{lens.org/114-642-612-579-69X, author = {Synthiana Rachmie}, title = {PERANAN ILMU DIGITAL FORENSIK TERHADAP PENYIDIKAN KASUS PERETASAN WEBSITE}, journal = {Vol. 21 No 1 April 2020}, year = {2020}, number = {21}, pages = {104--127}, month = {July}, doi = {10.23969/litigasi.v21i1.2388}, date = {2020-07-14}, note = "\url{http://dx.doi.org/10.23969/litigasi.v21i1.2388}", url = {https://lens.org/114-642-612-579-69X} } @article{lens.org/114-976-379-033-024, author = {Hong Guo and Junlei Hou}, title = {Review of the accreditation of digital forensics in China}, journal = {Forensic sciences research}, year = {2018}, volume = {3}, number = {3}, pages = {194--201}, month = {July}, doi = {10.1080/20961790.2018.1503526}, date = {2018-07-03}, note = "\url{https://pubmed.ncbi.nlm.nih.gov/30483669/} ; \url{https://doaj.org/article/8f9b08b437904df595539a131ea9c9a5} ; \url{https://www.tandfonline.com/doi/full/10.1080/20961790.2018.1503526} ; \url{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6201810} ; \url{https://europepmc.org/article/MED/30483669}", url = {https://lens.org/114-976-379-033-024} } @article{lens.org/115-332-981-445-059, author = {Yugal Pathak}, title = {Forensic analysis in Mobile Cloud Computing architecture}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, pages = {25--30}, month = {May}, doi = {10.46293/4n6/2020.02.02.04}, date = {2020-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.02.04}", url = {https://lens.org/115-332-981-445-059} } @article{lens.org/115-364-165-954-740, author = {Jingyi Shen and Yun Yao and Hao Mei}, title = {Design of Image Copy-Paste Forensics System Based on Moment Invariants}, journal = {International Journal for Innovation Education and Research}, year = {2021}, volume = {9}, number = {11}, pages = {552--555}, month = {November}, doi = {10.31686/ijier.vol9.iss11.3547}, date = {2021-11-01}, note = "\url{https://ijier.net/ijier/article/download/3547/2387}", url = {https://lens.org/115-364-165-954-740} } @article{lens.org/115-729-001-970-735, author = {Mukesh Dalal and Mamta Juneja}, title = {Video steganalysis to obstruct criminal activities for digital forensics: a survey}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2018}, volume = {10}, number = {4}, pages = {338--338}, doi = {10.1504/ijesdf.2018.095122}, url = {https://lens.org/115-729-001-970-735} } @article{lens.org/116-473-356-479-419, author = {Jan Peter van Zandwijk and Abdul Boztas}, title = {The phone reveals your motion: Digital traces of walking, driving and other movements on iPhones}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {37}, pages = {301170--}, doi = {10.1016/j.fsidi.2021.301170}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S2666281721000780} ; \url{https://doi.org/10.1016/j.fsidi.2021.301170} ; \url{https://dblp.uni-trier.de/db/journals/di/di37.html#ZandwijkB21}", url = {https://lens.org/116-473-356-479-419} } @article{lens.org/116-690-629-016-841, author = {Seth Adjei Gyimah}, title = {X-Ways Forensics Platform For Digital Forensics Examiners}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {353--356}, month = {July}, doi = {10.22624/aims/crp-bk3-p56}, date = {2022-07-26}, url = {https://lens.org/116-690-629-016-841} } @article{lens.org/117-070-059-884-741, author = {Raffaele Cuomo and Davide D'Agostino and Mario Ianulardo}, title = {Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments.}, journal = {Sensors (Basel, Switzerland)}, year = {2022}, volume = {22}, number = {18}, pages = {7096--7096}, month = {September}, doi = {10.3390/s22187096}, date = {2022-09-19}, url = {https://lens.org/117-070-059-884-741} } @article{lens.org/117-095-420-741-153, author = {April Tanner and Soniael Duncan}, title = {On Integrating Mobile Applications into the Digital Forensic Investigative Process}, journal = {International Journal of Advanced Computer Science and Applications}, year = {2013}, volume = {4}, number = {8}, doi = {10.14569/ijacsa.2013.040809}, note = "\url{https://thesai.org/Downloads/Volume4No8/Paper_9-On_Integrating_Mobile_Applications_into_the_Digital_Forensic.pdf} ; \url{https://thesai.org/Publications/ViewPaper?Volume=4&Issue=8&Code=IJACSA&SerialNo=9}", url = {https://lens.org/117-095-420-741-153} } @article{lens.org/117-319-780-113-791, author = {Yana Kortsarts}, title = {Teaching computer forensics course: challenges and opportunities}, journal = {Journal of Computing Sciences in Colleges}, year = {2017}, volume = {32}, number = {6}, pages = {208--209}, month = {June}, date = {2017-06-01}, note = "\url{https://dl.acm.org/citation.cfm?id=3069693}", url = {https://lens.org/117-319-780-113-791} } @article{lens.org/117-509-642-665-78X, author = {Hee-il Park and Jongseong Yoon and Sangjin Lee}, title = {A Study on Development of Digital Forensic Capability Evaluation Indices}, journal = {Journal of the Korea Institute of Information Security and Cryptology}, year = {2015}, volume = {25}, number = {5}, pages = {1153--1166}, month = {October}, doi = {10.13089/jkiisc.2015.25.5.1153}, date = {2015-10-31}, note = "\url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002042112} ; \url{http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2015_v25n5_1153}", url = {https://lens.org/117-509-642-665-78X} } @article{lens.org/117-594-679-776-482, author = {Mohammad Hafiz Hersyah}, title = {A Proposed Model of Digital Forensic on Cloud Computing Security Infrastructure}, journal = {International Journal of Innovation in Enterprise System}, year = {2018}, volume = {2}, number = {02}, pages = {18--23}, month = {July}, doi = {10.25124/ijies.v2i02.21}, date = {2018-07-30}, note = "\url{https://www.neliti.com/publications/349400/a-proposed-model-of-digital-forensic-on-cloud-computing-security-infrastructure} ; \url{https://ijies.sie.telkomuniversity.ac.id/index.php/IJIES/article/download/21/19} ; \url{https://core.ac.uk/download/pdf/295356391.pdf}", url = {https://lens.org/117-594-679-776-482} } @article{lens.org/117-843-664-085-149, author = {Johannes Stadlinger and Andreas Dewald}, title = {A Forensic Email Analysis Tool Using Dynamic Visualization}, journal = {Journal of Digital Forensics, Security and Law}, year = {2017}, volume = {12}, number = {1}, pages = {6--}, doi = {10.15394/jdfsl.2017.1413}, note = "\url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#StadlingerD17} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1413&context=jdfsl} ; \url{https://commons.erau.edu/jdfsl/vol12/iss1/6/} ; \url{https://doi.org/10.15394/jdfsl.2017.1413}", url = {https://lens.org/117-843-664-085-149} } @article{lens.org/118-103-890-724-159, author = {Brett Lempereur and Madjid Merabti and Qi Shi}, title = {Pypette: A Platform for the Evaluation of Live Digital Forensics}, journal = {International Journal of Digital Crime and Forensics}, year = {2012}, volume = {4}, number = {4}, pages = {31--46}, month = {October}, doi = {10.4018/jdcf.2012100103}, date = {2012-10-01}, note = "\url{https://www.igi-global.com/article/pypette-platform-evaluation-live-digital/74804} ; \url{https://doi.org/10.4018/jdcf.2012100103} ; \url{http://doi.org/10.4018/jdcf.2012100103} ; \url{https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf4.html#LempereurMS12}", url = {https://lens.org/118-103-890-724-159} } @article{lens.org/118-444-471-106-597, author = {Bojan Trifković}, title = {KOMPARATIVNA ANALIZA OPEN-SOURCE ALATA ZA DIGITALNU FORENZIKU MOBILNIH UREĐAJA}, journal = {Zbornik radova Fakulteta tehničkih nauka u Novom Sadu}, year = {2021}, volume = {36}, number = {11}, pages = {1910--1913}, month = {November}, doi = {10.24867/15be14trifkovic}, date = {2021-11-07}, note = "\url{http://ftn.uns.ac.rs/ojs/index.php/zbornik/article/view/1831}", url = {https://lens.org/118-444-471-106-597} } @article{lens.org/118-504-831-882-891, author = {Audrey Asante and Vincent Amankona}, title = {DIGITAL FORENSIC READINESS FRAMEWORK BASED ON HONEYPOT AND HONEYNET FOR BYOD}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2021}, volume = {16}, number = {2}, pages = {2--}, month = {September}, date = {2021-09-07}, note = "\url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1706&context=jdfsl} ; \url{https://commons.erau.edu/jdfsl/vol16/iss2/2/}", url = {https://lens.org/118-504-831-882-891} } @article{lens.org/118-589-466-619-969, author = {Randi Rizal and Ruuhwan Ruuhwan and Septian Chandra}, title = {Signature File Analysis Using The National Institute Standard Technology Method Base on Digital Forensic Concepts}, journal = {Jurnal Informatika Universitas Pamulang}, year = {2020}, volume = {5}, number = {3}, pages = {364--370}, month = {September}, doi = {10.32493/informatika.v5i3.6073}, date = {2020-09-30}, note = "\url{http://openjournal.unpam.ac.id/index.php/informatika/article/download/6073/pdf} ; \url{http://openjournal.unpam.ac.id/index.php/informatika/article/view/6073} ; \url{https://core.ac.uk/download/337610059.pdf}", url = {https://lens.org/118-589-466-619-969} } @article{lens.org/118-838-969-146-870, author = {Nickson M. Karie and Hein S. Venter}, title = {Taxonomy of Challenges for Digital Forensics.}, journal = {Journal of forensic sciences}, year = {2015}, volume = {60}, number = {4}, pages = {885--893}, month = {July}, doi = {10.1111/1556-4029.12809}, date = {2015-07-14}, note = "\url{https://repository.up.ac.za/bitstream/2263/51104/1/Karie_Taxonomy_2015.pdf} ; \url{https://repository.up.ac.za/handle/2263/51104} ; \url{https://dialnet.unirioja.es/servlet/articulo?codigo=5312745} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/26175261} ; \url{https://onlinelibrary.wiley.com/doi/10.1111/1556-4029.12809} ; \url{https://europepmc.org/article/MED/26175261} ; \url{https://pubmed.ncbi.nlm.nih.gov/26175261/}", url = {https://lens.org/118-838-969-146-870} } @article{lens.org/118-968-004-680-589, author = {Aine MacDermott and Thar Baker and Paul Buck and Farkhund Iqbal and Qi Shi}, title = {The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics}, journal = {International Journal of Digital Crime and Forensics}, year = {2020}, volume = {12}, number = {1}, pages = {1--13}, doi = {10.4018/ijdcf.2020010101}, note = "\url{https://researchonline.ljmu.ac.uk/id/eprint/9496/} ; \url{https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf12.html#MacDermottBBIS20} ; \url{https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902221890881455} ; \url{https://www.igi-global.com/article/the-internet-of-things-challenges-and-considerations-for-cybercrime-investigations-and-digital-forensics/240648} ; \url{https://core.ac.uk/download/pdf/237431131.pdf}", url = {https://lens.org/118-968-004-680-589} } @article{lens.org/118-998-556-606-739, author = {Tracy Walraven}, title = {The Impact of Digital Evidence in Forensic Laboratories}, journal = {Forensic Science International: Synergy}, year = {2021}, volume = {3}, pages = {100178--}, doi = {10.1016/j.fsisyn.2021.100178}, note = "\url{https://api.elsevier.com/content/article/PII:S2589871X21000486?httpAccept=text/xml}", url = {https://lens.org/118-998-556-606-739} } @article{lens.org/119-046-468-612-395, author = {Aswathi Balachandran and Ribu Hassini}, title = {Forensic Examination Of Android Mobile Devices}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.14}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.14}", url = {https://lens.org/119-046-468-612-395} } @article{lens.org/119-423-654-801-14X, author = {Mohd Najwadi Yusoof and Ramlan Mahmod and Ali Dehghantanha}, title = {Performance measurement for mobile forensic data acquisition in Firefox OS}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2014}, volume = {3}, number = {3}, pages = {130--140}, doi = {10.17781/p001333}, note = "\url{http://sdiwc.net/digital-library/performance-measurement-for-mobile-forensic-data-acquisition-in-firefox-os} ; \url{http://psasir.upm.edu.my/id/eprint/34877/} ; \url{https://core.ac.uk/download/153815451.pdf}", url = {https://lens.org/119-423-654-801-14X} } @article{lens.org/119-712-669-804-088, author = {Deborah G. Keeling and Michael Losavio}, title = {Public Security \& Digital Forensics in the United States: The Continued Need for Expanded Digital Systems for Security}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2017}, volume = {12}, number = {3}, pages = {47--60}, doi = {10.15394/jdfsl.2017.1452}, note = "\url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#KeelingL17} ; \url{https://commons.erau.edu/jdfsl/vol12/iss3/6/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1452&context=jdfsl}", url = {https://lens.org/119-712-669-804-088} } @article{lens.org/119-855-179-161-858, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301279--301279}, doi = {10.1016/s2666-2817(21)00197-9}, url = {https://lens.org/119-855-179-161-858} } @article{lens.org/120-503-453-870-160, author = {Eoghan Casey}, title = {Strengthening trust: Integration of digital investigation and forensic science}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {301000--}, doi = {10.1016/j.fsidi.2020.301000}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di33.html#Casey20b} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281720302481}", url = {https://lens.org/120-503-453-870-160} } @article{lens.org/120-936-178-540-100, author = {Abel Yeboah-Ofori and Akoto Derick Brown}, title = {Digital forensics investigation jurisprudence: issues of admissibility of digital evidence}, journal = {Journal of Forensic, Legal \& Investigative Sciences}, year = {2020}, volume = {6}, number = {1}, pages = {1--8}, month = {July}, doi = {10.24966/flis-733x/100045}, date = {2020-07-31}, note = "\url{https://www.scilit.net/article/e17394e85b9e94a3191647c7d867a22e} ; \url{https://repository.uwl.ac.uk/id/eprint/8012/}", url = {https://lens.org/120-936-178-540-100} } @article{lens.org/121-036-341-441-560, author = {Turker Tuncer and Sengul Dogan}, title = {A novel octopus based Parkinson’s disease and gender recognition method using vowels}, journal = {Applied Acoustics}, year = {2019}, volume = {155}, pages = {75--83}, doi = {10.1016/j.apacoust.2019.05.019}, note = "\url{https://www.sciencedirect.com/science/article/pii/S0003682X19304219}", url = {https://lens.org/121-036-341-441-560} } @article{lens.org/121-207-616-071-874, author = {Gandeva Bayu Satrya and A. Ahmad Nasrullah and Soo Young Shin}, title = {Identifying artefact on Microsoft OneDrive client to support Android forensics}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2017}, volume = {9}, number = {3}, pages = {269--291}, doi = {10.1504/ijesdf.2017.085192}, note = "\url{https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2017.085192}", url = {https://lens.org/121-207-616-071-874} } @article{lens.org/121-668-843-429-348, author = {Alastair Irons and Paula Thomas}, title = {Problem Based Learning in Digital Forensics}, journal = {Innovation in Teaching and Learning in Information and Computer Sciences}, year = {2014}, pages = {1--10}, month = {July}, doi = {10.11120/ital.2014.00013}, date = {2014-07-28}, note = "\url{https://www.tandfonline.com/doi/full/10.11120/ital.2014.00013} ; \url{https://core.ac.uk/display/74367909} ; \url{https://core.ac.uk/download/74367909.pdf}", url = {https://lens.org/121-668-843-429-348} } @article{lens.org/121-931-608-998-802, author = {KM Kumar and Sanjeev Sofat and Naveen Aggarwal and Shreyans K. Jain}, title = {Identification of User Ownership in Digital Forensic using Data Mining Technique}, journal = {International Journal of Computer Applications}, year = {2012}, volume = {50}, number = {4}, pages = {1--5}, month = {July}, doi = {10.5120/7756-0818}, date = {2012-07-28}, note = "\url{https://ui.adsabs.harvard.edu/abs/2012IJCA...50d...1K/abstract} ; \url{https://www.ijcaonline.org/archives/volume50/number4/7756-0818} ; \url{https://research.ijcaonline.org/volume50/number4/pxc3880818.pdf}", url = {https://lens.org/121-931-608-998-802} } @article{lens.org/122-368-421-118-373, author = {Samah Mansour}, title = {Cloud Computing and Digital Forensics Challenges}, journal = {GSTF Journal on computing}, year = {2016}, volume = {5}, number = {1}, month = {August}, date = {2016-08-22}, url = {https://lens.org/122-368-421-118-373} } @article{lens.org/123-067-775-038-87X, author = {Adedayo M. Balogun and Shao Ying Zhu}, title = {Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology}, journal = {International Journal of Advanced Computer Science and Applications}, year = {2013}, volume = {4}, number = {5}, doi = {10.14569/ijacsa.2013.040506}, note = "\url{https://thesai.org/Publications/ViewPaper?Volume=4&Issue=5&Code=IJACSA&SerialNo=6} ; \url{https://dblp.uni-trier.de/db/journals/corr/corr1312.html#BalogunZ13} ; \url{https://thesai.org/Downloads/Volume4No5/Paper_6-Privacy_Impacts_of_Data_Encryption_on_the_Efficiency_of_Digital_Forensics_Technology.pdf} ; \url{http://ui.adsabs.harvard.edu/abs/2013arXiv1312.3183B/abstract}", url = {https://lens.org/123-067-775-038-87X} } @article{lens.org/123-275-701-676-787, author = {Gary C. Kessler}, title = {Are mobile device examinations practiced like ‘forensics’?}, journal = {Digital Evidence and Electronic Signature Law Review}, year = {2015}, volume = {12}, number = {0}, pages = {3--9}, month = {November}, doi = {10.14296/deeslr.v12i0.2237}, date = {2015-11-16}, note = "\url{https://journals.sas.ac.uk/deeslr/article/download/2237/2170} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1127&context=publication} ; \url{https://journals.sas.ac.uk/deeslr/article/view/2237} ; \url{https://commons.erau.edu/publication/119/} ; \url{https://works.bepress.com/gary_kessler/50/}", url = {https://lens.org/123-275-701-676-787} } @article{lens.org/123-315-590-178-091, author = {Wang We}, title = {Survey on Techniques of Composite Image Passive Forensics}, journal = {Journal of Nantong University}, year = {2013}, note = "\url{http://en.cnki.com.cn/Article_en/CJFDTOTAL-NGZK201303001.htm}", url = {https://lens.org/123-315-590-178-091} } @article{lens.org/123-591-979-675-820, author = {Ethan Bayne and Robert Ian Ferguson and Adam T. Sampson}, title = {OpenForensics: a digital forensics GPU pattern matching approach for the 21st century}, journal = {Digital Investigation}, year = {2018}, volume = {24}, pages = {S29--S37}, doi = {10.1016/j.diin.2018.01.005}, note = "\url{https://doi.org/10.1016/j.diin.2018.01.005} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287618300379} ; \url{https://core.ac.uk/display/153400622} ; \url{https://dblp.uni-trier.de/db/journals/di/di24.html#BayneFS18} ; \url{https://rke.abertay.ac.uk/en/publications/openforensics-a-digital-forensics-gpu-pattern-matching-approach-f} ; \url{https://core.ac.uk/download/153400622.pdf}", url = {https://lens.org/123-591-979-675-820} } @article{lens.org/123-822-670-262-791, author = {Nirmal Rallan and Komal Vig}, title = {Emerging Role of Digital Forensics in the Investigation of Online Child Pornography}, journal = {Indian Journal of Forensic Medicine \& Toxicology}, year = {2019}, volume = {13}, number = {3}, pages = {199--202}, doi = {10.5958/0973-9130.2019.00195.6}, note = "\url{https://www.indianjournals.com/ijor.aspx?target=ijor:ijfmt&volume=13&issue=3&article=042}", url = {https://lens.org/123-822-670-262-791} } @article{lens.org/124-255-859-306-442, author = {Greg Thornton and Pooneh Bagheri Zadeh}, title = {An investigation into Unmanned Aerial System (UAS) forensics: Data extraction \& analysis}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {41}, pages = {301379--301379}, doi = {10.1016/j.fsidi.2022.301379}, url = {https://lens.org/124-255-859-306-442} } @article{lens.org/124-358-741-540-008, author = {Himani Rawat}, title = {Developing Past and Beyond: 3D Mapping of Crime Scenes in India}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {February}, doi = {10.46293/4n6/2021.03.01.11}, date = {2021-02-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.01.11}", url = {https://lens.org/124-358-741-540-008} } @article{lens.org/125-020-771-045-081, author = {Manar Abu Talib and Reem Alnanih and Adel Khelifi}, title = {Application of quality in use model to assess the user experience of open source digital forensics tools}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2020}, volume = {12}, number = {1}, pages = {43--76}, doi = {10.1504/ijesdf.2020.10025165}, note = "\url{https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2020.103870} ; \url{https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf12.html#TalibAK20}", url = {https://lens.org/125-020-771-045-081} } @article{lens.org/125-274-621-659-002, author = {Liz Maida}, title = {Learning Maliciousness in Cybersecurity Graphs}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2017}, volume = {6}, number = {3}, pages = {121--125}, doi = {10.17781/p002277}, url = {https://lens.org/125-274-621-659-002} } @article{lens.org/125-429-401-452-724, author = {Hilmand Khan and Sarmad Hanif and Bakht Muhammad}, title = {A survey of machine learning applications in digital forensics}, journal = {Trends in Computer Science and Information Technology}, year = {2021}, volume = {6}, number = {1}, pages = {020--024}, month = {April}, doi = {10.17352/tcsit.000034}, date = {2021-04-08}, note = "\url{https://www.peertechzpublications.com/articles/TCSIT-6-134.php} ; \url{https://www.peertechzpublications.com/articles/TCSIT-6-134.pdf}", url = {https://lens.org/125-429-401-452-724} } @article{lens.org/125-551-429-663-864, author = {Е В Христинина and E. V. Christinina}, title = {ON THE USE OF DIGITAL LOGISTICS IN CRIMINAL PROCEEDINGS AND CRIMINALISTICS}, journal = {Juridical Journal of Samara University}, year = {2020}, volume = {6}, number = {3}, pages = {128--132}, month = {September}, doi = {10.18287/2542-047x-2020-6-3-128-132}, date = {2020-09-28}, note = "\url{https://journals.ssau.ru/jjsu/article/view/8122} ; \url{https://journals.ssau.ru/jjsu/article/download/8122/7845}", url = {https://lens.org/125-551-429-663-864} } @article{lens.org/125-647-772-745-687, author = {Tanmayee P. Tilekar}, title = {Internet Forensics-Tools, Procedure And Framework}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {May}, doi = {10.46293/4n6/2021.03.02.09}, date = {2021-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.02.09}", url = {https://lens.org/125-647-772-745-687} } @article{lens.org/125-682-509-275-554, author = {Darren Quick and Kim-Kwang Raymond Choo}, title = {IoT Device Forensics and Data Reduction}, journal = {IEEE Access}, year = {2018}, volume = {6}, pages = {47566--47574}, doi = {10.1109/access.2018.2867466}, note = "\url{https://doi.org/10.1109/ACCESS.2018.2867466} ; \url{https://ieeexplore.ieee.org/document/8449277/} ; \url{https://dblp.uni-trier.de/db/journals/access/access6.html#QuickC18}", url = {https://lens.org/125-682-509-275-554} } @article{lens.org/125-934-140-322-856, author = {Heidi H. Harralson}, title = {Forensic document examination of electronically captured signatures}, journal = {Digital Evidence and Electronic Signature Law Review}, year = {2014}, volume = {9}, number = {0}, month = {January}, doi = {10.14296/deeslr.v9i0.1991}, date = {2014-01-28}, note = "\url{https://sas-space.sas.ac.uk/5587/} ; \url{https://journals.sas.ac.uk/deeslr/article/view/1991}", url = {https://lens.org/125-934-140-322-856} } @article{lens.org/125-939-677-745-616, author = {H.M.A. van Beek and E.J. van Eijk and R.B. van Baar and M. Ugen and J.N.C. Bodde and A.J. Siemelink}, title = {Digital forensics as a service}, journal = {Digital Investigation}, year = {2015}, volume = {15}, pages = {20--38}, doi = {10.1016/j.diin.2015.07.004}, note = "\url{https://doi.org/10.1016/j.diin.2015.07.004} ; \url{https://dl.acm.org/doi/10.1016/j.diin.2015.07.004} ; \url{https://core.ac.uk/display/81195448} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287615000857} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287615000857} ; \url{https://core.ac.uk/download/pdf/81195448.pdf}", url = {https://lens.org/125-939-677-745-616} } @article{lens.org/126-996-381-341-302, author = {Muh. Hajar Akbar and null Sunardi and Riadi}, title = {Analysis of Steganographic on Digital Evidence using General Computer Forensic Investigation Model Framework}, journal = {International Journal of Advanced Computer Science and Applications}, year = {2020}, volume = {11}, number = {11}, doi = {10.14569/ijacsa.2020.0111141}, note = "\url{https://thesai.org/Downloads/Volume11No11/Paper_41-Analysis_of_Steganographic_on_Digital_Evidence.pdf} ; \url{https://thesai.org/Publications/ViewPaper?Volume=11&Issue=11&Code=IJACSA&SerialNo=41}", url = {https://lens.org/126-996-381-341-302} } @article{lens.org/127-027-322-002-654, author = {Zhangjie Fu and Qi Yu and Fan Wang and Changhao Ding}, title = {HGA: Hierarchical Feature Extraction With Graph and Attention Mechanism for Linguistic Steganalysis}, journal = {IEEE Signal Processing Letters}, year = {2022}, volume = {29}, pages = {1734--1738}, doi = {10.1109/lsp.2022.3194844}, url = {https://lens.org/127-027-322-002-654} } @article{lens.org/127-207-908-207-727, author = {Martin Novak}, title = {Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020}, journal = {Journal of Digital Forensics, Security and Law}, year = {2022}, doi = {10.15394/jdfsl.2022.1734}, url = {https://lens.org/127-207-908-207-727} } @article{lens.org/127-364-049-570-112, author = {Sangho Park and Yanghoon Kim and Gwangmin Park and Onechul Na and Hangbae Chang}, title = {Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment}, journal = {Sustainability}, year = {2018}, volume = {10}, number = {4}, pages = {1203--}, month = {April}, doi = {10.3390/su10041203}, date = {2018-04-16}, note = "\url{https://www.mdpi.com/2071-1050/10/4/1203} ; \url{https://core.ac.uk/display/155255554} ; \url{https://www.mdpi.com/2071-1050/10/4/1203/pdf}", url = {https://lens.org/127-364-049-570-112} } @article{lens.org/127-735-596-370-849, author = {Nagarathna A}, title = {Ensuring Online Safety Of Women Through Indian Penal Code}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {February}, doi = {10.46293/4n6/2021.03.01.01}, date = {2021-02-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.01.01}", url = {https://lens.org/127-735-596-370-849} } @article{lens.org/128-257-405-271-69X, author = {John B. Minor}, title = {Forensic Cell Site Analysis: Mobile Network Operator Evidence Integrity Maintenance Research}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2019}, volume = {14}, number = {2}, pages = {59--85}, doi = {10.15394/jdfsl.2019.1608}, note = "\url{https://commons.erau.edu/jdfsl/vol14/iss2/5/} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl14.html#Minor19} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1608&context=jdfsl}", url = {https://lens.org/128-257-405-271-69X} } @article{lens.org/128-306-516-043-751, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {41}, pages = {301410--301410}, doi = {10.1016/s2666-2817(22)00091-9}, url = {https://lens.org/128-306-516-043-751} } @article{lens.org/128-315-885-884-18X, author = {Martin Gengenbach and Alexandra Chassanoff and Porter Olsen}, title = {ASIST - Integrating digital forensics into born-digital workflows: The BitCurator project}, journal = {Proceedings of the American Society for Information Science and Technology}, year = {2012}, volume = {49}, number = {1}, pages = {1--4}, doi = {10.1002/meet.14504901343}, note = "\url{https://dblp.uni-trier.de/db/conf/asist/asist2012.html#GengenbachCO12} ; \url{https://asistdl.onlinelibrary.wiley.com/doi/pdf/10.1002/meet.14504901343} ; \url{https://asistdl.onlinelibrary.wiley.com/doi/abs/10.1002/meet.14504901343} ; \url{http://onlinelibrary.wiley.com/doi/10.1002/meet.14504901343/abstract} ; \url{https://onlinelibrary.wiley.com/doi/abs/10.1002/meet.14504901343}", url = {https://lens.org/128-315-885-884-18X} } @article{lens.org/128-473-609-330-555, author = {Yan Wang and Xiao Wang and Henan Xinxiang}, title = {Preprocessing and Edge Detection of Natural Images and Computer Generated Images}, journal = {International Journal of Signal Processing, Image Processing and Pattern Recognition}, year = {2013}, volume = {9}, number = {5}, pages = {281--290}, month = {May}, doi = {10.14257/ijsip.2016.9.5.25}, date = {2013-05-31}, note = "\url{http://www.sersc.org/journals/IJSIP/vol9_no5/25.pdf}", url = {https://lens.org/128-473-609-330-555} } @article{lens.org/128-840-927-006-269, author = {Nik Thompson and Kevin Lee}, title = {The Digital Forensics and Security Challenge of QR Codes}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2013}, volume = {8}, number = {2}, pages = {41--72}, month = {June}, date = {2013-06-30}, note = "\url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#ThompsonL13}", url = {https://lens.org/128-840-927-006-269} } @article{lens.org/129-060-946-634-518, author = {Felix Bankole and Ayankunle Taiwo and Ivan Claims}, title = {An extended digital forensic readiness and maturity model}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301348--301348}, doi = {10.1016/j.fsidi.2022.301348}, url = {https://lens.org/129-060-946-634-518} } @article{lens.org/129-356-514-852-901, author = {Greg Gogolin and James H. Jones}, title = {Digital Forensic Issues in Civil Proceedings}, journal = {Journal of Civil \& Legal Sciences}, year = {2014}, volume = {3}, number = {1}, pages = {1--3}, doi = {10.4172/2169-0170.1000110}, note = "\url{https://www.omicsonline.org/peer-reviewed/digital-forensic-issues-in-civil-proceedingsp-23638.html} ; \url{https://www.omicsonline.org/open-access/digital-forensic-issues-in-civil-proceedings-2169-0170.1000110.php?aid=23638}", url = {https://lens.org/129-356-514-852-901} } @article{lens.org/129-508-826-592-168, author = {Keqi Fan and Qianqian Yu and Yiyang Wang and Deng Chen and Yuhui Zheng}, title = {Visual Object Tracking Based on Adaptive Background-Awareness and Spatial Constraint}, journal = {Mathematical Problems in Engineering}, year = {2022}, volume = {2022}, pages = {1--11}, month = {June}, doi = {10.1155/2022/6062283}, date = {2022-06-29}, url = {https://lens.org/129-508-826-592-168} } @article{lens.org/129-777-443-651-197, author = {Haejung Yun and Seung Yong Lee and Choong C. Lee Lee}, title = {Deriving Priorities of Competences Required for Digital Forensic Experts using AHP}, journal = {The Journal of Society for e-Business Studies}, year = {2017}, volume = {22}, number = {1}, pages = {107--122}, month = {February}, doi = {10.7838/jsebs.2017.22.1.107}, date = {2017-02-28}, note = "\url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002200518} ; \url{http://calsec.or.kr/jsebs/index.php/jsebs/article/download/258/245} ; \url{http://calsec.or.kr/jsebs/index.php/jsebs/article/view/258}", url = {https://lens.org/129-777-443-651-197} } @article{lens.org/130-080-242-566-434, author = {Reza Montasari and Richard Hill and Victoria Carpenter and Farshad Montaseri}, title = {Digital Forensic Investigation of Social Media, Acquisition and Analysis of Digital Evidence}, journal = {International Journal of Strategic Engineering}, year = {2019}, volume = {2}, number = {1}, pages = {52--60}, doi = {10.4018/ijose.2019010105}, note = "\url{https://cronfa.swan.ac.uk/Record/cronfa54932} ; \url{https://www.igi-global.com/article/digital-forensic-investigation-of-social-media-acquisition-and-analysis-of-digital-evidence/219324} ; \url{https://pure.hud.ac.uk/en/publications/digital-forensic-investigation-of-social-media-acquisition-and-an}", url = {https://lens.org/130-080-242-566-434} } @article{lens.org/130-433-366-389-733, author = {Konstantinos Karampidis and Giorgos Papadourakis}, title = {File Type Identification - Computational Intelligence for Digital Forensics}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2017}, volume = {12}, number = {2}, pages = {6--}, doi = {10.15394/jdfsl.2017.1472}, note = "\url{https://doi.org/10.15394/jdfsl.2017.1472} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1472&context=jdfsl} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#KarampidisP17} ; \url{https://commons.erau.edu/jdfsl/vol12/iss2/6/}", url = {https://lens.org/130-433-366-389-733} } @article{lens.org/130-533-255-442-114, author = {Gyusang Cho}, title = {A Digital Forensic Analysis for Directory in Windows File System}, journal = {Journal of the Korea Society of Digital Industry and Information Management}, year = {2015}, volume = {11}, number = {2}, pages = {73--90}, month = {June}, doi = {10.17662/ksdim.2015.11.2.073}, date = {2015-06-30}, note = "\url{http://koreascience.or.kr/article/JAKO201520448048465.page}", url = {https://lens.org/130-533-255-442-114} } @article{lens.org/131-000-976-357-571, author = {Sanyasi Manasa and Kukatlapalli Pradeep Kumar}, title = {Digital Forensics Investigation for Attacks on Artificial Intelligence}, journal = {ECS Transactions}, year = {2022}, volume = {107}, number = {1}, pages = {19639--19645}, month = {April}, doi = {10.1149/10701.19639ecst}, date = {2022-04-24}, url = {https://lens.org/131-000-976-357-571} } @article{lens.org/131-030-713-249-824, author = {Harshita Tara and Amarnath Mishra}, title = {A Comparative Study of Digital Forensic Tools for Data Extraction From Electronic Devices}, journal = {Journal of Punjab Academy of Forensic Medicine \& Toxicology}, year = {2021}, volume = {21}, number = {1}, pages = {97--104}, doi = {10.5958/0974-083x.2021.00016.9}, note = "\url{http://dx.doi.org/10.5958/0974-083x.2021.00016.9}", url = {https://lens.org/131-030-713-249-824} } @article{lens.org/131-118-636-696-570, author = {Gopinath Muruti and Siti Hawa Mokhtar and Fiza Abdul Rahim and Zul-Azri Ibrahim and Abbas M. Al-Ghaili}, title = {Review}, journal = {International Journal of Engineering \& Technology}, year = {2018}, volume = {7}, number = {4.35}, pages = {866--866}, month = {November}, doi = {10.14419/ijet.v7i4.35.26271}, date = {2018-11-30}, url = {https://lens.org/131-118-636-696-570} } @article{lens.org/131-654-072-552-211, author = {Iman Ahmeid Mohamed and Azizah Abdul Manaf}, title = {Improvising the input process of traceability model for digital forensic investigation}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2014}, volume = {3}, number = {2}, pages = {106--110}, doi = {10.17781/p001300}, note = "\url{http://sdiwc.net/digital-library/improvising-the-input-process-of-traceability-model-for-digital-forensic-investigation} ; \url{http://eprints.utm.my/id/eprint/59791/}", url = {https://lens.org/131-654-072-552-211} } @article{lens.org/131-789-340-932-05X, author = {Yianna Danidou and Burkhard Schafer}, title = {Trusted computing and the digital crime scene}, journal = {Digital Evidence and Electronic Signature Law Review}, year = {2014}, volume = {8}, number = {0}, month = {January}, doi = {10.14296/deeslr.v8i0.1960}, date = {2014-01-28}, note = "\url{https://sas-space.sas.ac.uk/5412/} ; \url{https://journals.sas.ac.uk/deeslr/article/view/1960} ; \url{http://www.research.ed.ac.uk/portal/files/13519397/Schafer_Trusted_Computing.pdf} ; \url{https://www.research.ed.ac.uk/portal/files/13519397/Schafer_Trusted_Computing.pdf} ; \url{https://core.ac.uk/download/28968734.pdf}", url = {https://lens.org/131-789-340-932-05X} } @article{lens.org/131-796-930-292-035, author = {Muhammad Shamraiz Bashir and Muhammad Naeem Ahmed Khan}, title = {A triage framework for digital forensics}, journal = {Computer Fraud \& Security}, year = {2015}, volume = {2015}, number = {3}, pages = {8--18}, doi = {10.1016/s1361-3723(15)30018-x}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S136137231530018X}", url = {https://lens.org/131-796-930-292-035} } @article{lens.org/131-874-028-513-738, author = {Randi Rizal and Yudi Prayudi Imam Riadi}, title = {Network Forensics for Detecting Flooding Attack on Internet of Things (IoT) Device}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {4}, pages = {382--390}, note = "\url{http://sdiwc.net/digital-library/network-forensics-for-detecting-flooding-attack-on-internet-of-things-iot-device}", url = {https://lens.org/131-874-028-513-738} } @article{lens.org/131-877-210-773-759, author = {Lee Jun Yeon}, title = {Development of Evidence Analysis Tool based on Active Data for Digital Forensics}, journal = {Journal of Digital Convergence}, year = {2012}, volume = {10}, number = {3}, pages = {99--104}, note = "\url{http://www.koreascience.or.kr:80/article/JAKO201219565295897.pdf} ; \url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001660385} ; \url{http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=DJTJBT_2012_v10n3_99}", url = {https://lens.org/131-877-210-773-759} } @article{lens.org/132-698-173-062-570, author = {Alastair Irons and Paula Thomas}, title = {Problem based learning in digital forensics}, journal = {Higher Education Pedagogies}, year = {2016}, volume = {1}, number = {1}, pages = {95--105}, month = {March}, doi = {10.1080/23752696.2015.1134200}, date = {2016-03-21}, note = "\url{https://sure.sunderland.ac.uk/5059/1/04082014a.pdf} ; \url{https://tandfonline.com/doi/pdf/10.1080/23752696.2015.1134200} ; \url{http://eprints.glos.ac.uk/4289/} ; \url{https://eric.ed.gov/?id=EJ1147563} ; \url{https://www.tandfonline.com/doi/full/10.1080/23752696.2015.1134200} ; \url{https://sure.sunderland.ac.uk/6133/} ; \url{https://www.tandfonline.com/doi/ref/10.1080/23752696.2015.1134200} ; \url{https://core.ac.uk/display/76979856} ; \url{https://core.ac.uk/download/74368705.pdf}", url = {https://lens.org/132-698-173-062-570} } @article{lens.org/133-052-309-017-335, author = {Orhan Yaman and Turker Tuncer and Fatih Ertam}, title = {Automated Book Location and Classification Method using RFID Tags for Smart Libraries}, journal = {Microprocessors and Microsystems}, year = {2021}, volume = {87}, pages = {104388--}, doi = {10.1016/j.micpro.2021.104388}, note = "\url{https://www.sciencedirect.com/science/article/pii/S0141933121005354}", url = {https://lens.org/133-052-309-017-335} } @article{lens.org/133-401-132-549-688, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {301047--301047}, doi = {10.1016/s2666-2817(20)30336-x}, url = {https://lens.org/133-401-132-549-688} } @article{lens.org/133-532-326-238-319, author = {Rosyid Al Hakim and Esa Putri and Hexa Hidayah and Agung Pangestu and Sri Riani}, title = {CURRENT EVIDENCE ON BIOINFORMATICS ROLE AND DIGITAL FORENSICS THAT CONTRIBUTE TO FORENSIC SCIENCE: UPCOMING THREAT}, journal = {JURNAL RISET RUMPUN MATEMATIKA DAN ILMU PENGETAHUAN ALAM}, year = {2022}, volume = {1}, number = {1}, pages = {25--32}, month = {April}, doi = {10.55606/jurrimipa.v1i1.157}, date = {2022-04-22}, url = {https://lens.org/133-532-326-238-319} } @article{lens.org/133-793-757-735-03X, author = {Ganthan Narayana Samy and Nurazean Maarop and Mohd Shahidan Abdullah and Sundresan Perum and Sameer Hasan Albakri and Bharanidharan Shanmugam and Premylla Jeremiah}, title = {Digital forensic investigation challenges based on cloud computing characteristics}, journal = {International Journal of Engineering \& Technology}, year = {2018}, volume = {7}, number = {4.15}, pages = {7--}, month = {October}, doi = {10.14419/ijet.v7i4.15.21361}, date = {2018-10-07}, note = "\url{http://eprints.utm.my/id/eprint/86633/} ; \url{https://core.ac.uk/download/334606705.pdf}", url = {https://lens.org/133-793-757-735-03X} } @article{lens.org/134-032-265-239-814, author = {Reza Montasari and Richard Hill and Farshad Montaseri and Hamid Jahankhani and Amin Hosseinian Far}, title = {Internet of things devices: digital forensic process and data reduction}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2020}, volume = {12}, number = {4}, pages = {424--424}, doi = {10.1504/ijesdf.2020.110676}, url = {https://lens.org/134-032-265-239-814} } @article{lens.org/134-264-047-754-183, author = {Rakesh Mia and Vijay R. Panchal and Yukta Guglot}, title = {The Role of “Digital Forensic Photography”- In the Indian Criminal Justice System}, journal = {Journal of emerging technologies and innovative research}, year = {2021}, volume = {8}, number = {5}, month = {May}, date = {2021-05-01}, note = "\url{https://www.jetir.org/view?paper=JETIR2105285} ; \url{https://www.jetir.org/papers/JETIR2105285.pdf}", url = {https://lens.org/134-264-047-754-183} } @article{lens.org/134-271-291-397-152, author = {Fei Zhao and Jing Sheng Zhang and Zhong Xia Wang}, title = {Digital Forensic Technology of Solaris}, journal = {Advanced Materials Research}, year = {2012}, volume = {601}, pages = {342--346}, doi = {10.4028/www.scientific.net/amr.601.342}, note = "\url{https://www.scientific.net/AMR.601.342}", url = {https://lens.org/134-271-291-397-152} } @article{lens.org/134-478-091-171-675, author = {Иванов Владислав Юрьевич}, title = {О теоретических аспектах использования в криминалистике понятия электронно-цифрового следа}, journal = {Юридические исследования}, year = {2020}, number = {7}, pages = {75--80}, doi = {10.25136/2409-7136.2020.7.33682}, note = "\url{https://www.nbpublish.com/library_read_article.php?id=33682} ; \url{https://www.nbpublish.com/library_get_pdf.php?id=33682} ; \url{https://e-notabene.ru/lr/article_33682.html}", url = {https://lens.org/134-478-091-171-675} } @article{lens.org/134-957-252-728-269, author = {Jianguo Jiang and Bo Yang and Sen Lin and Ming Xing Zhang and Kun Ying Liu}, title = {A Practical Approach for Digital Forensic Triage}, journal = {Applied Mechanics and Materials}, year = {2015}, volume = {742}, pages = {437--444}, doi = {10.4028/www.scientific.net/amm.742.437}, note = "\url{https://www.scientific.net/AMM.742.437} ; \url{https://zh.scientific.net/AMM.742.437.pdf}", url = {https://lens.org/134-957-252-728-269} } @article{lens.org/135-024-140-709-532, author = {Amartya Mohan Tagore}, title = {Darknet Intelligence in Digital Forensics}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {May}, doi = {10.46293/4n6/2021.03.02.04}, date = {2021-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.02.04}", url = {https://lens.org/135-024-140-709-532} } @article{lens.org/135-172-175-862-937, author = {Helmy Trisnasenjaya and Riadi}, title = {Forensic Analysis of Android-based WhatsApp Messenger Against Fraud CrimeUsing The National Institute of Standard and Technology Framework}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2019}, volume = {8}, number = {1}, pages = {89--97}, doi = {10.17781/p002567}, note = "\url{http://sdiwc.net/digital-library/forensic-analysis-of-androidbased-whatsapp-messenger-against-fraud-crimernusing-the-national-institute-of-standard-and-technology-framework}", url = {https://lens.org/135-172-175-862-937} } @article{lens.org/135-404-754-742-569, title = {US2022-Print-Ad}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {42}, pages = {301426--301426}, doi = {10.1016/s2666-2817(22)00107-x}, url = {https://lens.org/135-404-754-742-569} } @article{lens.org/135-644-852-278-088, author = {Bandr Siraj Fakiha}, title = {Effectiveness of OSForensic in Digital Forensic Investigation to Curb cybercrime}, journal = {Indian Journal of Forensic Medicine \& Toxicology}, year = {2021}, volume = {15}, number = {3}, pages = {2149--2153}, month = {May}, doi = {10.37506/ijfmt.v15i3.15633}, date = {2021-05-12}, note = "\url{https://medicopublication.com/index.php/ijfmt/article/view/15633}", url = {https://lens.org/135-644-852-278-088} } @article{lens.org/135-646-933-254-458, author = {Rasa Tamošiūnaitė}, title = {HANDWRITING EXPERTISE IN THE FORENSIC SCIENCE CENTRE OF LITHUANIA: PRESENT ACTIONS AND FUTURE VISION}, journal = {Criminalistics and Forensics}, year = {2022}, number = {67}, pages = {365--371}, month = {August}, doi = {10.33994/kndise.2022.67.37}, date = {2022-08-09}, url = {https://lens.org/135-646-933-254-458} } @article{lens.org/136-400-281-116-450, author = {Zhili Zhou and Meimin Wang and Jingwang Huang and Shengliang Lin and Zhihan Lv}, title = {Blockchain in Big Data Security for Intelligent Transportation With 6G}, journal = {IEEE Transactions on Intelligent Transportation Systems}, year = {2022}, volume = {23}, number = {7}, pages = {9736--9746}, doi = {10.1109/tits.2021.3107011}, url = {https://lens.org/136-400-281-116-450} } @article{lens.org/136-582-664-371-301, author = {Mohsin Ali Mohsin Ali}, title = {Role of Windows Registry Forensics in Digital Forensics Investigation}, journal = {International Journal for Electronic Crime Investigation}, year = {2018}, volume = {2}, number = {3}, pages = {9--}, month = {June}, doi = {10.54692/ijeci.2018.020318}, date = {2018-06-07}, url = {https://lens.org/136-582-664-371-301} } @article{lens.org/136-652-465-419-22X, author = {O. Omelian}, title = {CONCEPT AND SIGNS OF DIGITAL TRACES THAT FORM DURING CYBERCRIMES}, journal = {Criminalistics and Forensics}, year = {2020}, number = {65}, pages = {457--466}, month = {May}, doi = {10.33994/kndise.2020.65.45}, date = {2020-05-18}, note = "\url{http://dx.doi.org/10.33994/kndise.2020.65.45}", url = {https://lens.org/136-652-465-419-22X} } @article{lens.org/136-921-865-701-702, author = {Randa Kamal and Ezz El-Din Hemdan and Nawal El-Fishway}, title = {A review study on blockchain-based IoT security and forensics}, journal = {Multimedia Tools and Applications}, year = {2021}, pages = {1--32}, month = {September}, date = {2021-09-01}, note = "\url{https://link.springer.com/article/10.1007%2Fs11042-021-11350-9}", url = {https://lens.org/136-921-865-701-702} } @article{lens.org/137-320-816-794-079, author = {Matt Muir and Petra Leimich and William J Buchanan}, title = {A Forensic Audit of the Tor Browser Bundle}, journal = {Digital Investigation}, year = {2019}, volume = {29}, pages = {118--128}, doi = {10.1016/j.diin.2019.03.009}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S1742287619300829} ; \url{https://doi.org/10.1016/j.diin.2019.03.009} ; \url{https://dblp.uni-trier.de/db/journals/corr/corr1907.html#abs-1907-10279} ; \url{https://arxiv.org/pdf/1907.10279.pdf} ; \url{https://arxiv.org/abs/1907.10279} ; \url{https://core.ac.uk/download/195354109.pdf}", url = {https://lens.org/137-320-816-794-079} } @article{lens.org/137-402-861-825-929, author = {Alistair Irons and Anastasia Konstadopoulou}, title = {Professionalism in digital forensics}, journal = {Digital Evidence and Electronic Signature Law Review}, year = {2014}, volume = {4}, number = {0}, month = {January}, doi = {10.14296/deeslr.v4i0.1798}, date = {2014-01-21}, note = "\url{https://journals.sas.ac.uk/deeslr/article/view/1798} ; \url{https://sas-space.sas.ac.uk/5584/} ; \url{https://sure.sunderland.ac.uk/id/eprint/1661/}", url = {https://lens.org/137-402-861-825-929} } @article{lens.org/137-471-096-969-114, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {35}, pages = {301100--301100}, doi = {10.1016/s2666-2817(20)30402-9}, url = {https://lens.org/137-471-096-969-114} } @article{lens.org/137-692-081-537-430, author = {Yuri Gubanov}, title = {eDiscovery With Belkasoft}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.02}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.02}", url = {https://lens.org/137-692-081-537-430} } @article{lens.org/138-173-404-908-550, author = {Nima Zahadat}, title = {Digital Forensics, A Need for Credentials and Standards}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2019}, volume = {14}, number = {1}, pages = {3--}, doi = {10.15394/jdfsl.2019.1560}, note = "\url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1560&context=jdfsl} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl14.html#Zahadat19} ; \url{https://mdsoar.org/handle/11603/18740} ; \url{https://commons.erau.edu/jdfsl/vol14/iss1/3/}", url = {https://lens.org/138-173-404-908-550} } @article{lens.org/139-924-660-355-079, author = {Abiodun A. Solanke and Maria Angela Biasiotti}, title = {Digital Forensics AI: Evaluating, Standardizing and Optimizing Digital Evidence Mining Techniques}, journal = {KI - Künstliche Intelligenz}, year = {2022}, month = {May}, doi = {10.1007/s13218-022-00763-9}, date = {2022-05-12}, url = {https://lens.org/139-924-660-355-079} } @article{lens.org/140-176-426-122-829, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301368--301368}, doi = {10.1016/s2666-2817(22)00040-3}, url = {https://lens.org/140-176-426-122-829} } @article{lens.org/141-400-075-412-153, author = {Arina Belyaeva}, title = {Introducing digitalization in forensic and economic expertise}, journal = {Obshchestvo i ekonomika}, year = {2022}, number = {9}, pages = {115--115}, doi = {10.31857/s020736760021867-2}, url = {https://lens.org/141-400-075-412-153} } @article{lens.org/141-923-050-043-761, author = {Mohammadreza Najaftorkaman}, title = {A Method to Encrypt Information with DNA-Based Cryptography}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2015}, volume = {4}, number = {3}, pages = {417--426}, doi = {10.17781/p001648}, url = {https://lens.org/141-923-050-043-761} } @article{lens.org/142-007-449-034-886, author = {Frey John Wisdom}, title = {Digital Forensics In Multimedia}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {239--250}, month = {July}, doi = {10.22624/aims/crp-bk3-p39}, date = {2022-07-26}, url = {https://lens.org/142-007-449-034-886} } @article{lens.org/142-482-498-545-140, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {42}, pages = {301433--}, doi = {10.1016/s2666-2817(22)00114-7}, url = {https://lens.org/142-482-498-545-140} } @article{lens.org/142-682-709-033-759, author = {Yee Ching Tok and Chundong Wang and Sudipta Chattopadhyay}, title = {Stitcher: Correlating digital forensic evidence on internet-of-things devices}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {35}, pages = {301071--}, doi = {10.1016/j.fsidi.2020.301071}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S2666281720303681} ; \url{http://dblp.uni-trier.de/db/journals/corr/corr2003.html#abs-2003-07242} ; \url{http://www.sciencedirect.com/science/article/pii/S2666281720303681} ; \url{https://doi.org/10.1016/j.fsidi.2020.301071} ; \url{https://dblp.uni-trier.de/db/journals/corr/corr2003.html#abs-2003-07242}", url = {https://lens.org/142-682-709-033-759} } @article{lens.org/142-790-196-752-819, author = {Peter Sommer}, title = {Accrediting digital forensics: what are the choices?}, journal = {Digital Investigation}, year = {2018}, volume = {25}, pages = {116--120}, doi = {10.1016/j.diin.2018.04.004}, note = "\url{https://core.ac.uk/display/158373139} ; \url{https://www.open-access.bcu.ac.uk/6008/} ; \url{https://dblp.uni-trier.de/db/journals/di/di25.html#Sommer18} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287618301701} ; \url{https://core.ac.uk/download/158373139.pdf}", url = {https://lens.org/142-790-196-752-819} } @article{lens.org/143-347-787-372-092, author = {Peter E. Onovakpuri}, title = {Forensics Analysis of Skype, Viber and WhatsApp Messenger on Android Platform}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {2}, pages = {119--131}, doi = {10.17781/p002369}, note = "\url{http://www.sdiwc.net/digital-library/forensics-analysis-of-skype-viber-and-whatsapp-messenger-on-android-platform.html}", url = {https://lens.org/143-347-787-372-092} } @article{lens.org/143-408-563-865-265, author = {Nina Sunde}, title = {What does a digital forensics opinion look like? A comparative study of digital forensics and forensic science reporting practices.}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2021}, volume = {61}, number = {5}, pages = {586--596}, month = {July}, doi = {10.1016/j.scijus.2021.06.010}, date = {2021-07-01}, note = "\url{https://www.sciencedirect.com/science/article/pii/S1355030621000939} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/34482939}", url = {https://lens.org/143-408-563-865-265} } @article{lens.org/143-427-291-811-40X, author = {Barbara Guttman and James R. Lyle and Richard P. Ayers}, title = {Ten years of computer forensic tool testing}, journal = {Digital Evidence and Electronic Signature Law Review}, year = {2014}, volume = {8}, number = {0}, month = {January}, doi = {10.14296/deeslr.v8i0.1963}, date = {2014-01-28}, note = "\url{http://journals.sas.ac.uk/deeslr/article/view/1963/1900} ; \url{https://journals.sas.ac.uk/deeslr/article/view/1963} ; \url{https://sas-space.sas.ac.uk/5550/}", url = {https://lens.org/143-427-291-811-40X} } @article{lens.org/143-467-824-641-527, author = {Avinash Singh and Hein S. Venter and Adeyemi Richard Ikuesan}, title = {Windows registry harnesser for incident response and digital forensic analysis}, journal = {Australian Journal of Forensic Sciences}, year = {2018}, volume = {52}, number = {3}, pages = {337--353}, month = {December}, doi = {10.1080/00450618.2018.1551421}, date = {2018-12-18}, note = "\url{https://repository.up.ac.za/handle/2263/68290} ; \url{https://www.tandfonline.com/doi/full/10.1080/00450618.2018.1551421}", url = {https://lens.org/143-467-824-641-527} } @article{lens.org/143-664-346-231-12X, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301291--301291}, doi = {10.1016/s2666-2817(21)00209-2}, url = {https://lens.org/143-664-346-231-12X} } @article{lens.org/144-763-618-319-855, author = {Scott H. Belshaw and Brooke Nodeland}, title = {Digital evidence experts in the law enforcement community: understanding the use of forensics examiners by police agencies}, journal = {Security Journal}, year = {2021}, pages = {1--15}, month = {January}, date = {2021-01-07}, note = "\url{https://link.springer.com/article/10.1057/s41284-020-00276-w}", url = {https://lens.org/144-763-618-319-855} } @article{lens.org/145-706-153-221-342, author = {Grover S. Kearns}, title = {COMPUTER FORENSIC PROJECTS FOR ACCOUNTANTS}, journal = {Journal of Digital Forensics, Security and Law}, year = {2015}, volume = {10}, number = {3}, pages = {7--34}, doi = {10.15394/jdfsl.2015.1203}, note = "\url{https://doi.org/10.15394/jdfsl.2015.1203} ; \url{https://commons.erau.edu/jdfsl/vol10/iss3/1/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1203&context=jdfsl}", url = {https://lens.org/145-706-153-221-342} } @article{lens.org/146-021-806-272-345, author = {Reza Montasari and Victoria Carpenter and Richard Hill}, title = {A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2019}, volume = {11}, number = {2}, pages = {194--224}, doi = {10.1504/ijesdf.2019.098784}, note = "\url{http://cronfa.swan.ac.uk/Record/cronfa54931} ; \url{https://doi.org/10.1504/IJESDF.2019.098784} ; \url{https://pure.hud.ac.uk/en/publications/a-road-map-for-digital-forensics-research-a-novel-approach-for-es} ; \url{https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2019.098784} ; \url{https://ray.yorksj.ac.uk/id/eprint/3051/} ; \url{https://cronfa.swan.ac.uk/Record/cronfa54931} ; \url{https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf11.html#MontasariCH19} ; \url{https://core.ac.uk/download/237461123.pdf}", url = {https://lens.org/146-021-806-272-345} } @article{lens.org/146-159-881-844-536, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {41}, pages = {301412--301412}, doi = {10.1016/s2666-2817(22)00093-2}, url = {https://lens.org/146-159-881-844-536} } @article{lens.org/146-240-425-087-023, author = {Fred Cohen}, title = {Column: The Science of Digital Forensics: Analysis of Digital Traces}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2012}, volume = {7}, number = {3}, pages = {5--12}, month = {September}, date = {2012-09-30}, note = "\url{https://doaj.org/article/690f42ad727049e29923116d47600484}", url = {https://lens.org/146-240-425-087-023} } @article{lens.org/146-351-183-180-613, author = {Evans Fuad and null Hasanuddin and Ardi Nugraha}, title = {Analysis of Digital Forensic Evidence on Email Delivery Crime}, journal = {Applied Science and Technology}, year = {2017}, volume = {1}, number = {1}, pages = {53--58}, month = {February}, date = {2017-02-25}, note = "\url{https://www.estech.org/index.php/IJSAT/article/view/10} ; \url{http://www.estech.org/index.php/IJSAT/article/download/10/pdf_1}", url = {https://lens.org/146-351-183-180-613} } @article{lens.org/146-445-364-945-053, author = {Douglas A. Orr and Drew M. Lancaster}, title = {Cryptocurrency and the Blockchain: A Discussion of Forensic Needs}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {4}, pages = {420--435}, note = "\url{http://sdiwc.net/digital-library/cryptocurrency-and-the-blockchain-a-discussion-of-forensic-needs}", url = {https://lens.org/146-445-364-945-053} } @article{lens.org/146-449-968-597-756, author = {Matthew Kirschenbaum}, title = {.Txtual Forensics}, journal = {Textual Cultures}, year = {2015}, volume = {9}, number = {1}, pages = {55--64}, month = {December}, doi = {10.14434/tc.v9i1.20115}, date = {2015-12-04}, url = {https://lens.org/146-449-968-597-756} } @article{lens.org/146-651-722-674-271, author = {Emmanuel Kpakpo Brown}, title = {Digital Forensic and Distributed Evidence}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {357--362}, month = {July}, doi = {10.22624/aims/crp-bk3-p57}, date = {2022-07-26}, url = {https://lens.org/146-651-722-674-271} } @article{lens.org/146-950-696-881-567, author = {Ruohan Meng and Qi Cui and Zhili Zhou and Zhetao Li and Q. M. Jonathan Wu and Xingming Sun}, title = {High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks}, journal = {IEEE Transactions on Network Science and Engineering}, year = {2022}, volume = {9}, number = {2}, pages = {848--862}, month = {March}, doi = {10.1109/tnse.2021.3137829}, date = {2022-03-01}, url = {https://lens.org/146-950-696-881-567} } @article{lens.org/147-434-307-975-304, author = {Sang Young Lee}, title = {Mobile Digital Forensics Framework for Smartphone User Analysis}, journal = {Webology}, year = {2022}, volume = {19}, number = {1}, pages = {4335--4351}, month = {January}, doi = {10.14704/web/v19i1/web19285}, date = {2022-01-20}, url = {https://lens.org/147-434-307-975-304} } @article{lens.org/147-546-528-129-204, author = {Francis Wodugah}, title = {SIFT Multi-Purpose Forensic Operating System For Digital Forensic Process.}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {55--58}, month = {July}, doi = {10.22624/aims/crp-bk3-p9}, date = {2022-07-23}, url = {https://lens.org/147-546-528-129-204} } @article{lens.org/147-988-605-182-606, author = {Cezara Craciunescu}, title = {Basic aspects concerning the evidence aquisition in digital forensic analysis}, journal = {Forum Criminalistic / Forensic Science Forum}, year = {2015}, volume = {8}, number = {17 (1/2015)}, month = {July}, doi = {10.18283/forum.viii.17.12015.315}, date = {2015-07-10}, url = {https://lens.org/147-988-605-182-606} } @article{lens.org/148-456-164-437-392, author = {Simran Koul* and Yash Raj and Simriti Koul}, title = {Analyzing Cyber Trends in Online Financial Frauds using digital Forensics Techniques}, journal = {International Journal of Innovative Technology and Exploring Engineering}, year = {2020}, volume = {9}, number = {9}, pages = {446--451}, month = {July}, doi = {10.35940/ijitee.i7185.079920}, date = {2020-07-30}, url = {https://lens.org/148-456-164-437-392} } @article{lens.org/148-500-781-775-122, author = {Sebastian Neuner and Martin Schmiedecker and Edgar Weippl}, title = {PeekaTorrent: Leveraging P2P hash values for digital forensics}, journal = {Digital Investigation}, year = {2016}, volume = {18}, pages = {S149--S156}, doi = {10.1016/j.diin.2016.04.011}, note = "\url{https://cyberleninka.org/article/n/865439} ; \url{https://cyberleninka.org/article/n/865439.pdf} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287616300445} ; \url{https://doi.org/10.1016/j.diin.2016.04.011} ; \url{https://core.ac.uk/display/82223047} ; \url{https://core.ac.uk/download/pdf/82223047.pdf}", url = {https://lens.org/148-500-781-775-122} } @article{lens.org/148-617-284-942-187, author = {Pavel Gladyshev and Joshua I. James}, title = {Decision-theoretic file carving}, journal = {Digital Investigation}, year = {2017}, volume = {22}, pages = {46--61}, doi = {10.1016/j.diin.2017.08.001}, note = "\url{https://doi.org/10.1016/j.diin.2017.08.001} ; \url{https://dblp.uni-trier.de/db/journals/di/di22.html#GladyshevJ17} ; \url{http://www.sciencedirect.com/science/article/pii/S1742287617301329} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287617301329}", url = {https://lens.org/148-617-284-942-187} } @article{lens.org/148-968-873-601-051, author = {Fatih Ertam and Turker Tuncer and Engin Avci}, title = {IMPORTANCE OF NETWORK DEVICES AND THEIR SECURE CONFIGURATIONS AT DIGITAL FORENSICS}, journal = {Engineering Sciences}, year = {2013}, volume = {8}, number = {3}, pages = {171--181}, month = {July}, date = {2013-07-30}, note = "\url{http://www.newwsa.com/makale_detay_ozet_bilgiler.asp?d=1&makale_detay_id=3273&makale_upload_id=11563&islem_turu=0} ; \url{http://dergipark.ulakbim.gov.tr/nwsaeng/article/view/5000066813/5000062187}", url = {https://lens.org/148-968-873-601-051} } @article{lens.org/149-337-279-544-141, author = {Ashish Suthar}, title = {An Overview of Data Extraction Techniques of Mobile Device}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {August}, doi = {10.46293/4n6/2020.02.03.16}, date = {2020-08-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.03.16}", url = {https://lens.org/149-337-279-544-141} } @article{lens.org/149-440-914-154-448, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {33}, pages = {301045--301045}, doi = {10.1016/s2666-2817(20)30334-6}, url = {https://lens.org/149-440-914-154-448} } @article{lens.org/149-758-552-549-038, author = {Vijay Prakash and Alex Williams and Lalit Garg and Pradip Barik and Rajesh Kumar Dhanaraj}, title = {Cloud-Based Framework for Performing Digital Forensic Investigations}, journal = {International Journal of Wireless Information Networks}, year = {2022}, month = {July}, doi = {10.1007/s10776-022-00560-z}, date = {2022-07-04}, url = {https://lens.org/149-758-552-549-038} } @article{lens.org/149-934-631-443-119, author = {Jan Peter van Zandwijk}, title = {A mathematical approach to NAND flash-memory descrambling and decoding}, journal = {Digital Investigation}, year = {2015}, volume = {12}, pages = {41--52}, doi = {10.1016/j.diin.2015.01.003}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S1742287615000043} ; \url{http://www.sciencedirect.com/science/article/pii/S1742287615000043} ; \url{https://dblp.uni-trier.de/db/journals/di/di12.html#Zandwijk15}", url = {https://lens.org/149-934-631-443-119} } @article{lens.org/150-042-119-479-43X, author = { Riadi and Anton Yudhana and Muhamad Caesar Febriansyah Putra}, title = {Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method}, journal = {Scientific Journal of Informatics}, year = {2018}, volume = {5}, number = {2}, pages = {235--247}, month = {November}, doi = {10.15294/sji.v5i2.16545}, date = {2018-11-29}, note = "\url{https://journal.unnes.ac.id/nju/index.php/sji/article/view/16545} ; \url{https://journal.unnes.ac.id/nju/index.php/sji/article/download/16545/pdf}", url = {https://lens.org/150-042-119-479-43X} } @article{lens.org/150-681-841-306-967, author = {Bilal Shebaro}, title = {Digital forensics: you can run but you can't hide: conference tutorial}, journal = {Journal of Computing Sciences in Colleges}, year = {2015}, volume = {30}, number = {4}, pages = {46--46}, month = {April}, date = {2015-04-01}, note = "\url{http://dl.acm.org/citation.cfm?id=2752628.2752637}", url = {https://lens.org/150-681-841-306-967} } @article{lens.org/150-957-964-090-611, author = {Yunhyong Kim and Seamus Ross}, title = {Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving}, journal = {International Journal of Digital Curation}, year = {2012}, volume = {7}, number = {2}, pages = {21--39}, month = {October}, doi = {10.2218/ijdc.v7i2.227}, date = {2012-10-23}, note = "\url{http://www.ijdc.net/index.php/ijdc/article/download/217/286} ; \url{https://dblp.uni-trier.de/db/journals/ijdc/ijdc7.html#KimR12} ; \url{http://eprints.gla.ac.uk/79800/} ; \url{http://www.ijdc.net/index.php/ijdc/article/view/217} ; \url{http://eprints.gla.ac.uk/79800/1/79800.pdf} ; \url{https://doaj.org/article/dc9449a8a7b6440785206318421de124} ; \url{https://core.ac.uk/display/16458809} ; \url{https://core.ac.uk/download/pdf/296152550.pdf}", url = {https://lens.org/150-957-964-090-611} } @article{lens.org/151-680-718-283-212, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {37}, pages = {301259--301259}, doi = {10.1016/s2666-2817(21)00173-6}, url = {https://lens.org/151-680-718-283-212} } @article{lens.org/152-581-982-148-813, author = {null Omer Aziz and null M. Abdullah Siraj and null Abdul Rehman}, title = {Privacy challenges in cyber security against cybercrime in digital forensic. A systematic literature review in Pakistan.}, journal = {Journal of Computing \& Biomedical Informatics}, year = {2021}, volume = {2}, number = {2}, pages = {158--164}, month = {September}, doi = {10.56979/202/2021/31}, date = {2021-09-15}, url = {https://lens.org/152-581-982-148-813} } @article{lens.org/152-695-541-254-683, author = {Jia Zhi-chen}, title = {Study on the trend and characteristics of digital forensics}, journal = {Automation and Instrumentation}, year = {2014}, note = "\url{http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZDYY201407006.htm}", url = {https://lens.org/152-695-541-254-683} } @article{lens.org/153-185-768-708-340, author = {Eoghan Casey and David-Olivier Jaquet-Chiffelle and Hannes Spichiger and Elénore Ryser and Thomas Souvignet}, title = {Structuring the Evaluation of Location-Related Mobile Device Evidence}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {32}, pages = {300928--}, doi = {10.1016/j.fsidi.2020.300928}, note = "\url{https://serval.unil.ch/en/notice/serval:BIB_99D09A242835} ; \url{https://www.sciencedirect.com/science/article/pii/S2666281720300238}", url = {https://lens.org/153-185-768-708-340} } @article{lens.org/154-076-720-609-283, author = {Shaweta Sachdeva and B. L. Raina and Avinash Sharma}, title = {Analysis of Digital Forensic Tools}, journal = {Journal of Computational and Theoretical Nanoscience}, year = {2020}, volume = {17}, number = {6}, pages = {2459--2467}, month = {June}, doi = {10.1166/jctn.2020.8916}, date = {2020-06-01}, note = "\url{https://www.ingentaconnect.com/content/asp/jctn/2020/00000017/00000006/art00007} ; \url{https://ui.adsabs.harvard.edu/abs/2020JCTN...17.2459S/abstract}", url = {https://lens.org/154-076-720-609-283} } @article{lens.org/154-517-106-328-503, author = {Christopher Hargreaves and Jonathan Patterson}, title = {An automated timeline reconstruction approach for digital forensic investigations}, journal = {Digital Investigation}, year = {2012}, volume = {9}, pages = {S69--S79}, doi = {10.1016/j.diin.2012.05.006}, note = "\url{https://dblp.uni-trier.de/db/journals/di/di9.html#HargreavesP12} ; \url{http://dspace.lib.cranfield.ac.uk/bitstream/1826/8103/1/DFRWS_2012_RC5c.pdf} ; \url{https://www.sciencedirect.com/science/article/pii/S174228761200031X} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S174228761200031X} ; \url{https://dspace.lib.cranfield.ac.uk/handle/1826/8103} ; \url{https://core.ac.uk/display/19542424} ; \url{https://dspace.lib.cranfield.ac.uk/bitstream/1826/8103/1/DFRWS_2012_RC5c.pdf}", url = {https://lens.org/154-517-106-328-503} } @article{lens.org/154-718-497-162-213, author = {Nita Hildayanti and Riadi}, title = {Forensics Analysis of Router On Computer Networks Using Live Forensics Method}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2019}, volume = {8}, number = {1}, pages = {74--81}, doi = {10.17781/p002559}, note = "\url{http://sdiwc.net/digital-library/forensics-analysis-of-router-on-computer-networks-using-live-forensics-method}", url = {https://lens.org/154-718-497-162-213} } @article{lens.org/154-729-674-764-578, author = {Sam Meister and Alexandra Chassanoff}, title = {Integrating Digital Forensics Techniques into Curatorial Tasks: A Case Study}, journal = {International Journal of Digital Curation}, year = {2014}, volume = {9}, number = {2}, pages = {6--16}, month = {September}, doi = {10.2218/ijdc.v9i2.325}, date = {2014-09-09}, note = "\url{https://www.mendeley.com/catalogue/32be5481-980d-35c2-b198-fca72f89ff55/} ; \url{http://www.ijdc.net/index.php/ijdc/article/download/9.2.6/364} ; \url{https://doaj.org/article/a444a368c1f54b6085aa5e20b1e23253} ; \url{https://core.ac.uk/display/91790644} ; \url{https://dx.doi.org/10.2218/ijdc.v9i2.325} ; \url{http://www.ijdc.net/index.php/ijdc/article/view/9.2.6} ; \url{https://core.ac.uk/download/pdf/162675816.pdf}", url = {https://lens.org/154-729-674-764-578} } @article{lens.org/155-250-068-040-504, author = {S. M. Kolotov}, title = {Evaluation and Use the Forensic Financial and Economic Expertise's Results of Operations with Digital Assets}, journal = {Courier of Kutafin Moscow State Law University (MSAL))}, year = {2022}, number = {2}, pages = {143--149}, month = {May}, doi = {10.17803/2311-5998.2022.90.2.143-149}, date = {2022-05-09}, url = {https://lens.org/155-250-068-040-504} } @article{lens.org/155-282-926-860-477, author = {Ahmet Kursad Poyraz and Sengul Dogan and Erhan Akbal and Turker Tuncer}, title = {Automated brain disease classification using exemplar deep features}, journal = {Biomedical Signal Processing and Control}, year = {2022}, volume = {73}, pages = {103448--103448}, doi = {10.1016/j.bspc.2021.103448}, url = {https://lens.org/155-282-926-860-477} } @article{lens.org/155-298-486-497-278, author = {Ahmad Salehi Shahraki and Hamed Sayyadi and Mohamad Hussein Amri and Mehrnaz Nikmaram}, title = {Survey : video forensic tools}, journal = {Journal of theoretical and applied information technology}, year = {2013}, month = {January}, date = {2013-01-10}, note = "\url{https://eprints.qut.edu.au/74465/}", url = {https://lens.org/155-298-486-497-278} } @article{lens.org/155-382-013-507-319, author = {Surbhi Gupta and Neeraj Mohan and Parvinder Singh Sandhu}, title = {Energy deviation measure: a technique for digital image forensics}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2018}, volume = {10}, number = {4}, pages = {401--401}, doi = {10.1504/ijesdf.2018.095141}, url = {https://lens.org/155-382-013-507-319} } @article{lens.org/155-772-239-137-393, author = {Athari M. Alrajhi}, title = {A Survey of Artificial Intelligence Techniques for Cybersecurity Improvement}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2020}, volume = {9}, number = {1}, pages = {34--41}, doi = {10.17781/p002650}, note = "\url{http://sdiwc.net/digital-library/a-survey-of-artificial-intelligence-techniques-for-cybersecurity-improvement}", url = {https://lens.org/155-772-239-137-393} } @article{lens.org/155-874-936-366-797, author = {Sungjin Lee and Sunghyuck Hong}, title = {Analysis of Time Records on Digital forensics}, journal = {Indian Journal of Science and Technology}, year = {2015}, volume = {8}, number = {S7}, pages = {365--372}, month = {April}, doi = {10.17485/ijst/2015/v8is7/70420}, date = {2015-04-01}, note = "\url{https://www.indjst.org/index.php/indjst/article/view/70420/55111} ; \url{https://indjst.org/articles/analysis-of-time-records-on-digital-forensics}", url = {https://lens.org/155-874-936-366-797} } @article{lens.org/156-374-578-445-529, author = {Valdha Regytha Gana Atthoriq}, title = {THE ROLE OF DIGITAL FORENSIC IN REVEALING CRIMINAL ACTS OF ONLINE PROSTITUTION AT KEPOLISIAN DAERAH JAWA TIMUR}, journal = {LIGAHUKUM}, year = {2020}, volume = {1}, number = {1}, month = {July}, doi = {10.33005/ligahukum.v1i1.21}, date = {2020-07-31}, url = {https://lens.org/156-374-578-445-529} } @article{lens.org/156-753-375-839-827, author = {Scott A. Bresler}, title = {Review of: Forensic Mental Health Evaluations in the Digital Age: A Practitioner’s Guide to Using Internet‐Based Data}, journal = {Journal of Forensic Sciences}, year = {2020}, volume = {65}, number = {5}, pages = {1799--1799}, month = {July}, doi = {10.1111/1556-4029.14509}, date = {2020-07-21}, note = "\url{https://onlinelibrary.wiley.com/doi/10.1111/1556-4029.14509}", url = {https://lens.org/156-753-375-839-827} } @article{lens.org/156-792-567-405-806, author = {Albert Quist}, title = {Digital Forensic Challenges in Internet of Things (IoT)}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {119--124}, month = {July}, doi = {10.22624/aims/crp-bk3-p20}, date = {2022-07-23}, url = {https://lens.org/156-792-567-405-806} } @article{lens.org/158-226-982-585-038, author = {Shrinivas D. Desai and Prashant Narayankar}, title = {Innovative Techniques of Digital Crime Investigation}, journal = {Journal of Engineering Education Transformations}, year = {2016}, volume = {30}, month = {December}, date = {2016-12-01}, note = "\url{http://ischolar.info/index.php/JEETRIT/article/view/139929} ; \url{http://www.journaleet.org/index.php/jeet/article/download/111605/78225}", url = {https://lens.org/158-226-982-585-038} } @article{lens.org/158-859-761-919-911, author = {null ReddyK.}, title = {The architecture of a digital forensic readiness management system}, journal = {Computers \& Security}, year = {2013}, month = {February}, date = {2013-02-01}, note = "\url{https://dl.acm.org/doi/10.5555/2748150.2748582}", url = {https://lens.org/158-859-761-919-911} } @article{lens.org/159-399-684-784-145, title = {Audio enhancement and application of digital filters for speech intelligibility in forensic digital analysis expert work (Computer Forensics)}, journal = {International Journal of Emerging Trends in Engineering Research}, year = {2020}, volume = {8}, number = {9}, pages = {6045--6050}, month = {September}, doi = {10.30534/ijeter/2020/186892020}, date = {2020-09-25}, url = {https://lens.org/159-399-684-784-145} } @article{lens.org/160-624-462-765-065, author = {Paweł Olber}, title = {The survey on cross-border collection of digital evidence by representatives from Polish prosecutors’ offices and judicial authorities}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2021}, volume = {16}, number = {2}, pages = {3--}, month = {September}, date = {2021-09-30}, note = "\url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1700&context=jdfsl} ; \url{https://commons.erau.edu/jdfsl/vol16/iss2/3/}", url = {https://lens.org/160-624-462-765-065} } @article{lens.org/161-135-504-333-527, author = {Junho Jeong and Donghyo Kim and Byungdo Lee and Yunsik Son}, title = {Design and Implementation of a Digital Evidence Management Model Based on Hyperledger Fabric}, journal = {Journal of Information Processing Systems}, year = {2020}, volume = {16}, number = {4}, pages = {760--773}, month = {August}, date = {2020-08-01}, note = "\url{http://jips-k.org/digital-library/2020/16/4/760}", url = {https://lens.org/161-135-504-333-527} } @article{lens.org/161-425-249-830-942, author = {Tina Wu and Andrew Martin}, title = {An Enhanced Digital Forensic Model for Internet of Things Forensic}, journal = {World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering}, year = {2018}, volume = {5}, number = {1}, month = {January}, date = {2018-01-22}, note = "\url{https://waset.org/abstracts/76982}", url = {https://lens.org/161-425-249-830-942} } @article{lens.org/161-682-090-897-914, author = {Amr Adel}, title = {A Conceptual Framework to Improve Cyber Forensic Administration in Industry 5.0: Qualitative Study Approach}, journal = {Forensic Sciences}, year = {2022}, volume = {2}, number = {1}, pages = {111--129}, month = {February}, doi = {10.3390/forensicsci2010009}, date = {2022-02-03}, url = {https://lens.org/161-682-090-897-914} } @article{lens.org/161-786-953-020-998, author = {M. Kaart and S. Laraghy}, title = {Android forensics}, journal = {Digital Investigation}, year = {2014}, volume = {11}, number = {3}, pages = {234--248}, doi = {10.1016/j.diin.2014.05.001}, note = "\url{https://www.sciencedirect.com/science/article/abs/pii/S1742287614000449} ; \url{https://doi.org/10.1016/j.diin.2014.05.001}", url = {https://lens.org/161-786-953-020-998} } @article{lens.org/161-921-610-463-171, author = {Yudi Prayudi and Tri Kuntoro Priyambodo}, title = {Secure and Trusted Environment as a Strategy to Maintain the Integrity and Authenticity of Digital Evidence}, journal = {International Journal of Security and Its Applications}, year = {2015}, volume = {9}, number = {6}, pages = {299--314}, month = {June}, doi = {10.14257/ijsia.2015.9.6.28}, date = {2015-06-30}, note = "\url{https://www.earticle.net/Article/A251453}", url = {https://lens.org/161-921-610-463-171} } @article{lens.org/162-110-149-751-921, author = {Richard Adams and Valerie Hobbs and Graham Mann}, title = {The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice}, journal = {Journal of Digital Forensics, Security and Law}, year = {2013}, volume = {8}, number = {4}, pages = {25--48}, doi = {10.15394/jdfsl.2013.1154}, note = "\url{https://doaj.org/article/7abfdd6ed4c4408987cce9d292cb156d} ; \url{https://researchrepository.murdoch.edu.au/id/eprint/26688/} ; \url{https://oaji.net/articles/2014/1095-1408891264.pdf} ; \url{https://research-repository.uwa.edu.au/en/publications/the-advanced-data-acquisition-model-adam-a-process-model-for-digi} ; \url{https://researchrepository.murdoch.edu.au/26688/1/advanced_data_acquisition.pdf} ; \url{https://research-repository.uwa.edu.au/en/publications/the-advanced-data-acquisition-model-adam-a-process-model-for-digital-forensic-practice(11eb6e68-4886-4b1b-a4a9-013e44274c3f)/export.html} ; \url{https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#AdamsHM13} ; \url{https://commons.erau.edu/jdfsl/vol8/iss4/2/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1154&context=jdfsl} ; \url{https://doi.org/10.15394/jdfsl.2013.1154} ; \url{https://core.ac.uk/display/77134060}", url = {https://lens.org/162-110-149-751-921} } @article{lens.org/162-226-718-103-313, author = {Christopher Tassone and Ben Martini and Kim-Kwang Raymond Choo}, title = {Visualizing Digital Forensic Datasets: A Proof of Concept}, journal = {Journal of forensic sciences}, year = {2017}, volume = {62}, number = {5}, pages = {1197--1204}, month = {February}, doi = {10.1111/1556-4029.13431}, date = {2017-02-01}, note = "\url{https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.13431} ; \url{https://www.ncbi.nlm.nih.gov/pubmed/28144943} ; \url{http://europepmc.org/abstract/MED/28144943} ; \url{http://onlinelibrary.wiley.com/doi/10.1111/1556-4029.13431/full} ; \url{https://dialnet.unirioja.es/servlet/articulo?codigo=6108040}", url = {https://lens.org/162-226-718-103-313} } @article{lens.org/162-814-268-960-713, author = { Riadi and Ammar Fauzan Sunardi}, title = {Examination of Digital Evidence on Android-based LINE Messenger}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {3}, pages = {336--343}, doi = {10.17781/p002472}, note = "\url{https://sdiwc.net/digital-library/examination-of-digital-evidence-on-androidbased-line-messenger.html}", url = {https://lens.org/162-814-268-960-713} } @article{lens.org/162-831-197-622-390, author = {Bénédicte Vauthier}, title = {Condición .txtual, crítica .txtual y edición .txtual hispánicas}, journal = {Revista de Humanidades Digitales}, year = {2018}, volume = {2}, number = {2}, pages = {77--97}, month = {December}, doi = {10.5944/rhd.vol.2.2018.22198}, date = {2018-12-03}, note = "\url{http://revistas.uned.es/index.php/RHD/article/download/22198/18514} ; \url{http://revistas.uned.es/index.php/RHD/article/view/22198} ; \url{https://dialnet.unirioja.es/servlet/articulo?codigo=6700082} ; \url{https://core.ac.uk/download/222976460.pdf}", url = {https://lens.org/162-831-197-622-390} } @article{lens.org/162-922-011-677-486, author = {Changhoon Lee}, title = {Digital Forensics Framework for Cloud Computing}, journal = {The Journal of Korea Navigation Institute}, year = {2013}, volume = {17}, number = {1}, pages = {63--68}, month = {February}, doi = {10.12673/jkoni.2013.17.01.063}, date = {2013-02-28}, note = "\url{https://www.koreascience.kr:443/article/JAKO201310635656332.pdf} ; \url{https://www.koreascience.kr/article/JAKO201310635656332.page} ; \url{http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=HHHHBI_2013_v17n1_63} ; \url{https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001749418} ; \url{http://koreascience.or.kr/journal/view.jsp?kj=HHHHBI&py=2013&vnc=v17n1&sp=63}", url = {https://lens.org/162-922-011-677-486} } @article{lens.org/163-055-558-077-509, author = {Samaneh Mashhadi}, title = {A Secure Non-Repudiable General Proxy Signature}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2015}, volume = {4}, number = {2}, pages = {380--389}, doi = {10.17781/p001556}, url = {https://lens.org/163-055-558-077-509} } @article{lens.org/163-308-959-548-845, author = {Dr. Muhammad Ramzan}, title = {Forensic and Digital Evidence be used as Substantial Evidence in Criminal Cases, an Effective Alternative of Ocular Account: Evaluation in the Light of New Amendments. What are the Requirements of Admissibility and Reliability of Digital and Forensic Evidence?}, journal = {SSRN Electronic Journal}, year = {2022}, month = {January}, doi = {10.2139/ssrn.4021315}, date = {2022-01-01}, url = {https://lens.org/163-308-959-548-845} } @article{lens.org/163-853-761-819-084, author = {Kevin J. Conlan and Ibrahim Baggili and Frank Breitinger}, title = {Anti-forensics}, journal = {Digital Investigation}, year = {2016}, volume = {18}, pages = {S66--S75}, doi = {10.1016/j.diin.2016.04.006}, note = "\url{https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1054&context=electricalcomputerengineering-facpubs} ; \url{https://www.sciencedirect.com/science/article/pii/S1742287616300378} ; \url{https://core.ac.uk/display/82295331} ; \url{https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/54/} ; \url{https://www.sciencedirect.com/science/article/abs/pii/S1742287616300378} ; \url{https://dl.acm.org/citation.cfm?id=2988605} ; \url{https://core.ac.uk/download/pdf/82295331.pdf}", url = {https://lens.org/163-853-761-819-084} } @article{lens.org/163-940-179-223-192, author = {Dmitrii Olegovich Buinov}, title = {Appointment of comprehensive forensic examinations in case of the study of digital traces in the investigation of economic crimes}, journal = {Полицейская деятельность}, year = {2022}, number = {4}, pages = {20--28}, doi = {10.7256/2454-0692.2022.4.38601}, url = {https://lens.org/163-940-179-223-192} } @article{lens.org/164-385-694-618-291, author = {Aswami Ariffin and Izwan Iskandar Ishak}, title = {Digital forensics in Malaysia}, journal = {Digital Evidence and Electronic Signature Law Review}, year = {2014}, volume = {5}, number = {0}, month = {January}, doi = {10.14296/deeslr.v5i0.1849}, date = {2014-01-23}, note = "\url{https://journals.sas.ac.uk/deeslr/article/view/1849} ; \url{https://sas-space.sas.ac.uk/5441/}", url = {https://lens.org/164-385-694-618-291} } @article{lens.org/164-392-011-156-848, author = {Manghui Tu and Dianxiang Xu and Samsuddin Wira and Cristian Balan and Kyle Cronin}, title = {On the Development of a Digital Forensics Curriculum}, journal = {Journal of Digital Forensics, Security and Law}, year = {2012}, volume = {7}, number = {3}, pages = {2--}, doi = {10.15394/jdfsl.2012.1126}, note = "\url{https://commons.erau.edu/jdfsl/vol7/iss3/2/} ; \url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1126&context=jdfsl}", url = {https://lens.org/164-392-011-156-848} } @article{lens.org/164-788-241-444-459, author = {Graeme Horsman}, title = {When is a line of inquiry 'reasonable'? - a focus on digital devices}, journal = {Australian Journal of Forensic Sciences}, year = {2022}, pages = {1--12}, month = {March}, doi = {10.1080/00450618.2022.2048691}, date = {2022-03-18}, url = {https://lens.org/164-788-241-444-459} } @article{lens.org/164-838-567-614-73X, author = {Jing-Chiou Liou}, title = {Performance Measures for Evaluating the Dynamic Authentication Techniques}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2016}, volume = {5}, number = {2}, pages = {83--93}, doi = {10.17781/p002052}, note = "\url{http://sdiwc.net/digital-library/performance-measures-for-evaluating-the-dynamic-authentication-techniques}", url = {https://lens.org/164-838-567-614-73X} } @article{lens.org/164-989-739-953-649, author = {Ajit Singh and Jyoti Malik}, title = {A Comprehensive Study of Passive Digital Image Forensics Techniques based on Intrinsic Fingerprints}, journal = {International Journal of Computer Applications}, year = {2015}, volume = {116}, number = {19}, pages = {16--21}, month = {April}, doi = {10.5120/20444-2794}, date = {2015-04-22}, note = "\url{https://www.ijcaonline.org/archives/volume116/number19/20444-2794} ; \url{https://research.ijcaonline.org/volume116/number19/pxc3902794.pdf} ; \url{https://ui.adsabs.harvard.edu/abs/2015IJCA..116s..16S/abstract}", url = {https://lens.org/164-989-739-953-649} } @article{lens.org/165-408-203-311-152, author = {Carlos Ortega-Laurel and Jacobo Sandoval-Gutierrez and Juan López-Sauceda and Adan Fernando Serrano-Orozco}, title = {Proposal for a digital forensic investigation model in accordance with the legislation in Mexico}, journal = {ECORFAN Journal Spain}, year = {2019}, pages = {1--9}, month = {December}, doi = {10.35429/ejs.2019.11.6.1.9}, date = {2019-12-31}, note = "\url{http://dx.doi.org/10.35429/ejs.2019.11.6.1.9}", url = {https://lens.org/165-408-203-311-152} } @article{lens.org/165-638-803-131-183, author = {Graeme Horsman and Nina Sunde}, title = {Unboxing the digital forensic investigation process.}, journal = {Science \& justice : journal of the Forensic Science Society}, year = {2022}, volume = {62}, number = {2}, pages = {171--180}, month = {January}, doi = {10.1016/j.scijus.2022.01.002}, date = {2022-01-20}, url = {https://lens.org/165-638-803-131-183} } @article{lens.org/165-956-283-954-04X, author = {Goran Oparnica}, title = {Digital evidence and digital forensic education}, journal = {Digital Evidence and Electronic Signature Law Review}, year = {2016}, volume = {13}, number = {0}, pages = {143--147}, month = {November}, doi = {10.14296/deeslr.v13i0.2305}, date = {2016-11-05}, note = "\url{https://journals.sas.ac.uk/deeslr/article/view/2305}", url = {https://lens.org/165-956-283-954-04X} } @article{lens.org/166-314-098-559-795, author = {Parag H. Rughani and Prerak Bhatt}, title = {MACHINE LEARNING FORENSICS:A NEW BRANCH OF DIGITAL FORENSICS}, journal = {International Journal of Advanced Research in Computer Science}, year = {2017}, volume = {8}, number = {8}, pages = {217--222}, month = {August}, doi = {10.26483/ijarcs.v8i8.4613}, date = {2017-08-30}, note = "\url{http://www.ijarcs.info/index.php/Ijarcs/article/download/4613/4155} ; \url{http://ijarcs.info/index.php/Ijarcs/article/view/4613}", url = {https://lens.org/166-314-098-559-795} } @article{lens.org/166-800-654-194-357, title = {Contents List}, journal = {Digital Investigation}, year = {2016}, volume = {18}, pages = {iii--iii}, doi = {10.1016/s1742-2876(16)30067-6}, note = "\url{https://core.ac.uk/download/pdf/82035161.pdf}", url = {https://lens.org/166-800-654-194-357} } @article{lens.org/167-000-265-524-448, author = {Mario Hildebrandt and Stefan Kiltz and Jana Dittmann}, title = {Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes}, journal = {SPIE Proceedings}, year = {2013}, volume = {8667}, pages = {213--223}, month = {March}, doi = {10.1117/12.2004548}, date = {2013-03-07}, note = "\url{https://www.spiedigitallibrary.org/conference-proceedings-of-spie/8667/1/Digitized-forensics--retaining-a-link-between-physical-and-digital/10.1117/12.2004548.full} ; \url{https://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=1662470} ; \url{https://ui.adsabs.harvard.edu/abs/2013SPIE.8667E..0SH/abstract}", url = {https://lens.org/167-000-265-524-448} } @article{lens.org/168-059-072-881-871, author = {Victor R. Kebande and Nickson M. Karie}, title = {An Approach for Estimating Forensic Data Provenance of an Object in the Cloud Environment using One Dimensional Successive Bisection Method}, journal = {International Journal of Computer Applications}, year = {2016}, volume = {140}, number = {1}, pages = {34--39}, month = {April}, doi = {10.5120/ijca2016909211}, date = {2016-04-15}, note = "\url{https://www.ijcaonline.org/archives/volume140/number1/24562-2016909211} ; \url{https://www.ijcaonline.org/research/volume140/number1/kebande-2016-ijca-909211.pdf}", url = {https://lens.org/168-059-072-881-871} } @article{lens.org/168-245-076-589-180, author = {Graeme Horsman}, title = {Contemporaneous notes for digital forensic examinations}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {37}, pages = {301173--}, doi = {10.1016/j.fsidi.2021.301173}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2666281721000810} ; \url{https://dblp.uni-trier.de/db/journals/di/di37.html#Horsman21}", url = {https://lens.org/168-245-076-589-180} } @article{lens.org/169-019-682-180-36X, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {39}, pages = {301323--301323}, doi = {10.1016/s2666-2817(21)00249-3}, url = {https://lens.org/169-019-682-180-36X} } @article{lens.org/169-037-688-817-615, title = {Prelim iii - Contents List}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {43}, pages = {301468--301468}, doi = {10.1016/s2666-2817(22)00149-4}, url = {https://lens.org/169-037-688-817-615} } @article{lens.org/169-163-572-570-013, author = {Doug Weeks and Bing Zhou}, title = {Physical security design of a digital forensic lab}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2021}, volume = {13}, number = {4}, pages = {418--418}, doi = {10.1504/ijesdf.2021.116017}, url = {https://lens.org/169-163-572-570-013} } @article{lens.org/169-416-347-273-381, author = {Danar Cahyo Prakoso and Riadi and Yudi Prayudi}, title = {Detection of Metasploit Attacks Using RAM Forensic on Proprietary Operating Systems}, journal = {Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control}, year = {2020}, volume = {5}, number = {2}, pages = {155--160}, month = {May}, doi = {10.22219/kinetik.v5i2.1037}, date = {2020-05-22}, note = "\url{https://kinetik.umm.ac.id/index.php/kinetik/article/view/1037} ; \url{https://kinetik.umm.ac.id/index.php/kinetik/article/download/1037/pdf} ; \url{https://core.ac.uk/download/pdf/326780305.pdf}", url = {https://lens.org/169-416-347-273-381} } @article{lens.org/170-481-935-489-564, author = {Adarsh Kumar}, title = {Digital Autopsy (Virtopsy) in India: Steps taken and journey ahead}, journal = {Journal of Indian Academy of Forensic Medicine}, year = {2022}, volume = {44}, number = {suppl}, pages = {43--46}, doi = {10.5958/0974-0848.2022.00011.2}, url = {https://lens.org/170-481-935-489-564} } @article{lens.org/170-961-216-449-905, title = {10-13-DFRWS-Baltimore-2023 (2)}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {42}, pages = {301422--301422}, doi = {10.1016/s2666-2817(22)00103-2}, url = {https://lens.org/170-961-216-449-905} } @article{lens.org/171-177-825-236-988, author = {Dewar Rico Bautista and Johan Smith Rueda Rueda}, title = {Computer forensics on Android devices}, journal = {Revista Ingenio}, year = {2016}, volume = {9}, number = {1}, pages = {21--34}, month = {June}, doi = {10.22463/2011642x.2063}, date = {2016-06-01}, note = "\url{https://doaj.org/article/31e4dee6b9fa403fa7a45bd05de4562c} ; \url{https://core.ac.uk/download/322563884.pdf}", url = {https://lens.org/171-177-825-236-988} } @article{lens.org/171-959-362-512-494, author = {Bambang Sugiantoro}, title = {Development of National Digital Evidence Metadata}, journal = {Jurnal Online Informatika}, year = {2019}, volume = {4}, number = {1}, pages = {24--27}, month = {September}, doi = {10.15575/join.v4i1.292}, date = {2019-09-06}, note = "\url{http://join.if.uinsgd.ac.id/index.php/join/article/download/292/118} ; \url{http://join.if.uinsgd.ac.id/index.php/join/article/view/292} ; \url{https://core.ac.uk/download/pdf/295600543.pdf}", url = {https://lens.org/171-959-362-512-494} } @article{lens.org/172-288-045-781-65X, author = {M Sirisha}, title = {A Survey on digital forensic investigation and its challenges in cloud using VM snapshots}, journal = {International Journal of Advance Research and Innovative Ideas in Education}, year = {2018}, volume = {4}, number = {3}, pages = {1509--1514}, note = "\url{http://ijariie.com/FormDetails.aspx?MenuScriptId=107511}", url = {https://lens.org/172-288-045-781-65X} } @article{lens.org/172-453-362-846-118, author = {Mohammad Hafiz Hersyah}, title = {A Proposed Model of Digital Forensic on Cloud Computing Security Infrastructure}, journal = {International Journal of Innovation in Enterprise System}, year = {2018}, volume = {2}, number = {1}, month = {July}, doi = {10.25124/ijies.v2i01.49}, date = {2018-07-31}, url = {https://lens.org/172-453-362-846-118} } @article{lens.org/173-080-183-794-495, author = {Igor Franc and Ivan Stanković and Irina Branovic and Ranko Popovic}, title = {Ontology based model of digital forensic virtual lab and curriculum design}, journal = {International Journal of Engineering Education}, year = {2014}, volume = {30}, number = {4}, pages = {964--976}, note = "\url{https://dialnet.unirioja.es/servlet/articulo?codigo=7360948}", url = {https://lens.org/173-080-183-794-495} } @article{lens.org/173-242-189-728-551, title = {Sample Preparation For Pesticide Analysis in A Forensic Toxicology Laboratory: A Review}, journal = {Journal of Forensic Sciences and Digital Investigation}, year = {2018}, pages = {27--45}, month = {May}, doi = {10.29199/fsdi.101016}, date = {2018-05-07}, url = {https://lens.org/173-242-189-728-551} } @article{lens.org/174-410-429-997-045, author = {Gp. Capt P Aanand Naidu}, title = {Cyber Crime Intervention- Attacks Analysis for Digital Forensics}, journal = {Digital Forensics (4n6) Journal}, year = {2021}, month = {May}, doi = {10.46293/4n6/2021.03.02.02}, date = {2021-05-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2021.03.02.02}", url = {https://lens.org/174-410-429-997-045} } @article{lens.org/174-412-922-343-845, author = {Mohith Yadav}, title = {Robotic Process Automation - An Overview}, journal = {Digital Forensics (4n6) Journal}, year = {2020}, month = {November}, doi = {10.46293/4n6/2020.02.04.06}, date = {2020-11-01}, note = "\url{http://dx.doi.org/10.46293/4n6/2020.02.04.06}", url = {https://lens.org/174-412-922-343-845} } @article{lens.org/175-273-946-966-114, title = {Twenty Second Annual DFRWS Conference}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {42}, pages = {301430--}, doi = {10.1016/j.fsidi.2022.301430}, url = {https://lens.org/175-273-946-966-114} } @article{lens.org/175-630-039-571-779, author = {Aji Gelar Prayogo and Imam Riadi}, title = {Digital Forensic Signal Instant Messages Services in Case of Cyberbullying using Digital Forensic Research Workshop Method}, journal = {International Journal of Computer Applications}, year = {2022}, volume = {184}, number = {32}, pages = {21--29}, month = {October}, doi = {10.5120/ijca2022922393}, date = {2022-10-20}, url = {https://lens.org/175-630-039-571-779} } @article{lens.org/175-631-077-425-11X, author = {Lazaro A Herrera}, title = {Viability of Consumer Grade Hardware for Learning Computer Forensics Principles}, journal = {The Journal of Digital Forensics, Security and Law}, year = {2021}, volume = {16}, number = {1}, pages = {3--}, month = {April}, date = {2021-04-19}, note = "\url{https://commons.erau.edu/cgi/viewcontent.cgi?article=1683&context=jdfsl} ; \url{https://commons.erau.edu/jdfsl/vol16/iss1/3/}", url = {https://lens.org/175-631-077-425-11X} } @article{lens.org/176-304-954-831-493, author = {Dejan Stanivukovic and Dragan Randjelovic}, title = {Application of multiple criteria decision making in the selection of digital forensics software}, journal = {Vojnotehnicki glasnik}, year = {2016}, volume = {64}, number = {4}, pages = {1083--1101}, doi = {10.5937/vojtehg64-8938}, note = "\url{https://scindeks-clanci.ceon.rs/data/pdf/0042-8469/2016/0042-84691604083S.pdf} ; \url{https://scindeks.ceon.rs/Article.aspx?artid=0042-84691604083S} ; \url{https://cyberleninka.ru/article/n/application-of-multiple-criteria-decision-making-in-the-selection-of-digital-forensics-software}", url = {https://lens.org/176-304-954-831-493} } @article{lens.org/176-605-425-739-746, author = {Graeme Horsman}, title = {The Hierarchy of Case Priority (HiCaP):- A proposed method for case prioritisation in digital forensic laboratories}, journal = {Science \& Justice}, year = {2022}, volume = {62}, number = {5}, pages = {594--601}, doi = {10.1016/j.scijus.2022.08.008}, url = {https://lens.org/176-605-425-739-746} } @article{lens.org/176-777-857-831-803, author = {Yerriswamy K and G. S. Venumadhava}, title = {CYBER FORENSIC TOOLS AND ITS APPLICATION IN THE INVESTIGATION OF DIGITAL CRIMES: PREVENTIVE MEASURES WITH CASE STUDIES}, journal = {INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH}, year = {2022}, pages = {71--73}, month = {February}, doi = {10.36106/ijsr/9633529}, date = {2022-02-01}, url = {https://lens.org/176-777-857-831-803} } @article{lens.org/177-886-630-508-584, author = {Tracy Walraven}, title = {Accrediting a Digital Evidence Laboratory}, journal = {Forensic Science International: Synergy}, year = {2019}, volume = {1}, pages = {S7--}, doi = {10.1016/j.fsisyn.2019.06.022}, note = "\url{https://api.elsevier.com/content/article/PII:S2589871X19301056?httpAccept=text/xml}", url = {https://lens.org/177-886-630-508-584} } @article{lens.org/178-083-319-545-064, author = {Mukul Kumar Srivastava and Devansh Chopra and null Vaishali}, title = {Digital Forensics: Smart Aid for Digital Evidences}, journal = {International journal of engineering research and technology}, year = {2018}, volume = {5}, number = {10}, month = {April}, date = {2018-04-24}, note = "\url{https://www.ijert.org/research/digital-forensics-smart-aid-for-digital-evidences-IJERTCONV5IS10048.pdf} ; \url{https://www.ijert.org/digital-forensics-smart-aid-for-digital-evidences}", url = {https://lens.org/178-083-319-545-064} } @article{lens.org/178-861-239-354-75X, title = {Distance Learning in Forensic Nursing: The Lived Educational Experience}, journal = {Journal of Forensic Sciences and Digital Investigation}, year = {2018}, pages = {18--26}, month = {April}, doi = {10.29199/2637-7136/fsdi-101015}, date = {2018-04-17}, url = {https://lens.org/178-861-239-354-75X} } @article{lens.org/179-322-950-074-016, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {36}, pages = {301143--301143}, doi = {10.1016/s2666-2817(21)00041-x}, url = {https://lens.org/179-322-950-074-016} } @article{lens.org/179-683-412-689-404, title = {Second Annual DFRWS APAC Conference}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {43}, pages = {301462--301462}, doi = {10.1016/j.fsidi.2022.301462}, url = {https://lens.org/179-683-412-689-404} } @article{lens.org/179-762-953-856-987, author = {Susheel George Joseph and Tincy Thomas and Sahal P Najeeb and Sangeetha Sathyapal}, title = {A Block-chain based Enforcement to Reduce Cybercrimes in Digital Forensics}, journal = {Journal of emerging technologies and innovative research}, year = {2021}, volume = {8}, number = {7}, month = {July}, date = {2021-07-01}, note = "\url{https://www.jetir.org/papers/JETIR2107536.pdf} ; \url{https://www.jetir.org/view?paper=JETIR2107536}", url = {https://lens.org/179-762-953-856-987} } @article{lens.org/179-768-158-884-687, author = {Le Sun and Yilin Wang and Zhiguo Qu and Neal N. Xiong}, title = {BeatClass: A Sustainable ECG Classification System in IoT-Based eHealth}, journal = {IEEE Internet of Things Journal}, year = {2022}, volume = {9}, number = {10}, pages = {7178--7195}, month = {May}, doi = {10.1109/jiot.2021.3108792}, date = {2022-05-15}, url = {https://lens.org/179-768-158-884-687} } @article{lens.org/180-118-259-265-800, author = {Amenuveve Gracious Adzogbley}, title = {Storing Forensic Data Against Interference}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, number = {1}, pages = {7--14}, month = {July}, doi = {10.22624/aims/crp-bk3-p2}, date = {2022-07-20}, url = {https://lens.org/180-118-259-265-800} } @article{lens.org/180-706-989-021-884, author = {Shweta Tripathi and Bandu B. Meshram}, title = {Digital Evidence for Database Tamper Detection}, journal = {Journal of Information Security}, year = {2012}, volume = {3}, number = {2}, pages = {113--121}, doi = {10.4236/jis.2012.32014}, note = "\url{https://dblp.uni-trier.de/db/journals/jisec/jisec3.html#TripathiM12} ; \url{https://www.scirp.org/html/7-7800072_18796.htm} ; \url{https://file.scirp.org/pdf/JIS20120200006_49093321.pdf} ; \url{https://file.scirp.org/Html/7-7800072_18796.htm} ; \url{https://www.scirp.org/journal/PaperDownload.aspx?paperID=18796} ; \url{https://dx.doi.org/10.4236/jis.2012.32014} ; \url{http://dx.doi.org/10.4236/jis.2012.32014}", url = {https://lens.org/180-706-989-021-884} } @article{lens.org/180-750-337-060-181, author = {Askar Mohammed Ali Garad}, title = {Rise of Digital Forensics and its impact on criminal justice: A study of tools and techniques involved}, journal = {Technoarete Transactions on Advances in Social Sciences and Humanities}, year = {2021}, volume = {1}, number = {1}, pages = {16--20}, month = {October}, doi = {10.36647/ttassh/01.01.a005}, date = {2021-10-01}, url = {https://lens.org/180-750-337-060-181} } @article{lens.org/181-046-082-158-36X, author = {Mohmed Afridhi L and Palanivel K}, title = {Digital Forensics Triage Classification Model using Hybrid Learning Approaches}, journal = {International Journal of Innovative Research in Computer Science \& Technology}, year = {2022}, pages = {29--39}, month = {May}, doi = {10.55524/ijircst.2022.10.3.7}, date = {2022-05-01}, url = {https://lens.org/181-046-082-158-36X} } @article{lens.org/181-079-576-381-773, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2020}, volume = {34}, pages = {301066--301066}, doi = {10.1016/s2666-2817(20)30363-2}, url = {https://lens.org/181-079-576-381-773} } @article{lens.org/181-095-475-426-346, author = {Asou Aminnezhad and Ali Dehghantanha}, title = {A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2014}, volume = {1}, number = {4}, pages = {311--323}, note = "\url{https://oaji.net/articles/2014/541-1394063756.pdf} ; \url{http://sdiwc.net/digital-library/a-survey-on-privacy-issues-in-digital-forensics.html} ; \url{https://usir.salford.ac.uk/id/eprint/34016/} ; \url{https://usir.salford.ac.uk/34016/1/asurvey.pdf}", url = {https://lens.org/181-095-475-426-346} } @article{lens.org/181-649-072-258-458, author = {Graeme Horsman}, title = {Defining principles for preserving privacy in digital forensic examinations}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301350--301350}, doi = {10.1016/j.fsidi.2022.301350}, url = {https://lens.org/181-649-072-258-458} } @article{lens.org/182-664-038-879-615, author = {Punam Sunil Raskar and Sanjeevani Kiran Shah}, title = {Methods for forgery detection in digital forensics}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2021}, volume = {13}, number = {5}, pages = {528--528}, doi = {10.1504/ijesdf.2021.117310}, url = {https://lens.org/182-664-038-879-615} } @article{lens.org/182-757-173-672-636, author = {Funmilola Ikeolu Fagbola and Hein S. Venter}, title = {Smart Digital Forensic Readiness Model for Shadow IoT Devices}, journal = {Applied Sciences}, year = {2022}, volume = {12}, number = {2}, pages = {730--730}, month = {January}, doi = {10.3390/app12020730}, date = {2022-01-12}, url = {https://lens.org/182-757-173-672-636} } @article{lens.org/182-962-693-791-500, author = {Kevin Klaus Gomez Buquerin and Christopher Corbett and Hans-Joachim Hof}, title = {A generalized approach to automotive forensics}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {36}, pages = {301111--}, doi = {10.1016/j.fsidi.2021.301111}, note = "\url{https://www.sciencedirect.com/science/article/pii/S2666281721000056} ; \url{https://dfrws.org/wp-content/uploads/2021/08/2021_EU_paper-a_generalized_approach_to_automotive_forensics.pdf} ; \url{https://dfrws.org/presentation/a-generalized-approach-to-automotive-forensics/}", url = {https://lens.org/182-962-693-791-500} } @article{lens.org/183-680-361-426-436, author = {Zhiguo Qu and Hanrong Sun}, title = {A Secure Information Transmission Protocol for Healthcare Cyber Based on Quantum Image Expansion and Grover Search Algorithm}, journal = {IEEE Transactions on Network Science and Engineering}, year = {2022}, pages = {1--13}, doi = {10.1109/tnse.2022.3187861}, url = {https://lens.org/183-680-361-426-436} } @article{lens.org/184-069-302-229-82X, author = {Vacius Jusas and Darius Birvinskas and Elvar Gahramanov}, title = {Methods and Tools of Digital Triage in Forensic Context: Survey and Future Directions}, journal = {Symmetry}, year = {2017}, volume = {9}, number = {4}, pages = {49--}, month = {March}, doi = {10.3390/sym9040049}, date = {2017-03-28}, note = "\url{https://dblp.uni-trier.de/db/journals/symmetry/symmetry9.html#JusasBG17} ; \url{https://doi.org/10.3390/sym9040049} ; \url{https://www.mdpi.com/2073-8994/9/4/49} ; \url{https://www.mdpi.com/2073-8994/9/4/49/pdf} ; \url{https://core.ac.uk/download/80047889.pdf}", url = {https://lens.org/184-069-302-229-82X} } @article{lens.org/184-298-619-472-94X, author = {Yang Chung-huang}, title = {Research and Development of Digital Forensics Platforms}, journal = {Journal of Shanghai Jiaotong University}, year = {2012}, note = "\url{http://en.cnki.com.cn/Article_en/CJFDTOTAL-SHJT201202019.htm}", url = {https://lens.org/184-298-619-472-94X} } @article{lens.org/184-546-625-187-133, author = {Nurul Haswani Saiman and Mazura Mat Din}, title = {Generic Digital Forensic Business Model – Malaysian Case Study}, journal = {International Journal of Innovative Computing}, year = {2018}, volume = {8}, number = {1}, month = {May}, doi = {10.11113/ijic.v8n1.160}, date = {2018-05-21}, note = "\url{https://ijic.utm.my/index.php/ijic/article/view/160} ; \url{http://eprints.utm.my/id/eprint/82198/}", url = {https://lens.org/184-546-625-187-133} } @article{lens.org/185-798-265-234-254, author = { Riadi and Arizona Firdonsyah Sunardi}, title = {Forensic Investigation Technique on Android’s Blackberry Messenger using NISTFramework}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2017}, volume = {6}, number = {4}, pages = {198--205}, doi = {10.17781/p002306}, note = "\url{http://sdiwc.net/digital-library/forensic-investigation-technique-on-androids-blackberry-messenger-using-nistframework}", url = {https://lens.org/185-798-265-234-254} } @article{lens.org/185-892-083-398-013, title = {Digital Forensics: Where Are We?}, journal = {International Journal of Forensic Research}, year = {2020}, volume = {1}, number = {1}, month = {September}, doi = {10.33140/ijfr.01.01.10}, date = {2020-09-21}, url = {https://lens.org/185-892-083-398-013} } @article{lens.org/186-940-557-741-427, author = {Randa Kamal and Ezz El‐Din Hemdan and Nawal El‐Fishway}, title = {Forensics chain for evidence preservation system: An evidence preservation forensics framework for internet of things‐based smart city security using blockchain}, journal = {Concurrency and Computation: Practice and Experience}, year = {2022}, volume = {34}, number = {21}, month = {May}, doi = {10.1002/cpe.7062}, date = {2022-05-20}, url = {https://lens.org/186-940-557-741-427} } @article{lens.org/186-989-428-380-116, author = {Jonas Takyi Asamoah}, title = {Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness}, journal = {Advances in Multidisciplinary and scientific Research Journal Publication}, year = {2022}, volume = {1}, pages = {307--314}, month = {July}, doi = {10.22624/aims/crp-bk3-p49}, date = {2022-07-26}, url = {https://lens.org/186-989-428-380-116} } @article{lens.org/187-108-280-798-543, author = {Anang Marfianto and Riadi}, title = {WhatsApp Messenger Forensic Analysis Based on Android Using Text Mining Method}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2018}, volume = {7}, number = {3}, pages = {319--327}, doi = {10.17781/p002470}, note = "\url{http://sdiwc.net/digital-library/whatsapp-messenger-forensic-analysis-based-on-android-using-text-mining-method}", url = {https://lens.org/187-108-280-798-543} } @article{lens.org/187-733-044-298-76X, author = {Shahrzad Zargari}, title = {What is Digital Forensics?}, journal = {ITNOW}, year = {2022}, volume = {64}, number = {2}, pages = {46--47}, month = {May}, doi = {10.1093/itnow/bwac055}, date = {2022-05-12}, url = {https://lens.org/187-733-044-298-76X} } @article{lens.org/187-947-933-345-849, author = {Ahmad Alisher and Mohammed Yousuf Uddin and Mohammad Mazhar Afzal}, title = {Disposable Virtual Machines and Challenges to Digital Forensics Investigation}, journal = {International Journal of Advanced Computer Science and Applications}, year = {2021}, volume = {12}, number = {2}, doi = {10.14569/ijacsa.2021.0120299}, note = "\url{https://thesai.org/Downloads/Volume12No2/Paper_99-Disposable_Virtual_Machines_and_Challenges.pdf} ; \url{https://thesai.org/Publications/ViewPaper?Volume=12&Issue=2&Code=IJACSA&SerialNo=99} ; \url{https://repository.psau.edu.sa/xmlui/handle/123456789/1561178}", url = {https://lens.org/187-947-933-345-849} } @article{lens.org/189-547-854-321-849, author = {Jewan Bang and Jungheum Park and Sangjin Lee}, title = {Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301376--301376}, doi = {10.1016/j.fsidi.2022.301376}, url = {https://lens.org/189-547-854-321-849} } @article{lens.org/189-977-135-419-911, author = {Alexander Ball}, title = {Editorial}, journal = {International Journal of Digital Curation}, year = {2012}, volume = {7}, number = {2}, pages = {1--2}, month = {October}, doi = {10.2218/ijdc.v7i2.225}, date = {2012-10-23}, note = "\url{https://core.ac.uk/download/pdf/162675731.pdf}", url = {https://lens.org/189-977-135-419-911} } @article{lens.org/189-979-945-502-249, author = {Wael A. Mahrous and Mahmoud Farouk and Saad M. Darwish}, title = {An Enhanced Blockchain-Based IoT Digital Forensics Architecture Using Fuzzy Hash}, journal = {IEEE Access}, year = {2021}, volume = {9}, pages = {151327--151336}, doi = {10.1109/access.2021.3126715}, note = "\url{https://dblp.uni-trier.de/db/journals/access/access9.html#MahrousFD21} ; \url{https://ieeexplore.ieee.org/document/9606922}", url = {https://lens.org/189-979-945-502-249} } @article{lens.org/190-471-875-086-638, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {37}, pages = {301201--301201}, doi = {10.1016/s2666-2817(21)00109-8}, url = {https://lens.org/190-471-875-086-638} } @article{lens.org/190-571-870-134-934, author = {Gianni Fenu and Fabrizio Solinas}, title = {Computer forensics between the italian legislation and pragmatic questions}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2013}, volume = {2}, number = {1}, pages = {9--24}, note = "\url{http://sdiwc.net/digital-library/computer-forensics-between-the-italian-legislation-and-pragmatic-questions} ; \url{https://iris.unica.it/handle/11584/91629}", url = {https://lens.org/190-571-870-134-934} } @article{lens.org/190-597-436-230-873, author = {Sudesh Rani}, title = {Digital forensic models: A comparative analysis}, journal = {International Journal of Management, IT, and Engineering}, year = {2018}, volume = {8}, number = {6}, pages = {432--443}, note = "\url{https://www.indianjournals.com/ijor.aspx?target=ijor:ijmie&volume=8&issue=6&article=034}", url = {https://lens.org/190-597-436-230-873} } @article{lens.org/191-992-698-018-836, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {37}, pages = {301257--301257}, doi = {10.1016/s2666-2817(21)00171-2}, url = {https://lens.org/191-992-698-018-836} } @article{lens.org/192-222-612-275-635, author = {Yunus Korkmaz and Aytuğ Boyaci and Turker Tuncer}, title = {Turkish vowel classification based on acoustical and decompositional features optimized by Genetic Algorithm}, journal = {Applied Acoustics}, year = {2019}, volume = {154}, pages = {28--35}, doi = {10.1016/j.apacoust.2019.04.027}, note = "\url{https://www.sciencedirect.com/science/article/pii/S0003682X19303573}", url = {https://lens.org/192-222-612-275-635} } @article{lens.org/192-955-966-543-738, author = {Ramlan Mahmoud and Farid Daryabar}, title = {Digital Forensic Trends and Future}, journal = {International Journal of Cyber-Security and Digital Forensics}, year = {2013}, volume = {2}, number = {2}, pages = {48--76}, note = "\url{http://sdiwc.net/digital-library/digital-forensic-trends-and-future} ; \url{https://usir.salford.ac.uk/34014/1/digital%20forensics.pdf}", url = {https://lens.org/192-955-966-543-738} } @article{lens.org/193-055-388-536-239, title = {Special Issue of Best Papers from the 11th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE 2016)}, journal = {Journal of Digital Forensics, Security and Law}, year = {2017}, doi = {10.15394/jdfsl.2017.1443}, url = {https://lens.org/193-055-388-536-239} } @article{lens.org/193-815-688-276-212, author = {Saad Subair and Derar Yosif and Abdelgader Ahmed and Christopher Thron}, title = {Cyber Crime Forensics}, journal = {International Journal of Emerging Multidisciplinaries: Computer Science \& Artificial Intelligence}, year = {2022}, volume = {1}, number = {1}, pages = {41--49}, month = {May}, doi = {10.54938/ijemdcsai.2022.01.1.37}, date = {2022-05-30}, url = {https://lens.org/193-815-688-276-212} } @article{lens.org/194-646-821-795-161, author = {Abdellah Akilal and M-Tahar Kechadi}, title = {An improved forensic-by-design framework for cloud computing with systems engineering standard compliance}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {40}, pages = {301315--301315}, doi = {10.1016/j.fsidi.2021.301315}, url = {https://lens.org/194-646-821-795-161} } @article{lens.org/195-616-478-575-653, author = {Asgarali Bouyer and Mojtaba Zirak}, title = {Digital forensics in private Seafile cloud storage from both client and server side}, journal = {International Journal of Electronic Security and Digital Forensics}, year = {2021}, volume = {13}, number = {3}, pages = {233--233}, doi = {10.1504/ijesdf.2021.114954}, url = {https://lens.org/195-616-478-575-653} } @article{lens.org/198-188-537-910-708, title = {Distance Learning in Forensic Nursing: The Lived Educational Experience}, journal = {Journal of Forensic Sciences and Digital Investigation}, year = {2017}, pages = {18--26}, month = {September}, doi = {10.29199/fsdi.101015}, date = {2017-09-13}, url = {https://lens.org/198-188-537-910-708} } @article{lens.org/198-480-779-430-174, title = {Radio-morphometric Analysis of Sella Turcica in the South Indian Population: A Digital Cephalometric Study}, journal = {Arab Journal of Forensic Sciences and Forensic Medicine}, year = {2017}, volume = {1}, number = {5}, month = {June}, doi = {10.26735/16586794.2017.019}, date = {2017-06-15}, url = {https://lens.org/198-480-779-430-174} } @article{lens.org/198-534-899-847-91X, title = {Prelim i - Editorial Board}, journal = {Forensic Science International: Digital Investigation}, year = {2021}, volume = {38}, pages = {301277--301277}, doi = {10.1016/s2666-2817(21)00195-5}, url = {https://lens.org/198-534-899-847-91X} } @article{lens.org/199-320-642-531-170, author = {Hailey Johnson and Karl Volk and Robert Serafin and Cinthya Grajeda and Ibrahim Baggili}, title = {Alt-tech social forensics: Forensic analysis of alternative social networking applications}, journal = {Forensic Science International: Digital Investigation}, year = {2022}, volume = {42}, pages = {301406--}, doi = {10.1016/j.fsidi.2022.301406}, url = {https://lens.org/199-320-642-531-170} }