Lens ID,Title,Date Published,Publication Year,Publication Type,Source Title,ISSNs,Publisher,Source Country,Author/s,Abstract,Volume,Issue Number,Start Page,End Page,Fields of Study,Keywords,MeSH Terms,Chemicals,Funding,Source URLs,External URL,PMID,DOI,Microsoft Academic ID,PMCID,Citing Patents Count,References,Citing Works Count,Is Open Access,Open Access License,Open Access Colour 000-068-323-180-757,Industrial Internet Of Things & Security Aspects,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Kanishka Joshi,,,,,,Internet privacy; Business; Industrial Internet,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.07,http://dx.doi.org/10.46293/4n6/2021.03.01.07,,10.46293/4n6/2021.03.01.07,3162555970,,0,,0,false,, 000-092-244-624-751,LIVE FORENSIK UNTUK ANALISA ANTI FORENSIK PADA WEB BROWSER STUDI KASUS BROWZAR,2019-02-15,2019,journal article,Indonesian Journal of Business Intelligence (IJUBI),26213923; 26213915,Alma Ata University Press,,Tri Rochmadi,"Cybercrime continues to increase and innovate along with the rapid development of internet and more easily accessible everywhere. Most business organizations have used the internet for its operations so that the use of browsers is a necessity to support work. So that the browser also adjusts to improve security on the user's side so that information accessed by users cannot be known by other users. Browzar is a browser that answers these challenges, where Browzar can run without having to be installed on the computer and automatically deletes information generated by the use of the browser itself. However, these advantages become a challenge for investigators because these advantages can be exploited by cybercriminals to eliminate, minimize existing digital evidence. This study intends to analyze and find digital evidence in criminal cases using Browzar with Live Forensic. Digital evidence is obtained using dumpit for data acquisition and forensic volatility memory and winhex to analyze data and information on RAM. Results of the study were able to obtain information that could be used for digital evidence on Browzar web browser, namely URL history, account used log in, namely username and password, timestamp, that is, the user access time to a web page.",1,1,32,,,,,,,https://ejournal.almaata.ac.id/index.php/IJUBI/article/viewFile/878/1126 https://core.ac.uk/download/268505205.pdf,http://dx.doi.org/10.21927/ijubi.v1i1.878,,10.21927/ijubi.v1i1.878,2990383679,,0,,1,true,cc-by-sa,gold 000-360-120-513-679,Digital Forensics as a Service: A game changer,,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,R.B. van Baar; H.M.A. van Beek; E.J. van Eijk,Abstract How is it that digital investigators are always busy and still never have enough time to actually dig deep into digital evidence? In this paper we will explore the current implementation of the digital forensic process and analyze factors that impact the efficiency of this process. Next we explain how in the Netherlands a Digital Forensics as a Service implementation reduced case backlogs and freed up digital investigators to help detectives better understand the digital material.,11,,S54,S62,Digital forensic process; Digital evidence; Digital material; Service implementation; Service (systems architecture); Computer security; Computer science; Process (engineering); Computer forensics; Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S1742287614000127 https://core.ac.uk/display/82501077 http://www.sciencedirect.com/science/article/pii/S1742287614000127 https://dx.doi.org/10.1016/j.diin.2014.03.007 http://dx.doi.org/10.1016/j.diin.2014.03.007,http://dx.doi.org/10.1016/j.diin.2014.03.007,,10.1016/j.diin.2014.03.007,1967185460,,0,019-831-293-743-518; 024-735-069-822-749; 026-774-296-742-022; 033-877-222-136-260; 051-645-938-939-51X; 056-715-378-869-201; 079-070-981-899-105; 097-567-011-227-46X; 134-927-490-231-285; 199-172-967-270-034; 199-745-676-923-766,70,true,cc-by-nc-nd,hybrid 000-402-272-421-776,Combating Insider Threats using 'User Behavioural Analytics',2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),," Baskar",,,,,,Internet privacy; Insider; Computer science; Analytics,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.09,http://dx.doi.org/10.46293/4n6/2021.03.01.09,,10.46293/4n6/2021.03.01.09,3162035114,,0,,0,false,, 000-534-406-835-275,A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine,,2012,journal article,Mathematical and Computer Modelling,08957177,Elsevier BV,United Kingdom,Sungsu Lim; Byeongyeong Yoo; Jungheum Park; Keun Duck Byun; Sangjin Lee,"Abstract Virtualization is a technology that uses a logical environment to overcome physical limitations in hardware. Recently, its coverage has become broader. Because a virtual machine can perform the same role as an actual system, a recorded user’s activity trail in the virtual machine is important factor in terms of digital forensics. If the investigator found trails of the VMware Workstation on the host, he should investigate the virtual machine along with host system. However, due to a lack of understanding of the virtual machine, the investigation process is not clear. Moreover, a damaged virtual machine image is difficult to investigate because of the structural characteristics. Therefore, we need a technical understanding and a research about investigation procedures and recovery methods on the virtual machine. In this research, we suggest an investigation procedure of digital forensics and a recovery method on damaged images for the VMware Workstation that has the largest number of users.",55,1,151,160,Operating system; Host (network); Virtual machine; Computer science; Full virtualization; Virtualization; Workstation; Hardware virtualization; Digital forensics; Process (computing),,,,MKE/KEIT,https://dblp.uni-trier.de/db/journals/mcm/mcm55.html#LimYPBL12 https://www.sciencedirect.com/science/article/pii/S0895717711001014 https://koreauniv.pure.elsevier.com/en/publications/a-research-on-the-investigation-method-of-digital-forensics-for-a,http://dx.doi.org/10.1016/j.mcm.2011.02.011,,10.1016/j.mcm.2011.02.011,1971766706,,0,040-393-580-637-973; 042-922-388-727-569; 061-412-953-386-541; 075-092-110-948-778; 085-063-161-801-039; 105-708-174-479-949; 144-034-242-927-325,13,true,elsevier-specific: oa user license, 000-616-206-600-091,Camera-identification and common-source identification: The correlation values of mismatches,2019-05-10,2019,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Arjan Mieremet,,301,,46,54,Artificial intelligence; Pattern recognition; Focus (optics); Range (statistics); A priori estimate; Simple (abstract algebra); Digital camera; Computer science; Digital image; Identification (information); Decision rule,Camera-identification; Digital images; Forensic science; PRNU,,,,https://www.sciencedirect.com/science/article/pii/S0379073819301847 https://www.ncbi.nlm.nih.gov/pubmed/31128408,http://dx.doi.org/10.1016/j.forsciint.2019.05.008,31128408,10.1016/j.forsciint.2019.05.008,2943978394,,0,012-412-270-035-761; 022-455-239-710-493; 028-961-046-717-576; 045-226-923-439-105; 063-318-464-288-838; 070-308-945-671-285; 083-097-133-928-799; 127-502-383-988-293; 151-372-268-187-893; 184-897-235-429-285,5,false,, 000-910-549-617-511,The Use of Forensic Science Methods in Digital Forensics,,2018,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Nicholas Bruin,,,,,,Forensic science; Information system; Ransomware; Computer security; Computer science; Phishing; Digital forensics,,,,,https://papers.ssrn.com/abstract=3185591,http://dx.doi.org/10.2139/ssrn.3185591,,10.2139/ssrn.3185591,2904843228,,0,003-870-694-249-212; 106-156-015-991-201; 120-680-121-587-307,0,false,, 001-217-010-056-328,Qualitative Assessment of Digital Forensic Tools,2020-05-05,2020,journal article,Asian Journal of Electrical Sciences,22496297,The Research Publication,,Sakshi Singh; Suresh Kumar,"Forensic science is a study of science to criminals and civil laws. Digital forensics is the part of forensic science relating to proof found in computers and advanced storage media. Forensic examiners gather, protect and break down logical confirmations over the span of examination. Digital information contains data as content, pictures, sound, video and so on. These days numerous cybercrime cases, for example, hacking, banking cheats, phishing, email spamming, etc., have developed which are connected with a computerized information. Since the digital investigation is turning into an expanding concern, numerous digital forensic tools have been created to manage the difficulties of exploring computerized wrongdoings. The motivation behind digital forensics strategies is to look, protect and extract data on advanced frameworks to discover potential confirmations to exhibit them in the courtroom. In this paper, we have discussed five kinds of forensics namely Network Forensics, Live Forensics, Cyber Forensics, Database Forensics, and Mobile Forensics. The paper depicts a list of digital forensic tools in detail and looks at them based on the characterized parameters to figure out which tool suits better for any investigation. The paper looks at network, database and mobile forensic tools and examines the silent features and uniqueness of each of the tools along with their functionalities.",9,1,25,32,,,,,,,http://dx.doi.org/10.51983/ajes-2020.9.1.2372,,10.51983/ajes-2020.9.1.2372,,,0,,0,false,, 001-334-079-265-518,Opinion: Does the field of digital forensics have a consistency problem?,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Graeme Horsman,"Abstract Consistency is a term which should be used cautiously in the context of digital forensics (DF). Its meaning indicates regular, repeatable performance, where with regards to the undertaking of forensic analysis procedures, such behaviour is synonymous with the traits of reliability and trustworthiness, which in turn provides a foundation for deriving dependable results. In the context of investigatory processes, consistency is generally considered a mark of quality; a gold standard to be achieved where conversely, any evidential interpretations gleaned from inconsistently functioning forensic processes are inherently unsafe ( Lander, 2016 ). Great value should be placed upon attaining consistency in all aspects of the forensic process in all investigations, yet the field of DF in its current form is arguably far from achieving it. This is partly due in England and Wales to its regionalised infrastructure, and arguably impacted by a lack of robust regulation and oversight.",33,,300970,,Consistency (negotiation); Data science; Quality (business); Context (language use); Meaning (existential); Foundation (evidence); Computer science; Process (engineering); Reliability (statistics); Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S2666281720300445 https://research.tees.ac.uk/en/publications/opinion-does-the-field-of-digital-forensics-have-a-consistency-pr https://dblp.uni-trier.de/db/journals/di/di33.html#Horsman20a,http://dx.doi.org/10.1016/j.fsidi.2020.300970,,10.1016/j.fsidi.2020.300970,3017973008,,0,006-933-430-647-14X; 007-790-059-029-953; 008-713-157-011-092; 010-963-610-208-920; 013-017-062-437-973; 032-451-540-235-796; 047-386-524-667-691; 050-513-243-638-138; 061-269-967-405-492; 070-213-659-171-077; 075-950-021-558-098; 087-342-951-350-054; 094-587-727-381-031; 118-838-969-146-870; 142-790-196-752-819; 192-437-973-004-61X,3,true,cc-by-nc-nd,green 001-349-955-609-387,Analisis Perbandingan File Carving Dengan Metode Nist,2020-05-06,2020,journal article,Jurnal Sains Komputer dan Teknologi Informasi,26557460,Universitas Muhammadiyah Palangkaraya,,Doddy Teguh Yuwono; Yunanri W,"Pemulihan data adalah bagian terpenting dari Digital Forensic. Bagi penyidik ??negara untuk menghasilkan bukti yang sah di pengadilan sangat penting dan wajib. Memori Flash, Hard Disk Drive (HDD) dan Solid State Drive (SDD) adalah beberapa Media Penyimpanan yang digunakan sebagai tempat untuk meletakkan semua jenis data dan informasi dalam berbagai format file digital. Karena bentuk digitalnya sehingga memungkinkan berbagai format file digital disembunyikan, dihapus, dan bahkan diformat di media penyimpanan, sedangkan semua data dan informasi harus ditemukan oleh penyelidik negara. ; Prinsip dasar data atau informasi digital jika telah disalin pada Memori Flash, Hard Disk Drive (HDD) dan Solid State Drive (SDD) tidak akan pernah hilang secara permanen dan bahkan data atau informasi digital hilang karena dihapus, diformat dengan cepat atau sistem macet. Jadi, mengembalikan data sangat mungkin. Dalam penelitian ini, tes dilakukan menggunakan Foremost, FTK Imager, dan Scalpel, yang merupakan Alat OpenSource yang dapat digunakan pada sistem operasi Propietary dan OpenSource. Metode yang digunakan adalah Institut Teknologi Standar Nasional (NIST). NIST memiliki panduan kerja yang sangat baik tentang kebijakan dan standar untuk memastikan setiap Penguji mengikuti alur kerja yang sama, sehingga pekerjaan mereka didokumentasikan dan hasilnya dapat ditinjau dan dapat dipertahankan saat pelaporan sebelum dijadikan sebagai bukti yang valid. Hasil penelitian ini membuktikan bahwa Foremost, FTK Imager, dan Scalpel dapat mengembalikan data yang dihapus, disembunyikan, dan diformat.",2,2,1,6,,,,,,http://journal.umpalangkaraya.ac.id/index.php/jsakti/article/download/1472/1294 https://core.ac.uk/download/pdf/327226713.pdf,http://dx.doi.org/10.33084/jsakti.v2i2.1472,,10.33084/jsakti.v2i2.1472,3037383077,,0,,0,true,cc-by-sa,gold 001-619-826-695-028,Threat Matrix – Critical Infrastructure,2020-02-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Nilay Mistry; Tanaya Vaishnav; Kaivashin Shethna,,5,1,08,22,Topology; Matrix (mathematics); Critical infrastructure; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.01,http://dx.doi.org/10.46293/4n6/2020.02.01,,10.46293/4n6/2020.02.01,3022603942,,0,,0,false,, 001-660-853-267-816,Policing and Crime Act 2017: Changes to pre-charge bail and the impact on digital forensic analysis,,2018,journal article,Computer Law & Security Review,02673649,Elsevier BV,United Kingdom,Graeme Horsman; Angela King,"Abstract Following the enactment of the Police and Crime Act 2017, subsequent amendments to the Police and Criminal Evidence Act 1984 have seen a ‘cap’ placed on the length of time a suspect can be released on bail; a process commonly referred to as ‘police bail’ or ‘pre-charge bail’. Whilst designed to instil consistency and certainty into bail processes to prevent individuals being subject to lengthy periods of regulation and uncertainty, it places additional pressures on forensic services. With a focus on digital forensics, examination of digital media is a complex and time-consuming process, with existing backlogs well documented. The need for timely completion of investigations to adhere to pre-charge bail rules places additional stress on an already stretched service. This comment submission provides an initial analysis of new pre-charge bail regulations, assessing their impact on digital forensic services.",34,5,1139,1143,Business; Digital media; Consistency (negotiation); Suspect; Service (business); Criminology; Certainty; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/clsr/clsr34.html#HorsmanK18 https://research.tees.ac.uk/ws/files/4192050/621946.pdf https://research.tees.ac.uk/en/publications/policing-and-crime-act-2017-changes-to-pre-charge-bail-and-the-im https://www.sciencedirect.com/science/article/abs/pii/S0267364918300840 https://core.ac.uk/download/pdf/196165653.pdf,http://dx.doi.org/10.1016/j.clsr.2018.04.005,,10.1016/j.clsr.2018.04.005,2803850255,,0,003-982-227-180-136; 032-451-540-235-796; 042-767-661-429-064; 118-214-115-485-064; 137-755-137-054-864; 163-330-758-807-944,0,true,,green 001-868-759-629-801,Comparative analysis on integrated digital forensic tools for digital forensic investigation,2020-04-01,2020,journal article,IOP Conference Series: Materials Science and Engineering,17578981; 1757899x,IOP Publishing,,Jae-Ung Lee; Wooyoung Soh,"As a variety of digital devices have recently become widely commercialized, digital forensics, a process where electronic information stored in digital devices is accurately identified, collected, preserved and analysed and the information is submitted to the court as evidence, is gaining enormous popularity. This paper analyses characteristics, applications, limitations of digital forensic tools and compare the tool with others in terms of ease of use, thereby helping investigators to adopt integrated digital forensic tools in their investigation.",834,1,012034,,Variety (cybernetics); Usability; Data science; Popularity; Electronic information; Digital forensic investigation; Computer science; Process (engineering); Digital forensics,,,,,https://iopscience.iop.org/article/10.1088/1757-899X/834/1/012034/pdf https://ui.adsabs.harvard.edu/abs/2020MS&E..834a2034L/abstract https://iopscience.iop.org/article/10.1088/1757-899X/834/1/012034,http://dx.doi.org/10.1088/1757-899x/834/1/012034,,10.1088/1757-899x/834/1/012034,3037684965,,0,025-038-687-609-155; 090-537-509-217-101; 115-204-360-176-558; 117-754-132-477-323; 124-566-352-741-128; 175-840-536-452-987,3,true,,gold 001-888-175-704-116,Leveraging human thinking style for user attribution in digital forensic process,2017-02-02,2017,journal article,"International Journal on Advanced Science, Engineering and Information Technology",24606952; 20885334,Insight Society,Indonesia,Ikuesan Richard Adeyemi; Shukor Abd Razak; Mazleena Salleh; Hein S. Venter,"User attribution, the process of identifying a human in a digital medium, is a research area that has receive significant attention in information security research areas, with a little research focus on digital forensics. This study explored the probability of the existence of a digital fingerprint based on human thinking style, which can be used to identify an online user. To achieve this, the study utilized Server-side web data of 43-respondents were collected for 10-months as well as a self-report thinking style measurement instrument. Cluster dichotomies from five thinking styles were extracted. Supervised machine-learning techniques were then applied to distinguish individuals on each dichotomy. The result showed that thinking styles of individuals on different dichotomies could be reliably distinguished on the Internet using a Meta classifier of Logistic model tree with bagging technique. The study further modeled how the observed signature can be adopted for a digital forensic process, using high-level universal modeling language modeling process- specifically, the behavioral state-model and use-case modeling process. In addition to the application of this result in forensics process, this result finds relevance and application in human-centered graphical user interface design for recommender system as well as in e-commerce services. It also finds application in online profiling processes, especially in e-learning systems",7,1,198,206,The Internet; Machine learning; Cognitive style; Artificial intelligence; Data science; Digital forensic process; Graphical user interface; Computer science; Information security; Recommender system; Digital forensics; Classifier (UML),,,,,https://core.ac.uk/display/90874512 http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=1383 https://repository.up.ac.za/handle/2263/65805 http://eprints.utm.my/id/eprint/66172/ https://core.ac.uk/download/pdf/296921841.pdf,http://dx.doi.org/10.18517/ijaseit.7.1.1383,,10.18517/ijaseit.7.1.1383,2591499099,,0,007-577-029-015-064; 008-849-714-232-991; 011-850-183-685-719; 012-056-075-655-334; 014-175-333-509-917; 014-357-647-717-302; 015-057-737-147-915; 021-811-256-188-256; 027-338-694-650-938; 031-967-529-225-926; 037-672-757-933-369; 040-411-277-743-307; 041-200-455-515-996; 043-674-322-551-472; 045-533-500-732-596; 062-624-724-547-760; 069-823-591-222-44X; 073-648-666-465-913; 073-884-694-506-406; 074-495-616-190-44X; 075-115-094-597-339; 080-874-788-703-165; 090-632-799-573-969; 098-682-152-467-280; 100-149-606-823-492; 105-194-129-349-111; 115-591-817-700-181; 118-075-434-142-096; 168-122-843-611-626; 176-957-105-126-712; 183-333-945-850-883; 183-361-176-724-740,16,true,cc-by-sa,hybrid 002-214-848-360-115,"Archival science, digital forensics, and new media art",,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Dianne Dietrich; Frank Adelstein,"Digital archivists and traditional digital forensics practitioners have significant points of convergence as well as notable differences between their work. This paper provides an overview of how digital archivists use digital forensics tools and techniques to approach their work, comparing and contrasting archival with traditional computer forensics. Archives encounter a wide range of digital materials. This paper details a specific example within archival forensics-the analysis of complex, interactive, new media digital artworks. From this, the paper concludes with considerations for future directions and recommendations to the traditional forensics community to support the needs of cultural heritage institutions.",14,,S137,S145,World Wide Web; Media arts; Computer science; Archival science; Computer forensics; Cultural heritage; Digital forensics; New media,,,,National Endowment for the Humanities,https://doi.org/10.1016/j.diin.2015.05.004 https://dl.acm.org/doi/10.1016/j.diin.2015.05.004 https://core.ac.uk/display/82761998 https://dblp.uni-trier.de/db/journals/di/di14.html#DietrichA15 https://dx.doi.org/10.1016/j.diin.2015.05.004 http://dx.doi.org/10.1016/j.diin.2015.05.004 https://www.sciencedirect.com/science/article/pii/S1742287615000493,http://dx.doi.org/10.1016/j.diin.2015.05.004,,10.1016/j.diin.2015.05.004,1413540581,,0,001-604-679-038-981; 002-495-833-326-831; 006-307-797-689-911; 008-034-395-012-889; 011-051-740-313-213; 030-545-501-398-060; 035-448-415-847-226; 043-589-904-668-295; 068-897-559-627-004; 080-425-722-856-19X; 122-880-373-616-302; 152-595-511-266-730; 152-742-745-030-197; 166-303-965-322-945; 182-195-359-407-29X; 199-172-967-270-034,10,true,cc-by-nc-nd,hybrid 002-288-892-034-343,A hierarchy of expert performance (HEP) applied to digital forensics: Reliability and biasability in digital forensics decision making,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Nina Sunde; Itiel E. Dror,"Abstract In order to examine the biasability (impact of contextual information) and reliability (consistency) of digital forensic observations, interpretations, and conclusions, 53 digital forensics (DF) examiners analysed the same evidence file. For biasability, some DF examiners were provided with contextual information suggesting guilt or innocence, while a control group received no contextual information. As per biasability, the results showed that the DF examiners' observations were affected by the biasing contextual information. As per reliability, the results showed low reliability between DF examiners in observations, interpretations, and conclusions. For improving DF work, as well as for transparency, it is important to study and assess the biasability and reliability of their decision making.",37,,301175,,Information retrieval; Consistency (negotiation); Control (management); Transparency (behavior); Contextual information; Hierarchy; Computer science; Reliability (statistics); Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/di/di37.html#SundeD21 https://www.sciencedirect.com/science/article/pii/S2666281721000834,http://dx.doi.org/10.1016/j.fsidi.2021.301175,,10.1016/j.fsidi.2021.301175,3165519753,,0,000-354-619-269-715; 000-360-120-513-679; 000-790-486-938-751; 001-701-829-263-08X; 002-098-094-127-361; 006-274-985-599-675; 007-868-297-443-532; 010-061-391-662-193; 010-218-618-278-587; 010-963-610-208-920; 012-410-670-929-028; 016-007-436-797-894; 016-220-259-667-003; 017-420-574-211-041; 018-182-926-340-45X; 020-639-086-440-149; 024-616-418-849-375; 030-178-593-043-926; 033-120-690-053-891; 040-907-268-218-905; 043-083-546-914-143; 050-214-108-891-19X; 055-614-100-530-52X; 058-260-728-239-715; 064-549-392-650-90X; 065-805-363-769-350; 074-706-219-689-754; 075-529-701-912-32X; 078-082-517-555-79X; 080-545-688-531-696; 086-013-257-150-665; 099-377-733-522-116; 099-407-105-258-080; 108-249-505-350-920; 119-397-843-207-581; 125-939-677-745-616; 163-376-020-626-884,7,true,cc-by-nc-nd,hybrid 002-328-258-595-526,"Archival application of digital forensics methods for authenticity, description and access provision",,2012,journal article,Comma,16801865; 20493355,Liverpool University Press,,Christopher A. Lee,"When acquiring born-digital materials, archivists must often extract digital materials from media in ways that reflect the rich metadata associated with records and ensure records' integrity. They must also allow users to make sense of materials and understand their context, while preventing inadvertent disclosure of sensitive data. There are a variety of methods and strategies from the field of digital-forensics that can aid this work. This paper discusses the development and application of digital forensics tools to improve the acquisition, management and access functions of archives. It reports on the BitCurator project, which is identifying current and desirable workflows of several archival institutions, as well as developing and testing tools to support the workflows. There are a variety of potential changes within the archival profession that are associated with adopting digital forensics tools and practices.",2012,2,133,140,Variety (cybernetics); World Wide Web; Work (electrical); Workflow; Context (language use); Field (computer science); Computer science; Digital forensics; Metadata,,,,,http://ica2012.ica.org/files/pdf/Full%20papers%20upload/ica12Final00290.pdf https://liverpooluniversitypress.co.uk/journals/article/30509/ https://online.liverpooluniversitypress.co.uk/doi/abs/10.3828/comma.2012.2.14,http://dx.doi.org/10.3828/comma.2012.2.14,,10.3828/comma.2012.2.14,2070769990,,0,016-874-564-437-194; 025-832-466-975-926; 027-105-572-507-191; 033-241-817-699-448; 033-292-300-474-828; 037-438-633-046-535; 037-647-066-964-858; 040-576-453-232-211; 041-066-232-929-572; 043-589-904-668-295; 044-224-934-641-370; 068-359-641-178-799; 069-199-701-151-667; 074-028-601-448-433; 095-362-324-026-43X; 096-085-861-594-137; 098-570-643-235-402; 111-843-229-824-017; 118-994-361-737-474; 121-157-572-649-706; 138-683-475-168-799; 151-783-042-648-550; 152-102-874-393-618; 172-443-563-369-742; 187-101-557-827-991; 198-570-571-263-492,4,false,, 002-464-138-461-933,Actionable threat intelligence for digital forensics readiness,2019-06-12,2019,journal article,Information & Computer Security,20564961,Emerald,United Kingdom,Nikolaos Serketzis; Vasilios Katos; Christos Ilioudis; Dimitrios Baltatzis; George J. Pangalos,"The purpose of this paper is to formulate a novel model for enhancing the effectiveness of existing digital forensic readiness (DFR) schemes by leveraging the capabilities of cyber threat information sharing.,This paper uses a quantitative methodology to identify the most popular cyber threat intelligence (CTI) elements and introduces a lightweight approach to correlate those with potential forensic value, resulting in the quick and accurate triaging and identification of patterns of malicious activities.,While threat intelligence exchange steadily becomes a common practice for the prevention or detection of security incidents, the proposed approach highlights its usefulness for the digital forensics (DF) domain.,The proposed model can help organizations to improve their DFR posture, and thus minimize the time and cost of cybercrime incidents.",27,2,273,291,Cybercrime; Cyber threat intelligence; Threat intelligence; Quantitative methodology; Cyber threats; Computer security; Computer science; Information security; Identification (information); Digital forensics,,,,,https://www.emerald.com/insight/content/doi/10.1108/ICS-09-2018-0110/full/html http://eprints.bournemouth.ac.uk/31484/ https://dblp.uni-trier.de/db/journals/imcs/imcs27.html#SerketzisKIBP19 https://core.ac.uk/download/161865225.pdf,http://dx.doi.org/10.1108/ics-09-2018-0110,,10.1108/ics-09-2018-0110,2911829052,,0,001-228-339-410-349; 002-718-328-889-719; 006-435-365-660-88X; 010-791-676-072-730; 021-486-901-460-202; 026-163-378-046-984; 031-777-212-730-740; 035-565-993-122-262; 037-964-408-560-765; 044-902-881-182-472; 047-221-550-114-462; 049-283-049-875-723; 050-390-492-310-638; 051-995-804-690-245; 086-224-459-672-488; 095-576-328-454-005; 111-533-467-262-562; 120-024-605-234-553; 124-837-341-752-034; 126-281-444-894-256; 134-927-490-231-285; 162-252-967-636-208,9,true,,green 002-625-978-577-247,Towards A Systemic Framework for Digital Forensic Readiness,,2014,journal article,Journal of Computer Information Systems,08874417; 23802057,Informa UK Limited,United Kingdom,Mohamed Abd elgabar Ahmed Elyas; Sean B. Maynard; Atif Ahmad; Andrew Lonie,"Although digital forensics has traditionally been associated with law enforcement, the impact of new regulations, industry standards and cyber-attacks, combined with a heavy reliance on digital assets, has resulted in a more prominent role for digital forensics in organizations. Modern organizations, therefore, need to be forensically ready in order to maximize their potential to respond to forensic events and demonstrate compliance with laws and regulations. However, little research exists on the assessment of organizational digital forensic readiness. This paper describes a comprehensive approach to identifying the factors that contribute to digital forensic readiness and how these factors work together to achieve forensic readiness in an organization. We develop a conceptual framework for organizational forensic readiness and define future work towards the empirical validation and refinement of the framework.",54,3,97,105,Internet privacy; Conceptual framework; Business; Work (electrical); Information system; Order (exchange); Law enforcement; Information security; Computer forensics; Knowledge management; Digital forensics,,,,,https://www.researchgate.net/profile/Sean_Maynard/publication/264898131_Towards_a_Systematic_Framework_for_Digital_Forensic_Readiness/links/5614765a08ae4ce3cc63c76e.pdf https://findanexpert.unimelb.edu.au/scholarlywork/745351-towards-a-systemic-framework-for-digital-forensic-readiness https://www.tandfonline.com/doi/abs/10.1080/08874417.2014.11645708 https://dblp.uni-trier.de/db/journals/jcis/jcis54.html#ElyasMAL14 https://doi.org/10.1080/08874417.2014.11645708,http://dx.doi.org/10.1080/08874417.2014.11645708,,10.1080/08874417.2014.11645708,2319054850,,0,001-755-455-053-419; 006-933-312-344-623; 010-791-676-072-730; 014-494-420-328-995; 019-698-064-288-240; 021-486-901-460-202; 023-883-977-983-511; 024-711-735-736-003; 028-222-770-579-89X; 028-236-232-769-781; 031-234-153-523-379; 032-462-916-579-524; 035-565-993-122-262; 041-227-773-004-745; 049-012-213-939-932; 049-818-433-573-947; 050-390-492-310-638; 056-337-396-279-568; 058-723-704-218-926; 060-150-759-143-593; 060-811-689-677-148; 061-819-130-825-00X; 062-033-977-373-16X; 063-940-570-430-885; 064-484-797-196-528; 068-935-607-908-404; 074-014-335-505-388; 075-142-959-030-889; 088-107-511-907-126; 088-568-925-253-101; 089-048-294-489-077; 092-058-232-746-872; 092-207-054-556-369; 097-675-162-158-578; 106-564-185-785-286; 106-885-306-836-498; 115-036-799-197-654; 123-816-080-482-777; 124-837-341-752-034; 125-927-904-592-587; 126-101-628-029-477; 128-353-952-787-564; 133-056-924-318-824; 135-750-719-657-854; 136-947-053-479-806; 140-821-103-436-654; 142-870-885-548-418; 144-924-692-716-271; 145-505-603-683-704; 149-309-671-711-890; 151-896-526-281-282; 154-191-465-535-558; 163-661-153-365-182; 190-836-776-013-395; 199-745-676-923-766,36,false,, 002-634-071-189-646,A case study on anonymised sharing platforms and digital traces left by their usage.,2020-09-09,2020,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Graeme Horsman,"Abstract Non-local forms of file storage and transfer provide investigatory concerns. Whilst mainstream cloud providers offer a well-established challenge to those involved in criminal enquiries, there are also a host of services offering non-account based ‘anonymous’ online temporary file storage and transfer. From the context of a digital forensic investigation, the practitioner examining a suspect device must detect when such services have been utilised by a user, as offending files may not be resident on local storage media. In addition, identifying the use of a service may also expose networks of illegal file distribution, supporting wider investigations into criminal activity. This work examines 16 anonymous file transfer services and identifies and interprets the digital traces left behind on a device following their use to support law enforcement investigations.",61,1,97,106,Internet privacy; File transfer; Suspect; Context (language use); Law enforcement; Service (business); Temporary file; Computer science; Cloud computing; Digital forensics,Browser forensics; Cloud forensics; Digital forensics; Investigation,Humans; Law Enforcement,,,https://research.tees.ac.uk/en/publications/a-case-study-on-anonymised-sharing-platforms-and-digital-traces-l https://www.ncbi.nlm.nih.gov/pubmed/33357832 https://www.sciencedirect.com/science/article/pii/S1355030620302793,http://dx.doi.org/10.1016/j.scijus.2020.09.002,33357832,10.1016/j.scijus.2020.09.002,3084242698,,0,002-449-146-256-491; 006-933-430-647-14X; 017-815-064-018-299; 019-831-293-743-518; 022-264-235-998-870; 030-715-959-417-277; 058-631-300-195-90X; 087-217-042-703-040; 091-619-263-117-914; 121-704-965-852-836; 191-675-641-864-91X,0,false,, 002-828-312-621-651,Defining ‘service levels’ for digital forensic science organisations,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Graeme Horsman,,38,,301178,,Criminal justice; Software deployment; Engineering management; Work (electrical); Service level; Law enforcement; Field (computer science); Computer science; Decision model; Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S266628172100086X https://doi.org/10.1016/j.fsidi.2021.301178,http://dx.doi.org/10.1016/j.fsidi.2021.301178,,10.1016/j.fsidi.2021.301178,3170563327,,0,000-360-120-513-679; 007-868-297-443-532; 021-563-550-669-43X; 029-164-830-214-360; 047-630-600-014-492; 047-859-979-695-194; 050-513-243-638-138; 066-235-037-082-291; 075-089-767-933-223; 076-698-947-460-953; 080-196-042-005-758; 102-243-142-344-71X; 111-488-239-742-003; 118-214-115-485-064; 125-939-677-745-616; 142-527-962-979-521; 190-343-104-111-19X,0,false,, 002-887-236-141-671,Recovering Evidentiary E-mail for Non-Repudiation Forensics,2019-10-26,2019,journal article,International Journal of Innovative Technology and Exploring Engineering,22783075,Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP,,,"Computer Forensic, the upcoming branch of forensic science where acquiring, preserving, retrieving and presenting content processed electronically and stored digitally, is used for legal evidence in computer related crimes or any other unethical practice involving manipulation of digital content. Such digital content can take many forms which are manifested by different file formats and digital artifacts”. This paper concentrates on acquisition of deleted e-mail from mailbox of web servers satisfying two tier, three tier and n-tier technology. A detailed survey of several possibilities are included for non-repudiation forensic. A case study of a particular file type using suitable forensic tool is cited as a proof of concept towards this claimed inference to provide digital evidence in case of non-repudiation by sender and/or by receiver. This is simply conducted by using Encase a proprietary Digital forensic tools. The whole process is captured in step by step fashion to have a better understanding of the mechanism used. Recovery of files/emails have certain kinds of legal hurdles, the paper have addressed them as well. This paper contributes to the extend the recovered email can used as a ready digital evidence in any court of law.",8,11S2,551,557,Digital evidence; Computer science; Communication source; Computer forensics; Digital forensics; Digital content; Computer security; Process (computing); World Wide Web,,,,,,http://dx.doi.org/10.35940/ijitee.k1085.09811s219,,10.35940/ijitee.k1085.09811s219,,,0,,0,true,,gold 002-926-024-983-956,Tools For Cyber Forensics,,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Peter Oppong Baafi,"Digital Forensics & Cyber Security Graduate Programme Department Of Information Systems & Innovations Ghana Institute of Management & Public Administration Greenhill, Accra, Ghana E-mails: peeuncle3@gmail.com Phone: +233242776968 ABSTRACT Digital forensics, or Cyber security, has become a vital part of almost every research, and digital forensics tools' users are becoming more diverse in their backgrounds and interests. As a result, usability is an important section of these tools. This paper investigates the usability aspect of forensics tools. The study results highlight several usability issues that need to be considered when designing and implementing digital forensics tools. Cyber-attacks are fast-moving and surging in number and severity. When the attacks occur, the attacked enterprise responds with predetermined actions. Applying digital forensics helps in recovering and investigating material on digital media and networks is one of these actions. Cyber Forensic Investigation includes the Capture and Analysis of digital data either to prove or disprove whether the internet-related theft has been committed or not. Earlier, Computers were used only to store large volumes of data and perform many operations on them, but nowadays, it has expanded and occupied a prior role in Crime Investigation. To solve these cyber-related problems, the selection and usage of Forensic tools are essential. The developers have created many cyber forensic tools for better research and quick investigation. Cop departments and investigation agencies select the tools based on various factors, including budget and available experts on the team. This paper describes the different types of existing computer forensic tools and their usage. The article gives detailed information on all related works by other scholars in the area of this paper. Keywords: Digital Forensics; Forensics, GUI, User Interface, Digital Forensics, and its framework, Cyber forensics tools. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Peter Oppong Baafi (2022): Toosl For Cyber Forensics Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 285-290 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P46",1,1,285,290,Digital forensics; Computer forensics; Usability; Network forensics; Computer science; Digital evidence; Computer security; Cyber crime; The Internet; Phone; World Wide Web; Data science; Linguistics; Philosophy; Human–computer interaction,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p46,,10.22624/aims/crp-bk3-p46,,,0,,0,true,,bronze 002-953-265-272-980,Investigating Cyberbullying on WhatsApp Using Digital Forensics Research Workshop,2020-08-20,2020,journal article,Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi),25800760,Ikatan Ahli Informatika Indonesia (IAII),," Riadi; null Sunardi; Panggah Widiandana","Cyberbullying in group conversations in one of the instant messaging applications is one of the conflicts that occur due to social media, specifically WhatsApp. This study conducted digital forensics to find evidence of cyberbullying by obtaining work in the Digital Forensic Research Workshop (DFRWS). The evidence was investigated using the MOBILedit Forensic Express tool as an application for evidence submission and the Cosine Similarity method to approve the purchase of cyberbullying cases. This research has been able to conduct procurement to reveal digital evidence on the agreement in the Group's features using text using MOBILedit. Identification using the Cosine method. Similarities have supported actions that lead to cyberbullying with different levels Improved Sqrt-Cosine (ISC) value, the largest 0.05 and the lowest 0.02 based on conversations against requests.",4,4,730,735,Internet privacy; Procurement; Cosine similarity; Digital evidence; Instant messaging; Computer science; Social media; Identification (information); Digital forensics,,,,,http://jurnal.iaii.or.id/index.php/RESTI/article/view/2161 https://www.jurnal.iaii.or.id/index.php/RESTI/article/download/2161/285,http://dx.doi.org/10.29207/resti.v4i4.2161,,10.29207/resti.v4i4.2161,3057937400,,0,,0,true,cc-by,gold 003-206-474-001-578,Цифровизация справочно-информационных фондов криминалистического и судебно-экспертного назначения как часть учения о цифровизации криминалистической регистрации,2020-07-31,2020,journal article,Courier of Kutafin Moscow State Law University (MSAL)),23115998,Kutafin Moscow State Law University,,Е. Р. Россинская,"The article discusses the modern problems of digitalization criminalistic registration system. The author notes that the use of information and computer technologies in order to systematize and store relevant and potential criminalistic information, which together constitute a forensic registration system that began in the 80s of the twentieth century, is actively ongoing. Along with databases and AIPS, forensic records and reference information funds (CIF) for many objects are still in the form objects in kind. From the point of view to the theory of information and computer support of criminalistic activity and the doctrine of criminalistic registration, it is formulated that the subject of the doctrine of digitalization of the criminalistic registration system are the laws of formalization, structuring, unifi cation and algorithmizing the actual and potential forensic information, on the basis of which technologies are being developed for transferring forms of storing this information to digital databases criminalistic and forensic assignment. The objects of this doctrine are criminalistic records and reference and information funds (CIF) in the process of their digitalization. The advantages of CIFs in the form of digital databases are demonstrated. Based on the doctrine of the digitalization of the criminalistic registration system, the author analyzes the possibility of digitalization of legitimate natural collections. It is proved that digital bases for ensuring the evidence-based signifi cance of the results of their use should have regulatory fi xation in technical regulations, as well as expert research methods. The connection between the digitalization of criminalistic and forensic expert activity, where the connecting links are digital traces and CIF, is indicated.",,6,23,32,World Wide Web; Point (typography); Doctrine; Subject (documents); Computer support; Registration system; Computer science; Process (engineering),,,,,https://cyberleninka.ru/article/n/tsifrovizatsiya-spravochno-informatsionnyh-fondov-kriminalisticheskogo-i-sudebno-ekspertnogo-naznacheniya-kak-chast-ucheniya-o https://vestnik.msal.ru/jour/article/view/1129 https://cyberleninka.ru/article/n/tsifrovizatsiya-spravochno-informatsionnyh-fondov-kriminalisticheskogo-i-sudebno-ekspertnogo-naznacheniya-kak-chast-ucheniya-o/pdf https://vestnik.msal.ru/jour/article/download/1129/1150,http://dx.doi.org/10.17803/2311-5998.2020.70.6.023-032,,10.17803/2311-5998.2020.70.6.023-032,3046776524,,0,131-166-072-114-710,0,true,cc-by,hybrid 003-232-363-219-004,Interpol review of digital evidence 2016 - 2019.,2020-03-19,2020,journal article,Forensic science international. Synergy,2589871x,Elsevier BV,Netherlands,Paul Reedy,Abstract This review paper covers the forensic-relevant literature in digital evidence from 2016 to 2019 as a part of the 19th Interpol International Forensic Science Managers Symposium. The review papers are also available at the Interpol website at: https://www.interpol.int/content/download/14458/file/Interpol Review Papers 2019.pdf,2,,489,520,Library science; Download; Digital evidence; Computer science; Network forensics; Digital forensics,Digital evidence; Digital forensics; Network forensics,,,,http://www.sciencedirect.com/science/article/pii/S2589871X20300152 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7770434 https://www.sciencedirect.com/science/article/pii/S2589871X20300152,http://dx.doi.org/10.1016/j.fsisyn.2020.01.015,33385144,10.1016/j.fsisyn.2020.01.015,3011326668,PMC7770434,0,001-330-619-276-915; 003-385-688-915-283; 004-200-813-216-207; 006-138-917-123-177; 006-352-188-170-383; 008-033-307-675-865; 008-807-857-586-716; 009-512-003-529-193; 010-084-169-561-57X; 010-963-610-208-920; 015-153-772-071-055; 015-550-190-274-871; 015-654-094-120-991; 016-357-729-609-877; 016-545-450-234-850; 018-552-581-098-658; 019-500-518-223-980; 022-564-463-934-451; 023-744-332-350-071; 024-304-270-764-670; 026-073-425-144-247; 026-934-168-279-23X; 027-725-711-087-703; 030-178-593-043-926; 030-355-169-268-637; 030-751-060-000-287; 031-973-009-227-195; 032-664-290-593-804; 033-394-274-571-989; 035-031-257-128-045; 036-112-898-081-145; 036-962-718-355-681; 039-158-280-114-980; 041-249-902-359-989; 043-069-596-469-868; 045-701-895-839-020; 046-857-308-211-173; 047-386-524-667-691; 047-925-302-360-870; 049-337-278-368-275; 050-694-164-774-292; 052-152-063-024-042; 054-471-285-379-894; 055-824-759-528-044; 057-720-182-045-334; 061-269-967-405-492; 063-246-991-940-023; 063-572-994-319-332; 064-185-555-697-856; 064-549-392-650-90X; 065-026-135-610-134; 066-235-037-082-291; 067-307-335-041-486; 075-950-021-558-098; 080-282-279-211-788; 081-140-064-081-587; 087-326-101-466-886; 088-229-295-768-496; 088-553-642-323-93X; 088-688-832-386-331; 089-115-596-397-298; 089-695-854-791-989; 097-496-807-682-876; 097-939-114-561-254; 099-712-023-378-848; 100-947-231-339-501; 106-229-562-693-558; 112-955-497-358-051; 115-380-228-622-98X; 123-393-129-372-391; 124-202-713-284-341; 127-291-182-090-033; 131-476-361-473-174; 131-874-028-513-738; 137-320-816-794-079; 141-906-892-787-690; 142-790-196-752-819; 143-347-787-372-092; 144-184-475-249-995; 148-617-284-942-187; 155-758-692-373-705; 162-814-268-960-713; 163-853-761-819-084; 167-366-167-352-677; 181-684-050-889-439; 182-670-398-460-931; 187-108-280-798-543; 189-205-808-191-262; 194-351-971-349-302; 199-010-941-903-268,18,true,"CC BY, CC BY-NC-ND",gold 003-307-307-119-790,Data Handling of Digital Forensics Cloud Computing,,2013,journal article,Advanced Materials Research,16628985,"Trans Tech Publications, Ltd.",,Gang Zeng,"With development of network and digital devices, traditional digital forensics tools show their drawbacks, and investigators need new forensics tools to deal with enormous digital evidences. Therefore, this paper introduces digital forensics and cloud computing, then lists the advantages of private forensics cloud computing, proposes a model of Data Handling of Digital Forensics Cloud Computing.",756-759,,1739,1743,Group method of data handling; Forensic science; Digital forensics cloud computing; Computer security; Computer science; Network forensics; Cloud computing; Digital forensics,,,,,https://www.scientific.net/AMR.756-759.1739,http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1739,,10.4028/www.scientific.net/amr.756-759.1739,2111038567,,0,027-238-398-454-889; 085-343-554-667-033; 134-927-490-231-285; 139-049-368-614-27X; 184-786-350-232-582; 184-984-036-746-363,0,false,, 003-563-396-724-10X,Fintech forensics: Criminal investigation and digital evidence in financial technologies,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Bruce J. Nikkel,,33,,200908,,Finance; Criminal investigation; Digital transformation; Business; Payment; Financial transaction; Extortion; Money laundering; Digital evidence; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/di/di33.html#Nikkel20 https://www.sciencedirect.com/science/article/abs/pii/S2666281720300287 https://doi.org/10.1016/j.fsidi.2020.200908,http://dx.doi.org/10.1016/j.fsidi.2020.200908,,10.1016/j.fsidi.2020.200908,3012107526,,0,,14,false,, 003-585-400-908-778,Digital image forensic approach based on the second-order statistical analysis of CFA artifacts,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Gurinder Singh; Kulbir Singh,,32,,200899,,Image (mathematics); Support vector machine; Artificial intelligence; Interpolation; Pattern recognition; Bilinear interpolation; Computer science; Digital image; Feature (computer vision); Detector; Process (computing),,,,Ministry of Electronics and Information Technology,https://www.sciencedirect.com/science/article/pii/S1742287619302397,http://dx.doi.org/10.1016/j.fsidi.2019.200899,,10.1016/j.fsidi.2019.200899,3003346669,,0,005-021-673-285-683; 014-079-494-188-077; 016-167-894-033-755; 017-522-442-322-636; 023-624-827-239-301; 023-928-444-110-407; 026-710-170-953-550; 028-484-441-810-763; 029-976-556-060-314; 033-932-291-455-221; 036-001-472-867-413; 037-862-945-393-555; 041-838-544-052-666; 043-212-445-850-396; 053-217-455-972-392; 067-236-654-156-859; 067-303-718-151-959; 068-082-205-208-585; 083-274-787-587-30X; 085-547-032-022-62X; 093-117-184-682-360; 098-768-111-046-209; 100-880-837-233-791; 104-279-390-845-094; 108-896-114-392-841; 125-162-036-005-386; 135-082-770-753-517; 159-132-926-596-284; 172-112-498-122-981; 180-552-666-228-97X,7,false,, 003-767-240-799-740,Editorial Board,,2015,journal article,Digital Investigation,17422876; 1873202x,Elsevier BV,Netherlands,,,12,,i,i,Computer science,,,,,https://core.ac.uk/download/pdf/82745273.pdf,http://dx.doi.org/10.1016/s1742-2876(15)00023-7,,10.1016/s1742-2876(15)00023-7,,,0,,0,true,cc-by-nc-nd,hybrid 004-095-036-114-529,Digital forensic standards and digital evidence in Polish criminal proceedings. An updated definition of digital evidence in forensic science,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Piotr Lewulis,,13,4,403,403,Digital forensics; Digital evidence; Forensic science; Computer science; Computer forensics; Data science; Criminal investigation; Cybercrime; Computer security; Criminology,,,,,,http://dx.doi.org/10.1504/ijesdf.2021.116024,,10.1504/ijesdf.2021.116024,,,0,,0,false,, 004-200-813-216-207,Digital forensic evidence-Flaws in the criminal justice system.,2018-05-26,2018,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Jan Collie,,289,,154,155,Criminal justice; Criminal law; MEDLINE; Computer science; Criminology; Digital forensics,,Civil Rights/legislation & jurisprudence; Computers/legislation & jurisprudence; Criminal Law; Forensic Sciences/legislation & jurisprudence; Freedom; Humans,,,https://europepmc.org/abstract/MED/29864602 https://www.sciencedirect.com/science/article/pii/S0379073818302378 http://oro.open.ac.uk/70043/ https://pubmed.ncbi.nlm.nih.gov/29864602/ https://www.ncbi.nlm.nih.gov/pubmed/29864602,http://dx.doi.org/10.1016/j.forsciint.2018.05.014,29864602,10.1016/j.forsciint.2018.05.014,2804231830,,0,,11,false,, 004-260-804-798-107,On the Development of Digital Forensics Curriculum,2012-09-30,2012,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Manghui Tu; Dianxiang Xu; Cristian Balan; Kyle Cronin,"Computer Crime and computer related incidents continue their prevalence and frequency and result in loss of billions of dollars. To fight against those crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce to efficiently and effectively investigate crimes and frauds. However, there is no standard to guide the design of digital forensics curriculum for an academic program. In this research, we investigate the research works on digital forensics curriculum design and existing education programs.  Both digital forensics educators and practitioners were surveyed and the results are analyzed to determine what industry and law enforcement need. Based on the survey results and what the industry certificate programs cover, we identified topics that are desired to be covered in digital forensics courses. Finally, we propose six digital forensics courses and their topics that can be offered in both undergraduate and graduate digital forensics programs.",7,3,13,32,Workforce; Cover (telecommunications); Law enforcement; Academic program; Computer security; Computer science; Curriculum; Engineering ethics; Computer forensics; Digital forensics; Certificate,,,,,https://doaj.org/article/631a85689a0340a59f03ebdaa5ead70b https://doi.org/10.15394/jdfsl.2012.1126,https://doaj.org/article/631a85689a0340a59f03ebdaa5ead70b,,,1521082165,,0,005-733-361-126-371; 007-790-059-029-953; 012-314-515-683-048; 012-806-731-619-471; 028-161-558-897-878; 036-733-117-655-399; 054-389-084-057-423; 057-991-197-390-530; 066-701-921-148-891; 068-142-711-392-559; 125-416-939-855-653; 130-239-147-323-022; 167-592-705-831-583,5,true,cc-by-nc,gold 004-270-164-263-436,Prelim iii - Contents List,,2022,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,,,42,,301435,,,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00116-0,,10.1016/s2666-2817(22)00116-0,,,0,,0,false,, 004-376-985-680-005,Towards a capability maturity model for digital forensic readiness,2019-01-01,2019,journal article,Wireless Networks,10220038; 15728196,Springer Science and Business Media LLC,Netherlands,Ludwig Englbrecht; Stefan Meier; Günther Pernul,"Increasing IT-security breaches and the extensively growing loss due to fraud-related incidents cause the need for being prepared for a digital investigation. A specific capability maturity model can assist organizations to determine their current state accordingly to implement digital forensic readiness measures and get assistance to reach a desired level in having related capabilities implemented. This paper examines how such a model can assist in integrating digital forensic readiness related measures to reach an appropriate maturity level. Through facilitating core elements of the IT-governance framework COBIT 5 and the core characteristics of implementing digital forensic readiness, a proposal for a specific capability maturity model has been conducted. In five maturity levels (initial, managed, defined, quantitatively managed, and optimized), the different stages of implementing digital forensic readiness are represented. It can be shown that with the IT-governance aligned model, the implementation of digital forensic readiness can be assisted.",26,7,4895,4907,Process management; COBIT; Maturity (finance); Computer science; State (computer science); Digital forensics; Capability Maturity Model,,,,Bundesministerium für Bildung und Forschung,https://link.springer.com/article/10.1007/s11276-018-01920-5 https://epub.uni-regensburg.de/40028/ https://dblp.uni-trier.de/db/journals/winet/winet26.html#EnglbrechtMP20 https://doi.org/10.1007/s11276-018-01920-5 https://link.springer.com/content/pdf/10.1007/s11276-018-01920-5.pdf,http://dx.doi.org/10.1007/s11276-018-01920-5,,10.1007/s11276-018-01920-5,2907825110,,0,002-056-390-935-528; 006-435-365-660-88X; 008-751-783-762-210; 014-494-420-328-995; 019-698-064-288-240; 021-486-901-460-202; 033-394-274-571-989; 034-109-295-952-909; 035-565-993-122-262; 046-143-775-958-052; 049-225-570-879-682; 049-404-833-736-24X; 050-390-492-310-638; 050-612-532-454-179; 058-439-132-526-924; 060-150-759-143-593; 063-008-195-718-524; 073-524-789-009-542; 075-142-959-030-889; 077-676-218-804-217; 077-702-229-787-594; 097-511-514-959-467; 097-675-162-158-578; 119-215-264-177-058; 124-712-549-942-567; 137-468-868-771-961; 145-743-906-992-348; 199-566-397-751-128; 199-745-676-923-766,6,false,, 004-596-788-564-958,Bibliography of digital image anti-forensics and anti-anti-forensics techniques,,2019,journal article,IET Image Processing,17519667,Institution of Engineering and Technology (IET),,Muhammad Ali Qureshi; El-Sayed M. El-Alfy,"With the massive increase of online content, widespread of social media, the popularity of smartphones, and rise of security breaches, image forensics has attracted a lot of attention in the past two decades alongside the advancements in digital imaging and processing software. The goal is to be able to verify authenticity, ownership, and copyright of an image and detect changes to the original image. However, more sophisticated image manipulation software tools can use subtle anti-forensics techniques (AFTs) to complicate and hinder detection. This leads security professionals and digital investigators to develop more robust forensics tools and counter solutions to defeat adversarial anti-forensics and win the race. This survey study presents a comprehensive systematic overview of various anti-forensics and anti-AFTs that are proposed in the literature for digital image forensics. These techniques are thoroughly analysed based on various important characteristics and grouped into broad categories. This study also presents a bibliographic analysis of the-state-of-the-art publications in various venues. It assists junior researchers in multimedia security and related fields to understand the significance of existing techniques, research trends, and future directions.",13,11,1811,1823,Digital imaging; Processing; Data science; Software; Popularity; Digital image forensics; Adversarial system; Computer science; Digital image; Social media,,,,,https://doi.org/10.1049/iet-ipr.2018.6587 https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/iet-ipr.2018.6587 https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8853452 https://dblp.uni-trier.de/db/journals/iet-ipr/iet-ipr13.html#QureshiE19 https://digital-library.theiet.org/content/journals/10.1049/iet-ipr.2018.6587,http://dx.doi.org/10.1049/iet-ipr.2018.6587,,10.1049/iet-ipr.2018.6587,2952425476,,0,000-171-920-580-13X; 000-980-904-065-103; 001-413-792-295-769; 002-075-042-296-612; 002-474-117-498-744; 003-038-927-249-884; 004-274-081-845-287; 004-530-492-547-92X; 004-998-019-792-800; 006-529-820-790-334; 007-757-518-990-387; 009-559-906-243-506; 010-255-388-617-32X; 011-974-043-936-963; 012-170-721-374-588; 012-412-270-035-761; 012-499-403-609-197; 016-154-498-393-836; 017-859-659-504-32X; 018-037-484-424-937; 019-823-165-125-520; 020-140-834-798-099; 020-776-691-423-006; 022-563-511-920-907; 024-410-902-307-144; 024-793-013-451-77X; 025-998-844-156-566; 026-469-167-470-509; 026-925-133-625-660; 028-066-199-598-984; 028-364-359-341-316; 029-095-739-172-239; 031-261-569-178-402; 031-876-583-652-183; 032-334-689-248-680; 033-099-957-036-676; 036-001-472-867-413; 036-730-832-714-18X; 039-742-416-961-250; 040-425-146-348-064; 040-639-509-253-00X; 041-621-854-815-190; 043-532-810-528-489; 045-950-922-443-150; 047-526-773-255-825; 050-238-036-303-315; 053-446-545-460-162; 054-114-159-462-931; 054-540-072-247-78X; 056-779-764-574-906; 058-535-586-038-159; 059-598-308-642-385; 061-618-920-102-227; 062-261-237-211-047; 064-665-774-871-511; 065-037-301-489-012; 066-777-702-062-597; 067-303-718-151-959; 068-082-205-208-585; 069-728-063-769-26X; 069-738-413-092-965; 071-624-140-392-589; 072-357-294-908-085; 072-936-991-584-107; 074-602-449-941-680; 076-346-829-732-533; 076-480-367-245-489; 076-527-439-347-165; 079-895-886-182-831; 080-701-775-077-358; 083-274-787-587-30X; 083-495-367-906-30X; 083-985-810-252-542; 086-484-139-471-186; 087-497-444-867-987; 090-794-300-074-346; 092-928-929-272-765; 094-465-965-096-863; 096-289-706-423-826; 101-218-430-388-564; 105-052-794-449-055; 107-542-889-928-942; 108-836-912-357-560; 108-896-114-392-841; 109-779-652-787-73X; 110-050-634-028-069; 112-650-032-069-164; 113-231-146-599-024; 113-434-204-109-688; 114-599-315-973-390; 116-010-663-366-747; 116-112-700-987-604; 116-764-154-060-61X; 120-453-234-664-794; 120-484-561-241-15X; 122-164-403-164-304; 124-325-379-040-738; 125-327-166-237-786; 125-328-926-232-377; 125-522-019-183-785; 139-335-859-140-58X; 139-901-566-639-372; 140-241-199-301-269; 143-626-896-585-910; 148-639-592-452-240; 151-075-769-432-235; 152-785-842-665-362; 152-920-968-803-037; 155-074-178-700-550; 155-355-077-713-919; 159-132-926-596-284; 161-459-893-930-499; 162-699-965-110-190; 168-172-053-240-694; 170-828-225-842-861,6,true,"CC BY, CC BY-ND, CC BY-NC, CC BY-NC-ND",gold 004-655-797-294-715,Computationally Efficient Digital Image Forensic Method for Image Authentication,,2016,journal article,Procedia Computer Science,18770509,Elsevier BV,,Anil Dada Warbhe; Rajiv V. Dharaskar; Vilas M. Thakare,"Abstract The issue of the authenticity and integrity of digital images is getting critical. Nowadays it became easy to create image forgeries. Digital image forensics plays a vital role in proving authenticity and integrity of digital images. There are various types of image forgeries possible, and Copy-Paste is one of it. In this type of forgery, a region of an image is copied and afterward pasted to another part of the same picture. In this paper, we propose an effective and computationally efficient method for the detection of Copy-Paste forgery. The proposed forgery detection is based on a customized Normalized Cross Correlation (NCC). The experimental results show that the proposed approach can be effectively used to detect forgeries accurately and is robust to affine transform to a certain extent.",78,,464,470,Image (mathematics); Feature detection (computer vision); Artificial intelligence; Cross-correlation; Authentication; Digital image forensics; Computer vision; Computer science; Digital image; Affine transformation,,,,,https://www.sciencedirect.com/science/article/pii/S1877050916000910 https://www.sciencedirect.com/science/article/abs/pii/S1877050916000910 https://core.ac.uk/display/82404167 https://core.ac.uk/download/pdf/82404167.pdf,http://dx.doi.org/10.1016/j.procs.2016.02.089,,10.1016/j.procs.2016.02.089,2313375625,,0,018-714-912-826-875; 019-461-243-164-715; 024-225-405-455-512; 029-322-330-771-081; 033-295-070-837-251; 034-121-155-020-714; 037-103-332-118-06X; 038-937-237-659-201; 039-055-556-012-538; 040-499-338-725-508; 045-327-928-509-160; 062-007-949-183-546; 065-037-301-489-012; 065-369-773-065-673; 071-292-048-830-963; 075-228-376-439-786; 076-346-829-732-533; 076-704-896-134-67X; 080-794-266-877-942; 086-832-985-542-578; 089-363-854-574-422; 090-691-753-970-360; 092-092-246-517-236; 097-461-557-468-286; 131-740-474-802-798,7,true,,gold 004-670-548-978-249,Systematic Literature Review on Data Carving in Digital Forensic,,2013,journal article,Procedia Technology,22120173,Elsevier BV,,Nadeem Alherbawi; Zarina Shukur; Rossilawati Sulaiman,"Abstract Data carving is a very important topic in digital investigation and computer forensic. Researches are needed to focus on improving data carving techniques to enable digital investigators to retrieve important data and evidences from damaged or corrupted data resources. This paper is the result of a systematic literature review which answer three main questions in data carving filed. The Results fall into four main directions. First it shows the need of realistic data sets for tools testing. Secondly, it points to the need of object validation under fragmented data storage. Thirdly, investigating content based validation and its benefits in digital investigation field. Finally, it points to a new direction for using semantic validation to reduce false positive rates.",11,,86,92,Data mining; Systematic review; Computer data storage; Information retrieval; Carving; Data resources; Field (computer science); Focus (computing); Computer science; Object (computer science); Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S2212017313003198 https://www.sciencedirect.com/science/article/abs/pii/S2212017313003198 https://core.ac.uk/display/82179735 https://core.ac.uk/download/pdf/82179735.pdf,http://dx.doi.org/10.1016/j.protcy.2013.12.165,,10.1016/j.protcy.2013.12.165,2044372942,,0,015-537-933-151-383; 029-717-924-939-132; 043-093-846-816-675; 052-075-863-186-238; 072-072-328-028-440; 074-145-325-661-168; 077-066-116-235-027; 082-216-018-661-366; 094-933-978-324-364; 102-953-068-000-033; 107-841-657-896-742; 113-473-792-362-349; 126-916-335-288-384; 134-927-490-231-285; 152-771-716-159-330; 162-485-003-594-995,15,true,,gold 004-778-686-619-011,"Forensically ready digital identity management systems, issues of digital identity life cycle and context of usage",,2017,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Mehrdad Tajbakhsh; Elaheh Homayounvala; Sajjad Shokouhyar,"Collecting necessary digital and network forensics to prove the identity of an individual who is responsible for a crime, or suspected of a malicious attack, or has used a device during an incident, with minimum doubt to the court or other legitimate organisations based on the digital forensic investigation model is one of the most important legal and security issues of digital identity management systems DIMSs. Without a good understanding and identification of the most important parameters of DIMS based on the digital forensic investigation model, it is not possible to do digital forensic investigation and provide required evidence. Therefore, the main goal of this paper is to identify and prioritise DIMS parameters by considering a user's digital identity lifecycle, the contexts of usage challenges, and constraints that should be considered in a digital forensic readiness model.",9,1,62,83,Identity (object-oriented programming); Digital identity; Context (language use); Computer security; Computer science; Network forensics; Identity management; Computer forensics; Identification (information); Digital forensics,,,,,https://research.gold.ac.uk/id/eprint/27057/ https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2017.081781 https://dl.acm.org/doi/10.1504/IJESDF.2017.081781 https://core.ac.uk/download/228123558.pdf,http://dx.doi.org/10.1504/ijesdf.2017.081781,,10.1504/ijesdf.2017.081781,2572537845,,0,003-097-641-696-240; 008-297-927-077-443; 021-376-433-883-484; 021-850-998-857-676; 024-665-355-874-020; 026-774-296-742-022; 036-150-437-127-822; 037-789-654-228-885; 060-877-320-347-466; 078-422-506-893-847; 078-937-165-241-316; 109-715-338-545-334; 119-377-297-976-683; 121-657-732-376-374; 129-932-503-927-253; 132-355-634-397-986; 133-157-737-906-420; 140-821-103-436-654; 144-688-901-316-003; 144-924-692-716-271; 158-400-418-434-934; 162-161-362-621-763; 176-817-855-610-146; 194-965-580-194-055,1,true,,green 004-782-456-024-313,Impact of digital transformation in teaching and learning (TL) process of forensic medicine & other medical subjects due to COVID 19 lockdown: Medical student’s perspective,2021-07-15,2021,journal article,Indian Journal of Forensic and Community Medicine,23946768; 23946776,IP Innovative Publication Pvt Ltd,,Mohd Asrarul Haque; Aneequa Khayal; Javed Khan,"COVID-19 may have changed the 'physical classroom', but learning doesn’t stop. In global perspective, digitalization played a major role in medical education of forensic medicine and other subjects when COVID-19 lockdown forced. Physical classroom were not possible due to safety norms so as to maintain social distancing. Post lockdown continuing digital transformation got more momentum. Challenges and opportunities started coming in front for students and faculties. This study was done to analyze impact of transition of teaching methodology to students in medical institutions.; ; ; Keywords: Online education, Digitalization, COVID 19, Pandemic, Teaching & learning, Forensic medicine.",8,2,104,108,Digital transformation; Forensic science; Psychology; Social distance; Perspective (graphical); Forensic nursing; Forensic psychiatry; Process (engineering); Medical education; Teaching method,,,,,https://www.ijfcm.org/article-details/14252 https://www.ijfcm.org/journal-article-file/14252,http://dx.doi.org/10.18231/j.ijfcm.2021.021,,10.18231/j.ijfcm.2021.021,3182116013,,0,004-014-527-451-258; 005-641-047-839-340; 011-450-051-982-962; 018-209-302-057-610; 035-991-030-021-460; 037-907-214-913-541; 051-089-139-969-443; 054-343-350-778-175; 054-966-075-510-879; 059-606-978-366-006; 079-978-835-996-337; 080-013-502-889-87X; 097-290-406-596-391; 141-856-322-158-726; 188-607-527-971-68X,0,true,cc-by-nc-sa,gold 004-806-187-092-505,"Likelihood ratios, Health Apps, Artificial Intelligence and Deepfakes",,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,41,,301394,301394,Artificial intelligence; Psychology; Computer science,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301394,,10.1016/j.fsidi.2022.301394,,,0,,0,false,, 004-935-188-787-369,TEACHING DIGITAL FORENSICS AND CYBER INVESTIGATIONS ONLINE : OUR EXPERIENCES,2014-09-18,2014,journal article,"European Scientific Journal, ESJ",18577431,,,Elizabeth K. Hawthorne; Rose Shumba,"This paper describes our experiences of teaching cyber investigations and digital forensics online. Additionally, it discusses open source toolkits and remote virtual labs appropriate for teaching cyber investigations and digital forensics effectively in a distance education environment. Both faculty and student experiences as well as lessons learnt from teaching these courses online at the University of Maryland University College (UMUC) are covered.",10,10,,,Virtual lab; Open source; Computer science; Multimedia; Distance education; Digital forensics,,,,,https://eujournal.org/index.php/esj/article/download/4150/3986 https://eujournal.org/index.php/esj/article/view/4150 https://eujournal.org/index.php/esj/article/viewFile/4150/3986 https://paperity.org/p/58986318/teaching-digital-forensics-and-cyber-investigations-online-our-experiences,https://eujournal.org/index.php/esj/article/view/4150,,,1646935174,,0,056-590-277-527-716; 081-321-738-203-441; 125-437-898-902-566,5,false,, 004-974-971-514-268,Detection and extraction of digital footprints from the iDrive cloud storage using web browser forensics analysis,2022-04-01,2022,journal article,Indonesian Journal of Electrical Engineering and Computer Science,25024760; 25024752,Institute of Advanced Engineering and Science,,Adesoji Adesina; Ayodele Adebiyi; Charles Ayo,"STorage as a <span>service (STaaS) allows its subscribers the ability to access their stored data with the use of internet enabled digital devices at anywhere, anyplace and anytime. The easy accessibility of cloud storage with digital devices is one of the major benefits of cloud computing but this benefit can also be exploited by cybercriminals to perform various forms of malicious usages. During forensic investigation, forensic examiners are expected to provided evidence in relation to the malicious usages but the physical inaccessibility to the digital artifacts on the cloud servers, the difficulty in retrieving evidential artifacts from various cloud storage services and the difficulty in obtaining forensic logs from the concerned cloud service providers among other factors make it difficult to perform forensic investigations. This paper provided step by step experimental guidelines to extract digital artifacts from Google Chrome and Internet Explorer from Windows 10 personal computer using iDrive cloud storage as a case study. The study used Nirsoft forensic tool to locate the relevant forensic artifacts and an integrated conceptual digital forensic framework was adopted to carry out the investigation. This study increases the knowledge of client forensics using web browser analysis during cloud storage forensic investigation.</span>",26,1,550,550,Cloud computing; Digital forensics; Computer science; The Internet; Cloud storage; Network forensics; World Wide Web; Computer security; Operating system,,,,,,http://dx.doi.org/10.11591/ijeecs.v26.i1.pp550-559,,10.11591/ijeecs.v26.i1.pp550-559,,,0,,0,true,,gold 005-152-967-244-975,Forensic Analysis in Cloud Storage with Live Forensics in Windows (Adrive CaseStudy),,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Tri Rochmadi; Dadang Heksaputra,,8,4,292,297,Cloud storage; Live forensics; Computer security; Computer science; Wireless,,,,,http://www.sdiwc.net/digital-library/forensic-analysis-in-cloud-storage-with-live-forensics-in-windows-adrive-casestudy,http://dx.doi.org/10.17781/p002637,,10.17781/p002637,3038203924,,0,,3,false,, 005-155-472-420-600,When finding nothing may be evidence of something: Anti-forensics and digital tool marks.,2019-06-03,2019,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Graeme Horsman; David Errickson,"There are an abundance of measures available to the standard digital device users which provide the opportunity to act in an anti-forensic manner and conceal any potential digital evidence denoting a criminal act. Whilst there is a lack of empirical evidence which evaluates the scale of this threat to digital forensic investigations leaving the true extent of engagement with such tools unknown, arguably the field should take proactive steps to examine and record the capabilities of these measures. Whilst forensic science has long accepted the concept of toolmark analysis as part of criminal investigations, 'digital tool marks' (DTMs) are a notion rarely acknowledged and considered in digital investigations. DTMs are the traces left behind by a tool or process on a suspect system which can help to determine what malicious behaviour has occurred on a device. This article discusses and champions the need for DTM research in digital forensics highlighting the benefits of doing so.",59,5,565,572,Internet privacy; Criminal investigation; Empirical evidence; Suspect; Digital evidence; Field (computer science); Computer science; Process (engineering); Scale (social sciences); Digital forensics,Anti forensics; Crime; Digital forensics; Digital tool marks; Investigation,Computer Security; Crime; Data Anonymization; Data Compression; Disruptive Technology; Forensic Sciences/methods; Humans; Information Technology/trends; Intention,,,https://research.tees.ac.uk/en/publications/when-finding-nothing-may-be-evidence-of-something-anti-forensics- https://www.sciencedirect.com/science/article/pii/S1355030619300085 https://dspace.lib.cranfield.ac.uk/bitstream/1826/14256/4/anti-forensic_and_digital_tool_marks-2019.pdf https://pubmed.ncbi.nlm.nih.gov/31472802/ https://europepmc.org/article/MED/31472802 https://www.ncbi.nlm.nih.gov/pubmed/31472802 https://dspace.lib.cranfield.ac.uk/handle/1826/14256,http://dx.doi.org/10.1016/j.scijus.2019.06.004,31472802,10.1016/j.scijus.2019.06.004,2948024755,,0,005-102-962-333-180; 005-262-962-988-497; 005-542-560-321-688; 018-954-504-137-336; 019-851-756-578-933; 021-722-204-712-947; 023-483-803-048-547; 024-441-245-472-976; 025-319-861-345-580; 026-334-191-382-818; 027-822-961-420-892; 030-997-577-987-23X; 039-690-460-224-010; 042-705-658-682-014; 045-935-396-341-342; 048-254-765-810-067; 069-553-351-193-961; 093-551-054-279-495; 096-986-617-825-552; 144-786-887-819-307; 163-853-761-819-084,4,true,cc-by-nc-nd,green 005-178-307-029-511,Mobile Forensic on Android-based IMO Messenger Services using Digital Forensic Research Workshop (DFRWS) Method,2021-02-16,2021,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Afif Nur Ichsan; Riadi,,174,18,34,40,Forensic science; Computer science; Multimedia; Android (operating system); Digital forensics,,,,,http://dx.doi.org/10.5120/ijca2021921076,http://dx.doi.org/10.5120/ijca2021921076,,10.5120/ijca2021921076,3129848542,,0,,1,true,,gold 005-218-778-359-342,A Comparative Study of the Performance of Open-Source and Proprietary Disk Forensic Tools in Recovery of Anti-Forensically Doctored Data,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Sonu Mandecha; M. George Christopher Kumarshankar Raychaudhuri,,8,4,250,261,Open source; Computer science; Multimedia; Wireless,,,,,http://sdiwc.net/digital-library/a-comparative-study-of-the-performance-of-opensource-and-proprietary-disk-forensic-tools-in-recovery-of-antiforensically-doctored-data,http://dx.doi.org/10.17781/p002624,,10.17781/p002624,3039442267,,0,008-507-664-901-527; 052-955-164-038-549; 077-659-859-475-041; 081-140-064-081-587; 098-324-495-757-036; 187-230-175-867-630,0,false,, 005-232-046-693-557,Quality standards for digital forensics: Learning from experience in England & Wales,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Gillian Tully; Neil Cohen; David Compton; Gareth Davies; Roy Isbell; Tim Watson,"Abstract The Forensic Science Regulator has the role of setting quality standards for forensic science in the Criminal Justice System (CJS) in England and Wales. The current requirement is for organisations carrying out digital forensics to gain accreditation to the international standard ISO/IEC 17025 and the Forensic Science Regulator's Codes of Practice and Conduct. The aim of this requirement is to embed a systematic approach to quality, including understanding methods, validating software and systems, understanding risks, ensuring that all involved in the crime scene to court process have the skills and competence they need and the appropriate equipment and environment for the work, and providing ongoing assurance of quality through audit and proficiency tests. However, the challenge of implementing the standards in digital forensics should not be underestimated, particularly in an environment where there is insufficient capacity to meet a growing demand for services in an area of increasing complexity and fragmented delivery. It is therefore timely to review available data to determine the extent to which accreditation to ISO/IEC 17025 is addressing quality issues in digital forensics and consider what changes and resources could be made available to assist with implementation of quality systems.",32,,200905,,Competence (human resources); Criminal justice; Engineering management; Crime scene; Audit; Quality management system; International standard; Computer science; Accreditation; Digital forensics,,,,,https://doi.org/10.1016/j.fsidi.2020.200905 https://wrap.warwick.ac.uk/132247/ https://www.sciencedirect.com/science/article/pii/S2666282519300374,http://dx.doi.org/10.1016/j.fsidi.2020.200905,,10.1016/j.fsidi.2020.200905,3004228036,,0,009-512-003-529-193; 012-735-685-969-861; 017-779-541-978-693; 018-756-432-570-933; 030-178-593-043-926; 054-004-313-233-495; 072-883-816-059-106; 076-020-683-409-265; 101-436-770-235-826; 142-790-196-752-819,11,true,,green 005-390-140-295-540,Image manipulation: Fraudulence in digital dental records: Study and review.,,2014,journal article,Journal of forensic dental sciences,09751475,Informatics Publishing Limited,India,Aman Chowdhry; Keya Sircar; Deepika Bablani Popli; Ankita Tandon,"Introduction: In present-day times, freely available software allows dentists to tweak their digital records as never before. But, there is a fine line between acceptable enhancements and scientific delinquency. Aims and Objective: To manipulate digital images (used in forensic dentistry) of casts, lip prints, and bite marks in order to highlight tampering techniques and methods of detecting and preventing manipulation of digital images. Materials and Methods: Digital image records of forensic data (casts, lip prints, and bite marks photographed using Samsung Techwin L77 digital camera) were manipulated using freely available software. Results: Fake digital images can be created either by merging two or more digital images, or by altering an existing image. Discussion and Conclusion: Retouched digital images can be used for fraudulent purposes in forensic investigations. However, tools are available to detect such digital frauds, which are extremely difficult to assess visually. Thus, all digital content should mandatorily have attached metadata and preferably watermarking in order to avert their malicious re-use. Also, computer alertness, especially about imaging software's, should be promoted among forensic odontologists/dental professionals.",6,1,31,35,Digital watermarking; Artificial intelligence; Forensic dentistry; Software; Digital content; Digital camera; Image analysis; Computer vision; Computer science; Digital image; Multimedia; Metadata,Digital images; detection; manipulation; validation,,,,http://europepmc.org/articles/PMC3970385 http://www.jfds.org/article.asp?issn=0975-1475;year=2014;volume=6;issue=1;spage=31;epage=35;aulast=Chowdhry https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3970385 https://pubmed.ncbi.nlm.nih.gov/24696587/ http://www.jfds.org/text.asp?2014/6/1/31/127767 https://www.jfds.org/article.asp?issn=0975-1475;year=2014;volume=6;issue=1;spage=31;epage=35;aulast=Chowdhry;type=0,http://dx.doi.org/10.4103/0975-1475.127767,24696587,10.4103/0975-1475.127767,1980192274,PMC3970385,0,008-390-936-800-337; 008-492-595-740-053; 008-711-761-932-497; 013-337-294-020-563; 020-565-107-709-428; 022-922-971-618-903; 025-712-308-656-835; 026-852-583-528-222; 027-871-423-903-054; 029-897-602-832-173; 032-531-991-188-861; 051-616-723-656-704; 053-081-745-135-488; 066-197-833-791-043; 077-949-914-198-290; 086-629-816-352-243; 126-109-484-513-310; 140-836-414-294-667,9,true,cc-by-nc-sa,green 005-412-116-848-795,Data Authentication for Wireless Sensor Networks with High Detection Efficiency Based on Reversible Watermarking,2021-06-28,2021,journal article,Wireless Communications and Mobile Computing,15308677; 15308669,Hindawi Limited,United States,Guangyong Gao; Zhao Feng; Tingting Han,"Data authentication is an important part of wireless sensor networks (WSNs). Aiming at the problems of high false positive rate and poor robustness in group verification of existing reversible watermarking schemes in WSNs, this paper proposes a scheme using reversible watermarking technology to achieve data integrity authentication with high detection efficiency (DAHDE). The core of DAHDE is dynamic grouping and double verification algorithm. Under the condition of satisfying the requirement of the group length, the synchronization point is used for dynamic grouping, and the double verification ensures that the grouping will not be confused. According to the closely related characteristics of adjacent data in WSNs, a new data item prediction method is designed based on the prediction-error expansion formula, and a flag check bit is added to the data with embedded watermarking during data transmission to ensure the stability of grouping, by which the fake synchronization point can be accurately identified. Moreover, the embedded data can be recovered accurately through the reversible algorithm of digital watermarking. Analysis and experimental results show that compared with the previously known schemes, the proposed scheme can avoid false positive rate, reduce computation cost, and own stronger grouping robustness.",2021,,1,13,Synchronization (computer science); Computer engineering; Parity bit; Digital watermarking; Authentication; Wireless sensor network; Data integrity; Computer science; Data transmission; Robustness (computer science),,,,Jiangxi Key Natural Science Foundation; Jiangxi Key Natural Science Foundation; Jiangxi Key Natural Science Foundation,https://www.hindawi.com/journals/wcmc/2021/6651137/ https://doi.org/10.1155/2021/6651137 https://dblp.uni-trier.de/db/journals/wicomm/wicomm2021.html#GaoFH21 https://downloads.hindawi.com/journals/wcmc/2021/6651137.pdf http://downloads.hindawi.com/journals/wcmc/2021/6651137.pdf,http://dx.doi.org/10.1155/2021/6651137,,10.1155/2021/6651137,3173780291,,0,004-573-303-904-247; 010-640-506-430-648; 013-254-182-755-449; 014-761-316-804-940; 016-249-275-377-638; 023-183-942-480-538; 027-713-600-996-99X; 057-901-578-042-001; 062-056-236-054-876; 110-478-875-194-559; 112-712-095-656-068; 125-038-809-893-525; 132-832-215-469-200; 133-139-587-042-583; 153-186-784-789-325; 183-373-469-194-34X,0,true,cc-by,gold 005-445-629-762-090,Federal Agencies Can Get Your iPhone Data without Apple’s Help,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yuri Gubanov,"Engineers at Belkasoft, leading digital forensic tools developer, recently implemented advanced and far-reaching data acquisition capabilities in the latest Belkasoft Evidence Center release. The new functions in this product allow for forensic extraction of data from the vast majority of iOS devices based on the new checkm8 exploit.; Forensic investigators traditionally find it difficult to extract data from Apple iOS devices-consisting of iPhones, iPads, and iPods-because such devices do not provide access to their file systems. The new checkm8 exploit is set to be a game changer!",,,48,49,,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.08,http://dx.doi.org/10.46293/4n6/2020.02.02.08,,10.46293/4n6/2020.02.02.08,3021059188,,0,,0,false,, 005-465-138-684-882,DATA MINING : A P ROSPECTIVE APPROACH FOR DIGITAL FORENSICS,2012-11-30,2012,journal article,International Journal of Data Mining & Knowledge Management Process,2231007x,Academy and Industry Research Collaboration Center (AIRCC),,Smita M. Nirkhi; Rajiv V. Dharaskar; V. M. Thakre,"Data mining is part of the interdisciplinary field of knowledge discovery in databases. Research on data mining began in the 1980s and grew rapidly in the 1990s.Specific techniques that have been developed within disciplines such as artificial intelligence, machine learning and pattern recognition have been successfully employed in data mining. Data mining has been successfully introduced in many different fields. An important application area for data mining techniques is the World Wide Web Recently, data mining techniques have also being applied to the field of criminal forensics nothing but Digital forensics. Examples include detecting deceptive criminal identities, identifying groups of criminals who are engaging in various illegal activities and many more. Data mining techniques typically aim to produce insight from large volumes of data. Digital forensics is a sophisticated and cutting edge area of breakthrough research. Canvass of digital forensic investigation and application is growing at a rapid rate with mammoth digitization of an information economy. Law enforcement and military organizations have heavy reliance on digital forensic today. As information age is revolutionizing at a speed inconceivable and information being stored in digital form, the need for accurate intellectual interception, timely retrieval, and nearly zero fault processing of digital data is crux of the issue. This research paper will focus on role of data mining techniques for digital forensics. It also identifies how Data mining techniques can be applicable in the field of digital forensics that will enable forensic investigator to reach the first step in effective prosecution, namely charge-sheeting of digital crime cases.",2,6,41,48,Knowledge extraction; Data mining; World Wide Web; Data science; Digital data; Digitization; Law enforcement; Field (computer science); Computer science; Network forensics; Computer forensics; Digital forensics,,,,,https://www.researchgate.net/profile/Smita_Nirkhi/publication/269994354_DATA_MINING__A_PROSPECTIVE_APPROACH_FOR_DIGITAL_FORENSICS/links/549d7eb80cf2b803713a77ae.pdf http://www.airccse.org/journal/ijdkp/papers/2612ijdkp04.pdf,http://dx.doi.org/10.5121/ijdkp.2012.2604,,10.5121/ijdkp.2012.2604,2324350529,,0,009-101-513-978-03X; 016-797-614-503-035; 026-260-697-989-706; 033-598-057-876-764; 042-092-499-860-725; 061-326-248-978-030; 071-507-808-453-925; 094-336-360-386-20X; 097-567-011-227-46X; 115-547-184-477-216; 136-606-982-080-327; 140-821-103-436-654; 157-106-274-600-10X; 177-597-414-067-285; 178-100-501-663-130; 182-962-922-039-081,17,true,,bronze 005-533-992-170-241,Analisis Data Digital Evidence pada Layanan Voice Over Internet Protocol (VoIP),2016-11-29,2016,journal article,Jurnal Edukasi dan Penelitian Informatika (JEPIN),25489364; 24600741,Tanjungpura University,,Muhamad Arsad Adam; Nur Widiyasono; Husni Mubarok,"Teknologi  VoIP  (Voice  Over  Internet  Protocol) merupakan  teknologi  yang  mampu  melewatkan  panggilan  suara, video  dan  data  dalam  jaringan  IP.  Voice  over  Internet  Protocol (VoIP)  dalam  teknologi  komunikasi  cukup  signifikan  sehingga tidak  terlepas  dari  kejahatan  cybercrime,  Teknologi  VoIP  dapat disalahgunakan  untuk  melakukan  tindakan  kejahatan  jarak  jauh sehingga  diperlukan  langkah-langkah  investigasi  jika  terjadi masalah.  Menemukan  artefact  pada  Infrastruktur  VoIP merupakan tantangan tersendiri. WireSharks salah satu tool yang digunakan  dalam  investigasi  ini.  Metode  yang  digunakan  adalah DFIF  yang  terdiri  tahapan  adalah  Collection,  Examination, Analysis, dan Report and Documentation. Investigasi pada layanan VoIP  dapat  berhasil  dilakukan  dengan  menemukan  data  digital evidence  di  layer  5.  Tujuan  Penelitian  ini  yaitu  Mengetahui Karakteristik Data Digital berupa suara pada layanan Voice Over IP  dan  Menganalisis  Data  Digital  berupa  suara  pada  layanan Voice Over IP. Hasil dari penelitian ini barang bukti digital yang berupa  percakapan  yang  dapat  dipertanggungjawabkan  dalam pengadilan..Kata kunci— Data, Evidence, Forensik,Network, VoIP",2,2,,,,,,,,https://core.ac.uk/display/88097420 https://doaj.org/article/08508940e99f4ec3a8577e503320f771 https://core.ac.uk/download/pdf/294888994.pdf,http://dx.doi.org/10.26418/jp.v2i2.17578,,10.26418/jp.v2i2.17578,2558917419,,0,,0,true,cc-by-nc-sa,gold 005-643-950-059-083,Digital Rape: A Medico-Legal Perspective,,2022,journal article,Journal of Punjab Academy of Forensic Medicine & Toxicology,09725687; 0974083x,Diva Enterprises Private Limited,India,Amamath Mishra,,22,1,5,6,Perspective (graphical); Engineering ethics; Medicine; Criminology; Political science; Law; Biology; Sociology; Engineering; Computer science; Artificial intelligence,,,,,,http://dx.doi.org/10.5958/0974-083x.2022.00001.2,,10.5958/0974-083x.2022.00001.2,,,0,,0,false,, 005-722-494-318-234,Ensuring the Admissibility of Mobile Forensic Evidence in Digital Investigation,2016-02-29,2016,journal article,Journal of the Korea Institute of Information Security and Cryptology,15983986,Korea Institute of Information Security and Cryptology,,Soowoong Eo; Wooyeon Jo; Seokjun Lee; Taeshik Shon,"Because of the evolution of mobile devices such as smartphone, the necessity of mobile forensics is increasing. In spite of this necessity, the mobile forensics does not fully reflect the characteristic of the mobile device. For this reason, this paper analyzes the legal, institutional, and technical considerations for figuring out facing problems of mobile forensics. Trough this analysis, this study discuss the limits of screening seizure on the mobile device. Also, analyzes and verify the mobile forensic data acquisition methods and tools for ensuring the admissibility of mobile forensic evidence in digital investigation.",26,1,135,152,Data acquisition; Mobile device; Computer security; Computer science; Network forensics; Computer forensics; Mobile device forensics; Digital forensics,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002085969 http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2016_v26n1_135,http://dx.doi.org/10.13089/jkiisc.2016.26.1.135,,10.13089/jkiisc.2016.26.1.135,2323238475,,0,000-225-165-729-99X; 013-303-365-301-51X; 017-139-382-465-499; 019-831-293-743-518; 029-159-400-662-132; 033-250-041-408-889; 048-778-071-128-829; 061-106-215-301-993; 062-509-355-401-577; 098-010-827-662-569; 112-055-027-241-381; 114-042-032-060-50X; 132-547-743-805-957; 134-404-622-538-535; 150-545-066-021-744; 189-334-398-196-917; 199-172-967-270-034,2,true,,gold 005-830-218-526-852,The Proceedings of the Seventh Annual DFRWS Europe Conference,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,32,,300944,300944,Library science; History; Environmental science; Computer science,,,,,,http://dx.doi.org/10.1016/j.fsidi.2020.300944,,10.1016/j.fsidi.2020.300944,,,0,,0,true,implied-oa,hybrid 005-966-023-558-670,Pemanfaatan Raspberry Pi untuk Hacking dan Forensic,2017-08-10,2017,journal article,Jurnal Teknik Informatika dan Sistem Informasi,24432229; 24432210,Maranatha Christian University,,Ilham Taufiqurrohman; Nur Widiyasono; Husni Mubarok,"Cybercrime because of the people who are not responsible, with the aim of damaging, modifying, and eliminating one's data, one of them with hacking techniques to be able to infiltrate into the data storage makes it easy to commit a crime. Treatment can be performed on cybercrime using forensic science as a problem solver. Cybercrime has digital evidence as traces of a criminal case, with digital evidence forensic science analysis to find out what activities performed on a criminal case. This study analyzed digital evidence on the network by utilizing Raspberry pi as a medium for hacking the network and to obtain digital evidence on the network . The method used to perform analysis of digital evidence is NIST (National Institute of Standards and Technology). Keywords – Cybercrime, Digital evidence, Forensic Science, Hacking, NIST (National Institute of Standards and Technology), Raspberry Pi",3,2,141192,,NIST; Engineering; World Wide Web; Commit; Cybercrime; Digital evidence; Raspberry pi; Criminal case; Problem solver; Computer security; Hacker,,,,,https://www.neliti.com/publications/141192/pemanfaatan-raspberry-pi-untuk-hacking-dan-forensic https://media.neliti.com/media/publications/141192-ID-pemanfaatan-raspberry-pi-untuk-hacking-d.pdf,http://dx.doi.org/10.28932/jutisi.v3i2.604,,10.28932/jutisi.v3i2.604,2755735319,,0,,0,true,, 006-113-875-322-387,Review Tools Web Browser Forensics untuk Mendukung Pencarian Bukti Digital,2019-04-23,2019,journal article,Jurnal Edukasi dan Penelitian Informatika (JEPIN),25489364; 24600741,Tanjungpura University,,Muhammad Fajar Sidiq; Muhammad Nur Faiz,"Perkembangan penggunaan internet yang semakin; banyak setiap tahunnya mengakibatkan penggunaan web; browser juga meningkat. Hal ini berdampak pada kejahatan; dengan menggunakan web browser juga meningkat seperti; penyalahgunaan email, hoax, hate speech, penipuan dan; lainnya. Penelitian ini menunjukkan pentingnya mengenali; aktivitas penggunaan web browser dari sisi korban dan; pelaku. Penggunaan web browser ini akan menentukan pola; atau alur kejahatan pada suatu insiden kejahatan. Hal ini; akan membantu penyidik dalam menganalisis bukti digital; secara cepat dan dapat mengungkap jenis kejahatan yang; terjadi secara baik. Bukti digital yang dianalisis seperti; akun, kata kunci pencarian, kunjungan web, dan lainnya.; Penelitian ini memberikan penjelasan lokasi penyimpanan; bukti digital, format waktu yang digunakan dan 10 tools; yang digunakan penyidik dalam mengungkap kejahatan; dengan media web browser seperti Google Chrome, Mozilla; Firefox, Internet Explorer, Safari dan Opera.",5,1,67,,,,,,,http://repository.ittelkom-pwt.ac.id/5433/ https://core.ac.uk/download/pdf/294889016.pdf,http://dx.doi.org/10.26418/jp.v5i1.31430,,10.26418/jp.v5i1.31430,2942897138,,0,,2,true,cc-by-nc-sa,gold 006-138-917-123-177,IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations,2018-02-07,2018,journal article,"Sensors (Basel, Switzerland)",14248220; 14243210,Multidisciplinary Digital Publishing Institute (MDPI),Switzerland,Ana Nieto; Ruben Rios; Javier Lopez,"IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.",18,2,492,,Authorization; Information sensitivity; Forensic science; Traceability; Computer security; Computer science; Computer forensics; Documentation; Internet of Things,IoT-forensics; digital witness; privacy,,,IoTest; IoTest; IoTest,https://dblp.uni-trier.de/db/journals/sensors/sensors18.html#NietoRL18 https://pubmed.ncbi.nlm.nih.gov/29414864/ https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5856102 https://core.ac.uk/display/151107539 https://www.nics.uma.es/sites/default/files/papers/nrlSensors2018.pdf https://doi.org/10.3390/s18020492 https://www.mdpi.com/1424-8220/18/2/492/pdf https://www.mdpi.com/1424-8220/18/2/492 https://www.nics.uma.es/biblio/citekey/nrlsensors2018 http://europepmc.org/articles/PMC5856102,http://dx.doi.org/10.3390/s18020492,29414864,10.3390/s18020492,2786407015,PMC5856102,0,025-259-885-861-617; 025-317-658-668-203; 025-487-313-702-455; 029-164-830-214-360; 047-664-342-126-242; 055-811-656-615-740; 061-106-215-301-993; 061-548-981-940-274; 062-325-585-829-185; 068-795-016-904-418; 082-348-465-885-585; 085-059-657-110-862; 093-117-308-515-186; 093-740-393-045-194; 110-969-819-844-63X; 119-527-031-984-388; 129-448-862-235-57X; 135-676-602-165-036; 172-817-568-641-446; 187-762-907-549-695,53,true,cc-by,gold 006-486-319-923-968,Forensic Analysis WhatsApp Mobile Application On Android-Based Smartphones Using National Institute of Standard and Technology (NIST) Framework,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Vindy Arista Yuliani; Riadi,,8,3,223,231,NIST; Computer science; Multimedia; Wireless; Android (operating system),,,,,http://sdiwc.net/digital-library/forensic-analysis-whatsapp-mobile-application-on-androidbased-smartphones-using-national-institute-of-standard-and-technology-nist-framework,http://dx.doi.org/10.17781/p002615,,10.17781/p002615,3039400560,,0,004-379-948-536-390; 070-740-822-724-693; 087-287-435-836-200; 101-819-655-568-965; 185-798-265-234-254,1,false,, 006-542-673-151-415,"О РОЛИ ЦИФРОВИЗАЦИИ В РЕГУЛИРОВАНИИ ПЕРЕЧНЯ СУДЕБНЫХ ЭКСПЕРТИЗ, ПРОВОДИМЫХ ВНЕ ГОСУДАРСТВЕННЫХ СУДЕБНО-ЭКСПЕРТНЫХ ОРГАНИЗАЦИЙ",2020-04-01,2020,journal article,The rule-of-law state: theory and practice,25000217,Bashkir State University,,Руслан Абдуллин,"The study of the practice of investigating crimes indicates the need to use the achievements of high technologies, expressed in the most advanced form - digitalization. The possibilities of digitalization are being introduced into forensic activities, including non-state forensic organizations activities.; Purpose: to analyze the problems of normative, scientific and methodological, material and technical regulation of the list of forensic examinations held outside state forensic organizations, with the development of solutions.; Methods: the author uses empirical methods of observation, comparison, description, interpreting, interpretation of legal norms, comparative legal and statistical analysis, and formal logical methods of scientific knowledge.; As a result of the study of various approaches, analysis of national and foreign regulatory legal acts, the author proves the necessity to develop a list of forensic examinations prohibited for production in non-state forensic organizations, which makes it possible to determine ways to increase the level of digitalization of forensic examinations by improving legal, scientific, methodological and organizational support of forensic expert activities in the Russian Federation.",16,4-2,223,232,Empirical research; Political science; Sociology of scientific knowledge; Statistical analysis; Legal norm; Russian federation; Normative; Interpretation (philosophy); Engineering ethics,,,,,https://pravgos.ru/index.php/journal/article/view/132 https://cyberleninka.ru/article/n/o-roli-tsifrovizatsii-v-regulirovanii-perechnya-sudebnyh-ekspertiz-provodimyh-vne-gosudarstvennyh-sudebno-ekspertnyh-organizatsiy https://pravgos.ru/index.php/journal/article/download/132/132,http://dx.doi.org/10.33184/pravgos-2020.4.38,,10.33184/pravgos-2020.4.38,3126605255,,0,172-376-735-919-361,0,true,cc-by,gold 006-794-410-339-126,Energy-based linear PCM audio recovery method of impaired MP4 file stored in dashboard camera memory,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Park Nam In; JiWoo Lee; Lim Seong Ho; Byun Jun Seok; Gi-Hyun Na; Oc-Yeub Jeon; Jung Hwan Lee,,39,,301274,,Frame (networking); Artificial intelligence; Pulse-code modulation; MUSHRA; Event data recorder; Computer vision; Dashboard; Computer science; Spectrogram; Audio signal; Dynamic time warping,,,,,https://www.sciencedirect.com/science/article/abs/pii/S266628172100192X,http://dx.doi.org/10.1016/j.fsidi.2021.301274,,10.1016/j.fsidi.2021.301274,3199876407,,0,010-127-508-296-844; 030-871-126-053-960; 034-927-240-304-052; 043-261-465-467-889; 050-857-984-627-89X; 074-145-325-661-168; 078-519-401-333-983; 080-240-167-261-195; 086-326-264-957-173; 100-881-033-777-296; 106-258-897-750-369; 115-135-564-414-881; 121-670-537-204-258; 181-934-068-826-961,2,false,, 006-913-837-645-666,The Definition of Digital Criminalistics as the Origin of a Misleading Direction in Science. Part 1,2021-02-18,2021,journal article,Legal education and science,18131190,The Publishing Group Jurist,,Oleg S. Kuchin; Yaroslava O. Kuchina,"Purpose. To compare and analyze the trend of appearance of the pseudo-term “digital criminology” in the science of criminology and prove that this is incorrect. Methodology: induction, deduction, synthesis, analysis, formal legal method, comparative legal method, logical method. Conclusions. The evolution of methods of committing crimes and instruments of crime does not always require the evolution of the science of criminology and the emergence of its varieties. You just have to assess the prospects of extrapolative ways and methods of proving the circumstances of the crimes in the era of digitalization of social relations, in terms of the provisions of modern criminal law and only criminal-legal research unit. The definition of “digital criminalistics”, which has recently appeared in science, actually misleads the scientific community with its novelty and originality, since such criminalistics in nature does not exist a priori. It is necessary to speak only about forensic or expert research of carriers of digital (electronic or computer) information. In criminalistics, it is logical to develop a new direction-the forensic study of electronic media of digital information and the use of computer expertise in establishing all the circumstances of the crime committed. And this is just a new section of forensic technology, studying a new subject of research for this naki. Here, the traditional forensic methodology should be applied, which will be aimed “atlinking” the electronic carrier of digital information and the digital information itself to a specific crime and to a specific person. Scientific and practical significance. The research is aimed at orienting forensic theory and practice towards the study of specific objects and contributes to the fact that all these studies are further applicable to the practice of crime investigation, and not only for theoretical purposes.",2,,20,29,Epistemology; Philosophy,,,,,http://dx.doi.org/10.18572/1813-1190-2021-2-20-29,http://dx.doi.org/10.18572/1813-1190-2021-2-20-29,,10.18572/1813-1190-2021-2-20-29,3217095289,,0,,0,true,,bronze 006-933-430-647-14X,Raiders of the lost artefacts:: championing the need for digital forensics research,,2019,journal article,Forensic Science International: Reports,26659107,Elsevier BV,,Graeme Horsman,"Abstract In digital forensics, the concept of a ‘digital artefact’ exists; coined here as ‘a digital object containing data which may describe the past, present or future use or function of a piece of software, application or device for which it is attributable to’. In almost all digital investigations, a practitioner will query any digital artefacts resident on any device subject to examination in order to establish the presence of potentially evidential information. Whilst on face value this task appears straightforward, in reality, the pace of change within technology can lead to a practitioner encountering many unknown or previously unseen artefacts with undocumented functionalities. This creates state of ‘catch-up’ in regards to investigatory techniques and knowledge as practitioners must seek to ascertain the relevance of such data through additional research and testing. Yet, the demands placed upon the role of the practitioner may prevent engagement in the testing and evaluation of new digital artefacts, leaving them reliant on the timely publication and dissemination of forensic research (whether academic, industry or vendor produced) as a support mechanism. Whilst digital artefact research has a clear applied value, the difficulty of measuring its impact means that it may not always be considered of worth by academic communities and their publication platforms. As a result, this work champions the need for ‘digital artefact’ research, calling for increased engagement in this form of research to support the forensic community.",1,,100003,,Internet privacy; Relevance (law); Value (ethics); Vendor; Pace; Task (project management); Computer science; State (computer science); Function (engineering); Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S2665910719300039 https://research.tees.ac.uk/ws/files/8434501/Raiders_of_the_lost_artefacts.pdf https://research.tees.ac.uk/en/publications/raiders-of-the-lost-artefacts-championing-the-need-for-digital-fo https://core.ac.uk/download/pdf/228323042.pdf,http://dx.doi.org/10.1016/j.fsir.2019.100003,,10.1016/j.fsir.2019.100003,2952510125,,0,007-790-059-029-953; 040-711-141-878-573; 047-386-524-667-691; 049-131-797-799-081; 061-269-967-405-492; 067-577-414-064-539; 075-950-021-558-098; 102-243-142-344-71X; 111-488-239-742-003; 118-214-115-485-064; 128-694-144-138-385; 142-790-196-752-819,13,true,"CC BY, CC BY-NC-ND",gold 007-109-733-072-858,EU_2023_Ad,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,42,,301425,301425,Environmental science,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00106-8,,10.1016/s2666-2817(22)00106-8,,,0,,0,false,, 007-130-011-487-396,COMPUTATIONAL INTELLIGENCE IN IDENTIFYING COUNTERFEIT DOCUMENTS,2017-04-01,2017,journal article,Journal of emerging technologies and innovative research,23495162,,,Amudha L; T. M. Nithya; J. Ramya,"Digital Forensics is a branch of forensic science that encompases the recovery and investigation of details found in digital devices. Digital Evidence is information found among a variety of electronic devices like CD, pen drive, hard disk or even mobile phones that is useful in legal systems. The use of digital evidences in criminal and civil investigations is taking a major role in recent years. These evidences are equivalent to fingerprints, DNA pattern or iris pattern that is unique for any person. There is still some limitation, where the digital evidence may be misleading. Anyhow, at the end it is the court to decide whether the digital forensic evidence of that investigation is reliable or not. Also with the increasing prevalence of mobile phones, forensic evidences collected from mobile devices are becoming an invaluable source of evidence. This paper shows digital forensics in a different perspective, and analyses the existing methods of digital forensics. The results are checked with all the existing methods and appropriate matching for specific type of forensic evidence like PAN number, Voter ID, AAthar card, etc.with a forensic method.",4,4,217-219,217-219,Iris recognition; Variety (cybernetics); Computational intelligence; Matching (statistics); Mobile device; Data science; Counterfeit; Digital evidence; Computer science; Digital forensics,,,,,https://www.jetir.org/view?paper=JETIR1704054 https://www.jetir.org/papers/JETIR1704054.pdf,https://www.jetir.org/view?paper=JETIR1704054,,,3009357784,,0,,0,false,, 007-418-655-737-904,Mining Frequent Sequences for Emails in Cyber Forensics Investigation,2014-01-16,2014,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Priyanka V. Kayarkar; Prashant Ricchariaya; Anand Motwani,"The goal of Digital forensics process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the investigation of particular digital crime. Today we are living in the information age, all the information which is transferred over the internet is through the digital devices. With the advent of world-wide web, advanced forms of digital crimes came into picture. Criminal uses the Digital devices to commit Digital crime, so for the investigation forensic Experts have to adopt practical frameworks and methods to recover data for analysis which can comprise as evidence. Investigation of Digital forensics adopts three essential processes: Data Generation, Data Preparation and Data warehousing. Data Mining has unlimited potential in the field of Digital Forensics. Computer forensics is an emerging discipline investigating the computer crime. In this paper we are introducing the cyber Forensics using Sequence Mining algorithm, by comparing it with association rule mining algorithm parameters.",85,17,1,6,The Internet; Data warehouse; World Wide Web; Forensic science; Computer science; Test data generation; Computer forensics; Digital forensics; Information Age,,,,,https://research.ijcaonline.org/volume85/number17/pxc3893332.pdf https://www.ijcaonline.org/archives/volume85/number17/14930-3332,http://dx.doi.org/10.5120/14930-3332,,10.5120/14930-3332,2164121335,,0,003-448-142-212-67X; 003-868-023-351-977; 037-927-986-476-095; 065-520-849-771-46X; 102-602-192-826-532; 115-547-184-477-216,3,true,,bronze 007-458-480-072-061,Akuisisi Bukti Digital Viber Messenger Android Menggunakan Metode National Institute of Standards and Technology (NIST),2021-02-14,2021,journal article,Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi),25800760,Ikatan Ahli Informatika Indonesia (IAII),," Riadi; Rusydi Umar; Muhammad Irwan Syahib","Viber is one of the most popular social media in the Instant Messenger application category that can be used to send text messages, make voice calls, send picture messages and video messages to other users. As many as 260 million people around the world have used this application. Increasing the number of viber users certainly brings positive and negative impacts, one of the negative impacts of this application is the use of digital forensic crime. This research simulates and removes digital crime evidence from the viber application on Android smartphones using the National Institute of Standards Technology (NIST) method, which is a method that has work guidelines on forensic policy and process standards to ensure each investigator follows the workflow the same so that their work is documented and the results can be accounted for. This study uses three forensic tools, MOBILedit Forensic Express, Belkasoft and Autopsy. The results in this study show that MOBILedit Forensic Express gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. Belkasoft gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. For Autopsy does not give the expected results in the extraction process, in other words the Autopsy application gives zero results. It can be concluded that MOBILedit Forensic Express and Belkasoft have a good performance compared to Autopsy and thus this research has been completed and succeeded in accordance with the expected goals.",5,1,45,54,Internet privacy; NIST; Workflow; Digital evidence; Instant messenger; Computer science; Social media; Android (operating system); Digital forensics,,,,,http://jurnal.iaii.or.id/index.php/RESTI/article/view/2626 http://jurnal.iaii.or.id/index.php/RESTI/article/download/2626/366,http://dx.doi.org/10.29207/resti.v5i1.2626,,10.29207/resti.v5i1.2626,3131051498,,0,,1,true,cc-by,gold 007-542-115-031-618,"Digital forensics in cyber security - recent trends, threats, and opportunities",2020-07-08,2020,journal article,Periodicals of Engineering and Natural Sciences (PEN),23034521,,,Mohammed I. Alghamdi,"The rapid technological advancement has led the entire world to shift towards digital domain. However, this transition has also result in the emergence of cybercrimes and security breach incidents that threatens the privacy and security of the users. Therefore, this paper aimed at examining the use of digital forensics in countering cybercrimes, which has been a critical breakthrough in cybersecurity. The paper has analyzed the most recent trends in digital forensics, which include cloud forensics, social media forensics, and IoT forensics. These technologies are helping the cybersecurity professionals to use the digital traces left by the data storage and processing to keep data safe, while identifying the cybercriminals. However, the research has also observed specific threats to digital forensics, which include technical, operational and personnel-related challenges. The high complexity of these systems, large volume of data, chain of custody, the integrity of personnel, and the validity and accuracy of digital forensics are major threats to its large-scale use. Nevertheless, the paper has also observed the use of USB forensics, intrusion detection and artificial intelligence as major opportunities for digital forensics that can make the processes easier, efficient, and safe.",8,3,1321,1330,Chain of custody; Cloud forensics; Technological advance; High complexity; Intrusion detection system; Computer security; Computer science; Social media; Internet of Things; Digital forensics,,,,,http://pen.ius.edu.ba/index.php/pen/article/download/1463/616 http://pen.ius.edu.ba/index.php/pen/article/view/1463,http://pen.ius.edu.ba/index.php/pen/article/view/1463,,,3083231950,,0,,2,false,, 007-708-977-086-804,A Study on the Cases of Applying 3D Modeling for Forensic Video,2020-11-30,2020,journal article,Journal of Digital Contents Society,15982009; 2287738x,Digital Contents Society,,Byoung-Chul Kim,,21,11,1947,1956,Motion (physics); 3D reconstruction; Artificial intelligence; 3D modeling; Object matching; Computer vision; Computer science,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002651332,http://dx.doi.org/10.9728/dcs.2020.21.11.1947,,10.9728/dcs.2020.21.11.1947,3107179056,,0,018-688-665-352-310; 029-731-971-790-685; 030-994-376-195-304; 069-872-167-231-233; 075-989-648-810-208; 078-380-583-447-952; 092-305-346-660-757; 096-756-434-849-371; 138-112-529-065-72X,0,false,, 007-868-297-443-532,Digital forensics as a service: Stepping up the game,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,H.M.A. van Beek; J. van den Bos; A. Boztas; E.J. van Eijk; R. Schramp; M. Ugen,"Abstract After providing Digital Forensics as a Service (DFaaS) implementations to law enforcement agencies for close to a decade, we present our view from an inside-out perspective. We share the lessons learned from an organizational, operational and development perspective in a forensic and legal context. We conclude with our vision on how to bring the DFaaS concept to the next level for both investigative and innovative purposes.",35,,301021,,Perspective (graphical); Data science; Implementation; Context (language use); Law enforcement; Service (systems architecture); Computer science; Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S2666281720300706 https://dblp.uni-trier.de/db/journals/di/di35.html#BeekBBESU20,http://dx.doi.org/10.1016/j.fsidi.2020.301021,,10.1016/j.fsidi.2020.301021,3080100402,,0,000-360-120-513-679; 004-611-973-316-051; 009-998-989-670-005; 011-051-740-313-213; 012-564-492-558-122; 015-461-906-719-684; 035-031-257-128-045; 035-253-391-245-692; 038-793-093-462-716; 039-365-534-871-351; 040-567-901-099-238; 046-857-308-211-173; 050-513-243-638-138; 053-363-195-142-469; 055-166-120-045-285; 056-715-378-869-201; 060-786-957-279-751; 061-549-181-856-861; 062-486-998-356-491; 064-185-555-697-856; 065-643-019-434-19X; 065-671-045-136-370; 067-938-325-014-282; 087-342-951-350-054; 099-111-104-586-32X; 118-244-930-021-861; 125-939-677-745-616; 134-927-490-231-285; 163-330-758-807-944; 166-178-398-716-39X; 167-192-182-132-499; 167-740-265-127-825,6,true,cc-by-nc-nd,hybrid 007-898-145-584-667,Using computed similarity of distinctive digital traces to evaluate non-obvious links and repetitions in cyber-investigations,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Timothy Bollé; Eoghan Casey,"Abstract This work addresses the challenge of discerning non-exact or non-obvious similarities between cybercrimes, proposing a new approach to finding linkages and repetitions across cases in a cyber-investigation context using near similarity calculation of distinctive digital traces. A prototype system was developed to test the proposed approach, and the system was evaluated using digital traces collected during actual cyber-investigations. The prototype system also links cases on the basis of exact similarity between technical characteristics. This work found that the introduction of near similarity helps to confirm already existing links, and exposes additional linkages between cases. Automatic detection of near similarities across cybercrimes gives digital investigators a better understanding of the criminal context and the actual phenomenon, and can reveal a series of related offenses. Using case data from 207 cyber-investigations, this study evaluated the effectiveness of computing similarity between cases by applying string similarity algorithms to email addresses. The Levenshtein algorithm was selected as the best algorithm to segregate similar email addresses from non-similar ones. This work can be extended to other digital traces common in cybercrimes such as URLs and domain names. In addition to finding linkages between related cybercrime at a technical level, similarities in patterns across cases provided insights at a behavioral level such as modus operandi (MO). This work also addresses the step that comes after the similarity computation, which is the linkage verification and the hypothesis formation. For forensic purposes, it is necessary to confirm that a near match with the similarity algorithm actually corresponds to a real relation between observed characteristics, and it is important to evaluate the likelihood that the disclosed similarity supports the hypothesis of the link between cases. This work recommends additional information, including certain technical, contextual and behavioral characteristics that could be collected routinely in cyber-investigations to support similarity computation and link evaluation.",24,,S2,S9,String metric; Information retrieval; Relation (database); Cybercrime; Context (language use); Digital evidence; Computer science; Linkage (mechanical); Digital forensics; Similarity (network science),,,,,https://www.sciencedirect.com/science/article/pii/S1742287618300343 https://dblp.uni-trier.de/db/journals/di/di24.html#BolleC18 https://www.sciencedirect.com/science/article/abs/pii/S1742287618300343 https://serval.unil.ch/resource/serval:BIB_2F1A43ACD87E.P001/REF.pdf https://serval.unil.ch/notice/serval:BIB_2F1A43ACD87E https://core.ac.uk/download/226982669.pdf,http://dx.doi.org/10.1016/j.diin.2018.01.002,,10.1016/j.diin.2018.01.002,2792308754,,0,003-681-865-438-817; 017-176-620-267-416; 019-879-677-931-334; 037-527-626-001-907; 042-944-602-727-47X; 044-898-668-023-385; 046-777-369-251-275; 060-820-214-935-558; 065-371-008-254-47X; 068-834-253-493-332; 077-684-580-099-346; 081-937-693-264-501; 105-284-007-246-172; 117-605-535-046-57X; 123-771-006-320-415; 179-776-256-587-344,8,true,cc-by-nc-nd,hybrid 008-064-732-553-166,Law and Judicial Application of Digital Forensic Evidence in Nigeria,2020-05-12,2020,journal article,"Journal of Law, Policy and Globalization",22243240,,,Felix Emeakpore Eboibi; Inetimi Mac-Barango,"The development of information & communication technology has left the Nigerian polity to the application of technology infrastructure to daily activities. In essence, disputes arising from these activities may ordinarily not be effectively settled without applying electronic evidence in proceedings before the courts. The skills and knowledge of electronic evidence require the ingenuity of forensic experts or examiners for the purpose of bridging the gap that may arise in the mind of the courts. Does the Nigerian Law accept forensic expert evidence? Is every evidence expert evidence? Are there set down conditions before the courts for forensic expert evidence to be accepted or applied to proceedings before the courts? What nature of cases requires forensic evidence? This paper  will  demonstrate how  information and communication technology has resulted in the application of digital devices by Nigerians and the nature of the impact it  has . Keywords: Digital Forensics Evidence, Forensics Examiners, Digital Forensics Experts, Law, Judicial application DOI: 10.7176/JLPG/96-08 Publication date: April 30 th 2020",96,,61,75,Political science; Law; Ingenuity; Polity; Information and Communications Technology; Digital forensics,,,,,https://iiste.org/Journals/index.php/JLPG/article/view/52494,https://iiste.org/Journals/index.php/JLPG/article/view/52494,,,3024693437,,0,,0,false,, 008-243-103-276-518,Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Asanka Sayakkara; Nhien-An Le-Khac; Mark Scanlon,"Abstract The Internet of Things (IoT) has opened up new opportunities for digital forensics by providing new sources of evidence. However, acquiring data from IoT is not a straightforward task for multiple reasons including the diversity of manufacturers, the lack of standard interfaces, the use of light-weight data encryption, e.g. elliptic curve cryptography (ECC), etc. Electromagnetic side-channel analysis (EM-SCA) has been proposed as a new approach to acquire forensically useful data from IoT devices. However, performing successful EM-SCA attacks on IoT devices requires domain knowledge and specialised equipment that are not available to most digital forensic investigators. This work presents the methodology behind and an evaluation of a framework, EMvidence, that enables forensic investigators to acquire evidence from IoT devices through EM-SCA. This framework helps to automate and perform electromagnetic side-channel evidence collection for forensic purposes. An evaluation of the framework is performed by applying it to multiple realistic digital investigation scenarios. In the case of attacking ECC cryptographic operations, the evaluation demonstrates that the volume of EM data that needs to be stored and processed can be significantly reduced using the framework's machine learning based approach.",33,,301003,,Human–computer interaction; Volume (computing); Encryption; Elliptic curve cryptography; Cryptography; Domain knowledge; Task (project management); Computer science; Side channel attack; Digital forensics,,,,,https://dfrws.org/wp-content/uploads/2020/10/2020_USA_paper-facilitating_electromagnetic_side-channel_analysis_for_iot_investigation__evaluating_the_emvidence_framework.pdf https://forensicsandsecurity.com/papers/EvaluatingEMvidence.pdf https://dfrws.org/presentation/facilitating-electromagnetic-side-channel-analysis-for-iot-investigation-evaluating-the-emvidence-framework/ https://forensicsandsecurity.com/papers/EvaluatingEMvidence.php https://www.sciencedirect.com/science/article/pii/S2666281720302523,http://dx.doi.org/10.1016/j.fsidi.2020.301003,,10.1016/j.fsidi.2020.301003,3025548592,,0,001-799-840-106-411; 012-867-377-866-486; 017-335-677-993-203; 018-772-801-528-344; 023-318-629-736-547; 024-831-771-938-864; 027-163-958-987-808; 033-089-942-594-860; 036-198-835-759-991; 038-052-594-652-085; 039-627-889-157-293; 041-869-362-153-337; 042-636-923-996-676; 051-174-262-378-725; 051-870-124-075-370; 054-169-114-688-281; 060-369-813-003-88X; 064-092-804-942-240; 076-175-512-198-703; 079-726-245-728-809; 081-833-857-658-915; 083-134-473-348-002; 091-352-470-901-517; 092-706-635-239-595; 105-351-791-012-122; 110-311-156-990-220; 133-753-731-718-112; 137-755-137-054-864; 160-370-472-488-703,2,true,cc-by-nc-nd,hybrid 008-280-449-967-861,Digital Forensic Analysis of Ubuntu File System,,2016,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Dinesh N. Patil; Bandu B. Meshram,,5,4,175,186,World Wide Web; Digital media; Information system; File system; Computer science; Wireless; Digital forensics,,,,,http://www.sdiwc.net/digital-library/digital-forensic-analysis-of-ubuntu-file-system.html,http://dx.doi.org/10.17781/p002213,,10.17781/p002213,2550061239,,0,,2,false,, 008-346-665-933-569,Prelim iii - Contents List,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,32,,300940,300940,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30102-5,,10.1016/s2666-2817(20)30102-5,,,0,,0,true,,bronze 008-782-115-725-766,The Search and Seizure of Digital Evidence by Forensic Investigators in South Africa,2019-04-25,2019,journal article,Potchefstroom Electronic Law Journal,17273781,Academy of Science of South Africa,,Jacobus Gerhardus Nortje; Daniel Christoffel Myburgh,"The discipline of digital forensics requires a combination of skills, qualifications and knowledge in the area of forensic investigation, legal aspects and information technology. The uniqueness of digital evidence makes the adoption of traditional legal approaches problematic.; Information technology terminology is currently used interchangeably without any regard to being unambiguous and consistent in relation to legal texts. Many of the information technology terms or concepts have not yet achieved legal recognition.; The recognition and standardisation of terminology within a legal context are of the utmost importance to ensure that miscommunication does not occur.; To provide clarity or guidance on some of the terms and concepts applicable to digital forensics and for the search and seizure of digital evidence, some of the concepts and terms are reviewed and discussed, using the Criminal Procedure Act 51 of 1977 as a point of departure.; Digital evidence is often collected incorrectly and analysed ineffectively or simply overlooked due to the complexities that digital evidence poses to forensic investigators. As with any forensic science, specific regulations, guidelines, principles or procedures should be followed to meet the objectives of investigations and to ensure the accuracy and acceptance of findings. These regulations, guidelines, principles or procedures are discussed within the context of digital forensics: what processes should be followed and how these processes ensure the acceptability of digital evidence. These processes include international principles and standards such as those of the Association of Chiefs of Police Officers and the International Organisation of Standardisation. A summary is also provided of the most influential or best-recognised international (IOS) standards on digital forensics.; It is concluded that the originality, reliability, integrity and admissibility of digital evidence should be maintained as follows:; ; Data should not be changed or altered.; Original evidence should not be directly examined.; Forensically sound duplicates should be created.; Digital forensic analyses should be performed by competent persons.; Digital forensic analyses should adhere to relevant local legal requirements.; Audit trails should exist consisting of all required documents and actions.; The chain of custody should be protected.; Processes and procedures should be proper, while recognised and accepted by the industry.; ; If the ACPO (1997) principles and ISO/IEC 27043 and 27037 Standards are followed as a forensic framework, then digital forensic investigators should follow these standards as a legal framework.",22,1,1,42,Chain of custody; Information technology; Law; Context (language use); Digital evidence; Computer science; Terminology; Engineering ethics; Search and seizure; Audit trail; Digital forensics,,,,,https://perjournal.co.za/article/download/4886/7609 http://www.scielo.org.za/scielo.php?script=sci_arttext&pid=S1727-37812019000100015 http://www.scielo.org.za/pdf/pelj/v22n1/15.pdf https://perjournal.co.za/article/view/4886 https://doaj.org/article/c71c56d0c79f497bba7b913364a54d72 https://repository.nwu.ac.za/handle/10394/32469 https://dspace.nwu.ac.za/handle/10394/32469 https://www.ajol.info/index.php/pelj/article/view/216461,http://dx.doi.org/10.17159/1727-3781/2019/v22i0a4886,,10.17159/1727-3781/2019/v22i0a4886,2947399083,,0,011-595-637-615-462; 016-255-634-578-521; 021-254-917-283-500; 035-898-815-030-977; 042-373-091-814-099; 047-456-447-003-568; 054-861-209-750-456; 061-099-981-771-326; 061-542-609-981-822; 064-239-251-612-842; 087-300-425-406-630; 090-322-349-422-254; 095-080-443-019-181; 100-767-382-538-470; 110-123-934-011-554; 121-538-836-907-553; 155-899-374-390-306; 160-934-987-081-858; 175-257-770-653-834,4,true,cc-by,gold 009-386-221-930-423,Digital forensics investigation methodology applicable for social network services,2014-07-19,2014,journal article,Multimedia Tools and Applications,13807501; 15737721,Springer Science and Business Media LLC,Netherlands,Yu-Jong Jang; Jin Kwak,"Social network services (SNSs) contain various information such as conversations between users, user location information, personal network, and user psychology. This information can be useful for incident investigation. However, in SNSs, unlike computing services that offer services by saving data on a device, a device that uses a SNS with real-time synchronization generally only saves information that is not effective evidence, such as SNS usage log records. However, if digital evidence can be collected through an appropriate digital forensic process, various information such as a social network user's friend list, conversations, and personal relationships can be collected as digital evidence. Therefore, this paper suggests a digital forensic process for digital devices using SNSs. To analyze digital evidence about SNSs, this proposed method is composed of effective processes, classifying digital devices, collecting digital evidence, and analysis.",74,14,5029,5040,Synchronization (computer science); World Wide Web; Mobile device; Digital forensic process; Personal network; Digital evidence; Computer science; Digital forensics; Social network,,,,,https://link.springer.com/article/10.1007/s11042-014-2061-8 https://link.springer.com/content/pdf/10.1007%2Fs11042-014-2061-8.pdf https://dblp.uni-trier.de/db/journals/mta/mta74.html#JangK15,http://dx.doi.org/10.1007/s11042-014-2061-8,,10.1007/s11042-014-2061-8,2038106871,,0,008-197-606-198-684; 021-775-864-388-993; 033-174-479-774-929; 038-252-668-782-162; 069-368-602-351-377; 094-502-004-274-093; 101-875-322-318-577; 103-104-153-644-669; 105-128-303-857-483; 113-525-536-343-466,23,false,, 009-512-003-529-193,The chequered past and risky future of digital forensics,2019-02-02,2019,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Eoghan Casey,"There is weak integration of digital forensics and forensic science, despite over a decade of effort to break down the borders between them. As more criminal investigations involve digital traces i...",51,6,649,664,Criminal investigation; Engineering; Forensic intelligence; Engineering ethics; Digital forensics,,,,,https://www.tandfonline.com/doi/full/10.1080/00450618.2018.1554090,http://dx.doi.org/10.1080/00450618.2018.1554090,,10.1080/00450618.2018.1554090,2911651065,,0,000-659-280-122-390; 004-200-813-216-207; 014-466-907-950-761; 018-182-926-340-45X; 019-831-293-743-518; 030-177-879-793-402; 035-031-257-128-045; 042-944-602-727-47X; 046-505-599-865-150; 053-522-882-246-521; 056-524-463-164-028; 064-549-392-650-90X; 071-062-258-534-616; 071-697-920-432-649; 076-020-683-409-265; 083-948-757-124-708; 085-482-775-276-618; 087-342-951-350-054; 094-295-279-676-447; 097-939-114-561-254; 115-894-275-671-512; 120-656-428-748-152; 124-776-641-347-974; 125-939-677-745-616; 132-309-864-704-323; 137-661-982-633-25X; 182-670-398-460-931,38,false,, 009-705-592-114-017,A preliminary study to quantify the efficacy of 3D data acquisition for human bone replication.,2021-08-21,2021,journal article,Journal of forensic and legal medicine,18787487; 1752928x,Churchill Livingstone,Netherlands,Shelby O. Abraham; Gargi Jani; Vineet Vinay; William R. Belcher; Abraham Johnson,"Abstract Background Three-dimensional imaging is a rapidly growing technology that has revealed exciting insights in disparate fields of research, especially in medicine, forensics, and archaeology. Recent advancements in this technology have also made a remarkable impact in the field of anthropology and odontology. A major benefit of this technology is that they offer effective methods of creating digital records that can aid in physical documentation and can be digitally stored for later assessment and research. Aim The aim of the current study is to evaluate the metric accuracy of 3D models generated using three different 3D acquisition techniques for performing metric analytical procedures. Materials and method Twenty standard craniometric linear measurements (using both sliding and spreading callipers) were taken on two craniums and eight standard measurements were taken on 2 mandibles (using sliding callipers and a mandibulometer); these measurements were then replicated on 3D digital models. Results Statistical analysis of these dataset using Analysis of Variance (ANOVA) and post hoc Bonferroni test suggested that the physical and virtual measurements were accurate, comparable, and concordant (p > 0.05). Conclusion These findings open up numerous avenues for future study, especially in the fields of forensics and clinical studies. However, in order to overcome the limitations faced in using the digital method certain standardised protocols and guidelines must be established to record these data.",83,,102244,,Machine learning; Replication (statistics); Bonferroni correction; Artificial intelligence; Data acquisition; Metric (unit); Forensic anthropology; Calipers; Field (computer science); Computer science; Documentation,3D models; Computed tomography; Cone beam computed tomography; Craniometric measurements; Forensic anthropology; Structured light scanning,"Analysis of Variance; Cephalometry; Data Interpretation, Statistical; Humans; Imaging, Three-Dimensional/methods; Mandible/anatomy & histology; Models, Anatomic; Reproducibility of Results; Skull/anatomy & histology",,,https://www.sciencedirect.com/science/article/pii/S1752928X21001293,http://dx.doi.org/10.1016/j.jflm.2021.102244,34438227,10.1016/j.jflm.2021.102244,3194418008,,0,002-757-600-778-594; 008-374-126-620-756; 008-613-501-863-561; 009-578-762-922-350; 019-885-756-382-127; 020-998-596-326-498; 021-993-166-350-90X; 022-388-426-117-073; 024-784-179-276-92X; 024-865-808-179-781; 029-062-394-152-492; 030-086-114-748-550; 030-399-930-545-660; 038-333-291-764-259; 044-567-283-633-258; 045-617-989-546-198; 049-903-539-268-808; 052-446-300-200-518; 054-613-157-209-410; 059-572-267-613-848; 066-249-839-004-372; 078-705-620-935-166; 087-451-816-741-063; 124-684-494-161-222; 130-965-320-029-932; 149-639-016-119-438,0,false,, 009-722-526-338-869,"Special Issue: on cybercrime prevention, detection and response",,2013,journal article,International Journal of Electronic Security and Digital Forensics,1751911x,,,Ameer Al-Nemrat; George R. S. Weir,This is a special issue of the journal International Journal of Electronic Security and Digital Forensics that was guest edited by Dr. Ameer Al-Nemrat and Dr. George R. S. Weir.,5,2,,,Cybercrime; Electronic security; Computer security; Computer science; George (robot); Digital forensics,,,,,https://strathprints.strath.ac.uk/52489/ https://pureportal.strath.ac.uk/en/publications/special-issue-on-cybercrime-prevention-detection-and-response,https://strathprints.strath.ac.uk/52489/,,,233321221,,0,,0,false,, 009-862-177-957-585,Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics,,2014,journal article,Journal of ICT Research and Applications,23375787; 23385499,The Institute for Research and Community Services (LPPM) ITB,Indonesia,Nana Rachmana Syambas; Naufal El Farisi,"In digital forensic investigations, the investigators take digital evidence from computers, laptops or other electronic goods. There are many complications when a  suspect or related person does not want to cooperate or has removed digital evidence. A  lot of research has been done with the goal of retrieving data from flash memory or  other digital storage media from which the content has been deleted. Unfortunately,  such methods cannot guarantee that all data will be recovered. Most data can only be  recovered partially and sometimes not perfectly, so that some or all files cannot be  opened. This paper proposes the development of a new method for the retrieval of  digital evidence called the Two-Step Injection method (TSI). It focuses on the  prevention of the loss of digital evidence through the deletion of data by suspects or  other parties. The advantage of this method is that the system works in secret and can be  combined with other digital evidence applications that already exist, so that the  accuracy and completeness of the resulting digital evidence can be improved. An  experiment to test the effectiveness of the method was set up. The developed TSI  system worked properly and had a 100% success rate.",8,2,141,156,Set (abstract data type); Suspect; Digital evidence; Digital storage; Two step; Computer security; Computer science; Digital forensics,,,,,https://doaj.org/article/c635faa0a742491a8ce8f42bde6aeb72 https://core.ac.uk/download/pdf/291851383.pdf,http://dx.doi.org/10.5614/itbj.ict.res.appl.2014.8.2.5,,10.5614/itbj.ict.res.appl.2014.8.2.5,1916494655,,0,017-335-677-993-203; 017-815-064-018-299; 018-182-926-340-45X; 028-180-038-189-484; 030-045-112-792-346; 033-970-395-033-397; 034-497-160-604-138; 054-408-281-868-875; 059-469-169-162-785; 069-164-282-798-000; 095-691-114-276-825; 155-074-178-700-550; 170-238-670-627-975; 175-791-313-672-423; 178-883-713-153-793; 180-706-989-021-884; 183-000-233-873-221,2,true,cc-by-nd,gold 009-885-874-541-907,"Data reduction and data mining framework for digital forensic evidence: Storage, intelligence, review and archive",2014-09-17,2014,journal article,Trends and issues in crime and criminal justice,08178542,,,Darren Quick; Kim-Kwang Raymond Choo,"With the volume of digital forensic evidence rapidly increasing, this paper proposes a data reduction and data mining framework that incorporates a process of reducing data volume by focusing on a subset of information. Foreword The volume of digital forensic evidence is rapidly increasing, leading to large backlogs. In this paper, a Digital Forensic Data Reduction and Data Mining Framework is proposed. Initial research with sample data from South Australia Police Electronic Crime Section and Digital Corpora Forensic Images using the proposed framework resulted in significant reduction in the storage requirements—the reduced subset is only 0.196 percent and 0.75 percent respectively of the original data volume. The framework outlined is not suggested to replace full analysis, but serves to provide a rapid triage, collection, intelligence analysis, review and storage methodology to support the various stages of digital forensic examinations. Agencies that can undertake rapid assessment of seized data can more effectively target specific criminal matters. The framework may also provide a greater potential intelligence gain from analysis of current and historical data in a timely manner, and the ability to undertake research of trends over time.",,480,1,,Volume (computing); Data mining; Data processing; Data reduction; Project commissioning; Computer science; Process (engineering); Sample (statistics); Intelligence analysis; Digital forensics,,,,,https://apo.org.au/sites/default/files/resource-files/2014-09/apo-nid41334.pdf https://www.questia.com/library/journal/1P3-3455023131/data-reduction-and-data-mining-framework-for-digital https://apo.org.au/node/41334,https://www.questia.com/library/journal/1P3-3455023131/data-reduction-and-data-mining-framework-for-digital,,,3124983056,,0,,44,false,, 009-992-277-433-362,Artificial Intelligence In Digital Forensics,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Pooja Kadam,,,,,,Data science; Computer science; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.01,http://dx.doi.org/10.46293/4n6/2020.02.03.01,,10.46293/4n6/2020.02.03.01,3095868251,,0,,0,false,, 010-061-391-662-193,Part 2: The Phase-oriented Advice and Review Structure (PARS) for Digital Forensic Investigations,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Nina Sunde; Graeme Horsman,"Abstract This work forms the second part of a two part series providing the necessary scaffolding for the digital forensic discipline to conduct effective peer review in their laboratories and units. The first part articulated the need for a structured approach to peer review in digital forensic investigations (Horsman and Sunde, 2020). Here in part two, the Phase-oriented Advice and Review Structure (PARS) for digital forensic investigations is offered. PARS is the first documented peer review methodology for the digital forensics field, a six staged approach designed to formally support organisations and their staff in their goal of facilitating effective peer review of DF work, from investigative tasks to forensic activities and forensic analysis processes (Pollitt et al., 2018). This article discusses how the PARS methodology can be implemented, and the available options and mechanisms available to ease the interpretation of this model into existing practices. Both the early ‘Advisor’ and later ‘Reviewer’ roles in PARS are discussed and their requirements and expectations are defined. Three template documents are provided and explained: The PARS Advisors template, the PARS Advisor Brief template and the PARS Peer Review Hierarchy template, for direct use by organisations seeking to adopt the PARS methodology.",36,,301074,,Phase (combat); Structure (mathematical logic); Advice (programming); Hierarchy; Field (computer science); Computer science; Interpretation (philosophy); Knowledge management; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/di/di36.html#SundeH21 https://research.tees.ac.uk/en/publications/part-2-the-phase-oriented-advice-and-review-structure-pars-for-di https://doi.org/10.1016/j.fsidi.2020.301074 https://www.sciencedirect.com/science/article/pii/S2666281720303711,http://dx.doi.org/10.1016/j.fsidi.2020.301074,,10.1016/j.fsidi.2020.301074,3112291764,,0,000-360-120-513-679; 001-154-498-561-997; 005-232-046-693-557; 007-067-502-103-925; 007-582-851-613-954; 007-868-297-443-532; 009-512-003-529-193; 014-466-907-950-761; 019-407-699-112-721; 019-831-293-743-518; 026-774-296-742-022; 028-963-483-424-375; 029-748-683-221-796; 032-451-540-235-796; 032-697-093-668-898; 040-907-268-218-905; 040-984-917-584-42X; 043-591-471-824-055; 047-386-524-667-691; 048-045-418-215-633; 050-994-414-657-166; 052-300-124-760-580; 059-776-023-889-13X; 064-549-392-650-90X; 065-805-363-769-350; 067-950-012-629-210; 068-659-093-553-918; 070-213-303-689-705; 075-950-021-558-098; 084-749-916-494-998; 087-342-951-350-054; 093-123-873-366-081; 093-309-498-241-337; 099-377-733-522-116; 101-436-770-235-826; 102-243-142-344-71X; 103-254-848-209-392; 111-090-978-711-139; 111-488-239-742-003; 125-939-677-745-616; 132-355-634-397-986; 171-504-261-857-61X; 197-872-262-830-083; 199-745-676-923-766,10,true,cc-by-nc-nd,hybrid 010-127-508-296-844,The Linux FAT32 allocator and file creation order reconstruction,,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Wicher Minnaard,,11,3,224,233,Operating system; Stub file; Orlov block allocator; File system fragmentation; File system; Computer science; Virtual file system; Database; Everything is a file; fstab; Computer file,,,,,https://doi.org/10.1016/j.diin.2014.06.008 http://www.sciencedirect.com/science/article/pii/S1742287614000826 https://www.sciencedirect.com/science/article/pii/S1742287614000826,http://dx.doi.org/10.1016/j.diin.2014.06.008,,10.1016/j.diin.2014.06.008,2003205887,,0,016-046-803-187-724; 034-862-824-647-863; 055-967-961-527-254; 085-214-277-668-01X; 092-642-554-201-798; 095-701-116-223-192,12,false,, 010-307-492-365-961,OSINT as Tool of information Gathering In Digital Forensics,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Aditi Solanki,,,,,,Data science; Computer science; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.06,http://dx.doi.org/10.46293/4n6/2021.03.01.06,,10.46293/4n6/2021.03.01.06,3162646769,,0,,0,false,, 010-490-168-139-514,Functional Requirements for Adding Digital Forensic Readiness as a Security Component in IoT Environments,2018-03-31,2018,journal article,"International Journal on Advanced Science, Engineering and Information Technology",24606952; 20885334,Insight Society,Indonesia,Victor R. Kebande; Nickson Karie Menza; Hein S. Venter,"For every contact made on a digital device, a trace is left behind; this means that every digital device contains some form of electronic evidence that may be associated to the behaviour of the users in a given environment. This evidence can be used to prove or disprove facts if a cyber-incident is detected. However, the world has seen a shift on how devices communicate and connect as a result of increased devices and connectivity, which has led to the creation of “smart environments” where the Internet of Things (IoT) plays a key role. Still, we can harness this proliferation of digital devices and smart environments to Digital Forensic (DF) technology which might help to solve the puzzle of how proactive strategies can help to minimise the time and cost needed to conduct a digital investigation. This article introduces the Functional Requirements (FRs) and processes needed when Digital Forensic Readiness (DFR) process is employed as a security component in the IoT-based environment. The paper serves as a continuation of the initially proposed architecture for adding DFR as a security component to IoT environment. The aspects and claims presented in this paper can be used as basic building blocks for implementing DFR technologies that guarantee security in the IoT-based environment. It is worth noting again that the processes that have been defined in this paper comply with the ISO/IEC 27043: 2015 International Standard.",8,2,342,349,Architecture; Smart environment; Key (cryptography); Computer security; Computer science; Process (engineering); Component (UML); Functional requirement; TRACE (psycholinguistics); Digital forensics,,,,,https://dx.doi.org/10.18517/ijaseit.8.2.2121 https://repository.up.ac.za/handle/2263/66569 http://dx.doi.org/10.18517/ijaseit.8.2.2121 http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=2121 https://core.ac.uk/download/pdf/296919940.pdf,http://dx.doi.org/10.18517/ijaseit.8.2.2121,,10.18517/ijaseit.8.2.2121,2796411083,,0,008-124-206-643-913; 018-552-581-098-658; 021-486-901-460-202; 025-178-552-649-015; 049-308-557-360-556; 087-665-408-966-240; 124-129-640-160-197; 133-737-424-803-878,9,true,cc-by-sa,hybrid 010-607-170-706-481,Positive dental identification using tooth anatomy and digital superimposition.,2012-12-27,2012,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Raymond J. Johansen; C. Michael Bowers,"Dental identification of unknown human remains continues to be a relevant and reliable adjunct to forensic investigations. The advent of genomic and mitochondrial DNA procedures has not displaced the practical use of dental and related osseous structures remaining after destructive incidents that can render human remains unrecognizable, severely burned, and fragmented. The ability to conclusively identify victims of accident and homicide is based on the availability of antemortem records containing substantial and unambiguous proof of dental and related osseous characteristics. This case report documents the use of digital comparative analysis of antemortem dental models and postmortem dentition, to determine a dental identification. Images of dental models were digitally analyzed using Adobe Photoshop(TM) software. Individual tooth anatomy was compared between the antemortem and postmortem images. Digital superimposition techniques were also used for the comparison. With the absence of antemortem radiographs, this method proved useful to reach a positive identification in this case.",58,2,534,536,Dental anatomy; Identification (biology); Superimposition; Dentition; Dentistry; Dental Models; Orthodontics; Adobe photoshop; Dental identification; Forensic odontology; Medicine,Adobe PhotoshopTM; dental anatomy; digital superimposition; forensic odontology; forensic science; human identification; permanent molars,"Adult; Female; Forensic Dentistry/methods; Humans; Image Processing, Computer-Assisted; Models, Dental; Molar/anatomy & histology; Software",,,https://pubmed.ncbi.nlm.nih.gov/23278438/ https://www.ncbi.nlm.nih.gov/pubmed/23278438 https://www.onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.12040,http://dx.doi.org/10.1111/1556-4029.12040,23278438,10.1111/1556-4029.12040,2008151682,,0,018-803-823-779-047; 073-732-187-364-99X; 108-285-718-831-232,8,false,, 010-620-450-221-40X,Digital transformation risk management in forensic science laboratories.,2020-09-03,2020,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Eoghan Casey; Thomas R. Souvignet,"Technological advances are changing how forensic laboratories operate in all forensic disciplines, not only digital. Computers support workflow management, enable evidence analysis (physical and digital), and new technology enables previously unavailable forensic capabilities. Used properly, the integration of digital systems supports greater efficiency and reproducibility, and drives digital transformation of forensic laboratories. However, without the necessary preparations, these digital transformations can undermine the core principles and processes of forensic laboratories. Pertinent examples of problems involving technology that have occurred in laboratories are provided, along with opportunities and risk mitigation strategies, based on the authors' experiences. Forensic preparedness concentrating on digital data reduces the cost and operational disruption of responding to various kinds of problems, including misplaced exhibits, allegations of employee misconduct, disclosure requirements, and information security breaches. This work presents recommendations to help forensic laboratories prepare for and manage these risks, to use technology effectively, and ultimately strengthen forensic science. The importance of involving digital forensic expertise in risk management of digital transformations in laboratories is emphasized. Forensic laboratories that do not adopt forensic digital preparedness will produce results based on digital data and processes that cannot be verified independently, leaving them vulnerable to challenge. The recommendations in this work could enhance international standards such as ISO/IEC 17025 used to assess and accredit laboratories.",316,,110486,,Engineering management; Digital transformation; Workflow; Preparedness; Digital data; ISO/IEC 17025; Risk management; Computer science; Information security; Digital forensics,Digital transformations; Forensic digital preparedness; Forensic laboratories; Forensic preparedness; Forensic science; ISO/IEC 17025; Risk management,"Automation, Laboratory; Data Management; Digital Technology; Efficiency, Organizational; Forensic Sciences; Human Rights; Humans; Laboratories; Quality Control; Reproducibility of Results; Risk Management",,,https://serval.unil.ch/en/notice/serval:BIB_6189637BB7F5 https://www.ncbi.nlm.nih.gov/pubmed/32919163 https://pubmed.ncbi.nlm.nih.gov/32919163/ https://www.sciencedirect.com/science/article/abs/pii/S0379073820303480 https://www.sciencedirect.com/science/article/pii/S0379073820303480,http://dx.doi.org/10.1016/j.forsciint.2020.110486,32919163,10.1016/j.forsciint.2020.110486,3083409529,,0,001-794-049-244-772; 005-232-046-693-557; 005-379-880-172-40X; 005-745-292-419-100; 006-915-702-173-584; 007-208-364-460-073; 018-211-304-758-288; 019-831-293-743-518; 032-374-559-220-723; 033-241-817-699-448; 035-031-257-128-045; 046-143-775-958-052; 048-025-676-818-922; 052-308-687-231-910; 055-074-014-409-729; 064-549-392-650-90X; 067-938-325-014-282; 086-388-908-356-52X; 087-342-951-350-054; 088-568-925-253-101; 091-343-394-509-251; 091-540-399-535-662; 101-549-415-202-81X; 112-856-054-215-074; 136-697-259-803-473,9,true,cc-by,hybrid 010-687-471-708-90X,Digital Forensic Investigation on File System And Database Tampering,,2012,journal article,IOSR Journal of Engineering,22788719; 22503021,IOSR Journals,,Shweta Tripathi,"Digital forensics is the identification, extraction, analysis and documentation of digital evidence from storage media. It is relatively new technology which is increasingly becoming important as the criminals aggressively expand the use of technology. Digital information is fragile and it can be easily modified or destroyed like File system and Database tampering. In the course of the investigation, the investigator should assure that digital evidences are not modified unauthorized and authenticate submission in the court of law. Our paper explains forensic investigation procedures using a WinHex tool(10). Main focus of our paper is digital forensic investigation of different locations of windows file system and oracle database are explained. Evidence collection from hidden locations of windows file system and oracle 10g database will help the investigators in trustful and thorough investigation.",02,02,2142,221,World Wide Web; File system; Digital evidence; Digital forensic investigation; Focus (computing); Computer science; Oracle; Documentation; Database; Identification (information); Digital forensics,,,,,http://www.iosrjen.org/Papers/vol2_issue2/G022214221.pdf,http://dx.doi.org/10.9790/3021-0202214221,,10.9790/3021-0202214221,2330940547,,0,019-698-064-288-240; 025-321-851-072-69X; 055-425-122-624-954; 085-214-277-668-01X; 139-567-850-350-938,1,true,,bronze 010-841-975-744-659,"Buying drugs on a Darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data",2016-08-31,2016,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Damien Rhumorbarbe; Ludovic Staehli; Julian Broséus; Quentin Rossy; Pierre Esseiva,"Darknet markets, also known as cryptomarkets, are websites located on the Darknet and designed to allow the trafficking of illicit products, mainly drugs. This study aims at presenting the added value of combining digital, chemical and physical information to reconstruct sellers' activities. In particular, this research focuses on Evolution, one of the most popular cryptomarkets active from January 2014 to March 2015. Evolution source code files were analysed using Python scripts based on regular expressions to extract information about listings (i.e., sales proposals) and sellers. The results revealed more than 48,000 listings and around 2700 vendors claiming to send illicit drug products from 70 countries. The most frequent categories of illicit drugs offered by vendors were cannabis-related products (around 25%) followed by ecstasy (MDA, MDMA) and stimulants (cocaine, speed). The cryptomarket was then especially studied from a Swiss point of view. Illicit drugs were purchased from three sellers located in Switzerland. The purchases were carried out to confront digital information (e.g., the type of drug, the purity, the shipping country and the concealment methods mentioned on listings) with the physical analysis of the shipment packaging and the chemical analysis of the received product (purity, cutting agents, chemical profile based on minor and major alkaloids, chemical class). The results show that digital information, such as concealment methods and shipping country, seems accurate. But the illicit drugs purity is found to be different from the information indicated on their respective listings. Moreover, chemical profiling highlighted links between cocaine sold online and specimens seized in Western Switzerland. This study highlights that (1) the forensic analysis of the received products allows the evaluation of the accuracy of digital data collected on the website, and (2) the information from digital and physical/chemical traces are complementary to evaluate the practices of the online selling of illicit drugs on cryptomarkets.",267,,173,182,Advertising; Profiling (information science); Digital data; Darknet; Physical information; Chemical data; Poison control; Illicit drug; Computer security; Medicine; Added value,Cocaine; Concealment techniques; Cryptomarket; Drug profiling; Evolution market; Source codes,,,,http://www.sciencedirect.com/science/article/pii/S0379073816303620 https://www.sciencedirect.com/science/article/pii/S0379073816303620 https://core.ac.uk/display/77172586 https://serval.unil.ch/notice/serval:BIB_670B021B4620 https://serval.unil.ch/resource/serval:BIB_670B021B4620.P001/REF.pdf https://europepmc.org/article/MED/27611957 https://www.ncbi.nlm.nih.gov/pubmed/27611957/ https://core.ac.uk/download/77172586.pdf,http://dx.doi.org/10.1016/j.forsciint.2016.08.032,27611957,10.1016/j.forsciint.2016.08.032,2507674152,,0,000-966-873-477-429; 008-793-362-021-751; 016-283-115-314-004; 016-576-957-458-038; 021-632-589-849-856; 022-031-013-040-416; 028-752-000-922-100; 031-368-601-023-612; 032-972-190-406-308; 035-623-064-902-654; 038-803-590-187-31X; 039-183-999-810-949; 046-240-766-487-724; 047-609-504-430-449; 049-300-813-134-093; 049-814-540-451-269; 051-488-881-191-38X; 052-723-051-114-389; 055-249-339-598-38X; 068-102-781-279-977; 070-952-793-249-727; 071-353-020-251-034; 077-119-494-684-774; 081-055-374-627-593; 085-676-849-933-701; 090-756-377-288-88X; 093-178-658-764-94X; 096-931-449-189-148; 107-793-773-286-403; 120-060-707-517-368; 120-702-775-675-79X; 125-565-282-820-323; 141-913-443-146-631; 145-258-399-749-837; 150-325-162-873-23X; 170-170-805-020-495; 187-515-650-100-770,63,true,,green 010-963-610-208-920,"Cognitive and human factors in digital forensics: Problems, challenges, and the way forward",,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Nina Sunde; Itiel E. Dror,"Abstract Digital forensics is an important and growing forensic domain. Research on miscarriages of justice and misleading evidence, as well as various inquires in the UK and the US, have highlighted human error as an issue within forensic science. This has led to increased attention to the sources of cognitive bias and potential countermeasures within many forensic disciplines. However, the area of digital forensics has yet to pay sufficient attention to this issue. The main goal of this article is to contribute to a more scientifically sound digital forensics domain by addressing the issues of cognitive bias as a source of error. In this paper we present an analysis of seven sources of cognitive and human error specifically within the digital forensics process, and discuss relevant countermeasures. We conclude that although some cognitive and bias issues are very similar across forensic domains, others are different and dependent on the specific characteristic of the domain in question, such as digital forensics. There is a need for new directions in research with regard to cognitive and human factors in digital forensics.",29,,101,108,Domain (software engineering); Human error; Cognition; Cognitive bias; Data science; Justice (ethics); Computer science; Process (engineering); Digital forensics,,,,Norwegian Police University College,https://phs.brage.unit.no/phs-xmlui/handle/11250/2675988 https://www.sciencedirect.com/science/article/pii/S1742287619300441 https://www.duo.uio.no/handle/10852/78868 https://www.sciencedirect.com/science/article/abs/pii/S1742287619300441,http://dx.doi.org/10.1016/j.diin.2019.03.011,,10.1016/j.diin.2019.03.011,2935248465,,0,000-557-324-827-169; 001-819-537-647-480; 002-609-382-886-882; 003-168-641-529-165; 005-248-003-161-215; 005-542-560-321-688; 005-553-153-856-945; 005-715-450-998-72X; 006-851-080-715-114; 007-067-502-103-925; 007-196-753-966-726; 010-218-618-278-587; 011-267-630-776-412; 011-637-658-394-710; 011-736-096-074-814; 014-640-572-371-821; 018-182-926-340-45X; 018-345-154-485-870; 019-568-476-801-56X; 019-831-293-743-518; 030-021-909-943-264; 030-178-593-043-926; 030-313-388-601-318; 031-575-367-650-782; 037-165-077-440-310; 038-753-471-790-674; 040-710-022-171-634; 040-907-268-218-905; 042-110-216-832-385; 043-083-546-914-143; 044-487-533-779-509; 045-243-165-627-08X; 047-701-826-257-337; 049-494-674-809-588; 053-512-818-099-29X; 056-338-951-922-757; 056-511-125-319-151; 058-773-447-408-598; 064-549-392-650-90X; 065-805-363-769-350; 067-540-728-461-044; 074-592-128-180-546; 083-287-763-665-02X; 084-865-558-626-927; 088-142-137-151-413; 088-491-668-540-317; 089-143-511-793-784; 093-309-498-241-337; 095-304-046-614-403; 096-599-019-134-284; 098-950-277-295-601; 102-599-064-891-853; 105-719-937-171-816; 106-885-306-836-498; 108-249-505-350-920; 115-602-945-595-68X; 120-568-182-864-304; 122-596-518-152-484; 125-378-692-136-213; 134-927-490-231-285; 148-223-435-969-407; 164-884-026-141-973; 167-366-167-352-677; 182-670-398-460-931; 190-065-821-748-92X,48,true,cc-by-nc-nd,hybrid 010-985-077-415-59X,Digital media triage with bulk data analysis and bulk_extractor,,2013,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Simson L. Garfinkel,"Bulk data analysis eschews file extraction and analysis, common in forensic practice today, and instead processes data in ""bulk,"" recognizing and extracting salient details (""features"") of use in the typical digital forensics investigation. This article presents the requirements, design and implementation of the bulk_extractor, a high-performance carving and feature extraction tool that uses bulk data analysis to allow the triage and rapid exploitation of digital media. Bulk data analysis and the bulk_extractor are designed to complement traditional forensic approaches, not replace them. The approach and implementation offer several important advances over today's forensic tools, including optimistic decompression of compressed data, context-based stop-lists, and the use of a ""forensic path"" to document both the physical location and forensic transformations necessary to reconstruct extracted evidence. The bulk_extractor is a stream-based forensic tool, meaning that it scans the entire media from beginning to end without seeking the disk head, and is fully parallelized, allowing it to work at the maximum I/O capabilities of the underlying hardware (provided that the system has sufficient CPU resources). Although bulk_extractor was developed as a research prototype, it has proved useful in actual police investigations, two of which this article recounts.",32,,56,72,Data mining; Forensic science; Digital media; Information retrieval; Path (computing); Context (language use); Computer science; Complement (set theory); Digital forensics,,,,NSF; Department of Defense,https://dl.acm.org/doi/10.5555/2748150.2748581 https://simson.net/clips/academic/2013.COSE.bulk_extractor.pdf https://core.ac.uk/display/82510361 http://digitalcorpora.org/downloads/bulk_extractor/doc/2013.COSE.bulk_extractor.pdf https://www.sciencedirect.com/science/article/pii/S0167404812001472 http://www.sciencedirect.com/science/article/pii/S0167404812001472 https://dblp.uni-trier.de/db/journals/compsec/compsec32.html#Garfinkel13 https://core.ac.uk/download/pdf/82510361.pdf,http://dx.doi.org/10.1016/j.cose.2012.09.011,,10.1016/j.cose.2012.09.011,2114314514,,1,004-652-388-189-304; 009-832-452-035-773; 018-618-238-562-758; 021-039-461-635-181; 027-265-141-482-204; 028-821-728-710-895; 030-089-078-880-151; 033-877-222-136-260; 042-793-944-798-15X; 043-093-846-816-675; 045-642-028-060-994; 047-630-600-014-492; 051-165-387-606-715; 056-012-069-300-774; 058-212-255-814-030; 061-549-181-856-861; 071-079-281-371-668; 097-567-011-227-46X; 101-436-770-235-826; 117-033-532-874-520; 128-940-875-499-986; 131-807-250-432-699; 134-721-566-293-80X; 134-927-490-231-285; 135-921-410-921-315; 136-037-184-633-102; 142-884-607-464-932; 152-771-716-159-330; 155-226-042-989-551; 159-785-975-003-375; 168-819-441-615-181,78,true,cc-by-nc-nd,hybrid 011-013-554-923-15X,Red-Teaming Labs,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Nixon Paulson; Jefin Francis; Christy Mathew,,,,,,,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.10,http://dx.doi.org/10.46293/4n6/2021.03.02.10,,10.46293/4n6/2021.03.02.10,3162253978,,0,,0,false,, 011-051-740-313-213,Digital forensics XML and the DFXML toolset,,2012,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Simson L. Garfinkel,"Digital Forensics XML (DFXML) is an XML language that enables the exchange of structured forensic information. DFXML can represent the provenance of data subject to forensic investigation, document the presence and location of file systems, files, Microsoft Windows Registry entries, JPEG EXIFs, and other technical information of interest to the forensic analyst. DFXML can also document the specific tools and processing techniques that were used to produce the results, making it possible to automatically reprocess forensic information as tools are improved. This article presents the motivation, design, and use of DFXML. It also discusses tools that have been creased that both ingest and emit DFXML files. Published by Elsevier Ltd.",8,3,161,174,World Wide Web; JPEG; Technical information; Data subject; Computer science; Microsoft Windows; Computer forensics; Digital forensics; XML,,,,,https://www.sciencedirect.com/science/article/pii/S1742287611000910 https://dblp.uni-trier.de/db/journals/di/di8.html#Garfinkel12 http://simson.net/ref/2011/dfxml.pdf https://core.ac.uk/display/36736443,http://dx.doi.org/10.1016/j.diin.2011.11.002,,10.1016/j.diin.2011.11.002,2119668875,,0,004-652-388-189-304; 007-600-137-439-078; 010-891-876-474-089; 017-792-082-122-197; 024-216-399-693-64X; 024-735-069-822-749; 033-241-817-699-448; 035-419-064-781-495; 039-673-098-036-580; 047-955-569-661-805; 060-650-561-577-338; 061-549-181-856-861; 089-513-628-343-627; 098-945-991-157-04X; 104-758-205-558-797; 124-473-078-841-747; 126-889-572-055-698; 144-739-881-928-041; 186-993-770-394-232,73,true,,green 011-115-133-098-072,Prelim i - Editorial Board,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,43,,301466,301466,Editorial board; Computer science; Library science,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00147-0,,10.1016/s2666-2817(22)00147-0,,,0,,0,true,,bronze 011-153-981-274-232,Exploring Myths in Digital Forensics: Separating Science From Ritual,2017-10-01,2017,journal article,International Journal of Interdisciplinary Telecommunications and Networking,19418663; 19418671,IGI Global,,Gary C. Kessler; Gregory H. Carlton,"Digital forensic methodology deviates significantly relative to the methods of other forensic sciences for numerous practical reasons, and it has been largely influenced by factors derived from the inception and evolution of this relatively new and rapidly changing field. Digital forensics methodology was developed more by practitioners in its early days rather than by computer scientists. This led to accepted best practices in the field that may not represent the best or, at least, tested, science. This paper explores some of these differences in the practice and evolution between digital and other forensic sciences, and recommends scientific approaches to apply to many digital forensic practice rituals.",9,4,1,9,Internet privacy; Best practice; Data science; Field (computer science); Computer science; Mythology; Computer forensics; Digital forensics,,,,,https://works.bepress.com/gary_kessler/82/ https://commons.erau.edu/cgi/viewcontent.cgi?article=2766&context=publication https://dl.acm.org/doi/10.4018/IJITN.2017100101 https://commons.erau.edu/publication/1614/ https://dblp.uni-trier.de/db/journals/ijitn/ijitn9.html#KesslerC17 https://ideas.repec.org/a/igg/jitn00/v9y2017i4p1-9.html https://www.igi-global.com/chapter/exploring-myths-in-digital-forensics/252700 https://doi.org/10.4018/IJITN.2017100101,http://dx.doi.org/10.4018/ijitn.2017100101,,10.4018/ijitn.2017100101,2750191588,,0,008-909-091-746-356; 013-829-755-696-381; 019-831-293-743-518; 027-062-355-180-009; 049-971-447-533-250; 067-429-157-490-697; 081-447-017-308-327; 094-227-042-630-139; 116-704-244-437-017; 123-275-701-676-787; 124-466-422-768-986; 133-508-126-407-763; 167-398-164-200-13X,0,false,, 011-285-275-099-160,Cyber attacks on IoT devices and preparedness for Industry 4.0,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,N Kala Baskar,,,,,,Business; Preparedness; Industry 4.0; Computer security; Internet of Things,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.16,http://dx.doi.org/10.46293/4n6/2020.02.04.16,,10.46293/4n6/2020.02.04.16,3097838880,,0,,0,false,, 011-452-215-957-659,The analysis of Windows 7·8 IconCache.db and its application,2014-02-28,2014,journal article,Journal of the Korea Institute of Information Security and Cryptology,15983986,Korea Institute of Information Security and Cryptology,,Chan-Youn Lee; Sangjin Lee,"Since anti-forensics have been developed in order to avoid digital forensic investigation, the forensic methods for analyzing anti-forensic behaviors have been studied in various aspects. Among the factors for user activity analysis,""Iconcache.db"" files, which have the icon information of applications, provides meaningful information for digital forensic investigation. This paper illustrates the features of IconCache.db files and suggests the countermeasures against anti-forensics utilizing them.",24,1,135,144,Human–computer interaction; Order (business); Icon; Digital forensic investigation; Computer science; Digital forensics,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2014_v24n1_135 http://koreascience.or.kr:80/article/JAKO201409739050479.pdf,http://dx.doi.org/10.13089/jkiisc.2014.24.1.135,,10.13089/jkiisc.2014.24.1.135,2114859151,,0,040-393-580-637-973; 064-062-472-395-879; 138-097-495-143-351; 142-226-580-142-17X; 178-802-460-523-444,0,true,,bronze 011-687-923-266-863,What’s in the Cloud? - An examination of the impact of cloud storage usage on the browser cache.,,2020,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Graeme Horsman,,15,1,3,,Operating system; Cache; Cloud storage; Computer science; Cloud computing; Digital forensics,,,,,https://research.tees.ac.uk/en/publications/whats-in-the-cloud-an-examination-of-the-impact-of-cloud-storage- https://commons.erau.edu/cgi/viewcontent.cgi?article=1592&context=jdfsl https://commons.erau.edu/jdfsl/vol15/iss1/3/,http://dx.doi.org/10.15394/jdfsl.2020.1592,,10.15394/jdfsl.2020.1592,2990692202,,0,057-364-465-490-560,0,true,cc-by-nc,gold 011-755-498-862-139,RPAS Forensic Validation Analysis Towards a Technical Investigation Process: A Case Study of Yuneec Typhoon H.,2019-07-24,2019,journal article,"Sensors (Basel, Switzerland)",14248220; 14243210,Multidisciplinary Digital Publishing Institute (MDPI),Switzerland,Fahad E. Salamh; Umit Karabiyik; Marcus K. Rogers,"The rapid pace of invention in technology and the evolution of network communication has produced a new lifestyle with variety of opportunities and challenges. Remotely Piloted Aerial Systems (RPAS) technology, which includes drones, is one example of a recently invented technology that requires the collection of a solid body of defensible and admissible evidence to help eliminate potential real-world threats posed by their use. With the advent of smartphones, there has been an increase in digital forensic investigation processes developed to assist specialized digital forensic investigators in presenting forensically sound evidence in the courts of law. Therefore, it is necessary to apply digital forensic techniques and procedures to different types of RPASs in order to create a line of defense against new challenges, such as aerial-related incidents, introduced by the use of these technologies. Drone operations by bad actors are rapidly increasing and these actors are constantly developing new approaches. These criminal operations include invasion of privacy, drug smuggling, and terrorist activities. Additionally, drone crashes and incidents raise significant concerns. In this paper, we propose a technical forensic process consisting of ten technical phases for the analysis of RPAS forensic artifacts, which can reduce the complexity of the identification and investigation of drones. Using the proposed technical process, we analyze drone images using the Computer Forensics Reference Datasets (CFReDS) and present results for the Typhoon H aerial vehicle manufactured by Yuneec, Inc. Furthermore, this paper explores the availability and value of digital evidence that would allow a more practical digital investigation to be able to build an evidence-based experience. Therefore, we particularly focus on developing a technical drone investigation process that can be applied to various types of drones.",19,15,3246,,Variety (cybernetics); Forensic science; Admissible evidence; Data science; Digital evidence; Digital forensic investigation; Computer science; Process (engineering); Computer forensics; Drone; Identification (information); Digital forensics,Yuneec Typhoon H; digital forensics; drone forensics; forensic process,,,,https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6695682 http://ui.adsabs.harvard.edu/abs/2019Senso..19.3246S/abstract https://doi.org/10.3390/s19153246 https://dblp.uni-trier.de/db/journals/sensors/sensors19.html#SalamhKR19 https://pubmed.ncbi.nlm.nih.gov/31344784/ https://www.mdpi.com/1424-8220/19/15/3246/htm https://www.mdpi.com/1424-8220/19/15/3246/pdf http://dblp.uni-trier.de/db/journals/sensors/sensors19.html#SalamhKR19,http://dx.doi.org/10.3390/s19153246,31344784,10.3390/s19153246,2963103350,PMC6695682,0,008-667-688-301-190; 010-084-169-561-57X; 017-394-293-618-324; 029-563-465-806-154; 029-610-148-239-706; 037-781-439-537-419; 079-391-976-487-576; 089-691-112-427-434; 091-809-074-246-087; 146-395-859-713-673,11,true,cc-by,gold 011-811-399-982-358,Personal Identification Using Radiological Technology and Advanced Digital Imaging: Expectations and Challenges,2021-10-21,2021,journal article,Journal of Forensic Research,21577145,,,Junji Morishita; Noriaki Ikeda; Yasuyuki Ueda Yongsu Yoon; Akiko Tsuji,"Novel techniques for personal identification are being researched using the latest available imaging devices. These studies may assist with disaster victim; identification in future mass disasters. Studies have already been conducted on the use of advanced imaging for positive identification in forensic pathology using radiographic image recognition and other identification or authentication techniques. These techniques are based on information extracted from biological fingerprints through digital radiography and other advanced imaging techniques such as CT and MRI. Although, image matching and identification in advanced digital images is still in the initial stages of development, it has shown promising results in preventing medical accidents and for identifying specific patients. These techniques may be effective for positive identification in the fields of forensic pathology, forensic odontology, and forensic anthropology.",12,8,1,3,Digital imaging; Authentication; Forensic anthropology; Medical physics; Digital radiography; Radiological technology; Image matching; Computer science; Digital image; Identification (information),,,,,https://www.hilarispublisher.com/open-access/personal-identification-using-radiological-technology-and-advanced-digital-imaging-expectations-and-challenges.pdf https://www.hilarispublisher.com/abstract/personal-identification-using-radiological-technology-and-rnadvanced-digital-imaging-expectations-and-challenges-75138.html,https://www.hilarispublisher.com/abstract/personal-identification-using-radiological-technology-and-rnadvanced-digital-imaging-expectations-and-challenges-75138.html,,,3205281784,,0,,0,false,, 012-089-942-653-099,Fast contraband detection in large capacity disk drives,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Philip Penrose; William J Buchanan; Richard Macfarlane,"In recent years the capacity of digital storage devices has been increasing at a rate that has left digital forensic services struggling to cope. There is an acknowledgement that current forensic tools have failed to keep up. The workload is such that a form of 'administrative triage' takes place in many labs where perceived low priority jobs are delayed or dropped without reference to the data itself. In this paper we investigate the feasibility of first responders performing a fast initial scan of a device by sampling on the device itself. A Bloom filter is used to store the block hashes of large collections of contraband data. We show that by sampling disk clusters, we can achieve 99.9% accuracy scanning for contraband data in minutes. Even under the constraints imposed by low specification legacy equipment, it is possible to scan a device for contraband with a known and controllable margin of error in a reasonable time. We conclude that in this type of case it is feasible to boot the device into a forensically sound environment and do a pre-imaging scan to prioritise the device for further detailed investigation.",12,,S22,S29,Sampling (signal processing); Bloom filter; Block (data storage); Acknowledgement; Workload; Computer science; Margin of error; Digital forensics; Computer hardware; Hash function,,,,,https://dblp.uni-trier.de/db/journals/di/di12.html#PenroseBM15 https://core.ac.uk/display/81123678 https://doi.org/10.1016/j.diin.2015.01.007 https://www.sciencedirect.com/science/article/pii/S1742287615000080 https://core.ac.uk/download/74028968.pdf,http://dx.doi.org/10.1016/j.diin.2015.01.007,,10.1016/j.diin.2015.01.007,2139164455,,0,003-982-227-180-136; 007-213-544-126-482; 010-985-077-415-59X; 030-121-862-351-330; 032-451-540-235-796; 038-086-141-413-386; 058-052-081-943-595; 061-317-181-338-930; 073-524-789-009-542; 074-012-101-472-334; 090-752-043-508-733; 093-482-620-988-83X; 109-598-947-309-943; 116-317-110-770-148; 128-940-875-499-986; 131-516-331-360-906; 134-927-490-231-285; 141-887-999-680-518,11,true,cc-by-nc-nd,hybrid 012-100-302-576-245,The Application of Exif in Digital Photo Authentication,,2012,journal article,Chinese Journal of Forensic Sciences,16712072,,,Shi Shao-pei,"Exif analysis of digital photos is an important aspect in image authentication.It is crucial to thoroughly extract and fully apply the Exif information in the examination.Based on the analysis of JPEG format,the extraction method of Exif information is presented and the application of the thumbnails and image quality in Exif is discussed.",,,,,Artificial intelligence; Thumbnail; Digital photography; Authentication; JPEG; Extraction methods; Computer vision; Computer science; Image quality,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201205011.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201205011.htm,,,2368985265,,0,,0,false,, 012-408-224-860-371,Audio Forensics on Smartphone with Digital Forensics Research Workshop (DFRWS) Method,2021-03-20,2021,journal article,CommIT (Communication and Information Technology) Journal,24607010; 19792484,Universitas Bina Nusantara,,Sunardi Sunardi; Riadi; Rusydi Umar; Muhammad Fauzan Gustafi,"Audio is one of the digital items that can reveal a happened case. However, audio evidence can also be manipulated and changed to hide information. Forensics audio is a technique to identify the sound’s owner from the audio using pitch, formant, and spectrogram parameters. The conducted research examines the similarity of the original sound with the manipulated voice to determine the owner of the sound. It analyzes the level of similarity or identical sound using spectrogram analysis with the Digital Forensics Research Workshop (DFRWS) Method. The research objects are original and manipulated files. Both files are in mp3 format, which is encoded to WAV format. Then, the live forensics method is used by picking up the data on a smartphone. Several applications are also used. The results show that the research successfully gets digital evidence on a smartphone with the Oxygen Forensic application. It extracts digital evidence in the form of two audio files and two video files. Then, by the hashing process, the four obtained files are proven to be authentic. Around 90% of the data are identical to the original voice recording. Only 10% of the data are not identical.",15,1,41,47,Similarity (geometry); Formant; Information retrieval; Audio forensics; Digital evidence; Computer science; Spectrogram; Digital forensics; Process (computing); Hash function,,,,,https://journal.binus.ac.id/index.php/commit/article/view/6739 https://journal.binus.ac.id/index.php/commit/article/download/6739/4061,http://dx.doi.org/10.21512/commit.v15i1.6739,,10.21512/commit.v15i1.6739,3155633725,,0,003-859-311-319-037; 004-872-169-627-620; 012-448-728-338-495; 014-392-524-539-984; 016-895-117-049-07X; 018-131-159-478-609; 032-965-475-729-463; 044-748-607-433-299; 048-141-687-795-752; 066-723-990-557-549; 070-740-822-724-693; 080-380-859-922-809; 086-275-312-205-017; 086-306-719-131-186; 090-025-387-755-139; 110-093-106-787-619; 124-980-593-548-795; 156-266-881-506-824,0,true,cc-by-sa,gold 012-459-130-312-50X,Digital Forensic Tools,,2012,journal article,IOSR Journal of Engineering,22788719; 22503021,IOSR Journals,,Vishal R. Ambhire,"Digital Forensics has rapidly evolved over the last decade and continues to gain significance in both the law enforcement and the scientific community. The subject of digital forensics can be quite challenging. Digital forensics is in its infancy and teaching digital forensics includes the techniques as well as the tools that assist in the process. This paper provides an overview of Digital Forensics methodologies, modeling, analysis and applications.",02,03,392,398,Subject (documents); Law enforcement; Computer security; Computer science; Process (engineering); Computer forensics; Digital forensics,,,,,http://www.iosrjen.org/Papers/vol2_issue3/D023392398.pdf,http://dx.doi.org/10.9790/3021-0203392398,,10.9790/3021-0203392398,2330756720,,0,007-790-059-029-953; 019-831-293-743-518; 051-380-288-368-274,17,true,,bronze 012-515-256-028-110,A note on digital dental radiography in forensic odontology.,,2014,journal article,Journal of forensic dental sciences,09751475,,India,Sher-Lin Chiam,"Digital dental radiography, intraoral and extraoral, is becoming more popular in dental practice. It offers convenience, such as lower exposure to radiation, ease of storing of images, and elimination of chemical processing. However, it also has disadvantages and drawbacks. One of these is the potential for confusion of the orientation of the image. This paper outlines one example of this, namely, the lateral inversion of the image. This source of confusion is partly inherent in the older model of phosphor storage plates (PSPs), as they allow both sides to be exposed without clue to the fact that the image is acquired on the wrong side. The native software allows digital manipulation of the X-ray image, permitting both rotation and inversion. Attempts to orientate the X-ray according to the indicator incorporated on the plate can then sometimes lead to inadvertent lateral inversion of the image. This article discusses the implications of such mistakes in dental digital radiography to forensic odontology and general dental practice.",6,3,197,201,Artificial intelligence; Dentistry; Dental radiography; Confusion; Digital radiography; Dental digital radiography; Dental practice; Forensic odontology; Computer vision; Medicine,Forensic odontology; dental; digital radiography; identification,,,,http://www.jfds.org/article.asp?issn=0975-1475;year=2014;volume=6;issue=3;spage=197;epage=201;aulast= http://www.jfds.org/article.asp?issn=0975-1475;year=2014;volume=6;issue=3;spage=197;epage=201;aulast=;type=2 https://pubmed.ncbi.nlm.nih.gov/25177144/ https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4142412,http://dx.doi.org/10.4103/0975-1475.137072,25177144,10.4103/0975-1475.137072,2263591821,PMC4142412,0,008-808-484-847-913; 009-388-146-311-655; 010-187-630-340-102; 011-993-115-696-078; 013-370-437-817-823; 016-280-565-793-109; 018-416-669-363-552; 020-549-519-272-496; 021-933-004-881-201; 023-206-215-450-817; 040-489-203-925-132; 041-000-684-146-868; 045-469-044-155-700; 048-243-629-690-693; 053-497-499-142-760; 055-269-570-855-201; 056-100-946-880-281; 073-732-187-364-99X; 082-409-255-188-075; 084-753-272-397-27X; 088-170-464-779-599,12,true,, 012-564-492-558-122,Knowledge Management as a Strategic Asset in Digital Forensic Investigations,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Nickson M. Karie; Victor R. Kebande,,7,1,10,20,Strategic asset allocation; Computer science; Wireless; Knowledge management; Digital forensics,,,,,http://www.sdiwc.net/digital-library/knowledge-management-as-a-strategic-asset-in-digital-forensic-investigations.html,http://dx.doi.org/10.17781/p002311,,10.17781/p002311,2772940474,,0,016-123-869-009-118; 023-709-114-205-69X; 066-364-703-156-549; 081-140-064-081-587; 084-910-509-998-37X; 098-343-516-701-239; 104-983-130-853-724; 111-061-578-674-84X; 111-090-978-711-139; 111-277-557-636-345; 131-853-581-617-863; 140-821-103-436-654; 159-513-941-346-557; 174-186-817-525-708,5,false,, 012-676-496-211-536,Crowdsourcing forensics: Creating a curated catalog of digital forensic artifacts.,2022-07-11,2022,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Eoghan Casey; Lam Nguyen; Jeffrey Mates; Scott Lalliss,"The increasing volume, variety, velocity, distribution, structural intricacy, and complexity of use of digital evidence can make it difficult for practitioners to find and understand the most forensically useful information (Casey E. Digital evidence and computer crime: Forensic science, computers, and the Internet. Academic Press; 2011. p. 31; Pollitt M. The hermeneutics of the hard drive: Using narratology, natural language processing, and knowledge management to improve the effectiveness of the digital forensic process [PhD dissertation]. University of Central Florida; 2011). Digital forensic practitioners currently search for information and solutions in an ad hoc manner, leading to results that are unstructured, unverified, and sometimes incomplete. As a result, certain digital evidence is being missed or misinterpreted. To mitigate risks of knowledge gaps, there is a pressing need for a systematic mechanism that practitioners can use to codify and combine their collective knowledge. This work presents the design and development of a solution that catalogs crowdsourced knowledge of digital forensic artifacts in a well-structured, easily searchable form to support efficient and automated extraction of pertinent information, improving availability and reliability of interpretation of artifacts (general acceptance). Technical implementation and artifact curation are discussed with illustrative examples and recommendations for future work.",67,5,1846,1857,Digital forensics; Computer science; Crowdsourcing; Digital evidence; Data science; Artifact (error); Variety (cybernetics); The Internet; Process (computing); Computer forensics; World Wide Web,crowdsourcing forensics; digital forensic artifact; digital transformation; forensic technology innovation; general acceptance; tool testing automation,Artifacts; Crowdsourcing; Forensic Medicine; Forensic Sciences/methods; Reproducibility of Results,,American Academy of Forensic Sciences,,http://dx.doi.org/10.1111/1556-4029.15053,35816182,10.1111/1556-4029.15053,,PMC9543441,0,012-676-496-211-536; 019-508-480-187-000; 028-399-721-856-065; 049-182-076-079-260,1,true,, 012-713-966-070-716,Advances of mobile forensic procedures in Firefox OS,,2014,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Mohd Najwadi Yusoff; Ramlan Mahmod; Ali Dehghantanha; Mohd Taufik Abdullah,"The advancement of smartphone technology has ; attracted many companies in developing mobile ; operating system (OS). Mozilla Corporation recently ; released Linux-based open source mobile OS, named ; Firefox OS. The emergence of Firefox OS has created ; new challenges, concentrations and opportunities for ; digital investigators. In general, Firefox OS is designed ; to allow smartphones to communicate directly with ; HTML5 applications using JavaScript and newly ; introduced WebAPI. However, the used of JavaScript ; in HTML5 applications and solely no OS restriction ; might lead to security issues and potential exploits. ; Therefore, forensic analysis for Firefox OS is urgently ; needed in order to investigate any criminal intentions. ; This paper will present an overview and methodology ; of mobile forensic procedures in forensically sound ; manner for Firefox OS.",3,4,183,199,Web API; World Wide Web; Exploit; Mobile operating system; Open source; Computer science; JavaScript; HTML5,,,,,http://psasir.upm.edu.my/id/eprint/36337/ http://sdiwc.net/digital-library/advances-of-mobile-forensic-procedures-in-firefox-os https://usir.salford.ac.uk/id/eprint/33890/?template=banner https://usir.salford.ac.uk/33890/1/advances%2Dof%2Dmobile%2Dforensic%2Dprocedures%2Din%2Dfirefox%2Dos.pdf https://core.ac.uk/download/153816801.pdf,http://dx.doi.org/10.17781/p001338,,10.17781/p001338,2073010250,,0,000-116-031-001-044; 003-504-554-245-316; 005-899-402-239-840; 008-271-908-703-378; 010-088-513-928-018; 012-804-363-467-443; 013-116-045-532-286; 013-930-958-675-421; 014-113-295-980-025; 014-510-444-730-433; 018-971-845-492-242; 019-960-255-195-267; 023-767-546-806-478; 025-487-313-702-455; 026-201-331-634-716; 026-641-935-890-517; 030-351-009-711-953; 030-674-871-669-121; 031-982-129-275-33X; 039-392-039-766-101; 049-693-826-680-544; 049-979-701-385-094; 065-459-442-784-779; 066-214-056-369-914; 068-192-150-986-714; 069-374-237-530-780; 070-565-865-506-850; 073-910-371-295-970; 074-933-143-629-826; 075-268-039-596-63X; 079-699-370-692-859; 082-520-594-872-109; 084-203-949-816-952; 085-503-013-586-695; 092-043-845-339-506; 097-103-869-237-065; 098-520-592-151-771; 099-261-139-480-588; 102-182-774-566-752; 102-511-394-465-006; 107-065-661-568-240; 123-308-339-215-803; 142-657-351-097-509; 154-808-033-424-405; 158-871-132-407-288; 159-516-414-584-397; 163-009-701-904-62X,14,true,,green 012-753-117-168-379,State of the Field: Digital History,2020-05-14,2020,journal article,History,00182648; 1468229x,Wiley,United States,C. Annemieke Romein; Max Kemman; Julie M. Birkholz; James Baker; Michel de Gruijter; Albert Meroño-Peñuela; Thorsten Ries; Ruben Ros; Stefania Scagliola,"Computing and the use of digital sources and resources is an everyday and essential practice in current academic scholarship. The present article gives a concise overview of approaches and methods within digital historical scholarship, focussing on the question: How have the Digital Humanities evolved and what has that evolution brought to historical scholarship? We begin by discussing techniques in which data are generated and machine searchable, such as OCR/HTR, born-digital archives, computer vision, scholarly editions, and Linked Data. In the second section, we provide examples of how data is made more accessible through quantitative text and network analysis. We close with a section on the need for hermeneutics and data-awareness in digital historical scholarship.; ; The technologies described in this article have had varying degrees of effect on historical scholarship, usually in indirect ways. For example, technologies such as OCR and search engines may not be directly visible in a historical argument; however, these technologies do shape how historians interact with sources and whether sources can be accessed at all. It is with this article that we aim to start to take stock of the digital approaches and methods used in historical scholarship which may serve as starting points for scholars to understand the digital turn in the field and how and when to implement such approaches in their work.",105,365,291,312,Sociology; Digital history; Digital humanities; Data science; Scholarship; Network analysis; Hermeneutics; Linked data,,,,Fonds Wetenschappelijk Onderzoek; H2020 European Research Council,https://onlinelibrary.wiley.com/doi/pdf/10.1111/1468-229X.12969 https://onlinelibrary.wiley.com/doi/full/10.1111/1468-229X.12969 https://www.narcis.nl/publication/RecordID/oai%3Aresearch.vu.nl%3Apublications%2F9bb52f83-56b9-4b03-b4b7-c9402a7ae95f https://biblio.ugent.be/publication/8639239/file/8704801.pdf http://sro.sussex.ac.uk/id/eprint/89927/ https://biblio.ugent.be/publication/8639239 https://research.vu.nl/en/publications/state-of-the-field-digital-history https://core.ac.uk/download/287601121.pdf,http://dx.doi.org/10.1111/1468-229x.12969,,10.1111/1468-229x.12969,2995864995,,0,,7,true,cc-by,hybrid 012-772-407-519-521,Digital image fraudulence: A curse to forensic odontology.,,2018,journal article,Journal of forensic dental sciences,09751475,Informatics Publishing Limited,India,Geeta Karyakarte; Alka Dive; Ashish Bodhade; Shubhangi Khandekar,"In today's era of forensic investigations, hard copies of forensic data have been replaced by digital records. However, wide availability of image processing software makes digital image manipulation an easy and low-cost way to distort or conceal facts. This review article aims to understand fraudulence in the digital records in forensic odontology and the various ways to detect as well as prevent it to an appreciable extent. Types of image fraudulence, ways to detect this fraudulence, and measures to prevent it to an appreciable extent have been discussed. Knowledge about digital image fraudulence, detection, and prevention is the desperate need of the hour in today's technology-driven forensic investigations. This review article attempts to focus on this pestering issue and aid the evolving technologies driven by great needs for valid forensic technique trying to claw out their way through the malignant fraudulence rooted in today's evolving digitization.",10,2,67,70,Data science; Digitization; Curse; Image processing software; Digital records; Forensic odontology; Focus (computing); Computer science; Digital image,Digital image; forensic odontology; fraudulence; investigations,,,,https://www.jfds.org/article.asp?issn=0975-1475;year=2018;volume=10;issue=2;spage=67;epage=70;aulast=Karyakarte;type=2 https://europepmc.org/article/PMC/PMC6344785 https://pubmed.ncbi.nlm.nih.gov/30745779/ http://www.jfds.org/article.asp?issn=0975-1475;year=2018;volume=10;issue=2;spage=67;epage=70;aulast=Karyakarte https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6344785,http://dx.doi.org/10.4103/jfo.jfds_16_18,30745779,10.4103/jfo.jfds_16_18,2908784086,PMC6344785,0,005-390-140-295-540; 008-390-936-800-337; 008-492-595-740-053; 008-711-761-932-497; 027-871-423-903-054; 140-241-199-301-269; 140-836-414-294-667; 155-899-306-652-415; 192-530-015-339-025,2,true,cc-by-nc-sa,green 012-976-343-182-644,Implementation of Image Enhancement Algorithm for Image Forensics using Mathlab,2020-02-14,2020,journal article,Jurnal Online Informatika,25279165; 25281682,Sunan Gunung Djati State Islamic University of Bandung,,Fauzan Novaldi Suteja; Eka Wahyu Hidayat; Nur Widiyasono,"The purpose of this journal is to explain the implementation of the image enhancement algorithm for image forensics. Image Forensic deals with the types of digital evidence in the form of digital image files. One of the most commonly used digital devices in providing digital evidence for forensic analysis is CCTV (Closed-Circuit Television). CCTV images have a low quality such as noise, blur, lack of light intensity, etc., so that the image must be enhanced so that forensic analysis can be done. To enhance image quality, an application is needed by applying the image enhancement algorithm. The algorithm applied to the application is a Low Pass Filter to increase low pixel intensity, High Pass Filter to increase high pixel intensity, Median Filter to replaces the original pixel value with the pixel center value of the image, Mean Filter to replaces the original pixel value with a value the average pixel of the image, the Gaussian Filter for reducing noise in the image, the Wiener Filter to reduce blur in the image, the Histogram Equalization spreads the image histogram value, Contrast Stretching to stretch the contrast intensity in the image and Bicubic Interpolation to increase the image size and resize the image. In this study, the application was built using MATLAB and the testing process for each algorithm was based on Timing-Run, MSE and PSNR parameters. From the test, the average MSE value is 1058.512083 and the PSNR value is 541.61875 dB, which means that the resulting image has a fairly high level of similarity and the average time needed to process the algorithm for the image is 0.114627915 seconds.",4,2,79,84,Algorithm; Histogram equalization; High-pass filter; Pixel; Image resolution; Computer science; Digital image; Image quality; Median filter; Image histogram,,,,,http://join.if.uinsgd.ac.id/index.php/join/article/view/314 https://join.if.uinsgd.ac.id/index.php/join/article/download/314/137 https://core.ac.uk/download/pdf/295600540.pdf,http://dx.doi.org/10.15575/join.v4i2.314,,10.15575/join.v4i2.314,3006539061,,0,,0,true,cc-by-nc-nd,gold 013-063-668-345-122,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,36,,301158,301158,Editorial board; Political science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00063-9,,10.1016/s2666-2817(21)00063-9,,,0,,0,true,,bronze 013-370-475-929-519,Digital Forensic Investigation for Non-Volatile Memory Architecture by Hybrid Evaluation Based on ISO/IEC 27037:2012 and NIST SP800-86 Framework,2022-02-22,2022,journal article,IT Journal Research and Development,25284053; 25284061,UIR Press,,Rizdqi Akbar Ramadhan; Panji Rachmat Setiawan; Dedy Hariyadi,"In the implementation of Digital Forensics, one of the derivatives of practice is the handling of Digital Evidence. Handling Digital Evidence requires important steps and procedures. Digital evidence is a source of artifacts in handling a digital-based crime case, one of which comes from digital storage. In this research, the author will design a framework for Digital Forensic investigations by simulating digital evidence in the form of a non-volatile architecture. The reference commonly used by researchers in previous articles is the National Institute of Justice (NIST). The framework is a reference and steps in the practice of acquiring digital evidence. The purpose of designing this framework is as a legal procedure that is specifically implemented in the practice of acquiring non-volatile digital evidence. In the design, the author conducted a literature study on the NIST SP 800-86 and ISO 27037:2012 standards and then combined them in a hybrid terminology. The output of this research is to combine the two standards to become framework as reference for handling and investigating Digital Forensic science.",,,162,168,Digital forensics; NIST; Digital evidence; Terminology; Computer science; Architecture; Software engineering; Data science; Computer security; Art; Linguistics; Philosophy; Natural language processing; Visual arts,,,,,,http://dx.doi.org/10.25299/itjrd.2022.8968,,10.25299/itjrd.2022.8968,,,0,,1,true,cc-by-sa,gold 013-473-351-226-135,An automated multispecies bioacoustics sound classification method based on a nonlinear pattern: Twine-pat,,2022,journal article,Ecological Informatics,15749541; 18780512,Elsevier BV,Netherlands,Erhan Akbal; Sengul Dogan; Turker Tuncer,,68,,101529,101529,Bioacoustics; Computer science; Artificial intelligence; Classifier (UML); Pattern recognition (psychology); Feature (linguistics); Feature extraction; Machine learning; Telecommunications; Philosophy; Linguistics,,,,,,http://dx.doi.org/10.1016/j.ecoinf.2021.101529,,10.1016/j.ecoinf.2021.101529,,,0,006-697-972-006-695; 007-367-899-253-888; 012-063-021-691-781; 012-750-129-425-56X; 017-878-265-650-766; 018-565-254-420-673; 020-308-627-052-645; 021-576-603-866-289; 021-835-700-859-850; 022-032-095-214-380; 028-221-850-747-211; 029-113-753-904-105; 032-218-297-033-13X; 033-959-377-142-453; 034-664-033-394-954; 035-370-354-940-357; 037-037-924-922-673; 037-096-675-409-253; 044-015-045-463-542; 044-165-881-887-926; 051-878-628-243-805; 055-017-121-287-893; 055-580-948-472-432; 056-114-742-941-57X; 056-747-465-730-925; 057-404-972-141-422; 059-078-123-235-768; 061-008-197-627-623; 061-329-782-735-841; 061-642-027-743-320; 066-194-208-799-599; 073-549-836-677-991; 074-413-729-032-390; 078-857-006-890-191; 082-629-669-226-97X; 085-236-522-178-311; 089-160-406-114-246; 097-638-032-040-034; 098-234-082-320-443; 098-736-215-366-286; 099-315-738-160-501; 099-664-169-123-924; 100-047-371-754-455; 102-720-561-772-371; 105-703-117-877-69X; 116-281-604-285-829; 130-308-435-133-65X; 136-940-094-377-214; 154-828-479-054-03X,0,false,, 013-481-527-037-718,Authenticity examination of compressed audio recordings using detection of multiple compression and encoders' identification.,2014-02-18,2014,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Rafal Korycki,,238,,33,46,Encoder; Speech coding; Artificial intelligence; Audio mining; Speech recognition; Computer vision; Computer science; Anti-aliasing; Data compression; Feature vector; Digital forensics; Digital audio,Binary decision tree; Detection of montage; Digital audio authenticity; Digital forensics; Discriminant analysis; MDCT coefficients; MP3 encoder classification; Multiple compression; SVM,,,,https://www.sciencedirect.com/science/article/pii/S0379073814000693 https://www.ncbi.nlm.nih.gov/pubmed/24637036,http://dx.doi.org/10.1016/j.forsciint.2014.02.008,24637036,10.1016/j.forsciint.2014.02.008,2006072643,,5,000-111-656-358-841; 002-339-017-887-310; 002-890-793-739-219; 006-261-450-834-912; 006-364-806-553-428; 006-698-117-158-334; 007-141-734-571-464; 010-410-943-186-731; 016-736-880-761-249; 018-172-332-749-013; 020-790-687-868-388; 022-418-214-623-366; 024-085-101-696-497; 026-163-602-249-656; 027-746-342-202-026; 037-460-283-073-875; 039-216-783-233-597; 045-002-530-413-569; 049-209-305-832-496; 063-679-660-896-279; 071-537-440-452-939; 073-840-322-963-388; 073-911-854-128-151; 075-766-494-168-698; 077-009-437-168-880; 088-280-783-668-535; 089-662-206-683-698; 093-427-308-175-939; 100-559-549-797-890; 111-360-832-170-381; 129-720-338-413-00X; 132-041-004-899-154; 133-304-307-761-214; 135-726-154-118-975; 184-689-319-016-457; 197-055-276-601-409,17,false,, 013-561-858-296-271,Augment Agricultural Production Through AI,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Bikash Kumar Das,,,,,,Agricultural productivity; Business; Augment; Agricultural science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.09,http://dx.doi.org/10.46293/4n6/2020.02.04.09,,10.46293/4n6/2020.02.04.09,3097065462,,0,,0,false,, 013-587-039-432-597,Extraction And Examination Of Evidences Using Chip-Off Forensic,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Djalma Fonseca,,,,,,Artificial intelligence; Chip; Pattern recognition; Computer science; Extraction (chemistry),,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.04,http://dx.doi.org/10.46293/4n6/2020.02.03.04,,10.46293/4n6/2020.02.03.04,3097791031,,0,,0,false,, 013-725-723-735-829,Checkm8: An Apple iOS Exploit Reviews,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Igor Mikhaylov,,,,,,Exploit; Data science; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.03,http://dx.doi.org/10.46293/4n6/2020.02.03.03,,10.46293/4n6/2020.02.03.03,3097757454,,0,,0,false,, 013-829-755-696-381,An Analysis of Forensic Imaging in the Absence of Write-Blockers,2014-09-01,2014,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Gary C. Kessler; Gregory H. Carlton,,9,3,51,58,Forensic imaging; Computer science,,,,,https://doi.org/10.15394/jdfsl.2014.1187 https://doaj.org/article/6758e97a517c4dd7b162e9dc82bb2c81 https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#KesslerC14,https://doaj.org/article/6758e97a517c4dd7b162e9dc82bb2c81,,,2396629914,,0,,1,true,cc-by-nc,gold 013-969-775-246-876,Editorial – Delivering digital forensic science as a service,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Eoghan Casey,,35,,301095,,Engineering; World Wide Web; Service (business); Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/di/di35.html#Casey20d https://doi.org/10.1016/j.fsidi.2020.301095,http://dx.doi.org/10.1016/j.fsidi.2020.301095,,10.1016/j.fsidi.2020.301095,3113066270,,0,,0,false,, 013-991-866-178-240,Disconnects of Specialized Mobile Digital Forensics within the Generalized Field of Digital Forensic Science,2018-07-01,2018,journal article,International Journal of Interdisciplinary Telecommunications and Networking,19418663; 19418671,IGI Global,,Gregory H. Carlton; Gary C. Kessler,"The study and practice of forensic science comprises many distinct areas that range from behavioral to biological to physical and to digital matters, and in each area forensic science is utilized to obtain evidence that will be admissible within the legal framework. This article focuses on inconsistencies within the accepted methodology of digital forensics when comparing the current best practices of mobile digital devices and traditional computer devices. Here the authors raise the awareness of this disconnect in methodology, and they posit that some specific tasks within the traditional best practices of digital forensic science are artifacts of ritual rather than based on scientific requirements.",10,3,62,65,Best practice; Data science; Field (computer science); Computer science; Digital forensics,,,,,https://jglobal.jst.go.jp/detail?JGLOBAL_ID=201802228345200270 https://works.bepress.com/gary_kessler/86/ https://dblp.uni-trier.de/db/journals/ijitn/ijitn10.html#CarltonK18a https://ideas.repec.org/a/igg/jitn00/v10y2018i3p62-65.html https://www.igi-global.com/article/disconnects-of-specialized-mobile-digital-forensics-within-the-generalized-field-of-digital-forensic-science/204579,http://dx.doi.org/10.4018/ijitn.2018070106,,10.4018/ijitn.2018070106,2802304556,,0,053-834-219-883-201; 087-788-401-737-824; 123-275-701-676-787,0,false,, 014-168-575-959-392,Study on advanced analysis method based on timeline chart for Digital Forensic Investigation,2014-02-28,2014,journal article,The Journal of Korea Navigation Institute,12269026,The Korea Navigation Institute,,Keungi Lee; Seongjin Hwang; Changhoon Lee; Sangjin Lee,"Recently, importance of digital forensics has increased and using analysis methods of digital evidence in the analysis of evidence of various types. However, analysis time and effort is steadily increasing because personal disk capacity is too big and it has many number of files. Most digital evidence has time property, such as access time, creation time, and modification time. These time information of digital evidence is one of most important factors in the digital forensic area. But if digital examiner simply analyze based on binary source only, it is possible to have wrong result because time has various types. In this paper, we classify various type of time in the digital evidence and describe advanced analysis method based on timeline chart for digital forensic investigation.",18,1,50,55,Engineering; Chart; Access time; Information retrieval; Digital evidence; Timeline; Binary number; Multimedia; Computer forensics; Digital forensics; Property (programming),,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=HHHHBI_2014_v18n1_50,http://dx.doi.org/10.12673/jkoni.2014.18.1.50,,10.12673/jkoni.2014.18.1.50,2065930911,,0,096-415-102-126-454,0,true,,bronze 014-305-699-069-963,Keychain Extraction In Belkasoft Evidence Center (BEC),2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yuri Gubanov,,,,,,Physics; Atomic physics; Center (algebra and category theory); Extraction (chemistry),,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.02,http://dx.doi.org/10.46293/4n6/2020.02.03.02,,10.46293/4n6/2020.02.03.02,3096397040,,0,,0,false,, 014-514-641-367-15X,Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model,,2012,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Gary D Cantrell; David A. Dampier,"Digital triage is a pre-digital-forensic phase that sometimes takes place as a way of gathering quick intelligence. Although effort has been undertaken to model the digital forensics process, little has been done to date to model digital triage. This work discuses the further development of a model that does attempt to address digital triage the Partially-automated Crime Specific Digital Triage Process model. The model itself will be presented along with a description of how its automated functionality was implemented to facilitate model testing.",7,4,99,116,Software engineering; World Wide Web; Triage; Model testing; Computer science; Process (engineering); Computer forensics; Process modeling; Digital forensics,,,,,https://commons.erau.edu/jdfsl/vol7/iss4/5/ https://oaji.net/articles/2014/1095-1408808426.pdf https://core.ac.uk/display/92036529 https://commons.erau.edu/cgi/viewcontent.cgi?article=1135&context=jdfsl https://doi.org/10.15394/jdfsl.2012.1135 https://mds.marshall.edu/wdcs_faculty/66/,http://dx.doi.org/10.15394/jdfsl.2012.1135,,10.15394/jdfsl.2012.1135,1575055992,,0,002-449-146-256-491; 004-652-388-189-304; 031-522-316-310-252; 040-393-580-637-973; 046-527-367-793-765; 125-384-800-661-375; 136-837-665-825-08X; 139-495-561-188-858,3,true,cc-by-nc,gold 014-767-056-602-687,An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data,,2016,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Hussam J. Mohammed; Nathan Clarke; Fudong Li,"The major challenges with big data examination and analysis are volume, complex interdependence across content, and heterogeneity. The examination and analysis phases are considered essential to a digital forensics process. However, traditional techniques for the forensic investigation use one or more forensic tools to examine and analyse each resource.  In addition, when multiple resources are included in one case, there is an inability to cross-correlate findings which often leads to inefficiencies in processing and identifying evidence. Furthermore, most current forensics tools cannot cope with large volumes of data. This paper develops a novel framework for digital forensic analysis of heterogeneous big data. The framework mainly focuses upon the investigations of three core issues: data volume, heterogeneous data and the investigators cognitive load in understanding the relationships between artefacts. The proposed approach focuses upon the use of metadata to solve the data volume problem, semantic web ontologies to solve the heterogeneous data sources and artificial intelligence models to support the automated identification and correlation of artefacts to reduce the burden placed upon the investigator to understand the nature and relationship of the artefacts.",11,2,137,152,Volume (computing); Semantic Web; Data science; Computer science; Process (engineering); Cognitive load; Big data; Identification (information); Digital forensics; Metadata,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1384&context=jdfsl https://core.ac.uk/display/81695607 https://paperity.org/p/84115528/an-automated-approach-for-digital-forensic-analysis-of-heterogeneous-big-data https://commons.erau.edu/jdfsl/vol11/iss2/9/ https://doi.org/10.15394/jdfsl.2016.1384 https://ro.ecu.edu.au/ecuworkspost2013/2548/ https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#MohammedCL16 http://commons.erau.edu/jdfsl/vol11/iss2/9/ https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=3554&context=ecuworkspost2013 https://core.ac.uk/download/81695607.pdf,http://dx.doi.org/10.15394/jdfsl.2016.1384,,10.15394/jdfsl.2016.1384,2529303197,,1,000-750-047-594-348; 009-885-874-541-907; 012-229-066-466-307; 033-877-222-136-260; 038-869-864-206-517; 041-967-137-787-551; 046-505-842-788-23X; 053-706-401-396-999; 080-734-222-929-339; 082-395-432-624-372; 086-048-728-181-733; 092-039-178-633-223; 115-471-022-347-349; 133-752-203-150-119; 145-259-135-487-292; 149-798-016-481-910; 150-249-549-372-358; 167-311-879-371-915,21,true,cc-by-nc,gold 014-859-901-321-603,Forensic analysis of video file formats,,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Thomas Gloe; André Fischer; Matthias Kirchner,"Abstract Video file format standards define only a limited number of mandatory features and leave room for interpretation. Design decisions of device manufacturers and software vendors are thus a fruitful resource for forensic video authentication. This paper explores AVI and MP4-like video streams of mobile phones and digital cameras in detail. We use customized parsers to extract all file format structures of videos from overall 19 digital camera models, 14 mobile phone models, and 6 video editing toolboxes. We report considerable differences in the choice of container formats, audio and video compression algorithms, acquisition parameters, and internal file structure. In combination, such characteristics can help to authenticate digital video files in forensic settings by distinguishing between original and post-processed videos, verifying the purported source of a file, or identifying the true acquisition device model or the processing software used for video processing.",11,,S68,S76,Smacker video; Non-linear editing system; Video capture; Matroska; Video editing; Computer science; Multimedia; Image file formats; Video processing; Design rule for Camera File system,,,,,https://dfrws.org/presentation/forensic-analysis-of-video-file-formats/ http://www.sciencedirect.com/science/article/pii/S1742287614000140 https://core.ac.uk/display/82097955 https://doi.org/10.1016/j.diin.2014.03.009 https://dfrws.org/wp-content/uploads/2019/06/2014_EU_paper-forensic_analysis_of_video_file_formats.pdf https://www.wi.uni-muenster.de/de/forschung/publikationen/98281 https://www.sciencedirect.com/science/article/pii/S1742287614000140 https://core.ac.uk/download/pdf/82097955.pdf,http://dx.doi.org/10.1016/j.diin.2014.03.009,,10.1016/j.diin.2014.03.009,2081326817,,0,005-315-703-269-523; 013-610-410-193-416; 015-717-506-603-742; 020-790-687-868-388; 031-542-664-705-080; 034-287-835-960-531; 034-927-240-304-052; 035-497-590-517-946; 039-932-911-478-60X; 056-148-934-103-963; 063-532-297-436-449; 066-406-874-464-629; 073-831-288-159-200; 077-323-690-290-738; 085-503-660-748-099; 085-816-961-933-906; 089-538-052-450-649; 094-933-978-324-364; 127-601-219-775-046; 140-408-113-219-371; 144-920-871-189-384; 150-280-000-852-253,40,true,cc-by-nc-nd,hybrid 014-864-005-189-321,Digital Data Stealing from ATM using Data Skimmers: Challenge to the Forensic Examiner,2017-01-19,2017,journal article,Journal of Forensic Sciences & Criminal Investigation,24761311,Juniper Publishers,,Mukesh Sharma,,1,4,,,Forensic science; Digital data; Computer security; Computer science,,,,,https://juniperpublishers.com/jfsci/JFSCI.MS.ID.555567.php,http://dx.doi.org/10.19080/jfsci.2017.01.555567,,10.19080/jfsci.2017.01.555567,2781742967,,0,,0,true,cc-by,hybrid 014-997-104-384-746,Automatic voice based disease detection method using one dimensional local binary pattern feature extraction network,,2019,journal article,Applied Acoustics,0003682x; 1872910x,Elsevier BV,United Kingdom,Turker Tuncer; Sengul Dogan; Fatih Ertam,,155,,500,506,k-nearest neighbors algorithm; Concatenation; Artificial intelligence; Pattern recognition; Singular value decomposition; Disease detection; Computer science; Feature extraction; Convolutional neural network; Local binary patterns; Classifier (UML),,,,,https://www.sciencedirect.com/science/article/pii/S0003682X19304633,http://dx.doi.org/10.1016/j.apacoust.2019.05.023,,10.1016/j.apacoust.2019.05.023,2954565483,,0,001-984-955-242-506; 005-269-435-839-280; 005-533-472-254-02X; 005-987-193-783-013; 008-260-496-803-394; 009-869-672-471-787; 015-011-888-895-810; 019-911-770-667-248; 023-317-775-677-86X; 027-228-204-835-44X; 031-496-219-404-955; 033-251-186-309-691; 034-184-640-724-000; 035-220-946-404-423; 043-525-214-065-822; 051-089-909-901-796; 053-729-616-696-595; 055-621-696-224-720; 056-466-128-964-13X; 057-224-035-130-35X; 058-169-754-146-515; 058-864-884-652-779; 059-029-123-053-672; 061-010-347-258-601; 064-412-697-236-761; 065-269-310-819-75X; 068-258-567-569-704; 076-098-614-428-550; 077-923-933-170-490; 079-420-615-272-393; 083-096-013-375-486; 087-104-631-733-618; 095-266-658-596-934; 098-911-111-891-25X; 099-971-681-345-657; 100-975-649-811-98X; 104-959-873-849-603; 116-360-484-062-916; 125-182-506-553-36X; 128-089-080-519-916; 128-594-404-735-111; 128-911-503-412-98X; 142-935-925-565-963; 150-910-380-059-209; 154-317-811-101-789; 164-729-827-815-739; 182-409-376-938-085; 184-417-958-332-22X; 186-755-110-076-534; 197-575-613-041-959,14,false,, 015-093-633-802-899,First Annual DFRWS APAC Conference,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Andrew Marrington,,38,,301304,,,,,,,https://api.elsevier.com/content/article/PII:S2666281721002274?httpAccept=text/xml,http://dx.doi.org/10.1016/j.fsidi.2021.301304,,10.1016/j.fsidi.2021.301304,3215199437,,0,,0,true,,bronze 015-123-182-480-038,A new method for the recovery and evidential comparison of footwear impressions using 3D structured light scanning,2018-02-06,2018,journal article,Science & justice : journal of the Forensic Science Society,13550306,Forensic Science Society,United Kingdom,Tim Thompson; Paul Norris,"Abstract Footwear impressions are one of the most common forms of evidence to be found at a crime scene, and can potentially offer the investigator a wealth of intelligence. Our aim is to highlight a new and improved technique for the recovery of footwear impressions, using three-dimensional structured light scanning. Results from this preliminary study demonstrate that this new approach is non-destructive, safe to use and is fast, reliable and accurate. Further, since this is a digital method, there is also the option of digital comparison between items of footwear and footwear impressions, and an increased ability to share recovered footwear impressions between forensic staff thus speeding up the investigation.",58,3,237,243,Human–computer interaction; Digital transformation; Crime scene; Structured-light 3D scanner; Structured light; Computer science,Digital transformation; Footwear impression; Forensic evidence; Non-contact scanning; Rapid prototyping; Structured light,,,,https://core.ac.uk/display/151186262 https://www.ncbi.nlm.nih.gov/pubmed/29685306 https://www.sciencedirect.com/science/article/pii/S1355030618300261 https://research.tees.ac.uk/ws/files/4358613/621670.pdf https://research.tees.ac.uk/en/publications/a-new-method-for-the-recovery-and-evidential-comparison-of-footwe https://core.ac.uk/download/pdf/196166430.pdf,http://dx.doi.org/10.1016/j.scijus.2018.02.001,29685306,10.1016/j.scijus.2018.02.001,2791600245,,0,004-692-514-828-661; 013-064-849-740-249; 013-821-112-405-687; 022-144-597-505-520; 023-979-445-661-710; 035-695-109-423-853; 042-532-192-386-113; 047-348-590-414-767; 049-785-672-887-582; 053-525-211-728-03X; 057-285-200-424-503; 101-319-200-902-022; 112-908-468-673-712; 124-684-494-161-222; 133-860-527-273-48X; 150-202-679-950-146; 173-779-991-377-816; 178-456-110-092-227,17,true,,green 015-340-476-560-675,Improving Forensic Triage Efficiency through Cyber Threat Intelligence,2019-07-23,2019,journal article,Future Internet,19995903,MDPI AG,Switzerland,Nikolaos Serketzis; Vasilios Katos; Christos Ilioudis; Dimitrios Baltatzis; G. Pangalos,"The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of information security controls and digital forensics, as well as incident response approaches. Cyber Threat Intelligence (CTI)and forensic preparedness are the two parts of the so-called managed security services that defendants can employ to repel, mitigate or investigate security incidents. Despite their success, there is no known effort that has combined these two approaches to enhance Digital Forensic Readiness (DFR) and thus decrease the time and cost of incident response and investigation. This paper builds upon and extends a DFR model that utilises actionable CTI to improve the maturity levels of DFR. The effectiveness and applicability of this model are evaluated through a series of experiments that employ malware-related network data simulating real-world attack scenarios. To this extent, the model manages to identify the root causes of information security incidents with high accuracy (90.73%), precision (96.17%) and recall (93.61%), while managing to decrease significantly the volume of data digital forensic investigators need to examine. The contribution of this paper is twofold. First, it indicates that CTI can be employed by digital forensics processes. Second, it demonstrates and evaluates an efficient mechanism that enhances operational DFR.",11,7,162,,Volume (computing); Information technology; Security controls; Preparedness; Triage; Maturity (finance); Computer security; Computer science; Information security; Digital forensics,,,,,http://eprints.bournemouth.ac.uk/32570/ https://www.mdpi.com/1999-5903/11/7/162 https://dblp.uni-trier.de/db/journals/fi/fi11.html#SerketzisKIBP19 https://www.mdpi.com/1999-5903/11/7/162/pdf https://doaj.org/article/57748e69a34d417bb9a2efba0274d641 https://core.ac.uk/download/222828992.pdf,http://dx.doi.org/10.3390/fi11070162,,10.3390/fi11070162,2963912653,,0,001-228-339-410-349; 002-383-410-319-043; 002-464-138-461-933; 002-625-978-577-247; 007-375-375-758-869; 010-791-676-072-730; 020-195-870-396-757; 021-486-901-460-202; 028-222-770-579-89X; 035-565-993-122-262; 046-143-775-958-052; 049-283-049-875-723; 072-914-021-179-250; 073-490-335-781-535; 103-028-372-925-311; 107-802-050-888-509; 115-036-799-197-654; 126-101-628-029-477; 126-281-444-894-256; 137-755-137-054-864; 174-186-817-525-708; 184-069-302-229-82X; 198-084-387-305-951,8,true,cc-by,gold 015-436-998-822-923,Digital vehicle identity – Digital VIN in forensic and technical practice,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Roman Rak; Dagmar Kopencová; Miroslav Felcan,"Abstract The basic subject of the article is the issue of digital vehicle identification, which can be especially utilised for forensic, technical and administrative purposes. The article is based on a three-year research of newly produced vehicles over the course of years 2018–2021 at the Police academy in Bratislava, Slovak Republic. Over 250 vehicle models from 43 manufacturers worldwide have been researched for the various characteristics of their digital identifiers. The article defines the terms of public and non-public digital vehicle identifiers and explores their basic properties – their placement in vehicle components, their quantities, repeatability, structure, informational content, protective elements, the issue of their permanence, suitable protocols and reading devices, particularities and practical utility. The paper deals with the issue of digital VIN, which is identified as Vehicle Identification, periodically placed in digital form on the various components of the vehicle. The article compares the markings (via digital identifiers) of the individual components in the vehicles from selected vehicle manufacturers from around the world. The article describes the positives and negatives of using digital identifiers in practice in the current form and recommends further procedures for introducing these progressive identification methods into everyday forensics.",39,,301307,,Identifier; Structure (mathematical logic); Subject (documents); Identity (object-oriented programming); Vehicle identification; Identification methods; In vehicle; Computer science; Multimedia; Reading (process),,,,,https://www.sciencedirect.com/science/article/pii/S2666281721002328,http://dx.doi.org/10.1016/j.fsidi.2021.301307,,10.1016/j.fsidi.2021.301307,3207575594,,0,000-084-741-857-185; 002-295-796-487-823; 002-756-787-443-991; 003-232-363-219-004; 006-352-188-170-383; 008-214-567-891-604; 010-996-329-589-267; 019-767-925-656-313; 053-239-885-647-271; 065-264-492-896-656; 092-321-302-592-350; 092-775-840-033-528; 093-364-732-047-578; 094-433-194-039-812; 138-518-998-385-929; 178-968-503-719-579; 199-172-967-270-034,0,true,cc-by,hybrid 015-455-002-340-996,Intelligent Software Agent Applied To Digital Forensic and Its Usefulness,,2013,journal article,International Journal of Computer Science and Informatics,22315292,Institute for Project Management Pvt. Ltd,,Inikpi O Ademu; Chris Imafidon; David Preston,"Due to the large amount of information produced, accumulated, and distributed via electronic means, it is necessary for forensic experts during crime investigation to increase their abilities to search for important evidence in a timely manner because this is essential to the success of digital forensic examinations. The inadequacy of resources both in tools and human and also limitation in time have a negative impact in result obtained during digital forensic investigation. Previous researchers state that the chances of success in criminal prosecution by law enforcement agencies depend heavily on the availability of strong evidence. The coming out of intelligent software agents that function autonomously with little or no human intervention during crime investigation is significant to the success of digital forensic investigation. Better use of tools is necessary, beyond the capabilities of the currently used forensic tools. In this paper, we discuss the usefulness of intelligent software agent in digital forensic. The goal of the paper is to provide a better knowledge and understand the concepts of intelligent software agent in digital forensic. The findings presents in this paper came from thoroughly review of previous digital forensic literature.",,,277,280,Software engineering; Computer science; Software agent; Digital forensics,,,,,http://dx.doi.org/10.47893/ijcsi.2013.1105,http://dx.doi.org/10.47893/ijcsi.2013.1105,,10.47893/ijcsi.2013.1105,3114545121,,0,008-737-773-604-701; 157-954-859-648-506,3,true,,gold 015-592-284-127-528,Analisis Proses Investigasi Dekstop PC Yang Terhubung Layanan Private Cloud,2016-08-05,2016,journal article,Jurnal Teknik Informatika dan Sistem Informasi,24432229; 24432210,Maranatha Christian University,,Irfan Febrian Editia Kurdiat; Nur Widiyasono; Husni Mubarok,"Private Cloud Computing Services  is one of current technology advances that can meet the needs of companies and organizations, many cloud service providers to offer facilities at affordable costs. However, in addition to bringing the benefits, cloud services can be misused by insiders in the company to commit cyber crimes that hurt companies such as leakage of confidential data, take advantage of the company itself, data manipulation etc. Handling process in such cases it is necessary to use a digital forensic investigation to obtain information from the digital evidence. This research used EEDI (End to End Digital Investigation) in the process of investigation on the desktop side by getting the files and folders associated with crimes. The results of an investigation carried out in the form of information proving that the offender is committing a crime, The information then presented in the form of a forensic report which will be used during the trial. Keywords — Acquisition, Digital evidence, Digital forensic, investigation",2,2,134419,,Internet privacy; Engineering; Commit; Digital evidence; Cloud service provider; Computer security; Data manipulation language; Confidentiality; End-to-end principle; Cloud computing; Digital forensics,,,,,https://www.neliti.com/id/publications/134419/analisis-proses-investigasi-dekstop-pc-yang-terhubung-layanan-private-cloud https://media.neliti.com/media/publications/134419-ID-analisis-proses-investigasi-dekstop-pc-y.pdf,http://dx.doi.org/10.28932/jutisi.v2i2.463,,10.28932/jutisi.v2i2.463,2525472683,,0,022-435-366-997-054; 067-950-012-629-210; 077-532-025-251-756; 091-619-263-117-914; 111-090-978-711-139; 125-649-089-118-557; 133-397-275-695-990; 146-398-584-810-872; 184-948-841-629-735; 184-984-036-746-363,0,true,, 015-687-713-380-145,ACPO principles for digital evidence: Time for an update?,,2020,journal article,Forensic Science International: Reports,26659107,Elsevier BV,,Graeme Horsman,"Abstract Despite remaining largely unchanged for over 10 years, the Association of Chief Police Officers’s [ 1 ] Good Practice Guides for Digital Evidence and their four governing principles for evidence handling are amongst some of the most cited pieces of digital forensic best practice advice. However, given the pace of change in both technology and the field of digital forensics, this work debates whether it may be time to evaluate whether these principles remain wholly valid given the current forensic analysis landscape and their lack of updating or periodic evaluation. A discussion of the existing four ACPO principles is provided followed by an offering of eight new revised principles as a means of acknowledging the current challenges faced by practitioners in this field. It is hoped that this piece will spark a debate surrounding the principles we so frequently acknowledge as a mark of quality assurance in our investigations, and be a catalyst for evaluative considerations in this area.",2,,100076,,Work (electrical); Political science; Best practice; Pace; Thesaurus; SPARK (programming language); Digital evidence; Field (computer science); Engineering ethics; Digital forensics,,,,,https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202102259523808363 https://research.tees.ac.uk/en/publications/acpo-principles-for-digital-evidence-time-for-an-update https://www.sciencedirect.com/science/article/pii/S2665910720300220,http://dx.doi.org/10.1016/j.fsir.2020.100076,,10.1016/j.fsir.2020.100076,3007919010,,0,014-835-460-139-85X; 017-792-811-186-108; 050-618-920-212-97X; 082-589-789-111-858; 083-312-117-071-763; 106-885-306-836-498,2,true,"CC BY, CC BY-NC-ND",gold 015-858-904-277-590,Toward Effective and Reliable Digital Forensics,2012-02-16,2012,journal article,The Computer Journal,00104620; 14602067,Oxford University Press (OUP),United Kingdom,Wojciech Mazurczyk; Krzysztof Szczypiorski,"Digital forensics is a recently emerged research area, and it has attracted the attention of computer professionals, law enforcement experts and practitioners. It is a multidisciplinary area that includes multiple fields, i.e. law, computer science, finance, networking, data mining and criminal justice. We believe that papers enclosed in this Special Issue will enhance knowledge in digital forensics and will stimulate further research in the important areas of information and network security.",55,6,651,652,Criminal justice; Internet privacy; Network security; Multidisciplinary approach; Law enforcement; Computer security; Computer science; Computer forensics; Digital forensics,,,,,https://academic.oup.com/comjnl/article-pdf/55/6/651/989417/bxs012.pdf https://dblp.uni-trier.de/db/journals/cj/cj55.html#MazurczykS12,http://dx.doi.org/10.1093/comjnl/bxs012,,10.1093/comjnl/bxs012,2133813966,,0,,0,false,, 016-039-721-963-229,Analisis Live Forensics untuk Perbandingan Kemananan Email pada Sistem Operasi Proprietary,2016-12-11,2016,journal article,ILKOM Jurnal Ilmiah,25487779; 20871716,Universitas Muslim Indonesia,,Muhammad Nur Faiz; Rusydi Umar; Anton Yudhana,"Email menjadi salah satu media untuk berkomunikasi dan bisa menyimpan bukti kejahatan, saat ini telah banyak kejahatan yang terjadi melalui media ini. Digital forensics merupakan salah satu ilmu untuk menemukan barang bukti termasuk email sebagai bukti digital.  Analisis digital forensik terbagi menjadi dua, yaitu tradisional / dead dan live forensics . Analisis forensics tekni digital tradisional menyangkut data yang disimpan secara permanen di perangkat, sedangkan analisis live forensics yaitu analisis menyangkut data sementara yang disimpan dalam peralatan atau transit di jaringan. jurnal ini mengusulkan analisis forensics live di sistem operasi terbaru yaitu Windows 10. Studi kasus berfokus pada kemanan beberapa email seperti Gmail, Yahoo dan Outlook dan beberapa browser secara umum seperti Google Chrome, Mozilla Firefox, dan Microsoft Edge. Hasil Eksperimen penelitian ini yaitu masing-masing penyedia email menambahkan fitur tersendiri demi keamanan user.",8,3,242,247,Operating system; Live forensics; Computer science; Digital forensics,,,,,http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/download/79/54 http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/view/79 https://www.neliti.com/publications/258808/analisis-live-forensics-untuk-perbandingan-kemananan-email-pada-sistem-operasi-p https://core.ac.uk/download/pdf/228866261.pdf,http://dx.doi.org/10.33096/ilkom.v8i3.79.242-247,,10.33096/ilkom.v8i3.79.242-247,2611461334,,0,,5,true,cc-by-sa,gold 016-073-660-398-930,ANT/SEIT - AlmaNebula: A Computer Forensics Framework for the Cloud,,2013,journal article,Procedia Computer Science,18770509,Elsevier BV,,Corrado Federici,"Abstract Scalability, fault tolerance and collaborative processing across possibly dispersed sites are key enablers of modern computer forensics applications, that must be able to elastically accommodate all kinds of digital investigations, without wasting resources or fail to deliver timely outcomes. Traditional tools running in a standalone or client- server setups may fall short when handling the multi terabyte scale of a case just above average or, conversely, lie mainly underutilized when dealing with few digital evidences. A new category of applications that leverage the opportunities offered by modern Cloud Computing (CC) platforms, where scalable computational power and storage capacity can be engaged and decommissioned on demand, allow one to conveniently master huge amounts of information that otherwise could be impossible to wield. This paper discusses the design goals, technical requirements and architecture of AlmaNebula, a conceptual framework for the analysis of digital evidences built on top of a Cloud infrastructure, which aims to embody the concept of “Forensics as a service”.",19,,139,146,Forensic science; Terabyte; Computer security; Computer science; Scalability; Network forensics; Computer forensics; Fault tolerance; Cloud computing,,,,,https://doi.org/10.1016/j.procs.2013.06.023 https://core.ac.uk/display/82174877 https://www.sciencedirect.com/science/article/abs/pii/S1877050913006315 https://www.sciencedirect.com/science/article/pii/S1877050913006315 https://dblp.uni-trier.de/db/conf/ant/ant2013.html#Federici13 https://core.ac.uk/download/pdf/82174877.pdf,http://dx.doi.org/10.1016/j.procs.2013.06.023,,10.1016/j.procs.2013.06.023,2060988608,,0,011-426-283-568-269; 014-026-421-277-766; 014-267-129-756-476; 035-448-415-847-226; 038-914-873-897-532; 050-513-243-638-138; 079-070-981-899-105; 108-104-619-032-237; 120-197-392-039-249; 123-304-888-889-490; 130-648-730-902-248; 134-927-490-231-285; 137-292-579-653-532; 156-313-798-378-998,9,true,,gold 016-180-173-990-746,Blockchain-based digital evidence inventory,,2019,journal article,Journal of Advances in Information Technology,17982340,Engineering and Technology Publishing,,David Billard,"This paper proposes the use of a blockchainbased structure in order to store evidences in a digital forensics investigation. The traditional chain of evidence is augmented with properties of immutability and traceability, thanks to a cryptographic process. The blockchain is constructed by forensics experts by adding evidences through the process. Since the blockchain is immutable, it can be shared among the different parties involved in a prosecution in order to review the chain of evidence and build their case. Furthermore, the blockchain structure can be applied to other forensics fields, like drugs, firearms, NDA. This blockchain is called a Digital Evidence Inventory (DEI) and is part of a wider framework encompassing a Forensics Confidence Rating (FCR) structure, in order to give experts the ability to rate the level of confidence for each evidence and a Global Digital Timeline (GDT) to order evidence through time. The whole framework is called ‘Aldiana’",10,2,41,47,Blockchain; Digital evidence; Computer security; Computer science; Digital forensics,,,,,https://hesso.tind.io/record/3610 https://hesso.tind.io/record/3610/files/Author%20postprint.pdf http://www.jait.us/uploadfile/2019/0529/20190529042106499.pdf,http://dx.doi.org/10.12720/jait.10.2.41-47,,10.12720/jait.10.2.41-47,3019070143,,0,001-170-920-458-777; 018-182-926-340-45X; 024-662-554-815-361; 026-535-638-457-216; 035-031-257-128-045; 035-448-415-847-226; 065-671-045-136-370; 134-927-490-231-285,6,true,cc-by,gold 016-217-772-478-804,Technologies for Forensic Marking Certification,2013-03-30,2013,journal article,Journal of Broadcast Engineering,12267953,The Korean Institute of Broadcast and Media Engineers,,Weon Geun Oh,"The importance of Digital Rights Protection technologies, especially the forensic marking, is getting larger and larger as the demand for the digital contents is increased. But the technologies for the evaluation of forensic marking is not set up properly due to the conflicts between interested parties and technical difficulties. Therefore to evaluate the performance of forensic marking objectively, image and video modification items/levels and evaluation criteria are essential. This paper suggests the quantitative system for evaluating the performance of forensic marking objectively. By providing the opportunity to evaluate the Digital Rights Protection product in objective and quantitative manner, forensic marking industry can expedite its technology development and consumer can get objective and universally validated performance result. It is expected this technology could help revitalizing the related industries and help expediting the development of forensic mark technologies.",18,2,196,203,Risk analysis (engineering); Engineering; Expediting; Product (category theory); Forensic science; Set (psychology); Digital rights; Technology development; Computer security; Certification,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=BSGHC3_2013_v18n2_196 http://www.ndsl.kr/soc_img/society/ksbe/BSGHC3/2013/v18n2/BSGHC3_2013_v18n2_196.pdf,http://dx.doi.org/10.5909/jbe.2013.18.2.196,,10.5909/jbe.2013.18.2.196,2047068734,,0,003-372-066-020-765; 005-663-388-424-669; 048-741-954-323-485; 064-999-637-875-532; 072-551-516-490-032; 094-615-245-971-085; 100-121-313-727-590; 104-631-487-207-97X; 109-457-503-218-240; 128-585-824-634-638; 177-852-038-378-471,0,true,,bronze 016-316-214-363-950,Design Architecture of Digital Evidence Case Management (DECMa): A Proposed Model for Virtual Environment Digital Forensics Examination,2017-05-01,2017,journal article,Advanced Science Letters,19366612; 19367317,American Scientific Publishers,United States,Ahmad Luthfi; Yudi Prayudi,,23,5,4192,4196,Virtual machine; Digital evidence; Design architecture; Case management; Computer science; Multimedia; Digital forensics,,,,,https://www.ingentaconnect.com/content/asp/asl/2017/00000023/00000005/art00083,http://dx.doi.org/10.1166/asl.2017.8261,,10.1166/asl.2017.8261,2792323406,,0,,2,false,, 016-441-011-219-628,A Digital Evidence Fusion Method in Network Forensics Systems with Dempster-Shafer Theory,,2014,journal article,China Communications,16735447,,,Tian Zhihon,"Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.",,,,,Volume (computing); Data mining; Fuse (electrical); Intrusion; Dempster–Shafer theory; Digital evidence; Field (computer science); Focus (computing); Computer science; Network forensics,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZGTO201405010.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZGTO201405010.htm,,,3147794605,,0,,0,false,, 016-732-863-869-866,A Comparative Study between Vulnerability Assessment and Penetration Testing,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Sharique Raza; Feon Jaison,,,,,,Vulnerability assessment; Computer science; Forensic engineering; Penetration (warfare),,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.08,http://dx.doi.org/10.46293/4n6/2021.03.02.08,,10.46293/4n6/2021.03.02.08,3160228321,,0,020-665-973-847-315; 030-112-277-765-861; 118-511-004-473-598; 153-005-644-187-714,0,false,, 017-060-167-812-521,Introduction of concurrent processes into the digital forensic investigation process,2015-07-06,2015,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Aleksandar Valjarevic; Hein S. Venter,"Performing a digital forensic investigation requires a formalised process to be followed. It also requires that certain principles are applied, such as preserving of digital evidence and documenting actions. The need for a harmonised and standardised digital forensic investigation process has been recognised in the digital forensics community and much scientific work has been undertaken to produce digital forensic investigation process models, albeit with many disparities within the different models. The problem is that these existing models do not include any processes dealing explicitly with concurrent digital forensic principles. This leaves room for human error and omissions, as there is a lack of clear guidelines on the implementation of digital forensic principles. This paper proposes the introduction of concurrent processes into the digital forensic investigation process model. The authors define concurrent processes as the actions that should be conducted in parallel with other processes within th...",48,3,339,357,Engineering; Human error; Data science; Digital forensic process; Digital evidence; Digital forensic investigation; Computer security; Process (engineering); Process modeling; Digital forensics,,,,,https://repository.up.ac.za/bitstream/2263/50300/1/Valjarevic_Introduction_2016.pdf https://www.tandfonline.com/doi/full/10.1080/00450618.2015.1052754 https://repository.up.ac.za/handle/2263/50300,http://dx.doi.org/10.1080/00450618.2015.1052754,,10.1080/00450618.2015.1052754,1952678153,,0,012-723-051-030-715; 020-944-423-224-895; 027-062-355-180-009; 038-668-970-194-854; 041-059-041-666-09X; 044-318-946-010-004; 058-205-117-706-853; 059-259-197-397-244; 060-808-935-547-406; 073-176-805-913-104; 078-730-781-174-18X; 184-948-841-629-735; 185-786-886-555-378; 190-065-821-748-92X; 199-745-676-923-766,10,true,,green 017-383-422-065-276,Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research Workshop,2022-04-25,2022,journal article,JURNAL MEDIA INFORMATIKA BUDIDARMA,25488368; 26145278,STMIK Budi Darma,,Galih Fanani; Imam Riadi; Anton Yudhana,"The development of information technology has had various positive and negative effects. The positive impact that information technology can have is to make it easier for people to communicate with others in the world, and the negative impact is that society is out of control when using its applications. It is an attitude that causes various crimes in the world caused by cyberspace (cybercrime) One of the most widely used instant messaging applications is Michat. The MiChat app causes cybercrime, pornography, online gambling, fraud, cyberbullying and drug trafficking. Evidence research is conducted using one of the frameworks of the digital forensic research workshop. In this framework, forensic identification, preservation, collection, investigation, analysis, and presentation phases are designed to find evidence of digital crime. The forensic tools used to collect evidence are mobility forensic express pro, a DB browser for SQLite, and oxygen forensic detective. Results are presented in the form of reports and evidence, and text chat files, contacts, images, audio, video, and web caches are generated. Forensic tools have a 100% success rate in finding evidence. Comparing the functions of the three forensic tools, the mobility forensic express pro has a processing rate of 66.7%, DB browser for SQLite has 33.3%, and oxygen forensic detective has 83.3%. Digital evidence can be used as corroborating evidence in a trial",6,2,1263,,,,,,,,http://dx.doi.org/10.30865/mib.v6i2.3946,,10.30865/mib.v6i2.3946,,,0,,0,false,, 017-661-025-008-689,Cyber Insurance - Decoding the Dynamics,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Prajesh Barde,,,,,,Dynamics (music); Cyber-Insurance; Computer security; Computer science; Decoding methods,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.12,http://dx.doi.org/10.46293/4n6/2020.02.03.12,,10.46293/4n6/2020.02.03.12,3096610752,,0,,0,false,, 017-779-541-978-693,Rethinking Digital Forensics,2019-04-01,2019,journal article,Annals of Emerging Technologies in Computing,2516029x; 25160281,International Association for Educators and Researchers (IAER),,Andrew Jones; Stilianos Vidalis,"In the modern socially-driven, knowledge-based virtual computing environment in which organisations are operating, the current digital forensics tools and practices can no longer meet the need for scientific rigour. There has been an exponential increase in the complexity of the networks with the rise of the Internet of Things, cloud technologies and fog computing altering business operations and models. Adding to the problem are the increased capacity of storage devices and the increased diversity of devices that are attached to networks, operating autonomously. We argue that the laws and standards that have been written, the processes, procedures and tools that are in common use are increasingly not capable of ensuring the requirement for scientific integrity. This paper looks at a number of issues with current practice and discusses measures that can be taken to improve the potential of achieving scientific rigour for digital forensics in the current and developing landscape.",3,2,41,53,Business operations; Data science; Diversity (business); Fog computing; Virtual computing; Scientific integrity; Computer science; Rigour; Cloud computing; Digital forensics,,,,,http://www.aetic.theiaer.org/archive/v3/v3n2/p5.html http://aetic.theiaer.org/archive/v3/v3n2/p5.pdf https://ro.ecu.edu.au/ecuworkspost2013/11326/ https://uhra.herts.ac.uk/handle/2299/21240?show=full https://core.ac.uk/download/287581623.pdf,http://dx.doi.org/10.33166/aetic.2019.02.005,,10.33166/aetic.2019.02.005,2927460906,,0,000-226-390-590-140; 002-288-358-355-198; 009-168-289-731-644; 009-194-179-981-967; 009-683-571-404-360; 017-176-620-267-416; 056-122-492-187-163; 064-549-392-650-90X; 073-545-912-961-452; 077-532-025-251-756; 100-025-452-820-357; 170-108-067-251-840,5,true,cc-by,gold 018-309-748-539-33X,Cloud Computing for Analysis on Digital Forensics Challenges,2019-11-30,2019,journal article,International Journal of Digital Contents and Applications for Smart Devices,22058532; 22074058,Global Vision Press,,Divya Vadlamudi,,6,1,1,6,Computer security; Computer science; Cloud computing; Digital forensics,,,,,http://dx.doi.org/10.21742/ijdcasd.2019.6.1.01,http://dx.doi.org/10.21742/ijdcasd.2019.6.1.01,,10.21742/ijdcasd.2019.6.1.01,3010914311,,0,,0,true,,bronze 018-348-310-953-351,Idiographic Digital Profiling: Behavioral Analysis Based on Digital Footprints,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Chad M. S. Steel,"Idiographic digital profiling (IDP) is the application of behavioral analysis to the field of digital forensics. Previous work in this field takes a nomothetic approach to behavioral analysis by attempting to understand the aggregate behaviors of cybercriminals.  This work is the first to take an idiographic approach by examining a particular subject's digital footprints for immediate use in an ongoing investigation.   IDP provides a framework for investigators to analyze digital behavioral evidence for the purposes of case planning, subject identification, lead generation, obtaining and executing warrants, and prosecuting offenders.",9,1,7,18,Profiling (information science); Forensic psychology; Nomothetic and idiographic; Data science; Behavioral analysis; Computer science; Simulation; Digital forensics,,,,,https://oaji.net/articles/2014/1095-1408891536.pdf https://doi.org/10.15394/jdfsl.2014.1160 https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#Steel14 https://commons.erau.edu/jdfsl/vol9/iss1/1/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1160&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2014.1160,,10.15394/jdfsl.2014.1160,1519042819,,0,008-027-230-088-011; 012-662-686-064-04X; 020-334-730-569-270; 028-362-889-224-708; 028-425-868-004-197; 029-093-652-551-501; 036-050-861-198-04X; 038-831-629-110-167; 052-338-831-445-137; 059-322-705-319-269; 078-351-640-478-163; 084-501-580-899-14X; 084-963-517-357-440; 112-738-360-403-279; 127-782-233-013-414; 143-768-147-997-92X; 151-657-890-862-181; 172-740-647-965-518; 182-114-118-388-852; 182-708-332-022-948,5,true,cc-by-nc,gold 018-688-665-352-310,Video-Based Evidence Analysis and Extraction in Digital Forensic Investigation,,2019,journal article,IEEE Access,21693536,Institute of Electrical and Electronics Engineers (IEEE),United States,Jianyu Xiao; Shancang Li; Qingliang Xu,"As a result of the popularity of smart mobile devices and the low cost of surveillance systems, visual data are increasingly being used in digital forensic investigation. Digital videos have been widely used as key evidence sources in evidence identification, analysis, presentation, and report. The main goal of this paper is to develop advanced forensic video analysis techniques to assist the forensic investigation. We first propose a forensic video analysis framework that employs an efficient video/image enhancing algorithm for the low quality of footage analysis. An adaptive video enhancement algorithm based on contrast limited adaptive histogram equalization (CLAHE) is introduced to improve the closed-circuit television (CCTV) footage quality for the use of digital forensic investigation. To assist the video-based forensic analysis, a deep-learning-based object detection and tracking algorithm are proposed that can detect and identify potential suspects and tools from footages.",7,,55432,55442,Artificial intelligence; Mobile device; Object detection; Forensic video analysis; Digital forensic investigation; Adaptive histogram equalization; Facial recognition system; Computer vision; Computer science; Histogram; Identification (information); Digital forensics,,,,"Planned Science and Technology Projects of Hunan Province, China; Planned Science and Technology Projects of Hunan Province, China; Planned Science and Technology Project of Changsha, China; Central South University",https://dblp.uni-trier.de/db/journals/access/access7.html#XiaoLX19a https://ieeexplore.ieee.org/document/8700194 https://uwe-repository.worktribe.com/output/3733121/video-based-evidence-analysis-and-extraction-in-digital-forensic-investigation https://core.ac.uk/download/323907298.pdf,http://dx.doi.org/10.1109/access.2019.2913648,,10.1109/access.2019.2913648,2942466912,,0,002-362-753-162-196; 003-546-075-971-973; 004-454-686-543-933; 008-557-954-363-275; 014-827-157-078-88X; 014-859-901-321-603; 015-468-366-273-424; 024-329-390-901-634; 024-891-705-629-451; 027-516-434-033-14X; 032-949-001-808-530; 033-050-227-346-544; 033-149-401-127-989; 039-677-547-033-392; 042-318-537-868-808; 043-717-844-464-939; 048-099-870-585-386; 050-027-508-811-343; 052-307-383-963-210; 065-442-229-334-524; 065-559-783-996-17X; 066-291-489-087-284; 074-998-399-714-87X; 077-653-761-053-337; 079-483-436-132-684; 081-843-765-870-125; 083-340-435-542-637; 090-794-300-074-346; 091-048-622-639-68X; 098-810-752-237-749; 102-169-873-723-040; 130-084-251-293-800; 132-417-646-634-88X; 135-177-042-837-845; 154-964-035-656-423; 162-592-454-502-125,20,true,"CC BY, CC BY-NC-ND",gold 018-700-665-539-547,Forensic analysis and investigation using digital forensics- An overview,2019-02-15,2019,journal article,"International Journal of Advance Research, Ideas and Innovations in Technology",2454132x,,,Nikunj Pansari; Dhruwal Kushwaha,"Using Digital forensics and its investigation techniques is a path towards the data retrieval and analysis of different kinds of digital storage devices. Various kinds of digital storage devices like a USB drive (pen drive), hard drive (mainly external), floppy disks, CDs and a few others also. It is a technique or method for extracting the lost or useful data from the storage media, when unavailable. Now, forensic analysis concept comes from Digital Forensics or it can be called as its sub-domain. Certain conditions of the storage devices will be considered like burnt, wet and damaged drives for data retrieval and analysis. Data is a prime concern for every organization or individual or so-called the main component of the architecture and working of the IT industries and thus, so its repercussions can’t be ignored. Companies spent almost thousands of dollars for maintaining the security of their enterprise data. Thus, the data protection and its retrieval after data theft(cyber-attacks) or loss is will help in evaluating out large-scale vulnerabilities.",5,1,470,475,Enterprise data management; PATH (variable); Data theft; Computer security; Computer science; Component (UML); USB; Data retrieval; Data Protection Act 1998; Digital forensics,,,,,https://www.ijariit.com/manuscript/forensic-analysis-and-investigation-using-digital-forensics-an-overview/ https://www.ijariit.com/manuscripts/v5i1/V5I1-1300.pdf,https://www.ijariit.com/manuscript/forensic-analysis-and-investigation-using-digital-forensics-an-overview/,,,2914515207,,0,,0,false,, 018-752-150-162-159,Digital forensics in private Seafile cloud storage from both client and server side,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Asgarali Bouyer; Mojtaba Zirak,"Nowadays, some people and organisations are unwilling to store their information on public clouds due to security and privacy problems. With increased use of established cloud services by cloud software, it is possible for malicious users to use these services for criminal purposes, so digital forensic investigations of these cloud services are necessary. Seafile cloud storage is one of popular cloud that is free and open source. In this paper, we document a series of digital forensic experiments on Seafile cloud storage service with the aim of providing forensic researchers and practitioners on both the client and server sides of Seafile. Data remnants are checked on client systems in virtual machines which running Windows 10 Home operating system and on a server with Windows Server 2012 R2 operating system. Different circumstances are created for digital forensic examinations. Correspondingly, Seafile client software and multiple browsers are used for interaction with Seafile cloud server.",13,1,233,267,Server-side; Virtual machine; Client; Cloud storage; Service (systems architecture); Computer security; Computer science; Windows Server; Cloud computing; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.114954,http://dx.doi.org/10.1504/ijesdf.2021.10031878,,10.1504/ijesdf.2021.10031878,3083108685,,0,,0,false,, 018-773-609-741-377,Live Forensics Analysis of Line App on Proprietary Operating System,2019-10-30,2019,journal article,"Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control",25032267; 25032259,Universitas Muhammadiyah Malang,," Riadi; Sunardi Sunardi; Muhamad Ermansyah Rauli","The development of computer technology is increasing rapidly. This has positive and negative effects. One of the negative effects that occurred was the use of Line applications to conduct online shop fraud. Line is one of the instant messenger applications that can be used on computers, especially on Windows 8.1 operating system computers. Applications that run on the computer leave traces of data on Random Access Memory (RAM). Data left in RAM can be obtained using digital forensic techniques, namely live forensics which is used when the computer is running and connected to the internet. This study aims to find digital evidence regarding cases of online shop fraud using the National Institute of Standards and Technology (NIST) method. Digital evidence can be obtained using forensic tools, namely RamCapturer, FTK Imager and Winhex. RamCapturer is used to acquire data in RAM, FTK Imager is used for imaging and Winhex is used to analyze data that has been taken. The results obtained in this study were conversational recordings consisting of conversation time, conversation content and conversation status which could be digital evidence in uncovering the online shop fraud crime that occurred.",4,4,305,314,The Internet; NIST; Operating system; Conversation; Digital evidence; Live forensics; Computer technology; Computer science; Line (text file); Digital forensics,,,,,https://kinetik.umm.ac.id/index.php/kinetik/article/view/850 https://core.ac.uk/download/pdf/295172135.pdf,http://dx.doi.org/10.22219/kinetik.v4i4.850,,10.22219/kinetik.v4i4.850,2982383923,,0,006-700-167-776-341; 008-656-244-710-010; 032-168-640-185-294; 055-473-899-043-485; 087-287-435-836-200; 114-239-357-516-674; 121-266-887-418-366; 150-042-119-479-43X; 185-798-265-234-254,2,true,,gold 018-885-485-300-751,Evidence Confidentiality and Digital Forensic Experts,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,John Kwaku Oppong,"Digital forensics has increasingly galloped into the space of criminal justice and law enforcements as a unique tool for evidence and its dissemination. Technological advancement in database and information has also made digital forensics an important tool in law enforcement and judicial proceedings. On the other side of the coin, evidence confidentiality is an indefinite concept and one that is very dynamic and intricate. Therefore, the services of forensic experts in the digital forensic field are often required due to the significance of digital evidence to many investigations. This paper provides a brief information about evidence confidentiality and digital forensic experts. Keywords: Digital Forensics, Evidence, Confidentiality, Forensic Experts, Justice, Law. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: John Kwaku Oppong (2022): Evidence Confidentiality and Digital Forensic Experts Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 161-166 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P26",1,1,161,166,Digital forensics; Digital evidence; Computer forensics; Confidentiality; Law enforcement; Nexus (standard); Computer security; Internet privacy; Authentication (law); Forensic science; Computer science; Criminology,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p26,,10.22624/aims/crp-bk3-p26,,,0,,0,true,,bronze 018-948-094-812-86X,Novel digital forensic readiness technique in the cloud environment,2017-01-17,2017,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Victor R. Kebande; Hein S. Venter,This paper examines the design and implementation of a feasible technique for performing Digital Forensic Readiness (DFR) in cloud computing environments. The approach employs a modified obfuscated...,50,5,552,591,Engineering; Digital evidence; Computer security; Cloud computing; Digital forensics,,,,South African Agency for Science and Technology Advancement,https://www.tandfonline.com/doi/full/10.1080/00450618.2016.1267797 https://repository.up.ac.za/handle/2263/60013 https://repository.up.ac.za/bitstream/2263/60013/1/Kebande_Novel_2017.pdf,http://dx.doi.org/10.1080/00450618.2016.1267797,,10.1080/00450618.2016.1267797,2573841943,,0,000-132-422-881-51X; 002-166-357-516-716; 006-435-365-660-88X; 009-544-868-935-533; 010-286-028-596-352; 012-447-467-503-151; 017-060-167-812-521; 019-119-495-482-994; 020-944-423-224-895; 021-486-901-460-202; 022-564-463-934-451; 024-894-908-869-686; 025-178-552-649-015; 032-697-093-668-898; 035-379-098-730-238; 041-879-975-858-398; 042-417-058-634-055; 042-969-030-470-170; 043-386-830-253-686; 043-819-525-860-747; 045-701-748-075-614; 048-696-883-701-804; 052-152-063-024-042; 061-960-915-134-527; 069-754-697-292-909; 074-503-636-433-987; 076-610-287-185-407; 079-566-660-187-886; 083-322-626-930-350; 086-091-202-010-191; 087-665-408-966-240; 087-932-943-720-094; 090-612-776-502-502; 095-691-114-276-825; 096-289-210-165-616; 101-091-831-428-576; 102-734-676-905-303; 103-284-731-368-055; 104-436-211-123-27X; 121-704-965-852-836; 122-901-706-101-367; 144-124-797-675-052; 157-954-859-648-506; 159-477-048-665-066; 163-330-758-807-944; 174-186-817-525-708; 175-990-204-400-543; 176-945-140-902-977; 199-745-676-923-766,43,true,,green 018-967-672-830-44X,A novel and accurate chess pattern for automated texture classification,,2019,journal article,Physica A: Statistical Mechanics and its Applications,03784371,Elsevier BV,Netherlands,Turker Tuncer; Sengul Dogan; Volkan Ataman,,536,,122584,,Image (mathematics); Support vector machine; Block (data storage); Artificial intelligence; Pattern recognition; Computer science; Feature extraction; Histogram; Linear discriminant analysis; Feature (computer vision); Reduction (complexity),,,,,https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902256706843511 http://ui.adsabs.harvard.edu/abs/2019PhyA..53622584T/abstract https://www.sciencedirect.com/science/article/pii/S0378437119314797,http://dx.doi.org/10.1016/j.physa.2019.122584,,10.1016/j.physa.2019.122584,2972009675,,0,003-488-725-313-903; 004-026-543-079-124; 005-287-200-698-320; 005-611-740-917-864; 007-789-415-690-409; 008-508-113-612-045; 009-614-246-768-364; 011-883-359-022-523; 016-639-173-008-341; 017-364-030-021-772; 018-956-172-682-15X; 023-180-125-900-869; 025-920-255-032-987; 028-670-071-399-338; 030-265-047-075-774; 030-948-014-313-302; 034-073-120-160-844; 035-305-822-525-007; 035-837-569-906-742; 038-375-110-657-557; 038-684-901-913-157; 039-342-945-114-214; 039-749-767-612-599; 041-389-954-231-631; 044-408-940-833-463; 045-240-657-129-980; 045-683-588-033-08X; 049-405-868-114-613; 054-060-415-607-853; 057-558-483-068-174; 058-124-091-198-963; 058-855-086-054-366; 058-938-655-911-57X; 060-118-430-410-502; 063-869-562-289-771; 068-500-682-252-457; 073-649-774-724-18X; 074-237-075-633-321; 075-170-435-669-76X; 075-932-604-738-315; 076-475-741-171-461; 077-522-575-038-061; 077-564-871-128-518; 079-551-500-387-270; 081-772-752-266-812; 082-314-034-414-110; 084-090-807-041-196; 084-628-739-448-294; 085-318-741-678-227; 087-524-269-634-211; 095-981-235-447-139; 098-097-961-333-111; 101-990-173-398-318; 104-012-648-099-461; 104-188-344-892-11X; 115-695-248-325-540; 115-882-536-250-954; 120-588-671-187-744; 131-554-208-978-791; 138-615-967-032-367; 143-488-633-579-516; 145-351-302-832-877; 155-424-773-165-625; 166-410-236-318-587; 175-605-332-852-137,13,false,, 018-996-827-041-158,Part 2:- Quality assurance mechanisms for digital forensic investigations: knowledge sharing and the Capsule of Digital Evidence (CODE),,2020,journal article,Forensic Science International: Reports,26659107,Elsevier BV,,Graeme Horsman,"Abstract Despite potential numerous benefits, the field-wide sharing of knowledge in digital forensics is arguably still yet to be attained. Achieving this has attracted much practitioner and academic debate, yet solutions to two fundamental hurdles have yet to arguably be addressed; ‘how do we share knowledge’, and ‘what do we share’. Currently there a few viable protocols in place which tackle either of these issues forming a barrier to field-wide sharing. The focus of this work is to address the latter issue and guide practitioners on what content must be shared for any data to be of value to fellow professionals. This paper proposes the Capsule of Digital Evidence (CODE), a framework designed to set out the required elements for the sharing of reliable digital forensic knowledge. The CODE structure and its requisite contents are examined along with its applicability for supporting field-wide knowledge sharing in digital forensics.",2,,100035,,Set (psychology); Code (semiotics); Structure (mathematical logic); Data science; Value (ethics); Knowledge sharing; Digital evidence; Focus (computing); Computer science; Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S2665910719300350 https://research.tees.ac.uk/ws/files/8652528/Part_2_Quality_assurance_mechanisms_for_digital_forensic_investigations_knowledge_sharing_and_the_Capsule_of_Digital_Evidence_CODE_.pdf http://www.sciencedirect.com/science/article/pii/S2665910719300350 https://research.tees.ac.uk/en/publications/part-2-quality-assurance-mechanisms-for-digital-forensic-investig https://core.ac.uk/download/pdf/232941018.pdf,http://dx.doi.org/10.1016/j.fsir.2019.100035,,10.1016/j.fsir.2019.100035,2980699189,,0,000-360-120-513-679; 004-652-388-189-304; 005-116-312-278-527; 006-933-430-647-14X; 007-790-059-029-953; 032-451-540-235-796; 036-112-898-081-145; 049-182-076-079-260; 058-052-081-943-595; 065-452-675-566-99X; 065-671-045-136-370; 065-873-523-989-876; 072-649-380-391-806; 077-287-216-746-675; 081-437-161-307-223; 111-061-578-674-84X; 111-488-239-742-003; 118-838-969-146-870; 159-513-941-346-557; 179-703-555-795-891,2,true,"CC BY, CC BY-NC-ND",gold 019-268-703-108-809,Qualitative assessment of the dental groove pattern and its uniqueness for forensic identification.,,2019,journal article,Journal of forensic dental sciences,09751475,Informatics Publishing Limited,India,Jyotirmoy Roy; M. M. Rohith; Debesh Nilendu; Abraham Johnson,"Introduction: Teeth are invaluable in both the living and the deceased for forensic identification and profiling purposes. The occlusal surface patterns in the molars of an individual depend on both intrinsic and extrinsic factors. The individualistic nature of the groove pattern can be used to determine the identity of an individual by the process of comparative identification. Aim and Objective: The objective of this study is to determine the uniqueness of the groove pattern among individuals by the means of digital analysis. Materials and Methods: An experimental study was conducted on 80 dental casts where the occlusal groove patterns of 1st and 2nd molars from each cast were traced digitally using image analysis software GIMP (v 2.10.6). The traced patterns were then examined to determine their uniqueness. Results: The most common groove patterns for the maxillary 1st and 2nd molars were found to resemble “Branched H” and “H”, respectively. “Y” pattern was observed to be the most common in mandibular 1st molar, whereas mandibular 2nd molar most commonly exhibited “+” pattern. No two groove patterns were similar in the analysis. Conclusion: Digital method of analysis is preferable over conventional manual methods as it is noninvasive and precise. The individualistic nature of occlusal groove patterns may play an important role in comparative forensic identification.",11,1,42,47,Psychology; Molar; Uniqueness; Forensic identification; Image analysis; Occlusal surface; Orthodontics; Digital analysis; Method of analysis; Mandibular second molar,Antimere; digital analysis; groove pattern; identification; molars; uniqueness,,,,https://europepmc.org/article/MED/31680755 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6822311 https://pubmed.ncbi.nlm.nih.gov/31680755/ https://www.jfds.org/article.asp?issn=0975-1475;year=2019;volume=11;issue=1;spage=42;epage=47;aulast=Roy,http://dx.doi.org/10.4103/jfo.jfds_73_19,31680755,10.4103/jfo.jfds_73_19,2980894233,PMC6822311,0,009-137-519-650-638; 015-249-012-496-452; 018-562-810-662-080; 020-004-914-459-453; 020-582-673-772-522; 027-717-012-592-09X; 030-048-830-249-536; 037-263-725-891-005; 048-533-814-100-267; 050-039-908-326-011; 054-786-586-950-640; 055-663-445-756-832; 067-633-696-421-592; 070-492-240-043-716; 078-308-705-230-713; 096-591-475-205-633; 118-502-108-827-069,2,true,cc-by-nc-sa,green 019-302-334-316-560,Tainted digital evidence and privacy protection in blockchain-based systems,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,David Billard,,32,,300911,,Internet privacy; Blockchain; Digital evidence; Privacy protection; Computer science,,,,,https://www.sciencedirect.com/science/article/pii/S2666281720300068 https://arodes.hes-so.ch/record/5505/files/Published%20version.pdf https://arodes.hes-so.ch/record/5505 https://hesso.tind.io/record/5505/files/Published%20version.pdf https://hesso.tind.io/record/5505,http://dx.doi.org/10.1016/j.fsidi.2020.300911,,10.1016/j.fsidi.2020.300911,3030857466,,0,,1,true,cc-by-nc-nd,hybrid 019-309-662-208-894,Top Internet Forensic Tools: An Evaluation,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Pooja Kadam; Amrit Chhetri,,,,,,The Internet; World Wide Web; Forensic science; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.11,http://dx.doi.org/10.46293/4n6/2020.02.03.11,,10.46293/4n6/2020.02.03.11,3097623149,,0,,0,false,, 019-343-578-992-507,Vehicle Interior Sound Classification Based on Local Quintet Magnitude Pattern and Iterative Neighborhood Component Analysis,2022-10-20,2022,journal article,Applied Artificial Intelligence,08839514; 10876545,Informa UK Limited,,Erhan Akbal; Turker Tuncer; Sengul Dogan,,36,1,,,,,,,,,http://dx.doi.org/10.1080/08839514.2022.2137653,,10.1080/08839514.2022.2137653,,,0,001-146-735-622-053; 008-839-269-476-736; 010-210-521-219-242; 015-479-915-372-200; 017-675-872-918-197; 017-878-265-650-766; 020-233-013-143-936; 021-183-580-811-308; 022-320-699-359-472; 023-186-296-335-953; 025-563-144-816-540; 028-221-850-747-211; 032-047-651-616-52X; 033-778-277-291-408; 036-950-617-433-873; 037-667-517-992-785; 039-980-054-965-695; 040-663-842-045-423; 042-728-080-212-236; 051-222-696-951-609; 055-021-931-278-616; 056-603-905-531-899; 057-115-503-939-73X; 062-054-795-380-257; 064-677-836-361-460; 064-954-863-162-996; 071-802-725-053-362; 074-178-152-368-836; 078-866-992-684-49X; 079-310-940-223-758; 079-597-994-283-562; 090-022-711-196-890; 135-964-351-267-463; 137-195-393-202-747; 138-180-346-354-443; 185-970-368-530-71X; 198-564-739-531-884,0,true,"CC BY, CC BY-NC",gold 019-500-518-223-980,A Virtual Environment Forensic Tool,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Danish K. Chaus; Akshay J. Boramani Aayush Pathak,,7,1,63,71,Virtual machine; Computer science; Multimedia; Wireless,,,,,http://sdiwc.net/digital-library/a-virtual-environment-forensic-tool,http://dx.doi.org/10.17781/p002333,,10.17781/p002333,2790486266,,0,,1,false,, 019-508-480-187-000,"Inter-regional digital forensic knowledge management: needs, challenges, and solutions",2020-11-06,2020,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Eoghan Casey; Anna Zehnder,"Increasing demand for digital evidence in criminal investigations is driving decentralization of forensic capabilities closer to the crime scene. Law enforcement agencies are struggling to keep pace with technological developments, cybercrime growth, and scientific advances. In federated environments, digital forensic knowledge and practices vary widely across regions. To reduce delays, wasted resources, missed opportunities, mistakes, and misinterpretations, there is a pressing need to balance the democratization of digital forensic capabilities with knowledge management and sharing between decentralized regions. There are multiple forms of knowledge to be managed, including procedural, technical, investigative, scientific, behavioral, crime analysis, and forensic intelligence. In addition, there are multiple knowledge producers and consumers, including police investigators, digital forensic practitioners, criminal intelligence analysts, attorneys, and judges. Knowledge management becomes even more challenging when multiple interdependent regions are involved, speaking different languages. Taking all of these factors into consideration, this work presents an inter-regional knowledge management solution for improving the quality, consistency, reliability, efficiency, cost-effectiveness, and return on investment of digital forensic capabilities. The basis of this work is a community-driven initiative of Swiss regional police authorities. Interviews were conducted with 15 digital forensic units to determine their current knowledge management practices and needs. The results were then generalized into a prioritized set of requirements for inter-regional digital forensic knowledge management that may be applicable in other countries. These requirements were used to evaluate knowledge management platforms, and one was selected. Implementation, operations, and maintenance challenges of an inter-regional digital forensic knowledge management platform are discussed.",66,2,619,629,Criminal investigation; Business; Return on investment; Crime scene; Crime analysis; Cybercrime; Law enforcement; Digital evidence; Knowledge management; Digital forensics,IT investigation; collaboration; communication; digital forensics; digital investigation; efficiency; knowledge management and exchange; optimization,,,,https://pubmed.ncbi.nlm.nih.gov/33156519/ https://onlinelibrary.wiley.com/doi/10.1111/1556-4029.14613 https://www.ncbi.nlm.nih.gov/pubmed/33156519,http://dx.doi.org/10.1111/1556-4029.14613,33156519,10.1111/1556-4029.14613,3096266278,,0,007-898-145-584-667; 012-564-492-558-122; 030-177-879-793-402; 035-798-220-182-973; 051-975-164-698-08X; 085-482-775-276-618; 087-342-951-350-054; 102-277-601-213-467; 132-309-864-704-323; 135-988-931-214-479; 159-513-941-346-557; 171-620-328-325-465,1,false,, 020-140-834-798-099,Improved JPEG anti-forensics with better image visual quality and forensic undetectability.,2017-06-10,2017,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Gurinder Singh; Kulbir Singh,,277,,133,147,Artificial intelligence; JPEG; Quantization (image processing); Computer vision; Smoothing; Computer science; Digital image; Image quality; JPEG 2000; Lossless JPEG; Image processing,Blocking artifacts; Digital image forensics; Double JPEG compression; JPEG anti-forensics,,,"Department of Electronics and Information Technology, Ministry of Communications and Information Technology, Government of India",https://www.ncbi.nlm.nih.gov/pubmed/28648761 https://pubmed.ncbi.nlm.nih.gov/28648761/ https://europepmc.org/abstract/MED/28648761 https://www.sciencedirect.com/science/article/pii/S0379073817302104,http://dx.doi.org/10.1016/j.forsciint.2017.06.003,28648761,10.1016/j.forsciint.2017.06.003,2622891046,,0,004-530-492-547-92X; 005-021-673-285-683; 010-520-450-059-352; 013-974-329-685-015; 017-204-518-291-44X; 035-858-800-759-785; 039-742-416-961-250; 040-639-509-253-00X; 041-838-544-052-666; 044-860-657-165-931; 047-526-773-255-825; 051-035-217-903-949; 053-217-455-972-392; 058-535-586-038-159; 064-665-774-871-511; 067-320-468-684-094; 068-082-205-208-585; 072-936-991-584-107; 074-602-449-941-680; 076-346-829-732-533; 079-895-886-182-831; 080-418-584-620-246; 090-549-892-639-865; 095-036-957-604-048; 101-218-430-388-564; 106-688-419-298-857; 112-077-011-771-30X; 118-809-666-753-347; 120-453-234-664-794; 125-522-019-183-785; 132-802-162-553-005; 134-221-241-049-015; 139-901-566-639-372; 150-280-000-852-253; 161-459-893-930-499; 172-112-498-122-981,22,false,, 020-149-267-617-001,Calculating LRs for presence of body fluids from mRNA assay data in mixtures.,2021-01-15,2021,journal article,Forensic science international. Genetics,18780326; 18724973,Elsevier Ireland Ltd,Netherlands,Rolf J. F. Ypma; P.A. Maaskant van Wijk; Richard D. Gill; Marjan Sjerps; M. van den Berge,,52,,102455,,Statistical model; Calibration (statistics); Artificial intelligence; Test data; Pattern recognition; Probabilistic classification; Body fluid; Classifier (linguistics); Computer science; Probabilistic logic; Robustness (computer science),Body fluid typing; Calibration; LR system; Machine learning; mRNA profile,"Blood Chemical Analysis; Cervix Mucus/chemistry; Female; Forensic Genetics/methods; Genetic Markers; Humans; Likelihood Functions; Machine Learning; Male; Menstruation; Nasal Mucosa/chemistry; RNA, Messenger/analysis; Saliva/chemistry; Semen/chemistry; Skin/chemistry","Genetic Markers; RNA, Messenger",,https://www.sciencedirect.com/science/article/pii/S1872497320302271 https://www.ncbi.nlm.nih.gov/pubmed/33461104 https://pubmed.ncbi.nlm.nih.gov/33461104/,http://dx.doi.org/10.1016/j.fsigen.2020.102455,33461104,10.1016/j.fsigen.2020.102455,3120718634,,0,000-744-025-662-062; 001-198-901-888-178; 001-680-991-240-230; 002-914-447-841-273; 004-562-487-736-159; 006-101-714-460-131; 006-299-463-890-28X; 006-493-172-971-273; 009-121-559-836-713; 011-799-646-287-557; 020-045-639-781-210; 020-541-972-037-746; 020-652-717-185-903; 022-477-796-652-430; 025-010-654-468-777; 030-388-052-894-774; 033-097-628-947-728; 033-764-933-443-506; 039-204-711-327-772; 041-632-112-142-883; 042-391-319-022-215; 045-879-473-111-775; 046-064-694-919-734; 048-672-020-380-850; 048-915-547-176-171; 063-429-877-327-446; 074-695-197-880-37X; 078-591-164-124-681; 079-333-264-309-637; 082-925-985-516-270; 096-986-617-825-552; 097-196-452-994-509; 097-621-383-589-159; 098-868-907-313-710; 119-261-946-266-987; 120-388-714-246-243; 134-213-804-511-155; 142-527-962-979-521; 166-043-248-700-036,7,false,, 020-402-775-494-34X,2020 - A new decade of forensic science,,2020,journal article,Forensic Science International: Reports,26659107,Elsevier BV,,Graeme Horsman; Mubarak A. Bidmos; Georgina Sauzier; Martin Bodner,,2,,100074,,Engineering; Forensic science; Engineering ethics,,,,,https://research.tees.ac.uk/en/publications/2020-a-new-decade-of-forensic-science,http://dx.doi.org/10.1016/j.fsir.2020.100074,,10.1016/j.fsir.2020.100074,3010919026,,0,,0,true,"CC BY, CC BY-NC-ND",gold 020-514-357-686-409,Digital Forensics : Challenges and Opportunities for Future Studies,2020-04-01,2020,journal article,International Journal of Organizational and Collective Intelligence,19479344; 19479352,IGI Global,,Reza Montasari; Richard Hill; Simon Parkinson; Pekka Peltola; Amin Hosseinian-Far; Alireza Daneshkhah,"Considering the ever-growing ubiquity of technology, there is an associated growth in the possibility of digital devices related to a criminal investigation or civil litigation. As the variety of digital devices is increasing, the storage capacity of each is also rising exponentially. Due to the varied and large volumes of data produced, law enforcement agencies (LEAs) worldwide are facing a significant backlog of cases. This has culminated in significant delays in dealing with cases that urgently require digital forensic investigations (DFIs). It is of paramount importance that new research approaches be adopted to address such challenges. This article evaluates the existing set of circumstances surrounding the field of digital forensics (DF). The article provides two important contributions to the field of DF; it identifies and analyses the most important mid- and long-term challenges that need to be considered by LEAs. It also proposes important specific future research directions, the undertaking of which can assist LEAs in adopting a new approach to addressing these challenges.",10,2,37,53,Risk analysis (engineering); Criminal investigation; Variety (cybernetics); Encryption; Set (psychology); Law enforcement; Field (computer science); Computer science; Big data; Digital forensics,,,,,https://www.igi-global.com/article/digital-forensics/250211 https://pure.hud.ac.uk/en/publications/digital-forensics-challenges-and-opportunities-for-future-studies http://nectar.northampton.ac.uk/12638/ https://dblp.uni-trier.de/db/journals/ijoci/ijoci10.html#MontasariHPPFD20 http://nectar.northampton.ac.uk/id/document/28120 https://doi.org/10.4018/IJOCI.2020040103 https://pure.northampton.ac.uk/en/publications/digital-forensics-challenges-and-opportunities-for-future-studies https://core.ac.uk/download/287595994.pdf,http://dx.doi.org/10.4018/ijoci.2020040103,,10.4018/ijoci.2020040103,2980113193,,0,000-086-616-947-367; 000-534-406-835-275; 004-668-612-287-432; 009-590-693-941-065; 009-885-874-541-907; 015-286-421-212-53X; 016-526-859-340-786; 017-335-677-993-203; 017-700-647-172-124; 023-858-572-607-02X; 024-462-843-796-80X; 027-031-165-049-753; 033-917-669-644-935; 034-008-964-356-002; 034-190-709-015-829; 040-567-901-099-238; 043-295-959-292-738; 047-382-227-529-112; 050-162-262-069-952; 054-502-354-794-645; 056-122-492-187-163; 059-697-278-686-056; 067-840-274-503-047; 068-520-918-599-405; 077-963-490-848-763; 081-447-017-308-327; 081-833-857-658-915; 083-091-368-558-414; 083-998-931-919-617; 092-233-656-399-603; 092-426-219-217-737; 094-295-279-676-447; 095-691-114-276-825; 111-746-829-685-861; 121-830-676-400-128; 127-526-081-978-336; 130-080-242-566-434; 133-456-103-290-986; 134-927-490-231-285; 137-755-137-054-864; 146-021-806-272-345; 163-330-758-807-944; 179-161-770-608-928,6,true,,green 020-577-952-995-503,Research on Methods of Audio Recorder Forensic Identification,,2014,journal article,Chinese Journal of Forensic Sciences,16712072,,,Zeng Jin-hu,"Objective With the popularity of cell phones and digital recorders, traditional analog recordings have been largely replaced by digital ones in the audio forensic examination. Digital recordings are important parts of audio-visual materials, and the research on novel forensic authentication methods is of great importance both in theoretical significance and practical value.In this paper, the method of audio forensic authentication through identifying audio recorders was studied. Method Silent segments were firstly extracted in digital recordings, and the key equipment-related statistical features, i.e., sampling histogram distribution and spectral mean, were computed. Digital recordings were classified with the usage of the method in the fields of machine learning and pattern classification. Results The best classification accuracy in the experiments was up to 97.09%. On the basis of the result that digital recorders could be successfully identified, a feasible implementing scheme for forensic identification of digital recorders was proposed. Conclusion The audio recorder forensic identification based on signal statistical analysis is feasible and accurate.",,,,,Signal; Sampling (signal processing); Authentication; Key (cryptography); Scheme (programming language); Forensic identification; Speech recognition; Forensic examination; Computer science; Histogram,,,,,https://en.cnki.com.cn/Article_en/CJFDTotal-SFJD201406006.htm,https://en.cnki.com.cn/Article_en/CJFDTotal-SFJD201406006.htm,,,2365924721,,0,,0,false,, 020-618-203-059-599,ANALISIS LOG PENERBANGAN PADA UNMANNED AERIAL VEHICLE (UAV) SEBAGAI BARANG BUKTI DIGITAL,2020-04-30,2020,journal article,Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM),25282514; 25275399,"Center for Journal Management and Publication, Lambung Mangkurat University",,Septyan Eka Prastya; Subhan Panji Cipta; Bayu Nugraha,"Pada beberapa akhir ini, penggunaan perangkat drone oleh masyarakat umum meningkat dengan sangat pesat, presentasi total dari penjualan terus meningkat pesat dari tahunnya, total dari penjualan drone di tahun 2020 diperkirakan akan menyentuh angka $2.28 Bilion. Dengan peningkatan sebesar itu, kemungkinan akan terjadinya penyalahgunaan Unmanned Aerial Vehicle (UAV) dalam menjalankan tindak kejahatan semakin besar. Dari analisis forensik data dengan menggunakan metode static forensic dan live forencic untuk mendapatkan data yang memungkinkan untuk digunakan sebagai barang bukti digital. Diharapkan dapat menggali informasi yang bisa digunakan sebagai barang bukti digital pada UAV dan kontroler, serta mengetahui karakteristik bukti digital pada UAV. Hasil yang menampilkan bahwa terdapat perangkat smartphone yang digunakan sebagai kontroler UAV memiliki peranan yang penting dalam investigasi. Karena didalam perangkat tersebut memiliki nilai informasi bukti digital yang lengkap jika dibandingkan dengan media penyimpanan yang terdapat pada perangkat UAV lainnya. Contohnya dalam penggunaan perangkat drone DJI Phantom 3 Advanced selalu menggunakan GPS pada penerbangannya, file gambar maupun video yang diambil menggunakan kamera pesawat pasti memiliki koordinat lokasi GPS pada metadata didalamnya.",5,1,11,18,Operating system; Physics,,,,,http://jtiulm.ti.ft.ulm.ac.id/index.php/jtiulm/article/download/42/42 http://jtiulm.ti.ft.ulm.ac.id/index.php/JTIULM/article/view/42 https://core.ac.uk/download/pdf/325937892.pdf,http://dx.doi.org/10.20527/jtiulm.v5i1.42,,10.20527/jtiulm.v5i1.42,3021446331,,0,,0,true,,bronze 020-678-358-516-699,"THE USE OF ""SMART"" TECHNOLOGIES IN FORENSICS",2022-08-09,2022,journal article,Criminalistics and Forensics,01302655,Kyiv Scientific Research Institute of Forensic Expertise,,Roman Pertsev,"In the modern world, technology continues to develop, this development is necessary for various industries, including police investigations. Thus, with the proper use of “smart” technologies, law enforcement agencies can predict, prevent and solve crimes.; ; This paper discusses the process of obtaining and identifying important information that digital devices located at the crime scene can provide the police investigation. After analyzing which, the investigating authorities conducting pre-trial investigations can use it to identify and catch criminals, and in the future even to prevent crimes from happening.; ; The issue of protecting privacy in the Internet era and the regulation at the legislative level of the work of investigative and law enforcement agencies in the field of digital technologies is touched upon.; ; As a result of the study, the author concludes that with the advent and introduction of “smart” technologies, increasing the professionalism of police officers requires constant updating of knowledge and skills, the exchange of innovative developments with specialists from other countries, mastering the latest methods, mechanisms, and tools for conducting forensic research.; ; Forensic investigators involved in crime scene investigations must be able to recognize and professionally retrieve hybrid (digital) devices to preserve possible information stored in them for further digital forensics.; ; Key words: smart technologies, digital devices, digital forensics, privacy, police investigation, forensic intelligence.",,67,104,113,Digital forensics; Law enforcement; Computer security; Computer forensics; Digital evidence; Computer science; Emerging technologies; Process (computing); Crime scene; The Internet; Internet privacy; Legislature; Field (mathematics); Criminal investigation; Law; World Wide Web; Political science; Artificial intelligence; Mathematics; Pure mathematics; Operating system,,,,,,http://dx.doi.org/10.33994/kndise.2022.67.12,,10.33994/kndise.2022.67.12,,,0,,0,true,,gold 020-753-485-976-476,Acquisition And Analysis of Cryptographic Keys In IoT Devices,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Anant Gangwar,,,,,,Computer security; Computer science; Internet of Things,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.03,http://dx.doi.org/10.46293/4n6/2021.03.02.03,,10.46293/4n6/2021.03.02.03,3163190784,,0,,0,false,, 021-032-360-247-284,Surveillance arbitration in the era of digital policing,2020-10-29,2020,journal article,Theoretical Criminology,13624806; 14617439,SAGE Publications,United States,Pete Fussey; Ajay Sandhu,"This article analyses adoptions of innovative technology into police surveillance activities. Extending the nascent body of empirical research on digital policing, the article draws on qualitative ...",26,1,136248062096702,22,Empirical research; Arbitration; Political science; Public administration; Corporate governance,,,,Economic and Social Research Council,https://journals.sagepub.com/doi/full/10.1177/1362480620967020 http://repository.essex.ac.uk/29070/ https://journals.sagepub.com/doi/pdf/10.1177/1362480620967020 https://core.ac.uk/download/349055538.pdf,http://dx.doi.org/10.1177/1362480620967020,,10.1177/1362480620967020,3096623286,,0,001-821-831-894-186; 012-270-767-861-662; 014-097-783-355-109; 023-152-021-041-854; 023-186-803-177-268; 025-286-695-569-774; 026-588-717-166-301; 038-688-112-403-574; 041-722-528-532-809; 045-870-136-062-369; 050-753-667-628-358; 060-960-673-273-578; 063-432-677-340-141; 073-286-086-811-562; 078-301-215-510-630; 079-935-205-118-038; 095-550-658-655-488; 104-097-365-152-221; 105-178-045-344-444; 110-276-215-023-281; 117-146-333-003-475; 117-878-192-802-09X; 125-744-074-128-58X; 140-450-619-266-350; 143-844-869-567-114; 146-668-365-375-206; 163-883-785-921-320; 168-895-491-328-708,2,true,cc-by,hybrid 021-141-864-275-820,A Survey of Social Network Forensics,,2016,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Umit Karabiyik; Muhammed Abdullah Canbaz; Ahmet Aksoy; Tayfun Tuna; Esra Akbas; Bilal Gonen; Ramazan S. Aygun,"Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent any criminal activities in different forms. It will also help researchers to develop new models/techniques in the future. This paper provides literature review of the social network forensics methods, models, and techniques in order to provide an overview to the researchers for their future works as well as the law enforcement investigators for their investigations when crimes are committed in the cyber space. It also provides awareness and defense methods for OSN users in order to protect them against to social attacks",11,4,8,,Internet privacy; Deception; Computer security; Computer science; Computer forensics; Digital forensics; Social network,,,,,https://commons.erau.edu/jdfsl/vol11/iss4/8/ https://paperity.org/p/84080041/a-survey-of-social-network-forensics https://scholarworks.unr.edu/handle/11714/5846 https://commons.erau.edu/cgi/viewcontent.cgi?article=1430&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#KarabiyikCATAGA16,http://dx.doi.org/10.15394/jdfsl.2016.1430,,10.15394/jdfsl.2016.1430,2619470952,,0,000-469-827-177-583; 000-484-914-776-82X; 001-381-793-304-07X; 002-419-478-472-564; 003-504-554-245-316; 004-877-171-081-463; 005-893-121-581-140; 009-991-837-240-987; 011-167-475-273-787; 015-564-409-935-804; 019-543-470-173-805; 022-636-006-659-431; 024-925-878-840-127; 027-197-549-505-279; 030-862-578-988-527; 030-993-054-693-672; 031-753-460-696-59X; 035-132-655-632-91X; 035-371-158-773-648; 036-015-405-909-553; 036-935-882-457-459; 037-425-006-020-472; 040-305-488-278-717; 042-726-403-204-494; 042-971-470-862-680; 046-711-571-676-603; 047-665-339-831-535; 047-910-166-826-477; 052-610-182-374-534; 053-374-727-893-575; 054-206-394-140-13X; 056-631-006-394-948; 056-955-029-329-402; 056-989-671-127-336; 062-911-207-191-884; 065-272-160-846-134; 071-487-799-652-440; 073-161-119-846-894; 075-464-746-410-310; 077-973-447-839-510; 078-951-160-126-643; 080-935-235-805-088; 081-614-135-845-612; 082-045-258-380-463; 086-752-181-853-186; 090-075-652-286-106; 092-986-957-635-856; 093-532-558-971-393; 094-731-072-774-400; 095-190-414-299-943; 100-757-328-742-367; 102-745-623-938-105; 104-002-904-183-496; 105-148-018-628-233; 105-311-479-492-727; 105-909-114-003-069; 109-022-524-798-800; 115-913-867-402-691; 122-444-249-046-831; 125-996-532-336-169; 126-712-137-437-348; 127-000-465-967-47X; 128-129-106-162-85X; 128-571-842-539-071; 131-744-323-305-581; 135-400-931-641-526; 137-451-223-326-907; 137-631-285-811-164; 138-063-127-154-190; 140-647-496-763-574; 159-767-098-783-20X; 160-786-939-869-331; 165-770-474-971-736; 167-811-760-794-903; 178-489-374-758-652; 180-011-846-779-865; 181-141-508-307-066; 182-735-942-654-284; 198-850-895-840-280,8,true,cc-by-nc,gold 021-239-973-367-797,Digital Forensics CTF: An Art Of Forensic Upskilling,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Amrit Chhetri,,,,,,Forensic science; Computer science; Multimedia; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.08,http://dx.doi.org/10.46293/4n6/2020.02.03.08,,10.46293/4n6/2020.02.03.08,3096879315,,0,,0,false,, 021-286-019-586-450,Another brick in the wall: An exploratory analysis of digital forensics programs in the United States,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Syria McCullough; Stella Abudu; Ebere Onwubuariri; Ibrahim Baggili,"Abstract We present a comprehensive review of digital forensics programs offered by universities across the United States (U.S.). While numerous studies on digital forensics standards and curriculum exist, few, if any, have examined digital forensics courses offered across the nation. Since digital forensics courses vary from university to university, online course catalogs for academic institutions were evaluated to curate a dataset. Universities were selected based on online searches, similar to those that would be made by prospective students. Ninety-seven (n = 97) degree programs in the U.S. were evaluated. Overall, results showed that advanced technical courses are missing from curricula. We conclude that most degree programs evaluated offer legal/cyber law & ethics, investigative processes, and lab & forensic operations courses. The courses offered the least were memory forensics, Internet of Things (IoT) forensics, and program & software forensics. The data shows that some universities with the Forensic Science Education Programs Accreditation Commission (FEPAC) accreditation are lacking instruction in timely digital forensics topics such as memory forensics (0%), hardware security (0%), program & software forensics (0%), and ethical hacking (0%). Investigative processes (100%), network forensics (100%), lab & forensic operations (100%), and a senior design/capstone project (100%) are offered at all FEPAC accredited universities in digital forensics and digital evidence. Undergraduate degree programs with the National Centers of Digital Forensics Academic Excellence (CDFAE) designation had over a 50% offering rate for 11 out of the 22 courses we evaluated. However, memory forensics (0%) and IoT forensics (12.5%) were largely underrepresented. Our work provides an overview of the current state of digital forensics programs and discusses the importance of these courses to educate the next digital forensics workforce.",37,,301187,,Certified Ethical Hacker; Memory forensics; Excellence; Digital evidence; Computer science; Curriculum; Network forensics; Medical education; Accreditation; Digital forensics,,,,,https://dfrws.org/presentation/another-brick-in-the-wall-an-exploratory-analysis-of-digital-forensics-programs-in-the-united-states/ https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1101&context=electricalcomputerengineering-facpubs https://dfrws.org/wp-content/uploads/2021/09/2021-usa-paper-11-another_brick_in_the_wall_an_exploratory_analysis_of_digital_forensics_programs_in_the_united_states.pdf https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/100/ https://www.sciencedirect.com/science/article/pii/S2666281721000950,http://dx.doi.org/10.1016/j.fsidi.2021.301187,,10.1016/j.fsidi.2021.301187,3162582693,,0,013-568-618-083-770; 042-997-613-590-885; 065-459-442-784-779; 078-327-902-374-330; 095-738-791-161-430; 097-939-114-561-254; 112-145-333-308-520; 118-244-930-021-861; 134-927-490-231-285; 150-535-534-813-410; 175-879-272-175-020; 184-804-094-399-813; 198-476-125-680-623,1,true,cc-by-nc-nd,hybrid 021-561-259-505-377,LDPC Codes and Digital Forensics – A Perspective Approach,2019-04-29,2019,journal article,Iete Journal of Research,03772063,,,Madhusmita Mishra,Forensic science (or forensics) is the quisling of sciences and technologies to enquire and demonstrate facts of interest in relation to criminal or civil law. Although forensics has greatly enhanc...,,,1,8,Perspective (graphical); Relation (database); Computer science; Civil law (common law); Engineering ethics; Low-density parity-check code; Digital forensics,,,,,https://www.tandfonline.com/doi/full/10.1080/03772063.2019.1604170,https://www.tandfonline.com/doi/full/10.1080/03772063.2019.1604170,,,2943640087,,0,016-706-194-029-958; 021-822-507-493-073; 055-469-788-465-739; 060-983-905-471-058; 077-836-533-581-906; 113-342-977-472-720; 132-031-780-001-846; 153-501-219-904-367,1,false,, 021-688-526-901-955,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,36,,301145,301145,Computer science; Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00043-3,,10.1016/s2666-2817(21)00043-3,,,0,,0,false,, 021-709-633-408-146,Detection of Phishing Emails with Email Forensic Analysis and Machine Learning Techniques,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Kamran Morovati; Sanjay Kadam,,8,2,98,107,World Wide Web; Computer science; Wireless; Phishing,,,,,http://sdiwc.net/digital-library/detection-of-phishing-emails-with-email-forensic-analysis-and-machine-learning-techniques,http://dx.doi.org/10.17781/p002568,,10.17781/p002568,2974295432,,0,002-230-990-537-030; 106-066-275-544-628,3,false,, 021-716-716-674-058,Verification of Recovered Digital Evidence on the Amazon Kindle,,2016,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Marcus Thompson; Raymond Hansen,"The Amazon Kindle is a popular e-book reader. This popularity will lead criminals to use the Kindle as an accessory to their crime. Very few Kindle publications in the digital forensics domain exist at the time of this writing. Various blogs on the Internet currently provide some of the foundation for Kindle forensics. For this research each fifth generation Kindle was populated with various types of files a typical user may introduce using one method, the USB interface. The Kindle was forensically imaged with AccessData’s Forensic Toolkit Imager before and after each Kindle was populated. Each file was deleted through the USB interface. Files were retrieved and recovered through the USB interface before and after file deletion. These two sets of files were compared to the original set of files. All files retrieved before deletion matched their original counterpart. Not all files recovered after deletion matched their original counterpart. These steps and procedures followed a similar adaptation of the NIST General Test Methodology for Computer Forensic Tools developed by Leshney (2008) for virtual machines.",11,2,175,192,The Internet; World Wide Web; Set (abstract data type); Virtual machine; Interface (Java); File deletion; Digital evidence; Computer science; USB; Digital forensics,,,,,https://commons.erau.edu/jdfsl/vol11/iss2/11/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1386&context=jdfsl https://paperity.org/p/83910890/verification-of-recovered-digital-evidence-on-the-amazon-kindle https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#ThompsonH16 https://doi.org/10.15394/jdfsl.2016.1386,http://dx.doi.org/10.15394/jdfsl.2016.1386,,10.15394/jdfsl.2016.1386,2529590551,,0,052-665-370-203-554; 085-214-277-668-01X,0,true,cc-by-nc,gold 021-883-413-405-000,A novel ensemble local graph structure based feature extraction network for EEG signal analysis,,2020,journal article,Biomedical Signal Processing and Control,17468094,Elsevier BV,Netherlands,Turker Tuncer; Sengul Dogan; Fatih Ertam; Abdulhamit Subasi,,61,,102006,,Graph (abstract data type); Artificial intelligence; Pattern recognition; Zigzag; Eeg signal analysis; Signal classification; Structure based; Computer science; Discrete wavelet transform; Feature extraction; Pooling,,,,"Effat university, Jeddah, Saudi Arabia",https://dblp.uni-trier.de/db/journals/bspc/bspc61.html#TuncerDES20 https://www.sciencedirect.com/science/article/pii/S1746809420301622,http://dx.doi.org/10.1016/j.bspc.2020.102006,,10.1016/j.bspc.2020.102006,3031127640,,0,002-948-215-996-677; 003-137-879-936-770; 003-456-545-749-041; 004-682-041-586-770; 004-740-760-358-304; 005-680-902-488-994; 006-634-128-055-848; 007-394-731-818-842; 008-087-721-994-89X; 009-747-634-499-863; 010-927-821-808-24X; 015-569-141-394-471; 018-227-296-667-429; 018-956-172-682-15X; 019-240-036-568-128; 020-860-857-007-38X; 022-368-409-764-115; 022-805-867-427-59X; 025-839-677-069-976; 026-130-763-246-076; 027-033-791-744-445; 027-774-243-358-015; 028-652-904-965-922; 029-514-536-519-70X; 032-876-188-691-373; 034-704-081-645-037; 034-752-336-084-814; 035-097-137-030-74X; 035-485-787-290-193; 036-538-884-427-000; 039-692-928-843-845; 043-048-580-828-165; 043-090-187-893-621; 044-408-940-833-463; 048-384-579-772-226; 049-653-969-180-700; 052-605-448-386-430; 054-799-635-473-629; 054-992-088-578-273; 056-448-038-271-090; 060-580-092-863-268; 065-868-141-870-646; 070-324-685-266-725; 071-753-676-462-435; 073-525-070-998-954; 076-378-169-364-697; 076-440-878-381-662; 079-310-940-223-758; 080-289-754-708-462; 081-521-824-189-881; 084-709-694-673-037; 087-104-631-733-618; 106-335-104-403-831; 118-681-411-201-196; 126-739-760-592-024; 136-987-517-025-746; 142-371-159-896-921; 156-037-985-747-789; 156-998-272-765-074; 162-048-251-761-195; 169-078-130-361-381; 175-051-419-243-543,28,false,, 022-036-544-197-474,SEKILAS MENGENAI FORENSIK DIGITAL,,2013,journal article,Jurnal Sosioteknologi,2443258x,The Institute for Research and Community Services (LPPM) ITB,,Budi Raharjo,"Forensik digital merupakan bagian dari ilmu forensik yang melingkupi penemuan dan investigasi materi (data) yang ditemukan pada perangkat digital. Sebagai ilmu yang masih baru, masih dibutuhkan pemahaman dan kemampuan untuk menguasai ilmu ini. Penguasaan ilmu ini tidak hanya ditujukan pada kemampuan teknis semata tetapi juga terkait dengan bidang lain, seperti bidang hukum. Makalah ini menguraikan secara singkat mengenai forensik digital. Kata kunci: forensik, keamanan, teknologi informasi Digital forensic is considered a new field of study. It is a branch of forensic science encompassing the recovery and investigation of data found in digital devices. Digital forensic is needed to solve cyber crimes and related security problems. As a new field, awareness and skills are needed to master this field. Digital forensic is not only related to technical but also legal aspects. This paper describes digital forensic in a nut shell. Keywords: forensic, information technology, security",12,29,384,387,,,,,,https://www.neliti.com/publications/41700/sekilas-mengenai-forensik-digital https://media.neliti.com/media/publications/41700-ID-sekilas-mengenai-forensik-digital.pdf,http://dx.doi.org/10.5614/sostek.itbj.2013.12.29.3,,10.5614/sostek.itbj.2013.12.29.3,2132883088,,0,,5,true,,bronze 022-151-972-674-832,DIGITALIZATION OF COLLECTIONS IN FORENSIC INVESTIGATION,,2021,journal article,Vektor nauki Tol'attinskogo gosudarstvennogo universiteta. Seria Uridicheskie nauki,22207457,Togliatti State University,,A. M. Moiseev,"The paper considers the issue of extensive application of local expert collections in forensic expert practice. The study shows that the necessity of extensive application of such collections and other local reference-assistive means occurs due to criminalistics digitalization. The author specifies the concept of local expert collections; proposes to carry out expert collections digitalization according to the matrix principle of the object’s characteristics fixation. The study identified that the practicality of the extensive application of such collections is caused by the network approach introduction to the forensic expert activity. The author proves the applicability of semantic networks to ensure the efficiency of using expert collections. The necessity to overcome the experienced counter-acting the investigation determines the importance of extensive application of digitalized collections. The author implements the technological approach to the expert studies using the specimen copies from expert collections; proposes to support the information provision block in the forensic expert study technologies with references to the local collections stored in a cloud resource. Within the block of assignments for forensic studies, it is offered to provide an initiative comparison of an object under the study with the collection standards regarding falsification or other change in its characteristics. It provides information security measures. Such measures are the collection exchange channel duplication and block-chain technology. The paper presents a validation procedure for expert collections located in network resources of forensic expert institutions. Expert collection validation involves the research activities regarding the adequacy of their digital representation and the expert collections approval in terms of applicability for solving particular expert tasks. Complex application of expert collections represented in digital format supplies digital criminalistics with new forensic investigation resources.",,1,31,38,Block (data storage); Data science; Information provision; Network approach; Local expert; Computer science; Information security; Object (computer science); Cloud computing; Semantic network,,,,,https://vektornaukipravo.ru/index.php/legal/article/download/27/23 https://vektornaukipravo.ru/index.php/legal/article/view/27 https://dx.doi.org/10.18323/2220-7457-2021-1-31-38,http://dx.doi.org/10.18323/2220-7457-2021-1-31-38,,10.18323/2220-7457-2021-1-31-38,3149550862,,0,,0,false,, 022-297-576-546-283,Enhancing procedure of using new means of technologies in criminal proceedings,,2020,journal article,IUS ET SCIENTIA,24448478,Editorial Universidad de Sevilla,,Delia Magherescu,"The new era of technology is currently of high interest for the judicial proceedings in criminal matters. Although digital technologies have been increased in the last decades, both legislator and judicial authorities being involved in developing more and more efficient means of forensic investigation in purpose to prevent and combat the criminal phenomena, the criminal organizations are also interested in breaking such legal digital framework and achieving their own scope - a financial one. On the one hand, they are permanently interested in committing serious crimes including those in digital environment, whose consequences are one of the most dangerous crimes for the entire contemporary society. On the other hand, the law enforcement agencies are working in close cooperation with experts in digital field in order to gather information on how to improve the situation itself and investigate the criminal activities by means of digital evidence. In this context, the digitalization is an efficient tool of providing information, data and other instruments the judicial bodies need in achieving their goals in criminal proceedings. The current paper focuses on the techniques and methods that judicial bodies use in the investigation activity of gathering digital evidence that may serve in making decision in criminal cases the judicial bodies are invested with. The paper is structured in five chapters, each of them providing referential elements on the proposed topic. Its structure is designed as follows: Introduction; Aims; Methodology of Research; Achievements and failures through using new technologies; Doctrinal and jurisprudence approach, and Conclusion section, which advances a de lege ferenda proposal",6,1,8,21,Contemporary society; Political science; Emerging technologies; Context (language use); Law enforcement; Scope (project management); Legislator; Digital evidence; Engineering ethics; Jurisprudence,,,,,https://revistascientificas.us.es/index.php/ies/article/view/13344 https://dialnet.unirioja.es/servlet/articulo?codigo=7575063 https://core.ac.uk/download/334817883.pdf,http://dx.doi.org/10.12795/iestscientia.2020.i01.02,,10.12795/iestscientia.2020.i01.02,3046140244,,0,,0,true,cc-by-nc-nd,gold 022-564-463-934-451,On digital forensic readiness in the cloud using a distributed agent-based solution : issues and challenges,2016-06-17,2016,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Victor R. Kebande; Hein S. Venter,"The need to perform digital investigations has, over the years, led to the exponential growth of the field of Digital Forensics (DF). However, quite a number of challenges face the act of proving – for purposes of Digital Forensic Readiness (DFR) – that an electronic event has occurred in cyberspace. The problem that this research addresses involves the challenges faced when an Agent-Based Solution (ABS) is used in the cloud to extract Potential Digital Evidence (PDE) for DFR purposes. Throughout the paper the authors have modified the functionality of an initially malicious botnet to act as a distributed forensic agent to conduct this process. The paper focuses on the general, technical and operational challenges that are encountered when trying to achieve DFR in the cloud environment. The authors finally propose a contribution by assessing the possible solutions from a general, technical and operational point of view.",50,2,209,238,Engineering; Botnet; Cyberspace; Digital evidence; Field (computer science); Computer security; Process (engineering); Event (computing); Cloud computing; Digital forensics,,,,National Research Foundation,https://repository.up.ac.za/bitstream/2263/57045/1/Kebande_On_2018.pdf https://repository.up.ac.za/handle/2263/57045 https://www.tandfonline.com/doi/full/10.1080/00450618.2016.1194473,http://dx.doi.org/10.1080/00450618.2016.1194473,,10.1080/00450618.2016.1194473,2428850758,,0,000-900-727-061-212; 002-288-358-355-198; 007-321-225-339-593; 012-447-467-503-151; 013-568-618-083-770; 021-486-901-460-202; 023-471-707-127-597; 024-894-908-869-686; 025-723-055-730-999; 028-290-062-141-840; 029-008-872-980-253; 040-652-005-186-639; 045-701-748-075-614; 049-977-511-720-26X; 050-618-920-212-97X; 051-368-118-380-383; 052-152-063-024-042; 052-325-754-641-659; 054-507-171-824-189; 057-364-465-490-560; 058-631-300-195-90X; 059-619-693-632-836; 059-697-278-686-056; 061-960-915-134-527; 068-459-443-764-162; 077-532-025-251-756; 081-894-044-312-297; 086-332-277-098-225; 091-540-399-535-662; 091-619-263-117-914; 091-694-208-796-635; 095-691-114-276-825; 097-742-985-330-217; 101-091-831-428-576; 102-734-676-905-303; 105-559-966-983-565; 106-997-247-556-643; 110-860-381-892-442; 116-056-471-784-278; 116-798-667-947-625; 118-336-147-449-792; 121-704-965-852-836; 122-269-963-751-911; 129-517-593-148-609; 133-197-850-732-190; 133-508-126-407-763; 136-745-511-009-321; 137-107-551-448-433; 141-182-449-198-823; 144-074-853-958-370; 144-124-797-675-052; 148-732-709-522-772; 153-374-589-802-692; 156-972-666-676-888; 157-758-877-154-229; 163-330-758-807-944; 174-186-817-525-708; 181-298-179-296-700,35,true,,green 022-672-893-643-900,Liabilities of Shared System in Forensic Analysis,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Eric Sowah Badger,"In today’s connected world, there is a tendency for connectivity even in the sectors which conventionally have been not so connected in the past, such as power systems substations. Substations have seen considerable digitalization of the grid hence, providing much more available insights than before. This has all been possible due to connectivity, digitalization, and automation of the power grids. Interestingly, this also means that anybody can access such critical infrastructures from a remote location, and gone are the days of physical barriers. The power of connectivity and control makes it a much more challenging task to protect critical industrial control systems. This capability comes at a price, in this case, increasing the liabilities and risk of potential cyber threats to substations. (ASIF, FARHAN , & EKSTEDT) Keywords: Digital Evidence Backlog, Digital Forensic Challenges BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Eric Sowah Badger (2022): Liabilities of Shared System in Forensic Analysis Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 191-196 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P31",1,1,191,196,Nexus (standard); Digital forensics; Computer security; Computer science; Automation; Control (management); Digital evidence; Access control; Engineering,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p31,,10.22624/aims/crp-bk3-p31,,,0,,0,true,,bronze 023-290-127-677-354,Prelim i - Editorial Board,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,35,,301098,301098,Editorial board; Computer science; Library science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30400-5,,10.1016/s2666-2817(20)30400-5,,,0,,0,true,,bronze 023-458-080-164-91X,Benefits of Utilizing Full-Body Lodox Digital Radiography in Forensic Pathology:,2015-09-01,2015,journal article,Academic Forensic Pathology,19253621,SAGE Publications,,Kyla M. Jorgenson; Joshua Lanter; Andrea L. Wiens,IntroductionThe purpose of this study was to measure the time spent by a single autopsy assistant in obtaining full-body radiographic imaging in a forensic pathology setting. The Lodox digital radi...,5,3,492,498,Radiology; Medical physics; Forensic pathology; Digital radiography; Radiographic imaging; Radiography; Medicine,,,,,https://journals.sagepub.com/doi/abs/10.23907/2015.054?journalCode=afpa,http://dx.doi.org/10.23907/2015.054,,10.23907/2015.054,2605965664,,0,023-675-587-660-358; 073-432-385-811-565,1,false,, 023-767-546-806-478,Acquisition and analysis of volatile memory from android devices,,2012,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Joe T. Sylve; Andrew Case; Lodovico Marziale; Golden G. Richard,,8,3,175,184,Operating system; Embedded system; Market share; Memory forensics; Phone; Memory analysis; Computer science; Android (operating system); Volatile memory; Mobile device forensics; Digital forensics,,,,,https://www.504ensics.com/uploads/publications/android-memory-analysis-DI.pdf https://dblp.uni-trier.de/db/journals/di/di8.html#SylveCMR12 https://www.sciencedirect.com/science/article/pii/S1742287611000879 http://dx.doi.org/10.1016/j.diin.2011.10.003 http://www.dfir.org/research/android-memory-analysis-DI.pdf http://www.cs.uno.edu/~golden/Papers/android-memory-analysis-DI.pdf https://www.academia.edu/1268681/Acquisition_and_analysis_of_volatile_memory_from_android_devices https://dx.doi.org/10.1016/j.diin.2011.10.003 http://www.504ensics.com/uploads/publications/android-memory-analysis-DI.pdf https://doi.org/10.1016/j.diin.2011.10.003,http://dx.doi.org/10.1016/j.diin.2011.10.003,,10.1016/j.diin.2011.10.003,1972940696,,8,036-662-510-200-483; 037-821-713-720-130; 046-973-884-620-547; 059-293-301-937-554; 065-459-442-784-779; 100-947-011-285-206; 149-895-840-689-052; 150-249-549-372-358; 171-382-822-081-880,124,false,, 023-848-663-068-771,Can computer forensic tools be trusted in digital investigations,2020-10-28,2020,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Wasim Ahmad Bhat; Ali Alzahrani; Mohamad Ahtisham Wani,"Abstract This paper investigates whether computer forensic tools (CFTs) can extract complete and credible digital evidence from digital crime scenes in the presence of file system anti-forensic (AF) attacks. The study uses a well-established six stage forensic tool testing methodology based on black-box testing principles to carry out experiments that evaluate four leading CFTs for their potential to combat eleven different file system AF attacks. Results suggest that only a few AF attacks are identified by all the evaluated CFTs, while as most of the attacks considered by the study go unnoticed. These AF attacks exploit basic file system features, can be executed using simple tools, and even attack CFTs to accomplish their task. These results imply that evidences collected by CFTs in digital investigations are not complete and credible in the presence of AF attacks. The study suggests that practitioners and academicians should not absolutely rely on CFTs for evidence extraction from a digital crime scene, highlights the implications of doing so, and makes many recommendations in this regard. The study also points towards immediate and aggressive research efforts that are required in the area of computer forensics to address the pitfalls of CFTs.",61,2,198,203,White-box testing; Exploit; Crime scene; Task (project management); File system; Digital evidence; Computer security; Computer science; Computer forensics,Anti-forensics; Black-box testing; Computer forensic tools; File systems; Forensics,Computers; Crime; Forensic Medicine; Forensic Sciences/methods; Humans,,,https://www.sciencedirect.com/science/article/abs/pii/S1355030620303002 https://www.ncbi.nlm.nih.gov/pubmed/33736854 https://europepmc.org/article/MED/33736854,http://dx.doi.org/10.1016/j.scijus.2020.10.002,33736854,10.1016/j.scijus.2020.10.002,3097838915,,0,003-526-475-150-199; 005-155-472-420-600; 007-375-878-067-656; 013-475-001-854-958; 022-723-601-549-961; 030-918-415-827-067; 042-230-817-975-353; 045-567-157-439-936; 046-318-533-334-038; 047-386-524-667-691; 049-363-433-613-058; 050-694-164-774-292; 065-061-509-329-026; 069-498-762-346-193; 071-942-083-141-698; 072-152-153-447-327; 074-299-373-252-299; 075-950-021-558-098; 078-817-460-650-140; 082-216-018-661-366; 100-552-121-697-280; 103-103-595-689-579; 103-615-756-435-705; 107-065-661-568-240; 134-502-810-516-308; 144-124-797-675-052; 185-343-535-827-64X,13,false,, 023-975-433-275-646,Analysis of Cloud Forensics : Review and Impact on Digital Forensics Aspects,2021-04-25,2021,journal article,International Journal of Scientific Research in Science and Technology,2395602x; 23956011,Technoscience Academy,,Mamta Khanchandani; Nirali Dave,"Digital forensics is the science of finding evidence to digital crimes and attacks. Cloud Forensics is a part of Digital Forensics that watches over the crime that has taken place over the cloud and carries out an investigation on it. Cloud computing is an evolutionary technology based on a huge network, which spreads globally. Hence, Cloud Forensics is a part of Network Forensics, which in turn is a part of Digital Forensics. Cloud organizations along with the providers of cloud service and customers that uses cloud service, are still awaiting the establishment of an explicit forensic revolution. Without the much-needed forensic capability, they will not be able to safeguard the robustness of their system and suitability of their services that assist criminal and cybercrime investigations. In this paper, we review the forensic process, challenges in cloud forensics, and its impact on digital forensics.",,,639,646,Data science; Cloud forensics; Computer science; Digital forensics,,,,,http://ijsrst.com/IJSRST2182118,http://dx.doi.org/10.32628/ijsrst2182118,,10.32628/ijsrst2182118,3159856036,,0,000-494-082-619-950; 006-680-761-463-190; 008-584-787-077-16X; 013-360-268-975-919; 025-315-423-877-95X; 026-162-197-054-585; 040-483-012-703-353; 054-887-738-520-678; 056-058-669-641-20X; 059-697-278-686-056; 060-905-412-608-729; 078-853-715-765-416; 082-793-334-095-933; 090-980-715-883-62X; 091-694-208-796-635; 093-022-712-589-02X; 110-454-809-930-822; 114-044-297-159-678; 124-912-663-881-389; 173-952-459-161-812,0,true,,gold 023-978-779-072-348,A Framework for Integrating Multimodal Biometrics with Digital Forensics,,2015,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Victor R. Kebande; Nickson M. Karie,"Multimodal biometrics represents various categories of morphological and intrinsic aspects with two or more computerized biological characteristics such as facial structure, retina, keystrokes dynamics, voice print, retinal scans, and patterns for iris, facial recognition, vein structure, scent, hand geometry, and signature recognition. The objectives of Digital Forensics (DF), on the other hand, is to inspect digital media in a forensically sound manner with the essence of identifying, discovering, recovering, analysing the artifacts and presenting facts and suggestions about the discovered information to any court of law or civil proceedings. Because the accuracy of biometric indicators may rarely be investigated during a digital forensic investigation processes, integrating digital forensics with multimodal biometrics can enable effective digital forensic investigations on multiple captured physiological and behavioural characteristics. This paper, therefore, presents a self-adaptive approach for integrating digital forensics with multimodal biometrics. This is motivated by the fact that, as of the time of writing this paper, there is lack of effective and standardised methods for performing digital investigation across multimodal biometric indicators. In addition, there are also no proper digital forensic biometric management strategies in place. For this reason, to enable effective digital investigations on multiple captured physiological and behavioural characteristics, this paper aims at proposing a framework that is meant to facilitate the integration of DF and multimodal biometrics. The framework is also meant to enhance the analysis of potential digital evidence during investigations. Integrating multimodal biometrics and digital forensics using the proposed framework gives a promising approach to add value especially in enforcing security measures in different systems as well as a restricting factor to unauthorized access key discoveries. The integration of digital forensics with multimodal biometrics is the main focus of this paper.",4,4,498,507,Human–computer interaction; Speaker recognition; Hand geometry; Digital media; Biometrics; Digital evidence; Facial recognition system; Computer science; Multimedia; Signature recognition; Digital forensics,,,,,http://sdiwc.net/digital-library/a-framework-for-integrating-multimodal-biometrics-with-digital-forensics.html,http://dx.doi.org/10.17781/p001929,,10.17781/p001929,2178502485,,0,002-474-980-628-861; 020-944-423-224-895; 021-850-998-857-676; 023-709-114-205-69X; 035-223-520-491-228; 053-250-149-357-214; 070-818-081-080-313; 071-344-833-099-290; 078-730-781-174-18X; 096-463-439-745-855; 102-587-056-422-16X; 111-090-978-711-139; 111-239-904-354-442; 125-687-685-580-171; 149-999-442-437-657; 167-592-705-831-583; 174-186-817-525-708; 190-207-252-892-446,5,false,, 024-180-933-485-399,ANALISIS DIGITAL FORENSIK REKAYASA IMAGE MENGGUNAKAN JPEGSNOOP DAN FORENSICALLY BETA,2019-07-27,2019,journal article,Jurnal Ilmiah Matrik,26218089; 14111624,Universitas Bina Darma,,Irwansyah Irwansyah; Helda Yudiastuti,"The development of information technology is not only beneficial for humans, but often also used for negative purposes. Crime by utilizing digital image technology is very easy to do using a computer, so it is not surprising if more and more cases of cybercrime occur. The spread of digital images on social media in the form of images or videos raises public anxiety that these images or videos cannot be considered reliable evidence, because both images and videos can be easily engineered. The purpose of this study is to analyze a digital image that has been manipulated or engineered using a particular software or program. Image manipulation techniques that will be used are: Image splicing, copy-move, and retouching images. While the analysis tool uses the ELA method introduced by Krawetz which is available online from the website (https://29a.ch/photo-forensics/#forensic-magnifier) ​​and Jpegsnoop software.",21,1,54,63,Information technology; Software; Cybercrime; Image splicing; Image manipulation; Computer science; Digital image; Multimedia; Social media,,,,,https://www.mendeley.com/catalogue/6ebc80ac-e667-3e70-95e6-8200914f7767/ http://journal.binadarma.ac.id/index.php/jurnalmatrik/article/view/518 https://core.ac.uk/download/pdf/230401338.pdf,http://dx.doi.org/10.33557/jurnalmatrik.v21i1.518,,10.33557/jurnalmatrik.v21i1.518,2966760810,,0,,0,true,cc-by-sa,hybrid 024-350-847-240-124,Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?,,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Adeyemi Richard Ikuesan; Hein S. Venter,,30,,73,89,Automaton; Machine learning; Profiling (information science); Identifier; Artificial intelligence; Biometrics; Computer science; Information security; Recommender system; Digital forensics; Hash function,,,,,https://www.sciencedirect.com/science/article/pii/S1742287619300945 https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902230545339274 https://repository.up.ac.za/handle/2263/73125 https://dblp.uni-trier.de/db/journals/di/di30.html#IkuesanV19,http://dx.doi.org/10.1016/j.diin.2019.07.003,,10.1016/j.diin.2019.07.003,2964150038,,0,007-699-742-278-332; 012-723-051-030-715; 013-974-737-810-970; 021-639-464-448-057; 027-441-452-913-016; 030-525-495-077-51X; 033-877-222-136-260; 036-056-361-153-483; 045-439-795-806-132; 053-817-043-443-75X; 054-446-297-875-84X; 065-885-760-486-090; 066-824-663-605-526; 067-577-414-064-539; 071-837-240-864-140; 075-962-078-452-313; 095-177-434-765-79X; 103-113-677-538-597; 103-802-229-647-283; 104-825-003-547-384; 129-623-020-572-540; 161-538-739-914-314; 164-419-392-915-461; 164-619-554-205-881; 170-220-022-529-677; 198-517-781-379-087,25,false,, 024-539-327-776-880,Digital Forensics to Intelligent Forensics,2014-09-12,2014,journal article,Future Internet,19995903,MDPI AG,Switzerland,Alastair Irons; Harjinder Singh Lallie,"In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of digital investigators to apply the processes of digital forensics and digital investigations to obtain timely results. In order to combat the problems, there is a need to enhance the use of the resources available and move beyond the capabilities and constraints of the forensic tools that are in current use. We argue that more intelligent techniques are necessary and should be used proactively. The paper makes the case for the need for such tools and techniques, and investigates and discusses the opportunities afforded by applying principles and procedures of artificial intelligence to digital forensics intelligence and to intelligent forensics and suggests that by applying new techniques to digital investigations there is the opportunity to address the challenges of the larger and more complex domains in which cybercrimes are taking place.",6,3,584,596,Social network analysis; Cybercrime; Law enforcement; Crime investigation; Computer security; Computer science; Network forensics; Computer forensics; Digital forensics,,,,,https://www.mdpi.com/1999-5903/6/3/584/pdf https://doaj.org/article/77741ce91be44f9b94623b123f0d552f https://dblp.uni-trier.de/db/journals/fi/fi6.html#IronsL14 https://www.mdpi.com/1999-5903/6/3/584 http://sure.sunderland.ac.uk/9495/ https://doi.org/10.3390/fi6030584 https://core.ac.uk/display/25688666 https://core.ac.uk/download/157851532.pdf,http://dx.doi.org/10.3390/fi6030584,,10.3390/fi6030584,2102414025,,0,005-471-570-182-209; 009-168-289-731-644; 010-951-806-548-929; 013-853-253-052-99X; 018-245-873-246-94X; 021-850-998-857-676; 026-582-043-902-677; 034-773-286-616-44X; 035-380-397-316-182; 048-209-571-753-372; 049-122-467-585-49X; 050-513-243-638-138; 059-002-926-336-692; 066-042-782-732-898; 072-297-921-376-769; 073-847-291-567-156; 077-532-025-251-756; 078-144-022-647-386; 091-619-263-117-914; 114-621-082-012-238; 185-786-528-318-049,36,true,cc-by,gold 024-612-427-621-542,A Possibility of Pupil Diameter as Reliable Index for Lie Detection,,2016,journal article,International Journal of Psychophysiology,01678760; 18727697,Elsevier BV,Netherlands,Hana Choi; Sion Kim; Sang-Hyeon Lee; Jang-Han Lee,,108,,150,,Optics; Lie detection; Index (economics); Pupil diameter; Mathematics,,,,,https://www.sciencedirect.com/science/article/pii/S0167876016305566,http://dx.doi.org/10.1016/j.ijpsycho.2016.07.435,,10.1016/j.ijpsycho.2016.07.435,2481058359,,0,,0,false,, 024-635-082-343-613,INVESTIGASI FORENSIK TERHADAP BUKTI DIGITAL DALAM MENGUNGKAP CYBERCRIME,2020-12-11,2020,journal article,Cyber Security dan Forensik Digital,26158442,Al-Jamiah Research Centre,,Moh Riskiyadi,"Teknologi yang berkembang pesat sejalan dengan tindakan cybercrime yang meningkat drastis, sehingga teknik dan modus baru cybercrime sulit untuk dideteksi dan dipecahkan oleh para investigator forensik digital. Tujuan dari penelitian ini adalah memberikan referensi terkait dengan kehandalan tools digital forensic dalam mengungkap cybercrime agar diperoleh bukti digital yang berintegritas, handal dan legal dalam proses ligitasi. Penelitian ini menggunakan metode static forensic dengan framework dari National Institute of Justice (NIJ) dengan skenario kasus cybercrime berupa carding dengan bukti elektronik flash disk menggunakan tools digital forensic FTK Imager dan Autospy. Hasil penelitian ini menunjukkan penggunaan FTK Imager dan Autospy mampu mengakuisisi dan menganalisis file yang dihapus permanen maupun file yang tersimpan sebelum flash disk diformat ulang. Sedangkan penghapusan permanen dan penggunaan password pada flash disk dengan tools BitLocker Drive Encryption, kedua tools tersebut tidak dapat mengakuisisi dan menganalisis file yang dihapus permanen ataupun diformat ulang. Batasan penelitian ini termuat pada penentuan metode static forensic dengan framework dari National Institute of Justice (NIJ) serta penentuan objek bukti elektronik flash disk dan tools FTK Imager dan Autospy. Untuk menunjang hasil penelitian ini diperlukan penelitian lanjutan tentang metode atau tools digital forensic lain yang lebih handal, sehingga pengungkapan bukti digital atas tindakan cybercrime serupa dapat diselesaikan. Penelitian ini benar dilakukan oleh peneliti dengan pengembangan literatur dan penelitian terdahulu sebagai desain penelitian.Kata kunci: cybercrime, tools digital forensic, static forensic, flash disk, bukti digital.",3,2,12,21,,,,,,http://ejournal.uin-suka.ac.id/saintek/cybersecurity/article/view/2144 http://202.0.92.5/saintek/cybersecurity/article/view/2144 https://ejournal.uin-suka.ac.id/saintek/cybersecurity/article/download/2144/1800,http://dx.doi.org/10.14421/csecurity.2020.3.2.2144,,10.14421/csecurity.2020.3.2.2144,3112029807,,0,010-627-196-533-601; 019-310-515-919-82X; 029-043-831-767-45X; 030-467-445-257-130; 042-972-111-603-681; 043-127-893-811-79X; 052-054-657-975-487; 056-406-725-646-266; 074-059-805-644-745; 076-463-766-205-148; 086-102-525-625-992; 089-531-600-086-146; 091-476-104-249-535; 096-899-831-703-200; 104-983-130-853-724; 122-596-518-152-484; 136-118-102-848-13X; 138-981-085-660-070; 154-191-465-535-558,0,true,cc-by-sa,hybrid 024-680-893-076-937,Pengembangan Model Digital Forensic Readiness Index (DiFRI) untuk Mencegah Kejahatan Dunia Maya,2016-05-01,2016,journal article,JISKA (Jurnal Informatika Sunan Kalijaga),25280074; 25275836,Al-Jamiah Research Centre,,Tri Widodo,"Kejahatan dunia maya terus meningkat. Namun, peningkatan kejahatan dunia maya, tidak disertai banyaknya barang bukti. Hal ini mengindikasikan kurangnya pemahaman akan kejahatan dunia maya dan juga digital forensic . Kesiapan menangani kejahatan dunia maya ini disebut digital forensic Readiness . Berdasarkan studi literatur dan penelitian-penelitian sebelumnya, dapat dirumuskan bahwa faktor-faktor digital forensic Readiness ini antara lain, Strategy, Policy & Procedure, Technology & Security, Digital forensic Response , Control & Risk, and Legality . Dari berbagai faktor tersebut dapat dibuat indikator-indikator yang nantinya dapat digunakan untuk mencegah atau menindaklanjuti kejahatan dunia maya. Faktor-faktor dan indikator tersebut akan menghasilkan nilai yang disebut Digital forensic Readiness Index (DiFRI). Sehingga kesiapan institusi mencegah dan menangani kejahatan dunia maya dapat diukur dengan menggunakan DiFRI. Kata Kunci : Digital forensic , Digital forensic Readiness , Digital forensic Readiness Index (DiFRI) , Kejahatan dunia maya",1,1,41,46,,,,,,https://ejournal.uin-suka.ac.id/saintek/JISKA/article/download/1095/1010 http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/1095 https://core.ac.uk/download/267117360.pdf,http://dx.doi.org/10.14421/jiska.2016.11-06,,10.14421/jiska.2016.11-06,2575083917,,0,,1,true,cc-by-nc,gold 024-784-179-276-92X,Digital tooth reconstruction: An innovative approach in forensic odontology.,2019-12-30,2019,journal article,The Journal of forensic odonto-stomatology,22196749; 0258414x,International Organisation for Forensic Odonto-Stomatology,Sweden,Abraham Johnson; Gargi Jani; Astha Pandey; Nimesh Patel,"In mass disasters, accidents and crime investigations, where human remains are decomposed, charred or skeletonized, teeth may dislodge due to post-mortem loss or due to mishandling of evidence during the manipulation of skeletal and dental remains. Thus, the identification process is hampered due to the loss of dental evidence. In these situations, forensic tooth reconstruction may aid in the identification process. Forensic tooth reconstruction (FTR) refers to the process that aims to reconstruct the morphology of the missing tooth from the skeletal remains from the intra-alveolar morphology of the dental socket. The study is an innovative attempt to develop a digital approach to reconstruct three-dimensional (3D) printed tooth models through recording intra-alveolar morphology of empty dental sockets which simulate the teeth which are missing post-mortem. An experimental study was conducted on the human mandible, where using volumetric scanning, 3D scanning and printing techniques the tooth was reconstructed from the intra-alveolar morphology of the socket. Through metric analysis and qualitative congruency testing it was established that there was minimal discrepancy between natural tooth and 3D printed tooth. It was determined that teeth missing post-mortem do not necessarily invalidate the identification process. Digital FTR gives accurate results with minimum error.",3,37,12,20,3D reconstruction; Forensic dentistry; Tooth loss; Mandible; Teeth missing; Orthodontics; Natural tooth; Forensic odontology; 3d printed; Computer science,,Forensic Dentistry; Humans; Mandible; Tooth; Tooth Loss,,,https://www.ncbi.nlm.nih.gov/pubmed/31894133 http://ojs.iofos.eu/index.php/Journal/article/view/1148 https://pubmed.ncbi.nlm.nih.gov/31894133/ https://europepmc.org/article/MED/31894133 https://ojs.iofos.eu/index.php/Journal/article/view/1148,https://www.ncbi.nlm.nih.gov/pubmed/31894133,31894133,,3003366639,,0,,10,false,, 025-153-927-220-338,A machine learning-based forensic tool for image classification - A design science approach,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Joanna Rose Del Mar-Raave; Hayretdin Bahsi; Leo Mršić; Krešimir Hausknecht,,38,,301265,,Multiple-criteria decision analysis; Machine learning; System usability scale; Artificial intelligence; Usability; Learnability; Design science; Computer science; Process (engineering); Digital forensics; Adaptation (computer science),,,,,https://www.sciencedirect.com/science/article/pii/S2666281721001827,http://dx.doi.org/10.1016/j.fsidi.2021.301265,,10.1016/j.fsidi.2021.301265,3194023013,,0,004-190-067-200-599; 009-440-190-217-215; 010-992-143-070-67X; 019-173-734-163-198; 019-530-811-391-075; 020-131-367-064-365; 020-233-013-143-936; 022-650-296-107-491; 028-209-047-370-10X; 028-489-197-812-937; 030-351-009-711-953; 030-690-153-634-290; 033-546-145-104-639; 034-190-709-015-829; 036-109-227-639-032; 036-112-898-081-145; 038-287-375-579-320; 038-413-969-488-666; 040-596-212-782-595; 041-561-245-686-942; 042-240-098-526-453; 042-300-428-446-803; 043-622-268-441-63X; 047-955-569-661-805; 057-567-246-168-045; 068-733-058-645-211; 070-875-178-006-938; 077-697-831-364-443; 078-995-601-408-182; 086-770-608-683-825; 087-950-081-760-226; 096-284-364-377-23X; 105-768-477-569-452; 110-510-842-185-282; 132-602-463-268-72X; 141-601-200-804-924; 142-388-561-082-054; 144-310-550-272-760; 150-835-310-480-666; 172-821-771-397-639; 180-559-374-049-445; 192-697-687-929-866,0,false,, 025-195-246-113-006,Advanced forensic procedure for the authentication of audio recordings generated by Voice Memos application of iOS14.,2022-03-01,2022,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Nam In Park; Kyu-Sun Shim; Ji Woo Lee; Jin-Hwan Kim; Seong Ho Lim; Jun Seok Byun; Yong Jin Kim; Oc-Yeub Jeon,"In this study, we propose an advanced forensic examination procedure for audio recordings generated by the Voice Memos application with iPhone Operation System (iOS)14, to verify that these are the original recordings and have not been manipulated. The proposed examination procedure consists of an analysis of the characteristics of audio recordings and of the file system of the device storing the audio recordings. To analyze the characteristics of audio recordings, we compare the encoding parameters (bitrate, sampling rate, timestamps, etc.) and the file structure to determine whether audio recordings were manipulated. Next, in the device examination step, we analyze the media-log history and temporary files of the file system obtained by mobile forensic tools. For comparative analysis, a total of 100 audio recording samples were obtained through the Voice Memos application from five iPhone mobile handsets of different models with iOS14 installed using Advanced audio coding (AAC) or Apple lossless audio codec (ALAC). As a result of analyzing the encoding parameters between the original and manipulated audio recordings, as well as the temporary files contained in the device file system, the difference in the encoding parameters and the very unique trace of the original audio recordings in the temporary files were confirmed when manipulating the audio recordings. In particular, the primary advantage of our proposed method is its potential ability to recover original audio recordings that were subsequently manipulated via the temporary files examined in the device file system analysis.",67,4,1534,1549,Computer science; Codec; Digital audio; Timestamp; Speech recognition; File format; Speech coding; Sound recording and reproduction,audio forensics; audio forgery detection; authentication of audio recordings; forensic integrity; iOS14; manipulation-related temporary files,,,"Ministry of Interior and Safety, Republic of Korea (NFS2022DTB03); Ministry of the Interior and Safety, Republic of Korea; National Forensic Service (NFS2022DTB03)",,http://dx.doi.org/10.1111/1556-4029.15016,35229886,10.1111/1556-4029.15016,,,0,006-794-410-339-126; 043-261-465-467-889; 046-034-142-979-678; 059-541-479-175-841,0,false,, 025-296-854-506-076,"Assessment of 'Modern Tool Usage' Attribute–Computer Forensics, a Case Study",,2017,journal article,Journal of Engineering Education Transformations,09715843,,,Shrinivas D. Desai; Prashant Narayankar,"Computer forensics is a new and fast growing form of investigative technique in which forensic specialists use modern forensic software tools, to solve digital crime cases. Choosing appropriate forensic tool for solving real-time digital crime cases is the most expected graduate attribute, for those who have opted ""Computer forensic"" as an elective course. In this paper we present pedagogy for developing the skill of choosing most appropriate software tool for analyzing and investigating digital crime cases. Assignment activities are designed to develop competencies such as i) Ability to identify, select and apply forensic tool to solve image, audio and video doctored cases. ii) Ability to evaluate the suitability and limitations of the tool used to solve problem. To solve image forensic cases, a tool having the feature of error level analysis and meta data analysis is found to be more appropriate, while for solving audio doctored cases, tool having feature of frequency response analysis as well as difference calculator is found to be more appropriate. In case of video doctored crimes, tools having feature of noise analysis, level sweep, clone detection, and magnification is found to be the most appropriate. Assessment of outcome is carried out by recording attainment of Graduate Attribute (GA), Competency (CA) and Performance Indicators (PI). The skill of identifying, choosing and applying appropriate forensic tool to solve digital crime cases is enhanced among student.",30,3,39,46,Data mining; Performance indicator; Information retrieval; Calculator; Software; Digital evidence; Computer science; Computer forensics; Feature (computer vision); Metadata; Noise (video),,,,,http://www.i-scholar.in/index.php/JEETRIT/article/view/139962,http://www.i-scholar.in/index.php/JEETRIT/article/view/139962,,,2611708703,,0,,0,false,, 025-484-846-284-184,Adding Digital Forensic Readiness as a Security Component to the IoT Domain,2018-02-14,2018,journal article,"International Journal on Advanced Science, Engineering and Information Technology",24606952; 20885334,Insight Society,Indonesia,Victor R. Kebande; Nickson M. Karie; Hein S. Venter,"The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart environments”. This experience has begun to be felt across different IoT-based domains like healthcare, surveillance, energy systems, home appliances, industrial machines, smart grids and smart cities. These developments have, however, brought about a more complex and heterogeneous environment which is slowly becoming a home to cyber attackers. Digital Forensic Readiness (DFR) though can be employed as a mechanism for maximizing the potential use of digital evidence while minimizing the cost of conducting a digital forensic investigation process in IoT environments in case of an incidence. The problem addressed in this paper, therefore, is that at the time of writing this paper, there still exist no IoT architectures that have a DFR capability that is able to attain incident preparedness across IoT environments as a mechanism of preparing for post-event response process. It is on this premise, that the authors are proposing an architecture for incorporating DFR to IoT domain for proper planning and preparing in the case of security incidents. It is paramount to note that the DFR mechanism in IoT discussed in this paper complies with ISO/IEC 27043: 2015, 27030:2012 and 27017: 2015 international standards. It is the authors’ opinion that the architecture is holistic and very significant in IoT forensics.",8,1,1,11,Smart grid; Architecture; Smart environment; Domain (software engineering); Digital evidence; Computer security; Computer science; Process (engineering); Component (UML); Digital forensics,,,,,http://dx.doi.org/10.18517/ijaseit.8.1.2115 https://repository.up.ac.za/handle/2263/66602 http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=2115 https://dx.doi.org/10.18517/ijaseit.8.1.2115 https://core.ac.uk/download/pdf/296920476.pdf,http://dx.doi.org/10.18517/ijaseit.8.1.2115,,10.18517/ijaseit.8.1.2115,2788400765,,0,002-625-978-577-247; 004-782-154-475-151; 010-791-676-072-730; 018-552-581-098-658; 018-948-094-812-86X; 025-178-552-649-015; 029-434-105-390-369; 065-873-523-989-876; 079-081-348-724-83X; 089-048-294-489-077; 118-838-969-146-870; 124-129-640-160-197,25,true,cc-by-sa,green 025-711-739-047-121,Cryptographic Accumulator and Its Application: A Survey,2022-03-07,2022,journal article,Security and Communication Networks,19390122; 19390114,Hindawi Limited,United Kingdom,Yongjun Ren; Xinyu Liu; Qiang Wu; Ling Wang; Weijian Zhang,"Since the concept of cryptographic accumulators was first proposed in 1993, it has received continuous attention from researchers. The application of the cryptographic accumulator is also more extensive. This paper makes a systematic summary of the cryptographic accumulator. Firstly, descriptions and characteristics of cryptographic accumulators are given, and the one-way accumulator, collision-free accumulator, dynamic accumulator, and universal accumulator are introduced, respectively. Cryptographic accumulator can be divided into two types: symmetric accumulator and asymmetric accumulator. In the asymmetric accumulator, three different cryptographic accumulator schemes were classified based on three security assumptions. Finally, this paper summarized the applications of cryptographic accumulators in ring signature, group signature, encrypted data search, anonymous credentials, and cryptographic promise.",2022,,1,13,Accumulator (cryptography); Hydraulic accumulator; Cryptography; Computer science; Cryptographic primitive; Computer security,,,,Civil Aviation University of China; Civil Aviation University of China,,http://dx.doi.org/10.1155/2022/5429195,,10.1155/2022/5429195,,,0,001-860-635-443-11X; 003-560-730-266-826; 007-756-735-057-556; 011-044-760-955-226; 011-144-572-473-105; 014-185-273-467-629; 015-348-800-884-847; 018-608-909-353-625; 020-348-478-789-323; 023-925-881-579-496; 025-167-872-164-064; 026-541-043-321-943; 030-870-743-906-848; 035-437-044-634-980; 039-724-427-948-36X; 043-575-225-323-132; 055-413-369-983-82X; 057-687-890-206-176; 064-618-848-820-02X; 067-806-059-149-306; 071-257-023-475-658; 077-132-889-008-54X; 078-148-742-665-898; 079-964-759-945-484; 081-856-597-518-300; 088-786-993-161-271; 091-547-919-119-403; 097-147-310-487-682; 097-598-021-490-431; 100-717-322-423-561; 102-657-558-857-535; 106-662-546-745-837; 113-327-875-911-299; 116-317-110-770-148; 134-053-878-733-009; 139-643-046-489-412; 140-114-492-608-954,0,true,cc-by,gold 025-880-943-392-835,The interface between forensic science and technology: how technology could cause a paradigm shift in the role of forensic institutes in the criminal justice system.,2015-08-05,2015,journal article,"Philosophical transactions of the Royal Society of London. Series B, Biological sciences",14712970; 09628436,Royal Society of London,United Kingdom,Ate D. Kloosterman; Anna Mapes; Zeno Geradts; Erwin van Eijk; Carola Koper; Jorrit van den Berg; Saskia Verheij; Marcel van der Steen; Arian C. van Asten,"In this paper, the importance of modern technology in forensic investigations is discussed. Recent technological developments are creating new possibilities to perform robust scientific measurements and studies outside the controlled laboratory environment. The benefits of real-time, on-site forensic investigations are manifold and such technology has the potential to strongly increase the speed and efficacy of the criminal justice system. However, such benefits are only realized when quality can be guaranteed at all times and findings can be used as forensic evidence in court. At the Netherlands Forensic Institute, innovation efforts are currently undertaken to develop integrated forensic platform solutions that allow for the forensic investigation of human biological traces, the chemical identification of illicit drugs and the study of large amounts of digital evidence. These platforms enable field investigations, yield robust and validated evidence and allow for forensic intelligence and targeted use of expert capacity at the forensic institutes. This technological revolution in forensic science could ultimately lead to a paradigm shift in which a new role of the forensic expert emerges as developer and custodian of integrated forensic platforms.",370,1674,20140264,,Criminal justice; Forensic profiling; Engineering; Forensic science; Data science; Technological revolution; Quality (business); Digital evidence; Paradigm shift; Identification (information),digital forensic evidence; forensic DNA analysis; forensic science; illicit drugs; integrated forensic platform; technology,Forensic Sciences/standards; Jurisprudence; Technology/standards,,,https://pubmed.ncbi.nlm.nih.gov/26101289/ https://core.ac.uk/display/85907193 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4581008/ https://dare.uva.nl/personal/pure/en/publications/the-interface-between-forensic-science-and-technology(6feed386-c7ba-448f-a85f-36cd69d339ff).html https://royalsocietypublishing.org/doi/10.1098/rstb.2014.0264 https://www.hbo-kennisbank.nl/details/amsterdam_pure:oai:pure.hva.nl:publications%2F48066502-97bb-41cf-b289-c080b87a73e7 https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F6feed386-c7ba-448f-a85f-36cd69d339ff https://pure.uva.nl/ws/files/2563045/173358_502134.pdf https://www.ncbi.nlm.nih.gov/pubmed/26101289 https://royalsocietypublishing.org/doi/pdf/10.1098/rstb.2014.0264 http://rstb.royalsocietypublishing.org/content/370/1674/20140264 https://research.hva.nl/en/publications/the-interface-between-forensic-science-and-technology-how-technol https://europepmc.org/article/MED/26101289,http://dx.doi.org/10.1098/rstb.2014.0264,26101289,10.1098/rstb.2014.0264,2217082185,PMC4581008,0,000-360-120-513-679; 008-234-812-210-154; 013-862-376-378-732; 015-356-437-161-192; 016-609-780-602-820; 016-647-542-440-122; 016-787-034-342-993; 018-182-926-340-45X; 018-961-447-963-601; 024-399-932-762-872; 025-806-670-032-344; 026-234-371-530-306; 026-290-088-195-051; 027-818-314-997-554; 030-376-211-949-261; 031-765-874-952-715; 034-276-542-592-225; 036-776-877-755-261; 037-338-121-499-68X; 038-056-372-333-781; 039-686-535-953-145; 040-003-374-304-143; 042-768-610-240-741; 047-225-255-168-749; 048-720-273-620-449; 049-587-533-012-340; 050-832-697-966-687; 058-381-416-493-002; 059-075-566-882-389; 064-983-989-994-678; 078-144-022-647-386; 078-785-022-820-951; 080-388-010-789-232; 084-072-674-071-199; 088-808-658-665-442; 090-678-559-137-90X; 091-371-394-000-55X; 094-825-970-135-94X; 103-499-993-757-673; 105-299-327-516-938; 120-396-778-559-45X; 134-173-092-558-006; 155-327-699-210-875; 161-102-320-012-920; 163-330-758-807-944; 164-742-648-681-014,36,true,,green 026-126-015-902-734,The potential problems of admissibility and relevancy of digital forensics evidence in Syariah Courts,2020-03-31,2020,journal article,International Journal of Psychosocial Rehabilitation,14757192,Hampstead Psychological Associates,United Kingdom,Mohamad Khairudin Kallil; Ahmad Che Yaacob; Nasrul Hisyam Nor Muhamad; Zulkiflee Haron,"Digital forensics evidence has been recognized in Syariah courts by virtue of several related sections under Syariah Court Evidence (Federal Territories) Act 1997 or others Syariah Courts Evidence Enactments. However, due of lack of challenges on digital evidence cases in Syariah courts, the potential problems or obstacles of digital forensics evidence are unknown among the judges, lawyers and parties involved. Among the potential problems of admissibility and relevancy of digital forensics evidence are collecting evidence illegally, modifying evidence after it is in possession, deleting and editing any digital evidence data from the tools. Meanwhile digital data also changes moment by moment and invisible to the human eye and digital technologies are always changing so that forensic process can seldom be fixed for very long. Therefore this article aims to examine the potential problems of digital forensics evidence in Syariah courts based on the qualitative approach of literature reviews on the relevant articles, books, statutes and cases. By having a standard operating procedure (SOP), qualified digital forensics experts and effective digital forensic tools and analysis, they can resolve the problems and subsequently results the authenticated digital forensics evidence.",24,5,1027,1032,Internet privacy; Possession (law); Statute; Digital data; Standard operating procedure; Digital evidence; Computer science; Process (engineering); Digital forensics,,,,,http://eprints.utm.my/id/eprint/91694/,http://dx.doi.org/10.37200/ijpr/v24i5/pr201776,,10.37200/ijpr/v24i5/pr201776,3016176875,,0,,0,false,, 026-228-290-740-116,Digital forensic analysis of mobile automotive maintenance applications,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Faisal Sumaila; Hayretdin Bahsi,,43,,301440,301440,Digital forensics; Computer science; Automotive industry; Popularity; Global Positioning System; Mobile device; Triage; Computer security,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301440,,10.1016/j.fsidi.2022.301440,,,0,016-322-663-058-127; 021-199-821-854-824; 066-235-037-082-291; 081-447-017-308-327; 090-496-255-429-009; 094-142-794-127-63X,0,false,, 026-285-588-732-099,Digital Forensic Dentistry,,2019,journal article,Indian Journal of Forensic Medicine & Toxicology,09739122; 09739130,Diva Enterprises Private Limited,India,Sthitaprajna Lenka; Karishma Rathor; Daebashruti Naik; Satchidananda Meher,"Forensic odontology helps in the age estimation (in children) by taking biological evidence from teeth in medico-legal matters. The person's identification is done by using dental radiographs, radiovisiography, ante-and post-mortem photographs and DNA analysis. Lately, the use of software technology has become a mandatory part of forensic odontology. There are several studies done worldwide, where these software technologies have helped in getting conclusive and accurate results. This article highlights the use of digital technologies which are currently in use in the field of forensic dentistry.",13,4,1912,1915,Medical physics; Forensic dentistry; Software technology; Forensic odontology; Biological evidence; Age estimation; Mathematics; Digital forensics,,,,,http://www.indianjournals.com/ijor.aspx?target=ijor:ijfmt&volume=13&issue=4&article=347,http://dx.doi.org/10.5958/0973-9130.2019.00598.x,,10.5958/0973-9130.2019.00598.x,2991490915,,0,,0,false,, 026-290-088-195-051,Improving source camera identification using a simplified total variation based noise removal algorithm,,2013,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Floris Gisolf; Anwar Malgoezar; Teun Baar; Zeno Geradts,,10,3,207,214,Algorithm; Noise; Artificial intelligence; Noise reduction; Digital camera; Variation (game tree); Camera identification; Computer vision; Computer science; Wavelet; Identification (information); Process (computing),,,,,https://www.researchgate.net/profile/Floris_Gisolf/publication/259164871_Improving_source_camera_identification_using_a_simplified_total_variation_based_noise_removal_algorithm/links/5460fea20cf27487b452684b.pdf https://dare.uva.nl/personal/search?identifier=1be12d32-53f0-46eb-9e99-72c5497a9e6b https://dl.acm.org/doi/10.1016/j.diin.2013.08.002 http://dblp.uni-trier.de/db/journals/di/di10.html#GisolfMBG13 https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F1be12d32-53f0-46eb-9e99-72c5497a9e6b http://dx.doi.org/10.1016/j.diin.2013.08.002 https://www.sciencedirect.com/science/article/pii/S1742287613000777 https://dblp.uni-trier.de/db/journals/di/di10.html#GisolfMBG13 https://dx.doi.org/10.1016/j.diin.2013.08.002 https://core.ac.uk/display/132739752 https://doi.org/10.1016/j.diin.2013.08.002,http://dx.doi.org/10.1016/j.diin.2013.08.002,,10.1016/j.diin.2013.08.002,2009136431,,0,003-009-062-014-855; 012-412-270-035-761; 036-162-322-223-660; 036-277-431-302-085; 045-226-923-439-105; 048-955-603-721-071; 053-781-637-768-867; 060-043-515-260-052; 069-847-568-544-420; 073-556-368-991-677; 077-828-134-917-257; 083-097-133-928-799; 093-664-113-855-239; 098-249-353-282-074; 106-295-038-562-776; 160-685-922-453-820; 163-715-300-552-254; 179-834-398-565-338; 180-088-494-514-913; 184-897-235-429-285,29,false,, 026-411-888-259-98X,International aspects of migrating digital forensics in the cloud,2014-01-31,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,John W. Bagby; Joseph J. Schwerha,"John W. Bagby and Joseph J. Schwerha examine the effect that ‘cloud’ computing has on digital forensics, and consider the burden on privacy, security and the development of forensic quality evidence, and suggest it is necessary to re-interpret procedural and evidence law to reduce the risk of injustice as cloud architectures evolve. Index words: digital forensics; cloud computing; international considerations; modification of metadata.",10,0,,,Cloud computing security; Injustice; Index (publishing); Quality (business); Computer security; Computer science; Cloud computing; Digital forensics; Metadata,,,,,https://sas-space.sas.ac.uk/5593/ https://journals.sas.ac.uk/deeslr/article/view/2026,http://dx.doi.org/10.14296/deeslr.v10i0.2026,,10.14296/deeslr.v10i0.2026,2062829935,,0,,0,true,cc-by-nc-nd,hybrid 026-431-673-944-953,Convergências e divergências entre a Diplomática Digital e a Ciência Forense Digital,2020-09-25,2020,journal article,Brazilian Journal of Information Science: research trends,19811640,Faculdade de Filosofia e Ciências,,Raquel Torrão Valentim; Natália Bolfarini Tognoli,"Based on recent discussions in the scope of archival studies on the theoretical-methodological development of Diplomatics in the creation, maintenance and preservation of authentic digital records, what has agreed to call Digital Diplomatics, a proposal which research to contribute for studies of digital records to propose a joint analysis with also emerging Digital Forensic Science. The research consists of a systematization of the concepts, definitions and, mainly, existing projects about Digital Diplomatics comparing them with Digital Forensic Science. An analysis of the scientific literature of the area found in international databases was carried out comparing it with Digital Forensic Science. The results demonstrate that the areas converge concerning the use of tools, the understanding of the legal context in which the records are inserted, the search for impartially identifying the context of their digital objects, the application of similar concepts and methods and the capacity that its professionals have to certify the integrity, authenticity, and reliability of digital objects in legal processes.",14,4,3,,Data science; Context (language use); Scope (project management); Scientific literature; Digital records; Joint analysis; Computer science; Archival science; Diplomatics; Digital forensics,,,,,https://dialnet.unirioja.es/descarga/articulo/7586088.pdf https://dialnet.unirioja.es/servlet/articulo?codigo=7586088,http://dx.doi.org/10.36311/1940-1640.2020.v14n4.10528,,10.36311/1940-1640.2020.v14n4.10528,3089238597,,0,,0,true,cc-by-sa,gold 026-575-338-976-096,Cloud Computing Security and Forensics Issues and Awareness of Cloud Storage Users in Malaysia,,2017,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Yee Say Keat; Mohammad Ahmadi Babak Bashari Rad,,6,1,1,13,World Wide Web; Information system; Cloud computing security; Cloud storage; Computer security; Computer science; Wireless,,,,,http://sdiwc.net/digital-library/cloud-computing-security-and-forensics-issues-and-awareness-of-cloud-storage-users-in-malaysia,http://dx.doi.org/10.17781/p002228,,10.17781/p002228,2586053490,,0,,0,false,, 026-766-854-469-439,Information Retrieval From Internet Applications For Digital Forensic,2012-08-31,2012,journal article,"International Journal of Security, Privacy and Trust Management",22775498,Academy and Industry Research Collaboration Center (AIRCC),,Ipsita Mohanty; R. Leela Velusamy,"Advanced internet technologies providing services like e-mail, social networking, online banking, online shopping etc., have made day-to-day activities simple and convenient. Increasing dependency on the internet, convenience, and decreasing cost of electronic devices have resulted in frequent use of online services. However, increased indulgence over the internet has also accelerated the pace of digital crimes. The increase in number and complexity of digital crimes has caught the attention of forensic investigators. The Digital Investigators are faced with the challenge of gathering accurate digital evidence from as many sources as possible. In this paper, an attempt was made to recover digital evidence from a system's RAM in the form of information about the most recent browsing session of the user. Four different applications were chosen and the experiment was conducted across two browsers. It was found that crucial information about the target user such as, user name, passwords, etc., was recoverable.",1,3,15,30,Internet privacy; Password; The Internet; World Wide Web; Forensic science; Session (web analytics); Digital evidence; Computer science; Digital forensics; Pace; Frequent use,,,,,https://arxiv.org/pdf/1209.3590 https://ui.adsabs.harvard.edu/abs/2012arXiv1209.3590M/abstract https://arxiv.org/abs/1209.3590 https://core.ac.uk/display/24765074 http://arxiv.org/abs/1209.3590,http://dx.doi.org/10.5121/ijsptm.2012.1302,,10.5121/ijsptm.2012.1302,2033633358; 3100770702,,0,016-926-540-950-809; 037-483-791-552-006; 038-668-970-194-854; 039-774-603-243-832; 068-383-476-721-435; 109-603-269-791-542; 120-462-880-448-150; 123-516-057-579-584; 134-181-885-341-288; 136-745-511-009-321; 171-637-120-942-780,3,true,,green 026-774-296-742-022,Integrated digital forensic process model,,2013,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Michael Köhn; Mariki M. Eloff; Jan H. P. Eloff,"Digital forensics is an established research and application field. Various process models exist describing the steps and processes to follow during digital forensic investigations. During such investigations, it is not only the digital evidence itself that needs to prevail in a court of law; the process followed and terminology used should also be rigorous and generally accepted within the digital forensic community. Different investigators have been refining their own investigative methods, resulting in a variety of digital forensic process models. This paper proposes a standardized Digital Forensic Process Model to aid investigators in following a uniform approach in digital forensic investigations.",38,,103,115,Variety (cybernetics); Data science; Digital forensic process; Digital evidence; Computer security; Computer science; Process (engineering); Computer forensics; Process modeling; Digital forensics,,,,,https://repository.up.ac.za/handle/2263/41922 https://dl.acm.org/citation.cfm?id=2622894 http://dx.doi.org/10.1016/j.cose.2013.05.001 https://www.sciencedirect.com/science/article/pii/S0167404813000849 https://dblp.uni-trier.de/db/journals/compsec/compsec38.html#KohnEE13 https://repository.up.ac.za/bitstream/2263/25433/1/dissertation.pdf https://dl.acm.org/doi/10.1016/j.cose.2013.05.001,http://dx.doi.org/10.1016/j.cose.2013.05.001,,10.1016/j.cose.2013.05.001,2110760901,,0,002-495-833-326-831; 020-944-423-224-895; 021-486-901-460-202; 021-850-998-857-676; 026-893-174-649-526; 031-234-153-523-379; 032-697-093-668-898; 034-916-306-834-918; 035-464-818-494-517; 037-789-654-228-885; 041-100-433-941-603; 047-630-600-014-492; 050-513-243-638-138; 074-014-335-505-388; 085-214-277-668-01X; 087-665-408-966-240; 111-741-773-111-021; 133-508-126-407-763; 134-927-490-231-285; 138-097-495-143-351; 140-821-103-436-654; 157-954-859-648-506; 159-477-048-665-066; 170-299-458-679-224; 179-881-224-143-743; 184-948-841-629-735; 190-065-821-748-92X; 199-172-967-270-034; 199-745-676-923-766,110,true,,green 026-828-038-317-200,Technology Corner Visualising Forensic Data: Evidence (Part 1),,2013,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Damian Schofield; Ken Fowle,"Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an understanding of the subject matter.   Visualisation represents information that has been digitally recorded (for example: pictures, video and sound), hand written and/or spoken data, to show what may have, could have, did happen or is believed to have happened. That is why visualising data is an important development in the analysis and investigation realms, as visualisation explores the accuracies, inconsistencies and discrepancies of the collected data and information.   This paper presents introduces some of the various graphical techniques and technology used to display digital information in a courtroom. The advantages and disadvantages involved in the implementation of this technology are also discussed. This paper is part one of a two part series that aims to describe the use of, and provide guidelines for, the use of graphical displays in courtrooms.",8,1,73,90,Data file; Crime scene; Data visualization; Data science; Statistical graphics; Subject matter; Visualization; Computer science; Multimedia; Computer graphics; Digital forensics,,,,,https://doi.org/10.15394/jdfsl.2013.1141 https://ro.ecu.edu.au/ecuworks2013/559/ https://core.ac.uk/display/41530605 https://research-repository.uwa.edu.au/en/publications/technology-corner-visualising-forensic-data-evidence-part-1 https://commons.erau.edu/cgi/viewcontent.cgi?article=1141&context=jdfsl https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1559&context=ecuworks2013 https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#Schofield13 https://research-repository.uwa.edu.au/en/publications/technology-corner-visualising-forensic-data-evidence-part-1(c9ce62f2-cf9e-4a9d-a322-5f6f9051d8a6)/export.html https://commons.erau.edu/jdfsl/vol8/iss1/4/ https://core.ac.uk/download/41530605.pdf,http://dx.doi.org/10.15394/jdfsl.2013.1141,,10.15394/jdfsl.2013.1141,783930876,,0,006-147-481-193-848; 006-235-266-433-570; 010-423-042-177-734; 010-776-638-956-310; 011-266-643-505-000; 011-500-992-597-292; 015-100-629-641-706; 020-202-179-993-592; 020-586-575-720-110; 026-876-385-709-061; 027-681-577-683-835; 035-006-796-654-12X; 050-034-746-610-825; 052-777-665-876-04X; 053-122-526-126-117; 053-882-233-294-91X; 058-523-110-758-515; 059-642-431-151-966; 069-555-512-168-003; 080-033-497-003-701; 087-307-809-242-788; 088-043-607-018-040; 088-400-884-660-771; 096-415-102-126-454; 105-722-396-170-542; 114-467-161-751-159; 122-923-448-139-246; 125-462-406-091-58X; 135-877-639-591-128; 140-858-447-005-005; 153-397-602-755-694; 166-111-907-375-073; 167-778-772-736-055; 177-965-894-694-179; 182-962-922-039-081,5,true,cc-by-nc,gold 026-831-743-825-769,DEEP: Extending the Digital Forensics Process Model for Criminal Investigations,2020-08-10,2020,journal article,ATHENS JOURNAL OF SCIENCES,22418466,Athens Institute for Education and Research ATINER,,Jan Collie; Richard E. Overill,"The importance of high quality, reliable forensic analysis –an issue that is central to the delivery of justice– has become a topic for marked debate with scientists, specialists and government bodies calling for improved standards and procedures. At the same time, Law Enforcement agencies are under pressure to cut the cost of criminal investigations. The detrimental impact that this has had on all forensic disciplines has been noted internationally, with the UK’s House of Lords warning that if the trend continues, crimes could go unsolved and miscarriages of justice may increase. The pivotal role that digital forensics plays in investigating and solving modern crimes is widely acknowledged: in Britain, the police estimate it features in 90% of cases. In fact, today’s law enforcement officers play a key part in the recovery, handling and automated processing of digital devices yet they are often poorly trained to do so. They are also left to interpret outputs, with the results being presented in court. This, it is argued, is a dangerous anomaly and points to a significant gap in the current, four-stage digital forensics process model (DFPM). This paper presents an extension to that model, the Digital Evidence Enhanced Process (DEEP), with the aim of fine-tuning the mechanism and ensuring that all digital evidence is scrutinised by a qualified digital forensics analyst. The consequence of adopting DEEP in actual criminal investigations will be to ensure that all digital evidence is analysed and evaluated to the highest professional and technical competency standards, resulting in the enhanced reliability of digital evidence presented in court which will serve the cause of justice in terms of reduced instances of associated unsafe convictions and/or unjustified exculpations.",7,4,225,240,Criminal investigation; Government; Political science; Justice (ethics); Quality (business); Law enforcement; Digital evidence; Public relations; Process (engineering); Digital forensics,,,,,http://oro.open.ac.uk/72738/ https://core.ac.uk/download/337616554.pdf,http://dx.doi.org/10.30958/ajs.7-4-3,,10.30958/ajs.7-4-3,3047867809,,0,000-659-280-122-390; 009-512-003-529-193; 010-963-610-208-920; 058-052-081-943-595; 061-269-967-405-492; 074-014-335-505-388; 075-529-701-912-32X; 090-752-043-508-733; 102-243-142-344-71X; 126-591-597-706-715,0,true,cc-by-nc,green 026-836-874-575-053,Analisis Forensik Solid State Drive (SSD) Menggunakan Framework Rapid Response,2019-10-08,2019,journal article,Jurnal Teknologi Informasi dan Ilmu Komputer,25286579; 23557699,Fakultas Ilmu Komputer Universitas Brawijaya,,Mahfudl Nasrulloh; Sunardi Sunardi; Riadi,"Teknologi komputer pada empat tahun terahir ini mengalami perkembangan yang pesat. Bersamaan dengan itu juga berdampak negatif salah satunya adalah berupa kejahatan komputer. Kejahatan komputer akan meninggalkan jejak aktivitas kejahatan, maka perlu dilakukan analisa dengan ilmu dan metode forensik untuk mendapatkan barang bukti. Bagaimana jika terjadi kejahatan komputer pada media penyimpanan komputer berjenis non-volatile memory dan dilakukan secara live forensik . Pada penelitian ini dilakukan proses forensik pada Solid State Drive (SSD) dengan framework Grr Rapid Response pada kasus kehilangan data (lost data) suatu organisasi. Langkah kerja forensik mengimplementasikan dari National Institute of Standards Technology (NIST). Framework Grr Rapid Response digunakan untuk memberikan tanggapan terhadap insiden forensik digital yang difokuskan pada lingkungan forensik jarak jauh, f ramework ini berbasis arsitektur client server . Hasil penelitian ini menunjukkan langkah kerja forensik NIST dapat diimplementasikan pada proses pengambilan bukti digital dengan metode akuisisi secara live forensik,  kemampuan tool forensik pada proses eksaminasi Grr Rapid Response pada Workstation ( Client Grr) dengan media simpan SSD , bukti digital dapat ditemukan dan dikembalikan. Bukti digital yang dapat dikembalikan berupa file dokumen, dan hasil validasi pada bukti digital tersebut memiliki nilai hash yang sama dari dua algoritma validasi bukti digital yang diimplementasikan, MD5 dan SHA-1. Sehingga hasil integritas dari dokumen tersebut menunjukkan bahwa bukti digital tersebut identik. Abstract Computer technology in the last four years has experienced rapid development. At the same time, it also has a negative impact, one of which is a computer crime. Computer crime will leave traces of criminal activity, so it is necessary to analyze with forensic science and methods to obtain evidence. What if there is a computer crime on a computer storage medium of a type of non-volatile memory and carried out live forensics In this study a forensic process on Solid State Drive (SSD) was carried out with the Grr Rapid Response framework for lost data in an organization. The forensic work step is implemented from the National Institute of Standards Technology (NIST). The Grr Rapid Response Framework is used to provide responses to incidents of digital forensics focused on remote forensic environments, this framework is based on a client server architecture. The results of this study indicate that NIST's forensic work steps can be implemented in the process of taking digital evidence with live forensic acquisition methods, the ability of forensic tools in the Grr Rapid Response examination process on Workstations (Client Grr) with SSD storage media, digital evidence can be found and returned. Digital evidence that can be returned is a document file, and the results of the validation of digital evidence have the same hash value from the two digital proof validation algorithms implemented, MD5 and SHA-1. So the results of the integrity of the document so that the digital evidence is identical.",6,5,509,518,,,,,,https://jtiik.ub.ac.id/index.php/jtiik/article/view/1516 https://www.mendeley.com/catalogue/025f2922-94c3-3caf-888e-7e4537f49d54/ https://jtiik.ub.ac.id/index.php/jtiik/article/download/1516/pdf https://core.ac.uk/download/pdf/290148872.pdf,http://dx.doi.org/10.25126/jtiik.2019651516,,10.25126/jtiik.2019651516,2979886871,,0,,1,true,cc-by-sa,gold 026-881-708-685-188,IPv6 Issues and Benefits,,2020,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Yves Delphin,,9,2,113,125,Computer science; Wireless; Telecommunications; IPv6,,,,,http://sdiwc.net/digital-library/ipv6-issues-and-benefits,http://dx.doi.org/10.17781/p002659,,10.17781/p002659,3128987059,,0,073-693-129-052-358,0,false,, 026-909-706-129-358,MAKING OF DIGITAL FORENSIC READINESS INDEX (DiFRI) MODELS TO MALWARE ATTACKS,2020-12-11,2020,journal article,Cyber Security dan Forensik Digital,26158442,Al-Jamiah Research Centre,,Yogi Pratama,"The increasing number of malware spread in the world today, then there will be more opportunities to commit crime, so readiness is needed for every internet user in dealing with these crimes. The readiness to handle crime is called digital forensic readiness. Therefore, we need a specific digital forensic readiness model to measure the level of readiness of internet users or institutions in achieving malware attacks. This model has the main components used to determine or calculate the level of readiness of internet users or institutions, the main components are the strategy component, the policy & procedure component, the technology & security component, the digital forensic response component, the control & legality component. The calculation method used in this study is a Likert Scale, with this method the results will be obtained that are closer to the real situation. The value / index of readiness level obtained will provide recommendations to internet users and these recommendations can be used to make improvements properly and on target.",3,2,1,5,Likert scale; The Internet; Commit; Control (management); Index (publishing); Computer security; Computer science; Component (UML); Malware; Digital forensics,,,,,http://ejournal.uin-suka.ac.id/saintek/cybersecurity/article/view/2005 http://ejournal.uin-suka.ac.id/saintek/cybersecurity/article/download/2005/1798,http://dx.doi.org/10.14421/csecurity.2020.3.2.2005,,10.14421/csecurity.2020.3.2.2005,3112021746,,0,010-791-676-072-730; 021-486-901-460-202; 046-143-775-958-052; 054-331-725-373-265; 058-723-704-218-926; 073-524-789-009-542; 107-802-050-888-509; 127-364-049-570-112; 134-694-095-906-997,0,true,cc-by-sa,hybrid 027-093-995-890-019,Industrial IoT(IIOT)- An Exploration,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Suchitra Das,,,,,,Data science; Computer science; Internet of Things,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.15,http://dx.doi.org/10.46293/4n6/2020.02.04.15,,10.46293/4n6/2020.02.04.15,3097202746,,0,,0,false,, 027-658-395-615-692,OpenLV: Empowering investigators and first-responders in the digital forensics process,,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Timothy Vidas; Brian Kaplan; Matthew K. Geiger,"Abstract The continuing decline in the cost-per-megabyte of hard disk storage has inevitably led to a ballooning volume of data that needs to be reviewed in digital investigations. The result: case backlogs that commonly stretch for months at forensic labs, and per-case processing that occupies days or weeks of analytical effort. Yet speed is critical in situations where delay may render the evidence useless or endanger personal safety, such as when a suspect may flee, a victim is at risk, criminal tactics or control infrastructure may change, etc. In these and other cases, investigators need tools to enable quick triage of computer evidence in order to answer urgent questions, maintain the pace of an investigation and assess the likelihood of acquiring pertinent information from the device. This paper details the design and application of a tool, OpenLV, that not only meets the needs for speedy initial triage, but also can facilitate the review of digital evidence at later stages of investigation. With OpenLV, an investigator can quickly and safely interact with collected evidence, much as if they had sat down at the computer at the time the evidence was collected. Since OpenLV works without modifying the evidence, its use in triage does not preclude subsequent, in-depth forensic analysis. Unlike many popular forensics tools, OpenLV requires little training and facilitates a unprecedented level of interaction with the evidence.",11,,S45,S53,First responder; Triage; Pace; Suspect; Digital evidence; Computer security; Computer science; Process (engineering); Virtualization; Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S1742287614000115#! https://doi.org/10.1016/j.diin.2014.03.006 https://users.ece.cmu.edu/~tvidas/papers/DFRWSEU14.pdf https://www.sciencedirect.com/science/article/pii/S1742287614000115 https://core.ac.uk/display/82096948 https://core.ac.uk/download/pdf/82096948.pdf,http://dx.doi.org/10.1016/j.diin.2014.03.006,,10.1016/j.diin.2014.03.006,2059636126,,0,002-633-789-384-681; 004-260-804-798-107; 020-944-423-224-895; 032-286-659-568-014; 037-483-791-552-006; 038-668-970-194-854; 039-166-557-492-520; 047-630-600-014-492; 049-146-576-773-816; 049-313-374-093-607; 067-987-558-984-619; 081-458-407-971-603; 092-058-232-746-872; 094-295-279-676-447; 102-822-532-339-461; 142-884-607-464-932; 153-153-144-072-106; 167-592-705-831-583; 199-745-676-923-766,19,true,cc-by-nc-nd,hybrid 027-687-618-241-257,A New Method of Image Steganography: StegBlender,,2017,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Richard C. Leinecker,,6,4,155,161,World Wide Web; Information system; Image steganography; Computer science; Multimedia; Wireless,,,,,http://sdiwc.net/digital-library/a-new-method-of-image-steganography-stegblender.html,http://dx.doi.org/10.17781/p002300,,10.17781/p002300,2762898158,,0,,0,false,, 028-034-242-516-483,The Forensic Curator: Digital Forensics as a Solution to Addressing the Curatorial Challenges Posed by Personal Digital Archives,2012-10-23,2012,journal article,International Journal of Digital Curation,17468256,Edinburgh University Library,,Gareth Knight,"The growth of computing technology during the previous three decades has resulted in a large amount of content being created in digital form. As their creators retire or pass away, an increasing number of personal data collections, in the form of digital media and complete computer systems, are being offered to the academic institutional archive. For the digital curator or archivist, the handling and processing of such digital material represents a considerable challenge, requiring development of new processes and procedures. This paper outlines how digital forensic methods, developed by the law enforcement and legal community, may be applied by academic digital archives. It goes on to describe the strategic and practical decisions that should be made to introduce forensic methods within an existing curatorial infrastructure and how different techniques, such as forensic hashing, timeline analysis and data carving, may be used to collect information of a greater breadth and scope than may be gathered through manual activities.",7,2,40,63,World Wide Web; Digital media; Carving; Archivist; Law enforcement; Scope (project management); Computer science; Timeline; Computer forensics; Digital forensics,,,,,https://doi.org/10.2218/ijdc.v7i2.228 https://researchonline.lshtm.ac.uk/id/eprint/2192853/ http://doi.org/10.2218/ijdc.v7i2.228 https://core.ac.uk/display/42633111 http://www.ijdc.net/article/view/218 https://paperity.org/p/275612301/the-forensic-curator-digital-forensics-as-a-solution-to-addressing-the-curatorial https://dblp.uni-trier.de/db/journals/ijdc/ijdc7.html#Knight12a https://core.ac.uk/download/42633111.pdf,http://dx.doi.org/10.2218/ijdc.v7i2.228,,10.2218/ijdc.v7i2.228,2127988978,,0,019-698-064-288-240; 032-192-641-675-455; 037-647-066-964-858; 038-668-970-194-854; 061-326-248-978-030; 089-550-797-690-956; 132-355-634-397-986; 142-884-607-464-932; 164-812-767-509-816; 170-299-458-679-224; 182-420-694-496-099,2,true,cc-by,gold 028-144-125-400-817,Digital investigations: relevance and confidence in disclosure,2021-09-21,2021,journal article,ERA Forum,18639038; 16123093,Springer Verlag,Germany,Philip Anderson; Dave Sampson; Seanpaul Gilroy,"The field of digital forensics has grown exponentially to include a variety of digital devices on which digitally stored information can be processed and used for different types of crimes. As a result, as this growth continues, new challenges for those conducting digital forensic examinations emerge. Digital forensics has become mainstream and grown in importance in situations where digital devices used in the commission of a crime need examining. This article reviews existing literature and highlights the challenges while exploring the lifecycle of a mobile phone examination and how the disclosure and admissibility of digital evidence develops.",,,1,13,Variety (cybernetics); Data science; Mobile phone; Mainstream; Transparency (behavior); Digital evidence; Field (computer science); Digital forensics; Relevance (information retrieval),,,,,https://researchportal.northumbria.ac.uk/en/publications/digital-investigations-relevance-and-confidence-in-disclosure https://link.springer.com/content/pdf/10.1007/s12027-021-00687-1.pdf https://link.springer.com/article/10.1007/s12027-021-00687-1 https://paperity.org/p/272916707/digital-investigations-relevance-and-confidence-in-disclosure,https://researchportal.northumbria.ac.uk/en/publications/digital-investigations-relevance-and-confidence-in-disclosure,,,3199727879,,0,009-284-801-057-774; 015-537-092-918-913; 018-093-184-946-852; 048-141-687-795-752; 050-618-920-212-97X; 074-614-672-576-143; 088-938-096-763-07X; 094-468-232-325-36X; 167-751-222-897-487; 194-940-035-354-905,0,false,, 028-180-038-189-484,Digital Forensics and Cyber Crime Datamining,,2012,journal article,Journal of Information Security,21531234; 21531242,"Scientific Research Publishing, Inc.",,K. K. Sindhu; Bandu B. Meshram,"Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability.",3,3,196,201,Data mining; File system; Digital evidence; Hidden data; Cyber crime; Digital forensic investigation; Computer security; Computer science; Computer forensics; Digital forensics; Vulnerability (computing),,,,,http://doi.org/10.4236/jis.2012.33024 http://dx.doi.org/10.4236/jis.2012.33024 https://doi.org/10.4236/jis.2012.33024 https://file.scirp.org/Html/3-7800083_21340.htm https://m.scirp.org/papers/21340 https://www.scirp.org/Journal/PaperInformation.aspx?paperID=21340 https://file.scirp.org/pdf/JIS20120300002_13729911.pdf https://www.scirp.org/Journal/PaperDownload.aspx?paperID=21340 http://www.scirp.org/Journal/PaperInformation.aspx?paperID=21340 https://dblp.uni-trier.de/db/journals/jisec/jisec3.html#SindhuM12,http://dx.doi.org/10.4236/jis.2012.33024,,10.4236/jis.2012.33024,1982246970,,0,007-832-595-971-443; 019-698-064-288-240; 055-425-122-624-954; 085-214-277-668-01X; 101-944-590-282-271; 117-626-618-645-095; 136-947-053-479-806; 139-567-850-350-938; 159-584-170-360-868; 177-597-414-067-285,28,true,,gold 028-254-822-298-261,The Feasibility of Creating a Universal Digital Forensics Framework,2019-08-05,2019,journal article,"Forensic, Legal & Investigative Sciences",2473733x,Herald Scholarly Open Access,,Gareth Davies; Kim Smith,,5,1,1,9,Computer science; Multimedia; Digital forensics,,,,,http://dx.doi.org/10.24966/flis-733x/100027,http://dx.doi.org/10.24966/flis-733x/100027,,10.24966/flis-733x/100027,2969490955,,0,,0,true,cc-by,gold 028-274-575-795-698,A glance at digital forensic academic research demographics.,2020-06-18,2020,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Graeme Horsman; Aney Biju Mammen,"Abstract Whilst the field of digital forensics is now well established, its research community can be considered relatively emerging in comparison to the associated areas of traditional forensic and computer sciences. As a result, this comment article takes a quick look at the demographics of digital forensics research over the last 20 years, with metadata from 6589 articles being extracted and analysed from Scopus in order to provide a brief insight into this field’s research activity.",60,5,399,402,Data science; Demographics; Research community; Field (computer science); Scopus; Digital forensics; Metadata,Digital Forensics; Forensics; Publication; Research,Computers; Demography; Forensic Medicine; Forensic Sciences; Humans,,,https://research.tees.ac.uk/en/publications/a-glance-at-digital-forensic-academic-research-demographics https://www.sciencedirect.com/science/article/abs/pii/S1355030620301623 https://www.ncbi.nlm.nih.gov/pubmed/32873378,http://dx.doi.org/10.1016/j.scijus.2020.06.003,32873378,10.1016/j.scijus.2020.06.003,3036329069,,0,006-933-430-647-14X; 070-665-150-453-490; 078-327-902-374-330; 087-950-081-760-226,1,false,, 028-399-721-856-065,Digital evidence exceptionalism? A review and discussion of conceptual hurdles in digital evidence transformation.,2020-08-28,2020,journal article,Forensic science international. Synergy,2589871x,Elsevier BV,Netherlands,Alex Biedermann; Kyriakos N. Kotsoglou,"Forensic science is currently undergoing a transformation and expansion to include modern types of evidence, such as evidence generated by digital investigations. This development is said to raise a series of challenges, both in operational and conceptual dimensions. This paper reviews and discusses a series of convoluted conceptual hurdles that are encountered in connection with the use of digital evidence as part of evidence and proof processes at trial, in contradistinction to investigative uses of such types of evidence. As a recent example raising such hurdles, we analyse and discuss assertions and proposals made in the article ""Digital Evidence Certainty Descriptors (DECDs)"" by Graeme Horsman (32 Forensic Science International: Digital Investigation (2020) 200896).",2,,262,274,Political science; Exceptionalism; Digital evidence; Weight of evidence; Engineering ethics; Certainty,Digital evidence; Evaluative reporting; Probability; Weight of evidence,,,Schweizerischer Nationalfonds zur Förderung der Wissenschaftlichen Forschung,https://www.ncbi.nlm.nih.gov/pubmed/32944711 https://serval.unil.ch/resource/serval:BIB_2D70F52A6C50.P001/REF.pdf https://pubmed.ncbi.nlm.nih.gov/32944711/ https://serval.unil.ch/en/notice/serval:BIB_2D70F52A6C50 https://researchportal.northumbria.ac.uk/en/publications/digital-evidence-exceptionalism-a-review-and-discussion-of-concep https://www.sciencedirect.com/science/article/pii/S2589871X2030053X https://core.ac.uk/download/334593742.pdf,http://dx.doi.org/10.1016/j.fsisyn.2020.08.004,32944711,10.1016/j.fsisyn.2020.08.004,3081942181,PMC7481130,0,000-178-375-284-248; 000-680-610-076-187; 001-794-049-244-772; 004-244-530-471-560; 007-545-564-801-255; 009-803-691-567-926; 013-430-618-958-58X; 014-401-428-086-120; 015-238-949-406-002; 016-976-912-187-206; 017-053-145-452-574; 017-532-588-960-752; 017-646-033-380-522; 017-676-770-095-833; 020-867-396-119-347; 022-799-618-827-180; 026-831-936-435-919; 026-943-588-349-358; 028-568-241-747-171; 030-561-874-846-524; 031-488-685-515-070; 038-406-981-485-542; 038-927-473-835-01X; 040-382-558-131-008; 043-832-112-590-677; 044-895-263-937-02X; 046-469-721-997-646; 049-861-007-939-866; 055-601-228-676-162; 056-285-104-372-145; 058-717-000-287-105; 060-224-586-183-448; 060-336-293-255-723; 064-107-009-692-27X; 073-790-480-897-758; 076-459-003-064-111; 079-046-994-186-390; 079-152-497-703-763; 081-453-315-841-69X; 085-370-444-410-812; 086-687-838-854-880; 088-306-589-450-500; 089-973-732-045-205; 093-053-768-366-548; 096-423-057-147-490; 099-407-105-258-080; 101-549-415-202-81X; 101-660-041-166-10X; 105-127-902-669-64X; 111-590-691-227-607; 117-555-147-368-574; 119-850-082-064-135; 146-400-282-561-102; 151-795-409-748-215; 152-902-067-717-677; 155-902-134-782-014; 159-382-983-272-683; 163-535-540-190-872; 173-145-269-859-717; 190-320-022-663-482,3,true,"CC BY, CC BY-NC-ND",gold 028-659-014-565-320,Science Column: Reconstruction: The Experimental Side of Digital Forensics,,2013,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Fred Cohen,Many in digital forensics seem to forget that the science part of digital forensics means experimentation and that implies a whole lot of things that most practitioners never learned. (see PDF for full column),8,4,49,56,Column (database); Computer security; Computer science; Digital forensics,,,,,https://core.ac.uk/display/92189626 https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#Cohen13a https://commons.erau.edu/jdfsl/vol8/iss4/3/ https://doaj.org/article/02612ed83f68498ab3c56377b490d9d7 https://commons.erau.edu/cgi/viewcontent.cgi?article=1155&context=jdfsl https://oaji.net/articles/2014/1095-1408891324.pdf,http://dx.doi.org/10.15394/jdfsl.2013.1155,,10.15394/jdfsl.2013.1155,1583161680,,0,,0,true,cc-by-nc,gold 028-703-682-549-92X,Instrumen Evaluasi Framework Investigasi Forensika Digital Menggunakan SNI 27037:2014,2016-11-07,2016,journal article,JISKA (Jurnal Informatika Sunan Kalijaga),25280074; 25275836,Al-Jamiah Research Centre,,Didik Sudyana; Bambang Sugiantoro; Ahmad Luthfi,"Hal penting yang harus diperhatikan oleh setiap petugas investigator forensika digital dalam menjalankan aktivitas forensika digital adalah diikutinya setiap tahapan dan prosedur dalam forensika digital. Tahapan tersebut dikenal dengan istilah framework s ataupun SOP investigasi. Tahapan dalam proses forensika digital harus sesuai dengan aturan hukum dan juga mekanisme yang tepat.  Namun framework investigasi yang berkembang saat ini ternyata masih terdapat kekurangan dimana ada tahapan-tahapan yang diatur dalam standar yang berlaku seperti SNI 27037:2014, ternyata tidak diatur dalam framework tersebut. Sehingga ketika tahapan tersebut terlewatkan dalam proses investigasi, tentu akan menjadi sebuah masalah dan bisa digugat di pengadilan serta dibatalkannya hasil investigasi yang dilakukan terkait adanya prosedur yang tidak dilaksanakan. Oleh karena itu dilakukan penelitian dengan melakukan identifikasi terhadap ketentuan dan proses penting dalam dokumen SNI 27037:2014 untuk kemudian menghasilkan instrument evaluasi yang dapat digunakan oleh penyidik atau praktisi forensika digital untuk melakukan penyesuaian atau evaluasi terhadap framework yang digunakan selama ini.",1,2,75,83,,,,,,http://ejournal.uin-suka.ac.id/saintek/JISKA/article/download/1116/1017 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/12-03 https://core.ac.uk/download/267117320.pdf,http://dx.doi.org/10.14421/jiska.2016.12-03,,10.14421/jiska.2016.12-03,2993500824,,0,,1,true,cc-by-nc,gold 028-874-299-732-939,A Proposed Digital Forensics Business Model to Support Cybercrime Investigation in Indonesia,2015-10-08,2015,journal article,International Journal of Computer Network and Information Security,20749090; 20749104,MECS Publisher,,Yudi Prayudi; Ahmad Ashari; Tri Kuntoro Priyambodo,"Digital forensics will always include at least human as the one who performs activities, digital evidence as the main object, and process as a reference for the activities followed. The existing framework has not provided a description of the interaction between human, interaction between human and digital evidence, as well as interaction between human and the process itself. A business model approach can be done to provide the idea regarding the interaction in question. In this case, what has been generated by the author in the previous study through a business model of the digital chain of custody becomes the first step in constructing a business model of a digital forensics. In principle, the proposed business model already accommodates major components of digital forensics (human, digital evidence, process) and also considers the interactions among the components. The business model suggested has contained several basic principles as described in The Regulation of Chief of Indonesian National Police (Perkap) No 10/2010. This will give support to law enforcement to deal with cybercrime cases that are more frequent and more sophisticated, and can be a reference for each institution and organization to implement digital forensics activities.",7,11,1,8,Chain of custody; Cybercrime; Law enforcement; Digital evidence; Computer security; Computer science; Business model; Process (engineering); Computer forensics; Digital forensics,,,,,http://www.mecs-press.org/ijcnis/ijcnis-v7-n11/IJCNIS-V7-N11-1.pdf http://www.mecs-press.org/ijcnis/ijcnis-v7-n11/v7n11-1.html,http://dx.doi.org/10.5815/ijcnis.2015.11.01,,10.5815/ijcnis.2015.11.01,2106442285,,0,004-872-169-627-620; 020-944-423-224-895; 025-697-732-683-864; 026-774-296-742-022; 029-043-587-641-360; 035-565-993-122-262; 038-668-970-194-854; 040-772-996-011-165; 045-458-395-510-15X; 066-219-211-495-201; 067-950-012-629-210; 068-199-942-987-426; 074-059-805-644-745; 074-869-044-681-879; 078-730-781-174-18X; 079-608-463-065-647; 082-073-790-023-516; 093-778-033-321-400; 094-014-111-514-467; 097-475-798-512-089; 109-480-920-508-017; 111-090-978-711-139; 124-066-378-359-073; 125-384-800-661-375; 133-397-275-695-990; 134-927-490-231-285; 170-299-458-679-224; 192-955-966-543-738; 199-745-676-923-766,17,true,,bronze 028-880-210-585-719,Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method,2020-10-30,2020,journal article,Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi),25800760,Ikatan Ahli Informatika Indonesia (IAII),,Ikhsan Zuhriyanto; Anton Yudhana; Riadi,"Current crime is increasing, one of which is the crime of using social media, although no crime does not leave digital evidence. Twitter application is a social media that is widely used by its users. Acts of crime such as fraud, insults, hate speech, and other crimes lately use many social media applications, especially Twitter. This research was conducted to find forensic evidence on the social media Twitter application that is accessed using a smartphone application using the Digital Forensics Research Workshop (DFRWS) method. These digital forensic stages include identification, preservation, collection, examination, analysis, and presentation in finding digital evidence of crime using the MOBILedit Forensic Express software and Belkasoft Evidence Center. Digital evidence sought on smartphones can be found using case scenarios and 16 variables that have been created so that digital proof in the form of smartphone specifications, Twitter accounts, application versions, conversations in the way of messages and status. This study's results indicate that MOBILedit Forensic Express digital forensic software is better with an accuracy rate of 85.75% while Belkasoft Evidence Center is 43.75%.",4,5,829,836,Internet privacy; Forensic science; Presentation; Software; Digital evidence; Computer science; Social media; Mobile device forensics; Identification (information); Digital forensics,,,,,https://jurnal.iaii.or.id/index.php/RESTI/article/download/2152/310 http://jurnal.iaii.or.id/index.php/RESTI/article/view/2152,http://dx.doi.org/10.29207/resti.v4i5.2152,,10.29207/resti.v4i5.2152,3096850422,,0,,0,true,cc-by,gold 029-025-254-650-825,Digital Forensics Tools,2019-12-30,2019,journal article,International Journal of Engineering and Advanced Technology,22498958,Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP,,Vedanta Kapoor; Sanya Taneja; Kakelli Anil Kumar,In this paper we will we reviewing the basic fundamentals of digital forensics and all go through the various types of forensics investigation teams available to us. We will also discuss about the different types of digital crimes that take place and the various tools present in order to counteract the crimes that are being committed. There will also be a comparative review among all the tools present based on various factors present giving the reader an abstract view about which tool to use for the best type of results.,9,2,3965,3969,,,,,,,http://dx.doi.org/10.35940/ijeat.b3980.129219,,10.35940/ijeat.b3980.129219,,,0,,0,true,,gold 029-051-761-190-391,Mitigating security Risks Using Belkasoft Evidence Center,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yuri Gubanov,,,,,,Business; Operations management; Center (algebra and category theory),,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.10,http://dx.doi.org/10.46293/4n6/2020.02.03.10,,10.46293/4n6/2020.02.03.10,3097098449,,0,,0,false,, 029-200-392-412-396,Practical and Legal Challenges of Cloud Investigations,2014-12-31,2014,journal article,"The Journal of the Institute of Webcasting, Internet and Telecommunication",22890238,"The Institute of Webcasting, Internet and Telecommunication",,Joshua I. James; Yunsik Jake Jang,"An area presenting new opportunities for both legitimate business, as well as criminal organizations, is Cloud computing. This work gives a strong background in current digital forensic science, as well as a basic understanding of the goal of Law Enforcement when conducting digital forensic investigations. These concepts are then applied to digital forensic investigation of cloud environments in both theory and practice, and supplemented with current literature on the subject. Finally, legal challenges with digital forensic investigations in cloud environments are discussed.",14,6,33,39,Work (electrical); Data science; Law enforcement; Digital forensic investigation; Computer security; Computer science; Computer forensics; Cloud computing; Digital forensics; Key (cryptography); Subject (documents); Digital evidence; Cloud forensics,,,,,https://arxiv.org/pdf/1502.01133.pdf https://ui.adsabs.harvard.edu/abs/2015arXiv150201133J/abstract https://www.arxiv.org/abs/1502.01133 http://arxiv.org/abs/1502.01133,http://dx.doi.org/10.7236/jiibc.2014.14.6.33,,10.7236/jiibc.2014.14.6.33,2001577875; 3101178665,,0,022-818-830-693-539; 043-386-830-253-686; 059-002-926-336-692; 059-697-278-686-056; 124-912-663-881-389; 152-143-492-651-125; 163-856-773-893-859; 173-952-459-161-812,6,true,,green 029-268-367-041-280,Automated inference of past action instances in digital investigations,2014-07-01,2014,journal article,International Journal of Information Security,16155262; 16155270,Springer Science and Business Media LLC,Germany,Joshua I. James; Pavel Gladyshev,"As the amount of digital devices suspected of containing digital evidence increases, case backlogs for digital investigations are also increasing in many organizations. To ensure timely investigation of requests, this work proposes the use of signature-based methods for automated action instance approximation to automatically reconstruct past user activities within a compromised or suspect system. This work specifically explores how multiple instances of a user action may be detected using signature-based methods during a postmortem digital forensic analysis. A system is formally defined as a set of objects, where a subset of objects may be altered on the occurrence of an action. A novel action-trace update time threshold is proposed that enables objects to be categorized by their respective update patterns over time. By integrating time into event reconstruction, the most recent action instance approximation as well as limited past instances of the action may be differentiated and their time values approximated. After the formal theory if signature-based event reconstruction is defined, a case study is given to evaluate the practicality of the proposed method.",14,3,249,261,Data mining; Theory; Signature (logic); Cryptography; Event reconstruction; Inference; Action (philosophy); Digital evidence; Computer science; Digital forensics; Set (abstract data type),,,,,https://dblp.uni-trier.de/db/journals/ijisec/ijisec14.html#JamesG15 https://arxiv.org/abs/1407.5714 https://core.ac.uk/display/25044554 https://link.springer.com/article/10.1007/s10207-014-0249-6 https://rd.springer.com/article/10.1007/s10207-014-0249-6 https://dblp.uni-trier.de/db/journals/corr/corr1407.html#JamesG14 https://doi.org/10.1007/s10207-014-0249-6 https://link.springer.com/article/10.1007/s10207-014-0249-6/fulltext.html http://arxiv.org/abs/1407.5714,http://dx.doi.org/10.1007/s10207-014-0249-6,,10.1007/s10207-014-0249-6,2160266583; 3100399861,,0,001-829-135-644-040; 007-832-595-971-443; 013-441-842-090-74X; 015-995-636-621-324; 037-105-622-240-257; 045-439-795-806-132; 062-032-128-092-406; 064-988-327-019-067; 073-847-291-567-156; 080-609-913-435-255; 083-366-581-383-158; 087-690-831-820-163; 094-295-279-676-447; 111-471-986-310-852; 133-197-850-732-190; 134-927-490-231-285,21,true,,green 029-358-230-855-979,THE DOCTRINE OF FORENSIC ACTIVITIES DIGITALIZATION AND THE PROBLEMS OF FORENSIC DIDACTICS,2020-04-01,2020,journal article,The rule-of-law state: theory and practice,25000217,Bashkir State University,,Елена Россинская,"The global digitalization in all spheres of human activity has seriously affected the problems of using special knowledge when collecting and examining evidence in criminal, civil and administrative cases, and especially forensic activities.; Purpose: to develop a methodology for forensic examination of criminally significant computer information in the context of forensic activities digitalization.; Methods: methods of dialectical and formal logic, comparison, description, interpretation, special scientific methods of forensic expertology and the theory of information and computer support for forensic activities.; Results: the author develops the fundamentals of the forensic activity digitalization theory, the subject and objects of the theory, the main directions of the theory development, including the study of the types and forms of digital footprints in various types of forensic examinations; solving problems of integration in the production of forensic examinations in the context of digitalization; solving the problems of digitalization, unification and statutory regulation of reference and information collections and databases of forensic objects.",16,4-1,88,101,Forensic science; Political science; Doctrine; Engineering ethics,,,,,https://pravgos.ru/index.php/journal/article/download/103/103,http://dx.doi.org/10.33184/pravgos-2020.4.9,,10.33184/pravgos-2020.4.9,3156819603,,0,,0,true,cc-by,gold 029-686-297-425-327,Detection of inter-frame forgeries in digital videos.,2018-05-26,2018,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,K. Sitara; Babu M. Mehtre,,289,,186,206,Zoom; Frame (networking); Artificial intelligence; Shuffling; Computer vision; Inter frame; Computer science; Rest (physics); Event (computing); False positive paradox; Data compression,Digital multimedia forensics; Video anti-forensics; Video compression; Video forensics; Video forgery; Video tampering detection,,,GOP structure,https://europepmc.org/article/MED/29894923 https://www.sciencedirect.com/science/article/abs/pii/S0379073818302809 http://www.sciencedirect.com/science/article/pii/S0379073818302809 https://www.sciencedirect.com/science/article/pii/S0379073818302809#!,http://dx.doi.org/10.1016/j.forsciint.2018.04.056,29894923,10.1016/j.forsciint.2018.04.056,2803129486,,0,000-679-477-475-489; 004-454-686-543-933; 006-066-260-482-289; 008-543-630-968-22X; 016-077-398-922-212; 016-145-301-135-450; 016-183-275-816-304; 016-980-274-634-092; 017-589-130-722-16X; 017-826-560-912-576; 022-297-088-924-425; 022-766-835-371-983; 025-613-105-756-285; 026-163-602-249-656; 027-083-618-870-750; 027-527-644-893-782; 027-897-902-068-979; 029-151-741-190-472; 029-331-903-414-060; 030-797-085-560-938; 032-151-005-529-157; 032-362-262-096-276; 036-415-084-882-283; 037-680-775-427-216; 039-997-077-156-824; 042-565-172-176-961; 043-541-517-984-519; 047-624-181-866-904; 053-637-494-162-668; 060-826-481-716-218; 061-073-654-192-268; 062-781-051-017-106; 063-532-297-436-449; 064-927-034-471-405; 065-559-221-714-29X; 067-504-974-724-040; 074-302-952-168-459; 077-323-690-290-738; 080-118-922-891-58X; 080-219-450-393-218; 081-645-420-395-35X; 083-091-575-566-417; 083-230-211-800-097; 085-816-961-933-906; 093-350-254-783-353; 096-289-706-423-826; 098-440-015-522-27X; 100-880-837-233-791; 102-360-837-793-397; 122-276-883-832-311; 125-908-242-290-315; 140-408-113-219-371; 150-115-527-453-516; 152-832-145-694-001; 159-524-792-135-812; 171-816-823-359-94X,13,false,, 029-985-060-352-924,System-Generated Digital Forensic Evidence in Graphic Design Applications,,2013,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Enos K. Mabuto; Hein S. Venter,"Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered from certain graphic design applications, which indicates that a counterfeit document was created. This inference is made by associating the digital forensic information gathered with the possible actions taken, more specifically, the scanning, editing, saving and printing of counterfeit documents. The digital forensic information is gathered by analysing the files generated by the particular graphic design application used for creating the document. The acquired digital forensic information is corroborated to the creation of counterfeit documents and interpreted accordingly. In the end determining if a system was utilised for counterfeiting.",8,3,71,86,World Wide Web; Graphic design; Identity (object-oriented programming); Counterfeit; Digital evidence; Digital forensic investigation; Computer science; Multimedia; Digital art; Computer forensics; Digital forensics,,,,,https://core.ac.uk/display/91686147 https://commons.erau.edu/jdfsl/vol8/iss3/4/ https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#MabutoV13 https://commons.erau.edu/cgi/viewcontent.cgi?article=1151&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2013.1151,,10.15394/jdfsl.2013.1151,2118811779,,0,,0,true,cc-by-nc,gold 030-031-636-555-061,"Analysis on unidentified cases in which dental information was collected from 2014 to 2019 in Miyagi Prefecture, Japan.",2022-01-10,2022,journal article,"Legal medicine (Tokyo, Japan)",18734162; 13446223,Elsevier,Netherlands,Moe Kosaka; Yuka Hatano; Kie Yoshida; Khongorzul Tsogtsaikhan; Isuruni Kuruppuarachchige; Toshihiko Suzuki,,55,,102015,102015,Medicine; Demography; Identification (biology); Age groups; Statistical analysis; Dentistry; Statistics; Botany; Mathematics; Sociology; Biology,Autopsy; Dental identification; Forensic odontology; Japan; Miyagi prefecture,"Adolescent; Aged, 80 and over; Autopsy; Databases, Factual; Female; Forensic Medicine; Humans; Japan; Male; Surveys and Questionnaires",,,,http://dx.doi.org/10.1016/j.legalmed.2022.102015,35093787,10.1016/j.legalmed.2022.102015,,,0,003-298-351-894-768; 009-032-611-393-776; 026-863-223-435-130; 028-313-003-380-373; 028-929-527-559-847; 041-000-684-146-868; 041-053-770-651-587; 042-755-502-015-560; 043-543-201-722-562; 045-041-636-567-613; 053-603-321-932-702; 053-706-643-522-468; 058-202-045-330-40X; 060-557-197-043-316; 062-144-988-268-658; 067-781-550-667-893; 071-617-496-196-540; 072-501-463-865-420; 077-564-327-499-016; 078-168-531-520-881; 078-329-809-879-181; 090-578-282-408-421; 105-367-836-087-977; 107-909-266-296-422; 116-207-427-049-255; 136-699-567-258-437,0,false,, 030-178-593-043-926,A review of quality procedures in the UK forensic sciences: What can the field of digital forensics learn?,2018-09-23,2018,journal article,Science & justice : journal of the Forensic Science Society,13550306,Forensic Science Society,United Kingdom,Helen Page; Graeme Horsman; Anna Sarna; Julienne Foster,"With a reliance on the various forms of forensic science evidence in complex criminal investigations, the measures for ensuring its quality are facing increasing scrutiny. Improvements to quality management systems, to ensure both the robust application of scientific principles and the accurate interpretation and reporting of results, have arisen as a consequence of high-profile rebuttals of forensic science evidence, combined with process improvements driven by evaluation of current practice. These improvements are crucial to ensure validity of results as well as providing assurance for all those involved in the Criminal Justice System. This work first examines the quality management systems utilised for the examination and analysis of fingerprint, body fluid and DNA evidence. It then proceeds to highlight an apparent lack of comparable quality assurance mechanisms within the field of digital forensics, one of the newest branches of forensic science. Proposals are provided for the improvement of quality assurance for the digital forensics arena, drawing on the experiences of, and more well-established practices within, other forensic disciplines.",59,1,83,92,Criminal justice; Quality assurance; Criminal investigation; Quality management system; Scrutiny; Quality (business); Computer science; Process (engineering); Engineering ethics; Digital forensics,Codes of practice and conduct; DNA Fingerprint; Digital forensics; Forensic science; Peer review,Accreditation; Body Fluids/chemistry; Computers; DNA/analysis; Dermatoglyphics; Female; Forensic Sciences/organization & administration; Guidelines as Topic/standards; Humans; Information Storage and Retrieval/standards; Male; Peer Review; Quality Control; Specimen Handling/standards; Total Quality Management/standards; United Kingdom,DNA,,https://research.tees.ac.uk/en/publications/a-review-of-quality-procedures-in-the-uk-forensic-sciences-what-c https://www.ncbi.nlm.nih.gov/pubmed/30654972 http://europepmc.org/abstract/MED/30654972 https://research.tees.ac.uk/ws/files/6504479/DF_FP_and_DNA_Standards_1_.pdf https://www.sciencedirect.com/science/article/pii/S1355030618302211 https://core.ac.uk/download/pdf/196167610.pdf,http://dx.doi.org/10.1016/j.scijus.2018.09.006,30654972,10.1016/j.scijus.2018.09.006,2893292743,,0,000-613-227-505-807; 003-168-641-529-165; 004-200-813-216-207; 012-410-670-929-028; 013-568-618-083-770; 026-193-200-552-529; 027-462-218-331-336; 032-306-447-977-364; 042-230-817-975-353; 043-083-546-914-143; 045-243-165-627-08X; 046-108-923-988-488; 068-781-516-754-885; 093-650-425-263-585; 101-436-770-235-826; 102-275-304-340-962; 108-249-505-350-920; 111-090-978-711-139; 132-355-634-397-986; 133-397-275-695-990; 133-508-126-407-763; 142-653-171-956-478; 142-790-196-752-819; 154-855-895-914-987,23,true,cc-by-nc-nd,green 030-264-284-537-878,Aspects of Digital Forensics in South Africa,,2016,journal article,"Interdisciplinary Journal of Information, Knowledge, and Management",15551229; 15551237,Informing Science Institute,United States,Alastair Irons; Jacques Ophoff,"This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics. The paper paints a picture of the cy-bercrime threats facing South Africa and argues for the need to develop a skill base in digi-tal forensics in order to counter the threats through detection of cybercrime, by analyzing cybercrime reports, consideration of current legislation, and an analysis of computer foren-sics course provision in South African universities. The paper argues that there is a need to develop digital forensics skills in South Africa through university programs, in addition to associated training courses. The intention in this paper is to promote debate and discussion in order to identify the cyber threats to South Africa and to encourage the development of a framework to counter the threats – through legislation, high tech law enforcement structures and protocols, digital forensics education, digital forensics skills development, and a public and business awareness of cybercrime threats.",11,,273,283,Internet privacy; Engineering; High tech; Legislation; Cybercrime; Law enforcement; Cyber threats; Digital forensics,,,,,https://rke.abertay.ac.uk/en/publications/aspects-of-digital-forensics-in-south-africa https://sure.sunderland.ac.uk/id/eprint/6806 https://www.informingscience.org/Publications/3576 https://core.ac.uk/display/88802163 http://www.ijikm.org/Volume11/IJIKMv11p273-283Irons2689.pdf https://core.ac.uk/download/74369166.pdf,http://dx.doi.org/10.28945/3576,,10.28945/3576,2578671149,,0,020-354-875-394-852; 044-244-941-027-350; 100-324-495-343-319; 150-069-198-380-365; 165-790-897-987-965; 167-592-705-831-583,3,true,,gold 030-290-105-311-611,Investigasi Aplikasi Messager Pada Smartphone Berbasis Android,2016-12-20,2016,journal article,Jurnal Rekayasa Sistem & Industri (JRSI),25799142; 23560843,Telkom University,,Haris Richard Adrian Taruma Selej,"in the era of technology has greatly advanced, mobile phones have become a necessity and a means of communicating with each other. even though they are separated by a considerable distance, no longer need to spend the time to meet physically. This reason also makes the phone as the primary choice for criminals to communicate. communication used a variety of purposes, such as positive or negative. In 2010, digital forensic analyst team has examined such as network Puslabfor drugs, pornography, gambling, corruption, defamation, fraud, bribery, and others. Of these, as many as 118 types of mobile phones in the form of evidence. It means that offenders still consider mobile phones as a primary communication tool. Digital forensic analysts and investigators, it shall be able to anticipate these things, so that when there is evidence of mobile phone, which was confiscated from criminals, can be checked properly in accordance with the basic principles of digital forensics. This study uses DFIF (Digital Forensic Investigation Framework) smartphone investigation by searching for evidence of a conversation via text message. the results of the investigation evidence to prove the offender information, the information will be presented in the form of a forensic report which will be used as evidence in court.",4,02,,,Internet privacy; Conversation; Mobile phone; Phone; Pornography; Text message; Digital forensic investigation; Computer science; Digital forensics,,,,,https://jrsi.sie.telkomuniversity.ac.id/index.php/JRSI/article/view/147,http://dx.doi.org/10.25124/jrsi.v4i02.147,,10.25124/jrsi.v4i02.147,2793944394,,0,,0,true,cc-by-sa,gold 030-333-349-393-032,Modelling and refinement of forensic data acquisition specifications,,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Benjamin Aziz,"This paper defines a model of a special type of digital forensics tools, known as data acquisition tools, using the formal refinement language Event-B. The complexity and criticality of many types of computer and Cyber crime nowadays combined with improper or incorrect use of digital forensic tools calls for more robust and reliable specifications of the functionality of digital forensics applications. As a minimum, the evidence produced by such tools must meet the minimum admissibility standards the legal system requires, in general implying that it must be generated from reliable and robust tools. Despite the fact that some research and effort has been spent on the validation of digital forensics tools by means of testing, the verification of such tools and the formal specification of their expected behaviour remains largely under-researched. The goal of this work is to provide a formal specification against which implementations of data acquisition procedures can be analysed.",11,2,90,101,Software engineering; Formal specification; Refinement; Data acquisition; Implementation; Event b method; Cyber crime; Computer security; Computer science; Computer forensics; Digital forensics,,,,,https://researchportal.port.ac.uk/en/publications/modelling-and-refinement-of-forensic-data-acquisition-specificati https://puredev.port.ac.uk/en/publications/modelling-and-refinement-of-forensic-data-acquisition-specificati https://researchportal.port.ac.uk/portal/files/1151700/elsarticle_template_4_harv.pdf https://www.sciencedirect.com/science/article/pii/S1742287614000346 http://www.sciencedirect.com/science/article/pii/S1742287614000346 https://core.ac.uk/download/29587147.pdf,http://dx.doi.org/10.1016/j.diin.2014.04.001,,10.1016/j.diin.2014.04.001,2039790515,,0,001-009-008-665-240; 001-752-080-318-279; 004-652-388-189-304; 006-731-367-983-371; 020-944-423-224-895; 021-039-461-635-181; 021-850-998-857-676; 028-995-053-119-836; 030-359-893-882-572; 032-477-197-285-256; 035-403-390-260-816; 041-855-656-823-650; 043-499-798-259-789; 045-439-795-806-132; 064-531-736-566-934; 070-946-535-584-257; 075-128-417-091-483; 094-183-392-175-808; 099-482-594-708-125; 117-821-177-762-731; 119-551-188-032-545; 123-082-630-503-713; 133-508-126-407-763; 142-653-298-375-689; 158-170-674-288-488; 184-948-841-629-735; 190-065-821-748-92X; 199-172-967-270-034,7,true,cc-by-nc-nd,green 030-497-462-266-28X,Manual Analysis Phase for (PIFPM): Platform Independent Forensics Process Model for Smartphones,,2017,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,F. Chevonne Thomas Dancer,,6,3,101,108,Phase (combat); Information system; Platform independent; Computer science; Multimedia; Wireless; Process (computing),,,,,https://sdiwc.net/digital-library/manual-analysis-phase-for-pifpm-platform-independent-forensics-process-model-for-smartphones.html,http://dx.doi.org/10.17781/p002274,,10.17781/p002274,2753674800,,0,,1,false,, 030-549-796-030-148,Design and Implementation of Linux based Workflow for Digital Forensics Investigation,2019-04-11,2019,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Moses Ashawa; Morris Ntonja,"Window based digital forensic workflow has been the traditional investigation model for digital evidence. Investigating using Linux based platform tends challenging since there is no specific investigation workflow for Linux platform. This study designed and implemented a Linux forensic based-workflow for digital investigation. The workflow was divided into different investigation phases. The digital investigations processes in all the phases were performed using Linux riggings. The work-flow was tested and evidence such as (E01) Image was accurately acquired. This paper is presented in the following sections. Section one and two provided introduction and literature on existing forensic workflow using windows-based workflow respectively. Section three provided the approach to window workflow. The experimental design and tools used were presented in section four. The rest of the sections considered the research analysis, discussion and conclusion respectively. The implication of the test conducted, tools used with their corresponding weakness and strengths were highlighted in the appendix",181,49,40,46,Software engineering; Workflow; Digital evidence; Computer science; Digital forensics,,,,,https://dspace.lib.cranfield.ac.uk/handle/1826/14412 https://www.ijcaonline.org/archives/volume181/number49/ashawa-2019-ijca-918684.pdf https://www.ijcaonline.org/archives/volume181/number49/30491-2019918684,http://dx.doi.org/10.5120/ijca2019918684,,10.5120/ijca2019918684,2938074275,,0,020-959-006-156-504; 028-457-962-572-453; 032-487-265-797-544; 039-627-889-157-293; 056-674-370-113-188; 064-549-392-650-90X; 077-114-085-988-723; 082-490-100-922-264; 111-488-239-742-003; 130-080-242-566-434; 145-635-013-548-735; 154-912-841-322-255; 190-795-233-892-655,0,true,cc-by-nc,gold 030-688-016-727-252,The information privacy domain,,2016,journal article,"International Journal of Information Privacy, Security and Integrity",17418496; 1741850x,Inderscience Publishers,,Aftab Ahmad; Preeti Misra; Frank Ono; Cody Priest; Jessica Suarez; Alexander Urcioli,"A definition of information privacy is elusive due to its multi-facetted aspects. The paper presents the position that information privacy is a domain and not a property, and elaborates various components of this domain. It goes on to use the provided definition of information privacy domain to test Gramm-Leach-Bliley Act. The definition provided can be employed in enacting new laws, designing new information systems and in analysing privacy and security technologies.",2,4,307,329,Internet privacy; Information privacy; Information sensitivity; Personally identifiable information; Privacy laws of the United States; Information system; Privacy by Design; Computer security; Computer science; Privacy software; Information security,,,,,https://doi.org/10.1504/IJIPSI.2016.10003023 https://www.inderscienceonline.com/doi/abs/10.1504/IJIPSI.2016.082124 https://dblp.uni-trier.de/db/journals/ijipsi/ijipsi2.html#AhmadMOPSU16 http://www.inderscience.com/link.php?id=82124 http://doi.org/10.1504/IJIPSI.2016.10003023,http://dx.doi.org/10.1504/ijipsi.2016.10003023,,10.1504/ijipsi.2016.10003023,2584630729,,0,009-235-111-192-572; 037-023-568-978-306; 088-469-368-357-472; 153-273-270-714-364; 162-492-531-934-055,1,false,, 030-700-786-844-876,The usefulness of models in digital forensics,,2012,journal article,Journal of Forensic Research,21577145,OMICS Publishing Group,,David A. Dampier,,1,S1,,,World Wide Web; Workflow; Data science; Computer science; Digital forensics,,,,,https://www.omicsonline.org/proceedings/evolution-in-forensic-dna-analysis-workflows-for-single-source-and-evidence-samples-4359.html https://www.omicsonline.org/2157-7145/2157-7145-S1.001-003.pdf,http://dx.doi.org/10.4172/2157-7145.s1.001,,10.4172/2157-7145.s1.001,2522683702,,0,,0,false,, 030-873-326-014-594,Classification and evaluation of digital forensic tools,2020-12-01,2020,journal article,TELKOMNIKA (Telecommunication Computing Electronics and Control),23029293; 16936930; 2087278x,Universitas Ahmad Dahlan,Indonesia,Azra Parveen; Zishan H. Khan; Syed Naseem Ahmad,"Digital forensic tools (DFTs) are used to detect the authenticity of digital images. Different DFTs have been developed to detect the forgery like (i) forensic focused operating system, (ii) computer forensics, (iii) memory forensics, (iv) mobile device forensics, and (v) software forensics tools (SFTs). These tools are dedicated to detect the forged images depending on the type of the applications. Based on our review, we found that in literature of the DFTs less attention is given to the evaluation and analysis of the forensic tools. Among various DFTs, we choose SFTs because it is concerned with the detection of the forged digital images. Therefore,the purpose of this study is to classify the different DFTs and evaluate the software forensic tools (SFTs) based on the different features which are present in the SFTs. In our work, we evaluate the following five SFTs, i.e.,“FotoForensics”, “JPEGsnoop”, “Ghiro”, “Forensically”, and “Izitru”, based on different features so that new research directions can be identified for the development of the SFTs.",18,6,3096,3106,Data mining; Memory forensics; Software; Software forensics; Image forensics; Computer science; Digital image; Computer forensics; Mobile device forensics; Digital forensics,,,,,http://journal.uad.ac.id/index.php/TELKOMNIKA/article/view/15295/9288 https://core.ac.uk/download/pdf/349572707.pdf,http://dx.doi.org/10.12928/telkomnika.v18i6.15295,,10.12928/telkomnika.v18i6.15295,3087843939,,0,,2,true,cc-by-sa,hybrid 030-941-913-345-349,Ensuring the Legality of the Digital Forensics Process in South Africa,2013-04-18,2013,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Jason Jordaan,"In most legal systems, it is crucial that evidence that is obtained for use in any judicial proceedings, especially criminal prosecutions, is obtained lawfully. In other words, no crimes should be committed in the obtaining and examining of any evidence, which will be later, be relied upon in court. Section 86 of the Electronic Communications and Transactions Act 25 of 2002 in South Africa creates a criminal offence of unauthorized access to data, which has a significant potential impact on the acquisition, examination, and analysis of digital evidence; in that traditional digital forensic processes, unless legally authorized, may potentially be in contravention of this law. The legal ramifications for both digital forensics practitioners and the cases that they are engaged on are identified, and appropriate legal solutions are provided to ensure that digital forensic practitioners do not contravene the existing legislation.",68,23,36,39,Internet privacy; Legislation; Contravention; Digital evidence; Computer science; Principle of legality; Process (engineering); Digital forensics,,,,,https://research.ijcaonline.org/volume68/number23/pxc3887432.pdf http://ui.adsabs.harvard.edu/abs/2013IJCA...68w..36J/abstract http://www.lex-informatica.org/Ensuring%20the%20Legality%20of%20the%20Digital%20Forensics%20Process%20in%20South%20Africa.pdf https://www.ijcaonline.org/archives/volume68/number23/11722-7432,http://dx.doi.org/10.5120/11722-7432,,10.5120/11722-7432,2148128673,,0,072-712-275-844-913; 100-767-382-538-470; 106-885-306-836-498; 113-193-394-996-104; 130-217-725-914-477; 136-745-511-009-321; 142-108-488-120-966; 154-255-264-599-600; 154-778-607-714-379,0,true,,green 031-065-083-951-858,Mobile Forensic Process and Associated Key Challenges,,2020,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Vijaya S. Waghmare; B. B. Meshram,,9,1,42,54,Key (cryptography); Data science; Computer science; Process (engineering); Wireless,,,,,http://sdiwc.net/digital-library/mobile-forensic-process-and-associated-key-challenges,http://dx.doi.org/10.17781/p002651,,10.17781/p002651,3126706716,,0,001-465-819-904-291; 044-972-583-221-633; 053-394-227-052-76X; 073-876-103-481-172; 080-226-855-967-158; 090-390-906-646-037; 090-496-255-429-009; 094-468-232-325-36X; 106-885-306-836-498; 120-361-603-676-195; 165-078-942-971-622; 181-330-959-502-023; 194-940-035-354-905,0,false,, 031-084-814-192-60X,Positive control tests for fingermark development reagents.,2020-03-16,2020,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Roy Janssen-Bouwmeester; Christiaan Bremmer; Linda Koomen; Shermayne Siem-Gorré; Marcel de Puit,,310,,110259,110259,Detection limit; Ninhydrin; Amino acid solution; Visualisation techniques; Positive control; Mathematics; Reagent; Chromatography,Fingermark; Fingerprint; Indanedione; Ninhydrin; Positive control; Simulated fingermark,Dermatoglyphics; Forensic Pathology; Humans; Indans/chemistry; Indicators and Reagents/chemistry; Ninhydrin/chemistry,"1,2-indanedione; Indans; Indicators and Reagents; Ninhydrin",,https://europepmc.org/article/MED/32224429 https://pubmed.ncbi.nlm.nih.gov/32224429/ https://www.sciencedirect.com/science/article/abs/pii/S0379073820301213 https://www.ncbi.nlm.nih.gov/pubmed/32224429 https://pubag.nal.usda.gov/catalog/6873781,http://dx.doi.org/10.1016/j.forsciint.2020.110259,32224429,10.1016/j.forsciint.2020.110259,3011610514,,0,012-201-418-741-452; 025-446-907-258-629; 027-173-519-900-466; 032-085-055-912-741; 043-920-955-434-20X; 045-830-532-366-077; 053-551-505-531-143; 061-498-418-875-132; 065-064-295-242-016; 066-353-371-492-517; 067-030-451-906-169; 080-172-774-926-919; 092-849-252-226-832; 099-942-614-217-599; 103-647-471-157-031; 143-081-462-230-20X,4,false,, 031-522-316-310-252,"Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model",2012-02-28,2012,journal article,Computer and Information Science,19138997; 19138989,Canadian Center of Science and Education,,Gary D Cantrell; David A. Dampier; Yoginder S. Dandass; Nan Niu; A. Chris Bogen,"The digital forensic process as traditionally laid out begins with the collection, duplication, and authentication of every piece of digital media prior to examination. These first three phases of the digital forensic process are by far the most costly. However, complete forensic duplication is standard practice among digital forensic laboratories. The time it takes to complete these stages is quickly becoming a serious problem. Digital forensic laboratories do not have the resources and time to keep up with the growing demand for digital forensic examinations with the current methodologies. One solution to this problem is the use of pre-examination techniques commonly referred to as digital triage. Pre-examination techniques can assist the examiner with intelligence that can be used to prioritize and lead the examination process. This work discusses a proposed model for digital triage that is currently under development at Mississippi State University.",5,2,29,38,Authentication (law); Digital media; Data science; Digital forensic process; Triage; Computer security; Computer science; Process (engineering); State (computer science); Computer forensics; Digital forensics,,,,,https://mds.marshall.edu/wdcs_faculty/61/ https://works.bepress.com/david-dampier/1/ https://www.ccsenet.org/journal/index.php/cis/article/view/13527/10382 https://mds.marshall.edu/cgi/viewcontent.cgi?article=1060&context=wdcs_faculty https://www.ccsenet.org/journal/index.php/cis/article/download/13527/10382,http://dx.doi.org/10.5539/cis.v5n2p29,,10.5539/cis.v5n2p29,2136654754,,0,004-652-388-189-304; 017-335-677-993-203; 020-944-423-224-895; 021-850-998-857-676; 025-421-213-608-128; 032-697-093-668-898; 040-911-574-660-701; 041-561-245-686-942; 062-217-186-853-075; 125-384-800-661-375; 140-821-103-436-654; 154-407-233-384-826; 184-948-841-629-735; 186-993-770-394-232; 190-065-821-748-92X; 199-745-676-923-766,27,true,cc-by,hybrid 031-586-036-745-174,Digital Forensics Subdomains: The State of the Art and Future Directions,,2021,journal article,IEEE Access,21693536,Institute of Electrical and Electronics Engineers (IEEE),United States,Arafat Al-Dhaqm; Richard Adeyemi Ikuesan; Victor R. Kebande; Shukor Abd Razak; George Grispos; Kim-Kwang Raymond Choo; Bander Ali Saleh Al-rimy; AbdulRahman A. Alsewari,"For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident. Mainly, traditional digital forensics techniques focus on computer desktops and servers. However, recent advances in digital media and platforms have seen an increased need for the application of digital forensic investigation techniques to other subdomains. This includes mobile devices, databases, networks, cloud-based platforms, and the Internet of Things (IoT) at large. To assist forensic investigators to conduct investigations within these subdomains, academic researchers have attempted to develop several investigative processes. However, many of these processes are domain-specific or describe domain-specific investigative tools. Hence, in this paper, we hypothesize that the literature is saturated with ambiguities. To further synthesize this hypothesis, a digital forensic model-orientated Systematic Literature Review (SLR) within the digital forensic subdomains has been undertaken. The purpose of this SLR is to identify the different and heterogeneous practices that have emerged within the specific digital forensics subdomains. A key finding from this review is that there are process redundancies and a high degree of ambiguity among investigative processes in the various subdomains. As a way forward, this study proposes a high-level abstract metamodel, which combines the common investigation processes, activities, techniques, and tasks for digital forensics subdomains. Using the proposed solution, an investigator can effectively organize the knowledge process for digital investigation.",9,,152476,152502,Digital media; Mobile device; Data science; Database forensics; Digital evidence; Computer science; Process (engineering); Network forensics; Digital forensics; Server,,,,Open Access Funding provided by the Qatar National Library,https://experts.nebraska.edu/en/publications/digital-forensics-subdomains-the-state-of-the-art-and-future-dire https://dblp.uni-trier.de/db/journals/access/access9.html#Al-DhaqmIKRGCAA21,http://dx.doi.org/10.1109/access.2021.3124262,,10.1109/access.2021.3124262,3210059387,,0,000-281-222-726-856; 001-187-036-977-606; 001-255-768-346-633; 001-888-175-704-116; 002-044-330-972-492; 002-718-328-889-719; 003-486-118-011-680; 003-504-554-245-316; 003-905-226-015-068; 004-706-447-836-905; 005-203-277-885-748; 005-296-771-590-748; 005-630-640-664-939; 005-899-402-239-840; 006-296-899-452-535; 007-120-713-093-456; 007-458-210-702-991; 007-915-233-613-511; 008-733-401-864-23X; 010-057-765-527-665; 010-490-168-139-514; 010-992-143-070-67X; 011-630-546-757-650; 011-850-183-685-719; 012-219-343-221-633; 012-587-637-705-413; 013-360-329-054-671; 013-956-680-903-674; 014-510-444-730-433; 014-836-131-915-39X; 015-440-921-647-313; 015-503-477-862-142; 017-085-756-392-642; 018-203-874-457-567; 018-552-581-098-658; 018-648-349-943-059; 018-912-441-468-836; 019-360-393-097-72X; 019-960-255-195-267; 020-357-351-995-538; 020-509-746-088-705; 021-326-325-055-045; 021-435-335-955-453; 022-429-101-476-586; 023-063-862-957-256; 023-568-228-590-323; 023-767-546-806-478; 024-350-847-240-124; 024-385-303-080-230; 025-212-642-751-095; 025-308-544-437-672; 025-484-846-284-184; 025-487-313-702-455; 025-815-030-235-519; 026-676-242-548-364; 026-947-517-566-556; 027-099-591-941-569; 028-403-698-637-145; 028-457-962-572-453; 028-864-123-938-045; 029-239-733-639-707; 029-489-501-199-089; 029-637-803-083-286; 030-173-318-402-776; 030-674-871-669-121; 031-982-129-275-33X; 032-244-297-444-421; 032-329-531-945-092; 034-380-704-636-551; 034-643-583-457-718; 034-940-557-037-083; 035-565-993-122-262; 035-739-618-778-849; 037-713-961-742-146; 038-473-718-695-630; 038-645-193-387-077; 040-562-863-527-963; 041-100-433-941-603; 041-635-805-946-810; 042-672-276-006-565; 043-127-893-811-79X; 043-382-723-887-378; 043-742-356-311-540; 043-817-597-356-962; 044-021-303-931-726; 045-040-308-009-79X; 045-222-856-841-787; 045-742-323-849-793; 046-314-745-466-915; 047-782-671-230-742; 047-833-989-327-699; 048-104-507-351-773; 048-141-687-795-752; 048-926-061-987-648; 049-136-302-275-079; 050-035-884-812-921; 051-330-401-796-575; 052-301-201-093-481; 052-919-508-917-670; 054-529-421-844-076; 055-811-656-615-740; 055-850-354-942-609; 055-942-104-612-963; 055-996-756-667-066; 059-014-234-603-671; 059-151-526-215-807; 059-259-197-397-244; 059-829-333-909-69X; 060-294-953-084-788; 060-743-410-850-643; 062-185-276-692-750; 062-440-552-219-966; 062-987-450-662-878; 063-229-337-814-634; 063-475-319-066-007; 064-345-083-918-701; 065-322-784-190-818; 065-654-832-541-493; 065-671-045-136-370; 066-034-062-322-233; 066-784-622-207-480; 067-601-110-201-327; 068-254-594-204-681; 069-007-833-693-813; 069-321-740-091-392; 069-754-697-292-909; 070-295-309-596-202; 071-095-478-422-879; 071-218-059-184-033; 071-451-467-450-231; 072-323-530-728-727; 073-099-928-352-670; 073-876-103-481-172; 073-910-371-295-970; 074-933-143-629-826; 075-264-586-699-234; 075-268-039-596-63X; 075-770-629-919-738; 076-610-287-185-407; 077-859-446-810-741; 078-730-781-174-18X; 079-699-370-692-859; 080-037-699-095-630; 080-160-133-326-173; 081-746-298-679-238; 083-656-249-691-365; 085-001-408-364-683; 085-266-631-589-774; 090-230-721-671-962; 090-390-906-646-037; 090-933-338-506-017; 092-043-845-339-506; 092-784-374-989-892; 093-117-308-515-186; 093-148-968-798-507; 094-143-534-138-927; 094-182-197-652-715; 094-800-645-372-553; 095-177-434-765-79X; 095-577-771-481-790; 097-103-869-237-065; 098-520-592-151-771; 099-261-139-480-588; 100-246-306-965-821; 101-083-734-725-35X; 102-182-774-566-752; 103-864-806-347-808; 104-098-703-521-179; 105-940-731-754-568; 106-229-562-693-558; 106-759-637-118-717; 108-328-029-181-42X; 110-958-082-190-809; 112-181-239-331-730; 112-333-992-894-015; 113-529-751-754-389; 114-473-027-477-559; 115-095-105-779-204; 115-795-118-970-339; 117-065-920-586-287; 117-066-639-504-133; 117-614-574-133-806; 119-460-081-257-61X; 119-484-500-569-383; 119-955-810-605-798; 120-338-862-399-078; 121-487-767-415-637; 121-898-094-801-790; 122-134-821-866-125; 123-308-339-215-803; 125-519-560-533-563; 126-403-505-438-119; 128-603-018-655-844; 131-143-098-374-420; 133-120-498-513-750; 134-072-762-404-610; 134-353-085-289-803; 134-842-711-365-699; 137-166-264-059-953; 137-569-254-769-800; 138-851-840-986-301; 139-320-230-645-968; 140-574-046-885-14X; 142-416-286-909-584; 142-657-351-097-509; 144-924-692-716-271; 146-334-817-842-70X; 154-808-033-424-405; 155-706-225-696-164; 158-400-418-434-934; 158-871-132-407-288; 158-956-574-262-541; 159-094-605-033-945; 159-105-758-152-663; 159-516-414-584-397; 159-967-408-705-781; 161-773-313-365-549; 163-009-701-904-62X; 164-959-263-715-575; 169-263-821-393-379; 170-306-506-317-395; 170-876-547-256-175; 172-334-888-811-073; 175-252-436-865-02X; 177-255-583-875-742; 177-706-139-538-803; 180-706-989-021-884; 196-559-417-455-648,3,true,"CC BY, CC BY-NC-ND",gold 031-655-872-268-787,Triaging digital device content at-scene:- Formalising the decision-making process.,2021-12-09,2021,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Graeme Horsman,"The prominence of technology usage in society has inevitably led to increasing numbers of digital devices being seized, where digital evidence often features in criminal investigations. Such demand has led to well documented backlogs placing pressure on digital forensic labs, where in an effort to combat this issue, the 'at-scene triage' of devices has been touted as a solution. Yet such triage approaches are not straightforward to implement with multiple technical and procedural issues existing, including determining when it is actually appropriate to triage the contents of a device at-scene. This work remains focused on this point due to the complexities associated with it, and to support first responders a nine-stage triage decision model is offered which is designed to promote consistent and transparent practice when determining if a device should be triaged.",62,1,86,93,Triage; Digital forensics; Process (computing); Computer science; Point (geometry); Crime scene; Computer security; Data science; Medical emergency; Medicine; Psychology; Geometry; Mathematics; Criminology; Operating system,Crime scene; Digital evidence; Digital forensics; Investigation; Triage,Humans; Triage,,,,http://dx.doi.org/10.1016/j.scijus.2021.12.001,35033331,10.1016/j.scijus.2021.12.001,,,0,000-750-047-594-348; 003-982-227-180-136; 010-985-077-415-59X; 015-340-476-560-675; 016-873-099-383-893; 032-451-540-235-796; 062-137-637-964-947; 066-235-037-082-291; 074-706-219-689-754; 076-508-293-079-677; 079-273-634-331-435; 090-752-043-508-733; 094-142-794-127-63X; 126-591-597-706-715; 131-516-331-360-906; 142-790-196-752-819; 182-719-735-421-509,1,false,, 031-800-007-340-922,A Review on Mobile Device's Digital Forensic Process Models,2014-07-15,2014,journal article,"Research Journal of Applied Sciences, Engineering and Technology",20407459; 20407467,Maxwell Scientific Publication Corp.,United Kingdom,Anahita Farjamfar; Mohd Taufik Abdullah; Ramlan Mahmod; Nur Izura Udzir,"The main purpose of this study is to discuss the different comparative studies on digital forensics process models specially in the field of mobile devices. In order to legally pursue digital criminals, investigation should be conducted in a forensically sound manner so that the acquired evidence would be accepted in the court of law. Digital forensic process models define the important steps that should be followed to assure the investigation is performed successfully. There are a number of digital forensic process models developed by various organizations worldwide, but yet, there is no agreement among forensics investigation and legislative delegation which procedures to adhere to; specially in the case of facing mobile devices with latest technologies. This is vital, as mobile phones and other mobile devices such as PDAs or tablets are becoming ever-present as the main technology platform around the world and people are obtaining and using mobile phones more than ever. In this study we will give a review of the proposed digital forensics process models within last 7 years and to discuss the need for a consensus to follow the same underlying approaches while continually updating digital forensics process models to cover new emerging technologies and devices.",8,3,358,366,Engineering; Mobile device; Emerging technologies; Data science; Digital forensic process; Digital evidence; Computer security; Computer forensics; Process modeling; Digital forensics; Delegation,,,,,https://maxwellsci.com/jp/mspabstract.php?jid=RJASET&doi=rjaset.8.981 http://psasir.upm.edu.my/id/eprint/36269/ https://core.ac.uk/display/153816752 https://core.ac.uk/download/153816752.pdf,http://dx.doi.org/10.19026/rjaset.8.981,,10.19026/rjaset.8.981,2165854381,,0,004-652-388-189-304; 004-872-169-627-620; 006-569-049-717-630; 010-086-703-646-194; 014-299-240-901-551; 017-815-064-018-299; 023-780-269-449-092; 030-359-893-882-572; 035-223-520-491-228; 041-059-041-666-09X; 048-141-687-795-752; 050-618-920-212-97X; 052-120-212-583-360; 066-602-804-060-133; 078-730-781-174-18X; 083-582-672-677-836; 090-390-906-646-037; 093-148-968-798-507; 095-613-498-169-127; 101-436-770-235-826; 133-397-275-695-990; 145-616-913-856-289; 168-476-681-195-292; 170-299-458-679-224,8,true,cc-by,hybrid 031-935-242-453-239,"An ""order of data acquisition"" for digital forensic investigations.",2022-01-07,2022,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Graeme Horsman,"Data acquisition is a fundamental stage of the digital forensic workflow, where without it, it may not be possible to conduct many criminal inquiries effectively. While any investigative team may want access to all digital data available, it is no longer an approach that is considered justifiable or proportionate in all cases. There is now an increasing narrative highlighting the invasiveness of digital data acquisition processes and their impact upon privacy, with calls to ensure greater scrutiny is placed upon their use. This work proposes the ""Order of Data Acquisition"" which defines 10 digital data acquisition methods that are available to practitioners as a part of a forensic examination, derived from a review of existing literature and best practice acquisition approaches, and arranged by their ""invasiveness."" Each method is discussed with examples provided in order to clarify and formalize the process of determining a suitable acquisition method in every case while acknowledging privacy invasion concerns. Finally, conclusions are drawn.",67,3,1215,1220,Workflow; Computer science; Data acquisition; Scrutiny; Process (computing); Digital forensics; Digital evidence; Data science; Digital data; Order (exchange); Computer security; Narrative,acquisition; data extraction; digital forensics; evidence,Forensic Medicine; Workflow,,,,http://dx.doi.org/10.1111/1556-4029.14979,34997585,10.1111/1556-4029.14979,,,0,000-225-165-729-99X; 003-982-227-180-136; 010-061-391-662-193; 010-963-610-208-920; 010-985-077-415-59X; 021-850-998-857-676; 044-161-230-287-523; 074-706-219-689-754; 090-752-043-508-733; 094-142-794-127-63X; 172-425-036-894-271; 183-000-233-873-221,0,false,, 031-973-009-227-195,Empirical Survey on Advances of Network Forensics in the Emerging Networks,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,A R Jayakrishnan; V. Vasanthi,,7,1,38,46,Data science; Empirical survey; Computer science; Network forensics; Wireless,,,,,http://sdiwc.net/digital-library/empirical-survey-on-advances-of-network-forensics-in-the-emerging-networks,http://dx.doi.org/10.17781/p002320,,10.17781/p002320,2790683521,,0,,3,false,, 032-020-765-108-099,Spatial Computing-Entering The Next Dimension Of Computing,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Bhagyashri R Hanji; Abhishek Srinivas Murthy; Abheetha Pradhan,,,,,,Dimension (vector space); Spatial computing; Computer science; Theoretical computer science,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.06,http://dx.doi.org/10.46293/4n6/2021.03.02.06,,10.46293/4n6/2021.03.02.06,3163137671,,0,,0,false,, 032-173-768-139-787,Forensic science steps to applying on computer to process and analyze digital evidence,,2016,journal article,International Journal of Advance Research and Innovative Ideas in Education,23954396,,,Santosh Sitaram Varpe,"Digital investigators collect the crime related information from the crime scene then making document and preserving digital evidence. To perform this task properly digital investigators need a methodology and also need help to find the scientific truth.; For this forensic science is useful, it offer tested methods for processing and analyzing evidence and reaching to final conclusion. This paper provide seven stages of forensic science to process and analyze digital evidence. When applying all this stages of forensic science investigator easily collect and analyze digital evidence.",2,6,286,289,World Wide Web; Forensic science; Crime scene; Computational criminology; Data science; Task (project management); Digital evidence; Scientific truth; Computer science; Process (engineering); Computer forensics,,,,,https://ijariie.com/AdminUploadPdf/Forensic_science_steps_to_applying_on_computer_to_process_and_analyze_digital_evidence_ijariie3311.pdf https://ijariie.com/FormDetails.aspx?MenuScriptId=2201,https://ijariie.com/FormDetails.aspx?MenuScriptId=2201,,,2740244222,,0,,0,false,, 032-373-300-951-303,"The materiality of digital media: The hard disk drive, phonograph, magnetic tape and optical media in technical close-up",2016-07-10,2016,journal article,New Media & Society,14614448; 14617315,SAGE Publications,United States,James Allen-Robertson,"Popular discourses surrounding contemporary digital media often misrepresent it as immaterial and ephemeral, overlooking the material devices that store and generate our media objects. This article materially ‘descends’ into a selection of prior media forms that make up the genealogy of the hard disk drive (HDD) to challenge our reliance on conceptual misrepresentations. This material analysis is used to situate digital media in a genealogy of prior media forms, to enrich our understanding of how media’s affordances arise from the interplay of both formal and forensic materiality and to demonstrate the value of reintegrating materiality back into the study of media.",19,3,455,470,Aesthetics; Optical disc; Materiality (auditing); Sociology; Digital media; Affordance; Magnetic tape; Value (ethics); Phonograph; Close-up; Multimedia,,,,,http://repository.essex.ac.uk/14709/ https://dblp.uni-trier.de/db/journals/nms/nms19.html#Allen-Robertson17 https://journals.sagepub.com/doi/abs/10.1177/1461444815606368 http://journals.sagepub.com/doi/abs/10.1177/1461444815606368?papetoc= https://core.ac.uk/download/74372881.pdf,http://dx.doi.org/10.1177/1461444815606368,,10.1177/1461444815606368,2174980630,,0,007-244-098-039-777; 026-099-393-000-411; 027-374-506-616-934; 030-587-088-332-513; 031-199-244-292-309; 032-771-764-387-214; 042-799-383-027-036; 055-449-744-123-085; 058-938-291-909-654; 074-846-441-929-477; 085-016-326-492-675; 090-138-703-598-915; 096-587-872-356-687; 120-816-758-327-414; 143-211-809-386-813; 154-287-259-389-939; 159-909-068-229-292; 163-159-853-593-959; 165-095-275-834-046; 169-932-587-419-395; 182-602-893-753-681; 194-479-478-401-317,33,true,,green 032-451-540-235-796,A case-based reasoning method for locating evidence during digital forensic device triage,,2014,journal article,Decision Support Systems,01679236,Elsevier BV,Netherlands,Graeme Horsman; Christopher Laing; Paul Vickers,"The role of triage in digital forensics is disputed, with some practitioners questioning its reliability for identifying evidential data. Although successfully implemented in the field of medicine, triage has not established itself to the same degree in digital forensics. This article presents a novel approach to triage for digital forensics. Case-Based Reasoning Forensic Triager (CBR-FT) is a method for collecting and reusing past digital forensic investigation information in order to highlight likely evidential areas on a suspect operating system, thereby helping an investigator to decide where to search for evidence. The CBR-FT framework is discussed and the results of twenty test triage examinations are presented. CBR-FT has been shown to be a more effective method of triage when compared to a practitioner using a leading commercial application.",61,61,69,78,World Wide Web; Forensic science; Case-based reasoning; Data science; Triage; Suspect; Test (assessment); Digital forensic investigation; Field (computer science); Computer science; Reliability (statistics); Digital forensics,,,,,https://research.tees.ac.uk/en/publications/a-case-based-reasoning-method-for-locating-evidence-during-digita https://dblp.uni-trier.de/db/journals/dss/dss61.html#HorsmanLV14 https://core.ac.uk/display/19479046 http://nrl.northumbria.ac.uk/15186/ https://researchportal.northumbria.ac.uk/en/publications/a-case-based-reasoning-method-for-locating-evidence-during-digita http://nrl.northumbria.ac.uk/15186/1/Horsman_et_al_Author_Accepted_Manuscript.pdf https://northumbria-test.eprints-hosting.org/id/document/264093 https://www.sciencedirect.com/science/article/pii/S0167923614000086,http://dx.doi.org/10.1016/j.dss.2014.01.007,,10.1016/j.dss.2014.01.007,1977236908,,2,003-982-227-180-136; 012-106-860-594-330; 015-353-077-946-637; 016-731-888-079-073; 018-618-238-562-758; 024-852-306-378-681; 029-938-776-068-353; 030-121-862-351-330; 032-840-153-267-455; 033-877-222-136-260; 042-423-147-359-818; 044-333-336-895-605; 047-630-600-014-492; 049-513-366-833-181; 049-896-268-388-337; 051-493-073-728-632; 057-254-747-112-851; 065-520-849-771-46X; 070-534-696-667-140; 075-056-106-679-562; 075-128-417-091-483; 089-564-665-174-244; 092-058-232-746-872; 093-007-312-043-778; 093-388-220-098-773; 094-081-969-768-185; 098-371-414-969-945; 109-598-947-309-943; 112-537-006-164-008; 145-062-913-009-934; 150-305-598-712-279; 167-398-164-200-13X; 168-819-441-615-181; 172-263-908-125-850; 191-319-072-202-754,30,true,cc-by-nc-nd,green 032-568-430-960-830,AI in digital forensics: Ontology engineering for cybercrime investigations,,2020,journal article,WIREs Forensic Science,25739468,Wiley,,Leslie F. Sikos,,3,3,,,Knowledge representation and reasoning; Automated reasoning; Data science; Ontology engineering; Cybercrime; Computer science; Digital forensics,,,,,https://onlinelibrary.wiley.com/doi/10.1002/wfs2.1394 https://wires.onlinelibrary.wiley.com/doi/epdf/10.1002/wfs2.1394 https://ro.ecu.edu.au/ecuworkspost2013/9822/,http://dx.doi.org/10.1002/wfs2.1394,,10.1002/wfs2.1394,3082637665,,0,001-507-239-208-313; 003-837-665-844-106; 005-116-312-278-527; 006-608-623-688-096; 006-639-948-169-026; 011-710-946-605-728; 011-795-937-681-185; 013-420-429-952-358; 015-087-812-098-242; 015-713-947-663-822; 019-886-690-125-068; 021-435-335-955-453; 028-743-893-820-114; 029-025-221-262-260; 035-031-257-128-045; 037-945-942-545-801; 040-918-493-878-882; 047-859-979-695-194; 047-937-309-229-62X; 054-601-093-496-749; 055-199-127-020-655; 056-451-337-159-266; 061-549-181-856-861; 065-671-045-136-370; 065-873-523-989-876; 067-342-140-206-619; 072-934-978-048-044; 073-194-524-558-213; 073-209-422-678-483; 074-210-245-746-776; 080-226-855-967-158; 085-666-602-084-614; 088-553-642-323-93X; 095-437-078-101-003; 096-679-960-335-93X; 113-713-027-851-049; 118-617-006-863-229; 143-959-640-326-451; 146-053-391-746-348; 155-063-496-030-974; 163-330-758-807-944; 163-877-074-795-849; 172-515-980-452-352,6,false,, 033-006-319-734-503,IMPLEMENTASI AKUNTANSI FORENSIK DAN AUDIT INVESTIGASI DALAM MENDETEKSI FRAUD DI LINGKUNGAN DIGITAL,2020-08-20,2020,journal article,Jurnal Co Management,26865874; 26554941,Institut Manajemen Koperasi Indonesia,,Nahruddien Akbar. M,"The purpose of this study to find out how forensic accounting and investigative audits applied in detecting fraud in the environment Digita. The research method with qualitative methods, the primary type of data used, the results of interviews with internal auditors and investigation to strengthen research, conducted interviews with 3 internal auditors and investigations. Data analysis technique used is qualitative data analysis techniques with descriptive approach.The results of this study indicate that the forensic accounting in detecting fraud in the digital environment can be made by Computer Forensic and investigation should be done is to make Copies of all log data, create Fingerprint of the data mathematically, making Fingerprint of Copies, making Hashes Masterlist and documentation of data has worked. Reasons forensic accounting and investigative audits applied to secure and analyze digital evidence. Another reason is to eradicate fraud in the digital environment",2,1,165,174,Audit; Documentation; Fingerprint (computing); Computer science; Digital forensics; Digital evidence; Accounting; Internet privacy; Computer security,,,,,,http://dx.doi.org/10.32670/comanagement.v2i1.164,,10.32670/comanagement.v2i1.164,,,0,,0,true,,hybrid 033-096-629-217-984,Fingerprinting JPEGs With Optimised Huffman Tables,,2018,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Sean McKeown; Gordon Russell; Petra Leimich,"A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given medium, and comparing individual digests with a database of known contraband. However, the large capacities of modern storage media and time pressures placed on forensics examiners necessitates the development of more efficient processing methods. This work describes a technique for fingerprinting JPEGs with optimised Huffman tables which requires only the image header to be present on the media. Such fingerprints are shown to be robust across large datasets, with demonstrably faster processing times",13,2,7,,Computer graphics (images); Computer science; Huffman coding; Digital forensics; Image processing,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1451&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl13.html#McKeown0L18 https://commons.erau.edu/jdfsl/vol13/iss2/7/ https://core.ac.uk/download/161865936.pdf,http://dx.doi.org/10.15394/jdfsl.2018.1451,,10.15394/jdfsl.2018.1451,2896262405,,0,016-684-133-351-113; 029-518-640-859-761; 127-601-219-775-046; 163-330-758-807-944,3,true,cc-by-nc,gold 033-161-651-925-256,Review on effectiveness of deep learning approach in digital forensics,2022-10-01,2022,journal article,International Journal of Electrical and Computer Engineering (IJECE),27222578; 20888708,Institute of Advanced Engineering and Science,Indonesia,Sonali Ekhande; Uttam Patil; Kshama Vishwanath Kulhalli,"<p><span>Cyber forensics is use of scientific methods for definite description of cybercrime activities. It deals with collecting, processing and interpreting digital evidence for cybercrime analysis. Cyber forensic analysis plays very important role in criminal investigations. Although lot of research has been done in cyber forensics, it is still expected to face new challenges in near future. Analysis of digital media specifically photographic images, audio and video recordings are very crucial in forensics This paper specifically focus on digital forensics. There are several methods for digital forensic analysis. Currently deep learning (DL), mainly convolutional neural network (CNN) has proved very promising in classification of digital images and sound analysis techniques. This paper presents a compendious study of recent research and methods in forensic areas based on CNN, with a view to guide the researchers working in this area. We first, defined and explained preliminary models of DL. In the next section, out of several DL models we have focused on CNN and its usage in areas of digital forensic. Finally, conclusion and future work are discussed. The review shows that CNN has proved good in most of the forensic domains and still promise to be better.</span></p>",12,5,5481,5481,Digital forensics; Computer science; Convolutional neural network; Cybercrime; Crime analysis; Deep learning; Network forensics; Data science; Computer forensics; Face (sociological concept); Artificial intelligence; Computer security; World Wide Web; The Internet; Criminology; Sociology; Social science,,,,,,http://dx.doi.org/10.11591/ijece.v12i5.pp5481-5592,,10.11591/ijece.v12i5.pp5481-5592,,,0,,0,true,,hybrid 033-194-605-427-505,A Robust GAN-Generated Face Detection Method Based on Dual-Color Spaces and an Improved Xception,,2022,journal article,IEEE Transactions on Circuits and Systems for Video Technology,10518215; 15582205,Institute of Electrical and Electronics Engineers (IEEE),United States,Beijing Chen; Xin Liu; Yuhui Zheng; Guoying Zhao; Yun-Qing Shi,,32,6,3527,3538,,,,,National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; Natural Science Foundation of Jiangsu Province; Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund,,http://dx.doi.org/10.1109/tcsvt.2021.3116679,,10.1109/tcsvt.2021.3116679,,,0,002-132-311-087-455; 006-779-782-656-573; 008-618-885-266-485; 012-906-553-254-972; 014-388-356-015-011; 020-183-786-910-970; 020-233-013-143-936; 022-365-815-444-375; 022-660-231-334-537; 027-952-199-154-195; 028-027-110-739-321; 029-610-517-151-794; 036-734-955-027-636; 036-833-936-567-876; 042-240-098-526-453; 051-718-396-534-597; 080-051-745-826-897; 086-342-670-610-968; 101-228-352-393-489; 109-299-872-389-685; 122-867-087-141-039; 123-498-859-171-509; 124-083-912-568-655; 125-924-765-016-083; 142-752-312-269-81X; 147-821-443-160-361; 151-934-660-750-160; 155-757-858-257-954; 158-804-209-744-953; 160-022-775-061-618; 166-593-301-710-660; 180-559-374-049-445; 188-340-140-468-094; 195-575-595-506-376,14,false,, 033-394-274-571-989,Digital Forensic Readiness in Organizations: Issues and Challenges,,2017,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Nickson M. Karie; Simon M Karume,,12,4,43,54,Engineering; Engineering ethics; Digital forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1436&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#KarieK17 https://commons.erau.edu/jdfsl/vol12/iss4/5/,http://dx.doi.org/10.15394/jdfsl.2017.1436,,10.15394/jdfsl.2017.1436,2795676710,,0,007-394-596-774-68X; 010-791-676-072-730; 058-723-704-218-926; 081-140-064-081-587; 097-675-162-158-578; 102-692-471-615-799; 103-028-372-925-311; 110-754-935-358-497,7,true,cc-by-nc,gold 033-449-704-006-134,An Enhanced Approach for Digital Forensics using Innovative GSP Algorithm,2014-10-18,2014,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Priyanka V. Kayarkar; Prashant Ricchariaya,"The advent of world-wide web not only changes our life view but also gives rise to advanced forms of digital crimes. Today’s era is the digital age, over the internet most of the facts are transferred through the digital devices. Cyber criminals always use Digital devices to conduct digital crime. The applicability of various forensics techniques in digital forensics helps the forensics investigators to adopt practical frameworks and methods to recover data for analysis which can comprise as evidence. In the field of Digital Forensics Data Mining has huge prospective. Computer forensics is a rising discipline investigating the computer crime. The goal of data mining technique is to find the valuable relationships between data items. This paper proposes a data mining approach for digital forensics investigations which is very important in today’s information age. Frequent Sequence Mining in data mining is one of the most important concepts used in Digital forensics Science. This thesis is an imperative work for Digital forensics investigations with maximum accuracy by using GSP algorithm.",103,6,18,22,The Internet; World Wide Web; Forensic science; Field (computer science); Computer science; Computer forensics; Digital forensics; GSP Algorithm,,,,,https://research.ijcaonline.org/volume103/number6/pxc3898308.pdf https://ui.adsabs.harvard.edu/abs/2014IJCA..103f..18K/abstract https://www.ijcaonline.org/archives/volume103/number6/18078-8308,http://dx.doi.org/10.5120/18078-8308,,10.5120/18078-8308,2131940555,,0,032-810-109-985-524; 080-816-595-560-369; 178-100-501-663-130; 181-095-475-426-346,1,true,,green 033-545-629-141-925,Illumination Inconsistency Sleuthing for Exposing Fauxtography and Uncovering Composition Telltales in Digital Images,2015-12-19,2015,journal article,ELCVIA Electronic Letters on Computer Vision and Image Analysis,15775097,Universitat Autonoma de Barcelona,Spain,Tiago Carvalho,"Think about how capture device’s technology is improved day after day. Add to this condition that digital image manipulation tools are increasingly powerful and simple to use. Finally, when a malicious user is added at this equation, the result is an astonishing number of digital images forgeries spread out in the internet as fast as possible. This work present four different methods to fight against image splicing, an special kind of image forgery. Each one of the methods, present significant contributions to state of the art.",14,3,4,5,The Internet; Pattern recognition (psychology); Artificial intelligence; Image forgery; Image splicing; Computer vision; Composition (language); Computer science; Digital image; State (computer science); Digital forensics,,,,,http://www.bibliotecadigital.unicamp.br/document/?code=000932513 http://elcvia.cvc.uab.es/article/view/v14-n3-caravalho https://dialnet.unirioja.es/servlet/articulo?codigo=5302829 https://ddd.uab.cat/pub/elcvia/elcvia_a2015v14n3/elcvia_a2015v14n3p4.pdf https://core.ac.uk/display/39021688 https://ddd.uab.cat/record/144998 https://elcvia.cvc.uab.es/article/view/707 https://elcvia.cvc.uab.es/article/download/v14-n3-caravalho/pdf_33 https://core.ac.uk/download/pdf/39021688.pdf,http://dx.doi.org/10.5565/rev/elcvia.707,,10.5565/rev/elcvia.707,2245665439,,0,009-566-662-446-07X; 037-304-752-152-900; 043-807-308-237-192; 046-421-962-177-11X; 089-926-942-277-272; 093-203-275-610-419; 110-356-583-096-716,3,true,cc-by-nc-nd,gold 033-624-790-871-700,Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics,2018-06-20,2018,journal article,Jurnal Teknik Elektro,25491571; 14110059,Universitas Negeri Semarang,," Riadi; Sunardi Sunardi; Muhamad Ermansyah Rauli","R apid development of computer technology is also accompanied with increasing of cybercrime. One of the most common crimes is fraud case in the online shop. This crime  abuses Whatapps, one of the most popular Instant Messenger (IM) applications.  WhatsApp is one of the IM applications that can be used on computers, especially on windows 8.1 operating system. All applications running on the computer leave data and information on Random Access Memory (RAM). The data and information that exist in RAM can be obtained using digital forensic technique called Live Forensics. Live forensics can be used when the computer is running and connected to the  network. This research aims to find digital evidence related to online shop fraud case. The digital evidence can be obtained using one of the forensic tools FTK Imager. FTK Imager can retrieve and analyze data and information on RAM. The results obtained in this research is the content of WhatsApp conversations that can be used as digital evidence to reveal a fraud in the online shop.",10,1,18,22,Cybercrime; Digital evidence; Live forensics; Computer technology; Instant messenger; Random access memory; Computer science; Multimedia; Digital forensics,,,,,https://journal.unnes.ac.id/nju/index.php/jte/article/view/14070/7872 https://journal.unnes.ac.id/nju/index.php/jte/article/download/14070/7872,http://dx.doi.org/10.15294/jte.v10i1.14070,,10.15294/jte.v10i1.14070,2904082727,,0,,3,true,cc-by,gold 033-656-031-457-388,ON THE USE OF DIGITAL PHOTOGRAPHY DURING THE INCIDENT SITE INSPECTION IN MODERN CONDITIONS,2020-04-01,2020,journal article,Bulletin of the Institute of Law of the Bashkir State University,26190915,Bashkir State University,,Евгений Афанасьев; Александр Арутюнов,"At present, the detection and the investigation of the vast majority of crimes, including serious and very serious crimes, is impossible without the involvement in site inspections the specialists with knowledge of science, technology, arts and crafts and the experts with forensic skills, in particular photography. The purpose of the article is to study the use of digital photography and research techniques during the incident site inspection when working with different objects: traces, materials and substances. Extensive use of digital photography during the incident site inspection has been demonstrated, and recommendations to improve the technical equipment of the forensic units, continuous upgrade training and professional skills of those who in work with forensic digital photography equipment have been made.",3,4,102,114,Engineering; Digital photography; Incident site; Remote sensing,,,,,http://vestlaw-bsu.bashedu.ru/index.php/journal/article/download/76/65,http://dx.doi.org/10.33184/vest-law-bsu-2020.8.16,,10.33184/vest-law-bsu-2020.8.16,3126555266,,0,,0,true,,gold 033-729-014-380-088,A Digital Forensic Approach for Examination and Analysis of Frozen Hard Disk of Virtual Machine,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,M. George Christopher; Kumarshankar Raychaudhuri,,8,4,262,272,Virtual machine; Computer science; Multimedia; Wireless; Digital forensics,,,,,http://sdiwc.net/digital-library/a-digital-forensic-approach-for-examination-and-analysis-of-frozen-hard-disk-of-virtual-machine,http://dx.doi.org/10.17781/p002625,,10.17781/p002625,3038168896,,0,,0,false,, 033-740-867-472-387,Approaches of network forensic model for investigation,,2017,journal article,International Journal of Forensic Engineering,17449944; 17449952,Inderscience Publishers,,Gulshan Shrivastava,"Universally, the security and forensic workforce keeps up tab through newest technology of attack tools and modus operandi adopted by attackers. There is a plethora of free tools available, but they aid in enforcing the security mechanisms and analysing the attack traffic only to a certain measure. With every passing day, size of internet manifolds and so does the kind and nature of attacks. Thus, it has become difficult to analyse crime that is related with computer, as it is multiplying as fast as the web of internet itself. Digital forensic investigation is the systematic restitution of evidences/proofs collected as an outcome of exploration of concrete happenings based on digital data. After evaluating all the historical approaches used in the existing models, their pros and cons are elicited and an Encapsulated Approach of Forensic (EAF) model (proposed earlier) is extended, which engulfs all the phases of digital investigation in detail. It gives an orderly, organised and scrupulous step-by-step procedure, from identification of facts and evidences to presentation of results by the investigator in front of investigating organisation.",3,3,195,,Mathematical proof; The Internet; Engineering; Presentation; Digital data; Computer security; Network forensics; Computer forensics; Identification (information); Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJFE.2017.082977,http://dx.doi.org/10.1504/ijfe.2017.082977,,10.1504/ijfe.2017.082977,2595256955,,0,,21,false,, 033-782-124-307-044,"Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts",,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Doowon Jeong; Sangjin Lee,,29,,21,27,Copying; Drawback; Device tracking; Storage type; Computer science; USB; Firmware; Digital forensics; Computer hardware,,,,,https://koreauniv.pure.elsevier.com/en/publications/forensic-signature-for-tracking-storage-devices-analysis-of-uefi- https://www.sciencedirect.com/science/article/pii/S1742287618303293,http://dx.doi.org/10.1016/j.diin.2019.02.004,,10.1016/j.diin.2019.02.004,2919464213,,0,002-710-519-237-792; 061-139-633-577-862; 064-062-472-395-879; 160-010-780-231-257,5,false,, 034-296-835-734-643,Fourteenth Annual DFRWS Conference,,2014,journal article,Digital Investigation,17422876; 1873202x,Elsevier BV,Netherlands,,,11,,S1,S2,Computer science,,,,,https://core.ac.uk/download/pdf/82091462.pdf,http://dx.doi.org/10.1016/j.diin.2014.06.005,,10.1016/j.diin.2014.06.005,,,0,,1,true,cc-by-nc-nd,hybrid 034-572-333-745-447,Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application,2016-04-30,2016,journal article,KIPS Transactions on Computer and Communication Systems,22875891,Korea Information Processing Society,,Min Wook Lee; Jong Seong Yoon; Sang Jin Lee,"Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides ""Evidence"" to represent various forensic artifacts in the incident investigation. Furthermore, It provides ""Forensic Analysis"" to report forensic analysis result and also gives ""Indicator"" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.",5,4,95,102,Data mining; Engineering; Variety (cybernetics); Data processing; Data analysis; Data science; Artifact (software development); TRACE (psycholinguistics); Identification (information); Digital forensics; XML,,,,,http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBCRIN_2016_v5n4_95 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002104450 http://ktccs.kips.or.kr/journals/ktccs/digital-library/4827,http://dx.doi.org/10.3745/ktccs.2016.5.4.95,,10.3745/ktccs.2016.5.4.95,2398903994,,0,011-051-740-313-213; 021-039-461-635-181; 065-671-045-136-370; 083-440-224-273-957,0,true,,gold 034-651-507-138-790,Review Paper on Introduction to Cyber Forensics,2021-08-31,2021,journal article,International Journal for Research in Applied Science and Engineering Technology,23219653,International Journal for Research in Applied Science and Engineering Technology (IJRASET),,Priya R. Yadav,"Abstract: Cyber Forensics is termed as scientific methods or applications in association with the judiciary or court of laws. The aim behind these methods is to unveil the digital evidence to be utilized in court for solving crime cases. This sort of technology wasn’t practiced before therefore most criminals tend to urge away with their criminal acts without valid proof to incriminate or prosecute them. During that time the oaths, confessions, testimonies from witnesses were the sole determining factors of evidence Crimes committed within electronic or digital domains, particularly within cyberspace, have become common. Criminals are using technology to commit their offenses and make new challenges for law enforcement agents, attorneys, judges, military, and security professionals. Digital forensics has become a vital instrument in identifying and solving computer-based and computerassisted crime. This paper provides a quick introduction to cyber forensics. During this paper we present a typical model for both Incident Response and Computer Forensics processes which mixes their advantages in an exceedingly flexible way: It allows for a management oriented approach in digital investigations while retaining the chance of a rigorous forensics investigation. Keywords: cyber forensics, digital forensic science, computer forensics, evidence, judicial system.",9,8,1939,1942,Engineering; Computer security,,,,,http://dx.doi.org/10.22214/ijraset.2021.37684,http://dx.doi.org/10.22214/ijraset.2021.37684,,10.22214/ijraset.2021.37684,3195949822,,0,,0,true,,gold 034-738-249-460-761,The application of digital forensic investigation for response of cyber-crimes,2015-04-28,2015,journal article,Journal of Digital Convergence,17381916,The Korea Society of Digital Policy and Management,,Sei-Youen Oh,,13,4,81,87,Criminal investigation; Digital forensic investigation; Computer security; Computer science; Computer forensics,,,,,http://www.koreascience.or.kr:80/article/JAKO201514039404333.pdf https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001984469 http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=DJTJBT_2015_v13n4_81,http://dx.doi.org/10.14400/jdc.2015.13.4.81,,10.14400/jdc.2015.13.4.81,2281316034,,0,051-284-659-484-435; 098-010-827-662-569; 193-737-400-253-775,7,false,, 035-031-257-128-045,Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language,,2017,journal article,Digital investigation,1873202x; 17422876,Elsevier Limited,Netherlands,Eoghan Casey; Sean Barnum; Ryan Griffith; Jonathan Snyder; Harm van Beek; Alexander J. Nelson,"Any investigation can have a digital dimension, often involving information from multiple data sources, organizations and jurisdictions. Existing approaches to representing and exchanging cyber-investigation information are inadequate, particularly when combining data sources from numerous organizations or dealing with large amounts of data from various tools. To conduct investigations effectively, there is a pressing need to harmonize how this information is represented and exchanged. This paper addresses this need for information exchange and tool interoperability with an open community-developed specification language called Cyber-investigation Analysis Standard Expression (CASE). To further promote a common structure, CASE aligns with and extends the Unified Cyber Ontology (UCO) construct, which provides a format for representing information in all cyber domains. This ontology abstracts objects and concepts that are not CASE-specific, so that they can be used across other cyber disciplines that may extend UCO. This work is a rational evolution of the Digital Forensic Analysis eXpression (DFAX) for representing digital forensic information and provenance. CASE is more flexible than DFAX and can be utilized in any context, including criminal, corporate and intelligence. CASE also builds on the Hansken data model developed and implemented by the Netherlands Forensic Institute (NFI). CASE enables the fusion of information from different organizations, data sources, and forensic tools to foster more comprehensive and cohesive analysis. This paper includes illustrative examples of how CASE can be implemented and used to capture information in a structured form to advance sharing, interoperability and analysis in cyber-investigations. In addition to capturing technical details and relationships between objects, CASE provides structure for representing and sharing details about how cyber-information was handled, transferred, processed, analyzed, and interpreted. CASE also supports data marking for sharing information at different levels of trust and classification, and for protecting sensitive and private information. Furthermore, CASE supports the sharing of knowledge related to cyber-investigations, including distinctive patterns of activity/behavior that are common across cases. This paper features a proof-of-concept Application Program Interface (API) to facilitate implementation of CASE in tools. Community members are encouraged to participate in the development and implementation of CASE and UCO.",22,,14,45,World Wide Web; Ontology (information science); Information exchange; Interoperability; Specification language; Information sharing; Computer science; Digital forensics; Data model; Application programming interface,CybOX; Cyber-investigation; DFAX; DFXML; Digital evidence exchange; Digital forensics; Evidence provenance; Information sharing; Specification language; Standard representation; Unified cyber ontology,,,Intramural NIST DOC (9999-NIST) United States,https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6774392/ https://pubmed.ncbi.nlm.nih.gov/31579279/ https://dl.acm.org/doi/10.1016/j.diin.2017.08.002 https://www.nist.gov/publications/advancing-coordinated-cyber-investigations-and-tool-interoperability-using-community https://europepmc.org/article/MED/31579279 https://www.sciencedirect.com/science/article/pii/S1742287617301007 https://csrc.nist.gov/publications/detail/journal-article/2017/advancing-coordinated-cyber-investigations https://doi.org/10.1016/j.diin.2017.08.002 https://dblp.uni-trier.de/db/journals/di/di22.html#CaseyBGSBN17 http://www.sciencedirect.com/science/article/pii/S1742287617301007 https://core.ac.uk/download/226978171.pdf,http://dx.doi.org/10.1016/j.diin.2017.08.002,31579279,10.1016/j.diin.2017.08.002,2746119360,PMC6774392,0,001-170-920-458-777; 006-008-915-210-060; 010-985-077-415-59X; 011-051-740-313-213; 024-735-069-822-749; 033-241-817-699-448; 039-663-245-950-286; 039-835-013-427-363; 041-262-876-489-486; 056-715-378-869-201; 060-650-561-577-338; 061-549-181-856-861; 065-671-045-136-370; 073-194-524-558-213; 104-758-205-558-797; 105-102-860-204-164; 109-657-364-699-131; 117-239-595-156-183; 125-939-677-745-616; 135-807-482-654-421; 153-474-160-113-956; 154-517-106-328-503; 155-063-496-030-974; 167-740-265-127-825,33,true,,green 035-078-138-939-96X,Digital forensic investigation methodology for Storage Space: Based on the NIST digital forensic process.,2022-01-28,2022,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Junho Kim; Sangjin Lee; Doowon Jeong,"For forensic examiners, investigating the RAID systems of servers has been challenging, as the examiners must reconstruct multiple high-capacity disks to identify digital evidence. Software-based RAID systems' use has been released for personal use, so examiners should consider RAID systems even when they investigate personal computers. Although there is a high probability that the software-based RAID will become a target of crime, there has been little research into digital forensic methodology for software-based RAID, as exemplified by Storage Space. In this paper, we introduce details about the structure of Storage Space found through reverse engineering. Storage Space was analyzed by applying the digital forensic process of NIST. We explain how to reconstruct a virtual disk configured using Storage Space and develop an automated tool to do so. To evaluate our study and the tool developed, we created an experimental scenario and describe in detail the forensic procedure and technical methods for the analysis of Storage Space. Our research can be used as the basis of forensic investigations for Storage Space.",67,3,989,1001,RAID; Digital forensics; Computer science; Process (computing); NIST; Software; Space (punctuation); Digital evidence,RAID forensics; RAID reconstruction; Storage Space; digital forensics; software-based RAID; windows forensics,Crime; Forensic Medicine; Software,,Dongguk University (2020); This work was supported by the Dongkuk University Research Fund of 2020; This work was supported by the Dongguk University Research Fund of 2020,,http://dx.doi.org/10.1111/1556-4029.14992,35092033,10.1111/1556-4029.14992,,,0,009-435-455-091-122; 009-833-376-779-037; 031-275-479-939-025; 042-984-932-165-592; 062-810-316-068-33X; 063-101-076-395-60X; 113-223-895-127-382; 123-678-549-104-43X; 135-834-233-194-309; 143-736-035-550-123; 156-990-496-742-22X; 163-330-758-807-944,0,false,, 035-126-027-906-691,Who is the digital forensic expert and what is their expertise?,2022-01-26,2022,journal article,WIREs Forensic Science,25739468,Wiley,,Graeme Horsman; Brett Shavers,"Given the importance of digital evidence to many inquiries, the services of practitioners in the digital forensic field are often sought. In some cases, a “digital forensic expert witness” may be required to conduct specific investigatory work and provide opinion evidence. Here we explore the concept of a digital forensic expert witness while also considering whether this term may now be potentially misleading to those outside of this domain. A discussion of the challenges that exist when trying to establish and assess the validity of expertise in this field is offered. Suggestions for ways to both evidence and correctly identify relevant expertise are made, taking into account the viewpoints of both the potential expert and client. This article is categorized under: Digital and Multimedia Science > Multimedia Forensics",4,5,,,Digital forensics; Expert witness; Viewpoints; Computer forensics; Witness; Digital evidence; Forensic psychology; Computer science; Field (mathematics); Forensic science; Data science; Subject-matter expert; Domain (mathematical analysis); Expert opinion; Engineering ethics; Internet privacy; Psychology; Computer security; Expert system; Engineering; Political science; Artificial intelligence; Medicine; Law; Criminology; Art; Mathematics; Mathematical analysis; Intensive care medicine; Visual arts; Programming language; Veterinary medicine; Pure mathematics,,,,,,http://dx.doi.org/10.1002/wfs2.1453,,10.1002/wfs2.1453,,,0,006-933-430-647-14X; 034-729-447-864-463; 083-380-435-354-691; 102-243-142-344-71X; 134-927-490-231-285,0,true,,hybrid 035-274-013-659-639,Use of atomic force microscopy in the forensic application of chronological order of toners and stamping inks in questioned documents,2016-02-01,2016,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Tae-Yi Kang; Joong Lee; Byung-Wook Park,,261,261,26,32,Atomic force microscopy; Inkwell; Stamping; Engineering drawing; Order (business); Computer science,Chinese seal; Counterfeit; Genuine; Sequence discrimination; Toner printing,,,,https://www.infona.pl/resource/bwmeta1.element.elsevier-0ca132fe-7216-3612-ae68-d86378c6da01 https://pure.mpg.de/pubman/faces/ViewItemOverviewPage.jsp?itemId=item_2401538 https://www.ncbi.nlm.nih.gov/pubmed/26874052 https://core.ac.uk/display/84018700 https://pubmed.ncbi.nlm.nih.gov/26874052/ http://www.sciencedirect.com/science/article/pii/S037907381630007X http://europepmc.org/abstract/MED/26874052 https://www.sciencedirect.com/science/article/abs/pii/S037907381630007X,http://dx.doi.org/10.1016/j.forsciint.2016.01.033,26874052,10.1016/j.forsciint.2016.01.033,2263777247,,0,000-398-902-467-690; 010-755-783-739-336; 026-800-186-421-929; 033-337-325-493-618; 034-397-285-350-380; 035-938-065-572-286; 040-361-274-450-012; 040-672-205-323-843; 044-055-458-886-822; 051-516-153-496-922; 057-864-668-542-923; 059-561-197-114-651; 064-615-407-200-219; 070-323-856-910-091; 073-869-616-549-691; 096-430-903-143-217; 106-762-617-304-077; 136-814-944-348-042; 158-366-966-925-009; 158-834-138-871-572,6,false,, 035-299-026-735-777,Placing the suspect at a PC: A preliminary study involving fingerprints on keyboards and mice.,2020-07-11,2020,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Traian Fulea-Magarit; Helen Page; Graeme Horsman,"Abstract Digital devices now play an important role in the lives of many in society. Whilst they are used predominantly for legitimate purposes, instances of digital crime are witnessed, where determining their usage is important to any criminal investigation. Typically, when determining who has used a digital device, digital forensic analysis is utilised, however, biological trace evidence or fingerprints residing on its surfaces may also be of value. This work provides a preliminary study which examines the potential for fingerprint recovery from computer peripherals, namely keyboards and mice. Our implementation methodology is outlined, and results discussed which indicate that print recovery is possible. Findings are intended to support those operating at-scene in an evidence collection capacity.",61,1,89,96,Human–computer interaction; Criminal investigation; Crime scene; Trace evidence; Fingerprint (computing); Suspect; Digital device; Evidence collection; Computer science; Digital forensics,Crime scene; Digital forensics; Evidence; Fingerprints,Computer Peripherals; Crime; Forensic Medicine/methods; Humans,,,https://www.ncbi.nlm.nih.gov/pubmed/33357831 https://www.sciencedirect.com/science/article/abs/pii/S1355030620300290,http://dx.doi.org/10.1016/j.scijus.2020.07.003,33357831,10.1016/j.scijus.2020.07.003,3041697087,,0,016-352-495-743-48X; 019-831-293-743-518; 026-810-683-474-561; 044-781-123-854-77X; 058-829-172-935-902; 075-136-991-324-974; 080-161-175-307-872; 134-243-771-692-742; 192-869-837-381-364,0,false,, 035-403-667-600-781,Digital Forensics of Internet of Things Smart Heating System Investigation,2020-06-26,2020,journal article,Journal of Military Technology,26016613,Militar Tehnical Academy Bucharest,,Marius Preda,"The Internet of Things (IoT) integrates the Internet and electronic devices with applicability to a large spectrum of domains, from smart home automation, industrial processes, military applications, to health and environmental monitoring. Despite the clear advantages, from a forensically sound perspective, IoT can improve the accuracy and integrity of forensic investigations, but still requires extensive scientific validation in practice. In this paper, we review selected stateof-the-art challenges corresponding to digital forensics of IoT environments, and we present an empirical method on how to investigate a security incident reported for an IoT specific case - Smart Heating system.",3,1,23,28,Heating system; Computer security; Computer science; Internet of Things; Digital forensics,,,,,http://dx.doi.org/10.32754/jmt.2020.1.04,http://dx.doi.org/10.32754/jmt.2020.1.04,,10.32754/jmt.2020.1.04,3095672612,,0,,0,true,,bronze 035-410-610-655-824,"Next Generation Digital Forensic Investigation Model (NGDFIM) - Enhanced, Time Reducing and Comprehensive Framework",2021-02-01,2021,journal article,Journal of Physics: Conference Series,17426588; 17426596,IOP Publishing,United Kingdom,Akash A Thakar; Kapil Kumar; Baldev Patel,"Abstract; Rapid technological advancement can have a substantial impact on the process of digital forensic investigation and presents numerous challenges to the investigator. With these challenges, it is imperative to have a standard framework for the digital forensic investigation to be implemented within most incidents. This induces a great stride to formulate a nonspecific framework that may be applied to most digital investigation procedures. The Next Generation Digital Forensic Investigation Model (NGDFIM) formalizes the framework to facilitates the practitioners in the investigation process. This framework could potentially generate more evidence during the incidence response through on-site triage as compared to conventional investigations process. Moreover, the framework diminishes the analysis time and provides the suspect with privacy protection by incorporating custom content imaging.",1767,1,012054,,Systems engineering; Digital forensic investigation; Computer science,,,,,https://robots.iopscience.iop.org/article/10.1088/1742-6596/1767/1/012054/pdf https://ui.adsabs.harvard.edu/abs/2021JPhCS1767a2054T/abstract https://robots.iopscience.iop.org/article/10.1088/1742-6596/1767/1/012054,http://dx.doi.org/10.1088/1742-6596/1767/1/012054,,10.1088/1742-6596/1767/1/012054,3129236820,,0,004-872-169-627-620; 009-885-874-541-907; 010-086-703-646-194; 011-333-076-933-89X; 019-698-064-288-240; 020-944-423-224-895; 026-774-296-742-022; 032-697-093-668-898; 034-008-964-356-002; 035-129-008-760-918; 038-668-970-194-854; 045-645-917-018-028; 045-790-323-038-567; 046-395-342-063-537; 047-630-600-014-492; 055-628-715-083-217; 065-452-675-566-99X; 067-726-260-424-525; 073-997-683-020-831; 078-014-878-589-245; 098-748-261-333-651; 111-090-978-711-139; 124-746-748-951-736; 132-355-634-397-986; 133-397-275-695-990; 183-155-928-447-559; 184-948-841-629-735; 190-065-821-748-92X; 199-745-676-923-766,3,true,cc-by,gold 035-706-160-923-256,Sixteenth Annual DFRWS Conference,,2016,journal article,Digital Investigation,17422876; 1873202x,Elsevier BV,Netherlands,,,18,,S1,S2,Computer science,,,,,https://core.ac.uk/download/pdf/82658261.pdf,http://dx.doi.org/10.1016/j.diin.2016.06.002,,10.1016/j.diin.2016.06.002,,,0,,0,true,cc-by-nc-nd,hybrid 035-724-816-551-336,"Digital Forensics:, Crimes And Challenges In Online Social Networks Forensics",,2020,journal article,مجلة الجامعة العربية الأمريكية للبحوث,,Arab American University,,بندر فقيها,,,,15,,Computer security; Computer science; Digital forensics,,,,,http://dx.doi.org/10.35517/1309-006-001-009,http://dx.doi.org/10.35517/1309-006-001-009,,10.35517/1309-006-001-009,3110809386,,0,,0,false,, 035-890-043-115-551,An Assessment of Corporate Security Policy Violations Using Live Forensics Analysis,,2015,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Ezer Osei Yeboah-Boateng,,4,1,262,271,,,,,,,http://dx.doi.org/10.17781/p001385,,10.17781/p001385,,,0,,1,false,, 036-261-108-424-166,Maturation of digital forensics,,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Eoghan Casey,,29,,1,A2,Computer science; Multimedia; Digital forensics,,,,,https://api.elsevier.com/content/article/PII:S1742287619302087?httpAccept=text/xml https://doi.org/10.1016/j.diin.2019.05.002 http://dblp.uni-trier.de/db/journals/di/di29.html#Casey19a,http://dx.doi.org/10.1016/j.diin.2019.05.002,,10.1016/j.diin.2019.05.002,2946934272,,0,,2,false,, 036-418-827-030-131,Video Forensic Framework for VideoForgeries,2015-07-25,2015,journal article,International Journal of Innovative Research in Computer and Communication Engineering,23209798,,,Ashish Kumar Kushwaha; Avinash P. Wadhe,"With rapidly growing technology, Video became most important weapon in the fight to against people who break the law by capturing them red handed. Evidence captured on video is considered to be more reliable, more accurate and more convincing than eyewitness testimony alone. But due to growth in multimedia editing software Digital Photographs and videos can be no longer considered ?proof of evidence?. Evidence can be easily tempered using software. So we propose a new forensic framework, Forensic framework for Video Forgeries capable of video Steganalysis and detection of tampering in digital video without any specialized hardware. Framework can be used for the forensic of videos using enhanced forensic techniques and also used to detect any hidden data in the video. The objective of the framework is to provide the easy and handy Video Forensic Framework to forensic community for validation of evidence before presenting it to court for law enforcement",3,4,3828,3834,Steganalysis; Forensic science; Software; Eyewitness testimony; Law enforcement; Digital video; Computer security; Computer science,,,,,https://www.rroij.com/open-access/video-forensic-framework-for-videoforgeries.php?aid=56697 https://www.omicsonline.org/peer-reviewed/video-forensic-framework-for-videoforgeries-56697.html https://www.rroij.com/open-access/video-forensic-framework-for-videoforgeries.pdf,https://www.rroij.com/open-access/video-forensic-framework-for-videoforgeries.php?aid=56697,,,2340926372,,0,015-368-930-081-514; 020-020-971-414-251; 026-163-602-249-656; 039-084-712-781-308; 051-035-217-903-949; 051-097-946-429-275; 062-435-089-906-548; 063-532-297-436-449; 074-796-013-951-077; 086-310-239-101-211; 140-408-113-219-371; 142-474-806-225-780,0,false,, 036-504-399-650-860,Perancangan Nenggala Disk Duplicator (Ndd) untuk Mendukung Proses Investigasi Forensik Digital,2018-03-01,2018,journal article,Teknoin,08538697; 26556529,Universitas Islam Indonesia (Islamic University of Indonesia),,Fietyata Yudha,"The development of information technology simplify human life. Its evoke crime loopholes, cyber crime. When solving criminal cases that utilize information technology is required the digital forensic science. In carrying out a digital investigation known multiple frameworks around the worlds. Every devices, every organization has their own framework. The most common framework divided into 4 sections. Preservation, Acquisition, Analysis, and Reporting are the most common used around the worlds. Acquisition is a key part of the investigation process because in this process digital evidence is collected form the electronic evidence. The acquisition processes uses special equipment. Forensic acquisition equipment mostly made by forensic vendors in the world. The problems that arise in the academic realm is the price of the equipment is quite expensive. The existence of the above problem there is a gap to conduct research on the applied field of development of tools for forensic acquisition. This study provides an early overview of the design of a digital forensics acquisition tool called Nenggala Disk Duplicator.",24,1,29,40,Information technology; Key (cryptography); Data science; Digital evidence; Common framework; Human life; Field (computer science); Computer science; Process (engineering); Digital forensics,,,,,https://www.neliti.com/publications/276235/perancangan-nenggala-disk-duplicator-ndd-untuk-mendukung-proses-investigasi-fore https://jurnal.uii.ac.id/jurnal-teknoin/article/view/11214 http://jurnal.uii.ac.id/jurnal-teknoin/article/view/11214 https://journal.uii.ac.id/jurnal-teknoin/article/view/11214 https://journal.uii.ac.id/jurnal-teknoin/article/download/11214/8554,http://dx.doi.org/10.20885/teknoin.vol24.iss1.art4,,10.20885/teknoin.vol24.iss1.art4,2914404623,,0,,0,true,cc-by-sa,gold 036-522-909-357-939,Digital evidence,,2012,journal article,"Zbornik radova Pravnog fakulteta, Novi Sad",05502179,Centre for Evaluation in Education and Science (CEON/CEES),,Lukic Tatjana,"Although computer makes human activities faster and easier, innovating and creating new forms of work and other kinds of activities, it also influenced the criminal activity. The development of information technology directly affects the development of computer forensics without which, it can not even imagine the discovering and proving the computer offences and apprehending the perpetrator. Information technology and computer forensic allows us to detect and prove the crimes committed by computer and capture the perpetrators. Computer forensics is a type of forensics which can be defined as a process of collecting, preserving, analyzing and presenting digital evidence in court proceedings. Bearing in mind, that combat against crime, in which computers appear as an asset or object of the offense, requires knowledge of digital evidence as well as specific rules and procedures, the author in this article specifically addresses the issues of digital evidence, forensic (computer) investigation, specific rules and procedures for detecting, fixing and collecting digital evidence and use of this type of evidence in criminal proceedings. The author also delas with international standards regarding digital evidence and cyber-space investigation.",46,2,177,192,Digital evidence; Computer forensics; Digital forensics; Computer science; Asset (computer security); Object (grammar); Computer security; Process (computing); Internet privacy; Data science; Artificial intelligence; Operating system,,,,,,http://dx.doi.org/10.5937/zrpfns46-1971,,10.5937/zrpfns46-1971,,,0,,0,true,cc-by,gold 036-549-696-564-159,Mobile Device's Digital Forensic Process Model,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Bismark Boateng,"The primary goal is to compare various digital forensics process models, particularly mobile devices. One must conduct investigations forensically to prosecute digital offenders, with the resulting evidence acknowledged in a court of law. Digital forensic process models outline the necessary procedures that one must follow to ensure a successful enquiry. Keywords: Mobile Devices, Digital Devices, Digital Evidence and Smartphone BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free",1,1,267,272,Digital forensics; Digital evidence; Computer forensics; Computer science; Process (computing); Mobile device; Computer security; Nexus (standard); Network forensics; Internet privacy; World Wide Web; Operating system,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p43,,10.22624/aims/crp-bk3-p43,,,0,,0,true,,bronze 036-650-222-027-323,多媒体取证,2013-12-01,2013,journal article,SCIENTIA SINICA Informationis,16747267,"Science China Press., Co. Ltd.",,Rui YANG; JiWu HUANG; WeiQi LUO,"Multimedia forensics is an important research area of information security, as well as a key technology of digital evidence authentication. Nowadays multimedia materials can be doctored very easily by pervasive editing software. A series of issues will arise if those fake multimedia materials are published, such as copyright of digital media, protection of personal privacy, social security, and so on. Thus examining the authenticity and integrity of digital media is of great signi cance. In the paper the characteristics and principles of multimedia forensics technology are introduced. Four important research topics of multimedia forensics, media source identi cation, tampering detection, processing history analysis, anti-forensics, are reviewed and summarized with related fundamental science and technology research progress. Finally the potential future trends of multimedia forensics are discussed.",43,12,1654,1672,Computer science,,,,,,http://dx.doi.org/10.1360/n112013-00059,,10.1360/n112013-00059,,,0,,2,false,, 036-807-324-358-708,Current Capacities of Digital Forensics for Investigations of Different Types of Crimes,2020-10-23,2020,journal article,Theory and Practice of Forensic Science,25877275; 18192785,Russian Federal Centre of Forensic Science of the Ministry of Justice (RFCFS),,D. V. Zav’yalova,"The article focuses on the present state of digital forensics and its potential when investigating different types of crimes with a “digital” element. It also presents a brief historical overview of the development of digital forensics as an independent type of forensic examination, its theoretical framework. The paper presents a summary of the practice of the Laboratory of Digital Forensics of the Russian Federal Centre of Forensic Science of the Russian Ministry of Justice over 2017–2019. In the course of the summary, the author analyses typical questions to experts, the percentage of cases’ categories, the most common objects of the expertise, and experts’ opinions, their form, and completeness. Following the summary’s results, the most frequent investigators’ requests for this kind of examination have been highlighted. Also, typical errors at appointing the expertise have been revealed. The author presents a prognosis for the further development of digital forensics and proposes strategies and measures to minimize the errors at the appointment of the examinations and unsustainable expenditure of resources in appointment and conduct of this type of research.",15,3,89,97,Element (criminal law); Data science; Justice (ethics); Forensic examination; Computer science; State (computer science); Christian ministry; Malware; Digital forensics,,,,,https://doaj.org/article/0894a5f713f64c10b965a5de5fda4f26 https://www.tipse.ru/jour/article/view/606/531 https://www.tipse.ru/jour/article/download/606/531,http://dx.doi.org/10.30764/1819-2785-2020-3-89-97,,10.30764/1819-2785-2020-3-89-97,3093903985,,0,001-334-079-265-518; 009-110-842-345-158; 014-743-487-965-635; 046-960-602-008-454; 068-211-549-219-606; 133-027-258-289-298,0,true,cc-by,gold 037-171-889-387-368,Integration of Cloud in Mobile Forensics,2022-07-24,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Michael Acquah Stuff,"With emerging technology and the connection of electronic devices to the internet, Internet of Things (IoT) has become part of human life. From the development of smartphones to smartwatches and smart-homes, electronic devices now have the capability of performing human activities or aiding humans in performing activities such as turning hall lights on or off with their voice. Although a large number of people use these devices for the greater good, a few individuals or group of people hide behind these devices to perform malicious activities. In order to apprehend and prosecute perpetuators who hide behind smart devices for evil gains, forensic examinations or investigations must be conducted. This review aims to identify digital forensic challenges in IoT. The inclusion criteria for this paper were international journals, articles, conference papers and case studies published from 2019 to 2022. Thematic analysis was used to analyze and synthesis the literature. Three themes emerged from the analysis; automated compromised smart-home tracer; data volatility and reconstruction; IoT forensic investigation framework. This integrative review combines evidence of digital forensic challenges in diverse IoT devices. Keyword IoT forensics, IoT challenges, Digital forensics, Smart-home forensics.",1,1,125,130,Digital forensics; Digital evidence; Smartwatch; Internet of Things; Computer science; Cloud computing; Computer security; Mobile device; Internet privacy; Thematic analysis; Data science; World Wide Web,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p21,,10.22624/aims/crp-bk3-p21,,,0,,0,true,,bronze 037-201-519-764-108,Analyzing Multiple Video Streams Files Using Belkasoft X,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Elena Mishkareva,,,,,,Computer science; STREAMS; Database,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.11,http://dx.doi.org/10.46293/4n6/2021.03.02.11,,10.46293/4n6/2021.03.02.11,3162629873,,0,,0,false,, 037-231-006-037-033,A New Timestamp Digital Forensic Method Using a Modified Superincreasing Sequence,2016-07-01,2016,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Gyu-Sang Cho,"This paper proposes a new digital forensic method using a modified superincreasing sequence. Timestamp changes by file commands in Windows NTFS file system are used for identifying what commands were executed and are a useful and a logical way for performing digital forensics. A superincreasing sequence is modified for the timestamp change patterns to make each timestamp pattern have a distinct value. The method has two functions; one is a timestamp change check function and the other is a forensic evaluation function. The former checks differences of timestamps between before and after command execution, and the latter produces a characteristic output by applying ten kinds of timestamp change patterns. According to the characteristic output, the kind of command that is executed is identified. By virtue of adopting the modified superincreasing sequence, the evaluation function could produce distinct characteristic output values and thereby provides a way to reconstruct executed file commands.",8,3,11,33,Timestamp; Data mining; Evaluation function; Value (computer science); File system; Timestamp-based concurrency control; Sequence; Computer science; Function (mathematics); Real-time computing; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf8.html#Cho16 https://doi.org/10.4018/IJDCF.2016070102 https://www.igi-global.com/article/a-new-timestamp-digital-forensic-method-using-a-modified-superincreasing-sequence/158899,http://dx.doi.org/10.4018/ijdcf.2016070102,,10.4018/ijdcf.2016070102,2474025075,,0,000-046-263-029-459; 014-595-195-942-667; 018-182-926-340-45X; 025-113-780-729-992; 032-875-845-675-054; 043-382-723-887-378; 046-505-599-865-150; 053-376-195-646-045; 064-170-716-528-26X; 067-267-586-705-300; 079-331-405-716-414; 083-490-612-361-225; 085-214-277-668-01X; 095-409-130-263-862; 100-032-278-433-356; 154-517-106-328-503; 158-659-937-607-609; 163-538-063-799-354,1,false,, 037-231-682-829-255,Dealing with Apple's USB Restricted Mode,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yuri Gubanov,,,,,,Electrical engineering; Computer science; Mode (computer interface); USB,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.11,http://dx.doi.org/10.46293/4n6/2020.02.04.11,,10.46293/4n6/2020.02.04.11,3097369185,,0,,0,false,, 037-516-922-562-182,Color Channel Characteristics (CCC) for Efficient Digital Image Forensics,2018-02-20,2018,journal article,"Engineering, Technology & Applied Science Research",17928036; 22414487,"Engineering, Technology & Applied Science Research",,Surbhi Gupta; Neeraj Mohan,"Digital image forgery has become extremely easy as low-cost image processing programs are readily available. Digital image forensics is a science of classifying images as authentic or manipulated. This paper aims at implementing a novel digital image forensics technique by exploiting an image’s Color Channel Characteristics (CCC). The CCCs considered are the noise and edge characteristics of the image. Averaging, median, Gaussian and Wiener filters along with Sobel, Canny, Prewitt and Laplacian of Gaussian (LoG) edge detectors are applied to get the noise and texture features. A complete, no reference, blind classifier for image tamper detection has been proposed and implemented. The proposed CCC classifier can detect copy-move as well as image splicing accurately with lower dimensionality. Support Vector Machine is used for classification of images as authentic or tampered. Experimental results have shown that the proposed technique outperforms the existing ones and may serve as a complete tool for digital image forensics.",8,1,2555,2561,Support vector machine; Artificial intelligence; Prewitt operator; Gaussian; Blob detection; Sobel operator; Computer vision; Computer science; Digital image; Image processing; Classifier (UML),,,,,https://etasr.com/index.php/ETASR/article/view/1744,http://dx.doi.org/10.48084/etasr.1744,,10.48084/etasr.1744,2788221212,,0,000-423-144-911-52X; 006-715-003-756-565; 011-883-359-022-523; 015-571-444-508-782; 016-708-834-120-733; 023-928-444-110-407; 029-093-526-590-26X; 035-544-937-782-415; 036-341-049-220-437; 047-322-910-540-450; 054-939-531-777-996; 057-534-459-875-826; 067-192-574-918-890; 074-324-981-337-749; 079-374-229-497-864; 085-735-767-631-723; 096-289-706-423-826; 106-862-007-495-628; 134-100-301-427-583; 134-701-584-331-832; 146-790-564-025-806; 155-074-178-700-550; 171-483-137-477-150; 173-881-114-277-726,1,true,cc-by,gold 037-847-762-163-743,A Game Theoretic Approach for Digital Forensic Tool Selection,2020-05-12,2020,journal article,Mathematics,22277390,MDPI AG,,Umit Karabiyik; Tugba Karabiyik,"Digital forensic investigations are getting harder and more time consuming everyday because of various problems including rapid advances in technology, wide variety of available devices in investigations, and large amount of data to be analyzed. In order to tackle with these issues, digital forensic tools are developed by open-source communities and software companies. These software products are released as a complete toolkit or standalone tools targeting specific tasks. In either case, digital forensic investigators use these tools based on their familiarity because of previous training experiences, available funding from their agencies/businesses, tool’s ease of use, etc. Moreover, using additional tools to verify the findings is a common practice in digital forensic investigations. This is particularly common when the previously selected tools do not generate an expected output. In this paper, we propose a game theoretic approach to the tool selection problem in order to help investigators to make a decision on which digital forensic tool to use. We particularly focused on file carving tool usage when building and analyzing our model because of the available data on these tools. Our results show how important it is to investigate the dynamics of strategy changes between the tools during an investigation to increase the efficiency of the investigation using game theoretic modeling.",8,5,774,,Selection (linguistics); Decision-making; Variety (cybernetics); Usability; Game theory; Data science; File carving; Software; Computer science; Digital forensics,,,,,https://www.mdpi.com/2227-7390/8/5/774/pdf https://www.mdpi.com/2227-7390/8/5/774,http://dx.doi.org/10.3390/math8050774,,10.3390/math8050774,3024339044,,0,004-652-388-189-304; 005-750-770-307-709; 007-427-320-193-516; 017-361-333-950-313; 022-558-714-642-656; 027-197-549-505-279; 045-294-718-031-754; 048-173-502-051-519; 050-513-243-638-138; 062-681-003-961-233; 068-504-789-917-859; 074-011-629-972-789; 085-816-961-933-906; 087-850-942-616-19X; 088-886-561-757-360; 097-671-054-695-239; 097-756-989-729-994; 099-550-969-605-475; 154-257-316-907-505; 197-198-322-121-026,2,true,cc-by,gold 038-052-594-652-085,EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Asanka Sayakkara; Nhien-An Le-Khac; Mark Scanlon,,32,,300907,,Digital evidence; Computer science; Side channel attack; Internet of Things; Computer hardware,,,,,https://forensicsandsecurity.com/papers/EMvidence.php https://doi.org/10.1016/j.fsidi.2020.300907 https://markscanlon.co/papers/EMvidence.pdf https://markscanlon.co/papers/EMvidence.php https://www.sciencedirect.com/science/article/pii/S2666281720300020,http://dx.doi.org/10.1016/j.fsidi.2020.300907,,10.1016/j.fsidi.2020.300907,2993846147,,0,018-772-801-528-344; 079-726-245-728-809; 081-833-857-658-915,1,true,cc-by-nc-nd,hybrid 039-305-224-842-577,Mitigation of the potential fraud in the era of business digitalization in the covid 19 pandemic: exploration of accountant's role and challenges,2022-06-25,2022,journal article,Fair Value: Jurnal Ilmiah Akuntansi dan Keuangan,26222205; 26222191,Institut Manajemen Koperasi Indonesia,,Yulida Army Nurcahya,"This study aims to see the role of accountants in mitigating the potential for fraud that occurs in the digital business era during the Covid-19 pandemic through the implementation of forensic accounting. This research will use a qualitative approach by using various previous studies and studies as the data source. This study found that business accountants have an essential role in the Covid-19 pandemic. Business accountants can have a crucial role in the digital information industry in controlling internal problems so that the results are efficient and effective, thereby reducing the risk of fraud. Forensic accounting can help detect the potential for fraud to mitigate the consequences of fraud in this digital era. If corruption has occurred, then what the Forensic Accountant must do is detect corruption. Forensic Accountants can detect fraud and corruption problems more quickly because Forensic Accountants already know and master the techniques in detecting fraud and corruption.",4,11,5117,5123,Forensic accounting; Language change; Business; Coronavirus disease 2019 (COVID-19); Pandemic; Accounting; Digital forensics; Digital era; Constructive fraud; Public relations,,,,,,http://dx.doi.org/10.32670/fairvalue.v4i11.1801,,10.32670/fairvalue.v4i11.1801,,,0,,0,false,, 039-365-534-871-351,Privacy impact assessment in large-scale digital forensic investigations,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,M. Bas Seyyar; Zeno Geradts,"The large increase in the collection of location, communication, health data etc. from seized digital devices like mobile phones, tablets, IoT devices, laptops etc. often poses serious privacy risks. To measure privacy risks, privacy impact assessments (PIA) are substantially useful tools and the Directive EU 2016/80 (Police Directive) requires their use. While much has been said about PIA methods pursuant to the Regulation EU 2016/679 (GDPR), less has been said about PIA methods pursuant to the Police Directive. Yet, little research has been done to explore and measure privacy risks that are specific to law enforcement activities which necessitate the processing of large amounts of data. This study tries to fill this gap by conducting a PIA on a big data forensic platform as a case study. This study also answers the question how a PIA should be carried out for large-scale digital forensic operations and describes the privacy risks, threats we learned from conducting it. Finally, it articulates concrete privacy measures to demonstrate compliance with the Police Directive.",33,,200906,,Internet privacy; Impact assessment; Privacy Impact Assessment; Directive; Law enforcement; Health data; Computer science; Scale (social sciences); Big data; Digital forensics,,,,SciencE through Networked Technologies; Information policy And Law; European Union’s Horizon 2020,https://www.sciencedirect.com/science/article/pii/S2666281720300263 https://www.narcis.nl/publication/RecordID/oai%3Apure.rug.nl%3Apublications%2Fbe024331-9605-46fc-a10c-522ee11f3067 https://www.rug.nl/research/portal/files/130268174/1_s2.0_S2666281720300263_main.pdf https://dblp.uni-trier.de/db/journals/di/di33.html#SeyyarG20 https://pure.rug.nl/ws/files/130268174/1_s2.0_S2666281720300263_main.pdf https://research.rug.nl/en/publications/privacy-impact-assessment-in-large-scale-digital-forensic-investi,http://dx.doi.org/10.1016/j.fsidi.2020.200906,,10.1016/j.fsidi.2020.200906,3012052223,,0,000-360-120-513-679; 003-926-917-446-708; 008-943-419-353-61X; 009-614-227-692-181; 009-701-742-236-493; 022-373-285-369-522; 024-735-069-822-749; 027-573-285-446-936; 054-552-160-523-56X; 055-467-156-924-256; 056-715-378-869-201; 058-833-089-231-930; 062-145-164-741-072; 070-578-038-391-503; 074-201-764-341-020; 078-917-090-304-758; 086-818-889-472-61X; 101-438-268-449-991; 125-939-677-745-616; 164-209-017-189-167,3,true,cc-by,hybrid 039-607-217-533-77X,Improving Image Interpretation in Digital Forensics,2022-07-20,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Gasokpo Adjorlolo Jonathan,"Visual media has grown in importance as a means of communication in the digital space in recent years. The dependability of digital visual information has recently been called into question due to the ease of duplication in both content and origin. Digital image forensics is a new field of study that seeks to validate the authenticity of images by recovering information about their past. Identifying the imaging devices that captured the digital image and detecting forgery are two of the issues addressed. With the publication of study results and an increasing number of applications, digital image interpretation in digital forensics has emerged as an intriguing area for future research. Keywords: Images, Forensic, Capturing, Visual Information, Interpretation. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Jonathan Gasokpo Adjorlolo (2022). Improving Image Interpretation in Digital Forensics . SMART-IEEE-Creative Research Publications Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 23-28. www.isteams.net/ITlawbookchapter2022. dx.doi.org/",1,1,23,28,Computer forensics; Digital forensics; Computer science; Interpretation (philosophy); Nexus (standard); Digital evidence; Field (mathematics); Authentication (law); Computer security; Digital image; Dependability; Digital media; Information security; Data science; Multimedia; World Wide Web; Image (mathematics); Artificial intelligence; Image processing; Mathematics; Software engineering; Pure mathematics; Embedded system; Programming language,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p4,,10.22624/aims/crp-bk3-p4,,,0,,0,true,,bronze 039-886-656-324-835,Cyber-Crime and Digital Forensic: Challenges Resolution,2021-01-19,2021,journal article,Solid State Technology,0038111x,,,Arpita Singh; S. K. Singh; Sandeep Kumar Nayak; Nilu Singh,"Cybercrime is an emerging kind of crime, which has to be faced and fight for mankind. When you go through news or any crime case authentic data source, you will easily analyze that number of crime cases with the help of technology, are getting climb drastically. To overcome this problem a new way of science originated known as digital/computer forensic. Here author is trying to hold forth about cybercrime and crime rate of different states of India. Furthermore, author will discuss some prevention measure to avoid risk of cybercrime. There are some law enforcement agencies like cybercrime cells fabricated by the government, to fight with this canker of society. Digital forensic needs new forensic tools in the war of crime because of enhanced technology and increase database; Keywords- Cyber-crime, Digital forensic, Forensic tools, Computer  forensic.",64,2,166,176,Internet privacy; Resolution (logic); Government; Political science; Cybercrime; Law enforcement; Data source; Cyber crime; Crime rate; Digital forensics,,,,,http://solidstatetechnology.us/index.php/JSST/article/view/8653,http://solidstatetechnology.us/index.php/JSST/article/view/8653,,,3123157148,,0,,0,false,, 039-999-270-718-277,Digital forensic approaches for Amazon Alexa ecosystem,,2017,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Hyunji Chung; Jungheum Park; Sangjin Lee,"Internet of Things (IoT) devices such as the Amazon Echo a smart speaker developed by Amazon are undoubtedly great sources of potential digital evidence due to their ubiquitous use and their always-on mode of operation, constituting a human-life's black box. The Amazon Echo in particular plays a centric role for the cloud-based intelligent virtual assistant (IVA) Alexa developed by Amazon Lab126. The Alexa-enabled wireless smart speaker is the gateway for all voice commands submitted to Alexa. Moreover, the IVA interacts with a plethora of compatible IoT devices and third-party applications that leverage cloud resources. Understanding the complex cloud ecosystem that allows ubiquitous use of Alexa is paramount on supporting digital investigations when need raises. This paper discusses methods for digital forensics pertaining to the IVA Alexa's ecosystem. The primary contribution of this paper consists of a new efficient approach of combining cloud-native forensics with client-side forensics (forensics for companion devices), to support practical digital investigations. Based on a deep understanding of the targeted ecosystem, we propose a proof-of-concept tool, CIFT, that supports identification, acquisition and analysis of both native artifacts from the cloud and client-centric artifacts from local devices (mobile applications and web browsers).",22,,S15,S25,World Wide Web; Voice command device; Gateway (telecommunications); Echo (communications protocol); Black box (phreaking); Digital evidence; Computer science; Identification (information); Cloud computing; Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287617301974 https://www.mendeley.com/catalogue/f24b68e0-402b-3038-b66d-9abf092ffa6c/ https://dl.acm.org/doi/10.1016/j.diin.2017.06.010 https://www.sciencedirect.com/science/article/pii/S1742287617301974 https://doi.org/10.1016/j.diin.2017.06.010 https://koreauniv.pure.elsevier.com/en/publications/digital-forensic-approaches-for-amazon-alexa-ecosystem http://ui.adsabs.harvard.edu/abs/2017arXiv170708696C/abstract https://dblp.uni-trier.de/db/journals/corr/corr1707.html#ChungPL17 https://arxiv.org/abs/1707.08696 http://arxiv.org/abs/1707.08696,http://dx.doi.org/10.1016/j.diin.2017.06.010,,10.1016/j.diin.2017.06.010,2963606273,,0,002-768-711-065-857; 010-196-658-878-056; 018-552-581-098-658; 023-338-081-058-709; 024-894-908-869-686; 025-723-055-730-999; 045-701-748-075-614; 058-631-300-195-90X; 060-294-953-084-788; 112-181-239-331-730; 124-817-675-749-689; 170-546-031-309-748,110,true,cc-by-nc-nd,hybrid 040-012-113-608-784,Survey of Forensic and Analysis Tools based on Grouping of Digital Evidence using Metadata Functionality,2016-05-17,2016,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Anubhav Kumar Vaid; Yogendra P. S. Maravi; Jitendra Singh Verma,"Computer forensics can be defined as obtaining computer storage media so that data can be used as evidence in court. Traditionally the analysis of sources of digital evidences is done by examining the artefacts and metadata of artefacts for authenticating the gathered information and sequencing them in the manner they occurred. Analyzing the information acquired by forensic investigator in traditional way is a cumbersome task but it can be overcome if all the related artefacts are grouped together on the basis of metadata information they prevails. This paper is mainly focused on metadata based association of digital evidences which can simplify the task of forensic investigator and can also help in reducing human intervention making the process automatic. The main objective of this paper is to study working principal and compare different existing forensic tools on the basis of various parameters such as capability for accessing digital evidence, sources they can examine, metadata parsing capability, and analyzing them that whether they can provide grouping of different artefacts present in same or different investigating sources on the basis of metadata they contain.",142,3,28,34,Principal (computer security); Information retrieval; Task (project management); Digital evidence; Computer science; Process (engineering); Computer forensics; Association (object-oriented programming); Metadata,,,,,https://www.ijcaonline.org/archives/volume142/number3/24878-2016909718 https://www.ijcaonline.org/archives/volume142/number3/vaid-2016-ijca-909718.pdf,http://dx.doi.org/10.5120/ijca2016909718,,10.5120/ijca2016909718,2487110025,,0,004-441-167-148-170; 009-692-861-529-254; 017-840-378-634-021; 020-944-423-224-895; 024-735-069-822-749; 032-192-641-675-455; 035-223-520-491-228; 038-668-970-194-854; 040-092-459-357-823; 042-450-851-467-680; 048-267-025-540-842; 058-409-370-512-563; 085-214-277-668-01X; 089-879-578-482-069; 133-752-203-150-119; 142-729-737-144-734; 142-884-607-464-932; 150-249-549-372-358; 156-571-272-274-491; 157-954-859-648-506; 162-864-397-044-696; 178-883-713-153-793; 184-948-841-629-735; 199-172-967-270-034,0,true,,bronze 040-130-649-501-691,Digital forensic investigation of two-way radio communication equipment and services,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Arie Kouwen; Mark Scanlon; Kim-Kwang Raymond Choo; Nhien-An Le-Khac,"Abstract Historically, radio-equipment has solely been used as a two-way analogue communication device. Today, the use of radio communication equipment is increasing by numerous organisations and businesses. The functionality of these traditionally short-range devices have expanded to include private call, address book, call-logs, text messages, lone worker, telemetry, data communication, and GPS. Many of these devices also integrate with smartphones, which delivers Push-To-Talk services that make it possible to setup connections between users using a two-way radio and a smartphone. In fact, these devices can be used to connect users only using smartphones. To date, there is little research on the digital traces in modern radio communication equipment. In fact, increasing the knowledge base about these radio communication devices and services can be valuable to law enforcement in a police investigation. In this paper, we investigate what kind of radio communication equipment and services law enforcement digital investigators can encounter at a crime scene or in an investigation. Subsequent to seizure of this radio communication equipment we explore the traces, which may have a forensic interest and how these traces can be acquired. Finally, we test our approach on sample radio communication equipment and services.",26,1,S77,S86,Crime scene; Two-way radio; Law enforcement; Push-to-talk; Computer science; Knowledge base; Digital radio; Global Positioning System; Telecommunications; Digital forensics; Test (assessment); Communication device; Digital forensic investigation; Sample (statistics),,,,,https://dblp.uni-trier.de/db/journals/corr/corr1807.html#abs-1807-08264 https://www.sciencedirect.com/science/article/pii/S174228761830183X https://markscanlon.co/papers/TwoWayRadioForensics.php https://forensicsandsecurity.com/papers/RadioTraces.pdf https://arxiv.org/abs/1807.08264 https://www.mendeley.com/catalogue/digital-forensic-investigation-twoway-radio-communication-equipment-services/ https://markscanlon.co/papers/TwoWayRadioForensics.pdf https://www.sciencedirect.com/science/article/abs/pii/S174228761830183X https://forensicsandsecurity.com/papers/TwoWayRadioForensics.pdf https://doi.org/10.1016/j.diin.2018.04.007 http://arxiv.org/abs/1807.08264,http://dx.doi.org/10.1016/j.diin.2018.04.007,,10.1016/j.diin.2018.04.007,2794063294; 3099974917,,0,004-572-267-519-012; 023-576-397-399-52X; 030-664-611-605-384; 046-390-751-530-199; 053-391-844-157-635; 062-549-928-238-225; 066-235-037-082-291; 118-214-115-485-064; 121-602-288-519-835; 125-109-822-457-694; 137-755-137-054-864; 139-472-153-252-310; 165-078-942-971-622,9,true,cc-by-nc-nd,hybrid 040-245-551-920-273,Internet of things devices: digital forensic process and data reduction,,2020,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Reza Montasari; Richard Hill; Farshad Montaseri; Hamid Jahankhani; Amin Hosseinian-Far,"The rapid increase in the pervasiveness of digital devices, combined with their heterogeneous nature, has culminated in increasing volumes of diverse data, a.k.a. big data that can become subject to criminal or civil investigations. This growth in big digital forensic data (DFD) has forced digital forensic practitioners (DFPs) to consider seizing a wider range of devices and acquiring larger volumes of data that can be pertinent to the case being investigated. This, in turn, has created an immense backlog of cases for law enforcement agencies worldwide. The method of data reduction by targeted imaging, combined with a robust process model, however, can assist with speeding up the processes of data acquisition and data analysis in IoT device forensic investigations. To this end, we propose an IoT forensic investigation process model, IoT-FIPM, that can facilitate not only the reduction of the evidentiary IoT data, but also a timely acquisition and analysis of this data.",12,1,424,436,Data reduction; Data acquisition; Data science; Digital forensic process; Law enforcement; Computer science; Process (engineering); Computer forensics; Big data; Digital forensics,,,,,https://doi.org/10.1504/IJESDF.2020.110676 https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf12.html#MontasariHMJF20 https://pure.northampton.ac.uk/en/publications/internet-of-things-devices-digital-forensic-process-and-data-redu https://pure.hud.ac.uk/en/publications/internet-of-things-devices-digital-forensic-process-and-data-redu https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2020.110676 https://cronfa.swan.ac.uk/Record/cronfa54936,http://dx.doi.org/10.1504/ijesdf.2020.10030308,,10.1504/ijesdf.2020.10030308,2996857392,,0,007-314-571-885-858; 010-196-658-878-056; 023-858-572-607-02X; 031-189-815-553-631; 034-008-964-356-002; 034-190-709-015-829; 040-567-901-099-238; 041-869-362-153-337; 042-767-661-429-064; 054-502-354-794-645; 054-888-023-799-702; 067-840-274-503-047; 077-963-490-848-763; 083-091-368-558-414; 100-871-329-399-547; 112-181-239-331-730; 124-912-663-881-389; 125-682-509-275-554; 133-456-103-290-986; 163-330-758-807-944,1,true,,green 040-294-130-451-422,Anti-Piracy for movies using Forensic Watermarking,2013-02-15,2013,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,M. Adimoolam; A. John; M. Gunashanthi,"In the past decade internet worked perfectly with distribution of the digital data for pictures, music and videos. Although digital data have many advantages over analogue data, the rightful ownership of the digital data source is at of risk. The copyright protection for digital media becomes an important issue of piracy. Watermarking is a very important field for copyrights of various electronic documents and multimedia. This paper presents a digital forensic watermarking method for authorization against copying or piracy of digital video. The core idea is to use biometric generated keys in the embedding process of watermark. The host video is first randomized by Heisenberg decomposition and Discrete Fourier Transform (DFT). The invisible watermark is embedded in the I-frame of the host video. The watermarks are embedded in the least significant bit (LSB) of the each block. The forensic watermark provides “The Chain of Custody” throughout the life cycle of the video distribution. The experimental result of test sequence demonstrates that the proposed work gives high security and robustness. General Terms Algorithms, Security, Watermarking.",63,4,26,32,Digital watermarking; Watermark; Digital media; Host (network); Copying; Digital video; Computer security; Computer science; Operations research; Least significant bit; Digital forensics,,,,,https://research.ijcaonline.org/volume63/number4/pxc3885161.pdf https://www.ijcaonline.org/archives/volume63/number4/10454-5161 https://ui.adsabs.harvard.edu/abs/2013IJCA...63d..26A/abstract,http://dx.doi.org/10.5120/10454-5161,,10.5120/10454-5161,2170278967,,0,000-229-352-382-803; 005-108-578-382-583; 012-642-196-605-159; 015-330-130-917-703; 022-242-704-707-267; 023-822-847-605-337; 024-055-968-960-951; 032-905-558-553-235; 083-148-486-695-350; 116-806-996-631-258; 136-339-073-338-569; 139-136-209-629-410; 140-125-182-501-856; 140-168-556-798-157; 155-849-822-441-870; 160-386-364-225-97X; 196-847-585-765-22X,1,false,, 040-364-376-631-053,Detecting Hidden Encrypted Volume Files via Statistical Analysis,,2014,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Mario Piccinelli; Paolo Gubian,"Nowadays various software tools have been developed for the purpose of creating encrypted volume files. Many of those tools are open source and freely available on the internet. Because of that, the probability of finding encrypted files which could contain forensically useful information has dramatically increased. While decoding these files without the key is still a major challenge, the simple fact of being able to recognize their existence is now a top priority for every digital forensics investigation. In this paper we will present a statistical approach to find elements of a seized filesystem which have a reasonable chance of containing encrypted data.",3,1,30,37,The Internet; Encryption; Information system; Key (cryptography); Information retrieval; Software; Computer science; Volume (compression); Decoding methods; Digital forensics,,,,,https://sdiwc.net/digital-library/detecting-hidden-encrypted-volume-files-via-statistical-analysis.html https://oaji.net/articles/2014/541-1394066042.pdf,http://dx.doi.org/10.17781/p001103,,10.17781/p001103,1976174636,,0,002-144-887-718-545; 011-463-891-328-034; 039-883-981-271-892; 058-559-419-151-003; 113-919-028-258-558; 123-009-178-413-605; 135-416-097-750-128; 180-945-252-016-720,3,false,, 040-401-854-612-632,Industry 5.0: Modern Era Of Crime And Its Control,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yugal Pathak; Himani Rawat,,,,,,Political economy; Business; Control (linguistics),,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.10,http://dx.doi.org/10.46293/4n6/2020.02.04.10,,10.46293/4n6/2020.02.04.10,3096309418,,0,,0,false,, 040-508-720-001-625,Cloud Computing And Incident Response,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Amartya Tagore,,,,,,Incident response; Computer science; Computational science; Cloud computing,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.12,http://dx.doi.org/10.46293/4n6/2020.02.04.12,,10.46293/4n6/2020.02.04.12,3097199049,,0,,0,false,, 040-586-986-714-001,Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection,2022-04-17,2022,journal article,International Journal of Communication Networks and Information Security (IJCNIS),2073607x; 20760930,"Auricle Technologies, Pvt., Ltd.",Pakistan,May A. Alotaibi; Mohammed A. AlZain; Ben Soh; Mehedi Masud; Jehad Al-Amri,"As the development of technology increases and its use becomes increasingly more widespread, computer crimes grow. Hence, computer forensics research is becoming more crucial in developing good forensic frameworks and digital evidence detection tools to deter more cyber-attacks. In this paper, we explore the science of computer forensics, a dark web forensic framework, and digital evidence detection tools. ",11,3,,,Digital forensics; Computer forensics; Digital evidence; Network forensics; Forensic science; Computer science; Data science; Cybercrime; Computer security; World Wide Web; The Internet; Archaeology; History,,,,,,http://dx.doi.org/10.17762/ijcnis.v11i3.4407,,10.17762/ijcnis.v11i3.4407,,,0,,0,true,,bronze 040-821-386-092-947,A Model of Cloud Forensic Application With Assurance of Cloud Log,,2021,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,More Swami Das; A. Govardhan; Vijaya Lakshmi Doddapaneni,"The key concepts of digital forensic investigation in cloud computing are examination and investigation. Cybercriminals target cloud-based web applications due to presence of vulnerabilities. Forensic investigation is a complex process, where a set of activities are involved. The cloud log history plays an important role in the investigation and evidence collection. The existing model in cloud log information requires more security. The proposed model used for forensic application with the assurance of cloud log that helps the digital and cloud forensic investigators for collecting forensic scientific evidences. The cloud preservation and cloud log data encryption method is implemented in java. The real-time dataset, network dataset results tell that attacks with the highest attack type are generic type, and a case conducted chat log will predict the attacks in advance by keywork antology learning process, NLP, and AI techniques.",13,5,114,129,Forensic science; Data science; Computer science; Cloud computing,,,,,https://www.igi-global.com/article/a-model-of-cloud-forensic-application-with-assurance-of-cloud-log/283130,http://dx.doi.org/10.4018/ijdcf.20210901.oa7,,10.4018/ijdcf.20210901.oa7,3181349129,,0,000-566-000-503-971; 025-659-319-196-918; 026-934-168-279-23X; 030-648-224-908-422; 035-832-422-734-840; 055-805-658-219-898; 099-457-381-530-285; 144-124-797-675-052,0,true,,gold 041-018-610-330-094,Advances in Digital Forensics Frameworks and Tools: A Comparative Insight and Ranking,,2018,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Muhammad Abulaish; Nur Al Hasan Haldar,"Digital forensics science is a well-known initiative to unearth computer-assisted crimes. The thriving criminal activities using digital media have changed the typical definition of a traditional crime. Meanwhile, the means and targets of criminal activities have been transformed in a broader context due to the diverse nature of offenses associated with the multiple crime categories, affecting the way of investigations as well. In order to withstand the difficulties caused due to the crime complexity, forensics investigation frameworks are being tuned to adjust with the nature and earnestness of the felonies being committed. This article presents an in-depth comparative survey of fourteen popular and most cited digital forensics process models and various forensics tools associated with different phases of these models. The relationships among these forensics process models and their evolutions are analyzed and a graph-theoretic approach is presented to rank the existing process models to facilitate investigators in selecting an appropriate model for their investigation tasks.",10,2,95,119,Rank (computer programming); Digital media; Ranking; Data science; Thriving; Context (language use); Computer science; Process modeling; Digital forensics,,,,,https://dl.acm.org/citation.cfm?id=3212825 https://doi.org/10.4018/IJDCF.2018040106 https://dl.acm.org/doi/10.4018/IJDCF.2018040106 https://www.igi-global.com/article/advances-in-digital-forensics-frameworks-and-tools/201538 https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf10.html#AbulaishH18,http://dx.doi.org/10.4018/ijdcf.2018040106,,10.4018/ijdcf.2018040106,2791902389,,0,003-148-232-365-149; 003-575-010-209-278; 007-790-059-029-953; 009-701-742-236-493; 009-885-874-541-907; 010-086-703-646-194; 018-545-671-129-918; 020-944-423-224-895; 021-850-998-857-676; 024-381-049-056-789; 024-539-327-776-880; 026-774-296-742-022; 027-616-748-861-595; 032-697-093-668-898; 034-916-306-834-918; 035-129-008-760-918; 035-877-258-121-493; 038-668-970-194-854; 041-227-773-004-745; 043-807-511-720-729; 045-581-544-307-619; 046-507-380-373-943; 048-152-764-040-438; 051-165-387-606-715; 055-590-023-850-939; 062-325-585-829-185; 073-582-404-994-103; 083-748-184-402-072; 089-048-294-489-077; 089-695-854-791-989; 093-168-661-369-693; 098-748-261-333-651; 102-117-623-922-990; 111-090-978-711-139; 111-741-773-111-021; 127-948-386-055-225; 134-927-490-231-285; 142-388-561-082-054; 147-869-996-091-987; 154-120-262-048-284; 155-855-942-114-621; 170-299-458-679-224; 182-962-922-039-081; 184-948-841-629-735; 190-065-821-748-92X; 199-745-676-923-766,4,false,, 041-061-538-346-924,Factors influencing digital forensic investigations: Empirical evaluation of 12 years of Dubai police cases,,2015,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Ibtesam Al Awadhi; Janet C. Read; Andrew Marrington; Virginia N. L. Franqueira,"In Digital Forensics, the number of person-hours spent on investigation is a key factor which needs to be kept to a minimum whilst also paying close attention to the authenticity of the evidence. The literature describes challenges behind increasing person-hours and identifies several factors which contribute to this phenomenon. This paper reviews these factors and demonstrates that they do not wholly account for increases in investigation time. Using real case records from the Dubai Police, an extensive study explains the contribution of other factors to the increase in person-hours. We conclude this work by emphasizing on several factors affecting the person-hours in contrast to what most of the literature in this area proposes.",10,4,7,16,Work (electrical); Political science; Empirical data; Case records; Computer security; Public relations; Computer forensics; Digital forensics,,,,,https://zuscholars.zu.ac.ae/works/1642/ https://commons.erau.edu/jdfsl/vol10/iss4/1/ https://derby.openrepository.com/handle/10545/600540 https://commons.erau.edu/cgi/viewcontent.cgi?article=1207&context=jdfsl http://derby.openrepository.com/derby/bitstream/10545/600540/1/361-1320-1-PB.pdf https://zuscholars.zu.ac.ae/cgi/viewcontent.cgi?article=2641&context=works https://core.ac.uk/display/46171175 https://derby.aws.openrepository.com/handle/10545/600540 https://doi.org/10.15394/jdfsl.2015.1207 http://clok.uclan.ac.uk/18386/ https://core.ac.uk/download/46171175.pdf,http://dx.doi.org/10.15394/jdfsl.2015.1207,,10.15394/jdfsl.2015.1207,2288156152,,0,005-465-138-684-882; 024-539-327-776-880; 072-399-102-731-218; 073-847-291-567-156; 077-590-082-657-678; 079-070-981-899-105; 090-752-043-508-733; 192-955-966-543-738,1,true,cc-by-nc,gold 041-109-469-858-984,Twenty first Annual DFRWS Conference,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Aaron Sparling,,37,,301262,,,,,,,https://api.elsevier.com/content/article/PII:S2666281721001785?httpAccept=text/xml http://dblp.uni-trier.de/db/journals/di/di37S.html#Sparling21 https://doi.org/10.1016/j.fsidi.2021.301262,http://dx.doi.org/10.1016/j.fsidi.2021.301262,,10.1016/j.fsidi.2021.301262,3195110009,,0,,0,false,, 041-147-445-040-229,A comparative study of audio latency feature of Motorola and Samsung mobile phones in forensic identification,2021-01-30,2021,journal article,Indian Journal of Science and Technology,09746846; 09745645,Indian Society for Education and Environment,India,Ashu Goyal; Sudhir Shukla; R.K. Sarin,"Background: In forensic science the process of proving authenticity of audio recording plays an important role. In recent times, Forensic experts mostly receives digital recording for authentication as compared to analog recording. A digitally altered audio signal, leaves no visual indications of being tampered, and it will be indistinguishable from an original audio signal. Objective: To highlight the significance of latency feature of mobile phone handsets in forensic science via comparing input audio latency feature of Samsung and Motorola mobile phone in two audio formats. Methods: In this work two wellestablished and most used brands of mobile phones were considered for comparison: SAMSUNG and MOTOROLA. In the present paper, the digital audio samples have been recorded using 20 mobile phones of various models from two different makes i.e. SAMSUNG and MOTOROLA, in two audio formats i.e. WAV and 3GP. Audio samples were then analysed using Adobe Audition 3.0 software for the input audio latency feature of mobile phones and compared. Findings: Input audio latency value of digital audio recordings can be helpful in forensic identification of make and model of source mobile phone. Novelty: A new technique in digital forensics, to classify the given audio samples on the basis of input audio latency feature and identifying the make of source mobile handsets.; Keywords: Authentication; digital audio; forensic science; adobe audition; mobile phone",14,4,319,324,Sound recording and reproduction; Mobile phone; Analog recording; Digital recording; Computer science; Multimedia; Audio signal; Latency (audio); Digital audio,,,,,https://indjst.org/articles/a-comparative-study-of-audio-latency-feature-of-motorola-and-samsung-mobile-phones-in-forensic-identification,http://dx.doi.org/10.17485/ijst/v14i4.2108,,10.17485/ijst/v14i4.2108,3129458549,,0,,1,true,cc-by,gold 041-177-651-830-165,Digital Forensics Institute in Malaysia: The way forward,2014-01-28,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,A. Arrifin; H. Jazri; Jill Slay; I. Lee,"Aswami Ariffin, Jill Slay and Husin Jazri set out the digital forensics landscape in Malaysia, analyze the problems encountered, consider its achievements to date, and proposes the formation of a Digital Forensics Institute Index words: digital forensics; digital forensics research; development of digital forensics in Malaysia",9,0,,,Set (abstract data type); Index (publishing); Computer security; Computer science; Computer forensics; Digital forensics,,,,,https://journals.sas.ac.uk/deeslr/article/view/1989 https://ir.nust.na/jspui/bitstream/10628/349/1/Slay.%20Digital%20Forensics%20Institute%20in%20Malaysia.pdf https://ir.nust.na/xmlui/handle/10628/349 https://sas-space.sas.ac.uk/5407/,http://dx.doi.org/10.14296/deeslr.v9i0.1989,,10.14296/deeslr.v9i0.1989,2013122022,,0,,1,true,cc-by-nc-nd,hybrid 041-324-428-460-736,Advances in the application of Ontologies in the area of Digital Forensic Electronic Mail,,2019,journal article,IEEE Latin America Transactions,15480992,Institute of Electrical and Electronics Engineers (IEEE),United States,Beatriz Parra; Marcela Vegetti; Horacio Pascual Leone,"This article presents a descriptive review of the research published in the last five years to identify areas of unavailability in the study of Digital Forensics problems. Particularly, it is important to define the state of the art related to the application of ontologies, especially in the forensics of emails. The following objectives of the review are proposed: identify and study the most up-to-date research contributions on Ontologies and Digital Forensics; establish the gaps in current research reltated with the application of Ontologies to Digital Forensics; and correlate these works from attributes of proximity (or distance) with the application of ontologies to the forensic analysis of emails. In addition, a systematic method is defined to select the research works that are considered of interest for this review. It is expected that it will lead to the identification of gaps in the investigation of characteristic problems in digital forensic analysis, and the definition of an updated theoretical framework linked to the forensic analysis of emails with the application of ontologies.",17,10,1694,1705,Traceability; Ontology (information science); Data science; Unavailability; Electronic mail; Computer science; State (computer science); Identification (information); Digital forensics,,,,,https://ieeexplore.ieee.org/abstract/document/8986448/ https://ri.conicet.gov.ar/handle/11336/108980,http://dx.doi.org/10.1109/tla.2019.8986448,,10.1109/tla.2019.8986448,3004578751,,0,001-470-661-245-05X; 003-904-680-040-998; 005-239-259-377-920; 005-281-459-480-921; 007-236-370-501-343; 007-898-145-584-667; 010-303-601-652-217; 012-279-890-569-414; 014-767-056-602-687; 016-322-663-058-127; 017-158-332-111-098; 017-173-984-068-393; 018-447-058-666-847; 018-481-487-803-319; 020-472-837-746-738; 023-477-418-125-672; 024-141-009-131-171; 029-638-263-419-336; 029-934-518-651-564; 031-928-219-465-244; 032-229-233-316-986; 035-111-321-718-69X; 036-491-721-454-797; 038-188-755-700-758; 039-261-571-226-742; 043-404-180-796-57X; 043-686-094-043-705; 045-432-228-745-423; 050-161-083-716-443; 052-368-682-285-199; 059-496-563-584-103; 062-058-510-536-034; 063-428-065-806-586; 064-498-229-482-128; 065-346-027-945-984; 065-873-523-989-876; 067-277-539-124-027; 073-209-422-678-483; 073-568-787-578-72X; 074-689-820-165-212; 074-814-000-483-733; 077-681-647-723-331; 078-095-922-471-787; 080-815-401-164-76X; 080-950-780-801-678; 081-547-256-855-879; 082-071-198-593-57X; 084-860-380-249-411; 090-773-852-075-475; 091-214-650-015-55X; 092-050-479-982-221; 092-972-476-571-620; 102-441-399-953-42X; 104-153-499-789-950; 106-066-275-544-628; 106-715-261-421-560; 107-282-856-639-564; 119-584-691-271-448; 121-275-050-804-307; 124-114-091-024-00X; 124-551-718-579-355; 124-983-078-767-356; 127-734-468-288-045; 129-151-019-944-543; 134-369-102-934-63X; 134-927-490-231-285; 138-100-387-358-181; 141-164-327-638-772; 142-821-739-103-225; 143-399-167-174-364; 146-815-866-418-806; 147-640-789-885-64X; 151-428-592-500-634; 155-318-974-737-635; 155-406-204-525-089; 159-883-904-840-562; 159-947-028-845-370; 161-503-717-618-67X; 161-543-725-354-762; 163-558-468-520-17X; 163-694-599-267-959; 163-877-074-795-849; 183-905-605-540-505; 184-069-302-229-82X,2,false,, 041-584-529-699-093,Forensic odontology with digital technologies: A systematic review,2020-07-01,2020,journal article,Journal of forensic and legal medicine,18787487; 1752928x,Churchill Livingstone,Netherlands,Shinpei Matsuda; Hisato Yoshida; Kiyokadzu Ebata; Ichiroh Shimada; Hitoshi Yoshimura,"Postmortem dental examinations play an important role in individual identification. In forensic odontology, individual identification is based on a traditional visual comparison of the antemortem dental record and dental radiographs with those obtained by postmortem examinations. Digitization in forensic odontology has recently started. The aim of this systematic review was to reveal the progress in forensic odontology by using ante/postmortem information obtained by digital technologies. Thirty-six eligible studies were included. No methods with digital technology have been accepted worldwide because of various factors such as expensive special equipment and the cost of other components. Further research should be conducted and progress should be made in the field of forensic odontology along with the progression of general digital technology.",74,,102004,,Medical physics; Digitization; Dental examinations; Dental record; Forensic odontology; Medicine; Identification (information),Dental imaging examination; Digital technologies; Forensic odontology; Orofacial soft tissues; Tooth,"Age Determination by Teeth; Digital Technology; Forensic Dentistry/methods; Humans; Image Processing, Computer-Assisted; Lip/anatomy & histology; Palate, Hard/anatomy & histology; Radiography, Dental, Digital; Tongue/anatomy & histology",,"The Fukui Bank, Ltd",https://www.ncbi.nlm.nih.gov/pubmed/32658766 https://pubmed.ncbi.nlm.nih.gov/32658766/ https://www.sciencedirect.com/science/article/abs/pii/S1752928X20301116,http://dx.doi.org/10.1016/j.jflm.2020.102004,32658766,10.1016/j.jflm.2020.102004,3038257093,,0,000-528-548-051-109; 001-287-474-767-471; 001-415-340-215-210; 005-471-876-175-458; 006-245-563-587-073; 006-467-665-141-850; 008-132-745-849-013; 009-388-146-311-655; 012-515-256-028-110; 013-032-379-293-344; 013-370-437-817-823; 017-300-737-144-757; 017-564-585-587-899; 019-268-703-108-809; 023-790-746-046-288; 024-140-201-975-396; 024-320-416-540-275; 024-784-179-276-92X; 030-306-368-362-318; 031-791-954-058-413; 032-052-414-081-660; 033-254-550-233-720; 034-420-798-635-763; 037-973-000-785-578; 038-154-163-248-125; 040-119-897-570-648; 044-526-538-557-621; 044-682-979-330-996; 045-196-163-725-218; 054-089-472-275-233; 054-795-951-232-933; 055-564-241-407-768; 055-729-934-561-648; 056-053-703-193-648; 057-068-582-749-58X; 057-893-935-658-705; 063-240-818-324-537; 066-451-738-775-222; 075-942-783-231-470; 083-275-795-865-394; 087-391-588-830-272; 089-940-880-601-620; 095-973-013-007-891; 112-959-234-161-175; 115-349-142-118-234; 116-017-921-838-412; 123-780-980-626-893; 136-074-315-058-244; 147-136-511-956-56X; 161-010-069-062-144; 161-043-159-762-292; 162-336-092-931-463,9,false,, 041-585-451-530-646,Standard methods for creating digital skeletal models using structure-from-motion photogrammetry.,2019-02-19,2019,journal article,American journal of physical anthropology,10968644; 00029483,Wiley-Liss Inc.,United States,Brianne Morgan; Andrew Ford; Martin J. Smith,"Objectives This article assesses best practices for producing 3D digital cranial models through structure-from-motion (SfM) photogrammetry, and whether the metric accuracy and overall presentation of photogrammetric models are comparable to physical crania. It is intended to present a user-friendly standard method of creating accurate digital skeletal models using Agisoft PhotoScan. Materials and methods Approximately 200 photographs were taken of three different crania, and were separated into series consisting of 50, 75, 100, 150, and approximately 200 photos. Forty-five cranial models were created using different photo series and a variety of PhotoScan settings. These models were assessed based on defined qualitative criteria, and model measurement estimates were compared with physical skeletal measurements using Bland-Altman plots. Results The majority of all models (37/45) produced measurement estimates with mean differences of 2 mm or less regardless of PhotoScan settings, and therefore demonstrated high levels of agreement with the physical measurements. Models created with 150 photographs and on ""high"" PhotoScan settings scored the highest in terms of qualitative appearance in the shortest amount of time. Discussion In PhotoScan, it is recommended to create cranial models using 150 photographs and ""high"" settings; this produces digital cranial models that are comparable to physical crania in both appearance and proportion. SfM photogrammetry is a convenient, noninvasive, and rapid 3D modeling tool that can be used in almost any setting to produce digital models, and following the guidelines established here will ensure that these models are metrically accurate.",169,1,152,160,Photogrammetry; Structure from motion; Artificial intelligence; Metric (unit); Observational error; Crania; 3D modeling; Standard methods; 3d model; Computer vision; Computer science,3D models; accuracy; anthropometry; measurement error; photogrammetry,"Adult; Cephalometry; Humans; Imaging, Three-Dimensional; Models, Anatomic; Photogrammetry/methods; Skull/anatomy & histology",,,https://onlinelibrary.wiley.com/doi/full/10.1002/ajpa.23803 https://pubmed.ncbi.nlm.nih.gov/30784038/ https://europepmc.org/article/MED/30784038 https://www.ncbi.nlm.nih.gov/pubmed/30784038 https://onlinelibrary.wiley.com/doi/abs/10.1002/ajpa.23803 http://eprints.bournemouth.ac.uk/32161/ https://core.ac.uk/download/195353782.pdf,http://dx.doi.org/10.1002/ajpa.23803,30784038,10.1002/ajpa.23803,2918034531,,0,000-198-602-261-272; 002-931-674-142-75X; 006-053-337-346-101; 011-855-823-533-127; 016-580-313-404-132; 020-736-670-910-650; 030-399-930-545-660; 031-933-665-463-421; 037-843-889-589-399; 042-100-182-415-268; 047-981-818-086-012; 059-942-525-213-35X; 061-507-121-495-27X; 073-823-317-995-663; 092-063-658-837-508; 092-297-970-484-235; 124-684-494-161-222,12,true,,green 041-681-884-186-668,A Forensic Approach on Data Retrieval from IC/eMMC of Damaged Windows Mobile Phone using Easy JTagPlus Box tool and Magnet Forensic Axiom,2021-10-16,2021,journal article,International Journal of Scientific Research in Science and Technology,2395602x; 23956011,Technoscience Academy,,Bhushan Ghode; Akhlesh Kumar; Khevna Maniar; S. K. Jain,"The digital world is dominated and ruled by the IOS and Android operating systems on mobile as well as tablet platforms. Together they share a whopping 99% (till 2021) of the share market. The Windows Phones (WP) are occupants of that less than 1% platform that they share with other subsidiary operating systems. Due to the lack of commercial popularity and production of such Windows devices, the process of data extraction and analysis of such devices is unique and challenging for forensic experts. The standard forensic data retrieving software and hardware do not support advanced requisition techniques except the direct extraction. Thus, in cases with locked WP devices, the software/ hardware is unable to support the device’s physical extraction or lock bypass facility. As observed in several digital cases, these portable devices contain details of an individual’s most private life including communications, contacts, browsing history, and location specifics at any given time. Although the operating systems of Microsoft and Windows mobile devices are similar in certain ways, specialized skill sets and tools are required while dealing with location, examination, and interpretation of the digital evidence on these systems. In this research paper, the authors are discussing the reliability and success of data extraction of a Windows mobile device from IC/eMMC using specialized hardware/software with the Windows device.",,,499,508,Magnet; Axiom; Mobile phone; Computer science; Data retrieval; Database,,,,,https://ijsrst.com/IJSRST218568,http://dx.doi.org/10.32628/ijsrst218568,,10.32628/ijsrst218568,3214852069,,0,015-540-631-774-646; 040-662-259-940-91X; 084-492-860-597-873,0,true,,gold 042-046-448-317-063,Digital forensics and its role in promoting criminal prosecution,2021-03-22,2021,journal article,"Revista Eletrônica em Gestão, Educação e Tecnologia Ambiental",22361170,Universidad Federal de Santa Maria,,Seyyed Sajjad Kazemi; Sajjad Heidari,"Digital forensics is essentially synonymous with computer forensics, but the term ""digital forensics"" is generally used for the technical review of all devices that have the ability to store data. Today, digital criminology is challenged in cloud computing. The first problem is to understand why and how criminal and social actions are so unique and complex. The second problem is the lack of accurate scientific tools for forensic medicine in cyberspace. So far, no complete tools or explanations for criminology have been provided in the virtual infrastructure, and no training for security researchers has been provided in detail. Therefore, the author of the present descriptive-analytical research is based on library resources and using fish taking tools. To investigate suspicious cases related to cyberspace, criminologists must be well-equipped with technical and legal issues to deal with. In this article, we analyze digital criminology and its role in judicial law. The benefit of computer forensic knowledge is not only an indispensable necessity for security and judicial institutions, but also professional users and owners of computer systems, systems and networks must be fully aware of and properly comply with its legal and technical requirements.",25,,5,,Internet privacy; Scientific instrument; Social actions; Cyberspace; Fish ; Computer science; Computer forensics; Cloud computing; Digital forensics,,,,,https://periodicos.ufsm.br/reget/article/view/63798 https://periodicos.ufsm.br/reget/article/download/63798/pdf,http://dx.doi.org/10.5902/2236117063798,,10.5902/2236117063798,3155457967,,0,,0,true,cc-by-nc-sa,gold 042-177-113-700-263,"Artificial Intelligence Forensics, Machine Learning Forensics and Digital Forensics",2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Hriday Raval,,,,,,Computer science; Multimedia; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.05,http://dx.doi.org/10.46293/4n6/2020.02.04.05,,10.46293/4n6/2020.02.04.05,3095358219,,0,,1,false,, 042-388-684-756-121,"Wounded to the bone: Digital microscopic analysis of traumas in a medieval mass grave assemblage (Sandbjerget, Denmark, AD 1300-1350).",2017-11-02,2017,journal article,International journal of paleopathology,18799825; 18799817,Elsevier BV,Netherlands,Alexandra Boucherie; Marie Louise Jørkov; Martin J. Smith,"Abstract Battle-related mass burials are considered the most unequivocal evidence of past violence. However, most published studies involve only macroscopic analysis of skeletal remains, commonly arriving only at broad conclusions regarding trauma interpretation. The current study considers a possible avenue for achieving both greater detail and accuracy through digital microscopy. Patterns of injury were investigated among 45 individuals from a Medieval Danish mass grave (Sandbjerget, AD 1300–1350). Injuries were recorded on every anatomical element, except hand and foot bones. Each was photographed and cast, facilitating remote evaluations. Macroscopic analysis was compared with digital microscopy in order to test the relative utility of the latter in characterizing skeletal injuries (mechanism, weapon class, direction, timing of injury). The location of 201 observed injuries, mainly sharp force defects, suggested that many lesions were probably not inflicted by face-to-face opponents. Some microscopic features were indicative of a specific lesion type and weapon class. Digital microscopy was therefore demonstrated to be a complementary tool to macroscopic assessment, enhancing feature observation and quantification and serving to compensate for many of the limitations of macroscopic assessment.",19,,66,79,Anatomy; Pathology; Paleopathology; Assemblage (archaeology); Digital microscopy; Foot Bones; Relative utility; Sharp force; Lesion type; History,Digital microscopy; Lesion morphology; Mass grave; Medieval archaeology; Paleopathology; Traumatology,"Adolescent; Adult; Age Determination by Skeleton; Armed Conflicts/history; Bone and Bones/injuries; Burial/history; Child; Denmark/epidemiology; History, Medieval; Humans; Microscopy; Paleopathology/methods; Prevalence; Violence/history; Weapons/history; Wounds and Injuries/epidemiology; Young Adult",,,https://www.sciencedirect.com/science/article/pii/S1879981716300730 https://core.ac.uk/display/132195733 https://www.ncbi.nlm.nih.gov/pubmed/29198401 http://eprints.bournemouth.ac.uk/30028/ https://difusion.ulb.ac.be/vufind/Record/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/261791/Details https://core.ac.uk/download/132195733.pdf,http://dx.doi.org/10.1016/j.ijpp.2017.10.005,29198401,10.1016/j.ijpp.2017.10.005,2766517719,,0,001-717-189-403-270; 003-713-944-354-850; 005-389-211-946-956; 005-739-768-385-524; 007-059-931-241-63X; 007-978-706-272-285; 008-018-811-400-830; 008-272-023-737-778; 008-926-843-467-099; 009-481-875-308-233; 009-554-467-261-282; 009-847-311-194-828; 010-283-515-536-142; 010-431-980-930-155; 011-054-465-710-364; 011-177-178-483-824; 013-179-989-114-485; 013-785-006-611-350; 015-818-819-988-332; 017-229-374-543-003; 018-645-968-236-085; 021-193-535-230-589; 021-745-861-312-865; 025-076-704-666-088; 030-616-089-195-645; 030-804-886-613-06X; 031-056-855-501-837; 031-757-169-698-811; 032-554-830-138-515; 037-842-010-642-36X; 042-229-754-619-854; 042-705-658-682-014; 043-073-958-036-763; 044-770-051-605-649; 044-870-283-439-262; 044-880-927-937-603; 045-766-463-919-964; 048-198-364-623-662; 050-329-252-705-929; 050-986-075-902-824; 051-523-568-627-694; 053-489-588-864-140; 053-650-463-239-366; 055-210-504-415-973; 056-773-382-417-49X; 057-031-042-677-424; 057-831-917-583-048; 058-934-134-593-723; 062-134-927-775-016; 062-627-232-206-904; 063-524-038-345-462; 063-867-680-167-004; 063-988-169-869-835; 065-308-078-290-52X; 067-749-584-427-994; 069-064-798-493-832; 071-104-157-956-839; 075-477-417-950-095; 077-246-580-849-514; 079-088-698-517-859; 084-719-044-126-604; 086-729-023-293-202; 089-848-297-586-409; 091-963-966-078-993; 092-420-910-125-696; 093-595-468-484-020; 097-304-512-447-888; 098-537-562-534-115; 102-769-814-597-346; 106-729-138-122-079; 106-974-083-875-952; 108-740-965-814-802; 114-091-187-112-096; 120-530-590-359-24X; 121-025-811-768-012; 122-909-599-387-641; 125-141-726-042-405; 125-860-211-735-502; 134-744-534-676-197; 143-476-426-615-205; 144-886-025-343-876; 151-431-018-856-537; 161-796-518-307-758; 173-709-546-640-803; 199-972-185-690-080,11,true,,green 042-746-308-855-318,Using digital humanities and linguistics to help with terrorism investigations.,2020-11-06,2020,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Julien Longhi,"This article seeks to offer a response to the digital transformation of forensic science by employing a tool-based linguistic analysis, integrated into the paradigm of digital humanities. It is a way to scientifically model the analysis of digital texts using digital methods. Computer science comes in support of linguistic skills in order to deal with investigative situations and help analyze criminal acts. It presents a case report thanks to the analysis of a corpus made up of 23 texts relating to criminal acts related to suspected terrorist groups with links to the far left. The goal is to help investigators by providing results which can help find stylistic similarities or exclusions between texts and thus potentially between the authors of those texts, offering authors profiling hypothsesis that may be included in the investigation process. While linguistics alone cannot solve such cases, a better understanding of language data, including topics, style and grammar, bring additional clues that can be very useful information in the investigation of crimes (linguists can ""translate"" information to investigators, so that it can be integrated to the investigation). Digital tools provide a form of objectification since they are based on statistical calculations which reveal regularities that are otherwise invisible to the naked eye. These tools, when used properly in investigations, can prove invaluable in extracting ""clues"" from the linguistic ""traces"" that make up texts.",318,,110564,110564,Stylometry; Digital transformation; Profiling (information science); Grammar; Objectification; Style (sociolinguistics); Forensic linguistics; Computer science; Linguistics; Process (engineering),Corpus; Forensic linguistics; Linguistics; Stylometry; Textometry,"Algorithms; Forensic Sciences/methods; Humanities; Humans; Linguistics; Models, Theoretical; Terrorism",,Institut Universitaire de France,https://europepmc.org/article/MED/33218794 https://pubmed.ncbi.nlm.nih.gov/33218794/ https://hal.archives-ouvertes.fr/hal-03083645 https://www.ncbi.nlm.nih.gov/pubmed/33218794 https://www.sciencedirect.com/science/article/pii/S0379073820304266,http://dx.doi.org/10.1016/j.forsciint.2020.110564,33218794,10.1016/j.forsciint.2020.110564,3096152115,,0,007-024-765-536-335; 010-951-806-548-929; 022-107-254-239-002; 025-800-315-851-620; 038-622-207-031-37X; 052-303-372-427-385; 055-090-331-018-166; 055-443-982-472-937; 066-937-282-076-772; 070-283-562-203-769; 074-920-935-733-645; 077-607-479-314-655; 090-815-393-485-581; 131-806-648-718-123; 137-963-576-723-413; 138-212-583-543-778; 174-649-277-909-708; 178-746-001-922-59X; 182-724-395-147-916,5,true,,bronze 042-767-661-429-064,Big forensic data reduction: digital forensic images and electronic evidence,2016-03-21,2016,journal article,Cluster Computing,13867857; 15737543,Springer Science and Business Media LLC,Netherlands,Darren Quick; Kim-Kwang Raymond Choo,"An issue that continues to impact digital forensics is the increasing volume of data and the growing number of devices. One proposed method to deal with the problem of ""big digital forensic data"": the volume, variety, and velocity of digital forensic data, is to reduce the volume of data at either the collection stage or the processing stage. We have developed a novel approach which significantly improves on current practice, and in this paper we outline our data volume reduction process which focuses on imaging a selection of key files and data such as: registry, documents, spreadsheets, email, internet history, communications, logs, pictures, videos, and other relevant file types. When applied to test cases, a hundredfold reduction of original media volume was observed. When applied to real world cases of an Australian Law Enforcement Agency, the data volume further reduced to a small percentage of the original media volume, whilst retaining key evidential files and data. The reduction process was applied to a range of real world cases reviewed by experienced investigators and detectives and highlighted that evidential data was present in the data reduced forensic subset files. A data reduction approach is applicable in a range of areas, including: digital forensic triage, analysis, review, intelligence analysis, presentation, and archiving. In addition, the data reduction process outlined can be applied using common digital forensic hardware and software solutions available in appropriately equipped digital forensic labs without requiring additional purchase of software or hardware. The process can be applied to a wide variety of cases, such as terrorism and organised crime investigations, and the proposed data reduction process is intended to provide a capability to rapidly process data and gain an understanding of the information and/or locate key evidence or intelligence in a timely manner.",19,2,723,740,The Internet; Data mining; Test case; Forensic science; Data science; Organised crime; Software; Law enforcement; Computer science; Volume (compression); Intelligence analysis; Computer forensics; Big data; Digital forensics,,,,,https://dl.acm.org/doi/10.1007/s10586-016-0553-1 https://link.springer.com/article/10.1007/s10586-016-0553-1/fulltext.html https://dblp.uni-trier.de/db/journals/cluster/cluster19.html#QuickC16 https://link.springer.com/article/10.1007/s10586-016-0553-1,http://dx.doi.org/10.1007/s10586-016-0553-1,,10.1007/s10586-016-0553-1,2303287830,,0,000-360-120-513-679; 003-391-896-636-538; 003-982-227-180-136; 004-508-802-364-299; 004-652-388-189-304; 004-795-963-795-748; 004-984-401-090-239; 009-885-874-541-907; 010-388-991-543-520; 010-951-806-548-929; 011-640-228-143-441; 017-790-269-405-50X; 018-396-779-403-273; 020-599-787-613-117; 021-563-550-669-43X; 021-971-576-965-168; 024-735-069-822-749; 025-290-159-757-335; 027-366-761-223-724; 027-658-395-615-692; 028-343-398-840-609; 031-570-876-692-486; 034-815-736-764-355; 035-381-853-639-810; 035-504-355-395-566; 036-412-863-725-881; 044-518-560-475-833; 046-527-367-793-765; 049-533-570-086-513; 050-513-243-638-138; 052-665-370-203-554; 056-715-378-869-201; 058-052-081-943-595; 059-841-509-046-069; 073-256-200-904-686; 078-144-022-647-386; 079-070-981-899-105; 085-343-554-667-033; 089-267-063-170-413; 090-752-043-508-733; 094-295-279-676-447; 098-068-833-666-576; 098-748-261-333-651; 101-145-299-712-378; 106-267-355-831-636; 115-471-022-347-349; 115-633-018-722-782; 121-716-218-592-354; 123-057-683-615-458; 124-198-527-546-193; 125-402-335-950-812; 125-939-677-745-616; 133-096-532-539-560; 133-378-009-445-67X; 134-927-490-231-285; 160-331-694-886-887; 166-184-952-634-027; 168-211-791-741-422,101,false,, 042-776-427-483-657,Recent Advancements in Digital Forensics,,2017,journal article,IEEE Security & Privacy,15407993; 15584046,Institute of Electrical and Electronics Engineers (IEEE),United States,Wojciech Mazurczyk; Luca Caviglione; Steffen Wendzel,"Modern digital forensics is a multidisciplinary effort that embraces several fields, including law, computer science, finance, networking, data mining, and criminal justice. Professionals will increasingly face a mixed set of challenges and issues regarding the efficiency of digital evidence processing and related forensic procedures. This special issue of IEEE Security & Privacy is an attempt to collect the most interesting ideas from the community of researchers and professionals working on digital forensics.",15,6,10,11,Criminal justice; Forensic science; Data science; Face (sociological concept); Cybercrime; Digital evidence; Computer science; Digital forensics,,,,,https://ieeexplore.ieee.org/document/8123495 https://dblp.uni-trier.de/db/journals/ieeesp/ieeesp15.html#MazurczykCW17 https://www.computer.org/csdl/api/v1/periodical/mags/sp/2017/06/msp2017060010/13rRUx0xPSh/download-article/pdf https://www.computer.org/csdl/magazine/sp/2017/06/msp2017060010/13rRUx0xPSh,http://dx.doi.org/10.1109/msp.2017.4251106,,10.1109/msp.2017.4251106,2769249151,,0,,2,true,,bronze 043-127-893-811-79X,Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases,2019-01-07,2019,journal article,IJID (International Journal on Informatics for Development),25497448; 22527834,Al-Jamiah Research Centre,,Firmansyah Gustav Hikmatyar; Bambang Sugiantoro,"As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.",7,2,64,67,Crime scene; Phone; Cybercrime; Digital evidence; Computer science; Multimedia; Computer forensics; Android (operating system); Mobile device forensics; Digital forensics,,,,,http://ejournal.uin-suka.ac.id/saintek/ijid/article/download/1335/1620 http://ejournal.uin-suka.ac.id/saintek/ijid/article/view/1335 https://core.ac.uk/download/267117037.pdf,http://dx.doi.org/10.14421/ijid.2018.07204,,10.14421/ijid.2018.07204,2913916508,,0,009-862-177-957-585; 048-141-687-795-752; 087-309-749-401-300; 095-972-507-485-24X; 111-494-798-747-370; 188-636-279-613-199,5,true,cc-by-nc-nd,gold 043-184-565-697-319,USE OF CRIMINALLY SIGNIFICANT INFORMATION POSTED ON SOCIAL NETWORKS IN CRIME DETECTION AND INVESTIGATION,2022-04-14,2022,journal article,Расследование преступлений: проблемы и пути их решения,24111627,Moscow Academy of the Investigative Committee of the Russian Federation,,Александр Александрович СМИРНОВ,"В статье исследуется развитие криминалистической науки в эпоху цифровизации, рассматривается понятие «цифровая криминалистика». Раскрывается понятие цифровых следов, а также рассмотрены особенности их фиксации и изъятия. Проанализированы перспективы развития криминалистики с учетом поставленных в настоящее время перед ней задач.; The article examines the development of forensic science in the era of digitalization, considers the concept of “digital forensics”. The concept of “digital traces” is revealed, and the features of their fixation and seizure are considered. The author analyzes the prospects for the development of forensic science, taking into account the tasks it faces.",,4(34),114,118,Digital forensics; Forensic science; Internet privacy; Criminology; Digital evidence; Computer security; Criminal investigation; Crime scene; Fixation (population genetics); Computer science; Political science; Data science; Sociology,,,,,,http://dx.doi.org/10.54217/2411-1627.2021.34.4.019,,10.54217/2411-1627.2021.34.4.019,,,0,,0,false,, 043-253-906-424-260,A Primary of Study on the General Method of Forensic Digital Image Enhancement And Restoration,,2012,journal article,Chinese Journal of Forensic Sciences,16712072,,,Zhang Da-zhi,"Basictechniques of forensic digital image enhancement and restoration,are discussed with the demonstration of real cases,including problem analysis and evaluation,noise reducing,detail enhancement,interference background reducing,blurred image restoration and surveillant video frame rebuilding.General approaches and tactics of forensic digital image enhancement and restoration are summaried.",,,,,Image restoration; Frame (networking); Artificial intelligence; Image enhancement; General method; Computer vision; Interference (communication); Computer science; Digital image; Noise (video),,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201204009.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201204009.htm,,,2356088612,,0,,0,false,, 043-261-465-467-889,A method of forensic authentication of audio recordings generated using the Voice Memos application in the iPhone.,2021-01-23,2021,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Park Nam In; JiWoo Lee; Kyu-Sun Shim; Byun Jun Seok; Oc-Yeub Jeon,,320,,110702,110702,Timestamp; Sound recording and reproduction; Advanced Audio Coding; File size; Audio codec; Apple Lossless; Speech recognition; Computer science; Latency (audio); File format,Audio forensic; Audio latency time; Digital forensic investigation; Forensic authentication; Log history; iPhone,Forensic Sciences/methods; Humans; Mobile Applications; Smartphone; Sound Spectrography; Voice,,,https://pubag.nal.usda.gov/catalog/7259989 https://www.sciencedirect.com/science/article/abs/pii/S0379073821000220 https://europepmc.org/article/MED/33561789 https://www.ncbi.nlm.nih.gov/pubmed/33561789,http://dx.doi.org/10.1016/j.forsciint.2021.110702,33561789,10.1016/j.forsciint.2021.110702,3121149555,,0,001-458-381-243-357; 039-614-975-031-707; 046-034-142-979-678; 048-715-989-260-702; 056-466-128-964-13X; 057-114-681-558-820; 091-970-428-713-932; 175-390-273-605-893,3,false,, 043-664-411-083-202,A Proposed Model for Investigating on Web Whatsapp Application,2017-05-01,2017,journal article,Advanced Science Letters,19366612; 19367317,American Scientific Publishers,United States,Fietyata Yudha; Ahmad Luthfi; Yudi Prayudi,,23,5,4050,4054,Computer science,,,,,https://www.ingentaconnect.com/content/asp/asl/2017/00000023/00000005/art00051,http://dx.doi.org/10.1166/asl.2017.8308,,10.1166/asl.2017.8308,2792213121,,0,,2,false,, 043-810-977-349-13X,A Comprehensive Study of XSS Attack and the Digital Forensic Models to Gather the Evidence,2022-04-24,2022,journal article,ECS Transactions,19385862; 19386737; 21512051,The Electrochemical Society,United States,Saurabh Kumar; S.K. Pathak; Jagendra Singh,"Cyber Crime and fraud are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use digital platform in order to commit the crime, forensic examiners apply practical frameworks and methods to collect digital evidences. Digital forensics method involves the analysis of network traffic for detecting intrusions and investigating them. Different models have been proposed for the cyber crime investigation with the merits and demerit. This research paper explores cross-site scripting (XSS) attacks, features of the existing digital forensic investigation models and discusses some of the issues related to digital forensic research.",107,1,7153,7163,Digital forensics; Commit; Cross-site scripting; Computer science; Scripting language; Computer forensics; Digital evidence; Computer security; Cyber crime; Data science; Forensic science; Law enforcement; World Wide Web; Law; The Internet; Database; Political science; Web development; Web application security; Archaeology; History; Operating system,,,,,,http://dx.doi.org/10.1149/10701.7153ecst,,10.1149/10701.7153ecst,,,0,,0,false,, 043-827-643-358-90X,The effect of image quality and forensic expertise in facial image comparisons.,2014-12-23,2014,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Kristin Norell; Klas Brorsson Läthén; Peter Bergström; Allyson Rice; Vaidehi Natu; Alice J. O'Toole,"Images of perpetrators in surveillance video footage are often used as evidence in court. In this study, identification accuracy was compared for forensic experts and untrained persons in facial image comparisons as well as the impact of image quality. Participants viewed thirty image pairs and were asked to rate the level of support garnered from their observations for concluding whether or not the two images showed the same person. Forensic experts reached their conclusions with significantly fewer errors than did untrained participants. They were also better than novices at determining when two high-quality images depicted the same person. Notably, lower image quality led to more careful conclusions by experts, but not for untrained participants. In summary, the untrained participants had more false negatives and false positives than experts, which in the latter case could lead to a higher risk of an innocent person being convicted for an untrained witness.",60,2,331,340,Forensic science; Psychology; Biometrics; Witness; Image quality; False positive paradox; Applied psychology; Social psychology; Identification (information),CCTV; biometric identification; facial image comparison; forensic science; image quality; information science,Biometric Identification; Face/anatomy & histology; Forensic Sciences; Humans; Professional Competence; Videotape Recording,,,http://onlinelibrary.wiley.com/doi/10.1111/1556-4029.12660/full https://www.researchgate.net/profile/Vaidehi_Natu/publication/260249007_The_Effect_of_Image_Quality_and_Forensic_Expertise_in_Facial_Image_Comparisons/links/54ac39ad0cf2479c2ee78da8.pdf https://pubmed.ncbi.nlm.nih.gov/25537273/ http://doi.wiley.com/10.1111/1556-4029.12660 https://www.ncbi.nlm.nih.gov/pubmed/25537273 https://www.infona.pl/resource/bwmeta1.element.wiley-jfo-v-60-i-2-jfo12660 https://dialnet.unirioja.es/servlet/articulo?codigo=5233095,http://dx.doi.org/10.1111/1556-4029.12660,25537273,10.1111/1556-4029.12660,2049664898,,0,012-829-385-796-687; 015-111-980-466-419; 016-747-170-993-313; 019-466-667-607-252; 020-170-447-797-333; 025-883-071-858-995; 036-555-052-193-015; 037-026-528-693-473; 039-921-464-148-815; 045-837-664-148-225; 049-805-853-319-539; 056-970-067-581-33X; 062-618-194-192-331; 077-453-655-805-05X; 143-987-744-245-531,20,false,, 043-865-919-965-282,Analysis of Forensic Video in Storage Data Using Tampering Method,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Amirul Putra Justicia; Riadi,,7,3,328,335,Forensic science; Computer science; Multimedia; Wireless,,,,,http://www.sdiwc.net/digital-library/analysis-of-forensic-video-in-storage-data-using-tampering-method.html,http://dx.doi.org/10.17781/p002471,,10.17781/p002471,2888181830,,0,010-001-509-758-162; 014-859-901-321-603; 024-793-013-451-77X; 052-732-399-490-806; 081-554-153-097-003; 087-635-981-525-707; 141-847-161-303-501,0,false,, 044-016-316-658-216,PNG Data Detector for DECA,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Kingson Chinedu Odogwu; Pavel Gladyshev; Babak Habibnia,"Abstract DECA, a novel file carving application, is an example of digital forensic tools that rely heavily on accurately detecting the type of data fragments stored in the disk blocks. This work is an attempt to create a method of detection and classification of PNG data types for DECA which originally only identifies and extracts JPEG data. The PNG file format was examined in order to implement the PNG data detector that was integrated into DECA. We then examined the results of decision-theoretic file carving, implemented in DECA, combined with the implemented PNG data detector.",32,,300910,,Portable Network Graphics; Data type; JPEG; File carving; Deca-; Computer science; Database; Digital forensics; Detector,,,,,https://www.sciencedirect.com/science/article/pii/S2666281720300056,http://dx.doi.org/10.1016/j.fsidi.2020.300910,,10.1016/j.fsidi.2020.300910,3030862625,,0,,1,true,cc-by-nc-nd,hybrid 044-021-303-931-726,Network Forensics Analysis of Man in the Middle Attack Using Live Forensics Method,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Dedy Saputra; Riadi,,8,1,66,73,Man-in-the-middle attack; Live forensics; Computer security; Computer science; Network forensics,,,,,http://sdiwc.net/digital-library/network-forensics-analysis-of-man-in-the-middle-attack-using-live-forensics-method,http://dx.doi.org/10.17781/p002558,,10.17781/p002558,2946711436,,0,,4,false,, 044-212-524-673-427,Forensic Technique for Detecting Image Tampering using Statistical Intrinsic Fingerprints-A Survey,,2014,journal article,International Journal of Scientific Engineering and Technology,22771581,,,Dhanshri P. Patil,"The digital images are becoming important part in the field of information forensics and security, because of the popularity of image editing tools, digital images can be altered. Therefore it is must to create forensic techniques which is capable of detecting tampering in image. This paper reviews to the forensic methods for detecting contrast enhancement and copy-move forgery in image by identifying the features of each operation's intrinsic fingerprint.",3,7,919,920,Image (mathematics); Artificial intelligence; Geography; Image editing; Fingerprint (computing); Contrast enhancement; Copy move forgery; Computer vision; Field (computer science); Digital image; Digital forensics,,,,,https://www.indianjournals.com/ijor.aspx?target=ijor:ijset1&volume=3&issue=7&article=020,https://www.indianjournals.com/ijor.aspx?target=ijor:ijset1&volume=3&issue=7&article=020,,,2493333624,,0,000-980-904-065-103; 006-676-219-053-907; 023-624-827-239-301; 024-793-013-451-77X; 029-093-526-590-26X; 037-412-312-132-875; 040-425-146-348-064; 045-812-091-260-656; 053-875-001-621-170; 064-665-774-871-511; 076-346-829-732-533; 076-527-439-347-165; 089-196-708-023-731; 101-344-254-382-936; 104-279-390-845-094; 111-534-293-475-684; 133-788-221-347-278; 180-552-666-228-97X,2,false,, 044-295-409-596-282,Decision support for first responders and digital device prioritisation,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Graeme Horsman,,38,,301219,,Decision support system; Data science; Relation (database); First responder; Quality (business); Task (project management); Computer science; Process (engineering); Identification (information); Relevance (information retrieval),,,,,https://www.sciencedirect.com/science/article/abs/pii/S266628172100127X,http://dx.doi.org/10.1016/j.fsidi.2021.301219,,10.1016/j.fsidi.2021.301219,3175131308,,0,002-495-833-326-831; 013-568-618-083-770; 052-994-192-178-620; 067-844-385-207-96X; 077-339-303-043-478; 094-142-794-127-63X; 120-697-354-224-33X; 167-751-222-897-487; 187-762-907-549-695,1,false,, 044-617-125-816-983,Ethics in forensic science: Renewed commitments and a call for papers across the Forensic Science International family,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,37,,301207,301207,Forensic science; Engineering ethics; Forensic genetics,,,,,,http://dx.doi.org/10.1016/j.fsidi.2021.301207,,10.1016/j.fsidi.2021.301207,,,0,,0,true,,bronze 044-896-919-263-756,A Forensic Enabled Data Provenance Model for Public Cloud,,2018,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Shariful Haque; Travis Atkison,,13,3,47,66,Forensic science; Conceptual model (computer science); Data science; Provenance; Digital evidence; Cloud architecture; Computer science; Confidentiality; Cloud computing; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl13.html#HaqueA18 https://commons.erau.edu/jdfsl/vol13/iss3/7/ https://paperity.org/p/179699027/a-forensic-enabled-data-provenance-model-for-public-cloud https://doi.org/10.15394/jdfsl.2018.1570,http://dx.doi.org/10.15394/jdfsl.2018.1570,,10.15394/jdfsl.2018.1570,2913510281,,0,019-698-064-288-240; 022-517-091-282-12X; 028-328-874-304-52X; 029-859-696-996-816; 032-182-801-166-90X; 033-292-300-474-828; 035-661-294-852-768; 040-646-327-684-402; 043-325-403-302-464; 043-822-135-285-713; 045-778-650-696-16X; 047-600-704-780-223; 081-593-340-888-566; 082-260-669-254-279; 089-155-214-146-087; 093-493-966-186-07X; 151-944-242-677-668; 173-952-459-161-812; 191-014-103-069-742; 199-745-676-923-766,4,true,cc-by-nc,gold 045-098-715-794-977,A Strategic Model for Forensic Readiness,2018-06-01,2018,journal article,Athens Journal of Sciences,22418466,Athens Institute for Education and Research ATINER,,Jan Collie,"Forensic readiness has been defined as: ‘…the capability of an organisation to use digital evidence in a forensic investigation’. For businesses, especially medium or small enterprises, gaining this capability can seem time consuming and expensive: it may involve a number of processes, it may require new hardware and software and people with specialised skill sets may need to be hired in order to implement any plan. Yet developing and maintaining a forensic readiness capability is vital in the digital age. Fraud and cybercrime cost almost £11bn in the UK alone last year. Across the European Union, the national annual cost of cybercrime now accounts for 0.41% of GDP. Recent figures have also shown that up to 62% of digital incidents are caused by insiders, either accidentally or knowingly. An astonishing 91% of cybersecurity attacks begin with a single email. This research proposes a structured, strategic approach to forensic readiness for businesses that is economic to implement and run. It is based on people and processes rather than complex electronic systems. Key to this approach is a firm’s best asset - its own staff. It is theorised that the foundation stone of forensic readiness is a strong internal security culture. In order to achieve this aim, a unique, scalable model for efficient and inclusive planning is put forward with a reporting construct which aims to assure company-wide involvement.",5,2,167,182,Business; Construct (philosophy); Order (exchange); Cybercrime; Internal security; Digital evidence; European union; Knowledge management; Plan (drawing); Asset (computer security),,,,,http://oro.open.ac.uk/70042/ https://core.ac.uk/download/305114201.pdf,http://dx.doi.org/10.30958/ajs.5-2-4,,10.30958/ajs.5-2-4,2896577214,,0,007-394-596-774-68X; 009-182-817-779-31X; 010-806-135-547-042; 011-328-932-194-908; 021-486-901-460-202; 024-711-735-736-003; 058-723-704-218-926; 066-889-097-119-765; 074-014-335-505-388; 077-514-039-587-286; 080-484-311-806-796; 117-184-355-073-746; 128-954-454-555-916; 147-779-412-802-417; 149-690-584-371-491; 154-191-465-535-558; 189-593-155-056-756; 193-919-622-382-772; 198-826-055-129-939,8,true,cc-by-nc-nd,green 045-159-209-851-330,CAPABLE ARTIFICIAL INTELLIGENCE:DESIGNING AI FOR HUMAN VALUES AND SOCIETY,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Sanjeev Naira,,,,,,Artificial intelligence; Human values; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.06,http://dx.doi.org/10.46293/4n6/2020.02.03.06,,10.46293/4n6/2020.02.03.06,3095635357,,0,,0,false,, 045-199-576-491-919,Microsoft's Your Phone environment from a digital forensic perspective,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Patricio Domingues; Luis Miguel Andrade; Miguel Frade,,38,,301177,,Perspective (graphical); Mobile device; Task (computing); Software; Phone; Android device; Computer science; Multimedia; Android (operating system); Digital forensics,,,,Foundation for Science and Technology,https://www.sciencedirect.com/science/article/pii/S2666281721000858,http://dx.doi.org/10.1016/j.fsidi.2021.301177,,10.1016/j.fsidi.2021.301177,3169098502,,0,006-915-702-173-584; 017-335-677-993-203; 019-831-293-743-518; 023-484-098-291-123; 025-723-055-730-999; 028-041-981-721-013; 028-290-062-141-840; 032-664-290-593-804; 047-558-056-985-493; 055-390-544-993-752; 074-503-636-433-987; 076-889-170-335-628; 090-496-255-429-009; 099-185-063-500-623; 111-903-319-645-399; 117-065-920-586-287; 119-531-842-544-900; 124-912-663-881-389; 128-985-340-093-196; 131-696-619-498-120; 163-330-758-807-944,1,false,, 045-245-164-124-762,"Erasure, an attempt to surpass datafication",2019-09-24,2019,journal article,A Peer-Reviewed Journal About,22457755,Det Kgl. Bibliotek/Royal Danish Library,,Audrey Samson,"Selfies, email archives, twitter posts, likes, places, late night chat logs, health insurance records, bank transfers, search histories… all those bits of identity, involuntarily immortalised as personality profiles in corporate server farms. Could erasure offer some respite from endless datafication? This “undead media” (Chun 134) not only facilitates the surveillance apparatus, the persistence of data also affects how we remember. Digital death (post-mortem digital data ownership concerns) exemplifies how the structure and inner workings of network technologies and software platforms affect our experience in a tangible way. The following research is concerned with what kind of role the materiality of Internet technologies plays in post-mortem digital legacy, and how it bleeds into our mourning practices. It explores these questions by examining how Facebook and Google deal with digital death, and what kind of consequences the materiality of the network entails. The notions of materiality are understood here as a space of interaction between code and hardware (Hayles) and perceived materialization of phenomena iteratively configured by dynamics of “intra-actions” (Barad 140). In the examples considered I look at how terms of agreement apply to memory in the form of externalised tertiary retention in the process of “grammatization” (Stiegler 3). The research also looks at the biological human memory’s materiality and its need to forget (Kirschenbaum). I discuss the ne.me.quittes.pas project as a means to propose digital data funerals as an artistic strategy to make data tangible and to explore how these layers of stockpiled data constantly re-configure our identities. I argue that digital data funerals offer a symbolic ritualised gesture that draws attention to the materiality of data through tangible and physical degradation, in an attempt to surpass post-mortem datafication, and surveillance.",4,1,44,55,Server farm; Internet privacy; The Internet; Materiality (auditing); Engineering; Gesture; Datafication; Erasure; Digital data; Multimedia; Respite care,,,,,https://research.gold.ac.uk/id/eprint/27541 https://gala.gre.ac.uk/id/eprint/17176/ https://core.ac.uk/download/237430438.pdf,http://dx.doi.org/10.7146/aprja.v4i1.116104,,10.7146/aprja.v4i1.116104,2715961299,,0,,1,true,cc-by-nc-sa,gold 045-367-733-413-464,Research of Digital Forensics under Cloud Computing Environment,,2013,journal article,Netinfo Security,,,,Chen Guang-xua,"With the sharp growth of cloud computing,cyber-crimes associated with cloud computing or directly targeted to cloud has increased greatly.Currently,the progress of cloud forensics is still very limited on both technical aspect and legal aspect.These emerging cyber-crimes are a great challenge to the investigators who still adopt traditional digital forensics methods.This paper analyzes the difficulties and challenges of cloud forensics,and then indicates the main forensics object for cloud forensics.Finally,a set of new cloud forensics method,is process and technique is proposed.This paper can bring references for the investigators in investigating cloud associated cybercrimes.",,,,,Cloud computing security; Cloud forensics; Cyber crime; Computer security; Computer science; Process (engineering); Cloud computing; Digital forensics,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-XXAQ201308028.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-XXAQ201308028.htm,,,2365320207,,0,,3,false,, 045-434-062-171-544,Computer Forensics: A Linux Case Study Applied to Pedophilia CrimeInvestigation in Brazil,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Jeferson dos Santos Almeida; Diógenes Antonio Marques José Leonardo de Santana Nascimento,,8,1,31,42,Pedophilia; Computer security; Computer science; Wireless; Computer forensics,,,,,http://sdiwc.net/digital-library/computer-forensics-a-linux-case-study-applied-to-pedophilia-crimerninvestigation-in-brazil,http://dx.doi.org/10.17781/p002543,,10.17781/p002543,2940299278,,0,,1,false,, 045-521-021-813-200,"Digital Forensics and Cyber Forensics Investigation: Security Challenges, Limitations, Open Issues, and Future Direction",,2022,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,S. Awan; M. M. Rind; Mazhar Ali Dootio; Abdullah Ayub Khan; Aftab Ahmed Shaikh; Asif Ali Laghari,,1,1,1,,Computer security; Computer science; Digital forensics,,,,,http://www.inderscienceonline.com/doi/full/10.1504/IJESDF.2022.10037882,http://dx.doi.org/10.1504/ijesdf.2022.10037882,,10.1504/ijesdf.2022.10037882,3176611577,,0,,0,false,, 045-553-653-288-228,A Survey on Digital Forensics Trends,,2014,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Ali Dehghantanha; Ramlan Mahmoud Mohsen Damshenas,"1. ABSTRACT Digital forensic has evolved from addressing minor computer crimes to investigation of complex international cases with massive effect on the world. This paper studies the evolution of the digital forensic; its origins, its current position and its future directions. This paper sets the scene with exploring past literature on digital forensic approaches followed by the assessment and analysis of current state of art in both industrial and academic digital forensics research. The obtained results are compared and analyzed to provide a comprehensive view of the current digital forensics landscape. Furthermore, this paper highlights critical digital forensic issues that are being overlooked and not being addressed as deserved. The paper finally concludes with offering future research directions in this area.",3,4,209,234,Information system; Minor (academic); State of art; Computer science; Multimedia; Wireless; Digital forensics,,,,,https://sdiwc.us/digitlib/journal_paper.php?paper=00001141.pdf http://sdiwc.us/digitlib/journal_paper.php?paper=00001141.pdf http://sdiwc.net/digital-library/a-survey-on-digital-forensics-trends https://core.ac.uk/download/153811846.pdf,http://dx.doi.org/10.17781/p001347,,10.17781/p001347,2008054384,,0,000-116-031-001-044; 000-171-920-580-13X; 000-980-904-065-103; 001-067-333-050-958; 001-255-768-346-633; 001-303-259-599-142; 001-960-134-177-077; 002-449-146-256-491; 003-126-053-087-131; 003-182-041-034-40X; 003-412-732-826-511; 004-119-009-833-695; 004-553-537-193-953; 004-652-388-189-304; 004-706-447-836-905; 005-116-312-278-527; 005-296-771-590-748; 006-188-040-575-112; 007-832-595-971-443; 008-475-550-011-549; 008-676-252-106-807; 009-832-452-035-773; 011-051-740-313-213; 011-569-292-128-546; 011-972-444-921-827; 014-510-444-730-433; 014-595-195-942-667; 017-840-378-634-021; 018-406-989-580-901; 018-467-941-961-210; 019-166-656-621-783; 021-039-461-635-181; 021-081-859-033-024; 021-850-998-857-676; 023-767-546-806-478; 024-735-069-822-749; 025-090-019-547-487; 025-492-951-217-100; 025-743-892-862-313; 026-201-331-634-716; 027-265-141-482-204; 027-835-655-333-208; 028-026-250-612-723; 028-821-293-426-202; 028-863-985-414-208; 029-093-526-590-26X; 030-155-118-042-252; 030-209-733-733-785; 030-674-871-669-121; 031-234-153-523-379; 031-259-255-251-803; 031-542-664-705-080; 031-876-583-652-183; 033-241-817-699-448; 033-877-222-136-260; 034-095-325-733-017; 034-773-286-616-44X; 035-381-853-639-810; 036-584-979-326-138; 037-821-713-720-130; 041-277-806-049-882; 042-880-741-738-793; 044-834-247-088-997; 045-874-145-356-930; 049-724-213-633-947; 050-618-920-212-97X; 052-420-031-509-262; 055-090-334-937-061; 055-210-121-952-616; 055-915-511-599-512; 055-967-961-527-254; 058-448-820-778-759; 061-529-672-595-522; 062-712-470-776-220; 063-777-134-301-668; 064-170-716-528-26X; 064-484-797-196-528; 065-459-442-784-779; 073-399-840-863-155; 073-910-371-295-970; 074-503-617-334-537; 074-926-358-202-250; 075-976-616-114-109; 076-360-269-141-655; 078-598-867-814-365; 078-818-948-736-831; 079-331-405-716-414; 079-466-694-175-199; 080-585-092-668-778; 080-989-620-698-278; 081-032-497-600-401; 081-447-017-308-327; 081-743-188-303-332; 083-097-133-928-799; 083-495-367-906-30X; 085-547-032-022-62X; 087-287-912-803-488; 087-822-595-959-826; 088-568-925-253-101; 091-848-747-540-654; 092-656-354-398-685; 093-171-117-849-738; 093-372-732-871-479; 093-626-174-194-852; 094-135-298-524-825; 095-748-218-155-627; 095-897-732-435-890; 096-551-303-281-385; 097-123-801-131-393; 098-857-083-857-534; 100-974-105-975-105; 102-425-810-040-226; 102-697-093-502-764; 104-758-205-558-797; 105-427-271-392-801; 106-997-247-556-643; 108-086-708-688-274; 110-744-808-081-983; 122-164-403-164-304; 123-009-178-413-605; 124-837-341-752-034; 128-940-875-499-986; 130-547-183-065-459; 132-173-993-325-143; 133-580-170-945-047; 133-586-699-042-46X; 134-927-490-231-285; 135-396-441-868-382; 139-495-561-188-858; 142-657-351-097-509; 142-816-347-811-541; 149-010-267-691-537; 150-249-549-372-358; 150-327-843-369-29X; 151-061-311-529-230; 160-104-273-869-923; 163-843-472-725-971; 166-178-398-716-39X; 166-842-256-824-283; 171-083-956-573-469; 171-483-137-477-150; 176-877-270-345-361; 177-615-975-039-432; 185-343-535-827-64X; 191-324-551-329-724; 192-955-966-543-738; 194-965-580-194-055; 199-172-967-270-034,26,true,,green 045-625-431-295-190,A Spatial Domain Approach of Fingerprinting for Colored Digital Images,2013-10-25,2013,journal article,INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY,22773061,CIRWOLRD,,Vineet Mehan; Renu Dhir; Yadwinder Singh Brar,"In this paper, a spatial domain approach of fingerprinting is presented for colored digital images. A semi-blind fingerprinting conveys a secure arrangement for trading of digital images. The operational significance of the digital fingerprinting system is verified and estimated. Digital fingerprint implanted doesn’t disturb the perceptible feature of the host digital image. Multi-user collusion attacks are prevented using the proposed apparoach. Variable fingerprint size and dissimilar location insertion play significant role for inhibiting attack.",11,1,2156,2160,Artificial intelligence; Colored; Spatial domain; Computer vision; Computer science; Digital image,,,,,https://www.rajpub.com/index.php/ijct/article/download/1185/pdf_231 https://core.ac.uk/download/322473297.pdf,http://dx.doi.org/10.24297/ijct.v11i1.1185,,10.24297/ijct.v11i1.1185,2801255412,,0,,0,true,cc-by,hybrid 045-639-857-637-749,PC3000 Portable III In Digital Forensics,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Igor Michailov,,,,,,Computer science; Multimedia; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.03,http://dx.doi.org/10.46293/4n6/2020.02.04.03,,10.46293/4n6/2020.02.04.03,3097173081,,0,,0,false,, 045-987-509-678-377,Methods to Acquire an Image from “Bricked” Android Device.,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Djalma Fonseca,,,,40,43,Image (mathematics); Artificial intelligence; Android device; Computer vision; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.06,http://dx.doi.org/10.46293/4n6/2020.02.02.06,,10.46293/4n6/2020.02.02.06,3022679688,,0,,1,false,, 045-998-921-549-343,A Computer in Digital Forensic: Computer Forensic,2022-06-06,2022,journal article,INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT,25823930,Indospace Publications,,IJSREM Journal,"The report focuses on computers' roles in digital forensics. All of these industries are implementing digitalization into their operations as the globe progresses toward digitalization. As a result of digitalization, working methods are becoming more productive and convenient. To employ digitalization, all we need is a computer or a system. Some forensics software tools are available, but they must be loaded on computers in order to complete the operation. It gives us the advantage of being able to operate quickly. Crimes committed have grown increasingly frequent in electronic or digital worlds, particularly cyber. Technology is being used by criminals to commit crimes, providing new obstacles for law enforcement agents, lawyers, magistrates, army members, and security experts.",6,6,,,Commit; Digital forensics; Computer forensics; Law enforcement; Globe; Computer security; Computer science; Digital evidence; Order (exchange); Cyber crime; Law; World Wide Web; Business; Political science; The Internet; Database; Medicine; Finance; Ophthalmology,,,,,,http://dx.doi.org/10.55041/ijsrem14213,,10.55041/ijsrem14213,,,0,,0,true,,hybrid 046-034-142-979-678,Identification of source mobile hand sets using audio latency feature.,2019-02-25,2019,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Ashu Goyal; S.K. Shukla; R.K. Sarin,,298,,332,335,Sound recording and reproduction; Software; Speech recognition; Computer science; Latency (audio); Digital audio,Digital audio editing software; Digital audio recording; Source correspondence,,,,https://www.ncbi.nlm.nih.gov/pubmed/30927719 https://www.sciencedirect.com/science/article/pii/S0379073819300635 https://pubag.nal.usda.gov/catalog/6339544,http://dx.doi.org/10.1016/j.forsciint.2019.02.031,30927719,10.1016/j.forsciint.2019.02.031,2917329393,,0,059-705-292-558-832; 106-345-153-172-370; 136-614-990-140-254,6,false,, 046-339-711-582-310,An Advanced Educational Tool for Digital Forensic Engineering,2016-03-30,2016,journal article,International Journal of Emerging Technologies in Learning (iJET),18630383; 18688799,International Association of Online Engineering (IAOE),Germany,Primož Cigoj; Borka Jerman Blažič,"This paper presents a novel approach to education in the area of digital forensics based on a multi-platform cloud-computer infrastructure and an innovative computer based tool. The tool is installed and available through the cloud-based infrastructure of the Dynamic Forensic Education Alliance. Cloud computing provides an efficient mechanism for a wide range of services that offer real-life environments for teaching and training cybersecurity and digital forensics. The cloud-based infrastructure, the virtualized environment and the developed educational tool enable the construction of a dynamic e-learning environment making the training very close to reality and to real-life situations. The paper presents the Dynamic Forensic Digital tool named EduFors and describes the different levels of college and university education where the tool is introduced and used in the training of future investigators of cybercrime events.",11,03,15,23,World Wide Web; Data science; Cybercrime; Computer based; University education; Computer science; Cloud computing; Digital forensics,,,,,http://dblp.uni-trier.de/db/journals/ijet/ijet11.html#CigojB16 https://online-journals.org/index.php/i-jet/article/view/5294 https://www.learntechlib.org/p/172227 https://dblp.uni-trier.de/db/journals/ijet/ijet11.html#CigojB16 http://www.learntechlib.org/p/172227,http://dx.doi.org/10.3991/ijet.v11i03.5294,,10.3991/ijet.v11i03.5294,2318295128,,0,,1,true,cc-by,gold 046-357-391-782-442,Evidence and Forensics in the Cloud: Challenges and Future Research Directions,,2017,journal article,IEEE Cloud Computing,23256095,Institute of Electrical and Electronics Engineers (IEEE),United States,Kim-Kwang Raymond Choo; Christian Esposito; Aniello Castiglione,"Digital investigation in the cloud is challenging, but there's also opportunities for innovations in digital forensic solutions (such as remote forensic collection of evidential data from cloud servers client devices and the underlying supporting infrastructure such as distributed file systems). This column describes the challenges and opportunities in cloud forensics.",4,3,14,19,Cloud testing; Column (database); Cryptography; Cloud computing security; Computer security; Computer science; Network forensics; Cloud computing; Digital forensics; Server,,,,,https://ieeexplore.ieee.org/abstract/document/7962121 https://doi.org/10.1109/MCC.2017.39 https://www.computer.org/csdl/magazine/cd/2017/03/mcd2017030014/13rRUyekIZn http://ieeexplore.ieee.org/document/7962121 https://dblp.uni-trier.de/db/journals/cloudcomp/cloudcomp4.html#ChooEC17,http://dx.doi.org/10.1109/mcc.2017.39,,10.1109/mcc.2017.39,2726142957,,0,006-570-693-842-502; 010-986-818-338-726; 015-654-094-120-991; 024-894-908-869-686; 028-290-062-141-840; 033-856-227-156-292; 038-349-842-640-663; 041-879-975-858-398; 047-221-550-114-462; 057-421-097-368-120; 061-960-915-134-527; 074-503-636-433-987; 085-276-013-350-220; 091-540-399-535-662; 095-691-114-276-825; 101-091-831-428-576; 125-939-677-745-616; 130-093-060-692-651; 132-342-259-584-364; 141-018-737-327-365; 144-124-797-675-052; 155-078-493-307-765; 162-226-718-103-313,21,false,, 046-651-457-949-450,Novel Approach for Forensics Investigation in Cloud Computing Environments,,2016,journal article,"International Journal of Management, IT, and Engineering",,,,Anwar Khan; Savita Rathore,"A traditional digital analysis imply that, with stand alone forensic workstations, analyst are able to achieve a assortment of forensic tasks in sequence, next to limited datasets extract starting target artifact, and assess correspondent results. As a outcome, there is an urgent require to discover novel solution to get better digital examination effectiveness. To solve the concern outline more than, the paper describe an investigative platform for distributed forensic data processing, intended at taking benefit of together mobility and cloud computing capabilities. We integrate logs besides the log with our proof-of-concept application. After an occurrence has been detected and report in a distributed environment such as the Cloud, it is complex to recognize locations where evidence can be collect. Our technique involved in conduct a digital forensic search in the Cloud as well exhibit how the technique nearby in this research minimizes terms of monitory values. An examination of cloud service usage, the efficiency of acquirement methods, an considerate of commercial cloud environment, an investigation of cloud forensic management. furthermore, we experiment on dissimilar accumulators to discover the best fitted accumulate or algorithm.",6,4,27,38,Data processing; Data science; Artifact (software development); Digital examination; Digital analysis; Mathematics; Distributed Computing Environment; Workstation; Cloud computing; Digital forensics,,,,,http://www.indianjournals.com/ijor.aspx?target=ijor:ijmie&volume=6&issue=4&article=003,http://www.indianjournals.com/ijor.aspx?target=ijor:ijmie&volume=6&issue=4&article=003,,,2992408728,,0,,0,false,, 046-729-995-059-874,Considering 'technically possible' alternative meanings for data traces found during a digital forensic examination,2022-05-09,2022,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Graeme Horsman,,,,1,10,Digital forensics; Forensic science; Forensic examination; Computer science; Data science; Psychology; Computer security,,,,,,http://dx.doi.org/10.1080/00450618.2022.2071988,,10.1080/00450618.2022.2071988,,,0,005-715-450-998-72X; 010-963-610-208-920; 023-858-572-607-02X; 054-145-255-092-055; 058-717-000-287-105; 059-397-656-514-952; 073-790-480-897-758; 101-549-415-202-81X; 134-927-490-231-285; 142-790-196-752-819,0,false,, 046-814-931-566-523,Grouping of Professionals in Cyber Forensics,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Santosh Khadsare,,,,,,Computer security; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.15,http://dx.doi.org/10.46293/4n6/2020.02.03.15,,10.46293/4n6/2020.02.03.15,3097525611,,0,,0,false,, 046-857-308-211-173,Nugget: A digital forensics language,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Christopher Stelly; Vassil Roussev,"Abstract One of the long-standing conceptual problems in digital forensics is the dichotomy between the imperative for verifiable and reproducible forensic computations, and the lack of adequate mechanisms to accomplish these goals. With over thirty years of professional practice, investigator notes are still the main source of reproducibility information, and much of it is tied to the functions of specific, often proprietary, tools. In this work, we discuss the design and implementation of a domain specific language (DSL) called nugget, which aims to enable the practical formal specification of digital forensic computations in a tool-agnostic fashion. The core idea of DSLs, such as SQL, is to create an intuitive means for domain experts to describe what computation needs to be performed while abstracting away the technical means of its implementation. In the context of digital forensics, nugget aims to address the following requirements: 1) provide investigators with the means to easily and completely specify the data flow of a forensic inquiry from data source to final results; 2) allow the fully automatic (and optimized) execution of the forensic computation; 3) provide a complete, formal, and auditable log of the inquiry.",24,,S38,S47,Software engineering; Formal specification; Domain (software engineering); Digital subscriber line; Context (language use); Computer science; Data flow diagram; SQL; Digital forensics; Verifiable secret sharing,,,,,https://www.sciencedirect.com/science/article/pii/S1742287618300380 https://doi.org/10.1016/j.diin.2018.01.006 https://dblp.uni-trier.de/db/journals/di/di24.html#StellyR18,http://dx.doi.org/10.1016/j.diin.2018.01.006,,10.1016/j.diin.2018.01.006,2793724466,,0,004-190-067-200-599; 004-611-973-316-051; 010-882-950-408-035; 015-654-094-120-991; 025-329-967-266-177; 033-241-817-699-448; 053-363-195-142-469; 085-138-340-371-322; 097-943-611-521-722; 111-471-986-310-852; 114-903-270-116-216; 115-787-295-968-707; 122-410-119-508-633; 134-927-490-231-285; 137-285-170-428-190; 142-884-607-464-932; 146-548-188-554-839; 153-705-882-254-449; 157-954-859-648-506; 192-651-528-538-864,5,true,cc-by-nc-nd,hybrid 046-941-310-744-835,Crossing Borders: Forensic Science and the Fourth Industrial Revolution.,2019-11-19,2019,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Zeno Geradts,,65,1,6,7,Forensic science; Political science; Law; Industrial Revolution,,,,,https://onlinelibrary.wiley.com/doi/pdf/10.1111/1556-4029.14236 https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.14236 https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F4a409571-a5c0-4033-a8ea-cfe9fc341b48 https://www.ncbi.nlm.nih.gov/pubmed/31743448,http://dx.doi.org/10.1111/1556-4029.14236,31743448,10.1111/1556-4029.14236,2991203514,,0,009-168-289-731-644; 087-342-951-350-054,0,false,, 047-221-550-114-462,Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data,2016-07-22,2016,journal article,Software: Practice and Experience,00380644; 1097024x,Wiley,United States,Darren Quick; Kim-Kwang Raymond Choo,"The growth in the data volume and number of evidential data from heterogeneous distributed systems in smart cities, such as cloud and fog computing systems and Internet-of-Things devices e.g. IP-based CCTVs, has led to increased collection, processing and analysis times, potentially resulting in vulnerable persons e.g. victims of terrorism incidents being at risk. A process of Digital Forensic Data Reduction of source multimedia and forensic images has provided a method to reduce the collection time and volume of data. In this paper, a methodology of Digital Forensic Quick Analysis is outlined, which describes a method to review Digital Forensic Data Reduction subsets to pinpoint relevant evidence and intelligence from heterogeneous distributed systems in a timely manner. Applying the proposed methodology to real-world data from an Australian police agency highlighted the timeliness of the process, resulting in significant improvements in processing times in comparison with processing a full forensic image. The Quick Analysis methodology, combined with Digital Forensic Data Reduction, has potential to locate evidence and intelligence in a timely manner. Copyright © 2016 John Wiley & Sons, Ltd.",47,8,1095,1109,Volume (computing); Distributed computing; Agency (sociology); Forensic science; Data reduction; Data management; Computer science; Process (engineering); Multimedia; Cloud computing; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/spe/spe47.html#QuickC17 https://onlinelibrary.wiley.com/doi/10.1002/spe.2429 https://dl.acm.org/doi/10.1002/spe.2429 https://doi.org/10.1002/spe.2429,http://dx.doi.org/10.1002/spe.2429,,10.1002/spe.2429,2497280683,,0,007-803-508-283-309; 018-618-238-562-758; 034-457-407-452-804; 039-150-867-031-328; 042-767-661-429-064; 046-505-599-865-150; 058-561-577-068-996; 068-459-443-764-162; 068-561-870-711-787; 069-754-697-292-909; 083-322-626-930-350; 086-250-543-936-924; 090-691-670-579-649; 156-972-666-676-888; 163-330-758-807-944,35,false,, 047-325-648-776-516,Applying Digital Forensics to Service Oriented Architecture,,2020,journal article,International Journal of Web Services Research,15457362; 15465004,IGI Global,United States,Aymen Akremi; Hassen Sallay; Mohsen Rouached; Rafik Bouaziz,"Digital forensics is an emerging research field involving critical technologies for obtaining evidence in digital crime investigations. Several methodologies, tools, and techniques have been developed to deal with the acquisition, preservation, examination, analysis, and presentation of digital evidence from different sources. However, new emerging infrastructures such as service-oriented architecture has brought new serious challenges for digital forensic research to ensure that evidence will be neutral, comprehensive, and reliable in such complex environment is a challenging research task. To address this issue, the authors propose in this article a generic conceptual model for digital forensics methodologies to enable their application in a service-oriented architecture. Challenges and requirements to construct a forensically sound evidence management framework for these environments are also discussed. Finally, the authors show how digital forensics standards and recommendations can be mapped to service-oriented architecture.",17,1,17,42,Computer science; Multimedia; Service-oriented architecture; Digital forensics,,,,,https://www.igi-global.com/article/applying-digital-forensics-to-service-oriented-architecture/245307 https://dblp.uni-trier.de/db/journals/jwsr/jwsr17.html#AkremiSRB20,http://dx.doi.org/10.4018/ijwsr.2020010102,,10.4018/ijwsr.2020010102,2997874685,,0,000-087-695-314-553; 001-507-239-208-313; 002-588-694-636-954; 003-296-552-356-852; 005-515-442-506-880; 005-630-640-664-939; 005-997-056-658-776; 010-414-070-550-327; 010-477-959-231-417; 016-150-300-348-872; 016-196-892-326-944; 018-245-873-246-94X; 019-698-064-288-240; 020-944-423-224-895; 026-774-296-742-022; 027-158-847-348-062; 028-103-684-022-268; 028-236-232-769-781; 032-229-233-316-986; 038-600-361-842-907; 039-423-460-322-861; 041-059-041-666-09X; 041-879-975-858-398; 043-557-483-984-559; 045-653-496-451-172; 046-395-342-063-537; 047-859-979-695-194; 049-216-276-407-671; 050-795-675-445-565; 054-601-093-496-749; 057-269-936-036-693; 059-697-278-686-056; 063-274-848-736-685; 065-882-272-263-097; 071-892-155-311-13X; 075-142-959-030-889; 077-702-229-787-594; 080-911-646-702-976; 088-239-867-090-166; 088-265-355-291-06X; 089-760-389-684-915; 090-819-867-759-870; 098-748-261-333-651; 110-619-142-027-944; 111-451-688-160-800; 113-691-446-842-345; 116-418-933-702-149; 116-908-834-541-492; 127-948-386-055-225; 130-217-725-914-477; 130-678-713-954-211; 131-922-138-141-529; 132-081-686-366-385; 134-927-490-231-285; 135-106-811-076-617; 144-124-797-675-052; 148-818-207-232-713; 163-330-758-807-944; 176-493-519-358-203; 180-048-913-144-640; 183-000-233-873-221; 188-762-236-378-448; 190-065-821-748-92X,4,false,, 047-386-524-667-691,Tool testing and reliability issues in the field of digital forensics,,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Graeme Horsman,"Abstract The digital forensic discipline is wholly reliant upon software applications and tools designed and marketed for the acquisition, display and interpretation of digital data. The results of any subsequent investigation using such tools must be reliable and repeatable whilst supporting the establishment of fact, allowing criminal justice proceedings the ability to digest any findings during the process of determining guilt or innocence. Errors present at any stage of an examination can undermine an entire investigation, compromising any potentially evidential results. Despite a clear dependence on digital forensic tools, arguably, the field currently lacks sufficient testing standards and procedures to effectively validate their usage during an investigation. Digital forensics is a discipline which provides decision-makers with a reliable understanding of digital traces on any device under investigation, however, it cannot say with 100% certainty that the tools used to undertake this process produce factually accurate results in all cases. This is an increasing concern given the push for digital forensic organisations to now acquire ISO 17025 accreditation. This article examines the current state of digital forensic tool-testing in 2018 along with the difficulties of sufficiently testing applications for use in this discipline. The results of a practitioner survey are offered, providing an insight into industry consensus surrounding tool-testing and reliability.",28,,163,175,Data science; Innocence; Digital data; Computer science; Process (engineering); Reliability (statistics); State (computer science); Accreditation; Certainty; Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S1742287618303062 https://dblp.uni-trier.de/db/journals/di/di28.html#Horsman19a https://doi.org/10.1016/j.diin.2019.01.009 https://research.tees.ac.uk/en/publications/tool-testing-and-reliability-issues-in-the-field-of-digital-foren,http://dx.doi.org/10.1016/j.diin.2019.01.009,,10.1016/j.diin.2019.01.009,2912047161,,0,004-652-388-189-304; 016-983-559-523-04X; 018-182-926-340-45X; 019-831-293-743-518; 021-039-461-635-181; 029-537-963-034-821; 030-918-415-827-067; 036-112-898-081-145; 054-004-313-233-495; 057-720-182-045-334; 064-376-774-486-022; 075-950-021-558-098; 083-582-672-677-836; 095-080-443-019-181; 099-676-137-335-314; 106-885-306-836-498; 113-462-435-754-981; 124-776-641-347-974; 127-053-349-240-432; 131-807-250-432-699; 134-927-490-231-285; 143-427-291-811-40X; 156-571-272-274-491; 173-622-542-280-95X; 178-883-713-153-793; 187-762-907-549-695; 199-745-676-923-766,32,true,,green 047-506-171-504-11X,An improved multiscale retinex algorithm for motion-blurred iris images to minimize the intra-individual variations,,2013,journal article,Pattern Recognition Letters,01678655,Elsevier BV,Netherlands,D’yia Sarah Md Shukri; Hishammuddin Asmuni; Razib M. Othman; Rohayanti Hassan,,34,9,1071,1077,Iris recognition; Image (mathematics); Artificial intelligence; Motion (geometry); Color constancy; Shadow; Contrast (vision); Iris (anatomy); Intensity histogram; Computer vision; Computer science; Homomorphic filtering,,,,,https://www.sciencedirect.com/science/article/pii/S0167865513000755 https://dblp.uni-trier.de/db/journals/prl/prl34.html#ShukriAOH13 https://ui.adsabs.harvard.edu/abs/2013PaReL..34.1071M/abstract https://doi.org/10.1016/j.patrec.2013.02.017,http://dx.doi.org/10.1016/j.patrec.2013.02.017,,10.1016/j.patrec.2013.02.017,2093180818,,0,000-572-372-633-639; 002-697-172-267-197; 020-101-214-418-794; 023-870-771-510-388; 026-746-017-380-287; 029-876-298-965-058; 032-905-558-553-235; 033-026-607-100-802; 040-177-578-613-60X; 047-135-434-146-191; 047-893-068-506-03X; 052-030-809-178-094; 063-129-579-655-156; 069-347-007-137-883; 069-642-328-160-330; 079-612-757-242-030; 092-391-596-016-423; 093-580-351-555-428; 104-579-905-493-951; 120-783-971-558-088; 124-919-630-700-053; 141-310-715-068-33X,17,false,, 047-592-632-721-234,Prelim i - Editorial Board,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,32,,300938,300938,Editorial board; Computer science; Library science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30100-1,,10.1016/s2666-2817(20)30100-1,,,0,,0,true,,bronze 047-907-955-930-528,Social Network Forensics For LEA,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Hriday Raval,,,,,,Computer security; Computer science; Social network,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.07,http://dx.doi.org/10.46293/4n6/2021.03.02.07,,10.46293/4n6/2021.03.02.07,3161056888,,0,,0,false,, 047-939-884-728-387,Law and Judicial Application of Digital Forensic Evidence in Nigeria,,2020,journal article,"Journal of Law, Policy and Globalization",,"International Institute for Science, Technology and Education",,,"The development of information & communication technology has left the Nigerian polity to the application of technology infrastructure to daily activities. In essence, disputes arising from these activities may ordinarily not be effectively settled without applying electronic evidence in proceedings before the courts. The skills and knowledge of electronic evidence require the ingenuity of forensic experts or examiners for the purpose of bridging the gap that may arise in the mind of the courts. Does the Nigerian Law accept forensic expert evidence? Is every evidence expert evidence? Are there set down conditions before the courts for forensic expert evidence to be accepted or applied to proceedings before the courts? What nature of cases requires forensic evidence? This paper  will  demonstrate how  information and communication technology has resulted in the application of digital devices by Nigerians and the nature of the impact it  has . Keywords: Digital Forensics Evidence, Forensics Examiners, Digital Forensics Experts, Law, Judicial application DOI: 10.7176/JLPG/96-08 Publication date: April 30th 202",,,,,,,,,,https://core.ac.uk/download/pdf/327151750.pdf,http://dx.doi.org/10.7176/jlpg/96-08,,10.7176/jlpg/96-08,,,0,,0,true,cc-by,hybrid 048-228-308-826-291,The Need for a New Data Processing Interface for Digital Forensic Examination,,2012,journal article,International Journal of Advanced Research in Artificial Intelligence,21654069; 21654050,The Science and Information Organization,,Inikpi O Ademu; Chris Imafidon,"Digital forensic science provides tools, techniques and scientifically proven methods that can be used to acquire and analyze digital evidence. There is a need for law enforcement agencies, government and private organisations to invest in the advancement and development of digital forensic technologies. Such an investment could potentially allow new forensic techniques to be developed more frequently. This research identifies techniques that can facilitates the process of digital forensic investigation, therefore allowing digital investigators to utilize less time and fewer resources. In this paper, we identify the Visual Basic Integrated Development Environment as an environment that provides set of rich features which are likely to be required for developing tools that can assist digital investigators during digital forensic investigation. Establishing a user friendly interface and identifying structures and consistent processes for digital forensic investigation has been a major component of this research.",1,4,,,World Wide Web; Interface (Java); Visual Basic; Law enforcement; Digital evidence; Computer science; Process (engineering); Component (UML); User Friendly; Digital forensics,,,,,https://thesai.org/Publications/ViewPaper?Volume=1&Issue=4&Code=IJARAI&SerialNo=2 https://thesai.org/Downloads/IJARAI/Volume1No4/Paper_2-The_Need_for_a_New_Data_Processing_Interface_for_Digital_Forensic_Examination.pdf,http://dx.doi.org/10.14569/ijarai.2012.010402,,10.14569/ijarai.2012.010402,2135235429,,0,004-872-169-627-620; 015-455-002-340-996; 019-831-293-743-518; 046-867-351-033-973; 048-576-750-040-030; 119-234-785-721-155; 153-153-144-072-106; 157-954-859-648-506; 158-262-072-312-063; 158-630-449-182-358; 168-712-754-489-980; 170-299-458-679-224,0,true,cc-by,hybrid 048-250-488-210-056,Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science,2017-12-28,2017,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Eoghan Casey,"This work introduces novel methods for conducting forensic analysis of file allocation traces, collectively called digital stratigraphy. These in-depth forensic analysis methods can provide insight into the origin, composition, distribution, and time frame of strata within storage media. Using case examples and empirical studies, this paper illuminates the successes, challenges, and limitations of digital stratigraphy. This study also shows how understanding file allocation methods can provide insight into concealment activities and how real-world computer usage can complicate digital stratigraphy. Furthermore, this work explains how forensic analysts have misinterpreted traces of normal file system behavior as indications of concealment activities. This work raises awareness of the value of taking the overall context into account when analyzing file system traces. This work calls for further research in this area and for forensic tools to provide necessary information for such contextual analysis, such as highlighting mass deletion, mass copying, and potential backdating.",63,5,1383,1391,Empirical research; Data science; Copying; Context (language use); Stratigraphy (archaeology); File system; Digital evidence; Computer science; Context analysis; Digital forensics,best-fit file allocation; contextual forensic analysis; digital evidence; digital forensics; digital stratigraphy; file allocation strategies; file initialization; file system analysis; file tunneling; forensic science; next-available file allocation; valid data length slack,,,,https://www.ncbi.nlm.nih.gov/pubmed/29284066 https://dialnet.unirioja.es/servlet/articulo?codigo=6583741 https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.13722 http://europepmc.org/abstract/MED/29284066 https://core.ac.uk/download/226984361.pdf,http://dx.doi.org/10.1111/1556-4029.13722,29284066,10.1111/1556-4029.13722,2781008863,,0,001-507-239-208-313; 010-127-508-296-844; 022-712-934-601-162; 073-194-524-558-213; 150-354-696-101-675; 165-189-591-866-290,7,true,,green 048-256-115-288-552,Survey on Different Phases of DigitalForensics Investigation Models,2015-03-30,2015,journal article,International Journal of Innovative Research in Computer and Communication Engineering,23209798; 23209801,Ess & Ess Research Publications,,Priya S. Patil; A. S. Kapse,"Most forensics models focus on the investigative process and its different phases and are characterized by a rather informal and intuitive approach. When a formalized process been introduced, in 1984, a new and improved computer forensics investigation processes have been developed. A digital forensics investigation is a process that used science and technology to examine digital objects and tests theories, which can be entered into a court of law, to answer questions about events that occurred. There is various digital forensics investigation models which consist different phases. The interchanging one or any steps may lead the incomplete results hence wrong interpretation and conclusion. In this paper we reviewed a few investigation processes or models; discuss the phases and identifying common phases.",3,3,1529,1534,Data mining; Forensic science; Data science; Digital forensic process; Focus (computing); Computer science; Process (engineering); Interpretation (philosophy); Computer forensics; Digital forensics,,,,,https://www.omicsonline.org/peer-reviewed/survey-on-different-phases-of-digitalforensics-investigation-models-53809.html https://www.rroij.com/open-access/survey-on-different-phases-of-digitalforensics-investigation-models.pdf https://www.rroij.com/open-access/survey-on-different-phases-of-digitalforensics-investigation-models.php?aid=53809,http://dx.doi.org/10.15680/ijircce.2015.0303018,,10.15680/ijircce.2015.0303018,2329603696,,0,005-465-138-684-882; 032-697-093-668-898; 038-668-970-194-854; 055-628-715-083-217; 062-539-825-048-788; 067-950-012-629-210; 163-581-541-690-876; 199-745-676-923-766,3,false,, 048-391-273-328-232,Editorial - Crisis or opportunity?,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Eoghan Casey,,32,,300961,,,,,,,https://doi.org/10.1016/j.fsidi.2020.300961 https://www.sciencedirect.com/science/article/pii/S2666281720301396,http://dx.doi.org/10.1016/j.fsidi.2020.300961,,10.1016/j.fsidi.2020.300961,3014128139,,0,,0,false,, 048-915-789-168-246,Expert didactics in the conditions of the third digital revolution,,2020,journal article,Issues of Forensic Science,05522153,Centralne Laboratorium Kryminalistyczne Policji,,Olga Nedashkivska,"The author raises the issue of the effective application of modern approaches in didactics in the process of training forensic experts, which is related to the specifics of activities in the field of forensic examination and to the requirements and needs of modern digital society. The purpose of the study is to analyze the existing approaches to the training of forensic experts and their skills development, as well as systematic coverage of practical problems of application of the latest didactic approaches in the field. The research was conducted by analyzing the existing classical educational approaches for the training of forensic experts in relevant fields. Taking into account the requirements of modernity associated with the total digitalization of all social and state processes the research determines the need to modernize the basic didactic techniques. The article proposes a systematic solution to the problem – the development and implementation of the latest digital platforms for the training of forensic experts in order to effectively apply their upgraded skills in practice.",308,,65,68,Engineering; Visual arts; Digital Revolution,,,,,http://dx.doi.org/10.34836/pk.2020.308.4,http://dx.doi.org/10.34836/pk.2020.308.4,,10.34836/pk.2020.308.4,3151838372,,0,,0,false,, 049-034-573-414-379,Prelim iii - Contents List,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,40,,301384,301384,Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00065-8,,10.1016/s2666-2817(22)00065-8,,,0,,0,true,,bronze 049-040-456-790-093,Application Information for Forensic Analysis Considerations for Registered Host / Users / Device Name & Bearer Tokens,2022-07-15,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Rosemond O. Addo-Sampong,"As the dependence on digital information and the Internet continues to grow, it changes the way of computer crime. The number of computer crimes increases dramatically in recent years and investigators have been facing the difficulty of admissibility of digital evidence. To solve this problem, we must collect evidence by digital forensics techniques and analyze the digital data or recover the damaged data. One place to collect evidence is from application software. This paper seeks to find out how to collect, store and analyze application information for forensic purposes. This is also to determine gaps in current research works and proffer recommendations on what future works relate to application forensics. Keywords: Digital Forensics, Evidence, Application Information, Analysis, Registered Host BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Rosemond O. Addo-Sampong (2022): Application Information for Forensic Analysis (Considerations for Registered Host / Users / Device Name & Bearer Tokens) Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 167-172 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P27",1,1,167,172,Digital evidence; Computer forensics; Digital forensics; Computer science; Nexus (standard); Host (biology); Network forensics; The Internet; Computer security; World Wide Web; Internet privacy; Data science,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p27,,10.22624/aims/crp-bk3-p27,,,0,,0,false,, 049-049-045-343-425,Mobile Forensic Investigation of Fake News Cases on Instagram Applications with Digital Forensics Research Workshop Framework,2022-07-20,2022,journal article,International Journal of Artificial Intelligence Research,25797298,STMIK Dharma Wacana,,Imam Riadi; Herman Herman; Irhash Ainur Rafiq,"The number of digital crimes or cybercrimes today continues to increase every year, and lately a lot of it happens on social media like Instagram. The social behavior of today's people who communicate more through social media encourages the perpetrators of these digital crimes. Instagram is a social media that is often found content that contains elements of pornography, hoax news, hate speech, etc. This research is aimed at processing digital evidence of cases of the spread of hoax news on the Instagram application. This research follows the framework of the Digital Forensics Research Workshop (DFRWS) with six stages, namely identification, preservation, collection, examination, analysis, and presentation. The process of obtaining digital evidence is assisted by the application of Axiom Magnet and Cellebrite UFED. Digital evidence sought from the smartphone device of the suspected hoax news disseminator seized following the case scenario consists of 8 variables in the form of accounts, emails, images, videos, URLs, times, IP address, and location. The results of this research with the help of the application of Magnet Axiom digital proof obtained 87.5% and the Cellebrite UFED application of 68.75%. The results of this study show that Magnet Axiom has better performance than MOBILedit Forensics.",6,2,,,Hoax; Digital forensics; Social media; Digital evidence; Computer science; Internet privacy; Digital media; Presentation (obstetrics); Computer security; World Wide Web; Advertising; Business; Medicine; Alternative medicine; Pathology; Radiology,,,,,,http://dx.doi.org/10.29099/ijair.v6i2.311,,10.29099/ijair.v6i2.311,,,0,,0,true,,gold 049-182-076-079-260,Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Cinthya Grajeda; Laura Sanchez; Ibrahim Baggili; Devon R. Clark; Frank Breitinger,"Abstract While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. The Artifact Genome Project (AGP) has aimed to create the largest vetted and freely available digital forensics repository for Curated Forensic Artifacts (CuFAs). This paper details the experience of building, implementing, and maintaining such a system by sharing design decisions, lessons learned, and future work. We also discuss the impact of AGP in both the professional and academic realms of digital forensics. Our work shows promise in the digital forensics academic community to champion the effort in curating digital forensic artifacts by integrating AGP into courses, research endeavors, and collaborative projects.",26,,S47,S58,Domain (software engineering); Data science; Champion; Artifact (software development); Academic community; Computer science; Digital forensics; Genome project,,,,National Science Foundation; National Science Foundation; U.S. Department of Homeland Security; U.S. Department of Homeland Security,https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1077&context=electricalcomputerengineering-facpubs https://www.sciencedirect.com/science/article/pii/S1742287618302007 https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/76/ https://dblp.uni-trier.de/db/journals/di/di26.html#GrajedaSBCB18 https://www.sciencedirect.com/science/article/abs/pii/S1742287618302007,http://dx.doi.org/10.1016/j.diin.2018.04.021,,10.1016/j.diin.2018.04.021,2884399119,,0,001-520-732-812-81X; 002-044-330-972-492; 002-768-711-065-857; 003-504-554-245-316; 004-190-067-200-599; 008-667-688-301-190; 010-985-077-415-59X; 016-322-663-058-127; 018-954-504-137-336; 020-405-975-217-252; 023-338-081-058-709; 036-112-898-081-145; 038-826-942-273-281; 039-999-270-718-277; 040-711-141-878-573; 045-478-032-041-196; 045-701-748-075-614; 048-345-694-501-681; 049-492-455-536-947; 051-558-525-539-694; 056-715-378-869-201; 065-671-045-136-370; 068-633-888-560-585; 070-930-940-364-374; 075-268-039-596-63X; 102-441-399-953-42X; 109-199-944-332-859; 121-559-348-653-550; 125-622-261-107-674; 125-939-677-745-616; 159-180-382-976-102; 170-489-073-241-86X,12,true,cc-by-nc-nd,hybrid 049-324-711-593-551,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,36,,301160,301160,Computer science; Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00065-2,,10.1016/s2666-2817(21)00065-2,,,0,,0,true,,bronze 049-415-256-346-121,Forensic Cell Site Analysis: A Validation & Error Mitigation Methodology,,2017,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,John B. Minor,,12,2,7,,Data mining; Forensic science; Error mitigation; Validation error; Computer science; Site analysis,,,,,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#Minor17 https://commons.erau.edu/cgi/viewcontent.cgi?article=1474&context=jdfsl https://commons.erau.edu/jdfsl/vol12/iss2/7/,http://dx.doi.org/10.15394/jdfsl.2017.1474,,10.15394/jdfsl.2017.1474,2787985555,,0,022-757-007-442-155; 053-391-844-157-635,1,true,cc-by-nc,gold 049-979-701-385-094,Forensic access to Windows Mobile pim.vol and other Embedded Database (EDB) volumes,,2013,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Marnix Kaart; C. Klaver; R.B. van Baar,,9,3,170,192,Operating system; Windows Rally; Software versioning; SYSTEM.INI; Computer science; Installable File System; Microsoft Windows; Windows CE; Windows Vista; Database; Group Policy,,,,,https://dblp.uni-trier.de/db/journals/di/di9.html#KaartKB13 https://www.sciencedirect.com/science/article/pii/S1742287612000874,http://dx.doi.org/10.1016/j.diin.2012.12.002,,10.1016/j.diin.2012.12.002,1975642608,,0,014-510-444-730-433; 024-735-069-822-749; 031-982-129-275-33X; 050-308-742-156-878; 073-910-371-295-970; 074-933-143-629-826; 095-158-777-313-687; 142-657-351-097-509,8,false,, 050-015-650-841-609,Digital forensics: Understanding the development of criminal law in England and Wales on images depicting child sexual abuse,,2016,journal article,Computer Law & Security Review,02673649,Elsevier BV,United Kingdom,Graeme Horsman,"Abstract In 2015, offences surrounding the possession, distributing, creation and publication of images depicting child sexual abuse (IDCSA) are prevalent. As a result, it is well publicised that law enforcement and associated digital forensic organisations are incurring substantial case backlogs in this area. As more investigations of this type are faced, it is becoming increasingly essential for practitioners to maintain an understanding of current legislative developments, as a digital forensic investigation of suspected offences surrounding IDCSA does not just involve the blanket recovery of all digital imagery on a device. Governed by this complex area of law, practitioners must appreciate the intricacies of these offences, ensuring any examination policies are correctly defined whilst recovering information that will support criminal justice processes. In addition, as triage strategies are increasingly employed in an effort to speed up investigations, it is crucial to recognise the types of evidence that are of use to a prosecuting authority in order to ensure these examination techniques are both efficient and effective. This paper offers a comprehensive analysis of legislative developments for offences surrounding IDCSA in the United Kingdom, bringing together the disciplines of law and digital forensics. Evidence of value to a prosecution for these offences is also considered taking into account existing case law precedents in line with contentious areas including the Internet cache and unallocated clusters.",32,3,419,432,Criminal justice; Common law; Political science; Law; Criminal law; Legislation; Law enforcement; Child sexual abuse; Computer forensics; Criminology; Digital forensics,,,,,https://core.ac.uk/display/153535686 https://dblp.uni-trier.de/db/journals/clsr/clsr32.html#Horsman16 http://www.sciencedirect.com/science/article/pii/S0267364916300309 https://sure.sunderland.ac.uk/id/eprint/6232 https://www.sciencedirect.com/science/article/pii/S0267364916300309 https://doi.org/10.1016/j.clsr.2016.02.002 https://research.tees.ac.uk/en/publications/digital-forensics-understanding-the-development-of-criminal-law-i https://core.ac.uk/download/74368782.pdf,http://dx.doi.org/10.1016/j.clsr.2016.02.002,,10.1016/j.clsr.2016.02.002,2293335385,,0,004-430-064-731-538; 007-163-998-251-744; 008-485-716-547-052; 013-085-072-203-411; 023-513-295-393-567; 051-669-497-524-322; 054-117-973-018-257; 061-908-629-117-242; 062-496-046-100-949; 065-783-345-234-112; 065-875-008-812-602; 068-760-490-813-839; 073-078-443-164-61X; 078-327-902-374-330; 080-233-270-573-351; 087-299-996-161-037; 094-531-548-047-14X; 109-362-587-188-314; 121-371-955-077-095; 147-659-670-579-979; 147-850-806-726-380; 149-849-349-165-016; 150-482-683-921-128; 169-957-362-102-267; 189-910-079-327-61X,4,true,,green 050-109-368-175-830,Application of data fusion methodology for computer forensics dataset analysis to resolve data quality issues in predictive digital evidence,2012-05-21,2012,journal article,The International Journal of Forensic Computer Science,18099807; 19807333,ABEAT - Associacao Brasileira de Especialistas em Alta Tecnologia,,Suneeta Satpathy; Sateesh Kumar Pradhan; B. N. B. Ray,"The digital information systems have become increasingly complex and inex- tricably intertwined with the infrastructure of national, public, and private organizations. The forensic digital analysis as a whole, in its relative infancy, is the unwilling victim of the rapid advancement of computer technology, so it is at the mercy of ever more new and complex computing approaches. Forensic digital analysis is unique among the forensic sciences in that it is inherently mathematical and generally comprises more data from an investigation than is present in other types of forensics. The digital investigation process can be driven using numerous forensic investigation models. Among these is the need to analyze forensic materials over complex chains of evidence in a wide variety of hetero- geneous computing platforms. The current computer forensic investigation paradigm is laborious and requires significant expertise on the part of the investigators. This paper presents the application of JDL data fusion model in computer forensics for analyzing the information from seized hard drives along with an analysis of the inter- preted information to prove that the respective user has misused internet. This paper is an attempt to use the data fusion and decision mining processes, to help in enhancing the quality of the investigation process which is in turn is validated by statistical evalua- tion. The mining rules generation process is based on the decision tree as a classification method to study the main attributes that may help in detecting the suspicious behavior. A system that facilitates the use of the generated rules is built which allows investigating agencies to predict the suspicious behavior under study.",,,16,23,The Internet; Data mining; Engineering; Information system; Data quality; Data science; Digital evidence; Computer technology; Sensor fusion; Computer forensics; Decision tree,,,,,https://www.ijofcs.org/abstract-v07n1-pp02.html http://www.ijofcs.org/V07N1-PP02-APPLICATION-DATA-FUSION.pdf,http://dx.doi.org/10.5769/j201201002,,10.5769/j201201002,2333839593,,0,000-115-630-626-826; 018-111-574-600-175; 037-504-226-162-718; 042-230-817-975-353; 044-937-786-034-906; 052-665-370-203-554; 099-169-442-324-498; 109-496-533-312-141; 140-535-726-112-27X; 171-950-456-851-517,1,false,, 050-213-824-812-128,Digitalna forenzika iOS uređaja,2020-12-25,2020,journal article,Zbornik radova Fakulteta tehničkih nauka u Novom Sadu,25605925; 0350428x,Faculty of Technical Sciences,,Jelena Maravić,"This paper addresses the theme of digital forensics with an emphasis on digital forensics of iOS devices. As digital forensics implies the application of the scientific method to provide digital evidence, the paper deals with all phases that include a single digital forensic investigation and describes in detail the techniques of data extraction from iOS devices and tools that implement these techniques.",36,01,87,90,Data science; Data extraction; Digital evidence; Digital forensic investigation; Theme (computing); Computer science; Digital forensics,,,,,http://www.ftn.uns.ac.rs/ojs/index.php/zbornik/article/download/1222/1242 http://www.ftn.uns.ac.rs/ojs/index.php/zbornik/article/view/1222,http://dx.doi.org/10.24867/11be14maravic,,10.24867/11be14maravic,3120557873,,0,,0,true,,bronze 050-296-813-523-597,"Digital evidence, 'absence' of data and ambiguous patterns of reasoning",,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Alex Biedermann; Joëlle Vuille,"In this paper we discuss the use of digital data by the Swiss Federal Criminal Court in a recent case of attempted homicide. We use this case to examine drawbacks for the defense when the presentation of scientific evidence is partial, especially when the only perspective mentioned is that of the prosecution. We tackle this discussion at two distinct levels. First, we pursue an essentially non-technical presentation of the topic by drawing parallels between the court's summing up of the case and flawed patterns of reasoning commonly seen in other forensic disciplines, such as DNA and particle traces (e.g., gunshot residues). Then, we propose a formal analysis of the case, using elements of probability and graphical probability models, to justify our main claim that the partial presentation of digital evidence poses a risk to the administration of justice in that it keeps vital information from the defense. We will argue that such practice constitutes a violation of general principles of forensic interpretation as established by forensic science literature and current recommendations by forensic science interest groups (e.g., the European Network of Forensic Science Institutes). Finally, we posit that argument construction and analysis using formal methods can help replace digital evidence appropriately into context and thus support a sound evaluation of the evidence.",16,,S86,S95,Epistemology; Scientific evidence; Parallels; Presentation; Administration of justice; Context (language use); Digital evidence; Computer security; Argument; Computer science; Formal methods,,,,Swiss National Science Foundation; SNSF; ERC; Ambizione; Universities of Lausanne; Neuchâtel,https://www.sciencedirect.com/science/article/abs/pii/S1742287616300056 https://serval.unil.ch/notice/serval:BIB_71F2C58C8DB2 https://www.unil.ch/esc/files/live/sites/esc/files/Fichiers%202016/Biedermann_Vuille_2016.pdf https://www.sciencedirect.com/science/article/pii/S1742287616300056 https://serval.unil.ch/resource/serval:BIB_71F2C58C8DB2.P001/REF.pdf https://core.ac.uk/display/77170769 https://core.ac.uk/download/77170769.pdf,http://dx.doi.org/10.1016/j.diin.2016.01.011,,10.1016/j.diin.2016.01.011,2332805147,,0,004-883-297-684-711; 005-222-685-769-643; 005-715-450-998-72X; 005-877-808-547-694; 011-900-233-916-611; 013-261-137-570-74X; 014-961-689-075-177; 016-976-912-187-206; 022-896-866-582-746; 042-398-266-516-108; 061-276-154-289-08X; 062-121-021-285-333; 079-046-994-186-390; 079-152-497-703-763; 085-370-444-410-812; 087-634-902-634-071; 088-306-589-450-500; 097-942-806-126-453; 101-323-230-956-293; 116-716-614-614-171; 119-299-092-875-116; 128-597-792-698-79X; 193-424-163-457-741; 197-058-703-260-084,9,true,cc-by-nc-nd,hybrid 050-433-166-102-072,A Simple Experiment with Microsoft Office 2010 and Windows 7 Utilizing Digital Forensic Methodology,,2013,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Gregory H. Carlton,"Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent have data been altered. Addressing these expectations results from opinions digital forensic examiners reach concerning their understanding of electronic storage and retrieval methods. The credibility of these opinions evolves from the scientific basis from which they are drawn using forensic methodology.   Digital forensic methodology, being a scientific process, is derived from observations and repeatable findings in controlled environments. Furthermore, scientific research methods have established that causal conclusions can be drawn only when observed in controlled experiments. With this in mind, it seems beneficial that digital forensic examiners have a library of experiments from which they can perform, observe results, and derive conclusions. After having conducted an experiment on a specific topic, a digital forensic examiner will be in a better position to express with confidence the state of the current data and perhaps the conditions that led to its current state.   This study provides a simple experiment using the contemporary versions of the most widely used software applications running on the most commonly installed operation system. Here, using the Microsoft Office 2010 applications, a simple Word document, an Excel spreadsheet, a PowerPoint presentation, and an Access database are created and then modified. A forensic analysis is performed to determine the extent in which the changes to the data are identified. The value in this study is not that it yields new forensic analysis techniques, but rather that it illustrates a methodology that other digital forensic examiners can apply to develop experiments representing their specific data challenges.",8,1,17,38,Data mining; Data science; Presentation; SIMPLE (military communications protocol); Software; Credibility; Digital storage; Computer science; State (computer science); Microsoft Office; Digital forensics,,,,,https://commons.erau.edu/jdfsl/vol8/iss1/2/ https://oaji.net/articles/2014/1095-1408889347.pdf https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#Carlton13 https://core.ac.uk/display/91847763 https://commons.erau.edu/cgi/viewcontent.cgi?article=1139&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2013.1139,,10.15394/jdfsl.2013.1139,1512774725,,0,014-267-129-756-476; 027-596-318-311-424; 046-798-347-676-566; 057-991-197-390-530; 098-413-963-027-021; 100-835-129-785-664; 120-393-367-354-288,0,true,cc-by-nc,gold 050-694-164-774-292,Deleting collected digital evidence by exploiting a widely adopted hardware write blocker,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Christopher S. Meffert; Ibrahim Baggili; Frank Breitinger,"In this primary work we call for the importance of integrating security testing into the process of testing digital forensic tools. We postulate that digital forensic tools are increasing in features (such as network imaging), becoming networkable, and are being proposed as forensic cloud services. This raises the need for testing the security of these tools, especially since digital evidence integrity is of paramount importance. At the time of conducting this work, little to no published anti-forensic research had focused on attacks against the forensic tools/process. We used the TD3, a popular, validated, touch screen disk duplicator and hardware write blocker with networking capabilities and designed an attack that corrupted the integrity of the destination drive (drive with the duplicated evidence) without the user's knowledge. By also modifying and repackaging the firmware update, we illustrated that a potential adversary is capable of leveraging a phishing attack scenario in order to fake digital forensic practitioners into updating the device with a malicious operating system. The same attack scenario may also be practiced by a disgruntled insider. The results also raise the question of whether security standards should be drafted and adopted by digital forensic tool makers.",18,,S87,S96,Security testing; Digital evidence; Computer security; Computer science; Forensic disk controller; Computer forensics; Firmware; Cloud computing; Digital forensics; Computer hardware; Vulnerability (computing),,,,,https://www.sciencedirect.com/science/article/pii/S1742287616300354 https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/56/ https://dl.acm.org/doi/10.1016/j.diin.2016.04.004 https://core.ac.uk/display/82539065 https://www.sciencedirect.com/science/article/abs/pii/S1742287616300354 https://core.ac.uk/download/pdf/82539065.pdf,http://dx.doi.org/10.1016/j.diin.2016.04.004,,10.1016/j.diin.2016.04.004,2510465603,,0,007-206-939-862-809; 009-642-902-074-79X; 018-483-378-650-703; 021-039-461-635-181; 021-850-998-857-676; 035-853-217-426-112; 042-880-741-738-793; 047-630-600-014-492; 055-416-156-661-003; 056-590-277-527-716; 059-176-928-707-661; 078-072-950-053-679; 090-792-295-657-205; 110-494-552-257-201; 120-916-795-553-371; 123-830-244-984-847; 146-548-188-554-839; 152-474-715-580-077; 158-931-700-122-435; 159-094-605-033-945; 187-849-196-324-650; 192-810-463-153-431,6,true,cc-by-nc-nd,hybrid 050-759-663-355-409,Digital Forensic Investigation For The Internet Of Medical Things (IoMT),2019-08-31,2019,journal article,"Journal of Forensic, Legal & Investigative Sciences",2473733x,Herald Scholarly Open Access,,Hamid Jahankhani,,5,2,1,6,Internet privacy; The Internet; Digital forensic investigation; Computer science,,,,,http://dx.doi.org/10.24966/flis-733x/100029,http://dx.doi.org/10.24966/flis-733x/100029,,10.24966/flis-733x/100029,3003856626,,0,,6,true,cc-by,gold 050-770-394-368-814,Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art,,2022,journal article,IEEE Access,21693536,Institute of Electrical and Electronics Engineers (IEEE),,Prinkle Sharma; James Gillanders,,,,1,1,,,,,,,http://dx.doi.org/10.1109/access.2022.3213843,,10.1109/access.2022.3213843,,,0,,0,true,"CC BY, CC BY-NC-ND",gold 050-857-984-627-89X,The analysis of data structure to digital forensic of dashboard camera,2015-12-31,2015,journal article,Journal of the Korea Institute of Information Security and Cryptology,15983986,Korea Institute of Information Security and Cryptology,,Hwihang An; Sangjin Lee,"Dashboard camera is important system to store the variable data that not only video but also non-visual information that state of vehicle such as accelerometer, speed, direction. Non-visual information include variable data that can't visualization, so it used important evidence to figure out the situation in accident. It could be missed to non-visual information what can be prove the case in the just digital video forensic procedure. In this paper, We proposal the digital forensic analysis procedure for dashboard camera to all data in dashboard camera extract and analysis data for investigating traffic accident case. And I analyze to some products in with this digital forensic analysis procedure.",25,6,1495,1502,Embedded system; Artificial intelligence; Data analysis; Variable (computer science); Dashboard (business); Computer vision; Visualization; Computer science; State (computer science); Global Positioning System; Digital forensics; Accelerometer,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002070698 http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2015_v25n6_1495,http://dx.doi.org/10.13089/jkiisc.2015.25.6.1495,,10.13089/jkiisc.2015.25.6.1495,2330817826,,0,,3,true,,bronze 051-785-078-933-787,Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef?,,2019,journal article,IEEE Security & Privacy,15407993; 15584046,Institute of Electrical and Electronics Engineers (IEEE),United States,Joseph Ricci; Ibrahim Baggili; Frank Breitinger,"The current state of the art in digital forensics has primarily focused on the acquisition of data from cloud storage. Here, we present a new challenge in digital forensics: blockchain-based distributed cloud storage, using STORJ as a technology example.",17,1,34,42,Operating system; Data acquisition; Cloud storage; Blockchain; Storage management; Computer science; State (computer science); Distributed database; Cloud computing; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/ieeesp/ieeesp17.html#RicciBB19 https://www.computer.org/csdl/api/v1/periodical/mags/sp/2019/01/08674173/18GGpVrSQRW/download-article/pdf https://ieeexplore.ieee.org/abstract/document/8674173 https://doi.org/10.1109/MSEC.2018.2875877,http://dx.doi.org/10.1109/msec.2018.2875877,,10.1109/msec.2018.2875877,2931728404,,1,007-803-508-283-309; 010-499-521-902-738; 015-654-094-120-991; 016-838-645-393-674; 018-696-253-395-568; 024-894-908-869-686; 028-290-062-141-840; 037-482-978-908-24X; 040-711-141-878-573; 045-701-748-075-614; 058-631-300-195-90X; 091-619-263-117-914; 094-116-664-798-989; 101-091-831-428-576; 105-749-330-848-306; 125-817-456-334-439; 129-604-082-098-334; 168-994-901-760-186,23,false,, 051-832-649-225-696,An Ontology-Based Transformation Model for the Digital Forensics Domain,2017-06-15,2017,journal article,Elektronika ir Elektrotechnika,20295731; 13921215,Kaunas University of Technology (KTU),Lithuania,Sarunas Grigaliunas; Jevgenijus Toldinas; Algimantas Venčkauskas,"The creation of an ontology makes it possible to form common information structures, to reuse knowledge, to make assumptions within a domain and to analyse every piece of knowledge. In this paper, we aim to create an ontology-based transformation model and a framework to develop an ontology-based transformation system in the digital forensics domain. We describe the architecture of the ontology-based transformation system and its components for assisting computer forensics experts in the appropriate selection of tools for digital evidence investigation. We consider the use of the attributes of Extensible Markup Language document transformation to map the computer forensics ontology and we use the representations in the National Institute of Standards and Technology’s “Computer Forensics Tool Catalog” for aligning one form with the other.DOI: http://dx.doi.org/10.5755/j01.eie.23.3.18337",23,3,78,82,Transformation (function); Ontology (information science); Domain (software engineering); Information retrieval; Digital evidence; Computer science; Computer-aided software engineering; Computer forensics; Digital forensics; XML,,,,,https://eejournal.ktu.lt/index.php/elt/article/view/18337/8800 https://eejournal.ktu.lt/index.php/elt/article/view/18337 https://core.ac.uk/display/144875785 https://core.ac.uk/download/pdf/144875785.pdf,http://dx.doi.org/10.5755/j01.eie.23.3.18337,,10.5755/j01.eie.23.3.18337,2624936764,,0,,3,true,cc-by,gold 052-054-657-975-487,Analisa Perkembangan Digital Forensik dalam Penyelidikan Cybercrime di Indonesia (Systematic Review),2020-01-04,2020,journal article,Jurnal Telekomunikasi dan Komputer,20854811,Universitas Mercu Buana,,Nur Iman; Aris Susanto; Rahmat Inggi,"Digital forensik dikembangkan untuk menyelidiki perangkat digital dalam mendeteksi kejahatan ( cybercrime ). Tujuan penulisan makalah ini untuk mengidentifikasi sub digital forensik dan menganalisa perkembangan digital forensik dalam penyelidikan kasus kejahatan di Indonesia. Metode yang digunakan adalah kajian sistematis ( systematic review ) dengan melalui proses pemilihan sumber data yaitu Garba Rujukan Digital, Science and Technology Index, RAMA Repository. Hasil dari penelusuran menunjukkan bahwa kejahatan paling banyak ditangani yaitu live forensic , network forensic , dan mobile forensic dengan grafik trend topic diatas 10 dibandingkan dengan computer forensic dan database forensic hanya terdapat 2 topik.",9,3,186,192,Library science; Political science; Digital forensics,,,,,https://www.mendeley.com/catalogue/db3b364e-2779-3df0-ac22-f70dc1853772/ http://publikasi.mercubuana.ac.id/index.php/Incomtech/article/view/7210 https://publikasi.mercubuana.ac.id/index.php/Incomtech/article/view/7210 https://publikasi.mercubuana.ac.id/index.php/Incomtech/article/download/7210/3098 https://incomtech.mercubuana.ac.id/id/publications/293930/analisa-perkembangan-digital-forensik-dalam-penyelidikan-cybercrime-di-indonesia,http://dx.doi.org/10.22441/incomtech.v9i3.7210,,10.22441/incomtech.v9i3.7210,2998235363,,0,,3,true,cc-by-nc,gold 052-114-633-106-705,Fifteenth Annual DFRWS Conference,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Elizabeth Schweinsberg,,14,,S1,S2,Fifteenth; Computer science; Art history,,,,,https://dblp.uni-trier.de/db/journals/di/di14.html#Schweinsberg15 https://doi.org/10.1016/j.diin.2015.07.001 https://www.sciencedirect.com/science/article/pii/S1742287615000729 https://core.ac.uk/display/82783794 https://core.ac.uk/download/pdf/82783794.pdf,http://dx.doi.org/10.1016/j.diin.2015.07.001,,10.1016/j.diin.2015.07.001,2201798142,,0,,0,true,cc-by-nc-nd,hybrid 052-722-033-105-281,Forensically Sound Piecewise Hashing: Integrity checks with DEIC,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Ashok Kumar Mohan,"The integrity of a digital evidence is believed to be the paramount trait in the world of cyber forensics. Cyber- crime investigators face myriad challenges in the process similar to accommodating the call for bulk digital evidence. In due course extraction of useful information while maintaining the integrity and definitive protection against data degradation is mandatory. In this manuscript, we propose a novel approach by applying cryptographic hashing technique to only selected significant portions of the digital evidence, so even if the overall hash does not match, investigators could still verify the integrity of those critical section of the evidence. We put forward two notions in this manuscript, former is Heterogeneous piecewise hashing which is flexible version of piecewise hashing strategy and latter, novel evidence certification strategy which formalizes evidence provability process completely.",,,63,70,Algorithm; Piecewise; Sound (geography); Computer science; Hash function,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.14,http://dx.doi.org/10.46293/4n6/2020.02.02.14,,10.46293/4n6/2020.02.02.14,3023340899,,0,,0,false,, 053-447-315-738-012,Using Blockchain to Ensure the Integrity of Digital Forensic Evidence in an IoT Environment,2022-06-03,2022,journal article,EAI Endorsed Transactions on Creative Technologies,24099708,European Alliance for Innovation n.o.,,Muhammad Akhtar; Tao Feng,"Digital forensics deals with digital evidence. Digital forensics is the study of data detection, acquisition, processing, analysis, and reporting. Encouraging the use of digital forensics in law enforcement investigations. With digital forensics, you can find out what data was taken and how it was c",,,174089,174089,Digital evidence; Digital forensics; Network forensics; Blockchain; Computer security; Internet of Things; Law enforcement; Computer science; Computer forensics; Internet privacy; Data science,,,,,,http://dx.doi.org/10.4108/eai.3-6-2022.174089,,10.4108/eai.3-6-2022.174089,,,0,,0,true,cc-by,gold 053-514-971-073-351,PRECEPT: a framework for ethical digital forensics investigations,2020-03-09,2020,journal article,Journal of Intellectual Capital,14691930,Emerald,United Kingdom,R.I. Ferguson; Karen Renaud; Sara Wilford; Alastair Irons,"This paper argues the need for a practical, ethically grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organizations, as well as acknowledging the needs of law enforcement. The paper derives a set of ethical guidelines, and then maps these onto a forensics investigation framework. The framework to expert review in two stages is subjected, refining the framework after each stage. The paper concludes by proposing the refined ethically grounded digital forensics investigation framework. The treatise is primarily UK based, but the concepts presented here have international relevance and applicability.,In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals' rights to privacy and organizations' rights to control intellectual capital disclosure.,The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically informed approach to digital forensics investigations, as a remedy, is highlighted and a framework proposed to provide this.,The proposed ethically informed framework for guiding digital forensics investigations suggests a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.,Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other.",21,2,257,290,Sociology; Relevance (law); Set (psychology); Right to privacy; Injustice; Precept; Law enforcement; Intellectual capital; Engineering ethics; Digital forensics,,,,,https://dora.dmu.ac.uk/handle/2086/18943 https://pureportal.strath.ac.uk/en/publications/precept-a-framework-for-ethical-digital-forensics-investigations https://rke.abertay.ac.uk/ws/files/23352644/Renaud_PRECEPT_Accepted_2019.pdf https://www.emerald.com/insight/content/doi/10.1108/JIC-05-2019-0097/full/pdf?title=precept-a-framework-for-ethical-digital-forensics-investigations https://dora.dmu.ac.uk/bitstream/2086/18943/1/PRECEPT%20A%20Framework%20for%20Ethical%20Digital%20Forensics%20Investigations.pdf https://rke.abertay.ac.uk/en/publications/precept-a-framework-for-ethical-digital-forensics-investigations https://strathprints.strath.ac.uk/75129/ https://www.emerald.com/insight/content/doi/10.1108/JIC-05-2019-0097/full/html https://sure.sunderland.ac.uk/id/eprint/12067/ https://core.ac.uk/download/287585744.pdf,http://dx.doi.org/10.1108/jic-05-2019-0097,,10.1108/jic-05-2019-0097,2997108533,,0,000-732-818-777-187; 001-135-038-170-705; 002-733-280-021-771; 003-923-093-358-17X; 004-031-611-327-668; 006-138-917-123-177; 006-322-634-212-786; 009-963-198-569-373; 010-760-969-054-219; 013-435-147-083-483; 014-261-775-435-338; 014-492-795-258-365; 014-531-291-102-198; 016-945-345-350-158; 017-805-463-199-729; 019-339-751-892-162; 019-505-819-376-748; 019-968-523-287-376; 021-850-998-857-676; 023-858-572-607-02X; 025-467-886-829-340; 026-774-296-742-022; 027-685-179-504-406; 029-168-311-729-15X; 029-447-091-073-102; 029-518-593-947-995; 030-045-112-792-346; 032-702-492-808-193; 035-742-523-393-097; 036-208-938-233-278; 036-414-888-400-142; 039-103-756-700-945; 041-331-434-774-438; 045-288-167-711-647; 046-328-032-388-440; 046-507-380-373-943; 047-630-600-014-492; 052-196-937-150-029; 062-164-597-894-73X; 062-325-585-829-185; 063-884-128-799-395; 064-387-058-206-177; 064-790-018-018-614; 067-060-814-542-833; 070-378-356-319-383; 072-922-481-935-635; 074-614-672-576-143; 074-875-398-814-107; 089-125-778-648-739; 089-621-912-811-772; 091-306-281-397-166; 092-415-226-886-724; 093-246-849-198-25X; 093-469-342-679-888; 098-686-518-644-578; 112-394-120-551-065; 114-090-829-194-843; 114-098-918-624-354; 116-749-161-883-299; 118-838-969-146-870; 127-651-023-065-320; 127-948-386-055-225; 131-695-373-839-786; 144-884-155-522-62X; 147-196-682-655-889; 148-218-390-171-795; 156-480-578-742-768; 159-450-168-937-396; 161-764-997-528-585; 162-110-149-751-921; 165-962-127-351-782; 179-608-372-698-452; 181-095-475-426-346,5,true,cc-by-nc,green 054-004-313-233-495,Requirements in digital forensics method definition : Observations from a UK study,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Angus M. Marshall; Richard F. Paige,"Abstract During a project to examine the potential usefulness of evidence of tool verification as part of method validation for ISO 17025 accreditation, the authors have examined requirements statements in several digital forensic method descriptions and tools. They have identified that there is an absence of clear requirements statements in the methods and a reluctance or inability to disclose requirements on the part of tool producers. This leads to a break in evidence of correctness for both tools and methods, resulting in incomplete validation. They compare the digital forensics situation with other ISO 17025 accredited organisations, both forensic and non-forensic, and propose a means to close the gap and improve validation. They also review existing projects which may assist with their proposed solution.",27,,23,29,Data science; Computer science; Correctness; Accreditation; Digital forensics,,,,University of York Research Priming Fund,https://dblp.uni-trier.de/db/journals/di/di27.html#MarshallP18 https://www.sciencedirect.com/science/article/pii/S1742287618302718 https://eprints.whiterose.ac.uk/137032/ https://core.ac.uk/download/199218336.pdf,http://dx.doi.org/10.1016/j.diin.2018.09.004,,10.1016/j.diin.2018.09.004,2890279224,,0,019-953-559-571-756; 029-459-233-206-184; 067-938-325-014-282; 142-790-196-752-819,23,true,cc-by-nc-nd,green 054-331-725-373-265,Digital Forensic Readiness: Are We There Yet?,2014-06-30,2014,journal article,Journal of International Commercial Law and Technology,19018401,,,Antonis Mouhtaropoulos; Chang-Tsun Li; Marthie Grobler,Digital Forensic Readiness is defined as the pre-incident plan that deals with an organization’s ability to maximize digital evidence usage and anticipate litigation. The inadequacy of technical research and legislations and the ever-increasing need for evidence preservation mechanisms has brought the need for a common forensic readiness standard. This article reviews a number of key initiatives in order to point out the directions for future policy making governments and organizations and conducts an investigation of the limitations of those initiatives to reveal the gaps needed to be bridged.,9,3,173,179,Business; Order (exchange); Point (typography); Key (cryptography); Digital evidence; Policy making; Public relations; Knowledge management; Plan (drawing); Digital forensics,,,,,https://researchoutput.csu.edu.au/en/publications/digital-forensic-readiness-are-we-there-yet http://dro.deakin.edu.au/view/DU:30119739 https://wrap.warwick.ac.uk/id/eprint/65196,https://researchoutput.csu.edu.au/en/publications/digital-forensic-readiness-are-we-there-yet,,,1947796688,,0,041-291-462-265-899; 098-857-083-857-534,19,false,, 054-464-741-662-365,Forensic Footwear Imprint Examination using Adobe Photoshop Digital Imaging Software - A case study,,2017,journal article,International Journal of Criminal and Forensic Science,25763563,Biocore Group,,Ramakrishnan. P.N,,1,2,28,31,Digital imaging; Computer graphics (images); Engineering; Software; Adobe photoshop,,,,,http://dx.doi.org/10.25141/2576-3563-2017-2.0028,http://dx.doi.org/10.25141/2576-3563-2017-2.0028,,10.25141/2576-3563-2017-2.0028,2794362520,,0,,0,true,cc-by,gold 054-471-285-379-894,Digital Forensic Analysis of Hard Disk for Evidence Collection,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Bandu B. Meshram; Dinesh N. Patil,,7,2,100,110,Evidence collection; Computer science; Multimedia; Wireless; Digital forensics,,,,,http://www.sdiwc.net/digital-library/digital-forensic-analysis-of-hard-disk-for-evidence-collection.html,http://dx.doi.org/10.17781/p002372,,10.17781/p002372,2791423273,,0,020-486-151-034-995; 054-321-069-682-537; 074-999-867-962-351; 085-214-277-668-01X; 110-576-638-767-244; 117-513-040-751-893,5,false,, 054-677-638-335-39X,Effective approaches to three-dimensional digital reconstruction of fragmented human skeletal remains using laser surface scanning,2020-07-31,2020,journal article,Forensic science international. Synergy,2589871x,Elsevier BV,Netherlands,Gargi Jani; Abraham Johnson; Utsav Parekh; Tim Thompson; Astha Pandey,"Abstract The preservation and reconstruction of anthropological and archaeological remains has been given considerable attention in recent years, particularly within the fields of forensic science and palaeoanthropology. However, few studies have tapped the potential of using 3D technology to reconstruct, remodel and recontour remains and artefacts for the purpose of human identification. The aim of this study was to use 3D technology for the reconstruction and remodelling of fragmented and missing elements of skeletal remains. This project presents the application of three dimensional (3D) modalities to two different simulated forensic case scenarios where an attempt was made to remodel the missing element of the human cranium and reconstruction of fragmented replicated human mandible was performed. The accuracy of the reconstructed model was affirmed based on the anatomical features and digital analysis and methods for use in forensic practice are recommended.",2,,215,223,Artificial intelligence; Forensic anthropology; Digitization; Digital reconstruction; Digital analysis; Surface scanning; 3d scanning; Computer vision; Computer science,3D printing; 3D scanning; Digital reconstruction; Digitization; Forensic anthropology,,,Gujarat Forensic Sciences University Student Startup Innovation Policy; Gujarat Forensic Sciences University; Institute of Forensic Science; GFSU-Student Startup Policy,https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7417899 https://europepmc.org/article/MED/32803150 https://www.sciencedirect.com/science/article/pii/S2589871X20300486,http://dx.doi.org/10.1016/j.fsisyn.2020.07.002,32803150,10.1016/j.fsisyn.2020.07.002,3046491710,PMC7417899,0,000-578-174-768-820; 002-372-825-803-01X; 002-757-600-778-594; 003-278-228-480-094; 006-036-539-291-490; 007-650-508-880-766; 011-675-439-503-507; 013-138-622-173-445; 015-123-182-480-038; 016-580-313-404-132; 018-826-363-640-555; 019-885-756-382-127; 023-014-879-325-49X; 024-123-842-118-517; 024-784-179-276-92X; 027-873-458-906-107; 029-518-894-016-342; 032-625-551-023-227; 032-707-982-696-465; 036-403-879-718-18X; 038-602-847-722-162; 042-141-941-221-562; 045-932-907-295-787; 045-977-597-761-939; 049-019-689-376-719; 053-139-478-467-996; 059-572-267-613-848; 063-606-720-330-852; 066-326-667-476-053; 073-189-364-637-601; 073-933-049-544-280; 077-136-183-426-035; 092-224-257-059-076; 092-305-346-660-757; 098-798-263-351-920; 110-494-921-167-835; 121-117-131-742-511; 136-115-119-862-890; 139-729-629-797-721; 151-494-162-718-970; 173-072-899-572-433; 178-456-110-092-227,6,true,"CC BY, CC BY-NC-ND",gold 055-086-544-213-027,Analisis Kelayakan Integrated Digital Forensics Investigation Framework Untuk Investigasi Smartphone,2016-10-25,2016,journal article,Jurnal Buana Informatika,20897642; 20872534,Universitas Atma Jaya Yogyakarta,,Ruuhwan Ruuhwan; Riadi; Yudi Prayudi,"Abstract. The handling of digital evidence each and every digital data that can proof a determination that a crime has been committed; it may also give the links between a crime and its victims or crime and the culprit. How to verify a valid evidence is to investigate using the approach known as the Digital Forensic Examination Procedures. Integrated Digital Forensic Investigation Framework (IDFIF) is the latest developed method, so that it is interesting to further scrutinize IDFIF, particularly in the process of investigation of a smartphone. The current smartphone devices have similar functions with computers. Although its functions are almost the same as the computer, but there are some differences in the process of digital forensics handling between computer devices and smartphones. The digital evidence handling process stages need to overcome the circumstances that may be encountered by an investigator involving digital evidence particularly on electronic media and smartphone devices in the field. IDFIF needs to develop in such a way so it has the flexibility in handling different types of digital evidence. Keywords: digital evidence, IDFIF, investigation, smartphone Abstraks. Penanganan bukti digital mencakup setiap dan semua data digital yang dapat menjadi bukti penetapan bahwa kejahatan telah dilakukan atau dapat memberikan link antara kejahatan dan korbannya atau kejahatan dan pelakunya. Cara pembuktian untuk mendapatkan bukti valid adalah dengan melakukan investigasi dengan pendekatan Prosedur Pemeriksaan Digital Forensic. Integrated Digital Forensics Investigation Framework (IDFIF) merupakan metode terbaru sehingga IDFIF ini menarik untuk diteliti lebih lanjut terutama dalam proses investigasi smartphone. Saat ini perangkat smartphone memiliki fungsi yang sama dengan komputer. Meskipun demikian, ada beberapa perbedaan dalam proses penanganan digital forensics diantara perangkat komputer dan smartphone. Tahapan proses penanganan barang bukti digital seharusnya dibuat untuk mengatasi keadaan umum yang mungkin dihadapi oleh investigator yang melibatkan barang bukti digital terutama pada perangkat smartphone dan media elektronik terkait di lapangan. IDFIF perlu dikembangkan sehingga memiliki fleksibilitas dalam menangani berbagai jenis barang bukti digital. Kata Kunci: bukti digital, IDFIF, investigasi, smartphone",7,4,77775,,,,,,,https://www.neliti.com/publications/77775/analisis-kelayakan-integrated-digital-forensics-investigation-framework-untuk-in https://core.ac.uk/download/pdf/268157138.pdf,http://dx.doi.org/10.24002/jbi.v7i4.767,,10.24002/jbi.v7i4.767,2558693854,,0,,2,true,, 055-166-120-045-285,"DF 2.0: An Automated, Privacy Preserving, and Efficient Digital Forensic Framework That Leverages Machine Learning for Evidence Prediction and Privacy Evaluation",,2019,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Robin Verma; Jayaprakash Govindaraj; Saheb Chhabra; Gaurav Gupta,,14,2,13,44,Automation; Information privacy; Information retrieval; Privacy preserving; Computer science; Digital forensics,,,,,https://commons.erau.edu/jdfsl/vol14/iss2/3/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1606&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl14.html#VermaGCG19,http://dx.doi.org/10.15394/jdfsl.2019.1606,,10.15394/jdfsl.2019.1606,2962333476,,0,000-360-120-513-679; 012-547-708-771-754; 014-561-286-568-118; 020-343-122-748-675; 033-877-222-136-260; 059-078-762-318-13X; 066-271-426-147-659; 074-339-650-704-622; 097-567-011-227-46X; 099-600-335-833-663; 112-181-239-331-730; 119-759-887-719-875; 134-927-490-231-285; 135-626-485-398-950; 137-755-137-054-864; 163-330-758-807-944; 181-095-475-426-346,3,true,cc-by-nc,gold 055-248-229-344-149,Revisión sobre la forensía digital en dispositivos móvil con sistemas operativos Android,2018-12-14,2018,journal article,I+D Tecnológico,22196714; 16808894,Universidad Tecnologica de Panama,,Miguel Vargas Lombardo; José Moreno; Isabel Leguias,"Esta investigación está enfocada en los procedimientos, mecanismos y metodologías de análisis forense digital en dispositivos móviles, con la intención de contar con un manual o metodología para el manejo de evidencias digitales en estos dispositivos. Por otra parte, trataremos las herramientas de software libre y privativas utilizadas para el análisis forense de smartphones con sistemas operativos Android. Como resultado se detectaron métodos de antiforensía que impiden la adquisición de los artefactos en los teléfonos inteligentes. En consecuencia, identificados técnicas antiforensía como técnicas criptográficas empleadas por los cibercriminales para esconder sus huellas o evidencias.",14,2,74,83,,,,,,http://revistas.utp.ac.pa/index.php/id-tecnologico/article/download/2076/3031 https://core.ac.uk/download/pdf/234019593.pdf,http://dx.doi.org/10.33412/idt.v14.2.2076,,10.33412/idt.v14.2.2076,2909994079,,0,,0,true,cc-by-nc-sa,gold 055-628-715-083-217,COMPARATIVE DIGITAL FORENSIC MODEL,,2013,journal article,"International Journal of Innovative Research in Science, Engineering and Technology",23476710,,,Nilakshi Jain,"The computer forensic is the about evidence finding from computer or services using its reliability and justification which can be proved in court or in management. To accomplish this task various digital forensic model has been introduced till now. The proposed model ,Comparative Digital Forensic Model (CDFM) provides the authenticate evidence using less efforts because it based on required output only. Initially all models has been reviewed and listed advantages and disadvantages of all finally the CDFM has been developed, using that model very initial user can also understand the basic concept of digital forensic model.",2,8,3414,3419,Data mining; Data science; Task (project management); Computer science; Reliability (statistics); Digital forensics,,,,,https://www.rroij.com/open-access/comparative-digital-forensic-model.pdf https://www.omicsonline.org/peer-reviewed/comparative-digital-forensic-model-46459.html https://www.rroij.com/open-access/comparative-digital-forensic-model-.php?aid=46459 http://ijirset.com/upload/august/6_COMPARATIVE.pdf https://ijirset.com/upload/august/6_COMPARATIVE.pdf,https://www.omicsonline.org/peer-reviewed/comparative-digital-forensic-model-46459.html,,,2188909317,,0,004-706-447-836-905; 032-697-093-668-898; 035-223-520-491-228; 065-452-675-566-99X; 067-950-012-629-210; 133-397-275-695-990; 170-299-458-679-224; 183-000-233-873-221; 199-745-676-923-766,3,false,, 055-778-828-584-716,A Local Perturbation Generation Method for GAN-generated Face Anti-forensics,,2022,journal article,IEEE Transactions on Circuits and Systems for Video Technology,10518215; 15582205,Institute of Electrical and Electronics Engineers (IEEE),United States,Haitao Zhang; Beijing Chen; Jinwei Wang; Guoying Zhao,"Although the current generative adversarial networks (GAN)-generated face forensic detectors based on deep neural networks (DNNs) have achieved considerable performance, they are vulnerable to adversarial attacks. In this paper, an effective local perturbation generation method is proposed to expose the vulnerability of state-of-the-art forensic detectors. The main idea is to mine the fake faces’ areas of common concern in multiple-detectors’ decision-making, then generate local anti-forensic perturbations by GANs in these areas to enhance the visual quality and transferability of anti-forensic faces. Meanwhile, in order to improve the anti-forensic effect, a double-mask (soft mask and hard mask) strategy and a three-part loss (the GAN training loss, the adversarial loss consisting of ensemble classification loss and ensemble feature loss, and the regularization loss) are designed for the training of the generator. Experiments conducted on fake faces generated by StyleGAN demonstrate the proposed method’s advantage over the state-of-the-art methods in terms of anti-forensic success rate, imperceptibility, and transferability. The source code is available at https://github.com/imagecbj/A-Local-Perturbation-Generation-Method-for-GAN-generated-Face-Anti-forensics.",,,1,1,,,,,National Natural Science Foundation of China; Priority Academic Program Development of Jiangsu Higher Education Institutions,,http://dx.doi.org/10.1109/tcsvt.2022.3207310,,10.1109/tcsvt.2022.3207310,,,0,,0,false,, 056-254-180-340-08X,Applying a Contingency Framework to Digital Forensic Processes in Cloud Based Acquisitions,,2017,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Diane Barrett,,12,2,9,,Data science; Computer science; Contingency theory; Cloud computing; Digital forensics; Contingency,,,,,https://doi.org/10.15394/jdfsl.2017.1473 https://commons.erau.edu/jdfsl/vol12/iss2/9/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1473&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#Barrett17,http://dx.doi.org/10.15394/jdfsl.2017.1473,,10.15394/jdfsl.2017.1473,2788190916,,0,002-889-650-119-073; 004-097-974-459-223; 012-194-001-935-195; 017-600-678-762-743; 029-710-515-750-273; 032-716-805-412-497; 036-770-007-474-194; 043-652-467-015-112; 047-727-383-634-767; 063-513-066-601-773; 064-313-388-228-262; 092-655-509-442-333; 095-106-460-741-427; 096-103-572-025-794; 106-997-247-556-643; 134-927-490-231-285; 144-285-248-757-773; 173-365-121-341-393; 175-767-465-206-720,1,true,cc-by-nc,gold 056-406-725-646-266,Analisis Bukti Digital pada Storage Secure Digital Card Menggunakan Metode Static Forensic,2019-11-20,2019,journal article,Mobile and Forensics,27146685; 26566257,Universitas Ahmad Dahlan,,Muh Fadli Hasa; Anton Yudhana; Abdul Fadlil,"Secure Digital Card (SD Card)  merupakan salah satu media untuk mendapatkan bukti digital dalam proses penyelidikan suatu kasus  cybercrime . Oleh kerena itu, perlu adanya penelitian tentang analisa bukti digital pada media penyimpanan  SD Card . Penelitian ini membahas tentang proses eksaminasi dan analisis bukti digital yang terdapat pada media penyimpanan  SD Card  yang bertujuan untuk membantu proses penyelidikan kasus  cybercrime . Proses penelitian menggunakan  tools forensic FTK Imager  dan  Autopsy  serta menggunakan  metode  forensic static  dimana barang bukti eletronik diproses secara  bit-by-bit image  dalam melakukan proses forensik.  Hasil dari penelitian ini adalah barang bukti yang berupa  SD Card  dilakukan proses  examinasi  dan  recovery  data yang hilang, data yang berhasil di  recovery  dibedakan berdasarkan cara pelaku menghapus datanya.  Data yang didapatkan pada  SD Card  dapat dijadikan sebagai barang bukti pada proses persidangan kasus  cybercrime .",1,2,76,84,,,,,,http://journal2.uad.ac.id/index.php/mf/article/view/1217 http://journal2.uad.ac.id/index.php/mf/article/download/1217/pdf https://core.ac.uk/download/pdf/267886817.pdf,http://dx.doi.org/10.12928/mf.v1i2.1217,,10.12928/mf.v1i2.1217,2992134555,,0,,1,true,cc-by-sa,gold 056-522-627-812-660,Visual Computing and Machine Learning Techniques for Digital Forensics,2015-05-18,2015,journal article,Revista de Informática Teórica e Aplicada,21752745; 01034308,Universidade Federal do Rio Grande do Sul,,Tiago Carvalho; Helio Pedrini; Anderson Rocha,"It is impressive how fast science has improved day by day in so many different fields. In special, technology advances are shocking so many people bringing to their reality facts that previously were beyond their imagination. Inspired by methods earlier presented in scientific fiction shows, the computer science community has created a new research area named Digital Forensics, which aims at developing and deploying methods for fighting against digital crimes such as digital image forgery.This work presents some of the main concepts associated with Digital Forensics and, complementarily, presents some recent and powerful techniques relying on Computer Graphics, Image Processing, Computer Vision and Machine Learning concepts for detecting forgeries in photographs. Some topics addressed in this work include: source attribution, spoofing detection, pornography detection, multimedia phylogeny, and forgery detection. Finally, this work highlights the challenges and open problems in Digital Image Forensics to provide the readers with the myriad opportunities available for research.",22,1,128,153,Machine learning; Artificial intelligence; Spoofing attack; Visual computing; Pornography; Computer science; Digital image; Multimedia; Computer forensics; Computer graphics; Digital forensics; Image processing,,,,,https://seer.ufrgs.br/rita/article/view/RITA-VOL22-NR1-128 https://seer.ufrgs.br/rita/article/download/RITA-VOL22-NR1-128/33866 https://core.ac.uk/download/303970495.pdf,http://dx.doi.org/10.22456/2175-2745.49492,,10.22456/2175-2745.49492,1859651454,,0,,2,true,cc-by-nc-nd,gold 056-543-812-810-619,Multileveled ternary pattern and iterative ReliefF based bird sound classification,,2021,journal article,Applied Acoustics,0003682x; 1872910x,Elsevier BV,United Kingdom,Turker Tuncer; Erhan Akbal; Sengul Dogan,,176,,107866,,Tree (data structure); Deep learning; k-nearest neighbors algorithm; Support vector machine; Feature selection; Artificial intelligence; Pattern recognition; Computational complexity theory; Computer science; Discrete wavelet transform; Linear discriminant analysis,,,,,https://www.sciencedirect.com/science/article/pii/S0003682X20309713,http://dx.doi.org/10.1016/j.apacoust.2020.107866,,10.1016/j.apacoust.2020.107866,3119043017,,0,000-896-554-641-104; 001-065-278-896-176; 002-214-489-905-725; 002-621-988-427-244; 003-175-750-069-319; 004-266-052-693-819; 004-922-156-123-952; 006-697-972-006-695; 006-748-330-880-222; 012-344-743-259-836; 014-074-491-491-158; 016-557-431-172-349; 017-510-058-519-209; 021-218-500-954-163; 021-883-413-405-000; 022-032-095-214-380; 025-166-283-182-200; 028-882-462-209-225; 029-867-539-332-231; 030-757-432-979-076; 034-664-033-394-954; 035-370-354-940-357; 035-877-553-042-499; 038-110-909-174-624; 040-061-314-068-869; 043-306-941-858-407; 043-982-493-448-36X; 044-222-307-712-45X; 049-326-688-645-526; 049-860-251-887-83X; 054-429-214-096-011; 056-114-742-941-57X; 057-115-503-939-73X; 058-326-239-568-621; 061-813-819-884-897; 064-115-669-679-548; 070-154-914-102-03X; 073-010-012-677-404; 078-017-620-006-093; 078-857-006-890-191; 082-195-820-959-151; 082-279-562-538-749; 085-236-522-178-311; 086-514-389-587-442; 099-315-738-160-501; 109-986-404-834-80X; 114-830-483-002-920; 126-500-361-100-614; 129-691-409-059-301; 136-940-094-377-214; 147-652-690-009-170; 149-046-610-605-072; 179-062-330-007-64X; 187-218-172-649-214,14,false,, 056-715-378-869-201,Engineering an online computer forensic service,,2012,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,R.A.F. Bhoedjang; A. R. Van Ballegooij; H.M.A. van Beek; J.C. van Schie; Feike W. Dillema; R.B. van Baar; F.A. Ouwendijk; M. Streppel,,9,2,96,108,World Wide Web; Forensic science; Software as a service; Law enforcement; Digital evidence; Service (systems architecture); Computer science; Computer forensics; Digital forensics; User interface,,,,,http://dx.doi.org/10.1016/j.diin.2012.10.001 https://www.sciencedirect.com/science/article/pii/S1742287612000655 https://dblp.uni-trier.de/db/journals/di/di9.html#BhoedjangBBSDBOS12,http://dx.doi.org/10.1016/j.diin.2012.10.001,,10.1016/j.diin.2012.10.001,2036428903,,0,005-116-312-278-527; 024-735-069-822-749; 029-569-577-474-673; 033-241-817-699-448; 033-877-222-136-260; 092-614-171-723-187; 104-758-205-558-797; 118-513-636-363-038; 174-800-010-429-560,28,false,, 056-760-246-560-467,Digital Forensics Techniques Overview,2020-06-15,2020,journal article,Bulletin of Science and Practice,24142948,Publishing Center Science and Practice,,A. Vatsenko,"This article discusses the important issue of the use of forensic technology in computer forensics. The basic techniques of computer forensics existing today, such as real-time tracking, sandboxing, data and password recovery, and so on, are examined. The advantages and disadvantages of existing methods are given and recommendations are made on the development of computer forensics techniques in the future. Conclusions are drawn up on the problem of using forensic technology in computer forensics.",6,6,167,174,Computer science; Multimedia; Digital forensics,,,,,http://dx.doi.org/10.33619/2414-2948/55/21,http://dx.doi.org/10.33619/2414-2948/55/21,,10.33619/2414-2948/55/21,3034267720,,0,080-646-163-420-97X,0,true,,gold 056-772-951-594-695,A survey on digital camera identification methods,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Jarosław Bernacki,,34,,300983,,System identification; Artificial intelligence; Digital camera; Scanner; Identification methods; Computer vision; Computer science; Image sensor; Identification (information); Convolutional neural network; Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S2666281720300536,http://dx.doi.org/10.1016/j.fsidi.2020.300983,,10.1016/j.fsidi.2020.300983,3043385148,,0,000-306-680-140-21X; 000-616-206-600-091; 002-396-286-701-554; 003-386-036-604-847; 004-244-613-184-161; 005-583-670-835-138; 007-040-888-672-003; 007-692-957-904-44X; 010-325-503-542-986; 010-456-752-342-66X; 010-747-424-176-877; 011-291-694-500-933; 012-412-270-035-761; 012-831-587-733-644; 013-209-141-298-955; 015-081-428-851-896; 015-350-463-259-41X; 015-717-506-603-742; 022-360-797-551-835; 022-525-316-440-329; 024-361-797-531-399; 026-290-088-195-051; 027-325-543-720-123; 028-364-359-341-316; 030-393-291-334-527; 030-771-390-917-109; 031-691-974-382-167; 031-858-957-893-83X; 038-345-815-717-313; 039-343-260-416-687; 040-802-087-826-847; 044-914-554-944-765; 045-226-923-439-105; 046-818-423-729-611; 047-041-514-008-293; 049-846-693-001-150; 050-312-325-568-750; 050-417-241-606-669; 051-204-718-024-656; 054-417-000-110-430; 055-101-648-072-719; 059-149-073-001-124; 063-116-795-629-582; 063-504-721-532-205; 065-544-349-079-991; 067-913-828-134-760; 069-847-568-544-420; 070-845-448-634-612; 072-715-374-019-55X; 073-233-361-714-785; 074-378-248-247-330; 075-009-191-029-203; 077-218-726-181-521; 084-651-759-924-070; 087-814-787-159-954; 088-181-508-364-285; 088-467-907-853-194; 089-547-267-411-182; 090-717-555-125-134; 091-492-177-865-216; 093-581-897-523-764; 102-096-005-133-302; 102-514-431-944-641; 102-561-386-891-641; 104-397-600-240-163; 104-629-870-444-377; 104-740-736-079-677; 110-214-841-105-125; 116-388-085-562-969; 119-070-738-216-289; 122-039-039-409-279; 122-912-050-557-786; 130-547-183-065-459; 134-035-857-506-713; 136-294-397-714-798; 138-845-490-726-989; 143-793-077-455-213; 143-797-155-020-230; 145-074-262-530-66X; 148-763-794-558-420; 151-372-268-187-893; 155-074-178-700-550; 173-031-985-087-572; 179-834-398-565-338; 180-088-494-514-913; 184-897-235-429-285,9,false,, 056-882-554-610-740,Is Dating Behavior in Digital Contexts Driven by Evolutionary Programs? A Selective Review.,2022-02-28,2022,journal article,Frontiers in psychology,16641078,Frontiers Media S.A.,Switzerland,Jorge Ponseti; Katharina Diehl; Aglaja Valentina Stirn,"In recent years, millions of citizens all over the world have used digital dating services. It remains unknown to what extent human sexuality will be changed by this. Based on an evolutionary psychological perspective, we assume that sexual selection shaped behavioural tendencies in men and women that are designed to increase the reproductive fitness. These tendencies are referred to as sexual strategies. Males and females sexual strategies differ according to sex-dimorphic reproductive investments. We assume that this inheritance will affect human sexuality also in a digital future. To evaluate this assumption, we conducted a selective review of studies on digital dating services. Based on sexual selection theory, we derived a number of hypotheses regarding how men and women will use digital dating services typically and how the use of digital dating services might affect sexual wellbeing. Out of an initial data set of 2,568 records, we finally reviewed a set of 13 studies. These studies provided support for the notion that men and women act in the digital dating area according to sex-typical strategies. However, sometimes the circumstances of digital dating affect communication flow, e.g., in that men are even more active in establishing contacts than they are in real world conditions. Overall, women appear to accomplish their sexual goals in digital dating arenas more than men do given a surplus of male demand. Our results suggest that future human sexuality will be impacted by an interaction of both: sex-dimorphic ancient sexual strategies and new technologies.",13,,678439,,Human sexuality; Affect (linguistics); Set (abstract data type); Psychology; Sexual dimorphism; Evolutionary psychology; Perspective (graphical); Social psychology; Developmental psychology,dating apps; dating platforms; digital sexual services; evolutionary psychology; sexual selection; sexual strategies,,,,,http://dx.doi.org/10.3389/fpsyg.2022.678439,35295383,10.3389/fpsyg.2022.678439,,PMC8919078,0,001-593-609-544-706; 004-208-972-538-517; 008-303-258-906-723; 009-500-151-954-740; 011-997-658-859-425; 012-043-881-342-567; 013-196-801-274-968; 014-447-330-227-910; 014-784-461-706-038; 016-343-565-485-304; 018-339-500-089-686; 025-825-524-768-146; 025-903-854-328-419; 029-931-577-182-637; 030-852-379-769-39X; 032-331-343-181-729; 033-526-417-013-282; 034-277-050-657-47X; 034-854-289-620-879; 035-290-324-645-55X; 038-770-644-673-99X; 040-800-309-929-667; 045-918-304-183-179; 056-107-869-543-418; 057-658-379-469-849; 062-081-690-822-868; 062-377-727-120-644; 062-929-509-099-042; 065-010-405-236-060; 069-552-634-797-138; 072-527-774-955-090; 078-132-724-641-757; 080-521-242-111-914; 080-697-202-859-61X; 083-477-902-437-658; 087-534-577-713-121; 092-650-592-332-764; 102-516-986-153-156; 104-447-654-068-832; 115-724-741-231-695; 117-332-650-004-34X; 132-179-837-423-881; 133-287-637-946-412; 139-598-111-309-458; 144-832-038-735-218; 176-599-516-084-679,0,true,cc-by,gold 056-887-194-738-347,Analytical Comparison of REFS and XFS File Systems,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Kanamarlapudi Venkatalakshmi Bhargavi; Aishvarya Narayanan Nair,,,,,,ReFS; Computer science; Computational science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.07,http://dx.doi.org/10.46293/4n6/2020.02.04.07,,10.46293/4n6/2020.02.04.07,3097507471,,0,,0,false,, 057-366-982-589-875,Reliability assessment of digital forensic investigations in the Norwegian police,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Radina Stoykova; Stig Andersen; Katrin Franke; Stefan Axelsson,"This case study presents a qualitative assessment of the reliability of digital forensic investigation in criminal cases in Norway. A reliability validation methodology based on international digital forensic standards was designed to assess to what extent those standards are implemented and followed by law enforcement in their casework. 124 reports related to the acquisition, examination, and analysis of three types of digital data sources - computers, mobile phones, and storage devices were examined. The reports were extracted from the criminal case management system used by the police and prosecution services. The reports were examined on technology, method, and application level in order to assess the reliability of digital evidence for criminal proceedings. The study found that digital forensic investigation in 21 randomly sampled criminal cases in Norway were insufficiently documented to assess the reliability of the digital evidence. It was not possible to trace the digital forensic actions performed on each item or link the digital evidence to its source. None of the cases were shown to comply with digital forensic methodology, justify the methods and tools used, or validate tool results and error rates. • Digital forensic investigation in 21 randomly sampled criminal cases in Norway were insufficiently documented to assess the reliability of the digital evidence. • It was not possible to trace the digital forensic actions performed on each item or link the digital evidence to its source. • None of the cases were shown to comply with digital forensic methodology, justify the methods and tools used, or validate tool results.",40,,301351,301351,Digital evidence; Digital forensics; Reliability (semiconductor); Forensic science; Criminal investigation; Law enforcement; Computer science; Computer forensics; Computer security; Data science,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301351,,10.1016/j.fsidi.2022.301351,,,0,004-441-167-148-170; 009-512-003-529-193; 017-779-541-978-693; 017-840-378-634-021; 026-774-296-742-022; 041-061-538-346-924; 054-004-313-233-495; 056-307-204-167-258; 061-269-967-405-492; 075-950-021-558-098; 083-748-342-549-230; 088-502-605-341-215; 111-488-239-742-003,1,true,,hybrid 057-630-673-457-131,A Scaling Robust Copy-Paste Tampering Detection for Digital Image Forensics,,2016,journal article,Procedia Computer Science,18770509,Elsevier BV,,Anil Dada Warbhe; Rajiv V. Dharaskar; Vilas M. Thakare,"Abstract It is crucial in image forensics to prove the authenticity of the digital images. Due to the availability of the using sophisticated image editing software programs, anyone can manipulate the images easily. There are various types of digital image manipulation or tampering possible; like image compositing, splicing, copy-paste, etc. In this paper, we propose a passive scaling robust algorithm for the detection of Copy-Paste tampering. Sometimes the copied region of an image is scaled before pasting to some other location in the image. In such cases, the normal Copy-Paste detection algorithm fails to detect the forgeries. We have implemented and used an improved customized Normalized Cross Correlation for detecting highly correlated areas from the image and the image blocks, thereby detecting the tampered regions from an image. The experimental results demonstrate that the proposed approach can be effectively used to detect copy-paste forgeries accurately and is scaling robust.",79,,458,465,Digital image processing; Image restoration; Feature detection (computer vision); Compositing; Artificial intelligence; Image warping; Binary image; Computer vision; Computer science; Digital image; Image processing,,,,,http://www.sciencedirect.com/science/article/pii/S1877050916001903 https://core.ac.uk/display/82364984 https://www.sciencedirect.com/science/article/pii/S1877050916001903 https://www.mendeley.com/catalogue/796d1fc0-2d74-3738-ae03-c995f66eafe9/ https://core.ac.uk/download/pdf/82364984.pdf,http://dx.doi.org/10.1016/j.procs.2016.03.059,,10.1016/j.procs.2016.03.059,2314313970,,0,007-593-872-409-964; 018-037-484-424-937; 018-714-912-826-875; 019-461-243-164-715; 024-225-405-455-512; 028-462-269-708-347; 029-322-330-771-081; 033-295-070-837-251; 034-121-155-020-714; 037-103-332-118-06X; 037-464-485-150-339; 038-937-237-659-201; 039-055-556-012-538; 040-499-338-725-508; 045-327-928-509-160; 045-496-560-764-477; 062-007-949-183-546; 063-891-549-168-52X; 065-037-301-489-012; 065-369-773-065-673; 065-873-523-989-876; 075-228-376-439-786; 076-346-829-732-533; 076-704-896-134-67X; 080-794-266-877-942; 086-832-985-542-578; 089-363-854-574-422; 090-691-753-970-360; 092-092-246-517-236; 097-461-557-468-286; 102-816-097-773-341; 124-874-123-332-712; 131-740-474-802-798; 132-355-978-858-838; 161-589-884-103-104; 172-264-312-197-129; 173-881-114-277-726,11,true,,gold 057-810-697-639-827,Analisis Digital Forensik pada File Steganography (Studi kasus : Peredaran Narkoba),2017-04-08,2017,journal article,Jurnal Teknik Informatika dan Sistem Informasi,24432229; 24432210,Maranatha Christian University,,Agung Purnama Saputra; Nur Widiyasono,"Kemajuan teknologi selain membawa dampak positif juga membawa dampak negatif, beberapa contoh organized crime termasuk aktivitas yang mengarah pada terorisme dan perdagangan ilegal seperti narkotika, telah teridentifikasi memanfaatkan teknik steganography untuk berkomunikasi dan menyampaikan pesan-pesan diantara kelompoknya. Steganografi  merupakan  seni  dan  ilmu  menulis  atau  menyembunyikan pesan  tersembunyi  dengan  cara  tertentu  sehingga  selain  si  pengirim  dan  si penerima,  tidak  ada  seorang  pun  yang  mengetahui  atau  menyadari  bahwa  ada suatu  pesan  rahasia. maka peran digital forensik sebagai metode pembuktian suatu kasus kejahatan secara digital menjadi sangat penting, Digital forensik adalah penggunaan teknik analisis dan investigasi untuk mengidentifikasi, mengumpulkan, memeriksa dan menyimpan bukti/informasi yang secara magnetis tersimpan/disandikan pada komputer atau media penyimpanan digital sebagai alat  bukti dalam mengungkap kasus kejahatan yang dapat dipertanggungjawabkan secara hukum. Maksud dan tujuan dari penulisan tugas akhir ini adalah untuk menjelaskan cara menemukan bukti digital yang tersembunyi menggunkan teknik steganografi, sehingga informasi yang diperoleh merupakan sebuah fakta yang akurat sesuai peruntukannya. Terdapat banyak tools yang dapat digunakan dalam kasus forensik untuk memeriksabarang bukti, namun dalam penelitian ini tools yang digunakan adalah WinHex dan InvisibleSecrets.",3,1,140628,,,,,,,https://www.neliti.com/publications/140628/analisis-digital-forensik-pada-file-steganography-studi-kasus-peredaran-narkoba https://media.neliti.com/media/publications/140628-ID-analisis-digital-forensik-pada-file-steg.pdf,http://dx.doi.org/10.28932/jutisi.v3i1.594,,10.28932/jutisi.v3i1.594,2625911286,,0,,1,true,, 057-814-822-953-013,Document Clustering in Forensic Investigation by Hybrid Approach,2014-04-18,2014,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,G. Thilagavathi; J. Anitha,"Digital Forensic Investigation is the branch of scientific forensic process for investigation of material found in digital devices related to computer crimes. Digital evidence analogous to particular incident is any digital data that provides hypothesis about incident. The essential part of Digital forensic Process is to analyze the documents present on suspect‟s computer. Due to increasing count of documents and larger size of storage devices makes very difficult to analyze the documents on computer. To overcome these problems, a subject based semantic document clustering algorithm along with bisecting-kmeans has been proposed that allows the examiner to analyze and cluster the documents based on particular subject and also the terms that does not belong to any subject. The accuracy of clustering of documents has been improved by means of this hybrid approach.",91,3,14,19,Data mining; Forensic science; Document clustering; Digital forensic process; Subject (documents); Suspect; Digital evidence; Digital forensic investigation; Computer science; Process (engineering); Cluster analysis,,,,,https://research.ijcaonline.org/volume91/number3/pxc3894784.pdf https://www.ijcaonline.org/archives/volume91/number3/15860-4784 http://ui.adsabs.harvard.edu/abs/2014IJCA...91c..14T/abstract,http://dx.doi.org/10.5120/15860-4784,,10.5120/15860-4784,2099207896,,0,006-169-257-799-439; 021-572-735-190-382; 025-484-182-808-044; 052-814-620-196-112; 063-976-673-171-817; 065-901-777-764-939; 074-249-424-367-729; 080-826-345-483-814; 095-274-059-975-043; 106-849-681-739-149; 120-695-214-222-114; 166-429-669-625-531; 168-493-303-499-04X; 176-271-242-066-828; 184-948-841-629-735,5,true,,green 058-200-891-793-092,Reviewing the Existing Methodologies and Tools of Cloud Forensics: Challenges and Solutions,,2020,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Khalid A Alattas; Magdy Bayoumi,,9,4,147,154,Data science; Cloud forensics; Computer science; Wireless,,,,,http://sdiwc.net/digital-library/reviewing-the-existing-methodologies-and-tools-of-cloud-forensics-challenges-and-solutions,http://dx.doi.org/10.17781/p002677,,10.17781/p002677,3148395164,,0,039-189-453-189-406,0,false,, 058-329-964-903-756,Forensic authentication method for audio recordings generated by Voice Recorder application on Samsung Galaxy Watch4 series.,2022-10-22,2022,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Nam In Park; Seong Ho Lim; Jun Seok Byun; Jin-Hwan Kim; Ji Woo Lee; Chanjun Chun; Yonggang Kim; Oc-Yeub Jeon,"The number of smartwatch users has been rapidly increasing in recent years. A smartwatch is a wearable device that collects various types of data using sensors and provides basic functions, such as healthcare-related measurements and audio recording. In this study, we proposed the forensic authentication method for audio recordings from the Voice Recording application in the Samsung Galaxy Watch4 series. First, a total of 240 audio recordings from each of the four different models, paired with four different smartphones for synchronization via Bluetooth, were collected and verified. To analyze the characteristics of smartwatch audio recordings, we examined the transition of the audio latency, writable audio bandwidth, timestamps, and file structure between those generated in the smartwatches and those edited using the Voice Recording application of the paired smartphones. In addition, the devices with the audio recordings were examined via the Android Debug Bridge (ADB) tool and compared with the timestamps stored in the file system. The experimental results showed that the audio latency, writable audio bandwidth, and file structure of audio recordings generated by smartwatches differed from those generated by smartphones. Additionally, by analyzing the file structure, audio recordings can be classified as unmanipulated, manipulation has been attempted, or manipulated. Finally, we can forensically authenticate the audio recordings generated by the Voice Recorder application in the Samsung Galaxy Watch4 series by accessing the smartwatches and analyzing the timestamps related to the audio recordings in the file system.",,,,,,Galaxy Watch4; M4A; Voice Recorder application; audio forensics; audio forgery detection; audio latency; forensic authentication method; metadata,,,"Ministry of Interior and Safety, Republic of Korea (NFS2022DTB03); Ministry of Interior and Safety, Republic of Korea (NFS2022DTB04)",,http://dx.doi.org/10.1111/1556-4029.15158,36273272,10.1111/1556-4029.15158,,,0,001-458-381-243-357; 006-794-410-339-126; 022-068-312-435-53X; 043-261-465-467-889; 046-034-142-979-678; 051-558-525-539-694; 138-870-891-535-969,0,false,, 058-658-217-563-45X,Twentieth Annual DFRWS Conference,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Alex Nelson,,33,,301028,,,,,,,https://doi.org/10.1016/j.fsidi.2020.301028 https://api.elsevier.com/content/article/PII:S2666281720303115?httpAccept=text/xml http://dblp.uni-trier.de/db/journals/di/di33S.html#Nelson20a,http://dx.doi.org/10.1016/j.fsidi.2020.301028,,10.1016/j.fsidi.2020.301028,3091173488,,0,,0,true,,bronze 058-673-328-503-201,Research summary: The effects of switching the camera module from BlackBerry Curve 9360 devices,,2013,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Floris Gisolf; Zeno Geradts; Dennie Verhoeven; Coert Klaver,,10,1,56,61,Camera resectioning; Computer graphics (images); Camera phone; Artificial intelligence; Smart camera; Camera interface; Stereo camera; Digital camera; Computer vision; Computer science; Camera module; Camera auto-calibration,,,,,https://doi.org/10.1016/j.diin.2013.01.007 https://dblp.uni-trier.de/db/journals/di/di10.html#GisolfGVK13 https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F07cd177c-b0b3-4a3d-8fdf-7dcc5d7bdbf4 https://dare.uva.nl/personal/search?identifier=07cd177c-b0b3-4a3d-8fdf-7dcc5d7bdbf4 http://dblp.uni-trier.de/db/journals/di/di10.html#GisolfGVK13 https://core.ac.uk/display/132739753 https://www.sciencedirect.com/science/article/pii/S174228761300008X,http://dx.doi.org/10.1016/j.diin.2013.01.007,,10.1016/j.diin.2013.01.007,2023044347,,0,000-480-947-961-716; 003-009-062-014-855; 013-766-124-774-712; 045-226-923-439-105; 069-184-474-173-724; 077-828-134-917-257; 083-097-133-928-799; 160-685-922-453-820; 164-717-721-813-673; 179-834-398-565-338; 180-088-494-514-913; 184-897-235-429-285,2,false,, 058-829-172-935-902,A preliminary assessment of latent fingerprint evidence damage on mobile device screens caused by digital forensic extractions,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Graeme Horsman; Helen Page; Peter Beveridge,"Abstract Mobile devices continue to feature heavily in criminal investigations and often bear multiple forms of potentially relevant evidence. In the context of identifying the owner of a device, both latent fingerprints and resident digital data may be crucial to investigations, yet each individual process may have a detrimental impact on the other. Fingerprint development techniques are known to impact device hardware, whilst digital extraction processes can destroy latent prints. This article examines the impact of mobile device extraction procedures on resident screen fingerprints. The impact of bare fingered, cotton gloved, latex gloved and stylus screen press and swipes on latent print destruction are examined. Results indicate that all forms of interaction cause print damage, but to a variable extent. Provisional device handling recommendations are offered.",27,,47,56,Human–computer interaction; Criminal investigation; Stylus; Mobile device; Fingerprint (computing); Context (language use); Latent fingerprint; Multiple forms; Computer science; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/di/di27.html#HorsmanPB18 https://research.tees.ac.uk/ws/files/6504500/FP_Article_V_0.1_HP_comments_and_additions_2_.pdf https://www.sciencedirect.com/science/article/pii/S174228761830166X https://research.tees.ac.uk/en/publications/a-preliminary-assessment-of-latent-fingerprint-evidence-damage-on https://core.ac.uk/download/pdf/196169309.pdf,http://dx.doi.org/10.1016/j.diin.2018.10.002,,10.1016/j.diin.2018.10.002,2896336471,,0,002-589-008-193-992; 003-519-880-943-664; 019-831-293-743-518; 032-451-540-235-796; 047-997-437-748-154; 061-733-902-008-548; 079-273-634-331-435; 086-127-900-681-736; 108-365-031-739-392; 115-605-205-562-974; 120-697-354-224-33X; 163-330-758-807-944; 173-779-991-377-816,1,true,cc-by-nc-nd,green 059-002-926-336-692,Challenges in applying the ACPO principles in cloud forensic investigations,2012-03-31,2012,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Harjinder Singh Lallie,"The numerous advantages offered by cloud computing has fuelled its growth and has made it one of the most significant of current computing trends. The same advantages have created complex issues for those conducting digital forensic investigations. Digital forensic investigators rely on the ACPO guidelines when conducting an investigation, however the guidelines make no reference to some of the issues presented by cloud investigations. This study investigates the impact of cloud computing on ACPO’s core principles and asks whether there is a need for the principles and guidelines to be reviewed to address the issues presented by cloud computing. Empirical research is conducted and data collected from key experts in the field of digital forensics. This research presents several key findings: there is a very real concern for how cloud computing will affect digital forensic investigations; the ACPO principles cannot easily be applied in all cloud investigations but are generally sufficient for cloud computing forensic investigations. However the advent of cloud computing is a significant development in technology and may in the near future warrant a review of the guidelines in particular to incorporate the involvement of third parties in cloud investigations.",7,1,71,86,Empirical research; Key (cryptography); Data science; No reference; Field (computer science); Computer security; Computer science; Cloud computing; Digital forensics,,,,,https://doaj.org/article/5090d506c02945faa7e69e3f3b1b14ea https://doi.org/10.15394/jdfsl.2012.1113,https://doaj.org/article/5090d506c02945faa7e69e3f3b1b14ea,,,1631307534,,0,,6,true,cc-by-nc,gold 059-098-460-373-81X,APAC2022-Print-Ad-Hybrid-Web (3),,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,42,,301424,301424,Computer science; World Wide Web,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00105-6,,10.1016/s2666-2817(22)00105-6,,,0,,0,false,, 059-259-578-782-71X,Digital Forensics through Application Behavior Analysis,2016-06-08,2016,journal article,International Journal of Modern Education and Computer Science,20750161; 2075017x,MECS Publisher,,Shuaibur Rahman; M. A. Khan,"The field of digital forensic analysis has emerged in the past two decades to counter the digital crimes and investigate the modus operandi of the culprits to secure the computer systems. With the advances in technologies and pervasive nature of the computing devices, the digital forensic analysis is becoming a challenging task. Due to ease of digital equipment and popularity of Internet, criminals have been enticed to carry out digital crimes. Digital forensic is aimed to investigate the criminal activity and bring the culprits to justice. Traditionally the static analysis is used to investigate about an incident but due to a lot of issues related the accuracy and authenticity of the static analysis, the live digital forensic analysis shows an investigator a more complete picture of memory dump. In this paper, we introduce a module for profiling behavior of application programs. Profiling of application is helpful in forensic analysis as one can easily analyze the compromised system. Profiling is also helpful to the investigator in conducting malware analysis as well as debugging a system. The concept of our model is to trace the unique process name, loaded services and called modules of the target system and store it in a database for future forensic and malware analysis. We used VMware workstation version 9.0 on Windows 7 platform so that we can get the detailed and clean image of the current state of the system. The profile of the target application includes the process name, modules and services which are specific to an application program.",8,6,50,56,The Internet; Profiling (information science); Debugging; Malware analysis; Computer security; Computer science; State (computer science); Core dump; Digital forensics; Static analysis,,,,,http://www.mecs-press.org/ijmecs/ijmecs-v8-n6/IJMECS-V8-N6-7.pdf http://www.mecs-press.org/ijmecs/ijmecs-v8-n6/v8n6-7.html,http://dx.doi.org/10.5815/ijmecs.2016.06.07,,10.5815/ijmecs.2016.06.07,2475018646,,0,004-901-338-563-34X; 009-662-897-370-073; 009-750-732-270-162; 009-921-402-381-197; 014-068-011-589-367; 015-716-156-761-980; 017-071-408-718-290; 021-154-782-910-440; 021-917-398-361-902; 026-766-854-469-439; 035-269-627-388-435; 037-483-791-552-006; 040-483-292-320-671; 042-251-875-510-426; 042-977-612-584-987; 050-972-167-651-471; 051-503-387-938-284; 053-514-707-122-724; 054-507-171-824-189; 055-276-197-513-371; 058-308-781-214-808; 059-382-595-317-362; 064-915-221-771-392; 067-675-478-830-924; 070-417-028-826-684; 072-331-380-933-265; 073-717-900-354-928; 074-280-954-610-349; 086-491-087-364-017; 087-690-831-820-163; 093-448-702-012-591; 096-993-850-376-090; 100-498-406-037-927; 100-910-933-877-743; 106-832-935-724-238; 120-462-880-448-150; 120-753-186-411-42X; 121-234-261-402-315; 124-236-800-957-968; 147-707-428-925-566; 167-218-963-646-727; 198-979-419-447-995,3,true,,gold 059-294-756-490-060,BitScout: Remote Digital Forensics Toolkit,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Himani Rawat,"Forensic Science has been full of challenges for most of the Law Enforcement Agency (LEA) as we need to physically visit the crime scene, acquire evidence, then preserve it for forensic analysis. The path of collecting evidences from crime site and then bringing it to the Forensic Labs. becomes much cumbersome as the evidence may be corrupted or altered during transit. So why not to adopt a system for readily analysis of a compromised system without going to the crime site and sitting on one’s chair or forensic workstation?; The answer may be yes, we can but will it be easy and ethical to acquire evidence from a system remotely without visiting the crime scene physically. Vitaly Kamluk from Kaspersky Labs made this possible now by launching a new forensic tool called BitScout . To solve this problem, security researchers and Forensic Investigator can now use BitScout to collect remotely, key forensic evidences, to acquire full disk images via the network or locally attached storage devices, or simply to assist in malware incident handling. Evidence data can be viewed and analysed remotely or locally while the source data storage remains intact through reliable container-based isolation. BitScout is an open-source and free tool developed by security researchers for all people interested in digital forensics and cyber crimes investigations.",,,22,23,Computer science; Multimedia; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.03,http://dx.doi.org/10.46293/4n6/2020.02.02.03,,10.46293/4n6/2020.02.02.03,3022406620,,0,,0,false,, 059-316-462-802-051,Smart Digital Forensic Framework for Crime Analysis and Prediction using AutoML,,2021,journal article,International Journal of Advanced Computer Science and Applications,21565570; 2158107x,The Science and Information Organization,,Sajith A Johnson; S Ananthakumaran,"Over the most recent couple of years, the greater part of the information, for example books, recordings, pictures, clinical, forensic, criminal and even the hereditary data of people are being pushed toward digitals and cyber-dataspaces. This problem requires sophisticated techniques to deal with the vast amounts of data. We propose a novel solution to the problem of gaining actionable intelligence from the voluminous existing and potential digital forensic data. We have formulated an Automated Learning Framework ontology for Digital Forensic Applications relating to collaborative crime analysis and prediction. The minimum viable ontology we formulated by studying the existing literature and applications of Machine learning has been used to devise an Automated Machine Learning implementation to be quantitatively and qualitatively studied in its capabilities to aid intelligence practices of Digital Forensic Investigation agencies in representing, reasoning and forming actionable insights from the vast and varied collected real world data. A testing implementation of the framework is made to assess performance of our proposed generalized Smart Forensic Framework for Digital Forensics applications by comparison with existing solutions on quantitative and qualitative metrics and assessments. We will use the insights and performance metrics derived from our research to motivate forensic intelligence agencies to exploit the features and capabilities provided by AutoML Smart Forensic Framework applications.",12,3,,,Exploit; Ontology (information science); Data science; Crime analysis; Automated learning; Forensic intelligence; Digital forensic investigation; Real world data; Computer science; Digital forensics,,,,,https://thesai.org/Publications/ViewPaper?Volume=12&Issue=3&Code=IJACSA&SerialNo=49 https://thesai.org/Downloads/Volume12No3/Paper_49-Smart_Digital_Forensic_Framework.pdf,http://dx.doi.org/10.14569/ijacsa.2021.0120349,,10.14569/ijacsa.2021.0120349,3143085218,,0,,1,true,cc-by,gold 059-397-656-514-952,Quantitative evaluation of the results of digital forensic investigations: a review of progress.,2021-02-08,2021,journal article,Forensic sciences research,24711411; 20961790,Informa UK Limited,England,Richard E. Overill; Jan Collie,"Unlike conventional forensics, digital forensics does not at present generally quantify the results of its investigations. It is suggested that digital forensics should aim to catch up with other f...",6,1,13,18,Data science; Bayesian network; Computer science; Information theory; Digital forensics,Bayesian networks; Forensic sciences; complexity theory; digital forensic metrics; information theory; measures of plausibility; probability theory; statistical theory,,,,http://oro.open.ac.uk/75314/ https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8112825/ https://europepmc.org/article/PMC/PMC8112825 https://doaj.org/article/036a718d1882483896312c0a40ef8b39 https://www.tandfonline.com/doi/full/10.1080/20961790.2020.1837429,http://dx.doi.org/10.1080/20961790.2020.1837429,34007512,10.1080/20961790.2020.1837429,3126160358,PMC8112825,0,000-578-002-989-782; 001-755-455-053-419; 002-657-433-027-989; 005-859-821-142-158; 007-210-880-162-593; 007-832-595-971-443; 008-362-883-971-90X; 009-725-146-094-077; 010-408-812-989-291; 023-051-490-797-571; 030-763-851-934-420; 035-787-138-433-311; 045-439-795-806-132; 048-029-723-086-698; 055-167-931-095-336; 061-269-967-405-492; 063-088-664-524-670; 064-988-327-019-067; 068-045-694-782-701; 072-475-343-868-508; 074-325-698-839-633; 089-477-367-447-018; 101-550-862-215-24X; 106-964-315-836-68X; 110-744-808-081-983; 111-263-791-310-020; 111-471-986-310-852; 129-255-411-519-417; 142-855-067-627-071; 148-306-588-835-497; 151-157-528-819-921; 166-329-182-326-355; 176-279-989-411-85X; 191-131-191-175-686,2,true,"CC BY, CC BY-NC",gold 059-541-479-175-841,An Automatic Digital Audio Authentication/Forensics System,,2017,journal article,IEEE Access,21693536,Institute of Electrical and Electronics Engineers (IEEE),United States,Zulfiqar Ali; Muhammad Imran; Mansour Alsulaiman,"With the continuous rise in ingenious forgery, a wide range of digital audio authentication applications are emerging as a preventive and detective control in real-world circumstances, such as forged evidence, breach of copyright protection, and unauthorized data access. To investigate and verify, this paper presents a novel automatic authentication system that differentiates between the forged and original audio. The design philosophy of the proposed system is primarily based on three psychoacoustic principles of hearing, which are implemented to simulate the human sound perception system. Moreover, the proposed system is able to classify between the audio of different environments recorded with the same microphone. To authenticate the audio and environment classification, the computed features based on the psychoacoustic principles of hearing are dangled to the Gaussian mixture model to make automatic decisions. It is worth mentioning that the proposed system authenticates an unknown speaker irrespective of the audio content i.e., independent of narrator and text. To evaluate the performance of the proposed system, audios in multi-environments are forged in such a way that a human cannot recognize them. Subjective evaluation by three human evaluators is performed to verify the quality of the generated forged audio. The proposed system provides a classification accuracy of 99.2% ± 2.6. Furthermore, the obtained accuracy for the other scenarios, such as text-dependent and text-independent audio authentication, is 100% by using the proposed system.",5,,2994,3007,Authentication; Auditory system; Microphone; Audio forensics; Speech recognition; Sound perception; Computer science; Digital audio; Psychoacoustics,,,,"Deanship of Scientific Research, King Saud University, Riyadh, Saudi Arabia, under the Research Group",https://dblp.uni-trier.de/db/journals/access/access5.html#AliIA17 https://pure.ulster.ac.uk/en/publications/an-automatic-digital-audio-authenticationforensics-system https://doi.org/10.1109/ACCESS.2017.2672681 https://ieeexplore.ieee.org/abstract/document/7864411 http://repository.essex.ac.uk/27231/ https://ulster-staging.pure.elsevier.com/en/publications/an-automatic-digital-audio-authenticationforensics-system https://pure.ulster.ac.uk/ws/files/71153352/audio_authen_IEEE_Access.pdf http://ieeexplore.ieee.org/document/7864411/ https://core.ac.uk/download/287023576.pdf,http://dx.doi.org/10.1109/access.2017.2672681,,10.1109/access.2017.2672681,2591157802,,0,000-780-924-227-038; 002-890-793-739-219; 008-757-979-445-679; 011-451-536-949-292; 011-907-186-505-503; 015-613-308-645-582; 021-712-692-138-702; 023-420-292-710-552; 025-299-900-166-361; 033-225-389-686-623; 035-492-160-906-551; 036-335-162-732-070; 049-209-305-832-496; 057-673-642-771-371; 058-633-974-913-727; 060-643-003-548-166; 061-591-578-204-385; 073-911-854-128-151; 074-017-562-218-104; 074-506-965-829-791; 077-652-355-257-145; 080-872-836-176-779; 087-700-976-402-858; 092-488-100-046-102; 092-522-060-753-940; 114-599-315-973-390; 119-587-371-187-398; 138-031-180-838-106; 151-075-769-432-235; 163-973-756-079-575; 187-902-973-366-522,15,true,"CC BY, CC BY-NC-ND",gold 059-609-113-377-949,Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Noora Al Mutawa; Joanne Bryce; Virginia N. L. Franqueira; Andrew Marrington,"Behavioural Evidence Analysis (BEA) is, in theory, useful in developing an understanding of the offender, the victim, the crime scene, and the dynamics of the crime. It can add meaning to the evidence obtained through digital forensic techniques and assist investigators with reconstruction of a crime. There is, however, little empirical research examining the application of BEA to actual criminal cases, particularly cyberstalking cases. This study addresses this gap by examining the utility of BEA for such cases in terms of understanding the behavioural and motivational dimensions of offending, and the way in which digital evidence can be interpreted. It reports on the forensic analysis of 20 cyberstalking cases investigated by Dubai Police in the last five years. Results showed that BEA helps to focus an investigation, enables better understanding and interpretation of victim and offender behaviour, and assists in inferring traits of the offender from available digital evidence. These benefits can help investigators to build a stronger case, reduce time wasted to mistakes, and to exclude suspects wrongly accused in cyberstalking cases.",16,16,S96,S103,Empirical research; Forensic science; Crime scene; Cyberstalking; Digital evidence; Computer security; Computer science; Interpretation (philosophy); Meaning (linguistics); Criminology; Digital forensics,,,,,https://www.infona.pl/resource/bwmeta1.element.elsevier-796b80b4-b548-3256-90c3-0614e1e6b193 https://www.sciencedirect.com/science/article/pii/S1742287616300068 https://cyberleninka.org/article/n/587101.pdf https://cyberleninka.org/article/n/587101 https://dl.acm.org/doi/10.1016/j.diin.2016.01.012 https://derby.openrepository.com/handle/10545/608462 http://www.sciencedirect.com/science/article/pii/S1742287616300068 https://dl.acm.org/citation.cfm?id=2910145 https://core.ac.uk/display/42138486 http://clok.uclan.ac.uk/14089/ https://core.ac.uk/download/42138486.pdf,http://dx.doi.org/10.1016/j.diin.2016.01.012,,10.1016/j.diin.2016.01.012,2329693662,,0,005-578-292-466-235; 009-625-838-012-548; 011-207-484-659-618; 019-645-930-990-548; 024-890-178-947-591; 036-269-075-303-806; 037-550-015-414-716; 039-097-172-195-326; 049-488-209-182-213; 060-822-607-399-070; 072-811-052-394-365; 073-624-718-302-07X; 090-152-464-314-890; 097-039-638-472-515; 104-401-234-970-738; 106-997-065-291-365; 120-664-015-054-54X; 121-601-580-498-491; 140-730-540-277-926; 145-062-913-009-934; 159-823-071-020-847; 160-976-357-855-420; 164-534-073-076-975; 167-652-916-391-487,15,true,cc-by-nc-nd,hybrid 059-651-348-807-199,Digital media investigators: challenges and opportunities in the use of digital forensics in police investigations in England and Wales,2021-05-07,2021,journal article,Policing: An International Journal,1363951x,Emerald,United Kingdom,Dana Wilson-Kovacs,"In-depth knowledge about specific national approaches to using digital evidence in investigations is scarce. A clearer insight into the organisational barriers and professional challenges experienced, alongside a more detailed picture of how digital evidence can help police investigations are required to empirically substantiate claims about how digital technologies are changing the face of criminal investigations. The paper aims to focus on the introduction of digital media investigators to support investigating officers with the collection and interpretation of digital evidence.,Drawing on ethnographic and interview data collected as part of an Economic and Social Research Council-funded project on the application of digital forensics expertise in policing in England and Wales, this paper examines the changing face of investigations in relation to escalating digital demand.,The analysis presents the national and regional organisational parameters of deploying digital expertise in criminal investigation and examines some of the challenges of being a digital media investigator (DMI). Through testimonies from DMIs, digital forensic practitioners, investigating and senior officers and forensic managers, the analysis explores the organisational tensions in the collection, processing, interpretation and use of information from digital devices for evidential purposes.,The paper offers an empirical basis for the comparative study of how the DMI role has been implemented by law enforcement agencies and its fit within broader institutional considerations and processes.,The development of the DMI role has raised questions about the supply of digital expertise, especially to volume crime investigations, and tensions around occupational divisions between scientific and operational units.,The findings show that while the introduction of the DMI role was much needed, the development of this valuable provision within each force and the resources available require sustained and coordinated support to protect these professionals and retain their skills.,This study contributes to the growing sociological and criminological literature with an ethnographically based perspective into the organisational and occupational tensions in the identification and processing of digital evidence in England and Wales.",44,4,669,682,Criminal investigation; Digital media; Political science; Law enforcement; Digital evidence; Public relations; Social research; Organizational culture; Identification (information); Digital forensics,,,,,https://ore.exeter.ac.uk/repository/bitstream/10871/125904/4/Wilson-Kovacs%20March%202021%20DMI.pdf https://www.emerald.com/insight/content/doi/10.1108/PIJPSM-02-2021-0019/full/html https://ore.exeter.ac.uk/repository/handle/10871/125904,http://dx.doi.org/10.1108/pijpsm-02-2021-0019,,10.1108/pijpsm-02-2021-0019,3159541089,,0,004-200-813-216-207; 007-534-583-347-568; 009-285-002-570-736; 009-331-383-545-394; 009-512-003-529-193; 009-603-892-016-518; 009-737-876-320-900; 030-178-593-043-926; 031-614-539-275-181; 037-550-015-414-716; 059-355-319-008-527; 062-137-637-964-947; 069-830-580-589-946; 073-313-808-035-835; 074-706-219-689-754; 077-493-637-233-955; 083-769-333-117-658; 086-419-575-179-359; 113-225-815-651-029; 137-298-307-797-644; 142-790-196-752-819,4,true,,green 059-667-076-144-681,Libforensics For Developing Digital Forensics Applications,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,James Hebidzi Senanu,"The evolution of computers, increase in cybercrime and the demand by law requirements for the production of admissible forensic reports require the application of digital/computer technologies and require the development of a methodology to systematically search digital devices for significant evidence. Cyber and computer fraud are growing by the passing of the day with less than two percent of the reported cases resulting in confidence leading to securing justice and or convictions. This study explores the digital forensic applications and ease of integration of the existing forensic applications. It was the view of the researcher that there exists a gap of monolithic in forensic applications and the cyber universe. One requires different applications to conduct a forensic investigation into a crime revolving around different digital universes. The study proposed research into the development of a single enterprise digital forensic application capable of examining all aspects of the universe regardless and producing an admissible report in the court of law Keywords: Forensic, Cybercrime, Monolithic, Digital universe, Cyberspace, Cyber ecosystem BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: James Hebidzi Senanu (2022): Libforensics For Developing Digital Forensics Applications. Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 335-338 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P53",1,1,335,338,Digital forensics; Digital evidence; Computer forensics; Cybercrime; Nexus (standard); Cyberspace; Computer science; Computer security; Child pornography; Network forensics; Law enforcement; The Internet; World Wide Web; Law; Political science; Embedded system,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p53,,10.22624/aims/crp-bk3-p53,,,0,,0,true,,bronze 059-898-396-008-601,THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS,2020-05-18,2020,journal article,Criminalistics and Forensics,01302655,Kyiv Scientific Research Institute of Forensic Expertise,,M. Dumchykov,"The article deals with some aspects of digitalization of forensic activity, such as improving the efficiency of search and cognitive activity of an investigator using digital technologies, and effective organization of such activity. Use of computer hardware, software, various computer and digital technologies and scripting to investigate crimes. The definitions of “digital trace” and “virtual trace” demonstrate the complexity of these issues. Certain dynamic movement of criminal activity in the information environment is analyzed. Defines the concept of virtual trace as a specific trace of certain actions in the information space of computer devices and their network systems. In considering the definition of the concept of virtual trace, the views of scientists such as V.A. Meshcheriakov, V.V. Poliakov and Smushkin A.V.; ; The aspects of consideration of forensic digitization are identified, among which the main ones are:; ; – use of digital technologies to increase the effectiveness of search and cognitive activity of the investigator, effective organization of this activity at the present level, optimization of interaction of different bodies, institutions in the investigation of crimes.; ; – the use of information and communication technologies to investigate crimes.; ; – solving didactic tasks in the field of training, retraining, advanced training of investigators, criminal investigators, forensic experts, improvement of their qualification, exchange of experience.; ; The further question of the development of forensic science in the field of information society is investigated. It is determined in what form the information forensics will exist, namely:; ; A new section of classic forensics that focuses on working with digital and virtual footprints.; The new science of “digital or virtual forensics”.; 3. Independent forensic science within the framework of the general theory of forensic science, which integrates the development of virtual traces, the use of new technical means of finding, fixing, research, use in proving forensically relevant information, technologies that ensure the effectiveness of the investigator.",,65,100,108,Engineering; Data science; Digitization; Retrospective analysis,,,,,http://dx.doi.org/10.33994/kndise.2020.65.10,http://dx.doi.org/10.33994/kndise.2020.65.10,,10.33994/kndise.2020.65.10,3037841873,,0,,0,true,,gold 059-942-556-683-418,Digital Forensic Investigation of MongoDB,2014-02-28,2014,journal article,Journal of the Korea Institute of Information Security and Cryptology,15983986,Korea Institute of Information Security and Cryptology,,Jongseong Yoon; Doo-Won Jung; Chul-hoon Kang; Sangjin Lee,"As the data gets bigger recently, the demand for relational database management system (RDBMS) and NoSQL DBMS to process big data has been increased consistently. The digital forensic investigation method for RDBMS has been studied actively, but that for NoSQL DBMS, which is popularly used nowadays, has almost no research. This paper proposes the digital forensic investigation process and method for MongoDB, the most popularly used among NoSQL DBMS.",24,1,123,134,World Wide Web; Relational database management system; Database forensics; NoSQL; Digital forensic investigation; Computer science; Big data; Database; Digital forensics,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2014_v24n1_123,http://dx.doi.org/10.13089/jkiisc.2014.24.1.123,,10.13089/jkiisc.2014.24.1.123,2143602713,,0,001-619-124-305-400; 007-120-713-093-456; 031-612-703-045-160; 055-850-354-942-609; 063-229-337-814-634; 073-858-118-041-517; 125-519-560-533-563; 175-963-446-474-971,3,true,,bronze 060-043-515-260-052,Using Anisotropic Diffusion for Efficient Extraction of Sensor Noise in Camera Identification,2012-02-13,2012,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Wiger van Houten; Zeno Geradts,":  Each digital camera has an intrinsic fingerprint that is unique to each camera. This device fingerprint can be extracted from an image and can be compared with a reference device fingerprint to determine the device origin. The complexity of the filters proposed to accomplish this is increasing. In this note, we use a relatively simple algorithm to extract the sensor noise from images. It has the advantages of being easy to implement and parallelize, and working faster than the wavelet filter that is common for this application. In addition, we compare the performance with a simple median filter and assess whether a previously proposed fingerprint enhancement technique improves results. Experiments are performed on approximately 7500 images originating from 69 cameras, and the results are compared with this often used wavelet filter. Despite the simplicity of the proposed method, the performance exceeds the common wavelet filter and reduces the time needed for the extraction.",57,2,521,527,Engineering; Noise; Artificial intelligence; Anisotropic diffusion; Fingerprint (computing); Digital camera; Device fingerprint; Computer vision; Median filter; Digital forensics; SIMPLE algorithm,,,,,https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1556-4029.2012.02057.x https://www.ncbi.nlm.nih.gov/pubmed/22329355 https://forensic.to/JOFS-10-234%20-%20AnisoDiff.pdf http://www.forensic.to/JOFS-10-234%20-%20AnisoDiff.pdf https://europepmc.org/article/MED/22329355,http://dx.doi.org/10.1111/j.1556-4029.2012.02057.x,22329355,10.1111/j.1556-4029.2012.02057.x,1928872245,,0,013-766-124-774-712; 014-079-494-188-077; 017-823-654-117-246; 030-109-545-148-361; 045-168-992-395-537; 046-392-586-979-126; 053-781-637-768-867; 075-086-734-221-525; 080-729-034-453-138; 122-486-087-773-74X; 160-685-922-453-820; 180-088-494-514-913; 184-897-235-429-285,25,true,,green 060-141-830-760-910,Hierarchical Context Network for Airborne Image Segmentation,,2022,journal article,IEEE Transactions on Geoscience and Remote Sensing,01962892; 15580644,Institute of Electrical and Electronics Engineers (IEEE),United States,Feng Zhou; Renlong Hang; Hui Shuai; Qingshan Liu,,60,,1,12,Image segmentation; Context (archaeology); Computer science; Computer vision; Artificial intelligence; Remote sensing; Segmentation; Image processing; Image (mathematics),,,,Natural Science Foundation of China; Natural Science Foundation of China; Natural Science Foundation of China; Postgraduate Research and Practice Innovation Program of Jiangsu Province,,http://dx.doi.org/10.1109/tgrs.2021.3133258,,10.1109/tgrs.2021.3133258,,,0,001-195-517-930-075; 002-649-617-859-886; 004-269-574-716-057; 005-238-000-402-424; 011-121-469-702-828; 011-308-268-259-559; 020-233-013-143-936; 020-467-290-581-389; 021-067-610-643-192; 029-455-747-035-038; 030-540-246-658-722; 032-061-389-376-815; 039-770-461-722-193; 041-314-165-476-904; 044-778-317-766-762; 045-598-685-349-282; 046-997-457-408-273; 048-039-376-300-619; 051-713-174-784-117; 053-094-537-530-97X; 061-150-022-812-525; 065-374-293-809-860; 071-239-631-876-341; 080-131-325-563-306; 086-350-567-454-813; 086-847-621-467-943; 087-020-003-931-56X; 092-180-026-045-134; 102-885-771-338-093; 109-482-146-821-248; 114-804-451-117-599; 130-574-314-495-488; 158-175-491-942-187,2,false,, 060-905-412-608-729,Cloud Computing Architecture and Forensic Investigation Challenges,2015-08-18,2015,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Ghania Al Sadi,"to traditional digital forensic investigations, investigating cloud crimes is considered as more difficult and complex process. The architecture of cloud computing is behind the complexity of conducting forensic investigation on cloud where data are synchronized and accessed using multiple and different devices in different places that reduce the chance to find a real device to seize for forensics investigation. There are a number of challenges in forensic investigation field faced by investigators which may complicate the way of conducting cloud forensic investigations to extract evidences. This research is studying the complexity of cloud architecture and how it affects digital investigations by addressing a number of challenges on conducting cloud forensic investigation.",124,7,20,25,Forensic science; Cloud computing architecture; Field (computer science); Computer security; Computer science; Process (engineering); Cloud computing; Digital forensics,,,,,https://www.ijcaonline.org/archives/volume124/number7/22116-22116-2015905521 http://ui.adsabs.harvard.edu/abs/2015IJCA..124g..20A/abstract https://www.ijcaonline.org/research/volume124/number7/sadi-2015-ijca-905521.pdf,http://dx.doi.org/10.5120/ijca2015905521,,10.5120/ijca2015905521,1782730031,,0,019-503-212-220-967; 024-894-908-869-686; 040-155-905-622-611; 042-603-990-097-418; 054-347-685-047-575; 091-694-208-796-635; 095-691-114-276-825; 167-681-711-973-339; 170-108-067-251-840,2,true,,green 060-971-363-644-947,A Survey of Various Frameworks and Solutions in all Branches of Digital Forensics with a Focus on Cloud Forensics,,2019,journal article,International Journal of Advanced Computer Science and Applications,21565570; 2158107x,The Science and Information Organization,,Mohammed Khanafseh; Mohammad Qatawneh; Wesam Almobaideen,"Digital forensics is a class of forensic science interested with the use of digital information produced, stored and transmitted by various digital devices as source of evidence in investigations and legal proceedings. Digital forensics can be split up to several classes such as computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics. In recent years, cloud computing has emerged as a popular computing model in various areas of human life. However, cloud computing systems lack support for computer forensic investigations. The main goal of digital forensics is to prove the presence of a particular document in a given digital device. This paper presents a comprehensive survey of various frameworks and solutions in all classes of digital forensics with a focus on cloud forensics. We start by discussing different forensics classes, their frameworks, limitations and solutions. Then we focus on the methodological aspect and existing challenges of cloud forensics. Moreover, the detailed comparison discusses drawbacks, differences and similarities of several suggested cloud computing frameworks providing future research directions.",10,8,,,Class (computer programming); Data science; Cloud forensics; Focus (computing); Computer science; Network forensics; Computer forensics; Mobile device forensics; Cloud computing; Digital forensics,,,,,https://thesai.org/Downloads/Volume10No8/Paper_80-A_Survey_of_Various_Frameworks_and_Solutions.pdf https://thesai.org/Publications/ViewPaper?Volume=10&Issue=8&Code=IJACSA&SerialNo=80,http://dx.doi.org/10.14569/ijacsa.2019.0100880,,10.14569/ijacsa.2019.0100880,2972427363,,0,000-451-779-646-297; 003-803-242-209-367; 004-706-447-836-905; 008-308-597-135-954; 009-885-874-541-907; 010-688-518-606-674; 018-552-581-098-658; 019-698-064-288-240; 020-311-734-615-623; 026-774-296-742-022; 032-286-659-568-014; 032-697-093-668-898; 034-916-306-834-918; 039-926-373-052-060; 044-353-273-186-518; 047-125-525-662-686; 047-630-600-014-492; 055-602-900-718-397; 056-205-328-777-528; 057-897-698-974-277; 060-808-935-547-406; 065-322-784-190-818; 066-235-037-082-291; 070-466-273-729-651; 074-014-335-505-388; 083-887-368-633-254; 088-719-274-824-438; 088-909-224-066-322; 091-619-263-117-914; 091-912-350-006-721; 093-778-033-321-400; 095-691-114-276-825; 096-188-680-470-989; 097-595-459-357-957; 097-939-114-561-254; 098-748-261-333-651; 111-090-978-711-139; 112-181-239-331-730; 120-937-322-045-732; 121-737-705-216-690; 124-912-663-881-389; 128-736-420-984-960; 137-563-945-652-129; 143-469-269-658-387; 148-338-977-232-362; 151-117-898-624-762; 153-276-821-446-997; 154-517-106-328-503; 162-110-149-751-921; 167-592-705-831-583; 185-741-441-912-96X; 187-762-907-549-695; 190-065-821-748-92X; 199-745-676-923-766,8,true,cc-by,gold 061-289-036-312-640,Identification of forensic artifacts from the registry of windows 10 device in relation to idrive cloud storage usage,2022-02-01,2022,journal article,Bulletin of Electrical Engineering and Informatics,23029285; 20893191,Institute of Advanced Engineering and Science,,Adesoji A. Adesina; Ayodele Ariyo Adebiyi; Charles K. Ayo,"The accessibility of cloud storage over the internet as a result of cloud computing technology provides the opportunity to store, share and upload data online with the use of digital devices which can be accessed anytime and anywhere. These benefits can also be exploited by the cybercriminals to perform various criminal activities including storing and exchanging of illegal materials on cloud storage platforms. The logs of malicious usages can be obtained from the cloud service providers for forensic investigations but the privacy issue among other factors make it difficult for such logs to be shared. Therefore, there is a need to perform client-side forensics to be able to carry out forensic investigation on digital devices as related to the activities on cloud storage. This study identifies relevant artifacts that can be forensically extracted from the registry of a window 10 device that accessed iDrive cloud storage. The study explores different experimental setups for the forensic analysis and adopted an integrated conceptual digital forensic framework in the investigation process to detect relevant forensic artifacts from the registry of a windows 10 device. This study increases the knowledge of cloud storage forensics and the significance of registry analysis during digital investigations.",11,1,521,529,Cloud computing; Digital forensics; Upload; Computer science; Cloud storage; Identification (biology); Computer security; The Internet; Process (computing); Digital evidence; World Wide Web; Data science,,,,,,http://dx.doi.org/10.11591/eei.v11i1.3489,,10.11591/eei.v11i1.3489,,,0,,0,true,cc-by-sa,gold 061-353-104-200-573,Identifying Digital Forensic Frameworks Based on Processes Models,2021-01-14,2021,journal article,Iraqi Journal of Science,23121637; 00672904,University of Baghdad College of Science,,Talib M. Jawad Abbas; Ahmed Salem Abdulmajeed,Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.,,,249,258,Cryptography; Data science; Digital evidence; Computer science; Process (engineering); Digital forensics; Hash function,,,,,https://ijs.uobaghdad.edu.iq/index.php/eijs/article/view/3919 http://scbaghdad.edu.iq/eijs/index.php/eijs/article/view/3919,http://dx.doi.org/10.24996/ijs.2021.si.1.35,,10.24996/ijs.2021.si.1.35,3124116883,,0,002-183-091-505-394; 004-706-447-836-905; 004-872-169-627-620; 009-940-339-227-472; 014-713-031-827-317; 019-698-064-288-240; 020-944-423-224-895; 038-668-970-194-854; 065-850-676-779-341; 097-723-876-253-714; 109-482-615-363-500; 111-090-978-711-139; 199-745-676-923-766,0,true,,gold 061-395-179-431-451,A forensic examination of four popular cross‐platform file‐sharing apps with Wi‐Fi P2P,2020-09-28,2020,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Szu-Yuan Teng; Che-Yen Wen,"File-sharing apps with Wi-Fi hotspot or Wi-Fi Direct functions become more popular. They can work on multiple platforms and allow users to transfer files in a concealed manner. However, when criminals use these apps in illegal activities, it becomes an important issue for investigators to find digital evidence on multiple platforms. At present, there are few studies on this topic, and most of them are limited to the single platform problem. In this paper, we propose a forensic examination method for four popular cross-platform file-sharing apps with Wi-Fi hotspot and Wi-Fi Direct functions: Zapya, SHAREit, Xender, and Feem. We use 22 static and live forensic tools for 11 platforms to acquire, analyze, and classify the forensic artifacts. In our experiments, we find many useful forensic artifacts and classify them into six categories. The experimental results can support law enforcement investigations of digital evidence and provide information for future studies on other cross-platform file-sharing apps.",66,1,315,322,Data science; Hotspot (Wi-Fi); Law enforcement; Digital evidence; Forensic examination; Future studies; Computer science; File sharing; Cross-platform,Wi-Fi P2P; artifact analysis; cross-platform; digital evidence; file-sharing apps; mobile hotspot,,,,https://www.ncbi.nlm.nih.gov/pubmed/32986853 https://europepmc.org/article/MED/32986853 https://pubmed.ncbi.nlm.nih.gov/32986853/ https://onlinelibrary.wiley.com/doi/epdf/10.1111/1556-4029.14574,http://dx.doi.org/10.1111/1556-4029.14574,32986853,10.1111/1556-4029.14574,3089357476,,0,012-821-491-637-560; 033-052-944-470-280; 036-647-129-742-923; 069-542-265-862-15X; 092-748-508-652-278; 095-577-771-481-790; 128-899-379-292-298,1,false,, 061-539-155-308-504,An Overview of Corporate Cybercrime in India and US,,2017,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Tanya Syngle,,6,2,62,72,Information system; Cybercrime; Computer security; Computer science; Wireless,,,,,http://sdiwc.net/digital-library/an-overview-of-corporate-cybercrime-in-india-and-us.html,http://dx.doi.org/10.17781/p002269,,10.17781/p002269,2743690690,,0,076-819-496-188-388,0,false,, 061-608-339-590-942,Developing digitally enabled interventions for prison and probation settings: a review,2018-01-09,2018,journal article,Journal of Forensic Practice,20508794; 20508808,Emerald,United Kingdom,Jason Morris; Manpreet Kaur Bans,"Purpose; ; ; ; ; The purpose of this paper is to highlight some initial efforts within Her Majesty’s Prison and Probation Service (HMPPS) to develop digitally enabled services supporting the rehabilitation of service users. It is not designed to set out either HMPPS policy on digital rehabilitative services or the position of HMPPS Interventions Services on this subject. Rather, it is a short exposition of the authors’ views on the potential of digitally enabled strategies to enhance interventions in forensic settings. In this context, the authors will also describe the development of the first digitally enabled rehabilitation service accessed via HMPPS in-room computer terminals.; ; ; ; ; Design/methodology/approach; ; ; ; ; The authors have reviewed current literature and outlined how the authors have and are aiming to add to this area of work.; ; ; ; ; Findings; ; ; ; ; This general review outlines the authors’ views on the potential of digitally enabled strategies for improving interventions in forensic settings.; ; ; ; ; Originality/value; ; ; ; ; This paper is a short exposition of the authors’ views on the potential of digitally enabled strategies to enhance interventions in forensic settings. In this context, the authors will also describe the development of the first digitally enabled rehabilitation service accessed via HMPPS in-room computer terminals.",20,2,134,140,Computer terminal; Psychological intervention; Originality; Rehabilitation; Context (language use); Digital learning; Prison; Service (systems architecture); Computer science; Knowledge management,,,,,https://www.emerald.com/insight/content/doi/10.1108/JFP-08-2017-0030/full/html http://www.emeraldinsight.com/doi/abs/10.1108/JFP-08-2017-0030?journalCode=jfp,http://dx.doi.org/10.1108/jfp-08-2017-0030,,10.1108/jfp-08-2017-0030,2782775599,,0,001-621-949-904-54X; 005-026-886-297-736; 009-559-038-720-535; 011-436-140-847-614; 016-167-720-887-742; 020-435-546-216-11X; 020-944-655-420-908; 029-620-549-694-362; 037-122-552-696-076; 037-625-645-213-154; 038-006-477-831-415; 045-393-134-892-925; 061-305-234-402-257; 062-396-909-043-591; 064-056-612-592-663; 065-080-294-801-410; 162-125-358-815-890; 171-191-662-422-735; 191-952-725-734-867,7,false,, 061-658-874-291-210,"Mobile phone forensics - a systematic approach, tools, techniques and challenges",2020-11-03,2020,journal article,International Journal of Electronic Security and Digital Forensics,1751911x,,,Manish Kumar,"Collection and analysis of digital evidence from mobile phones plays vital role to solve many civil and criminal cases. This evidence is a potential source of information which helps the prosecutors win more conviction. Sometime it also helps to crack organised crime and terrorist activities. Digital forensics expert need specialised tools and techniques to extract the evidence from mobile phones for analysis. Extracting the evidence from mobile phones in forensically sound manner is never been an easy task, as the entire process must ensure the integrity of evidence and its admissibility in the court of law. Rapid advancement in technology and frequent release of latest make and models always poses new challenges for the investigator. There are various tools and techniques available for mobile forensics, which are classified based on its complexity and its physical characteristics. Forensics examiner need to assess the complexity of the case and select the tools accordingly. This paper discusses in-detail about the systematic approach, which can be used for mobile forensics. Each approach has its own advantages, disadvantages, cost and complexities which is highlighted in the paper along with the list of standard tools and their key features.",13,,64,87,Data science; Organised crime; Conviction; Mobile phone; Task (project management); Digital evidence; Computer science; Process (engineering); Mobile device forensics; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.111725,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.111725,,,3127140650,,0,,0,false,, 061-759-553-863-671,Research on IoT Forensics System Based on Blockchain Technology,2022-06-15,2022,journal article,Security and Communication Networks,19390122; 19390114,Hindawi Limited,United Kingdom,Guangjun Liang; Jianfang Xin; Qun Wang; Xueli Ni; Xiangmin Guo,"In recent years, mobile edge computing (MEC) has become a research hotspot in academia. The Internet of Things (IoT) is an excellent way to build the infrastructure required for a MEC environment. Its rich digital tracking repository can provide insights into people's daily activities at home and elsewhere. Meanwhile, due to the open connectivity of the Internet of things devices, they can easily become the target of network attacks and be used by criminals as criminal tools. As a result, civil and criminal cases have increased year by year. This article conducts in-depth research on IoT forensics. By comparing its difference with traditional digital forensics (DF), the definition of IoT forensics is given. We have systematically sorted out the research results since the concept of IoT forensics was proposed in 2013 and proposed a generalized IoT forensics model. By studying blockchain technology and introducing it into the IoT forensics framework, a blockchain-based IoT forensics architecture is further proposed. Further, an alliance chain IoT forensics system is proposed. From the perspective of the data provider and the data visitor, the process of evidence storage and forensics of the IoT system is discussed. Finally, taking Unmanned Aerial Vehicle (UAV) forensics as an example, we give an experiment of IoT forensics analysis.",2022,,1,14,Computer science; Network forensics; Digital forensics; Internet of Things; Computer security; Blockchain; Computer forensics; Data science,,,,National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China,,http://dx.doi.org/10.1155/2022/4490757,,10.1155/2022/4490757,,,0,002-323-303-650-553; 006-665-721-928-314; 009-999-190-756-013; 015-065-674-673-626; 019-225-229-781-384; 019-912-316-692-552; 025-366-195-449-207; 029-164-830-214-360; 030-844-372-272-786; 031-108-930-135-139; 034-940-557-037-083; 035-859-793-614-223; 041-049-827-963-011; 047-125-525-662-686; 047-782-671-230-742; 055-811-656-615-740; 060-294-953-084-788; 063-795-557-456-118; 065-322-784-190-818; 079-858-593-881-513; 081-677-124-683-871; 081-746-298-679-238; 083-134-473-348-002; 083-366-430-872-667; 083-636-673-001-628; 085-425-338-426-218; 086-891-420-750-310; 089-419-432-581-673; 090-774-592-907-144; 097-939-114-561-254; 105-961-825-308-748; 108-662-351-368-480; 112-181-239-331-730; 134-072-762-404-610,0,true,cc-by,gold 062-025-688-856-405,Credential Hunting Across Web,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Daaman Lohia; Pranav Miglani; Swapnil Mengi; Aparajita Sinha,,,,,,Internet privacy; Credential; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.05,http://dx.doi.org/10.46293/4n6/2020.02.03.05,,10.46293/4n6/2020.02.03.05,3095144412,,0,,0,false,, 062-137-637-964-947,Can we continue to effectively police digital crime,2017-06-08,2017,journal article,Science & justice : journal of the Forensic Science Society,13550306,Forensic Science Society,United Kingdom,Graeme Horsman,"Abstract Now approximately 30 years old, the field of digital forensics is arguably facing some of its greatest challenges to date. Whilst currently supporting law enforcement in numerous criminal cases annually, questions are beginning to emerge regarding whether it can sustain this contribution, with digital crime remaining prevalent. In his first live interview in September 2015, Head of MI5, Andrew Parker indicated that individuals are now engaging in computing acts which are beyond the control of authorities, confirming earlier remarks made by British Prime Minister David Cameron in the wake of the Charlie Hebdo attacks. Such comments cast doubt on the future effectiveness of the digital forensic discipline and its ability to effectively investigate those who implement the latest forms of technology to carry out illicit acts. This article debates the controversial question, could we be facing an era where digital crime can no longer be effectively policed?",57,6,448,454,Sociology; Law; Law enforcement; Cyber crime; Prime minister; Computer forensics; Digital forensics,Crime; Cyber-crime; Digital forensics; Research; Security,,,,https://europepmc.org/article/MED/29173458 https://research.tees.ac.uk/ws/files/6385420/621796.pdf https://sure.sunderland.ac.uk/7400/ https://core.ac.uk/display/83955750 https://www.sciencedirect.com/science/article/abs/pii/S1355030617300801 https://www.ncbi.nlm.nih.gov/pubmed/29173458 http://www.sciencedirect.com/science/article/pii/S1355030617300801 https://research.tees.ac.uk/en/publications/can-we-continue-to-effectively-police-digital-crime https://core.ac.uk/download/83955750.pdf,http://dx.doi.org/10.1016/j.scijus.2017.06.001,29173458,10.1016/j.scijus.2017.06.001,2622507813,,0,004-305-936-893-970; 004-553-537-193-953; 007-460-815-938-318; 007-738-295-913-523; 016-983-559-523-04X; 019-831-293-743-518; 020-102-901-076-831; 021-635-319-328-35X; 027-023-893-191-352; 029-638-263-419-336; 029-743-976-871-124; 035-381-853-639-810; 046-240-766-487-724; 049-072-992-078-856; 051-554-120-123-211; 055-542-241-433-061; 057-182-959-994-032; 060-883-619-119-004; 064-214-213-364-517; 077-532-025-251-756; 078-327-902-374-330; 078-385-199-956-202; 086-419-575-179-359; 087-932-943-720-094; 090-752-043-508-733; 107-225-992-852-975; 107-864-540-671-760; 111-349-579-792-04X; 111-709-004-594-25X; 114-884-641-066-625; 134-369-102-934-63X; 134-709-778-635-793; 134-927-490-231-285; 137-298-307-797-644; 142-535-519-963-074; 165-354-182-797-278; 196-748-384-573-21X,22,true,cc-by-nc-nd,green 062-168-384-023-533,A novel principle to validate digital forensic models,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Dinesh Mothi; Helge Janicke; Isabel Wagner,"Abstract Digital forensic models (DFMs) form the base for any digital investigation because they guide the investigators with necessary steps and procedures to be taken during the investigation. State-of-the-art DFMs assume that it is safe to proceed from one stage of the investigation to the next without taking into account the anti-forensic techniques that could be used to defeat the investigation process. However, the findings in the literature shows that common phases in the digital forensic process such as acquisition, examination, analysis, and reporting are affected by various anti-forensic (AF) methods. To fill this gap, we propose an abstract digital forensic framework and validate DFMs by factoring in AF techniques affecting various phases in a digital forensic process. This validation principle can be used to enhance state-of-the-art DFMs to enable principled detection and countering of AF techniques before being applied to a real-time investigation case.",33,,200904,,Data mining; Factoring; Digital forensic process; One stage; Computer science; Base (topology); Process (engineering); Digital forensics,,,,,https://dora.dmu.ac.uk/handle/2086/19374 https://dblp.uni-trier.de/db/journals/di/di33.html#MothiJW20 https://www.sciencedirect.com/science/article/abs/pii/S1742287619303469 https://dora.dmu.ac.uk/bitstream/2086/19374/2/mothi2020using-acceptedversion.pdf,http://dx.doi.org/10.1016/j.fsidi.2020.200904,,10.1016/j.fsidi.2020.200904,3012281215,,0,000-018-093-052-18X; 002-295-796-487-823; 004-668-612-287-432; 005-102-962-333-180; 005-392-088-749-603; 005-997-056-658-776; 006-296-899-452-535; 017-444-026-554-998; 019-360-393-097-72X; 026-774-296-742-022; 032-487-265-797-544; 036-093-518-856-770; 036-178-978-714-311; 038-668-970-194-854; 047-630-600-014-492; 064-531-736-566-934; 065-322-784-190-818; 065-654-832-541-493; 066-235-037-082-291; 067-950-012-629-210; 078-730-781-174-18X; 078-817-460-650-140; 081-032-497-600-401; 086-153-084-433-759; 086-425-435-869-316; 103-103-595-689-579; 103-749-645-980-640; 106-041-428-637-948; 106-229-562-693-558; 112-181-239-331-730; 116-344-252-215-864; 132-355-634-397-986; 143-959-640-326-451; 144-614-319-071-141; 190-065-821-748-92X,5,true,,green 062-489-027-144-764,PENGGUNAAN METODE STATIS DAN LIVE FORENSIK PADA UAV UNTUK MENDAPATKAN BUKTI DIGITAL,2019-08-31,2019,journal article,ILKOM Jurnal Ilmiah,25487779; 20871716,Universitas Muslim Indonesia,,Ibnu Fajar Arrochman; Dhomas Hatta Fudholi; Yudi Prayudi,"In recent years, the use of drones by civilians is increasing rapidly by the presentation of total sales continued to increase rapidly every year. With the increasing possibility of Unmanned Aerial Vehicle (UAV) abuse, crime in the use of UAVs to be larger. Through forensic analysis of data using static forensic and live forensic to obtain data that allows it to be used as digital evidence. To dig up information that could be used as digital evidence in the UAV and controllers, as well as to know the characteristics of digital evidence on a UAV. The results showed that digital evidence on a UAV, the smartphone is used as a controller UAV has a very important role in the investigation. The findings in aircraft has a percentage of 50% and a camera memory card with 16.6%. DJI Phantom 3 Advanced GPS coordinates always store data in flight LOG; the data is always stored even when the flight mode is used does not use GPS signals to stability. Due to DJI Phantom 3 Advanced always use GPS on flights, file, image or video captured by the camera has the best GPS location coordinates to the metadata therein.",11,2,152,158,Geographic coordinate system; Controller (computing); GPS signals; Data analysis; Digital evidence; Computer science; Drone; Global Positioning System; Real-time computing; Metadata,,,,,https://dspace.uii.ac.id/handle/123456789/17446 http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/download/444/187 http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/view/444/187 https://core.ac.uk/download/pdf/228866677.pdf,http://dx.doi.org/10.33096/ilkom.v11i2.444.152-158,,10.33096/ilkom.v11i2.444.152-158,2974514758,,0,,0,true,cc-by-sa,gold 062-624-458-576-365,"Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction",,2022,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Abdullah Ayub Khan; Aftab Ahmed Shaikh; Asif Ali Laghari; Mazhar Ali Dootio; M. Malook Rind; Shafique Ahmed Awan,,14,2,124,124,Computer science; Digital forensics; Computer forensics; Computer security; Cybercrime; Digital evidence; Data science; Network forensics; Cyber crime; Open research; Internet privacy,,,,,,http://dx.doi.org/10.1504/ijesdf.2022.121174,,10.1504/ijesdf.2022.121174,,,0,,1,false,, 063-274-848-736-685,A Comprehensive and Harmonized Digital Forensic Investigation Process Model.,2015-08-10,2015,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Aleksandar Valjarevic; Hein S. Venter,"Performing a digital forensic investigation (DFI) requires a standardized and formalized process. There is currently neither an international standard nor does a global, harmonized DFI process (DFIP) exist. The authors studied existing state-of-the-art DFIP models and concluded that there are significant disparities pertaining to the number of processes, the scope, the hierarchical levels, and concepts applied. This paper proposes a comprehensive model that harmonizes existing models. An effort was made to incorporate all types of processes proposed by the existing models, including those aimed at achieving digital forensic readiness. The authors introduce a novel class of processes called concurrent processes. This is a novel contribution that should, together with the rest of the model, enable more efficient and effective DFI, while ensuring admissibility of digital evidence. Ultimately, the proposed model is intended to be used for different types of DFI and should lead to standardization.",60,6,1467,1483,Standardization; Class (computer programming); Data science; International standard; Harmonization; Scope (project management); Digital evidence; Computer science; Process (engineering); Digital forensics,digital evidence; digital forensics; forensic science; harmonization; investigation; model; process; standardization,,,,https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.12823 https://repository.up.ac.za/handle/2263/51445 https://dialnet.unirioja.es/servlet/articulo?codigo=5292849 http://onlinelibrary.wiley.com/doi/10.1111/1556-4029.12823/abstract https://europepmc.org/article/MED/26258644 https://pubmed.ncbi.nlm.nih.gov/26258644/ https://repository.up.ac.za/bitstream/2263/51445/1/Valjarevic_Comprehensive_2015.pdf,http://dx.doi.org/10.1111/1556-4029.12823,26258644,10.1111/1556-4029.12823,2160898275,,0,007-321-225-339-593; 020-944-423-224-895; 041-059-041-666-09X; 104-249-629-797-999,29,true,,green 063-519-359-431-461,An efficient digital forensic model for cybercrimes investigation in cloud computing,2021-01-22,2021,journal article,Multimedia Tools and Applications,13807501; 15737721,Springer Science and Business Media LLC,Netherlands,Ezz El-Din Hemdan; D. H. Manjaiah,"In recent times, cloud computing adopted numerous organizations and enterprises for offering services with securely certifying that cloud providers against illegitimate activities. However, cost-effective forensics design and implementation for support the cloud-based cybercrimes investigation. To build cloud architecture support forensics is a significant and complex issue such as voluminous intricate legal, organizational, and technical defies due to the virtualization, distributing, and dynamic nature of cloud systems. Therefore, this paper presents an efficient Cloud Forensics Investigation Model (CFIM) to investigate cloud crimes in a forensically sound and timely fashion. Besides, the proposed system supports the concept of Forensic as a Service (FaaS) that provide innumerable benefits of conducting digital forensics through using Forensic Server on the cloud side. The investigational results proved that the proposed system can assist the digital investigators in their mission of investigation of cybercrimes in the cloud in a proficient manner.",80,9,14255,14282,Forensic science; Cloud forensics; Service (systems architecture); Computer security; Computer science; Virtualization; Cloud computing; Digital forensics,,,,,https://link.springer.com/article/10.1007/s11042-020-10358-x https://dblp.uni-trier.de/db/journals/mta/mta80.html#HemdanM21 https://doi.org/10.1007/s11042-020-10358-x,http://dx.doi.org/10.1007/s11042-020-10358-x,,10.1007/s11042-020-10358-x,3125692403,,0,004-656-167-784-562; 005-647-704-356-945; 020-935-855-484-274; 021-170-286-847-139; 039-189-453-189-406; 040-238-768-908-245; 041-879-975-858-398; 048-149-094-961-264; 052-337-723-472-520; 056-905-403-377-274; 063-753-562-544-942; 066-785-118-231-304; 067-860-693-051-223; 069-145-107-243-338; 083-857-356-361-530; 088-909-224-066-322; 099-633-821-597-96X; 104-609-359-888-183; 116-056-471-784-278; 124-912-663-881-389; 125-817-456-334-439; 129-642-811-953-052; 136-798-153-498-59X; 144-124-797-675-052; 151-551-319-524-065; 157-779-950-410-958; 160-331-694-886-887; 194-016-717-022-461,9,false,, 063-661-720-912-563,Analisis Media Sosial Facebook Lite dengan tools Forensik menggunakan Metode NIST,2020-11-17,2020,journal article,"Techno (Jurnal Fakultas Teknik, Universitas Muhammadiyah Purwokerto)",25799096; 14108607,Lembaga Publikasi Ilmiah dan Penerbitan Universitas Muhammadiyah Purwokerto,,Rauhulloh Ayatulloh Khomeini Noor Bintang; Rusydi Umar; Anton Yudhana,"Social Media is becoming very popular among the public today, and the increasing number of social media use has of course a good or bad impact on the course of human life, for example the bad impact is doing cyberbully or chating on social media. Digital forensics is one of the sciences for how to catch criminals in digital which will be needed in evidence in court. Social media criminals need Smartphones to commit digital cybercrime. This research will raise evidence of digital crimes on the Facebook Lite application using forensics. In this study, the forensic tool that will be used is the MOBILEedit Forensic Pro forensic tools with the help of using methods NIST National Institute Of Standars Techlogogy. NIST has a good workflow for extracting digital forensic data. The research results will be obtained in the form of accounts Id, audio, conversations, and images",21,2,125,130,Internet privacy; NIST; Commit; Workflow; Cybercrime; Human life; Computer science; Social media; Digital forensics,,,,,http://jurnalnasional.ump.ac.id/index.php/Techno/article/download/8494/3602 http://jurnalnasional.ump.ac.id/index.php/Techno/article/view/8494/3602 https://doaj.org/article/eee14c43ee4f47bf88c4da1a19962cee,http://dx.doi.org/10.30595/techno.v21i2.8494,,10.30595/techno.v21i2.8494,3101211688,,0,,0,true,cc-by,gold 063-682-957-318-485,Trusted forensics scheme based on digital watermark algorithm in intelligent VANET,2019-05-16,2019,journal article,Neural Computing and Applications,09410643; 14333058,Springer Science and Business Media LLC,Germany,Zhaofeng Ma; Ming Jiang; Weihua Huang,"Trusted forensics is one of the most important problems in VANET, and it often needs continuous video monitoring, once break out emergent vehicle accidents, then specific staff members take steps for forensics to obtain facts and define responsibility. Traditional forensics exists problems of inaccurate information, unfair responsibility definition and risk of leakage of user’s privacy. To solve the above problem, in this paper, we proposed a trusted forensics scheme based on digital image watermark in intelligent VANET, in which we proposed technical and fair algorithms for trusted forensics, and the trusted forensics scheme includes basic forensics parameter data obtaining critical forensics data automatic generation and forensics data extraction. Once there vehicle accident occurred, the forensics system first obtains the location, timestamp, forensics device data as basic forensics parameter data, and then, it embeds the forensics parameter as watermark into the real-time vehicle accident photograph by the proposed digital watermark algorithm, and thus, the real-time and undeniable forensics data are automatic generated as evidence; when necessary, the forensics system can extract the evidence data and watermark data from the critical forensics data. The proposed scheme can detect the content integrity of image data and even find out tampering mark when the image data are tampered. Additionally, we used neural network algorithm for vehicle license plate recognition and rapid vehicle information gathering. Finally, experiments evaluations manifest the proposed is forensics scheme is secure, robust, and efficient in vehicle forensics.",32,6,1665,1678,Timestamp; Algorithm; Forensic science; Digital watermarking; Watermark; Vehicular ad hoc network; Scheme (programming language); Data extraction; License; Computer science; Digital image,,,,,https://dblp.uni-trier.de/db/journals/nca/nca32.html#MaJH20 https://link.springer.com/article/10.1007/s00521-019-04246-1 https://doi.org/10.1007/s00521-019-04246-1,http://dx.doi.org/10.1007/s00521-019-04246-1,,10.1007/s00521-019-04246-1,2946822226,,0,003-040-355-096-378; 011-835-617-244-326; 014-130-776-302-166; 021-048-723-685-07X; 037-778-865-415-046; 044-864-601-790-058; 049-329-917-347-084; 050-601-465-823-611; 050-891-066-907-517; 071-253-739-610-933; 077-739-261-737-967; 079-206-727-458-961; 094-159-442-759-925; 094-493-438-801-573; 099-010-410-958-352; 121-426-157-796-410; 155-003-343-079-553; 171-768-894-018-612; 176-947-927-660-253,4,false,, 063-837-705-607-866,Prelim i - Editorial Board,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,33,,300989,300989,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30223-7,,10.1016/s2666-2817(20)30223-7,,,0,,0,true,,bronze 063-964-488-825-120,Forming an investigative opinion in digital forensics,2022-05-09,2022,journal article,WIREs Forensic Science,25739468,Wiley,,Graeme Horsman,,,,,,Digital forensics; Digital evidence; Computer forensics; Computer science; Internet privacy; Data science,,,,,,http://dx.doi.org/10.1002/wfs2.1460,,10.1002/wfs2.1460,,,0,001-691-716-197-657; 003-232-363-219-004; 003-275-658-705-341; 003-982-227-180-136; 010-963-610-208-920; 032-451-540-235-796; 036-189-930-199-369; 047-386-524-667-691; 054-004-313-233-495; 058-717-000-287-105; 064-549-392-650-90X; 071-616-341-516-576; 075-056-106-679-562; 102-243-142-344-71X; 111-488-239-742-003; 173-145-269-859-717; 174-773-910-564-783,0,false,, 064-115-669-679-548,A novel spiral pattern and 2D M4 pooling based environmental sound classification method,,2020,journal article,Applied Acoustics,0003682x; 1872910x,Elsevier BV,United Kingdom,Turker Tuncer; Abdulhamit Subasi; Fatih Ertam; Sengul Dogan,,170,,107508,,Signal processing; Artificial intelligence; Pattern recognition; Cross-validation; Component analysis; Spiral; Computer science; Artificial neural network; Pooling; Digital forensics; Discriminative model,,,,,https://www.sciencedirect.com/science/article/abs/pii/S0003682X20306125#! https://www.sciencedirect.com/science/article/pii/S0003682X20306125,http://dx.doi.org/10.1016/j.apacoust.2020.107508,,10.1016/j.apacoust.2020.107508,3043038561,,0,000-747-924-226-591; 012-192-532-868-746; 015-029-029-238-949; 015-342-890-125-133; 015-450-490-331-294; 018-044-715-644-781; 018-565-254-420-673; 019-662-538-444-512; 023-108-865-530-350; 023-209-286-667-312; 026-307-550-544-417; 027-856-229-665-616; 028-546-645-253-912; 029-867-539-332-231; 030-230-719-506-590; 030-328-769-006-418; 033-497-111-106-603; 035-515-505-781-483; 037-039-073-481-652; 039-195-792-891-583; 040-130-749-810-053; 044-951-809-134-792; 048-530-667-285-56X; 049-866-557-464-052; 050-473-669-334-488; 054-799-635-473-629; 056-919-041-909-25X; 057-554-663-329-652; 058-864-884-652-779; 059-149-073-001-124; 072-085-666-608-424; 075-892-793-716-735; 077-829-983-025-91X; 080-677-997-238-340; 080-755-635-579-843; 085-555-728-097-937; 087-104-631-733-618; 089-146-452-957-657; 092-720-749-568-080; 112-705-069-209-103; 117-390-191-091-354; 118-681-411-201-196; 120-177-417-650-08X; 125-958-094-205-46X; 142-616-392-319-20X; 154-828-479-054-03X; 163-385-907-317-024,7,false,, 064-153-704-547-354,Recommendations for capturing signatures digitally to optimize their suitability for forensic handwriting examination.,2020-11-18,2020,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Barbora Geistová Čakovská; Nikolaos Kalantzis; Tomasz Dziedzic; Carina Fernandes; Jan Zimmer; M.J. Branco; Jonathan Heckeroth; Kristofer Axelsson Spjuth; Erich Kupferschmid; Paolo Vaccarone; Axel Kerkoff,"The use of digitally captured signatures in everyday course of business increases annually and, compared to pen and paper signatures, provides various advantages concerning the administration of documents. These signatures may also become subjects of a forensic handwriting examination and, therefore, in order to optimize their suitability for this purpose, they should satisfy several requirements. This paper presents recommendations drawn up by forensic handwriting examiners associated with ENFHEX (ENFSI) in a project aimed at defining best practices in forensic examination of digitally captured signatures. The paper is dedicated mainly to hardware and software developers, providers, and user institutions of digitally captured signature technologies to improve their practice to a level optimized for forensic handwriting examination. The most important requirements outlined in this paper concern digitally captured signature data, hardware, and software used to acquire these data, as well as optimized signing conditions. Following these requirements ensures the suitability of signature data for forensic handwriting examination and, consequently, increases the reliability of the associated electronic documents. In spite of rapidly evolving technology, they can serve as a solid basis for understanding and consideration of the optimal use of digitally captured signatures for signing electronic documents.",66,2,743,747,Signature (logic); Best practice; Information retrieval; Software; Handwriting; Forensic examination; Computer science; Reliability (statistics); Metadata,capturing hardware and software; digitally captured signature; forensic handwriting examination; metadata; numerical data; signing condition,,,Internal Security Fund of the European Union (Project 779485 - STEFA - ISFP-2016-AG-IBA-ENFS),https://europepmc.org/article/MED/33206397 https://www.ncbi.nlm.nih.gov/pubmed/33206397 https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.14627 https://pubmed.ncbi.nlm.nih.gov/33206397/,http://dx.doi.org/10.1111/1556-4029.14627,33206397,10.1111/1556-4029.14627,3106460388,,0,018-154-248-980-520; 018-960-538-999-613; 022-810-587-732-756; 092-580-969-032-163; 162-563-903-287-393,2,false,, 064-203-195-549-88X,Comparative Study and Analysis on Integrity of Data Files Using Different Tools and Techniques,2021-06-01,2021,journal article,Journal of Information Security and Cybercrimes Research,16587790; 16587782,Naif Arab University for Security Sciences,,Kumarshankar Raychaudhuri; M. George Christopher; Nayeem Abbas Hamdani,"Digital forensic investigation is the scientific process of collection, preservation, examination, analysis, documentation and presentation of digital evidence from digital devices, so that the evidence is in compliance with legal terms and acceptable in a court of law. Integrity of the digital evidence is an indispensable part of the investigation process and should be preserved to maintain the chain of custody. This is done through hashing technique using standardized forensic tools. However, while handling the evidences , lack of knowledge might lead to unintentional alteration of computed hash. This violates the chain of custody and makes the evidence inadmissible in a court of law. In this paper, our objective is to determine the different conditions under which the original hash value of a digital evidence changes. For this, we create different scenarios using sample data files and compute their hash values. A comparative study and analysis are done to determine in which scenario the original hash value of the data file changes. The results of the research will prove useful and essential for Criminal Justice Functionaries in gaining knowledge about various conditions leading to the change in hash value of digital evidence and therefore, avoid its accidental alteration during forensic investigation/examination.",4,1,43,54,Hash function; Computer science; Digital evidence; Documentation; Digital forensics; Computer security; Audit; Process (computing); Data science,,,,,,http://dx.doi.org/10.26735/symq8715,,10.26735/symq8715,,,0,,0,true,cc-by-nc,gold 064-313-388-228-262,A STATE-OF-THE-ART REVIEW OF CLOUD FORENSICS,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Sameera Almulla; Youssef Iraqi; Andrew Jones,"Cloud computing and digital forensics are emerging elds of technology. Unlike traditional digital forensics where the target environment can be almost completely isolated, acquired and can be under the investigators control; in cloud environments, the distribution of computation and storage poses unique and complex challenges to the investigators. Recently, the term \cloud forensics"" has an increasing presence in the eld of digital forensics. In this state-of-the-art review, we included the most recent research eorts that used \cloud forensics"" as a keyword and then classify the literature into three dimensions: (1) survey-based, (2) technology-based and (3) forensics-procedural-based. We discuss widely accepted standard bodies and their eorts to address the current trend of cloud forensics. Our aim is not only to reference related work based on the discussed dimensions, but also to analyse them and generate a mind map that will help in identifying research gaps. Finally, we summarize existing digital forensics tools and the available simulation environments that can be used for evidence acquisition, examination and cloud forensics test purposes.",9,4,7,28,Mind map; Cloud forensics; State of the art review; Computer security; Computer science; Cloud computing; Digital forensics,,,,,https://commons.erau.edu/jdfsl/vol9/iss4/2/ https://core.ac.uk/display/44209296 https://commons.erau.edu/cgi/viewcontent.cgi?article=1190&context=jdfsl https://doaj.org/article/f95b981ea64a450ba0505677d36c4c8b https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#AlmullaIJ14,http://dx.doi.org/10.15394/jdfsl.2014.1190,,10.15394/jdfsl.2014.1190,1757283378,,0,001-100-315-088-620; 001-105-589-691-307; 002-768-711-065-857; 008-308-597-135-954; 016-817-717-158-92X; 017-708-113-657-756; 020-241-721-441-854; 025-319-861-345-580; 026-163-378-046-984; 027-031-165-049-753; 034-773-286-616-44X; 038-845-346-494-188; 039-238-243-413-527; 041-879-975-858-398; 042-603-990-097-418; 042-969-030-470-170; 056-122-492-187-163; 057-421-097-368-120; 061-856-990-083-088; 063-600-821-499-481; 068-823-517-701-518; 091-619-263-117-914; 092-039-178-633-223; 095-691-114-276-825; 099-520-470-483-918; 100-881-789-662-974; 100-892-010-834-933; 101-091-831-428-576; 111-660-907-279-133; 116-317-110-770-148; 121-704-965-852-836; 124-912-663-881-389; 125-817-456-334-439; 144-124-797-675-052; 155-855-942-114-621; 161-201-342-740-519; 167-681-711-973-339; 169-842-425-922-642; 170-108-067-251-840; 173-952-459-161-812; 178-467-155-611-813; 194-016-717-022-461,21,true,cc-by-nc,gold 064-398-322-820-816,Research on Development of Digital Forensics based Digital Records Migration Procedure and Tool,2014-06-30,2014,journal article,Journal of the Korea Institute of Information Security and Cryptology,15983986,Korea Institute of Information Security and Cryptology,,Seokcheol Lee; Hyunguk Yoo; Taeshik Shon,"ABSTRACT Digital Records, which are created, stored, and managed in digi tal form, contains security vulnerability such as data modification, due to the characteristic of digital data. Therefore it is necessary to guarantee the reliability by verification of integrity and authenticity when managing digital records. This paper propose digital forensics based migration process for electronic records by analyzing legacy digital forensics process, and derives the requirements to develop digital forensics based electronic records migration tool through analyzing trends of a broad digital records migration technique and tool. Based on th ese develop digital forensic based digital records migration tool t o guarantee integrity and authenticity of digital records. Keywords: Digital Forensics, Digital Records, Electronic Records, Migration, Transfer접수일(2014년 3월 31일), 수정일(2014년 5월 14일),게재확정일(2014년 6월 2일)* 본 연구는 안전행전부 국가기로구언 재원으로 2013년 기록보존기술 연구개발사업의 지원을 받아 수행된 연구임†주저자, go467913@ajou.ac.kr‡교신저자, tsshon@ajou.ac.kr(Corresponding author)",24,3,571,580,Digital data; Electronic records; Digital records; Computer security; Computer science; Process (engineering); Database; Digital forensics,,,,,http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2014_v24n3_571 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001891629,http://dx.doi.org/10.13089/jkiisc.2014.24.3.571,,10.13089/jkiisc.2014.24.3.571,2067197428,,0,015-428-463-847-139; 078-730-781-174-18X; 122-880-373-616-302,0,true,,bronze 064-409-347-985-677,Forensic Science Research Summary for Forgery Detection of Digital Images,2020-02-28,2020,journal article,International Journal of Engineering and Advanced Technology,22498958,Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP,,null Monika; Mriirs Faridabad degree in Ece; Dipali Bansal; null Director-IQAC,"An important measure of proof collection, storage, and authentication in forensic sciences, which decide the safety and security of any system documents, which can be either portable document formats or scanned images. To gather evidence, or plan a forensic investigation digital images are secured with different modern methodologies. Digital image analysis includes image recovery and surveillance for image information improvement. The goal of forgery detection is to maximize the extraction of information from manipulated images, particularly noisy and post-processed images. Because digital image processing is becoming popular with many advantages in scientific and engineering applications, the forgery techniques are also growing at a rapid rate. Therefore, the main focus is on different types of forgery detection in digital image processing with the help of all transform techniques and comparing their best results for further improvement in order to generate a new approach for a future forensic science investigation.",9,3,1608,1618,Forensic science; Artificial intelligence; Forgery detection; Computer vision; Computer science; Digital image,,,,,https://zenodo.org/record/5575060,http://dx.doi.org/10.35940/ijeat.b2563.029320,,10.35940/ijeat.b2563.029320,3211160506,,0,,1,true,cc-by,gold 064-735-689-763-963,The Impact of SHA-1 File Hash Collisions On Digital Forensic Imaging: A Follow-up Experiment,,2016,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Gary C. Kessler,,11,4,10,,Collision; Forensic imaging; Computer security; Computer science; Computer forensics; SHA-1; Digital forensics,,,,,https://works.bepress.com/gary_kessler/91/ https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#Kessler16a https://doi.org/10.15394/jdfsl.2016.1433 https://commons.erau.edu/jdfsl/vol11/iss4/10/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1433&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2016.1433,,10.15394/jdfsl.2016.1433,2615827584,,0,,2,true,cc-by-nc,gold 064-866-800-584-825,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,39,,301321,301321,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00247-x,,10.1016/s2666-2817(21)00247-x,,,0,,0,true,,bronze 064-938-865-982-891,SpeechToText: An open-source software for automatic detection and transcription of voice recordings in digital forensics,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Miguel Cerdeira Negrão; Patricio Domingues,,38,,301223,,Transcription (linguistics); Full text search; Voice activity detection; Software; Laptop; Jython; Speech recognition; Computer science; Android (operating system); Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S2666281721001311 https://doi.org/10.1016/j.fsidi.2021.301223,http://dx.doi.org/10.1016/j.fsidi.2021.301223,,10.1016/j.fsidi.2021.301223,3181867036,,0,003-305-347-473-509; 009-948-671-026-644; 010-620-450-221-40X; 014-508-812-794-295; 019-601-653-291-874; 023-660-936-691-266; 035-198-069-725-410; 036-353-824-536-853; 044-051-353-134-730; 045-377-982-386-523; 046-936-814-184-732; 046-985-863-475-30X; 047-156-819-206-442; 054-986-472-236-744; 056-113-208-119-717; 057-360-375-607-114; 059-149-073-001-124; 059-494-123-799-435; 063-050-303-219-941; 063-136-871-110-749; 069-287-537-141-255; 071-327-829-062-351; 076-259-993-263-34X; 080-226-855-967-158; 086-223-698-549-183; 087-143-542-784-087; 099-403-637-973-562; 105-351-601-997-478; 111-785-821-519-342; 113-409-470-189-794; 118-309-541-911-814; 118-848-462-810-989; 123-446-532-697-045; 126-890-802-449-210; 138-570-997-166-95X; 141-668-824-215-622; 155-758-692-373-705; 163-330-758-807-944; 166-547-932-138-819; 184-925-556-656-468; 193-052-734-829-39X; 199-172-967-270-034,2,false,, 064-949-110-675-467,India’s Digital Strike on China: Security Prospective,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Omkar Sonawane,,,,,,Economy; Political science; China,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.05,http://dx.doi.org/10.46293/4n6/2021.03.02.05,,10.46293/4n6/2021.03.02.05,3162451055,,0,,0,false,, 065-409-532-451-331,"Forensically ready digital identity management systems, issues of digital identity life cycle and context of usage",,2017,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Mehrdad Tajbakhsh; Elaheh Homayounvala; Sajjad Shokouhyar,,9,1,62,62,Identity management; Identity (music); Computer science; Context (archaeology); Digital identity; World Wide Web; Internet privacy; Data science; Computer security; Authentication (law); Access control; Aesthetics; Paleontology; Philosophy; Biology,,,,,,http://dx.doi.org/10.1504/ijesdf.2017.10002653,,10.1504/ijesdf.2017.10002653,,,0,,0,true,,green 065-517-309-064-222,Avoiding Burnout at the Digital Forensics Coalface: Targeted Strategies for Forensic Agencies in the Management of Job-related Stress,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Sally F. Kelty; Emma J. McQueen; Carly Pymont; Nathan Green,"Abstract Recent evidence shows digital forensics experts are at risk of burnout and job-related stress. This may be related to the increase in digital evidence and/or repetitive exposure to challenging material, either face to face or via digital imagery in real time or post-event. This exposure includes footage and/or sound recording of extreme violence, child exploitation, suicide, and death scenes. This increase in the risk of stress also aligns with the changing nature of policing with rates of serious crime, especially robbery and homicide decreasing, while digital crime in many countries increases. This increase changes workload demands and requires new skillsets in addition to traditional investigation methods. Workplace stress has high financial and personal costs, impacting organisations, teams, family, friends, and the individual. For organisations and teams, occupational stress is associated with increases in workplace accidents, absenteeism, early retirement, higher intention to quit, lower motivation and disillusionment with work, all of which impacts the cohesion of forensic teams. The aim of this paper is to present a set of key evidence-based, targeted strategies that forensic science and policing agencies can roll-out in order to manage workplace stress, thereby managing the risk of higher turnover, absenteeism and lower workplace innovation.",38,,301127,,Burnout; Absenteeism; Occupational stress; Face-to-face; Workload; Digital evidence; Computer science; Homicide; Applied psychology; Digital forensics,,,,Australian Federal Police,https://dfrws.org/presentation/avoiding-burnout-at-the-digital-forensics-coalface-targeted-strategies-for-forensic-agencies-in-the-management-of-job-related-stress/ https://researchprofiles.canberra.edu.au/en/publications/avoiding-burnout-at-the-digital-forensics-coalface-targeted-strat https://dfrws.org/wp-content/uploads/2021/01/2021_APAC_paper-avoiding_burnout_at_the_digital_forensics_coalface.pdf https://www.sciencedirect.com/science/article/pii/S2666281721000251,http://dx.doi.org/10.1016/j.fsidi.2021.301127,,10.1016/j.fsidi.2021.301127,3124493882,,0,003-465-350-737-256; 003-515-309-951-413; 003-839-478-173-887; 004-667-286-603-895; 007-787-000-383-125; 009-627-096-122-615; 015-984-449-641-211; 017-173-570-144-261; 017-805-463-199-729; 021-201-295-792-01X; 021-364-407-964-047; 025-185-383-460-70X; 028-166-854-587-500; 028-666-896-391-785; 030-223-936-109-852; 030-461-878-149-015; 031-614-539-275-181; 031-765-295-875-09X; 033-887-519-970-976; 040-667-269-018-788; 041-988-413-602-967; 042-544-068-549-235; 045-583-164-562-588; 046-608-153-837-157; 050-389-552-568-721; 051-704-112-565-897; 053-661-832-365-258; 056-754-398-867-512; 056-790-021-627-621; 061-152-473-911-898; 061-650-697-120-894; 062-605-298-093-546; 066-824-458-827-082; 068-715-824-881-688; 073-538-637-110-630; 076-978-451-221-437; 079-819-982-015-318; 081-073-384-566-025; 085-851-989-301-541; 086-211-015-805-881; 088-426-769-403-257; 096-218-094-826-721; 097-794-150-708-79X; 102-845-377-786-086; 105-024-117-660-277; 112-083-919-827-335; 112-666-147-939-621; 119-781-528-548-569; 123-344-253-312-598; 125-396-525-564-682; 125-508-990-959-413; 126-995-721-959-658; 134-557-570-320-178; 136-946-132-481-985; 138-435-369-121-724; 144-342-598-085-266; 144-488-546-528-952; 155-144-144-803-210; 157-454-151-474-60X; 161-423-003-024-482; 162-494-674-103-725; 168-037-498-947-236,0,true,cc-by-nc-nd,hybrid 065-671-045-136-370,Leveraging CybOX to standardize representation and exchange of digital forensic information,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Eoghan Casey; Gregory Thomas Back; Sean Barnum,"With the growing number of digital forensic tools and the increasing use of digital forensics in various contexts, including incident response and cyber threat intelligence, there is a pressing need for a widely accepted standard for representing and exchanging digital forensic information. Such a standard representation can support correlation between different data sources, enabling more effective and efficient querying and analysis of digital evidence. This work summarizes the strengths and weaknesses of existing schemas, and proposes the open-source CybOX schema as a foundation for storing and sharing digital forensic information. The suitability of CybOX for representing objects and relationships that are common in forensic investigations is demonstrated with examples involving digital evidence. The capability to represent provenance by leveraging CybOX is also demonstrated, including specifics of the tool used to process digital evidence and the resulting output. An example is provided of an ongoing project that uses CybOX to record the state of a system before and after an event in order to capture cause and effect information that can be useful for digital forensics. An additional open-source schema and associated ontology called Digital Forensic Analysis eXpression (DFAX) is proposed that provides a layer of domain specific information overlaid on CybOX. DFAX extends the capability of CybOX to represent more abstract forensic-relevant actions, including actions performed by subjects and by forensic examiners, which can be useful for sharing knowledge and supporting more advanced forensic analysis. DFAX can be used in combination with other existing schemas for representing identity information (CIQ), and location information (KML). This work also introduces and leverages initial steps of a Unified Cyber Ontology (UCO) effort to abstract and express concepts/constructs that are common across the cyber domain.",12,,S102,S110,World Wide Web; Schema (psychology); Data science; Specific-information; Digital evidence; Cyber threat intelligence; Incident response; Computer science; Strengths and weaknesses; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/di/di12.html#CaseyBB15 https://www.sciencedirect.com/science/article/pii/S1742287615000158 http://www.sciencedirect.com/science/article/pii/S1742287615000158 https://core.ac.uk/display/82037839,http://dx.doi.org/10.1016/j.diin.2015.01.014,,10.1016/j.diin.2015.01.014,2003744325,,0,001-170-920-458-777; 006-008-915-210-060; 011-051-740-313-213; 016-873-099-383-893; 024-735-069-822-749; 033-241-817-699-448; 056-715-378-869-201; 058-052-081-943-595; 060-650-561-577-338; 061-549-181-856-861; 104-758-205-558-797; 105-102-860-204-164; 117-239-595-156-183; 153-474-160-113-956; 154-517-106-328-503,47,true,cc-by-nc-nd,hybrid 065-873-523-989-876,Toward a general ontology for digital forensic disciplines.,2014-06-16,2014,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Nickson M. Karie; Hein S. Venter,"Ontologies are widely used in different disciplines as a technique for representing and reasoning about domain knowledge. However, despite the widespread ontology-related research activities and applications in different disciplines, the development of ontologies and ontology research activities is still wanting in digital forensics. This paper therefore presents the case for establishing an ontology for digital forensic disciplines. Such an ontology would enable better categorization of the digital forensic disciplines, as well as assist in the development of methodologies and specifications that can offer direction in different areas of digital forensics. This includes such areas as professional specialization, certifications, development of digital forensic tools, curricula, and educational materials. In addition, the ontology presented in this paper can be used, for example, to better organize the digital forensic domain knowledge and explicitly describe the discipline's semantics in a common way. Finally, this paper is meant to spark discussions and further research on an internationally agreed ontological distinction of the digital forensic disciplines. Digital forensic disciplines ontology is a novel approach toward organizing the digital forensic domain knowledge and constitutes the main contribution of this paper.",59,5,1231,1241,Semantics; Process ontology; Ontology (information science); Domain knowledge; Data science; Specialization (logic); SPARK (programming language); Poison control; Computer security; Computer science; Digital forensics,digital forensics; digital forensics disciplines; digital forensics subdisciplines; ontological distinction; ontology,,,University of Pretoria,https://repository.up.ac.za/handle/2263/40745 https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.12511 https://repository.up.ac.za/bitstream/2263/40745/1/Karie_Toward_2014.pdf https://pubmed.ncbi.nlm.nih.gov/24931294/ https://www.ncbi.nlm.nih.gov/pubmed/24931294,http://dx.doi.org/10.1111/1556-4029.12511,24931294,10.1111/1556-4029.12511,2128428697,,0,001-255-768-346-633; 007-008-600-837-690; 017-616-094-974-749; 023-284-330-325-900; 023-624-827-239-301; 030-136-936-524-671; 036-132-248-316-123; 040-303-410-401-667; 047-937-309-229-62X; 068-413-789-098-79X; 071-236-231-772-179; 074-796-013-951-077; 074-825-521-033-969; 076-403-310-070-21X; 090-714-244-223-446; 092-522-060-753-940; 110-544-488-755-056; 118-331-363-261-775; 124-877-237-466-309; 130-388-474-945-856; 143-441-767-976-48X; 144-108-190-670-351; 166-999-959-693-14X; 170-400-477-414-567; 176-902-260-050-457; 181-971-209-212-545; 198-131-134-915-873,25,false,, 065-927-829-618-673,"Characteristic evidence, counter evidence and reconstruction problems in forensic computing",2015-12-01,2015,journal article,it - Information Technology,16112776; 21967032,Walter de Gruyter GmbH,,Andreas Dewald,"Historically, forensic computing (as digital forensics) developed pragmatically, driven by specific technical needs. Indeed, in comparison with other forensic sciences the field still is rather immature and has many deficits, such as the unclear terminology used in court. In this paper, we introduce notions of (digital) evidence, characteristic evidence, and (characteristic) counter evidence, as well as the definitions of two fundamental forensic reconstruction problems. We show the relation of the observability of the different types of evidence to the solvability of those problems. By doing this, we wish to exemplify the usefulness of formalization in the establishment of a precise terminology. While this will not replace all terminological shortcomings, it (1) may provide the basis for a better understanding between experts, and (2) helps to understand the significance of different types of digital evidence to answer questions in an investigation.",57,6,339,346,Data science; Relation (database); Digital evidence; Forensic computing; Field (computer science); Observability; Computer security; Computer science; Terminology; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/it/it57.html#Dewald15 https://www.degruyter.com/view/j/itit.2015.57.issue-6/itit-2015-0017/itit-2015-0017.xml,http://dx.doi.org/10.1515/itit-2015-0017,,10.1515/itit-2015-0017,2408235858,,0,,3,false,, 065-939-794-265-406,IMPORTANCE OF FORENSICS OF MOBILE PHONES AS A TYPE OF DIGITAL FORENSICS IN THE PROCESS OF EVIDENCE,2019-01-15,2019,journal article,MEST Journal,23347171; 23347058,MESTE NGO,,Zivanka Miladinovic Bogavac; Djordje Spasojevic,,7,1,48,52,Computer science; Process (engineering); Multimedia; Digital forensics,,,,,http://dx.doi.org/10.12709/mest.07.07.01.07,http://dx.doi.org/10.12709/mest.07.07.01.07,,10.12709/mest.07.07.01.07,2908862144,,0,,0,true,,bronze 066-219-211-495-201,Digital Chain of Custody: State of the Art,2015-03-18,2015,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Yudi Prayudi; Azhari Sn,"Digital forensics starts to show its role and contribution in the society as a solution in disclosure of cybercrime. The essential in digital forensics is chain of custody, which is an attempt to preserve the integrity of digital evidence as well as a procedure for performing documentation chronologically toward evidence. The characteristics of digital evidence have caused the handling chain of custody is becoming more complicated and complex. A number of researchers have contributed to provide solutions for the digital chain custody through a different point of views. This paper gives an overview of the extent to which the problem and challenges are faced in the digital chain of custody issue as well as the scope of researches that can be done to contribute in the issue of the digital chain of custody.",114,5,1,9,Chain of custody; Internet privacy; Point (typography); Cybercrime; Scope (project management); Digital evidence; Computer security; Computer science; State (computer science); Documentation; Digital forensics,,,,,https://www.researchgate.net/profile/Yudi_Prayudi/publication/273694917_Digital_Chain_of_Custody_State_of_The_Art/links/5508eb510cf2d7a2812b6945.pdf https://research.ijcaonline.org/volume114/number5/pxc3901856.pdf https://ui.adsabs.harvard.edu/abs/2015IJCA..114e...1P/abstract https://www.ijcaonline.org/archives/volume114/number5/19971-1856,http://dx.doi.org/10.5120/19971-1856,,10.5120/19971-1856,2000621030,,0,002-534-435-127-422; 004-872-169-627-620; 006-008-915-210-060; 016-123-869-009-118; 016-354-677-353-123; 019-784-116-444-155; 022-798-132-190-701; 026-160-736-120-096; 027-808-425-151-210; 030-266-326-999-894; 031-119-185-862-726; 032-246-414-391-330; 033-241-817-699-448; 033-423-714-085-758; 035-565-993-122-262; 038-283-679-946-304; 038-617-328-415-920; 038-793-093-462-716; 041-017-598-844-767; 045-553-653-288-228; 055-416-156-661-003; 055-474-788-258-576; 060-650-561-577-338; 070-930-241-111-87X; 071-469-254-831-765; 073-582-404-994-103; 079-048-464-716-330; 082-073-790-023-516; 093-778-033-321-400; 094-058-992-093-766; 098-748-261-333-651; 117-121-219-607-16X; 131-543-884-973-431; 132-355-634-397-986; 133-051-121-626-660; 134-927-490-231-285; 163-919-423-925-780; 180-327-460-336-608; 181-091-839-882-521; 186-208-668-595-170; 192-955-966-543-738,27,true,,green 066-235-037-082-291,Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Ben Hitchcock; Nhien-An Le-Khac; Mark Scanlon,"Due to budgetary constraints and the high level of training required, digital forensic analysts are in short supply in police forces the world over. This inevitably leads to a prolonged time taken between an investigator sending the digital evidence for analysis and receiving the analytical report back. In an attempt to expedite this procedure, various process models have been created to place the forensic analyst in the field conducting a triage of the digital evidence. By conducting triage in the field, an investigator is able to act upon pertinent information quicker, while waiting on the full report.The work presented as part of this paper focuses on the training of front-line personnel in the field triage process, without the need of a forensic analyst attending the scene. The premise has been successfully implemented within regular/non-digital forensics, i.e., crime scene investigation. In that field, front-line members have been trained in specific tasks to supplement the trained specialists. The concept of front-line members conducting triage of digital evidence in the field is achieved through the development of a new process model providing guidance to these members. To prove the model's viability, an implementation of this new process model is presented and evaluated. The results outlined demonstrate how a tiered response involving digital evidence specialists and non-specialists can better deal with the increasing number of investigations involving digital evidence.",16,,75,85,Crime scene; Data science; Triage; Premise; Digital evidence; Field (computer science); Computer security; Computer science; Process (engineering); Process modeling; Digital forensics; Forensic science,,,,,https://forensicsandsecurity.com/papers/TieredForensicMethodologyModelForDigitalFieldTriage.pdf https://dl.acm.org/doi/10.1016/j.diin.2016.01.010 https://researchrepository.ucd.ie/handle/10197/9253 https://forensicsandsecurity.com/papers/TieredForensicMethodologyModelForDigitalFieldTriage.php https://www.sciencedirect.com/science/article/abs/pii/S1742287616300044 http://ui.adsabs.harvard.edu/abs/2016arXiv160403844H/abstract https://www.markscanlon.co/papers/TieredForensicMethodologyModelForDigitalFieldTriage.php https://www.sciencedirect.com/science/article/pii/S1742287616300044 https://dblp.uni-trier.de/db/journals/corr/corr1604.html#HitchcockLS16 https://researchrepository.ucd.ie/bitstream/10197/9253/1/TieredForensicMethodologyModelForDigitalFieldTriage.pdf https://markscanlon.co/papers/TieredForensicMethodologyModelForDigitalFieldTriage.pdf https://core.ac.uk/display/82007263 https://core.ac.uk/download/pdf/82007263.pdf,http://dx.doi.org/10.1016/j.diin.2016.01.010,,10.1016/j.diin.2016.01.010,3122457477; 2297444916,,0,003-982-227-180-136; 022-502-903-446-942; 029-268-367-041-280; 047-630-600-014-492; 073-459-830-156-539; 075-529-701-912-32X; 081-447-017-308-327; 082-508-778-448-650; 094-295-279-676-447; 102-736-860-649-556,42,true,cc-by-nc-nd,hybrid 066-249-839-004-372,Variation within physical and digital craniometrics.,2019-11-29,2019,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Matthew Lee; Karina Gerdau-Radonic,,306,,110092,,Statistics; Photogrammetry; Data processing; Multivariate analysis of variance; Rendering (computer graphics); Digital photogrammetry; Reference values; Research environment; Computer science; Digital anthropology,Craniometrics; Digital anthropology; Inter-observer error; Intra-observer error; Laser scanning; Photogrammetry,"Cephalometry/methods; Computer Simulation; Forensic Anthropology; Humans; Imaging, Three-Dimensional; Lasers; Male; Observer Variation; Photogrammetry; Reference Values; Skull/anatomy & histology",,,https://pubmed.ncbi.nlm.nih.gov/31816484/ https://www.sciencedirect.com/science/article/abs/pii/S0379073819305043 https://pubag.nal.usda.gov/catalog/6785455 https://www.ncbi.nlm.nih.gov/pubmed/31816484,http://dx.doi.org/10.1016/j.forsciint.2019.110092,31816484,10.1016/j.forsciint.2019.110092,2989768787,,0,002-214-682-301-085; 006-242-490-013-146; 008-056-012-843-018; 012-809-793-734-217; 016-580-313-404-132; 019-922-207-018-525; 022-388-426-117-073; 026-198-150-050-557; 031-933-665-463-421; 039-684-326-140-341; 041-585-451-530-646; 043-415-200-759-279; 048-399-506-168-441; 049-613-177-920-882; 052-332-973-851-731; 058-742-091-725-979; 066-380-633-522-119; 069-556-330-231-555; 073-933-049-544-280; 084-034-332-190-254; 087-451-816-741-063; 099-372-993-404-324; 102-302-370-093-913; 124-684-494-161-222; 140-675-263-092-798; 171-697-804-734-709; 178-456-110-092-227; 181-622-263-100-135,5,false,, 066-326-667-476-053,Case report: Digital restoration of fragmented non-human skull,,2020,journal article,Forensic Science International: Reports,26659107,Elsevier BV,,Gargi Jani; Abraham Johnson; William R. Belcher,"Abstract Reconstruction of fragmented material remains has been given a considerable attention in the fields of archaeology, forensic anthropology, and palaeoanthropology. Fragmented osseous remains are often found in cases of mass disasters, burning incidents, crash incidents, as well as bodily mutilation through criminal and suicidal activities. In cases where the remains are burnt or fragile, the handling of the remains becomes difficult and improper handling may lead to further destruction of the evidence. In such cases, digital restoration of the remains by means of three-dimensional technology can be done as it is a non-invasive in nature and minimizes physical handling. It has been repeatedly demonstrated that virtual methods facilitate preservation, storage, and conservation of skeletal remains. For this current preliminary study, fragile fragmentary osseous remains were obtained and then digitally reconstructed. The data was acquired using hand-held 3D laser scanners and digitally reconstructed using software. The reconstructed specimen was then printed and could be used for further analysis due to the fragile nature of the original specimen.",2,,100070,,Forensic anthropology; Crash; Skull; Non-human; Digital restoration; Computer science; Forensic engineering,,,,,http://www.sciencedirect.com/science/article/pii/S2665910720300165 https://www.sciencedirect.com/science/article/pii/S2665910720300165,http://dx.doi.org/10.1016/j.fsir.2020.100070,,10.1016/j.fsir.2020.100070,3006093929,,0,000-578-174-768-820; 008-199-912-610-234; 008-223-805-736-429; 008-594-799-452-800; 010-385-539-315-536; 012-821-321-591-571; 013-138-622-173-445; 024-784-179-276-92X; 028-135-903-429-591; 035-799-611-327-441; 044-295-973-878-539; 045-932-907-295-787; 047-504-313-643-90X; 051-402-505-986-98X; 055-273-770-672-76X; 059-572-267-613-848; 089-113-094-597-75X; 112-116-133-628-228; 115-550-078-617-585; 131-666-457-913-08X; 144-373-702-344-62X; 197-422-013-209-01X,4,true,"CC BY, CC BY-NC-ND",gold 066-372-994-493-544,Digital Evidence in Criminal Procedures-A Comparative Approach-,2013-12-01,2013,journal article,Balkan Social Science Review,18578799,,,Gordana Buzarovska Lazetik; Olga Koshevaliska,"Digital evidence can be a litigant's best friend or worst nightmare, depending on the type of evidence, how it is used, and in what court it is presented. Therefore this article aims to provide an overview of computer forensics from general definitions on digital evidence, their potential sources and basic principles regarding the evaluation of phases of ""crime scene investigation"" and seizure of data in order to determinate the ""fingerprints"" of the crime. We illustrated the procedure regarding digital evidence in the USA because of its contemporariness. At last the purpose of this paper is to illustrate the “handling” of digital evidence in Macedonia and to give recommendations for a better compliance with the international instruments regarding this issue.; Key words: digital evidence, digital forensics, digital investigation, criminal procedure.",,2,63,83,Crime scene; Order (exchange); Law; Key (cryptography); Data science; Digital evidence; Compliance (psychology); Computer science; Criminal procedure; Computer forensics; Digital forensics,,,,,http://js.ugd.edu.mk/index.php/BSSR/article/download/756/730 https://www.ceeol.com/search/article-detail?id=78558,http://js.ugd.edu.mk/index.php/BSSR/article/download/756/730,,,2275809413,,0,042-941-502-428-700; 047-310-841-930-720; 050-019-822-464-159; 197-872-262-830-083,1,false,, 066-591-536-952-520,Prelim i - Editorial Board,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,32,,300965,300965,Editorial board; Computer science; Library science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30143-8,,10.1016/s2666-2817(20)30143-8,,,0,,0,true,,bronze 066-777-702-062-597,Recent Advances in Passive Digital Image Security Forensics: A Brief Review,,2018,journal article,Engineering,20958099,Elsevier BV,United Kingdom,Xiang Lin; Jianhua Li; Shilin Wang; Alan-Wee-Chung Liew; Feng Cheng; Xiaosa Huang,"Abstract With the development of sophisticated image editing and manipulation tools, the originality and authenticity of a digital image is usually hard to determine visually. In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade. Compared with active forensics approaches that require embedding additional information, passive forensics approaches are more popular due to their wider application scenario, and have attracted increasing academic and industrial research interests. Generally speaking, passive digital image forensics detects image forgeries based on the fact that there are certain intrinsic patterns in the original image left during image acquisition or storage, or specific patterns in image forgeries left during the image storage or editing. By analyzing the above patterns, the originality of an image can be authenticated. In this paper, a brief review on passive digital image forensic methods is presented in order to provide a comprehensive introduction on recent advances in this rapidly developing research area. These forensics approaches are divided into three categories based on the various kinds of traces they can be used to track—that is, traces left in image acquisition, traces left in image storage, and traces left in image editing. For each category, the forensics scenario, the underlying rationale, and state-of-the-art methodologies are elaborated. Moreover, the major limitations of the current image forensics approaches are discussed in order to point out some possible research directions or focuses in these areas.",4,1,29,39,Image (mathematics); Point (typography); Information retrieval; Image editing; Originality; Digital image forensics; Image forensics; Industrial research; Computer science; Digital image,,,,National Key Research and Development Program of China; National Natural Science Foundation of China,https://www.sciencedirect.com/science/article/abs/pii/S2095809917307890 https://doaj.org/article/dd2687b7552b4ef6a0613888c6233afa https://www.sciencedirect.com/science/article/pii/S2095809917307890 https://engineering.org.cn/EN/10.1016/j.eng.2018.02.008 https://core.ac.uk/display/155265417,http://dx.doi.org/10.1016/j.eng.2018.02.008,,10.1016/j.eng.2018.02.008,2789856658,,0,000-679-477-475-489; 000-830-145-464-213; 000-980-904-065-103; 001-266-582-641-136; 001-413-792-295-769; 001-604-584-964-130; 004-377-809-881-072; 004-690-012-680-59X; 006-715-003-756-565; 009-566-662-446-07X; 015-708-405-109-070; 016-617-865-487-243; 017-522-442-322-636; 017-853-220-883-872; 018-677-312-546-562; 019-016-663-630-510; 022-296-050-330-096; 024-148-241-973-367; 024-806-781-026-020; 025-410-507-609-210; 027-757-905-863-260; 034-121-155-020-714; 034-785-721-591-194; 035-182-747-171-407; 036-155-644-690-629; 036-341-049-220-437; 039-604-410-537-357; 040-499-338-725-508; 041-838-544-052-666; 042-324-311-104-451; 044-144-587-337-904; 045-496-560-764-477; 047-322-910-540-450; 049-241-042-800-133; 054-167-448-698-763; 057-831-748-324-829; 067-303-718-151-959; 067-768-123-984-732; 067-913-828-134-760; 076-346-829-732-533; 076-704-896-134-67X; 077-604-852-329-975; 080-794-266-877-942; 083-495-367-906-30X; 084-016-117-488-972; 085-735-767-631-723; 087-814-787-159-954; 087-895-411-431-312; 099-917-904-062-017; 101-435-060-435-239; 106-688-419-298-857; 106-908-142-273-164; 108-896-114-392-841; 110-050-634-028-069; 112-077-011-771-30X; 122-001-451-301-450; 125-328-926-232-377; 136-713-989-335-402; 141-099-823-545-470; 143-695-756-474-732; 152-785-842-665-362; 155-074-178-700-550; 155-355-077-713-919; 159-132-926-596-284; 162-699-965-110-190; 169-110-142-355-656; 180-552-666-228-97X; 182-017-605-279-245; 184-897-235-429-285,47,true,"CC BY, CC BY-NC-ND",gold 066-786-352-814-166,Smoothing Filtering Detection for Digital Image Forensics: Smoothing Filtering Detection for Digital Image Forensics,2014-02-27,2014,journal article,Journal of Electronics & Information Technology,10095896,China Science Publishing & Media Ltd.,China,Jun-yu Xu; Yu-ting Su,,35,10,2287,2293,Artificial intelligence; Digital image forensics; Computer vision; Smoothing; Computer science,,,,,http://pub.chinasciencejournal.com/article/getArticleRedirect.action?doiCode=10.3724/SP.J.1146.2013.00131,http://dx.doi.org/10.3724/sp.j.1146.2013.00131,,10.3724/sp.j.1146.2013.00131,2323274304,,0,,3,false,, 066-807-833-482-350,Smart TV forensics,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Abdul Boztas; A.R.J. Riethoven; Mark Roeloffs,"The Smart TV is becoming increasingly popular amongst consumers. Many consumers use a Smart TV to gain quick access to the Internet including video on demand, social networking and instant messaging. Most Smart TVs also provide capabilities to connect with external devices such as a USB flash drive, a mobile phone etc. All of these features make a Smart TV a potentially rich source of information for forensic purposes. With increasing utilisation, it is also easier for malicious users to abuse a Smart TV. Therefore a digital forensics study on the field of Smart TV is imperative. This paper proposes new procedures for acquiring, analysing and investigating a Smart TV.",12,,S72,S80,The Internet; Mobile phone; USB flash drive; Instant messaging; Cyber crime; Video on demand; Field (computer science); Computer security; Computer science; Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287615000134 https://doi.org/10.1016/j.diin.2015.01.012 https://www.sciencedirect.com/science/article/pii/S1742287615000134 https://www.researchgate.net/profile/A_Boztas/publication/273261826_Smart_TV_forensics_Digital_traces_on_televisions/links/55acc73e08aea3d08686109b.pdf https://core.ac.uk/display/82823751 https://dblp.uni-trier.de/db/journals/di/di12.html#BoztasRR15 https://dl.acm.org/doi/10.1016/j.diin.2015.01.012,http://dx.doi.org/10.1016/j.diin.2015.01.012,,10.1016/j.diin.2015.01.012,2028651713,,0,002-927-911-483-709; 003-504-554-245-316; 017-815-064-018-299; 024-385-303-080-230; 063-377-383-491-594; 074-933-143-629-826; 085-214-277-668-01X,21,true,cc-by-nc-nd,hybrid 067-310-016-898-527,Forensic Psychology: Profiling Criminal Mindset In Sexual Offenders,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yugal Pathak,,,,,,Profiling (information science); Psychology; Forensic psychology; Mindset; Criminology,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.01,http://dx.doi.org/10.46293/4n6/2021.03.02.01,,10.46293/4n6/2021.03.02.01,3162615181,,0,,0,false,, 067-329-399-496-102,A Two-Stage Model for Social Network Investigations in Digital Forensics,,2020,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Anne David; Sarah Morris; Gareth Appleby-Thomas,,15,2,1,,Stage (hydrology); Digital evidence; Computer security; Computer science; Information security; Digital forensics; Social network,,,,,https://commons.erau.edu/jdfsl/vol15/iss2/1/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1667&context=jdfsl https://dspace.lib.cranfield.ac.uk/handle/1826/15732,http://dx.doi.org/10.15394/jdfsl.2020.1667,,10.15394/jdfsl.2020.1667,3081425919,,0,004-866-932-432-464; 009-386-221-930-423; 010-985-077-415-59X; 017-358-994-049-12X; 018-182-926-340-45X; 018-696-253-395-568; 041-231-462-732-579; 044-838-289-309-637; 083-748-184-402-072; 106-885-306-836-498; 126-171-514-582-85X; 167-109-432-601-404; 197-981-316-485-16X,2,true,cc-by-nc,gold 067-429-157-490-697,The Impact of MD5 File Hash Collisions On Digital Forensic Imaging,,2016,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Gary C. Kessler,,11,4,9,,Collision; World Wide Web; MD5; Forensic imaging; Computer security; Computer science; Computer forensics; Digital forensics,,,,,https://commons.erau.edu/jdfsl/vol11/iss4/9/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1431&context=jdfsl https://works.bepress.com/gary_kessler/90/ https://doi.org/10.15394/jdfsl.2016.1431 https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#Kessler16 https://works.bepress.com/gary_kessler/90/download/,http://dx.doi.org/10.15394/jdfsl.2016.1431,,10.15394/jdfsl.2016.1431,2620422179,,0,094-227-042-630-139; 124-466-422-768-986; 167-398-164-200-13X,3,true,cc-by-nc,gold 067-475-744-304-50X,Educational egaming: the future for geoscience virtual learners?,2014-07-15,2014,journal article,Geology Today,02666979; 13652451,Wiley,United Kingdom,Jamie K. Pringle,"Current students will mostly comprise the so-called ‘Generation Y’, who have grown up with personal computer and egaming technologies. Used to a variety of digital learning environments, it is probable that, for them at least, educational egaming may provide effective learning, complementary to more traditional teaching methods. Current geoscience digital educational methods are briefly reviewed and examined through three case studies of online educational geoscience egames. These are shown to provide a consistent experience, ‘24/7’ accessibility and effective learning.",30,4,147,150,Geology; Variety (cybernetics); Earth science; Digital learning; Personal computer; Educational method; Teaching method,,,,,https://onlinelibrary.wiley.com/doi/10.1111/gto.12058 https://core.ac.uk/display/43759983 https://core.ac.uk/download/43759983.pdf,http://dx.doi.org/10.1111/gto.12058,,10.1111/gto.12058,2079790978,,0,,12,true,,green 067-577-414-064-539,Digital Forensic Science: A Manifesto,2016-12-16,2016,journal article,South African Computer Journal,23137835; 10157999,South African Institute of Computer Scientists and Information Technologists,South Africa,Martin S. Olivier,"Forensic examination of evidence holds the promise of making claims about the truth of certain propositions with the inherent accuracy; and reliability that characterises scientific endeavours. The propositions may relate to the artefacts examined or related artefacts. The; nature of propositions about which claims can be made depend on the extent to which given propositions fall within the ambit of scientific; knowledge and on the extent to which the examined evidence is suitable for the application of established science. A continuing series; of incidents illustrate that in many forensic disciplines that promise is not met — often because some branch of forensic science happen; to not being scientific at all. In fact, serious assessments of forensic science have shown that many (if not most) branches of forensic; science are not scientifically valid.; Digital forensic science is one of the newest members of the family of forensic sciences. A number of reasons for concern exist that; it is following in the footsteps of its more established footsteps and repeating many of the mistakes of those other branches of forensic; science.; This viewpoint is written in the form of a manifesto that is situated in the current discourse about digital forensic science and practice.; If challenges the current developments in digital forensic science by positing a number of demands that digital forensic science have to; meet to be deemed scientific. The demands are posited as necessary, but not sufficient to ensure that digital forensic science uses science; to contribute to justice. Appropriate responses to the manifesto is a change in digital forensic developments or an informed debate about; the issues raised in the manifesto.",28,2,46,49,Situated; Forensic science; Sociology; Sociology of scientific knowledge; Law; Justice (ethics); Manifesto; Forensic examination; Questioned document examination; Engineering ethics; Digital forensics,,,,,https://doaj.org/article/fd3996c6cd6a4b50a4c43cb3dcef8058 https://sacj.cs.uct.ac.za/index.php/sacj/article/view/442 https://core.ac.uk/display/90989195 https://doi.org/10.18489/sacj.v28i2.442 https://dblp.uni-trier.de/db/journals/saj/saj28a.html#Olivier16 https://sacj.cs.uct.ac.za/index.php/sacj/article/download/442/194 https://www.dspace.up.ac.za/handle/2263/60561 https://repository.up.ac.za/handle/2263/60561,http://dx.doi.org/10.18489/sacj.v28i2.442,,10.18489/sacj.v28i2.442,2566075325,,0,,5,true,cc-by-nc,gold 067-618-189-888-272,A practical overview and comparison of certain commercial forensic software tools for processing large-scale digital investigations,2013-05-28,2013,journal article,SPIE Proceedings,0277786x,SPIE,,Knut Kröger; Reiner Creutzburg,"The aim of this paper is to show the usefulness of modern forensic software tools for processing large-scale digital; investigations. In particular, we focus on the new version of Nuix 4.2 and compare it with AccessData FTK 4.2, X-Ways; Forensics 16.9 and Guidance Encase Forensic 7 regarding its performance, functionality, usability and capability. We; will show how these software tools work with large forensic images and how capable they are in examining complex and; big data scenarios.",8755,,875519,,Software engineering; World Wide Web; Forensic science; Usability; Software; Scale (chemistry); Computer science; Computer forensics; Big data,,,,,https://ui.adsabs.harvard.edu/abs/2013SPIE.8755E..19K/abstract https://www.spiedigitallibrary.org/conference-proceedings-of-spie/8755/1/A-practical-overview-and-comparison-of-certain-commercial-forensic-software/10.1117/12.2017906.full https://www.researchgate.net/profile/Knut_Bellin/publication/258332973_A_practical_overview_and_comparison_of_certain_commercial_forensic_software_tools_for_processing_large-scale_digital_investigations/links/00b495293485547b83000000.pdf,http://dx.doi.org/10.1117/12.2017906,,10.1117/12.2017906,2050839987,,0,110-751-128-408-714; 165-770-474-971-736; 176-612-730-669-225,1,false,, 067-840-274-503-047,An ad hoc detailed review of digital forensic investigation process models,,2016,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Reza Montasari,"For the past decade, digital forensics has been the subject of scientific study, and as a result it has become an established research and application field. One of the foundational methods in which the researchers in the field have attempted to comprehend the scientific basis of this discipline has been to develop models which reflect their observations. Various process models have been developed describing the steps and processes to follow during a digital forensic investigation. This paper provides a detailed review of 11 published papers representing digital forensic process models. The aim of this review is to gain background knowledge of the existing research on the digital forensic investigation process models and the problems associated with those models.",8,3,205,223,Data science; Digital forensic process; Subject (documents); Digital forensic investigation; Field (computer science); Computer science; Computer forensics; Scientific study; Process modeling; Digital forensics,,,,,https://pure.hud.ac.uk/en/publications/an-ad-hoc-detailed-review-of-digital-forensic-investigation-proce https://dx.doi.org/10.1504/IJESDF.2016.077444 http://dx.doi.org/10.1504/IJESDF.2016.077444 https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf8.html#Montasari16 https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2016.077444 https://dl.acm.org/citation.cfm?id=2974526 https://dl.acm.org/doi/10.1504/IJESDF.2016.077444 https://www.open-access.bcu.ac.uk/4547/ http://www.inderscience.com/link.php?id=77444 https://cronfa.swan.ac.uk/Record/cronfa54941,http://dx.doi.org/10.1504/ijesdf.2016.077444,,10.1504/ijesdf.2016.077444,2465829845,,0,004-652-388-189-304; 004-872-169-627-620; 005-515-442-506-880; 007-314-571-885-858; 010-086-703-646-194; 019-831-293-743-518; 020-944-423-224-895; 021-486-901-460-202; 021-850-998-857-676; 026-774-296-742-022; 031-234-153-523-379; 032-697-093-668-898; 038-668-970-194-854; 063-274-848-736-685; 067-844-385-207-96X; 074-014-335-505-388; 085-214-277-668-01X; 087-041-369-426-333; 130-733-989-451-876; 132-355-634-397-986; 133-397-275-695-990; 140-821-103-436-654; 143-562-788-834-457; 162-110-149-751-921; 172-965-192-520-527; 179-881-224-143-743; 184-948-841-629-735; 190-065-821-748-92X; 190-872-133-741-434; 192-810-463-153-431; 199-172-967-270-034; 199-745-676-923-766,12,false,, 067-844-385-207-96X,Digital forensics: An Analytical Crime Scene Procedure Model (ACSPM),2013-09-13,2013,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Halil Ibrahim Bulbul; H. Güçlü Yavuzcan; Mesut Ozel,,233,1,244,256,Chain of custody; Crime scene; Data science; Law enforcement; Digital evidence; Computer security; Computer science; Process (engineering); Computer forensics; Process modeling; Digital forensics,Chain of custody (COC); Crime scene; Digital evidence; Digital forensics; Procedure model; Standard operating procedure (SOP),"Documentation; Forensic Sciences/organization & administration; Humans; Information Storage and Retrieval/methods; Microcomputers; Models, Organizational; Quality Control",,,https://europepmc.org/article/MED/24314526 http://www.sciencedirect.com/science/article/pii/S0379073813004155 https://pubmed.ncbi.nlm.nih.gov/24314526/ https://www.sciencedirect.com/science/article/abs/pii/S0379073813004155 https://www.ncbi.nlm.nih.gov/pubmed/24314526,http://dx.doi.org/10.1016/j.forsciint.2013.09.007,24314526,10.1016/j.forsciint.2013.09.007,1965613196,,0,001-009-008-665-240; 002-534-435-127-422; 002-856-570-549-435; 004-872-169-627-620; 005-515-442-506-880; 010-086-703-646-194; 017-815-064-018-299; 019-831-293-743-518; 020-944-423-224-895; 021-486-901-460-202; 021-850-998-857-676; 022-723-185-375-121; 024-381-049-056-789; 032-246-414-391-330; 032-697-093-668-898; 034-497-160-604-138; 035-223-520-491-228; 038-668-970-194-854; 047-630-600-014-492; 060-808-935-547-406; 067-950-012-629-210; 083-366-581-383-158; 090-792-295-657-205; 092-058-232-746-872; 099-717-679-430-808; 101-093-348-378-723; 111-090-978-711-139; 120-697-354-224-33X; 122-880-373-616-302; 125-384-800-661-375; 128-301-609-429-087; 132-355-634-397-986; 133-397-275-695-990; 134-927-490-231-285; 135-717-892-795-412; 138-097-495-143-351; 141-445-106-549-822; 151-378-930-836-964; 161-299-499-071-016; 165-770-474-971-736; 170-299-458-679-224; 173-034-553-635-460; 180-327-460-336-608; 183-000-233-873-221; 183-155-928-447-559; 184-948-841-629-735; 186-502-029-675-526; 190-065-821-748-92X; 199-172-967-270-034; 199-745-676-923-766,32,false,, 068-030-546-112-691,Healthcare Data Breaches: Implications for Digital Forensic Readiness,2018-11-28,2018,journal article,Journal of medical systems,1573689x; 01485598,Springer New York,United States,Maxim Chernyshev; Sherali Zeadally; Zubair A. Baig,"While the healthcare industry is undergoing disruptive digital transformation, data breaches involving health information are not usually the result of integration of new technologies. Based on published industry reports, fundamental security safeguards are still considered to be lacking with many documented data breaches occurring as the result of device and equipment theft, human error, hacking, ransomware attacks and misuse. Health information is considered to be one of the most attractive targets for cybercriminals due to its inherent sensitivity, but digital investigations of incidents involving health information are often constrained by the lack of the necessary infrastructure forensic readiness. Following the analysis of healthcare data breach causes and threats, we describe the associated digital forensic readiness challenges in the context of the most significant incident causes. With specific focus on privilege misuse, we present a conceptual architecture for forensic audit logging to assist with capture of the relevant digital artefacts in support of possible future digital investigations.",43,1,7,,Internet privacy; Digital transformation; Health informatics; Data breach; Human error; Audit; Ransomware; Context (language use); Computer science; Digital forensics,Computer crime; Forensics; Health information management; Security; Threat,Computer Security/standards; Confidentiality/legislation & jurisprudence; Electronic Health Records/organization & administration; Forensic Sciences/organization & administration; Health Information Management/legislation & jurisprudence; Humans,,,https://link.springer.com/article/10.1007/s10916-018-1123-2 https://www.ncbi.nlm.nih.gov/pubmed/30488291 https://ro.ecu.edu.au/ecuworkspost2013/5571/ https://pubmed.ncbi.nlm.nih.gov/30488291/ https://doi.org/10.1007/s10916-018-1123-2 http://dro.deakin.edu.au/view/DU:30121030 https://dblp.uni-trier.de/db/journals/jms/jms43.html#ChernyshevZB19 http://hdl.handle.net/10536/DRO/DU:30121030,http://dx.doi.org/10.1007/s10916-018-1123-2,30488291,10.1007/s10916-018-1123-2,2902689954,,0,002-840-278-571-874; 003-803-242-209-367; 015-646-976-755-729; 022-119-460-083-705; 024-703-308-745-394; 026-774-296-742-022; 032-697-093-668-898; 034-263-766-060-719; 043-979-280-803-957; 046-988-024-816-111; 049-404-833-736-24X; 056-205-328-777-528; 060-294-953-084-788; 060-743-410-850-643; 066-671-350-861-612; 082-305-594-294-343; 089-032-971-972-861; 103-511-904-468-642; 107-829-974-201-674; 115-621-396-169-875; 142-437-368-699-894; 165-966-337-114-740; 172-820-491-934-626; 183-660-639-259-524; 184-948-841-629-735,39,false,, 068-211-549-219-606,“Hello are you available?” Dealing with online frauds and the role of forensic science,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Olivier Ribaux; Thomas R. Souvignet,"Abstract On August 6, 2019, the 119 members of the School of criminal justice, forensic science and criminology at the University of Lausanne were the target of an online scammer. His/her modus operandi consisted of email masquerading as the Director of the School in an attempt to induce the victims to buy digital gift cards and to transmit the card usage code to the perpetrator. The first author of this paper is the Director of the School, and the second is an expert in digital forensic science and a professor of the School. They worked together in real time to deal with the fraud. Because the fraud occurred in a School of forensic science and criminology, it raised many questions on a variety of overlapping dimensions. The objective of this study was, therefore, to draw lessons from this case from several perspectives ranging from forensic science to cybersecurity, and from practical to academic. The response to the incident has been treated in four typical distinguishable phases: (1) fraud detection; (2) crisis management; (3) post-incident analysis; and (4) reporting to different communities. We conclude this paper by taking lessons from the case to express the essential role of forensic knowledge and crime analysis in interpreting the information conveyed by digital traces to develop innovative cross-disciplinary models for preventing, detecting, analysing, investigating and responding to online fraud.",33,,300978,,Criminal justice; Variety (cybernetics); Forensic science; Sociology; Code (semiotics); Crime analysis; Crisis management; Public relations; Digital forensics,,,,University of Lausanne,https://doi.org/10.1016/j.fsidi.2020.300978 https://serval.unil.ch/notice/serval:BIB_7054F13E76E6 https://www.sciencedirect.com/science/article/pii/S2666281720300810 https://dblp.uni-trier.de/db/journals/di/di33.html#RibauxS20 https://www.sciencedirect.com/science/article/pii/S2666281720300810#! https://core.ac.uk/download/pdf/322688129.pdf,http://dx.doi.org/10.1016/j.fsidi.2020.300978,,10.1016/j.fsidi.2020.300978,3016060622,,0,000-283-292-553-62X; 002-436-870-952-778; 004-373-624-183-050; 006-129-047-122-458; 009-512-003-529-193; 010-951-806-548-929; 015-168-306-989-485; 019-698-064-288-240; 022-358-546-399-506; 030-859-592-601-192; 031-234-153-523-379; 033-400-782-766-385; 039-145-979-009-196; 042-289-392-240-47X; 044-051-299-105-401; 047-976-235-338-816; 064-549-392-650-90X; 078-448-713-257-099; 078-601-393-355-906; 084-861-292-090-257; 090-538-331-138-469; 091-081-161-718-514; 091-511-454-565-387; 093-272-440-861-895; 109-079-071-485-920; 112-856-054-215-074; 115-531-623-920-069; 157-049-748-215-425,2,true,cc-by-nc-nd,hybrid 068-386-024-387-716,Prelim i - Editorial Board,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,40,,301366,301366,Editorial board; Business; Computer science; Library science,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00038-5,,10.1016/s2666-2817(22)00038-5,,,0,,0,true,,bronze 068-508-915-657-575,Optimizing search strategies in mass grave location through the combination of digital technologies,2019-06-03,2019,journal article,Forensic science international. Synergy,2589871x,Elsevier BV,Netherlands,D. Abate; C. Sturdy Colls; N. Moyssi; D. Karsili; M. Faka; A. Anilir; S. Manolis,"Abstract Efforts to locate missing persons resulting from conflict often centre of excavation. Although this approach is the only way to definitively confirm the presence of human remains, it can be costly and labour-intensive, particularly when large areas need to be searched. This paper discusses a wide range of emerging non-invasive digital methods implemented with a view to locating burials and mass graves and increase the excavation recovery rate of the Committee on Missing Persons in Cyprus (CMP). Aerial and terrestrial survey and subsequent 3D modelling were combined with geophysical survey in order to record sites, two of which were excavated to ground-truth the findings. The results demonstrated the effectiveness of these techniques in defining the search parameters of potential burial sites and prioritizing features for investigation. The nature of the collaboration between archaeologists, digital technologists, and forensic experts allowed mutual trust to be built between all parties, whilst also testing the effectiveness of the methods employed.",1,,95,107,Photogrammetry; Data science; Geophysical survey (archaeology); Forensic archaeology; Recovery rate; Excavation; Computer science; Ground-penetrating radar,Digital technologies; Forensic archaeology; Geophysics; Ground penetrating radar; Missing persons; Photogrammetry,,,Marie Sklodowska-Curie Action; Digital Forensic Archaeology,http://eprints.staffs.ac.uk/5681/ https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7219194 https://www.sciencedirect.com/science/article/pii/S2589871X19300828 https://core.ac.uk/download/pdf/210991644.pdf,http://dx.doi.org/10.1016/j.fsisyn.2019.05.002,32411961,10.1016/j.fsisyn.2019.05.002,2948978223,PMC7219194,0,000-936-621-181-317; 004-086-552-514-938; 005-676-466-381-741; 007-036-175-939-263; 012-426-089-826-902; 016-225-015-230-107; 019-763-357-518-984; 025-094-429-798-148; 028-141-955-184-339; 028-205-528-233-343; 034-157-734-842-610; 034-811-831-798-66X; 039-425-885-215-040; 039-770-514-496-83X; 041-265-951-641-438; 066-952-151-953-603; 077-583-394-896-234; 079-602-164-850-584; 079-632-479-718-155; 088-475-666-056-708; 090-878-982-570-90X; 096-031-767-202-21X; 104-379-057-063-150; 105-716-388-241-40X; 106-619-341-791-430; 109-238-249-157-146; 116-918-248-369-633; 132-982-288-075-986; 140-362-010-096-283; 141-104-202-460-179; 155-896-090-630-255; 169-285-065-757-76X; 195-623-056-826-585,9,true,"CC BY, CC BY-NC-ND",gold 068-558-695-475-467,Dilemmas in Digital Forensics for Computer Equipment Security and Maintenance in Remote Ships,,2012,journal article,Advanced Materials Research,16628985,"Trans Tech Publications, Ltd.",,Hu Chen,"As remote ships have equipped a large number of computer equipments, the maintenance of such equipments confronts a great challenge. Since some embedded devices among them may be hacked by attackers or disabled by Byzantine failure, to discover the attacking originality and fault source present foremost importance. In this article, we discuss digital investigation and forensics as a general viewpoint. We point out some dilemmas that hinder the development of digital forensics, some of which may be fundamental problems. We propose to expand the concept of digital forensics to a wider scope so as to include digital investigation for information instead of only evidence. We also argue that the fostering of novel contributions should be relied on technical experts instead of law experts as emerging new techniques always result in new digital crimes. We promote the divorce between the technical experts who focus on the contribution of technologies, and legal authorities who are responsible to bridge the gap between technologies and standard/formalization. Digital forensics methods are encouraged to be publicly available, but the contributors should be aware of the possibility of anti-forensics.",490-495,,1382,1386,Forensic science; Bridge (nautical); Point (typography); Originality; Scope (project management); Computer security; Focus (computing); Computer science; Computer forensics; Digital forensics,,,,,https://www.scientific.net/AMR.490-495.1382,http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.1382,,10.4028/www.scientific.net/amr.490-495.1382,2025495556,,0,030-359-893-882-572; 042-230-817-975-353; 045-243-807-828-458; 049-216-276-407-671; 081-933-261-712-915; 134-927-490-231-285,0,false,, 068-565-513-246-053,Physical security design of a digital forensic lab,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Doug Weeks; Bing Zhou,The physical security design of a digital forensic lab is one of the key components to ensure investigators are providing a secure environment to process and store evidence that has been entrusted ...,13,1,418,444,Key (cryptography); Physical security; Computer security; Computer science; Process (engineering); Access control; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.116017,http://dx.doi.org/10.1504/ijesdf.2021.10033951,,10.1504/ijesdf.2021.10033951,3107912113,,0,,0,false,, 068-669-641-930-403,Theory of Information and Computer Support for Forensic Expert Activities as a New Private Theory of Forensic Expertology,2022-05-08,2022,journal article,Courier of Kutafin Moscow State Law University (MSAL)),27826163; 23115998,Kutafin Moscow State Law University,,E. R. Rossinskaya,"From the stand point of global digitalization, the article substantiates the creation of a new private theory of forensic expertology — the theory of information and computer support of forensic expert activity. The author outlines the main stages of the genesis the processes of automation and informatization for forensic research. At the first stage, in the mid-60s, many works related to the use of cybernetics in the automation of certain types of forensic examinations appeared in the forensic literature. The second stage occurred at the end of the 80s — 90s of the XX century, when the integration of new information technologies, mainly of a technological nature, began to develop in five main directions, thanks to the development of computer technology. In the early 2000s, the third stage of informatization and computerization of forensic expertise began. The processes of digitalization in forensic activity gave a new impetus to the development of not only the areas of information and computer support, which continued to improve, but also the emergence of research in many kinds (types) forensic examinations of new objects expert research — digital footprints. The author states that there was no theoretical basis for their forensic expert research in forensic expertology. Therefore, a new private theory (teaching) of forensic expertology has been developed — the theory of digitalization for forensic expert activity. The subject of this theory and its objects, the place of the new theory in forensic expertology are described. It has been proved that the theory of digitalization for forensic activity, due to the increasingly global nature of digitalization, can be attributed to several private theories, the provisions of which equally apply both to the process of expert research as a whole and to expert research of certain types of expertise. The modern theory of digitalization of forensic activities includes two areas: a system of information and computer support for forensic activities and forensic research of digital footprints.",,2,27,40,Informatization; Computer forensics; Forensic science; Digital forensics; Automation; Computer science; Digital evidence; Expert system; Data science; Engineering ethics; Engineering; Artificial intelligence; Computer security; World Wide Web; History; Mechanical engineering; Archaeology,,,,,,http://dx.doi.org/10.17803/2311-5998.2022.90.2.027-040,,10.17803/2311-5998.2022.90.2.027-040,,,0,,0,true,,hybrid 068-931-665-572-533,A Forensic Traceability Index in Digital Forensic Investigation,2013-01-30,2013,journal article,Journal of Information Security,,,,Siti Rahayu Selamat; Shahrin Sahib; Nor Hafeizah; Robiah Yusof; Mohd Faizal Abdollah,"Digital crime inflicts immense damage to users and systems and now it has reached a level of sophistication that makes it difficult to track its sources or origins especially with the advancements in modern computers, networks and the availability of diverse digital devices. Forensic has an important role to facilitate investigations of illegal activities and inappropriate behaviors using scientific methodologies, techniques and investigation frameworks. Digital forensic is developed to investigate any digital devices in the detection of crime. This paper emphasized on the research of traceability aspects in digital forensic investigation process. This includes discovering of complex and huge volume of evidence and connecting meaningful relationships between them. The aim of this paper is to derive a traceability index as a useful indicator in measuring the accuracy and completeness of discovering the evidence. This index is demonstrated through a model (TraceMap) to facilitate the investigator in tracing and mapping the evidence in order to identify the origin of the crime or incident. In this paper, tracing rate, mapping rate and offender identification rate are used to present the level of tracing ability, mapping ability and identifying the offender ability respectively. This research has a high potential of being expanded into other research areas such as in digital evidence presentation.",2013,1,19,32,Tracing; Forensic science; Traceability; Sophistication; Data science; Digital evidence; Digital forensic investigation; Research areas; Computer security; Computer science; Digital forensics,,,,,https://m.scirp.org/papers/27549 https://www.scirp.org/Journal/PaperDownload.aspx?paperID=27549 http://eprints.utem.edu.my/6777/ https://file.scirp.org/Html/4-7800122_27549.htm https://file.scirp.org/pdf/JIS_2013013014233287.pdf https://www.scirp.org/journal/PaperInformation.aspx?paperID=27549,https://m.scirp.org/papers/27549,,,2102916229,,0,006-004-640-148-035; 010-086-703-646-194; 012-779-911-526-394; 017-358-994-049-12X; 018-245-873-246-94X; 019-698-064-288-240; 020-064-435-529-922; 020-944-423-224-895; 024-917-519-955-520; 025-166-987-232-333; 030-809-391-871-561; 032-697-093-668-898; 038-668-970-194-854; 038-704-079-905-560; 040-823-216-153-224; 044-147-389-377-300; 050-513-243-638-138; 056-615-247-058-312; 056-889-959-233-076; 062-202-545-220-180; 069-894-023-646-007; 102-528-798-484-730; 102-602-192-826-532; 114-592-978-453-407; 124-837-341-752-034; 125-384-800-661-375; 132-089-355-719-664; 133-232-608-554-796; 133-397-275-695-990; 134-927-490-231-285; 137-203-237-364-717; 138-253-866-510-07X; 140-821-103-436-654; 170-108-067-251-840; 170-299-458-679-224; 171-886-869-522-486; 177-069-167-035-120; 180-327-460-336-608; 190-065-821-748-92X; 199-172-967-270-034; 199-745-676-923-766,11,false,, 069-051-070-055-052,Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone,2016-03-11,2016,journal article,Jurnal Edukasi dan Penelitian Informatika (JEPIN),25489364; 24600741,Tanjungpura University,,Ruuhwan Ruuhwan; Riadi; Yudi Prayudi,"Perkembangan teknologi yang semakin pesat, dapat menimbulkan permasalahan bagi pengguna teknologi itu sendiri, semakin maju kehidupan masyarakat, maka kejahatan juga ikut semakin maju. Smartphone merupakan salah satu bentuk teknologi yang digunakan untuk melakukan penipuan melalui fasilitas Short Message Service ( SMS). Pada saat smartphone yang digunakan untuk melakukan kejahatan maka smartphone tersebut dapat disita oleh aparat penegak hukum sebagai salah satu barang bukti. Cara pembuktian untuk mendapatkan bukti yang valid adalah dengan melakukan investigasi menggunakan pendekatan penanganan bukti digital yang dikenal dengan istilah Framework. Integrated Digital Forensics Investigation Framework versi 2 (IDFIF v2) merupakan framework terbaru yang telah dikembangkan sehingga dapat digunakan untuk proses investigasi smartphone . Kata kunci — Barang Bukti, Framework, IDFIF v2, Smartphone",2,1,,,,,,,,https://doaj.org/article/454dedfda585445eb288e74b545be9b4 https://core.ac.uk/display/88097479 https://core.ac.uk/download/pdf/294889013.pdf,http://dx.doi.org/10.26418/jp.v2i1.14369,,10.26418/jp.v2i1.14369,2295828917,,0,,3,true,cc-by-nc-sa,gold 069-073-265-694-871,Information assurance in a distributed forensic cluster,,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Nick Pringle; Mikhaila Burgess,"Abstract When digital forensics started in the mid-1980s most of the software used for analysis came from writing and debugging software. Amongst these tools was the UNIX utility ‘dd’ which was used to create an image of an entire storage device. In the next decade the practice of creating and using ‘an image’ became established as a fundamental base of what we call ‘sound forensic practice’. By virtue of its structure, every file within the media was an integrated part of the image and so we were assured that it was wholesome representation of the digital crime scene. In an age of terabyte media ‘the image’ is becoming increasingly cumbersome to process, simply because of its size. One solution to this lies in the use of distributed systems. However, the data assurance inherent in a single media image file is lost when data is stored in separate files distributed across a system. In this paper we assess current assurance practices and provide some solutions to the need to have assurance within a distributed system.",11,,S36,S44,Unix; World Wide Web; Debugging; Crime scene; Terabyte; Software; Information assurance; Computer science; Multimedia; Image file formats; Digital forensics,,,,European Social Fund,http://www.sciencedirect.com/science/article/pii/S1742287614000103 https://doi.org/10.1016/j.diin.2014.03.005 https://core.ac.uk/display/81935556 https://www.sciencedirect.com/science/article/pii/S1742287614000103 https://core.ac.uk/download/pdf/81935556.pdf,http://dx.doi.org/10.1016/j.diin.2014.03.005,,10.1016/j.diin.2014.03.005,2059728478,,0,021-563-550-669-43X; 024-721-343-226-994; 029-632-996-742-459; 033-877-222-136-260; 039-449-793-715-298; 050-513-243-638-138; 055-090-334-937-061; 060-799-847-178-231; 067-938-325-014-282; 079-070-981-899-105; 117-239-595-156-183; 134-927-490-231-285,11,true,cc-by-nc-nd,hybrid 069-164-282-798-000,The Need for Digital Evidence Standardisation,2012-04-01,2012,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Marthie Grobler,"

Continuous developments in forensic processes and tools have aided in elevating the positioning of digital forensics within the legal system. The equally continuous developments in technology and electronic advances, however, are making it more difficult to match forensic processes and tools with the advanced technology. Therefore, it is necessary to create and maintain internationally accepted standards to control the use and application of digital forensic processes. This article addresses this need and touches on the motivation for such internationally recognised standards on digital evidence. It also looks at current work in and progress towards the establishment of digital evidence related documents addressing all phases of the digital forensic process.

",4,2,1,12,Data science; Digital evidence; Computer science,,,,,https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf4.html#Grobler12 https://www.igi-global.com/article/need-digital-evidence-standardisation/68406 https://doi.org/10.4018/jdcf.2012040101,http://dx.doi.org/10.4018/jdcf.2012040101,,10.4018/jdcf.2012040101,1975327969,,0,002-383-410-319-043; 033-483-431-452-962; 075-268-039-596-63X; 130-388-474-945-856; 134-927-490-231-285; 135-193-618-945-495; 184-673-927-906-959,3,false,, 069-316-073-411-914,Anti-Forensics of Double Compressed MP3 Audio,2020-07-01,2020,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Tao Biaoli; Rangding Wang; Diqun Yan; Chao Jin,"

The widespread availability of audio editing software has made it easy to create acoustically convincing digital audio forgeries. To address this problem, more and more attention has been paid to the field of digital audio forensics. There has been little work, however, in the field of anti-forensics, which seeks to develop a set of techniques designed to fool current forensic methodologies. The compression history of an audio sample can be used to provide evidence of audio forgeries. In this work, we present a simple method for distinguishing the MP3 compression history of an audio sample. We show the proposed anti-forensics method to remove the artifacts of MP3 double compression by destroying the audio frame structure. In addition, effectiveness of the proposed method is verified by three double compression detection methods. The experimental results show that the proposed method can effectively resist detection from three methods.

",12,3,45,57,Computer science; Multimedia,,,,,https://www.igi-global.com/article/anti-forensics-of-double-compressed-mp3-audio/252867 https://doi.org/10.4018/IJDCF.2020070104 https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf12.html#TaoWYJ20,http://dx.doi.org/10.4018/ijdcf.2020070104,,10.4018/ijdcf.2020070104,3015435865,,0,005-325-225-850-477; 022-418-214-623-366; 025-299-900-166-361; 047-785-731-846-383; 070-808-635-437-582; 083-096-013-375-486; 096-717-288-091-686; 096-850-419-858-983; 102-315-136-251-699; 104-863-352-596-739; 111-803-209-621-558; 131-238-245-074-287; 132-041-004-899-154; 136-614-990-140-254; 138-079-231-262-593; 158-255-630-508-816,1,true,,bronze 069-321-740-091-392,An Exploratory Study on Readiness Framework in IoT Forensics,,2021,journal article,Procedia Computer Science,18770509,Elsevier BV,,Nurul Huda Nik Zulkipli; Gary Wills,"Abstract Forensic readiness is important to ensure that the organization is fully prepared and well-equipped to be forensically ready to conduct the digital forensic investigation. Moreover, forensic readiness in IoT forensic investigation is different from the usual computer forensic readiness. This research discovered the importance of having the forensic readiness in place for the organization before conducting the IoT forensic investigation. Therefore, a readiness framework was proposed as a groundwork before further research is carried out. Literature on related this issues was collected, examined and criticized in order to scrutinize the impact factors in IoT forensics investigations. Finally, the proposed framework was validated by thirty experts from digital forensics in Malaysia using triangulation methods. From the results, this framework will be used in developing an instruments to measure readiness factors among digital forensics stakeholders.",179,,966,973,Forensic science; Data science; Digital forensic investigation; Computer science; Internet of Things; Digital forensics; Exploratory research,,,,"Ministry of Higher Education, Malaysia; Universiti Teknologi MARA",https://www.sciencedirect.com/science/article/pii/S1877050921001186,http://dx.doi.org/10.1016/j.procs.2021.01.086,,10.1016/j.procs.2021.01.086,3130874217,,0,002-383-410-319-043; 002-625-978-577-247; 006-435-365-660-88X; 010-791-676-072-730; 018-552-581-098-658; 021-486-901-460-202; 024-462-843-796-80X; 025-697-732-683-864; 044-927-515-004-191; 045-098-715-794-977; 046-143-775-958-052; 054-448-712-045-982; 058-723-704-218-926; 060-294-953-084-788; 065-654-832-541-493; 075-142-959-030-889; 097-675-162-158-578; 098-748-261-333-651; 104-249-629-797-999; 112-181-239-331-730; 125-334-982-415-97X; 173-791-408-962-068; 199-745-676-923-766,4,true,cc-by-nc-nd,gold 069-494-497-864-636,"Computers, Comics and Cult Status: A Forensics of Digital Graphic Novels.",,2014,journal article,Digital Humanities Quarterly,19384122,,,Jaime Lee Kirtz,,8,,,,Art; Visual arts; Cult; Multimedia; Comics,,,,,http://www.digitalhumanities.org/dhq/vol/8/3/000185/000185.html https://dblp.uni-trier.de/db/journals/dhq/dhq8.html#Kirtz14,http://www.digitalhumanities.org/dhq/vol/8/3/000185/000185.html,,,2401259812,,0,,0,true,cc-by-nd,gold 069-498-762-346-193,"File system anti-forensics - types, techniques and tools",,2020,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,Mohamad Ahtisham Wani; Ali Alzahrani; Wasim Ahmad Bhat,"Forensics paved the way for the growth of anti-forensics, and the time has come for anti-forensics to return the favour. For that purpose, it is imperative that forensic investigators and practitioners are armed with the knowledge of contemporary anti-forensics types, techniques and tools. This article aims to provide technical information and a comprehensive understanding of file system anti-forensics types, techniques and tools so as to facilitate investigators' ability to collect technically credible and legally admissible digital evidence from crime scenes. Forensics paved the way for the growth of anti-forensics, which tries to prevent, hinder or corrupt the forensic process of evidence acquisition and analysis. The time has come for anti-forensics to return the favour. Mohamad Ahtisham Wani, Ali AlZahrani and Wasim Ahmad Bhat provide technical information and a comprehensive understanding of file system anti-forensics types, techniques and tools so as to facilitate investigators' ability to collect technically credible and legally admissible digital evidence from crime scenes.",2020,3,14,19,Crime scene; Data science; Thesaurus (information retrieval); File system; Digital evidence; Technical information; Computer science; Process (engineering),,,,,https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002238962924261 https://www.sciencedirect.com/science/article/pii/S1361372320300300,http://dx.doi.org/10.1016/s1361-3723(20)30030-0,,10.1016/s1361-3723(20)30030-0,3011988910,,0,002-545-683-320-858; 003-526-475-150-199; 022-723-601-549-961; 036-835-610-186-319; 046-318-533-334-038; 048-060-373-393-81X; 065-061-509-329-026; 100-552-121-697-280; 102-253-978-450-757; 134-502-810-516-308; 135-260-956-420-429; 163-853-761-819-084,12,false,, 069-546-445-063-10X,An integrated open forensic environment for digital evidence investigation,2012-11-14,2012,journal article,Wuhan University Journal of Natural Sciences,10071202; 19934998,Springer Science and Business Media LLC,China,Jun Zhang; Lina Wang,"Nowadays, the capability of traditional digital forensic tools fails to meet the demand of ever increasing of criminal or civil cases. One of the challenges is that digital devices and applications are multifarious and changing quickly. Here, we propose a new mode for digital forensic tools utilization via integrating open-source single tools into a platform and setting up into Live DVD/USB. The platform, an Integrated Open Forensic Environment (named IOFE), takes full advantage of these tools and, at the same time, elevates its power and interoperability via standardized input/output data. The IOFE features conducting live and dead investigation and covers three consecutive major phases of digital forensics: acquisition, analysis, and presentation. Our experiments prove that IOFE can carry out manifold acquisition, interpretation, analysis, and presentation task of evidentiary data in an efficient and effective manner.",17,6,511,515,World Wide Web; Interoperability; Presentation; Task (project management); Digital evidence; Computer science; Mode (computer interface); Multimedia; USB; Digital forensics,,,,,https://link.springer.com/article/10.1007/s11859-012-0879-3 https://link.springer.com/content/pdf/10.1007%2Fs11859-012-0879-3.pdf,http://dx.doi.org/10.1007/s11859-012-0879-3,,10.1007/s11859-012-0879-3,2405017237,,0,019-456-366-483-584; 040-483-292-320-671; 050-513-243-638-138; 051-165-387-606-715; 072-072-328-028-440; 074-012-101-472-334; 123-477-592-483-85X; 142-855-067-627-071; 162-864-397-044-696,2,false,, 069-553-351-193-961,Anti-Forensic Trace Detection in Digital Forensic Triage Investigations,,2017,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Kyoung Jea Park; Jung Min Park; Eun-jin Kim; Chang Geun Cheon; Joshua I. James,,12,1,8,,Forensic science; Trace (semiology); Triage; Computer security; Computer science; Digital forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1421&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#ParkPKCJ17 https://commons.erau.edu/jdfsl/vol12/iss1/8/ https://paperity.org/p/84036003/anti-forensic-trace-detection-in-digital-forensic-triage-investigations,http://dx.doi.org/10.15394/jdfsl.2017.1421,,10.15394/jdfsl.2017.1421,2625580212,,0,015-995-636-621-324; 135-717-892-795-412,9,true,cc-by-nc,gold 069-884-249-384-899,Digital evidence and the crime scene.,2021-10-06,2021,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Graeme Horsman,"Abstract Many criminal investigations maintain an element of digital evidence, where it is the role of the first responder in many cases to both identify its presence at any crime scene, and assess its worth. Whilst in some instances the existence and role of a digital device at-scene may be obvious, in others, the first responder will be required to evaluate whether any ‘digital opportunities’ exist which could support their inquiry, and if so, where these are. This work discusses the potential presence of digital evidence at crime scenes, approaches to identifying it and the contexts in which it may exist, focusing on the investigative opportunities that devices may offer. The concept of digital devices acting as ‘digital witnesses’ is proposed, followed by an examination of potential ‘digital crime scene’ scenarios and strategies for processing them.",61,6,761,770,Criminal investigation; Crime scene; Work (electrical); Element (criminal law); Data science; First responder; Digital evidence; Digital device; Computer science; Digital forensics,Crime Scene; Digital Evidence; Digital Forensics; First Responder; Investigation,Crime; Humans,,,https://www.sciencedirect.com/science/article/pii/S1355030621001295,http://dx.doi.org/10.1016/j.scijus.2021.10.003,34802650,10.1016/j.scijus.2021.10.003,3205130440,,0,000-385-377-624-228; 007-447-468-912-052; 015-527-658-048-875; 019-831-293-743-518; 022-837-571-402-576; 025-141-025-402-513; 029-164-830-214-360; 044-295-409-596-282; 061-620-309-813-166; 062-137-637-964-947; 066-032-563-680-259; 087-665-408-966-240; 094-142-794-127-63X; 101-898-536-025-026; 143-546-413-886-429; 159-477-048-665-066; 173-145-269-859-717; 184-221-983-536-940; 199-745-676-923-766,0,false,, 070-308-945-671-285,Common source identification of images in large databases.,2014-09-08,2014,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Floris Gisolf; Pelle Barens; Ewald Snel; Anwar Malgoezar; Mark Vos; Arjan Mieremet; Zeno Geradts,,244,,222,230,Image (mathematics); Volume (computing); Data mining; Digital camera; Computer cluster; Computer science; Computation; Database; Identification (information); Digital forensics; Noise (video),Digital camera identification; Digital forensics; Large scale common source identification; Photo-response non-uniformity,,,,https://core.ac.uk/display/132739751 https://www.sciencedirect.com/science/article/pii/S0379073814003612 https://www.ncbi.nlm.nih.gov/pubmed/25279802 https://europepmc.org/abstract/MED/25279802 https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F6c4763b4-21b8-4d87-878d-5d8ab85c132d http://www.sciencedirect.com/science/article/pii/S0379073814003612,http://dx.doi.org/10.1016/j.forsciint.2014.08.034,25279802,10.1016/j.forsciint.2014.08.034,2077889468,,0,018-276-309-945-450; 026-290-088-195-051; 036-277-431-302-085; 045-226-923-439-105; 048-955-603-721-071; 060-043-515-260-052; 069-847-568-544-420; 070-260-337-691-258; 073-556-368-991-677; 077-828-134-917-257; 083-097-133-928-799; 089-547-267-411-182; 106-295-038-562-776; 125-998-770-927-182; 184-897-235-429-285,16,false,, 070-345-535-736-050,Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital,2020-11-07,2020,journal article,Digital Zone: Jurnal Teknologi Informasi dan Komunikasi,24773255; 20864884,Universitas Lancang Kuning,,Desti Mualfah; Rizdqi Akbar Ramadhan,"Kejahatan konvensial yang terekam kamera CCTV (Closed Circuit Televison) semakin banyak ditemukan di masyarakat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Kamera CCTV memiliki peran penting dalam keamanan, banyak diantaranya hasil tangkapan rekaman kamera CCTV dijadikan sebagai alat bukti digital. Tantangannya adalah bagaimana teknik yang diperlukan untuk penanganan khusus investigasi digital forensik dalam mencari bukti ditgital rekaman kamera CCTV menggunakan metode live forensik, yaitu ketika barang bukti dalam keadan aktif berdasarkan pedoman SNI 27037:2014 sesuai acuan kerangka kerja Common Phases of Computer Forensics Investigation Models untuk di implementasikan ke dalam dokumen Chain of Custody. Hasil penelitian ini berupa hasil analisis video rekaman kamera CCTV tentang karakteristik bukti digital dan informasi metadata yang digunakan untuk memberikan penjelasan komprehensif secara terstruktur serta acuan pengelolaan informasi data yang didapat dari hasil investigasi digital forensik yang dapat dipertanggungjawabkan dalam persidangan. ;   ; Kata kunci: Bukti Digital, Live Forensik, Metadata, Kamera CCTV, Chain of Custody. ;   ; Abstract ; Conventional crimes that are recorded on CCTV (Closed Circuit Television) cameras are increasingly being found in society, every crime that commits certain crimes will be in accordance with statutory regulations. CCTV cameras have an important role in security, many of which are recorded by CCTV cameras used as digital evidence. The challenge is how the techniques required for special handling, digital forensics in searching for digital evidence of CCTV camera footage using the live forensic method, namely when the evidence is in an active state based on the latest SNI 27037: 2014 according to the framework reference Common Phases of Computer Forensics Investigation Models for in implement it into the Chain of Custody document. These results of this research are in the form of analysis of CCTV camera video recordings about the characteristics of digital evidence and metadata information used to provide a structured comprehensive explanation and reference data management information obtained from the results of digital forensic investigations that can be accounted for in court.  ; Keywords: Digital Evidence, Live Forensic, Metadata, CCTV Camera, Chain of Custady.",11,2,257,267,,,,,,https://journal.unilak.ac.id/index.php/dz/article/download/5174/2493,http://dx.doi.org/10.31849/digitalzone.v11i2.5174,,10.31849/digitalzone.v11i2.5174,3104630931,,0,,0,true,cc-by-sa,gold 070-378-356-319-383,Rules of professional responsibility in digital forensics: A comparative analysis,,2015,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Filipo Sharevski,"The Committee on Identifying the Needs of Forensic Sciences Community (2009) accentuates the establishment of a uniform code of ethics emphasizing the importance of enforceability in strengthening the role that the forensic science plays within the criminal justice system. Equally pertinent to the domain of digital forensics, this imperative entails a research commitment in comparing and contrasting the respective codes of ethics to illustrate their variety, specificity and enforceability to inform the discussion on the associated regulative aspects. Accordingly, this paper reviews the professional regulation inaugurated in both the US and international digital forensics arena giving a detailed perspective on the consolidation of the practice.",10,2,39,54,Criminal justice; Ethical code; Variety (cybernetics); Political science; Professional responsibility; Consolidation (business); Computer security; Information security; Engineering ethics; Computer forensics; Digital forensics,,,,,https://repository.globethics.net/handle/20.500.12424/871090 https://commons.erau.edu/cgi/viewcontent.cgi?article=1201&context=jdfsl https://commons.erau.edu/jdfsl/vol10/iss2/3/,http://dx.doi.org/10.15394/jdfsl.2015.1201,,10.15394/jdfsl.2015.1201,1647780413,,0,004-280-322-555-290; 024-066-028-851-257; 050-721-573-791-625; 054-336-486-986-971; 062-032-128-092-406; 068-345-833-704-493; 076-551-618-438-88X; 078-327-902-374-330; 101-436-770-235-826; 113-522-568-412-928; 114-090-829-194-843; 116-701-124-968-194; 131-516-331-360-906; 132-016-143-282-432; 136-518-828-547-101; 146-749-886-466-706; 151-902-391-890-088; 170-295-594-314-571,5,true,cc-by-nc,gold 070-387-550-064-219,A Digital Video Tampering Forensics Scheme Based on Forensics Hash: A Digital Video Tampering Forensics Scheme Based on Forensics Hash,2014-02-23,2014,journal article,Journal of Electronics & Information Technology,10095896,China Science Publishing & Media Ltd.,China,Hui Wei; Gao-bo Yang; Ming Xia,,35,12,2934,2941,Scheme (programming language); Digital video; Computer security; Computer science; Network forensics; Hash function,,,,,http://pub.chinasciencejournal.com/article/getArticleRedirect.action?doiCode=10.3724/SP.J.1146.2013.00296,http://dx.doi.org/10.3724/sp.j.1146.2013.00296,,10.3724/sp.j.1146.2013.00296,2322926756,,0,,0,false,, 070-954-300-168-750,A Prototype of Portable Digital Forensics Imaging Tools using Raspberry Device,2021-02-01,2021,journal article,IOP Conference Series: Materials Science and Engineering,17578981; 1757899x,IOP Publishing,,Fietyata Yudha; Erika Ramadhani; R M Komaryan,"One of the digital forensics activities has the goal to prove a cybercrime. There are several stages in digital forensics when doing an investigation. Each stage has its suitable hardware and software that is used while investigating a case. Standalone forensics hardware is a suitable media in the process of investigation. It can do an acquisition and imaging process at the same time as the investigation process. Nowadays, standalone forensics hardware for imaging devices has a very high price. This paper gives a solution to develop low budget portable imaging forensics devices using a raspberry device. The device enables us to do an acquisition to a hard disk or flash drive. The output has a raw format file type i.e.dd. This device includes a logging file consisting of detailed information related to the digital evidence also hashing to provide file integrity. The result of this paper describes how to construct a prototype low budget portable device for digital forensics acquisition using a raspberry device and how to operate it in GUI. The prototype was successfully created and tested in several scenarios. The performance test of this device has a result of that transfer rate of 1,85 MB/s.",1077,1,012064,,Software; Flash drive; Construct (python library); Digital evidence; Computer science; Digital forensics; Computer hardware; File format; Process (computing); Hash function,,,,,https://iopscience.iop.org/article/10.1088/1757-899X/1077/1/012064/pdf https://iopscience.iop.org/article/10.1088/1757-899X/1077/1/012064/meta https://ui.adsabs.harvard.edu/abs/2021MS&E.1077a2064Y/abstract,http://dx.doi.org/10.1088/1757-899x/1077/1/012064,,10.1088/1757-899x/1077/1/012064,3136799502,,0,003-232-363-219-004; 065-861-995-125-023; 076-508-293-079-677,1,true,cc-by,gold 070-967-295-350-189,Leveraging the Windows Amcache.hve File in Forensic Investigations,,2016,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Bhupendra Singh; Upasna Singh,,11,4,7,,Operating system; World Wide Web; Malware analysis; Computer science; Windows Vista; Security and safety features new to Windows Vista,,,,,https://paperity.org/p/84051288/leveraging-the-windows-amcache-hve-file-in-forensic-investigations https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#SinghS16 https://commons.erau.edu/cgi/viewcontent.cgi?article=1429&context=jdfsl https://commons.erau.edu/jdfsl/vol11/iss4/7/ https://doi.org/10.15394/jdfsl.2016.1429,http://dx.doi.org/10.15394/jdfsl.2016.1429,,10.15394/jdfsl.2016.1429,2615381031,,0,002-710-519-237-792; 051-271-812-303-811; 064-062-472-395-879; 142-226-580-142-17X,2,true,cc-by-nc,gold 071-061-776-249-765,D4I - Digital forensics framework for reviewing and investigating cyber attacks,,2020,journal article,"Array (New York, N.Y.)",25900056,,United States,Athanasios Dimitriadis; Nenad Ivezic; Boonserm Kulvatunyou; Ioannis Mavridis,"Abstract Many companies have cited lack of cyber-security as the main barrier to Industrie 4.0 or digitalization. Security functions include protection, detection, response and investigation. Cyber-attack investigation is important as it can support the mitigation of damages and maturing future prevention approaches. Nowadays, the investigation of cyber-attacks has evolved more than ever leveraging combinations of intelligent tools and digital forensics processes. Intelligent tools (e.g., YARA rules and Indicators of Compromise) are effective only when there is prior knowledge about software and mechanisms used in the cyber-attack, i.e., they are not attack-agnostic. Therefore, the effectiveness of these intelligent tools is inversely proportional to the number of the never-seen-before software and mechanisms utilized. Digital forensic processes, while not suffering from such issue, lack the ability to provide in-depth support to a cyber-attack investigation mainly due to insufficient detailed instructions in the examination and analysis phases. This paper proposes a digital forensics framework for reviewing and investigating cyber-attacks, called D4I, which focuses on enhancing the examination and analysis phases. First, the framework proposes a digital artifacts categorization and mapping to the Cyber-Kill-Chain steps of attacks. Second, it provides detailed instructing steps for the examination and analysis phases. The applicability of D4I is demonstrated with an application example that concerns a typical case of a spear phishing attack.",5,,100015,,Digital artifact; Damages; Software; Spear phishing; Computer security; Computer science; Compromise; Digital forensics; Categorization,Artifacts categorization and mapping; Digital forensics framework; Digital reviewing and investigation; Examination and analysis,,,Intramural NIST DOC (9999-NIST) United States,https://www.sciencedirect.com/science/article/pii/S2590005619300153 https://doi.org/10.1016/j.array.2019.100015 http://www.sciencedirect.com/science/article/pii/S2590005619300153,http://dx.doi.org/10.1016/j.array.2019.100015,35531088,10.1016/j.array.2019.100015,2996791554,PMC9074801,0,000-084-741-857-185; 007-060-730-694-999; 019-698-064-288-240; 020-547-580-632-658; 020-944-423-224-895; 021-850-998-857-676; 026-774-296-742-022; 029-748-683-221-796; 040-711-141-878-573; 047-630-600-014-492; 048-256-115-288-552; 051-071-473-135-406; 062-853-038-393-609; 067-950-012-629-210; 089-638-379-171-949; 091-511-454-565-387; 093-544-098-524-573; 098-333-864-515-548; 099-676-137-335-314; 105-107-197-390-10X; 111-090-978-711-139; 128-391-703-009-515; 132-355-634-397-986; 133-397-275-695-990; 187-019-976-763-782; 195-969-710-102-716,10,true,"CC BY, CC BY-NC-ND",gold 071-182-359-615-008,Technical reporting in digital forensics.,2022-08-15,2022,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Graeme Horsman,"One of the primary roles of a practitioner in the field of digital forensics (DF) is to conduct the examination of any lawfully seized digital device content and report upon any findings that may support an inquiry being conducted. While there are many intricacies to this task, in some cases, an inquiry will commence with a practitioner carrying out the necessary examination work required to report any findings at a ""technical level."" Such technical reports are often used for intelligence gathering purposes in an attempt to establish the potential evidential value of a device or data set and are often a precursor to, and catalyst for, further and often more extensive forensic work being commissioned. Therefore, the ability to report at a technical level should be considered a fundamental skill required of all practitioners in this discipline and any attempts to provide guidance and support for conducting this task effectively should be encouraged. This work explores the role of technical reporting, where a series of reporting examples are presented that explore the intricacies involved with conveying digital forensic findings at a technical level. Procedural and linguistic challenges are investigated and evaluated in order to acknowledge the pitfalls that practitioners may encounter and to identify potential technical reporting best practices.",,,,,Digital forensics; Task (project management); Work (physics); Set (abstract data type); Computer science; Value (mathematics); Computer forensics; Field (mathematics); Best practice; Engineering ethics; Psychology; Data science; Computer security; Engineering; Political science; Law; Mechanical engineering; Mathematics; Systems engineering; Machine learning; Pure mathematics; Programming language,digital evidence; digital forensics; report writing; technical reporting,,,,,http://dx.doi.org/10.1111/1556-4029.15108,35968719,10.1111/1556-4029.15108,,,0,000-490-412-762-138; 010-061-391-662-193; 029-638-263-419-336; 036-597-490-099-438; 041-365-301-128-075; 050-296-813-523-597; 092-765-349-680-750; 099-377-733-522-116; 117-555-147-368-574; 131-696-619-498-120; 168-245-076-589-180,0,true,,hybrid 071-328-509-813-202,A novel ternary and signum kernelled linear hexadecimal pattern and hybrid feature selection based environmental sound classification method,,2020,journal article,Measurement,02632241; 15366359,Elsevier BV,Netherlands,Sengul Dogan; Erhan Akbal; Turker Tuncer,,166,,108151,,k-nearest neighbors algorithm; Support vector machine; Feature selection; Artificial intelligence; Hexadecimal; Pattern recognition; Feature (machine learning); Computer science; Discrete wavelet transform; Feature extraction; Linear discriminant analysis,,,,,https://www.sciencedirect.com/science/article/pii/S0263224120306898 https://ui.adsabs.harvard.edu/abs/2020Meas..16608151D/abstract,http://dx.doi.org/10.1016/j.measurement.2020.108151,,10.1016/j.measurement.2020.108151,3039334369,,0,000-747-924-226-591; 004-892-391-454-378; 005-911-454-032-082; 012-288-749-309-706; 015-450-490-331-294; 016-412-693-230-572; 017-878-265-650-766; 018-044-715-644-781; 018-565-254-420-673; 020-233-013-143-936; 022-368-409-764-115; 023-186-296-335-953; 023-902-250-733-344; 025-563-144-816-540; 025-879-735-079-635; 028-221-850-747-211; 028-550-577-288-356; 029-867-539-332-231; 030-230-719-506-590; 032-110-439-778-889; 037-037-924-922-673; 045-059-570-493-919; 049-860-251-887-83X; 051-070-496-240-589; 057-115-503-939-73X; 057-626-631-859-843; 071-802-725-053-362; 075-133-597-849-71X; 075-866-437-482-494; 077-829-983-025-91X; 079-310-940-223-758; 080-560-302-799-776; 091-009-438-157-013; 092-720-749-568-080; 094-301-064-425-024; 097-506-744-580-51X; 100-040-403-205-935; 104-818-175-368-723; 106-581-211-947-678; 107-053-871-263-543; 115-582-515-756-396; 142-616-392-319-20X; 160-510-635-746-28X; 161-170-912-719-932; 195-091-532-336-938,12,false,, 071-363-969-812-87X,Forensic Significance of Cardiac Implantable Device (Pacemaker),2019-05-20,2019,journal article,"International Journal of Scientific Research in Science, Engineering and Technology",23944099; 23951990,Technoscience Academy,,Anju Bhatt; Vaishali Ajugiya; Deepika Bhandari; Neeta Khobragade,"Pacemakers are automated electric medical devices that are imbibed in the pleural cavity near to heart so as to stimulate the heart with electrical inducement to maintain or restore a normal heartbeat. Pacemakers can be implanted temporarily to treat bradycardia after a heart attack, surgery or overdose of medication. They can also be implanted permanently to correct a slow heartbeat or, in some cases, to help treat heart failure. With increase in pacemaker indications and especially implantable cardioverter-defibrillators, the number of patients with implantable devices has been growing steadily. With the enhancement in the technology the design of pacemakers are being modified till date. Pacemakers being an electronic device also stores data of patient's heartrate, pulse rate and number of time it has paced in a day. Since, technology is killing our opportunity to falsify the information; the data stored in the pacemaker can either support or reject the alibi stated by the victim or assailant. The aim of this research paper is to study the concept and type of digital data stored in implantable cardiac device i.e. pacemaker. This study focuses on awareness about the application of pacemaker in solving forensic cases. Digital data provided by the pacemaker in any ongoing investigation will have a huge evidentiary potential, as it can be made admissible in the court of law under Section 65-B of the Indian Evidence Act, 1872. In this paper, we are recommending that pacemakers can be used as digital evidences since, they track the audit trails of the patient.",6,3,340,345,Digital evidence; Medical emergency; Medicine,,,,,http://ijsrset.com/paper/5932.pdf,http://dx.doi.org/10.32628/ijsrset196369,,10.32628/ijsrset196369,2954883516,,0,020-962-517-216-318; 027-205-313-452-016; 033-286-409-075-846; 033-474-564-010-944; 055-093-089-681-931; 063-661-026-375-024; 067-796-348-175-184; 071-372-918-403-464; 082-533-206-961-250; 099-835-315-381-563; 151-048-250-873-903,0,true,,gold 071-606-104-599-241,KONSEP ATTRIBUTE BASED ACCESS CONTROL (ABAC) PADA LEMARI PENYIMPANAN BUKTI DIGITAL (LPBD),2018-05-04,2018,journal article,JURNAL TEKNIK INFORMATIKA,25497901; 19799160,LP2M Universitas Islam Negeri (UIN) Syarif Hidayatullah Jakarta,,Moh Fadly Panende; Riadi; Yudi Prayudi,"Abstract An important factor of the investigation into cybercrime cases is the case relating to the evidence found. Electronic evidence and digital evidence found in criminal cases should be maintained from the outset, to be held accountable for justice. Sistem digital evidence storage cabinets (LPBD) is one solution to overcome the management of digital evidence is based on digital evidence cabinet (DEC), only the system is not equipped with a good access control model. The LPBD system needs to be built not only on the issue of digital evidence management, but other important components in the digital proof storage cabinet itself, access arrangements, so that the scheme or the design of access control policies on LPBD is very important. The access controls used on previous LPBDs are only done by authentication mechanisms and User authorization mechanisms, no other more complex parameters to support requests made on LPBD systems. In the absence of a good access control model design scheme for LPBD, it is necessary to design an access control policy model using the attribute-based access control approach (ABAC) because ABAC is a more flexible access control model in the application of attributes to users , and the . XACML hierarchy can support control requirements access used in digital evidence storage cabinets (LPBD) . ABSTRAK Faktor penting dalam proses investigasi sebuah kasus cybercrime yaitu hal yang terkait dengan barang bukti yang ditemukan. Bukti elektronik maupun bukti digital yang ditemukan dalam sebuah kasus kejahatan harus tetap terjaga keasliannya, untuk dapat dipertanggung jawabkan dipengadilan. Sistem lemari penyimpanan bukti digital (LPBD) menjadi salah satu solusi untuk permasalahan manajemen bukti digital ini yang berdasar pada digital evidence cabinet (DEC), hanya saja sistem tersebut belum dilengkapi dengan model access control yang baik. Sistem LPBD seharusnya dibuat tidak hanya berdasar pada permasalahan-permasalahan tentang manajemen bukti digital saja, akan tetapi komponen-komponen penting lainnya dalam lemari penyimpanan bukti digital itu sendiri yaitu pengaturan aksesnya, sehingga skema atau desain access control policy terhadap LPBD menjadi sangat penting . Access control yang gunakan terhadap LPBD sebelumnya dibuat hanya dengan mekanisme authefikasi dan authorisasi user saja, tidak adanya parameter lain yang lebih kompleks untuk mendukung  sebuah request yang dilakukan pada sistem LPBD. Mengingat belum adanya skema rancangan model access control yang baik pada LPBD ini, maka perlu dilakukan perancangan model access control policy menggunakan pendekatan attribute based access control (ABAC) karena ABAC merupakan model access control yang lebih fleksibel dalam penerapan attribute terhadap user, dan hierarchy XACML yang dapat mendukung kebutuhan-kebutuhan access control yang digunakan pada lemari penyimpanan bukti digital (LPBD). How To Cite : Panende, M.F, Prayudi, Y. Riadi, I. (2018). KONSEP ATTRIBUTE BASED ACCESS CONTROL (ABAC) PADA LEMARI PENYIMPANAN BUKTI DIGITAL (LPBD) . Jurnal Teknik Informatika, 11(1), 85-94.  doi 10.15408/jti.v11i1.7220 Permalink/DOI: http://dx.doi.org/10.15408/jti.v11i1.7220",11,1,85,94,Operating system; XACML; Computer science,,,,,http://journal.uinjkt.ac.id/index.php/ti/article/download/7220/pdf http://journal.uinjkt.ac.id/index.php/ti/article/view/7220 https://core.ac.uk/download/pdf/290103868.pdf,http://dx.doi.org/10.15408/jti.v11i1.7220,,10.15408/jti.v11i1.7220,2800370617,,0,,0,true,cc-by-sa,gold 071-788-675-518-847,Adaptive Histogram Equalization Based Image Forensics Using Statistics of DC DCT Coefficients,2018-04-02,2018,journal article,Advances in Electrical and Electronic Engineering,18043119; 13361376,VSB - Technical University of Ostrava,Czech Republic,Neetu Singh; Abhinav Gupta; R C Jain,"The vulnerability of digital images is growing towards manipulation. This motivated an area of research to deal with digital image forgeries. The certifying origin and content of digital images is an open problem in the multimedia world. One of the ways to find the truth of images is finding the presence of any type of contrast enhancement. In this work, novel and simple machine learning tool is proposed to detect the presence of histogram equalization using statistical parameters of DC Discrete Cosine Transform (DCT) coefficients. The statistical parameters of the Gaussian Mixture Model (GMM) fitted to DC DCT coefficients are used as features for classifying original and histogram equalized images. An SVM classifier has been developed to classify original and histogram equalized image which can detect histogram equalized image with accuracy greater than 95% when false rate is less than 5%.",16,1,125,134,Image (mathematics); Histogram equalization; Artificial intelligence; Statistical parameter; Pattern recognition; Discrete cosine transform; Adaptive histogram equalization; Computer science; Digital image; Histogram; Mixture model,,,,,http://advances.utc.sk/index.php/AEEE/article/view/2647 http://advances.vsb.cz/index.php/AEEE/article/view/2647 https://core.ac.uk/display/153610502 https://core.ac.uk/download/161961697.pdf,http://dx.doi.org/10.15598/aeee.v16i1.2647,,10.15598/aeee.v16i1.2647,2795385028,,0,,1,true,cc-by,gold 071-880-034-878-967,"IoT Forensic Frameworks (DFIF, IoTDOTS, FSAIoT): A Comprehensive Study",2022-03-28,2022,journal article,International Journal of Advances in Soft Computing and its Applications,27101274; 20748523,Alzaytoonah University of Jordan,Jordan,Mohammad Hassan; Ghassan Samara; Mohammad Fadda,"Abstract In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, the other concerning aspect is the achievement of privacy and security in this connection, especially given the rapid increase in the number of existing and new IoT devices. Concerns, threats, and assaults related to IoT security have been regarded as a potential and problematic area of research. This necessitates the quick development or creation of suitable technologies with the nature of crimes in the IoT environment. On the other hand, criminal investigation specialists encounter difficulties and hurdles due to various locations, data types, instruments used, and device recognition. This paper provides an in-depth explanation of the criminal content of the Internet of Things. It compares its stages to the detailed stages of traditional digital forensics in terms of similarities and differences, the frameworks used in dealing with electronic crimes, and the techniques used in both types. This paper presents previous discussions of researchers in the field of digital forensics. For the IoT, which brings us to the most important parts of this paper, which is a comprehensive study of the IoT criminal frameworks that are used to protect communication in the field of IoT, such as Digital Forensic Investigation Framework (DFIF), Digital Forensic Framework for Smart Environments (IoTDOTS), Forensic State Acquisition from the Internet of Things (FSAIoT), and discusses the challenges in their general frameworks and provides solutions and strategies. Keywords: digital forensic, FSAIoT, IoT, IoT Challenges, IoT Forensic, IoT Framework, IOTDOTS.",14,1,73,83,Computer science; Field (mathematics); Computer security; Digital forensics; Internet of Things; Aside; The Internet; Digital evidence; Network forensics; Internet privacy; Data science; World Wide Web; Art; Mathematics; Literature; Pure mathematics,,,,,,http://dx.doi.org/10.15849/ijasca.220328.06,,10.15849/ijasca.220328.06,,,0,,1,true,,bronze 071-917-972-399-010,Assess of Forensic Tools on Android Based Facebook Lite with the NIST Method,2021-05-10,2021,journal article,Scientific Journal of Informatics,24600040; 24077658,Universitas Negeri Semarang,,Rauhulloh Noor Bintang; Rusydi Umar; Anton Yudhana,"Purpose: The increase in social media use of Facebook lite by using Android-based smartphones is quite high. Activities when communicating through the social media network Facebook Lite. Facebook lite can send a text message, image, or video. Not a few Facebook users lite social media abusing this app to commit fraud crimes, pornographic acts, or defamation actions from social media users Facebook lite. In such cases, it can be a digital forensic benchmark to get results from digital evidence from the Facebook lite application.  Methods: In this investigation, National Institute of Standards and Technology (NIST) research methods with various stages, namely Collection, Examination, Analysis, and Reporting.  Result: Comparison and results of data conducted with forensic tools Magnet Axiom Forensic and MOBILedit Forensic Express Pro in the form of parameter data specified. Axiom Forensic Magnet data is 57.14%, while MOBILedit Forensic Express Pro data is 85.71%.  Novelty: This data is the data of the performance results of both forensic tool applications in obtaining digital evidence on Facebook lite application.",8,1,1,9,NIST; World Wide Web; Forensic science; Commit; Benchmark (surveying); Digital evidence; Computer science; Social media; Android (operating system); Digital forensics,,,,,https://journal.unnes.ac.id/nju/index.php/sji/article/view/26744 https://journal.unnes.ac.id/nju/index.php/sji/article/download/26744/pdf,http://dx.doi.org/10.15294/sji.v8i1.26744,,10.15294/sji.v8i1.26744,3163962276,,0,,0,true,cc-by,gold 071-968-102-950-243,Digital forensic tool verification: An evaluation of options for establishing trustworthiness,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Angus M. Marshall,,38,,301181,,Risk analysis (engineering); Trustworthiness; Work (electrical); Range (mathematics); Scrutiny; Computer science; Digital forensics,,,,,https://doi.org/10.1016/j.fsidi.2021.301181 https://www.sciencedirect.com/science/article/abs/pii/S2666281721000895,http://dx.doi.org/10.1016/j.fsidi.2021.301181,,10.1016/j.fsidi.2021.301181,3172358839,,0,054-004-313-233-495; 057-151-739-358-411,2,false,, 071-971-352-667-536,An OCL-Based Formal Model for Cloud Forensics,,2014,journal article,Advanced Materials Research,16628985,"Trans Tech Publications, Ltd.",,Jian Wang; Zhen Min Tang; Xian Li Jin,"Cloud Computing is gaining acceptance and increasing in popularity. However, digital forensics within Cloud becomes difficult. This paper proposes an extensible semantic model using OCL (Object Constraint Language) for cloud digital forensics data. We give a brief introduction to Trusted Digital Forensics, and then detail the modeling process using OCL and FODA (Feature Oriented Domain Analysis). Therefore, a feature tree can be built with semantic logical relation in order to get the overall semantic description of features in the forensic domain of digital data.",989-994,,1513,1516,Tree (data structure); Object Constraint Language; Forensic science; Domain (software engineering); Feature-oriented domain analysis; Information retrieval; Relation (database); Computer science; Database; Cloud computing; Digital forensics; Semantic data model,,,,,https://zh.scientific.net/AMR.989-994.1513.pdf https://www.scientific.net/AMR.989-994.1513,http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.1513,,10.4028/www.scientific.net/amr.989-994.1513,2008009364,,0,003-196-924-988-132; 027-829-293-463-29X; 036-427-994-375-326; 044-153-843-280-519; 059-697-278-686-056,0,false,, 072-152-153-447-327,Digital tool marks (DTMs): a forensic analysis of file wiping software,2019-07-29,2019,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Graeme Horsman,"Whilst difficult to ascertain the full extent to which so called anti-forensic software applications are in use by the public, their threat to an investigation of digital content is tangible, where...",53,1,96,111,Software; Digital content; Tool marks; Computer science; Multimedia; Digital forensics,,,,,https://www.tandfonline.com/doi/full/10.1080/00450618.2019.1640793 https://research.tees.ac.uk/en/publications/digital-tool-marks-dtms-a-forensic-analysis-of-file-wiping-softwa https://research.tees.ac.uk/ws/files/8363337/DTMs.pdf,http://dx.doi.org/10.1080/00450618.2019.1640793,,10.1080/00450618.2019.1640793,2966655090,,0,008-507-664-901-527; 016-983-559-523-04X; 046-158-992-585-59X; 048-250-488-210-056; 060-382-239-802-033; 078-598-867-814-365; 081-988-024-229-83X,4,true,cc-by-nc-nd,green 072-424-254-968-179,Mobile Forensics And Its Challenges,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Arjun Chetry; Moutan Sarkar,,,,,,Computer security; Computer science; Mobile device forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.07,http://dx.doi.org/10.46293/4n6/2020.02.03.07,,10.46293/4n6/2020.02.03.07,3096384088,,0,,0,false,, 072-934-978-048-044,An Ontology Based on the Timeline of Log2timeline and Psort Using Abstraction Approach in Digital Forensics,2020-04-17,2020,journal article,Symmetry,20738994,MDPI AG,Switzerland,Sandeepak Bhandari; Vacius Jusas,"Digital forensics practitioners encounter numerous new terminologies during time-intensive digital investigation processes because of the explosive growth of the web, an immense amount of data, and rapid changes in technology. In such a scenario, the time needed to find and interpret the cause of the potential digital incident can be affected by the complexity involved in understanding the meaning of newly encountered terminologies. Although various approaches have been designed to assist digital practitioners in understanding the newly encountered terminologies during the investigation of the accident, none of them is capable of supporting investigators to interpret new terminologies. Our work focuses on reconstructing and analyzing the timeline of events and artifacts backed by the abstraction concept to help practitioners in reasoning about the perceived meaning of different digital forensics terminologies that are encountered during the investigation. This paper introduces an ontological approach based on the abstraction concept to reconstruct the timeline provided by command-based digital forensic tools, i.e., Log2timeline and Psort in the L2TCSV format, and assist in resolving the meaning of new encountered concepts. The performed experiments show that the novel methodology is capable of enhancing the timeline and assisting practitioners in determining the significance of encountered terminologies or concepts.",12,4,642,,Data science; Ontology; Computer science; Timeline; Abstraction (linguistics); Meaning (linguistics); Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/symmetry/symmetry12.html#BhandariJ20a http://ui.adsabs.harvard.edu/abs/2020Symm...12..642B/abstract https://www.mdpi.com/2073-8994/12/4/642,http://dx.doi.org/10.3390/sym12040642,,10.3390/sym12040642,3017203559,,0,005-116-312-278-527; 026-787-086-442-120; 030-136-936-524-671; 047-937-309-229-62X; 054-601-093-496-749; 073-194-524-558-213; 074-814-000-483-733; 081-140-064-081-587; 107-338-245-292-063; 114-454-611-706-935; 181-072-396-769-365,1,true,cc-by,gold 073-052-923-626-654,Unfurl: An Entropy-Based Link Vulnerability Analysis,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yugal Pathak,,,,,,Statistical physics; Vulnerability assessment; Mathematics; Entropy (information theory),,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.09,http://dx.doi.org/10.46293/4n6/2020.02.03.09,,10.46293/4n6/2020.02.03.09,3096858737,,0,,0,false,, 073-175-569-296-743,Drone/UAV and Its Forensics Aspects,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Shivani Rai,,,,,,Engineering; Computer security; Drone,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.02,http://dx.doi.org/10.46293/4n6/2021.03.01.02,,10.46293/4n6/2021.03.01.02,3127452647,,0,,0,false,, 073-771-451-612-879,"Digital Forensics Workflow as A Mapping Model for People, Evidence, and Process in Digital Investigation",,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Subekti Ningsih; Riadi Yudi Prayudi,,7,3,294,304,Workflow; Computer science; Process (engineering); Multimedia; Wireless; Digital forensics,,,,,http://sdiwc.net/digital-library/digital-forensics-workflow-as-a-mapping-model-for-people-evidence-and-process-in-digital-investigation,http://dx.doi.org/10.17781/p002463,,10.17781/p002463,2903984546,,0,008-346-706-954-826; 019-698-064-288-240; 025-257-762-793-993; 026-774-296-742-022; 028-874-299-732-939; 038-287-375-579-320; 046-169-392-846-761; 051-039-889-631-382; 051-161-858-118-526; 138-232-752-906-225; 147-631-422-817-38X; 177-426-892-442-266,0,false,, 073-790-480-897-758,Digital Evidence Certainty Descriptors (DECDs),,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Graeme Horsman,,32,,200896,,Set (psychology); Data science; Digital data; Expression (architecture); Digital evidence; Field (computer science); Computer science; Interpretation (philosophy); Certainty; Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S1742287619303123,http://dx.doi.org/10.1016/j.fsidi.2019.200896,,10.1016/j.fsidi.2019.200896,2990925386,,0,000-281-908-950-22X; 003-359-256-146-450; 006-933-430-647-14X; 008-364-588-981-258; 014-580-488-694-132; 016-033-143-009-953; 017-792-811-186-108; 018-182-926-340-45X; 019-960-035-950-902; 020-867-396-119-347; 021-798-083-032-603; 032-451-540-235-796; 042-788-172-660-874; 044-552-087-341-555; 044-895-263-937-02X; 061-269-967-405-492; 062-923-490-829-764; 067-257-260-685-072; 070-378-356-319-383; 071-940-409-825-573; 101-436-770-235-826; 102-243-142-344-71X; 103-760-328-285-801; 111-488-239-742-003; 149-617-274-050-94X; 182-948-315-861-769,5,false,, 073-997-683-020-831,ANALYSIS AND EVALUATION DIGITAL FORENSIC INVESTIGATION FRAMEWORK USING ISO 27037:2012,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Didik Sudyana; Bambang Sugiantoro Yudi Prayudi,,8,1,1,14,Digital forensic investigation; Computer science; Multimedia; Wireless,,,,,http://sdiwc.net/digital-library/analysis-and-evaluation-digital-forensic-investigation-framework-using-iso-270372012,http://dx.doi.org/10.17781/p002464,,10.17781/p002464,2971675769,,0,,4,false,, 074-136-192-673-661,The Conceivability And Admissibility Of Forensic Evidence from IoT Devices in Digital Forensics,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Tanmayee Tilekar,"This article focuses on the prospects of IoT devices held by the users for their personal usages or in Workspace Mobility or Smart Home Solutions. IoT devices are now burgeoning its capability with the incorporation of Artificial Intelligence, Edge AI, RPA(Robotic Process Automation), AutoML, ARVR and NLP( Natural Language Processing). There are many superfluous IoT Devices and Industry 4.0 based Solutions in the market with great features in use such as Google Home Mini, Google Home Voice Controller, Amazon Echo plus Voice Controller, Kuri Mobile Robot, August Smart Lock than the others. These devices record, store or sometimes transmit the user inputs plus activities and it is unclear to what extent they record and store at each instance. There are countable instances of news and Forensic Use Cases from different parts of the globe which enlighten statements where The Court of Law has demanded the data recorded by the IoT devices as Digital Evidences to complete IOT Crimes Investigations.",,,53,54,Computer security; Computer science; Internet of Things; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.10,http://dx.doi.org/10.46293/4n6/2020.02.02.10,,10.46293/4n6/2020.02.02.10,3021355926,,0,,0,false,, 074-191-841-979-727,AI and IoT: Empowering Things with Intelligence,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Suchitra Das,,,,,,World Wide Web; Computer science; Internet of Things,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.10,http://dx.doi.org/10.46293/4n6/2021.03.01.10,,10.46293/4n6/2021.03.01.10,3162101511,,0,,0,false,, 074-271-546-742-17X,The prevalence of encoded digital trace evidence in the nonfile space of computer media(,2014-07-23,2014,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Simson L. Garfinkel,"Forensically significant digital trace evidence that is frequently present in sectors of digital media not associated with allocated or deleted files. Modern digital forensic tools generally do not decompress such data unless a specific file with a recognized file type is first identified, potentially resulting in missed evidence. Email addresses are encoded differently for different file formats. As a result, trace evidence can be categorized as Plain in File (PF), Encoded in File (EF), Plain Not in File (PNF), or Encoded Not in File (ENF). The tool bulk_extractor finds all of these formats, but other forensic tools do not. A study of 961 storage devices purchased on the secondary market and shows that 474 contained encoded email addresses that were not in files (ENF). Different encoding formats are the result of different application programs that processed different kinds of digital trace evidence. Specific encoding formats explored include BASE64, GZIP, PDF, HIBER, and ZIP.",59,5,1386,1393,Encoding (memory); Data file; Digital media; Trace evidence; Computer science; Base64; Image file formats; Database; Digital forensics; File format,BASE64; GZIP; Microsoft Xpress; PDF; ZIP; bulk_extractor; digital forensics; encoded nonfile; forensic science; optimistic decompression; real data corpus,,,U.S. Department of Defense,https://europepmc.org/article/PMC/PMC4263158 https://core.ac.uk/display/36736445 http://simson.net/clips/academic/2014.JOFS.EncodedData.pdf https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4263158 https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.12528 https://onlinelibrary.wiley.com/doi/pdf/10.1111/1556-4029.12528,http://dx.doi.org/10.1111/1556-4029.12528,25053280,10.1111/1556-4029.12528,1969896394,PMC4263158,0,004-652-388-189-304; 009-832-452-035-773; 010-985-077-415-59X; 025-832-466-975-926; 071-079-281-371-668; 082-363-954-997-25X; 085-214-277-668-01X; 100-925-003-172-052,2,true,cc-by-nc,hybrid 074-388-397-687-048,Magnet Axiom And APFS,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Hoyt Harness,,,,,,Topology; Magnet; Axiom; Mathematics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.14,http://dx.doi.org/10.46293/4n6/2020.02.03.14,,10.46293/4n6/2020.02.03.14,3097401520,,0,,0,false,, 074-665-155-258-112,A Technology-Strategy Integrated Digital Forensic Process Framework Considering Government ICT R&D Strategy and ICT Paradigm Shift,2014-07-31,2014,journal article,Journal of the Korea Institute of Information and Communication Engineering,22344772,The Korean Institute of Information and Communication Sciences,,Jun Woo Shin,"Currently information related service such as internet banking, chatting, social network services are quite well smeared into our daily life. Moreover, a rapid growth of service using smart devices brought an importance of security in internet services and a research activation of digital forensic in a crime investigation. This paper presented a previous digital forensic research trend and based on this, suggested a technology-strategy integrated digital forensic process platform, taking a mid-long term government leading ICT R&D strategy and ICT paradigm shift into account.",18,7,1495,1504,The Internet; Government; Digital forensic process; Service (systems architecture); Computer science; Paradigm shift; Technology strategy; Knowledge management; Information and Communications Technology; Digital forensics,,,,,http://society.kisti.re.kr/sv/SV_svpsbs03V.do?method=download&cn1=JAKO201423261321915 http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=HOJBC0_2014_v18n7_1495 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001897094 http://www.kpubs.org/article/articleMain.kpubs?articleANo=HOJBC0_2014_v18n7_1495,http://dx.doi.org/10.6109/jkiice.2014.18.7.1495,,10.6109/jkiice.2014.18.7.1495,2031294102,,0,095-691-114-276-825,0,true,,bronze 074-706-219-689-754,Effective resource management in digital forensics: An exploratory analysis of triage practices in four English constabularies,2019-12-04,2019,journal article,Policing: An International Journal,1363951x,Emerald,United Kingdom,Dana Wilson-Kovacs,"Building on the findings of a British Academy-funded project on the development of digital forensics (DF) in England and Wales, the purpose of this paper is to explore how triage, a process that helps prioritise digital devices for in-depth forensic analysis, is experienced by DF examiners and police officers in four English police forces. It is argued that while as a strategy triage can address the increasing demand in the examination of digital exhibits, careful consideration needs to be paid to the ways in which its set-up, undertaking and outcomes impact on the ability of law enforcement agencies to solve cases.,The methodological approach adopted here builds on the ethnographic turn in criminology. The analysis draws on 120 h of ethnographic observations and 43 semi-structured interviews. Observational data of the working DF environment at each location and a systematic evaluation of internal documents, organisational settings and police priorities helped refine emergent analysis threads, which were analytically compared between sites and against the testimonies of members of different occupational groups to identify similarities and differences between accounts.,The findings emphasise the challenges in the triage of digital exhibits as they are encountered in everyday practice. The discussion focusses on the tensions between the delivery of timely and accurate investigation results and current gaps in the infrastructural arrangements. It also emphasises the need to provide police officers with a baseline understanding of the role of DF and the importance of clearly defined strategies in the examination of digital devices.,This paper aims to bridge policy and practice through an analysis of the ways in which DF practitioners and police officers in four English constabularies reflect on the uses of triage in DF to address backlogs and investigative demands. Highlighting the importance of digital awareness beyond the technical remit of DF units, it offers new insights into the ways in which police forces seek to improve the evidential trail with limited resources.",43,1,77,90,Baseline (configuration management); Sociology; Bridge (nautical); Observational study; Triage; Law enforcement; Public relations; Process (engineering); Digital forensics; Resource management,,,,,https://ore.exeter.ac.uk/repository/handle/10871/40462?show=full https://www.emerald.com/insight/content/doi/10.1108/PIJPSM-07-2019-0126/full/html https://ore.exeter.ac.uk/repository/bitstream/10871/40462/1/wilson-kovacs%202019%20triage.pdf https://www.emerald.com/insight/content/doi/10.1108/PIJPSM-07-2019-0126/full/pdf?title=effective-resource-management-in-digital-forensics-an-exploratory-analysis-of-triage-practices-in-four-english-constabularies https://core.ac.uk/download/286383577.pdf,http://dx.doi.org/10.1108/pijpsm-07-2019-0126,,10.1108/pijpsm-07-2019-0126,2995681188,,0,003-982-227-180-136; 004-200-813-216-207; 004-658-259-494-553; 005-636-730-595-540; 009-285-002-570-736; 010-963-610-208-920; 010-985-077-415-59X; 013-568-618-083-770; 016-731-888-079-073; 021-495-249-615-203; 029-638-263-419-336; 031-522-316-310-252; 035-672-281-328-899; 036-197-454-252-092; 037-550-015-414-716; 047-630-600-014-492; 057-904-228-091-384; 058-052-081-943-595; 062-137-637-964-947; 065-197-615-960-447; 073-847-291-567-156; 081-447-017-308-327; 090-752-043-508-733; 094-295-279-676-447; 098-616-316-968-255; 102-117-623-922-990; 125-939-677-745-616; 139-186-775-971-355; 189-064-913-996-787,18,true,,green 074-708-645-166-402,The General Digital Forensics Technologies Based on Linux,,2014,journal article,Applied Mechanics and Materials,16627482,"Trans Tech Publications, Ltd.",,Wei Liu; Wen Liang Duan; Zhihong Tian; Dong Lan,Digital forensics technologies based on Linux have been popular issue now. It is very necessary to get a general and effective digital forensics method on Linux for its wide usage. It gives a set of general methods in this paper. It combines the static forensics and dynamic forensics according to the different form of data and verifies the validity of these methods with the help from kinds of open source forensics tools.,644-650,,1992,1997,Rootkit; World Wide Web; Forensic science; Set (abstract data type); Computer science; Network forensics; Digital forensics,,,,,https://www.scientific.net/AMM.644-650.1992,http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1992,,10.4028/www.scientific.net/amm.644-650.1992,2086800292,,0,003-871-070-011-964; 018-638-733-386-577; 066-836-839-980-230; 095-283-847-078-137; 132-606-863-800-090,0,false,, 074-852-255-750-108,Multiform Korean handwriting authentication by forensic document examiners,2015-07-10,2015,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Tae-Yi Kang; Joong Lee,,255,,133,136,Forensic science; Authentication (law); Psychology; Test (assessment); Handwriting; Speech recognition,Forensic science; Handwriting identification; Peer review; Validation,,,National Forensic Service; National Forensic Service,https://www.ncbi.nlm.nih.gov/pubmed/26205671 https://www.sciencedirect.com/science/article/pii/S0379073815002704 https://europepmc.org/article/MED/26205671 https://pubag.nal.usda.gov/catalog/5526185,http://dx.doi.org/10.1016/j.forsciint.2015.07.002,26205671,10.1016/j.forsciint.2015.07.002,2096852840,,0,005-345-603-327-180; 010-573-520-331-761; 056-711-259-538-874; 078-373-114-642-178; 095-017-486-539-644,2,false,, 075-119-005-863-649,Investigating Proactive Digital Forensics Leveraging Adversary Emulation,2022-09-09,2022,journal article,Applied Sciences,20763417,MDPI AG,,Valentine Machaka; Titus Balan,"Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Proactive digital forensic investigations (PDFI) solve the challenges of cloud computing forensics such as evidence identification, collection, preservation, and timelining from heterogeneous cumulative data. Cumulative data heterogeneity poses significant challenges to the sound collection of electronically stored information (ESI) or digital evidence across cloud endpoints and/or networked systems. In addition, the distribution of networked systems and/or cloud environments makes it impossible for forensics investigators to be present at several premises to perform the investigation. Hence, it is important to have PDFI in place to ensure continuous operation in the event of a cyberattack, because it does not require the presence of an investigator at the target location. In this study, researchers put the idea of proactive digital forensics to the test and concluded that it is an indispensable tool for networked systems and cloud computing environments in response to modern-day digital forensics challenges. This research was based on an experimental computer science and engineering approach using a virtualised environment simulating an information communication infrastructure. To generate evidence (digital artefacts), and validate the proof-of-concept, adversary emulation was used by adapting the MITRE ATT&CK framework. Research results have shown that PDFI improves digital forensics activities in terms of speed and accuracy, thereby providing credible and timely comprehensive digital evidence. Enhanced Incident detection capabilities enable an analyst to focus much more on forensic investigation functions and thus perform their tasks effectively. However, the legality of live and/or remote forensics is still of great concern in several jurisdictions, thereby affecting the credibility of digital artefacts obtained in this manner. Nevertheless, where possible, the law component should also be kept up to date with modern-day technologies to solve any inconveniences caused by the ever-growing technology demands.",12,18,9077,9077,Digital forensics; Computer science; Network forensics; Emulation; Cloud computing; Adversary; Digital evidence; Computer security; Identification (biology); Event (particle physics); Computer forensics; Data science; Botany; Physics; Quantum mechanics; Economics; Biology; Economic growth; Operating system,,,,,,http://dx.doi.org/10.3390/app12189077,,10.3390/app12189077,,,0,005-515-442-506-880; 021-289-112-719-629; 025-815-030-235-519; 026-774-296-742-022; 046-143-775-958-052; 050-182-526-714-74X; 053-343-993-293-183; 091-531-552-633-070; 096-743-348-982-819; 113-474-844-200-128; 183-000-233-873-221; 184-069-302-229-82X,0,true,cc-by,gold 075-171-904-217-913,Advancing the Science of Digital Forensics,,2012,journal article,Computer,00189162,Institute of Electrical and Electronics Engineers (IEEE),United States,Gary C. Kessler,"Digital forensics, the branch of forensic science that focuses on the recovery and investigation of digital data, has applications in many contexts outside the courtroom, including research, policy enforcement, and intelligence gathering.",45,12,25,27,The Internet; Forensic science; Information system; Computer security; Computer science; Network forensics; Computer forensics; Digital forensics,,,,,https://www.computer.org/csdl/magazine/co/2012/12/mco2012120025/13rRUxly9hk https://ieeexplore.ieee.org/document/6383155/ https://www.computer.org/csdl/api/v1/periodical/mags/co/2012/12/mco2012120025/13rRUxly9hk/download-article/pdf https://dl.acm.org/doi/abs/10.1109/MC.2012.399 http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000006383155 https://works.bepress.com/gary_kessler/19/ https://dblp.uni-trier.de/db/journals/computer/computer45.html#Kessler12a https://www.infona.pl/resource/bwmeta1.element.ieee-art-000006383155 http://dblp.uni-trier.de/db/journals/computer/computer45.html#Kessler12a,http://dx.doi.org/10.1109/mc.2012.399,,10.1109/mc.2012.399,1969251028,,0,,5,false,, 075-292-269-073-172,Designing robustness and resilience in digital investigation laboratories,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Philipp Amann; Joshua I. James,"This work addresses the definition and identification of key elements of robustness and resilience in the context of sustainable digital investigation capacity. After a review of prior work, we describe the results of a structured questionnaire that was sent to 72 law enforcement agencies and subject-matter experts in both online and oral formats (app. response rate 29%). Based on an in-depth analysis of the feedback received, key elements for robustness and resilience of digital investigation capacity are identified and discussed at the strategic and operational levels, including Digital Forensics Strategy, Forensic Discipline, Standardisation, Continuous Education and Training, Research and Development, Co-operation, and Human Resources.",12,,S111,S120,Human resources; Engineering management; Law enforcement; Laboratory management; Continuous education; Computer science; Management science; Digital forensics; Robustness (computer science),,,,,https://www.sciencedirect.com/science/article/pii/S174228761500016X https://core.ac.uk/display/82404286 https://dblp.uni-trier.de/db/journals/di/di12.html#AmannJ15 https://doi.org/10.1016/j.diin.2015.01.015 https://www.sciencedirect.com/science/article/abs/pii/S174228761500016X,http://dx.doi.org/10.1016/j.diin.2015.01.015,,10.1016/j.diin.2015.01.015,2123221169,,0,007-247-053-082-900; 016-370-576-455-307; 021-560-653-089-020; 021-850-998-857-676; 023-117-693-306-532; 034-117-396-807-727; 035-735-888-090-501; 040-156-142-705-287; 047-392-910-363-822; 065-732-653-055-992; 075-529-701-912-32X; 094-462-783-999-056; 100-458-632-264-11X; 105-815-075-062-738; 119-215-264-177-058; 125-951-372-642-300; 132-355-634-397-986; 154-785-137-669-213; 197-014-457-380-771,15,true,cc-by-nc-nd,hybrid 075-517-412-509-659,Bolstering forensic science through extended knowledge sharing,,2019,journal article,Forensic Science International: Reports,26659107,Elsevier BV,,Georgina Sauzier; Mubarak A. Bidmos; Graeme Horsman,,1,,100010,,Forensic science; Knowledge sharing; Computer science; Knowledge management,,,,,https://research.tees.ac.uk/en/publications/bolstering-forensic-science-through-extended-knowledge-sharing https://research.tees.ac.uk/ws/files/8720491/Bolstering_Forensic_Science_Through_Extended_Knowledge_Sharing.pdf https://core.ac.uk/download/pdf/228323040.pdf,http://dx.doi.org/10.1016/j.fsir.2019.100010,,10.1016/j.fsir.2019.100010,2977328989,,0,,0,true,"CC BY, CC BY-NC-ND",gold 075-529-701-912-32X,A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview,,2013,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Joshua I. James; Pavel Gladyshev,,10,2,148,157,Work (electrical); Data science; Suspect; Law enforcement; Decision process; Digital forensic investigation; Computer science; Operations research; Process (engineering); Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/di/di10.html#JamesG13 http://www.sciencedirect.com/science/article/pii/S1742287613000340 https://www.sciencedirect.com/science/article/pii/S1742287613000340 https://doi.org/10.1016/j.diin.2013.04.005 http://dblp.uni-trier.de/db/journals/di/di10.html#JamesG13,http://dx.doi.org/10.1016/j.diin.2013.04.005,,10.1016/j.diin.2013.04.005,2000577549,,0,019-698-064-288-240; 094-295-279-676-447,25,false,, 075-751-664-637-230,Speculative Animation: Digital Projections of Urban Past and Future:,2017-11-29,2017,journal article,Animation,17468477; 17468485,SAGE Publications,United Kingdom,Joel McKim,"This article explores the growing presence of digital animation within the work of contemporary visual artists, architects and designers concerned with urban geography. While contemporary theorists...",12,3,287,305,Engineering; Visual arts; Work (electrical); Forensic Architecture; Multimedia; Animation; Digital art; Urban geography; Computer animation,,,,,https://core.ac.uk/display/84144569 https://journals.sagepub.com/doi/full/10.1177/1746847717729581 https://core.ac.uk/download/84144569.pdf,http://dx.doi.org/10.1177/1746847717729581,,10.1177/1746847717729581,2730938732,,0,026-434-120-020-199; 027-494-851-169-836; 027-827-932-600-58X; 035-938-923-436-986; 055-129-264-634-190; 056-375-279-147-66X; 059-850-533-612-782; 065-985-411-162-926; 081-430-350-851-71X; 086-798-533-519-960; 099-833-867-457-31X; 110-084-374-606-816; 114-770-748-694-191; 122-288-247-107-379; 160-409-882-075-069; 169-886-537-809-120,3,true,cc-by-nc,hybrid 075-857-959-319-796,Forensic analysis and data recovery from water-submerged hard drives,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,null FrancoisAlicia; null NisbetAlastair,"In many digital forensic investigations, a common location to recover files as evidence of wrongdoing is a computer hard drive. Hard drives have increased greatly in storage capacity since their in...",13,2,219,,Forensic science; Wrongdoing; Computer security; Computer science; Data recovery; Digital forensics,,,,,https://dl.acm.org/doi/10.1504/ijesdf.2021.113374,http://dx.doi.org/10.1504/ijesdf.2021.113374,,10.1504/ijesdf.2021.113374,3196211796,,0,,0,false,, 075-872-921-268-845,Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings,2020-07-01,2020,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Jin Du; Ding Liping; Guangxuan Chen,"

As a new object in judicial practice, electronic evidence is of great practical significance. To locate the probative force of electronic evidence, which can be used to prove the facts of the crime, judging the electronic evidence validity, and how to establish scientific rules of electronic evidence, which not only effectively contains crime, but also protects civil rights from illegal infringement of state power becomes very important. This article outlines the definition of electronic evidence and rules and establishes a suitable electronic evidence system of China's criminal procedure system based on the analysis of problems in each link of judicial proof in judicial practice and the four aspects of judicial proof.

",12,3,111,121,Computer science; Engineering ethics,,,,,https://doi.org/10.4018/IJDCF.2020070108 https://www.igi-global.com/article/research-on-the-rules-of-electronic-evidence-in-chinese-criminal-proceedings/252871 https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf12.html#DuDC20,http://dx.doi.org/10.4018/ijdcf.2020070108,,10.4018/ijdcf.2020070108,3015917920,,0,,1,true,,bronze 075-950-021-558-098,"""I couldn't find it your honour, it mustn't be there!"" - Tool errors, tool limitations and user error in digital forensics.",2018-04-17,2018,journal article,Science & justice : journal of the Forensic Science Society,13550306,Forensic Science Society,United Kingdom,Graeme Horsman,"The field of digital forensics maintains significant reliance on the software it uses to acquire and investigate forms of digital evidence. Without these tools, analysis of digital devices would often not be possible. Despite such levels of reliance, techniques for validating digital forensic software are sparse and research is limited in both volume and depth. As practitioners pursue the goal of producing robust evidence, they face the onerous task of both ensuring the accuracy of their tools and, their effective use. Whilst tool errors provide one issue, establishing a tool's limitations also provides an investigatory challenge leading the potential for practitioner user-error and ultimately a grey area of accountability. This article debates the problems surrounding digital forensic tool usage, evidential reliability and validation.",58,6,433,440,Data science; Accountability; Software; Task (project management); Digital evidence; User Error; Field (computer science); Computer science; Reliability (statistics); Digital forensics,Crime; Digital forensics; Errors; Software; Tool testing; Validation,,,,https://www.ncbi.nlm.nih.gov/pubmed/30446072 https://research.tees.ac.uk/ws/files/4187177/621947.pdf https://www.sciencedirect.com/science/article/abs/pii/S1355030617301508 https://core.ac.uk/display/157860311 https://research.tees.ac.uk/en/publications/i-couldnt-find-it-your-honour-it-mustnt-be-there-tool-errors-tool https://pubmed.ncbi.nlm.nih.gov/30446072/ https://core.ac.uk/download/pdf/196165647.pdf,http://dx.doi.org/10.1016/j.scijus.2018.04.001,30446072,10.1016/j.scijus.2018.04.001,2800946632,,0,000-226-390-590-140; 003-982-227-180-136; 008-598-808-594-324; 018-237-240-343-299; 021-039-461-635-181; 030-333-349-393-032; 030-981-431-605-722; 032-451-540-235-796; 059-068-317-738-428; 072-697-564-999-716; 074-299-373-252-299; 075-128-417-091-483; 081-896-209-272-043; 102-223-296-418-971; 122-474-821-859-110; 124-776-641-347-974; 131-807-250-432-699; 142-388-561-082-054; 143-427-291-811-40X; 144-724-915-219-138; 148-698-839-036-557; 182-670-398-460-931; 187-762-907-549-695,17,true,cc-by-nc,green 076-508-293-079-677,KES - SEAKER: A mobile digital forensics triage device,,2019,journal article,Procedia Computer Science,18770509,Elsevier BV,,Eric Gentry; Michael Soltys,"Abstract As our world of digital devices continues to expand, the amount of digital evidence encountered by law enforcement during case investigation is ever increasing. Faced with a preponderance of high capacity digital media devices, forensic investigators must be able to review them quickly, and establish which devices merit further attention. Utilizing a small single-board computer called Raspberry Pi, this mobile digital forensics triage device provides fast, targeted feedback for immediate evidence assessment. A digital forensic device is presented in this paper. It is named SEAKER (Storage Evaluator and Knowledge Extraction Reader)[1] and it enables forensic investigators to perform triage on many digital devices very quickly. Developed for on-scene, time-sensitive investigations, its utility extends to preventing over-collection and large backlogs at digital forensics labs worldwide.",159,,1652,1661,Knowledge extraction; Forensic science; Digital media; Triage; Law enforcement; Digital evidence; Computer science; Multimedia; Digital forensics,,,,,https://doi.org/10.1016/j.procs.2019.09.335 https://dblp.uni-trier.de/db/conf/kes/kes2019.html#GentryS19 https://www.sciencedirect.com/science/article/abs/pii/S1877050919315364 https://www.sciencedirect.com/science/article/pii/S1877050919315364,http://dx.doi.org/10.1016/j.procs.2019.09.335,,10.1016/j.procs.2019.09.335,2980390299,,0,066-235-037-082-291; 090-752-043-508-733; 184-069-302-229-82X,4,true,cc-by-nc-nd,gold 076-526-517-597-73X,Web-based expert system to determine digital forensics tool using rule-based reasoning approach,2021-06-01,2021,journal article,Journal of Physics: Conference Series,17426588; 17426596,IOP Publishing,United Kingdom,Erika Ramadhani; H R Pratama; Elyza Gustri Wahyuni,"Digital forensics is a method to trace the digital evidence using knowledge of science. There are several stages in the method of digital forensics. Each stage has their own way to use the method collaborate with the tool of digital forensics. Nowadays, there are tools that we can use in digital forensics. Therefore, not all the tool coming with the help document on how to use the tool. This situation makes the investigator have to check the feature of the tool one by one in order to suit which one is the best tool to use in some stage. To overcome this problem, we made a system to determine the right tool in digital forensics using rule-based reasoning approach. The result of this paper is web-based system to determine the right tool in digital forensics. The system shows that only 40% in suitability to help the investigator to determine the right tool. This cause by lacking of the rule consists in the reasoning approach.",1918,4,042003,,Software engineering; Rule-based system; Digital evidence; Help document; Web based expert system; Computer science; Feature (computer vision); TRACE (psycholinguistics); Digital forensics,,,,,https://iopscience.iop.org/article/10.1088/1742-6596/1918/4/042003 https://iopscience.iop.org/article/10.1088/1742-6596/1918/4/042003/pdf https://ui.adsabs.harvard.edu/abs/2021JPhCS1918d2003R/abstract,http://dx.doi.org/10.1088/1742-6596/1918/4/042003,,10.1088/1742-6596/1918/4/042003,3168746969,,0,006-547-691-138-217; 007-790-059-029-953; 069-862-548-231-596; 084-296-717-156-065; 104-787-005-142-28X,1,true,,gold 076-689-787-688-443,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,38,,301293,301293,Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00211-0,,10.1016/s2666-2817(21)00211-0,,,0,,0,true,,bronze 076-736-545-734-215,A Framework for Digital Forensics and Investigations: The Goal-Driven Approach,2013-04-01,2013,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Shareeful Islam; Benjamin Aziz; Clive Blackwell,"Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the requirements of digital investigations. In addition, anti-forensics situations make the forensic investigation process challenging by contaminating any stage of the investigation process, its requirements, or by destroying the evidence. Therefore, successful forensic investigations require understanding the possible anti-forensic issues during the investigation. In this paper, the authors present a new method for guiding digital forensics investigations considering the anti-forensics based on goal-driven requirements engineering methodologies, in particular KAOS. Methodologies like KAOS facilitate modeling and reasoning about goals, requirements and obstacles, as well as their operationalization and responsibility assignments. The authors believe that this new method will lead in the future to better management and organization of the various steps of forensics investigations in cyberspace as well as provide more robust grounds for reasoning about forensic evidence.",5,2,1,22,Evidence-based practice; Data science; KAOS; Task (project management); Cyberspace; Computer security; Computer science; Process (engineering); Requirements engineering; Digital forensics; Operationalization,,,,,https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf5.html#AzizBI13 https://researchportal.port.ac.uk/portal/en/publications/a-framework-for-digital-forensics-and-investigations-the-goaldriven-approach(922b64de-7919-4f1a-8313-3455bd3edb36)/export.html https://dl.acm.org/doi/10.4018/jdcf.2013040101 https://www.igi-global.com/article/a-framework-for-digital-forensics-and-investigations/83486,http://dx.doi.org/10.4018/jdcf.2013040101,,10.4018/jdcf.2013040101,1965414993,,0,000-546-270-897-052; 014-062-831-760-337; 019-831-293-743-518; 020-944-423-224-895; 025-166-987-232-333; 029-666-156-007-406; 030-359-893-882-572; 033-570-813-399-728; 035-448-415-847-226; 038-668-970-194-854; 062-032-128-092-406; 063-026-323-866-388; 071-269-562-942-065; 076-736-545-734-215; 078-598-867-814-365; 078-817-460-650-140; 081-032-497-600-401; 118-722-872-870-470; 122-880-373-616-302; 128-788-768-099-342; 137-854-345-065-123; 144-786-887-819-307; 160-421-312-635-281; 184-948-841-629-735; 190-065-821-748-92X; 199-901-259-164-000,4,false,, 076-753-080-882-502,Smartphone Forensics Analysis: A Case Study,,2013,journal article,International Journal of Computer and Electrical Engineering,17938163,IACSIT Press,,Mubarak Al-Hadadi; Ali AlShidhani,"Abstract—Smartphone forensics is a sub-set of digital forensics, and refers to the investigation and acquisition of artefacts in mobile phones. New threats to mobile phones made forensic science a challenging endeavour in the last couple of years. Number of mobile users is increasing worldwide and createstremendous problems and challenges. The literature relevant to Smartphone forensics, as explored in this paper, focuses on the architecture of Smartphone operating systems and anti-forensics techniques. It also addresses the digital evidence of Smartphone applications. In this paper, through a consideration of types of crimes involving Smartphone’s, a real case study from the Sultanate of Oman is presented. This case study undertakes practical experiments to identified sources for evidence that can later be used in the judiciary system.",,,576,580,Architecture; Digital evidence; Smartphone application; Computer security; Computer science; Computer forensics; Digital forensics,,,,,http://www.ijcee.org/index.php?m=content&c=index&a=show&catid=55&id=860 http://ijcee.org/papers/776-S0005.pdf,http://dx.doi.org/10.7763/ijcee.2013.v5.776,,10.7763/ijcee.2013.v5.776,2323481372,,0,003-504-554-245-316; 026-201-331-634-716; 062-788-502-964-113; 199-172-967-270-034,18,true,,bronze 076-771-386-025-262,Behavioural Evidence Analysis: A Paradigm Shift in Digital Forensics,,2021,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Barkha Shree; Parneeta Dhaliwal,"Recent developments in digital forensics (DF) have emphasized that along with inspection of digital evidence, the study of behavioural clues based on behavioural evidence analysis (BEA) is vital for accurate and complete criminal investigation. This paper reviews the existing BEA approaches and process models and concludes the lack of standardisation in the BEA process. The research comprehends that existing BEA methodologies are restricted to specific characteristics of the forensic domain in question. To address these limitations, the paper proposes a standardised approach detailing the step-by-step implementation of BEA in the DF process. The proposed model presents a homogenous technique that can be practically applied to real-life cases. This standard BEA framework classifies digital evidence into categories to decipher associated offender characteristics. Unlike existing models, this new approach collects evidence from diverse sources and leaves no aspect unattended while probing criminal behavioural cues, thus facilitating its applicability across varied forensic domains.",13,5,20,42,Data science; Evidence analysis; Computer science; Paradigm shift; Digital forensics,,,,,https://www.igi-global.com/article/behavioural-evidence-analysis/283125,http://dx.doi.org/10.4018/ijdcf.20210901.oa2,,10.4018/ijdcf.20210901.oa2,3181479678,,0,000-712-448-585-138; 001-710-107-055-603; 001-888-175-704-116; 003-692-278-633-267; 004-866-932-432-464; 004-872-169-627-620; 006-352-188-170-383; 006-382-928-763-481; 007-314-571-885-858; 007-489-161-042-780; 009-559-103-724-357; 010-963-610-208-920; 011-235-649-827-930; 013-568-618-083-770; 014-592-593-375-086; 020-944-423-224-895; 021-602-056-743-808; 025-770-745-916-602; 026-774-296-742-022; 029-509-980-283-055; 030-648-224-908-422; 030-725-210-334-09X; 037-194-651-631-81X; 046-806-348-582-163; 049-407-078-832-062; 050-751-725-872-625; 051-738-543-964-887; 053-204-120-030-157; 054-669-308-553-175; 059-259-578-782-71X; 059-851-945-677-333; 066-982-929-881-426; 067-410-380-403-816; 080-843-774-169-836; 082-055-672-791-486; 084-482-560-050-594; 085-858-788-409-152; 090-256-483-119-640; 098-276-664-978-304; 098-443-818-109-247; 099-528-795-169-106; 101-147-258-831-898; 104-258-481-168-508; 104-543-353-812-920; 117-151-034-673-328; 118-838-969-146-870; 118-968-004-680-589; 123-298-398-659-061; 130-131-335-093-872; 145-062-913-009-934,1,true,,gold 076-989-753-469-554,The Presumption of Innocence as a Source for Universal Rules on Digital Evidence — The guiding principle for digital forensics in producing digital evidence for criminal investigations,2021-06-01,2021,journal article,Computer Law Review International,21944164,Verlag Dr. Otto Schmidt,,Radina Stoykova,,22,3,74,82,,,,,,,http://dx.doi.org/10.9785/cri-2021-220303,,10.9785/cri-2021-220303,,,0,,0,false,, 077-218-051-852-509,Cell Forensics on Smart Phone Installed Windows Phone 7 System,,2014,journal article,Chinese Journal of Forensic Sciences,16712072,,,Yao We,"As a new emerging system on smart-phones, Windows Phone maintains a stable development. This paper studies on how to collect forensic evidence on smart-phones installed Windows Phone 7 system. After describing the system architecture and security model of Windows Phone 7, the methodology of Windows Phone 7 forensics was introduced in details. With the help of the native method and Windows Phone SDK, the Windows Phone kernel and other information could be approached.Other tools to acquire and analyze the file from the smart-phone were also used. The experiments showed that the present forensics approach could effectively extract and discover useful evidence such as SMSs, Emails and social network activities.",,,,,Operating system; Engineering; Windows Rally; Embedded system; Microsoft Cordless Phone System; GSM services; Microsoft Windows; Windows CE; Windows Vista; Security and safety features new to Windows Vista; Wallpaper,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201404012.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201404012.htm,,,2373847314,,0,,0,false,, 077-240-805-787-039,The Rise of Bots And Their Security And Privacy Challenges and Best Practices,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Sailaja Vadlamudi,,,,,,Internet privacy; Business; Best practice,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.13,http://dx.doi.org/10.46293/4n6/2020.02.04.13,,10.46293/4n6/2020.02.04.13,3095357954,,0,,0,false,, 077-271-947-547-85X,Exploring the Intersection between Databases and Digital Forensics,2022-09-21,2022,journal article,Journal of Information and Data Management,21787107,Sociedade Brasileira de Computacao - SB,,Danilo B. Seufitelli; Michele A. Brandão; Mirella M. Moro,"Digital forensics has attracted attention from assorted researchers, who primarily work on predicting and solving digital hacks and crimes. In turn, the number and types of digital crimes have increased considerably, mainly due to the growing use of digital media to perform daily personal and professional tasks. Like most computer-related activities, data is at the center of such hacks and crimes. Hence, this work presents a systematic literature review of publications at the intersection between Digital Forensics and Databases. We discuss problems and trends of two main categories: Data Building and Database Management Systems. Overall, this research opens the doors for the communication between databases and an area with several exciting and concrete challenges, with great potential for social, economic, and technical-scientific contributions.",13,3,,,,,,,,,http://dx.doi.org/10.5753/jidm.2022.2524,,10.5753/jidm.2022.2524,,,0,,0,false,, 077-416-113-129-031,Sharia Law and Digital Forensics in Saudi Arabia,,2018,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Fahad Alanazi; Andrew Jones; Catherine Menon,"© 2018 ADFSLThese days, digital crime is one of the main challenges for law enforcement and the judicial system. Many of the laws which are used to protect the users of current technologies were derived from legislation and laws that are utilized in the control of crimes that are based in the physical realm. This applies not only in Western countries, but in countries that adopt Sharia law. There is a need to establish specific legislation and accepted best practice to deal with digital crimes that is compatible with Sharia law, which affects more than one billion Muslims. This paper presents a view of the approach to digital crime in Saudi Arabia under Sharia Law, demonstrating how this is founded on principles from the Qur'an and the Sunnah, which are the sayings and deeds of the Prophet Muhammad. We describe how Sharia law differs from Western law, and how evidence for digital forensics procedures can be obtained for use under Sharia law.Peer reviewe",13,3,5,20,Sharia; Political science; Law; Digital forensics,,,,,http://uhra.herts.ac.uk/bitstream/2299/21197/1/Sharia_Law_and_Digital_Forensics_in_Saudi_Arabia.pdf https://uhra.herts.ac.uk/handle/2299/21197 https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl13.html#0002AM18 https://commons.erau.edu/jdfsl/vol13/iss3/5/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1568&context=jdfsl https://doi.org/10.15394/jdfsl.2018.1568 https://core.ac.uk/download/287581583.pdf,http://dx.doi.org/10.15394/jdfsl.2018.1568,,10.15394/jdfsl.2018.1568,2914225100,,0,,1,true,cc-by-nc,gold 077-590-082-657-678,MULTI-STAKEHOLDER CASE PRIORITIZATION IN DIGITAL INVESTIGATIONS,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Joshua I. James,"This work examines the problem of case prioritization in digital investigations for better utilization of limited criminal investigation resources. Current methods of case prioritization, as well as observed prioritization methods used in digital forensic investigation laboratories are examined. After, a multi-stakeholder approach to case prioritization is given that may help reduce reputational risk to digital forensic laboratories while improving resource allocation. A survey is given that shows diering opinions of investigation priority between Law Enforcement and the public that is used in the development of a prioritization model. Finally, an example case is given to demonstrate the practicality of the proposed method.",9,2,59,72,Risk analysis (engineering); Criminal investigation; Work (electrical); Workflow; Prioritization; Reputational risk; Law enforcement; Resource allocation; Computer science; Management science; Digital forensics,,,,,https://core.ac.uk/display/91657098 https://commons.erau.edu/jdfsl/vol9/iss2/6/ https://paperity.org/p/84095326/multi-stakeholder-case-prioritization-in-digital-investigations https://doi.org/10.15394/jdfsl.2014.1171 https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#James14 https://commons.erau.edu/cgi/viewcontent.cgi?article=1171&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2014.1171,,10.15394/jdfsl.2014.1171,1606724700,,0,002-425-923-429-013; 047-630-600-014-492; 073-847-291-567-156; 090-752-043-508-733; 092-237-744-940-330; 094-295-279-676-447; 113-035-706-203-182; 157-804-190-614-318,5,true,cc-by-nc,gold 077-603-385-952-05X,Proposed Proactive Digital Forensic Approach for Cloud Computing Environment,2018-10-07,2018,journal article,International Journal of Engineering & Technology,2227524x,Science Publishing Corporation,,Ganthan Narayana Samy; Nurazean Maarop; Doris Hooi-Ten Wong; Fiza Abdul Rahim; Noor Hafizah Hassan; Sundresan Perumal; Pritheega Magalingam; Sameer Hasan Albakri,"There are many challenges for the digital forensic process in the cloud computing due to the distinguished features of the cloud computing environment. Many of well-known digital forensic methods and tools are not suitable for cloud computing environment. The multi-tenancy, multi-stakeholder, Internet-based, dynamics expendability, and massive data, logs and datasets are examples of the cloud computing environment features that make conducting digital forensics in the cloud computing environment a very difficult task. Therefore, there is a need to develop an appropriate digital forensic approach for cloud computing environment. Thus, this paper proposed a proactive digital forensic approach for cloud computing environment. ",7,4,12,15,Computer security; Computer science; Cloud computing; Digital forensics,,,,,https://pure.uniten.edu.my/en/publications/proposed-proactive-digital-forensic-approach-for-cloud-computing- https://www.sciencepubco.com/index.php/ijet/article/viewFile/21362/10122,http://dx.doi.org/10.14419/ijet.v7i4.15.21362,,10.14419/ijet.v7i4.15.21362,2941543733,,0,,2,true,,bronze 077-604-181-180-814,The Diplomatic and Digital Forensic Science in Born-Digital Records: The Quest for Authenticity,2018-07-01,2018,journal article,Journal of Integrated OMICS,21820287,Proteomass Scientific Society,,Juan Bernardo Montoya-Mogollón; Sonia Maria Troitiño Rodriguez,"This paper aims at the application of Digital Diplomatic and Digital Forensics Science in digital-born records, in order to guarantee its authenticity in institutional routines and processes, but also as a source of proof in possible legal and juridical scenarios. In view of the vast and fruitful discussions focused on the complexity of the digital records in Archival Science and Information Science (I.S.), there is a gap to manage and preserve the digital records, keeping them reliable, accurate and authentic in systems that have the same conditions. This gap makes it impossible to preserve records in the long term due, firstly, to the fragility of the systems where they are stored and, secondly, to the constant risks of obsolescence of hardware and software that occur on a day by day. Digital Diplomatic Science assists this process by determining the form and content of the record to evidence its legal-diplomatic authenticity and establish its historical value. Digital Forensic Science, in turn, provides support for the chain of custody to remain intact, regardless of the medium on which the digital record is fixed. The following questions is raised: Is it possible to apply the practice of law and the Digital Forensics in the area of the Archival Science and information science, guaranteeing the authenticity of the born-digital record. In addition, in which way does the junction between Digital Diplomatic Science and Digital Forensic Science guarantee the preservation and preservation of the born-digital records. To answer such questions, this research proposes to link five areas of knowledge following the scientific experiences conducted at the University of British Columbia in Canada by the InterPares (International Research on Permanent Authentic Records) group. Areas of knowledge that are offering interesting results for the preservation not only of the record, but also of the social memory: 1.Digital Forensics: discipline that joint Forensics Science with Computer Science to analyze the digital evidence. 2. Diplomatics Science: Science to analyze the form and structure to the records. 3. Archival Science: Science to involves the whole of the principles, policies, strategies, and activities designed to ensure the physical and technological stabilization of records for the purpose of extending indefinitely their life and protecting the accuracy and authenticity of and maintaining the accessibility to their intellectually content [1] . 4. Information Science: Science to analyze the information in different contexts. The research will carried out in a theoretical and qualitative way, taking into account the literature shared in the site Digital Records Forensics Project, coordinated by the author Luciana Duranti of the InterPares group, and the bibliography produced in the country of the areas of knowledge already referenced. The results obtained will contribute to the realization of alternative researches in document conservation within the Archival Science and the Information Science.",8,1,74,76,Chain of custody; Data science; Practice of law; Born-digital; Digital evidence; Obsolescence; Computer science; Archival science; Digital forensics; Information science,,,,,http://www.jiomics.com/index.php/jio/article/view/219 http://dx.doi.org/10.5584/jiomics.v8i1.219,http://dx.doi.org/10.5584/jiomics.v8i1.219,,10.5584/jiomics.v8i1.219,2847700262,,0,,0,false,, 077-923-684-553-780,ForTrace - A holistic forensic data set synthesis framework,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Thomas Göbel; Stephan Maltan; Jan Türr; Harald Baier; Florian Mann,"Digital forensic experts are confronted with a wide variety of investigation objectives, e.g., to deal with an infected IT system. The same holds for digital forensic tools. Mostly different sources of digital traces have to be inspected including persistent storage devices (e.g., SSDs, SD cards, USB drives), volatile main memory snapshots, and network captures, respectively. In order to train experts and tools and keep their knowledge and capabilities up-to-date, a capacious amount of realistic, timely training data is necessary. However, due to different reasons like privacy, secrecy, or intellectual property rights there is a large gap in digital forensic training data. In recent years different synthesis frameworks to generate realistic digital forensic data sets have been proposed. However, none of these frameworks provides a holistic approach to generate realistic digital forensic relevant traces of different sources. In this paper we introduce ForTrace , a holistic framework for the simultaneous generation of persistent, volatile and network traces. Our approach is based on the data synthesis framework hystck . We explain our extension of hystck by defining properties of a holistic data set synthesis framework and by discussing different forensically relevant scenarios and their implementation in ForTrace . We then successfully evaluate ForTrace with respect to diverse realistic and complex scenarios. ForTrace is open source and may be adapted or extended with respect to individual needs.",40,,301344,301344,Computer science; Digital forensics; Set (abstract data type); Variety (cybernetics); Data science; Secrecy; Intellectual property; Computer security,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301344,,10.1016/j.fsidi.2022.301344,,,0,001-134-660-509-890; 013-982-587-242-698; 021-003-216-544-791; 036-112-898-081-145; 047-997-437-748-154; 104-153-499-789-950,1,true,,hybrid 077-963-490-848-763,A comprehensive digital forensic investigation process model,,2016,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Reza Montasari,"A formal process model is needed to enable digital forensic practitioners in following a uniform approach and to enable courts of law in determining the reliability of digital evidence presented to them. Such a model also needs to be generic in that it can be applicable in the different fields of digital forensics including law enforcement, corporates and incident response. There does not currently exist such a comprehensive process model that is both formal and generic. To address these shortcomings, this paper proposes a model that is formal in that it can enable the digital forensic practitioners in following a uniform approach when carrying out investigations and that is generic in that it can be applied in the different environments of digital forensics.",8,4,285,302,Data science; Law enforcement; Digital evidence; Incident response; Computer security; Computer science; Process (engineering); Reliability (statistics); Computer forensics; Process modeling; Digital forensics,,,,,https://pure.hud.ac.uk/en/publications/a-comprehensive-digital-forensic-investigation-process-model https://www.open-access.bcu.ac.uk/4549/ https://cronfa.swan.ac.uk/Record/cronfa54939 https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2016.079430 https://dl.acm.org/doi/10.1504/IJESDF.2016.079430 https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf8.html#Montasari16a https://dl.acm.org/citation.cfm?id=3004918,http://dx.doi.org/10.1504/ijesdf.2016.079430,,10.1504/ijesdf.2016.079430,2523853946,,0,004-652-388-189-304; 004-872-169-627-620; 005-515-442-506-880; 007-314-571-885-858; 011-787-351-244-594; 019-831-293-743-518; 020-944-423-224-895; 021-486-901-460-202; 021-850-998-857-676; 022-502-903-446-942; 026-774-296-742-022; 030-359-893-882-572; 034-153-736-380-589; 038-668-970-194-854; 044-377-145-020-27X; 047-859-979-695-194; 052-052-141-922-342; 063-274-848-736-685; 067-726-260-424-525; 067-844-385-207-96X; 083-748-184-402-072; 087-041-369-426-333; 092-058-232-746-872; 120-697-354-224-33X; 132-355-634-397-986; 133-397-275-695-990; 140-821-103-436-654; 143-562-788-834-457; 151-378-930-836-964; 160-160-097-559-323; 162-110-149-751-921; 171-803-389-787-120; 173-034-553-635-460; 180-327-460-336-608; 182-691-566-109-191; 190-065-821-748-92X; 190-872-133-741-434; 192-810-463-153-431; 199-745-676-923-766,14,false,, 078-095-922-471-787,Onto-Engineering: A Conceptual framework for Integrating Requirement Engineering Process with scientifically tuned Digital Forensics Ontologies,,2017,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Victor R. Kebande; Nickson M. Karie Lindiwe M. Maake,,6,2,73,83,Software engineering; Digital transformation; Conceptual framework; Computer science; Process (engineering); Wireless; Knowledge management; Requirements engineering; Digital forensics,,,,,http://sdiwc.net/digital-library/ontoengineering-a-conceptual-framework-for-integrating-requirement-engineering-process-with-scientifically-tuned-digital-forensics-ontologies,http://dx.doi.org/10.17781/p002271,,10.17781/p002271,2746919277,,0,,2,false,, 078-187-982-222-182,Book Review: Digital Forensics Trial Graphics: Teaching the Jury through Effective Use of Visuals:,2017-09-01,2017,journal article,Academic Forensic Pathology,19253621,SAGE Publications,,Rand Swartz,,7,3,xii,xiii,Engineering; Graphics; Jury; Multimedia; Digital forensics,,,,,https://journals.sagepub.com/doi/abs/10.1177/192536211700700304,http://dx.doi.org/10.1177/192536211700700304,,10.1177/192536211700700304,2810038464,,0,,0,true,,green 078-327-902-374-330,Developing a new digital forensics curriculum,,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Anthony Lang; Masooda Bashir; Roy H. Campbell; Lizanne DeStefano,"We are developing a new undergraduate certificate program in digital forensics at the University of Illinois at Urbana-Champaign. To create a curriculum consistent with the fundamentally multidisciplinary nature of the field of digital forensics, we assembled a curriculum development team that includes domain experts from the fields of computer science, law, social science, psychology, and accounting. To lower the entry barrier preventing institutions from adopting digital forensics programs, we are designing the curriculum with the express intent of distributing it as a self-contained curriculum package with everything needed to teach the course. When complete, our program will consist of an introductory and an advanced course in digital forensics, with accompanying hands-on labs. At the time of writing, we have developed the curriculum for our introductory course and taught a pilot class, and we are in the process of revising the curriculum for distribution to other institutions. This paper describes our program's goals, methodology, and rationale; our experience developing and teaching our new curriculum; and the revisions we are making based on this experience and feedback from our students.",11,,S76,S84,Curriculum mapping; Emergent curriculum; Class (computer programming); Curriculum development; Computer science; Curriculum; Multimedia; Network forensics; Engineering ethics; Computer forensics; Digital forensics,,,,National Science Foundation,https://www.sciencedirect.com/science/article/pii/S1742287614000516 https://www.sciencedirect.com/science/article/abs/pii/S1742287614000516 https://experts.illinois.edu/en/publications/developing-a-new-digital-forensics-curriculum http://www.sciencedirect.com/science/article/pii/S1742287614000516,http://dx.doi.org/10.1016/j.diin.2014.05.008,,10.1016/j.diin.2014.05.008,2012713286,,0,004-916-146-042-728; 012-314-515-683-048; 023-366-664-256-123; 036-733-117-655-399; 058-216-067-155-646; 063-579-080-753-513; 088-699-775-204-397; 102-679-985-151-761; 106-215-046-097-04X,29,true,cc-by-nc-nd,hybrid 078-451-188-373-346,Research onTort Forensics Method Based on Asymmetric Watermarking,,2012,journal article,Computer Simulation,10069348,,,HE Yi-hui,"In the study of digital image tort forensics optimization,the encryption method of digital image encryption pretreatment is directly related to the success rate of follow-up tort forensics.Symmetric watermarking mechanism needs to expose the key and vulnerable,the traditional method of the symmetric watermarking tort forensics is vulnerable,and so the success rate of tort forensics is not high.In order to solve this problem,a method of the tort forensics based on asymmetric watermark was presented.It made use of asymmetric watermarking embedding for digital image copyright protection in image encryption pretreatment,because of keys without exposed in the extraction of watermark.It can effectively resist the attacks to protect evidence of infringement and to avoid the insufficient of the traditional method vulnerable effects,by integrally extracting the digital watermark characteristic information in tort images and making use the clustering algorithm of LSH.Finally,it completed the tort evidence extraction to ensure the success rate of infringement evidence.The simulation results show that the improved method can effectively extract the evidence of infringement with high success rate of forensics and satisfactory results.",,,,,Image (mathematics); Engineering; Encryption; Digital watermarking; Watermark; Tort; Improved method; Computer security; Digital image; Cluster analysis,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJZ201210042.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJZ201210042.htm,,,2374583683,,0,,0,false,, 078-481-282-973-45X,TOWARDS ACHIEVING RELIABLE DIGITAL FORENSICS IN IAAS AND STAAS CLOUDS USING THE OPEN CLOUD FORENSICS MODEL,,2016,journal article,Services Transactions on Cloud Computing,23267542; 23267550,Services Society,,,,4,3,,,Digital forensics; Cloud computing; Computer science; Computer security; Network forensics; Operating system,,,,,,http://dx.doi.org/10.29268/stcc.2016.4.3.2,,10.29268/stcc.2016.4.3.2,,,0,,1,true,,gold 078-527-708-630-261,Digital Forensics on Screen Locked Android Smart Phone,,2015,journal article,Chinese Journal of Forensic Sciences,16712072,,,Wei Ron,"Objective To study the effective method to acquire or recover the data from screen-locked mobile phones with no password and USB debugging enabled. Methods The booting principles of Android smart phone were analyzed. A method based on Android debug bridge protocol was presented in order to clear the screen lock password. Then the USB debugging was opened and forensics tools could be connected. Result Testing on ZTE n760 intelligent mobile phone, the method of mobile phone forensics was proved to be successful, without losing user data. Conclusion In the recovery mode, by connecting the mobile phone to a computer through the ADB protocol and removing the password file, the USB debug port could be opened and the digital forensics could be performed without losing user data.",,,,,Password; Engineering; Embedded system; GSM services; Mobile phone; Lock screen; USB; Android (operating system); Mobile device forensics; Digital forensics,,,,,http://en.cnki.com.cn/Article_en/CJFDTotal-SFJD201501015.htm,http://en.cnki.com.cn/Article_en/CJFDTotal-SFJD201501015.htm,,,2370844477,,0,,0,false,, 078-908-560-808-973,Role and Impact of Digital Forensics in Cyber Crime Investigations,,2019,journal article,INROADS- An International Journal of Jaipur National University,22774904; 22774912,Diva Enterprises Private Limited,,S. Krishnan,"Cybercrime is a growing problem, but the ability of law enforcement agencies to investigate and successfully prosecute criminals for these crimes is unclear. While law enforcement agencies have been conducting these investigations for many years, the previously published needs assessments all indicated that there is lack the training, tools or staff to effectively conduct investigations with the volume or complexity included in many of these cases. This study discussed on Cybercrime and Global Economic Growth, Reasons for Conducting a Digital Forensic Investigation, Various Branches of Digital Forensics in details, Potential Source of Digital Evidence, standard operating procedure for digital evidence, Legal Aspects and What the Future Holds in the field of digital forensics.",8,1and2,64,75,Internet privacy; Standard operating procedure; Cybercrime; Law enforcement; Digital evidence; Needs assessment; Cyber crime; Potential source; Computer science; Digital forensics,,,,,https://www.indianjournals.com/ijor.aspx?target=ijor:inroads&volume=8&issue=1and2&article=012,http://dx.doi.org/10.5958/2277-4912.2019.00012.2,,10.5958/2277-4912.2019.00012.2,2999986322,,0,173-034-553-635-460,0,false,, 079-365-341-407-369,METHODS FOR FORGERY DETECTION IN DIGITAL FORENSICS,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Sanjeevani K. Shah; Punam Raskar,,1,1,1,,,,,,,,http://dx.doi.org/10.1504/ijesdf.2021.10035056,,10.1504/ijesdf.2021.10035056,,,0,,0,false,, 079-483-836-523-473,Phase-Oriented Advice and Review Structure (PARS) for Digital Forensic Investigations,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Aliloulaye Tchaou,"The PARS is the first documented peer review methodology for the digital forensics field, a six staged approach designed to formally support organizations and their staff in their goal of facilitating effective peer review of digital forensic work, from investigative tasks to forensic activities and forensic analysis processes (Pollitt et al., 2018). This assignment discusses how the PARS methodology can be implemented, and the available options and mechanisms available to ease the interpretation of this model into existing practices. Both the early ‘Advisor’ and later ‘Reviewer’ roles in PARS are discussed and their requirements and expectations are defined. Keywords: Digital forensics, Peer review, Digital evidence, Quality assurance, Forensic science Multi-staged Rview, Multi-person Review BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Aliloulaye Tchaou (2022): Phase-Oriented Advice and Review Structure (PARS) for Digital Forensic Investigations Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 173-180 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P28",1,1,173,180,Digital forensics; Digital evidence; Computer forensics; Nexus (standard); Computer science; Forensic science; Advice (programming),,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p28,,10.22624/aims/crp-bk3-p28,,,0,,0,true,,bronze 079-499-568-978-91X,Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist,2018-08-30,2018,journal article,IT JOURNAL RESEARCH AND DEVELOPMENT,25284053; 25284061,UIR Press,,Anton Yudhana; Riadi; Ikhwan Anshori,"Facebook Messenger menjadi media sosial yang populer kedua setelah Whatsapp di tahun 2017. Meningkatnya jumlah pengguna Facebook Messenger tentu membawa dampak positif dan negatif, salah satu efek negatifnya adalah beberapa orang yang menggunakan Facebook Messenger melakukan kejahatan digital. Jika sebuah smartphone android menjadi bukti dalam kasus pidana dan Facebook Messenger terinstall di smartphone tersebut, maka pada aplikasi ini bukti digital dapat diidentifikasi dan dapat diharapkan menjadi pilihan untuk membantu penegakan hukum dalam mengungkap kejahatan digital. Proses identifikasi berdasarkan proses forensic mobile yang berdasarkan metode NIST (National Institute of Standards Technology). NIST memiliki panduan kerja baik itu kebijakan dan standar untuk menjamin setiap examiner mengikuti alur kerja yang sama sehingga pekerjaan mereka terdokumentasikan dan hasilnya dapat di ulang (repeatable) dan dapat dipertahankan (defendable). Penelitian ini menjelaskan gambaran umum bagaimana teknik-teknik yang dapat digunakan untuk mengembalikan bukti digital berupa text,gambar, dan audio pada Facebook Mesenger yang ada di Smartphone Android.",3,1,13,21,,,,,,http://journal.uir.ac.id/index.php/ITJRD/article/download/1658/1225 https://core.ac.uk/download/pdf/322502217.pdf,http://dx.doi.org/10.25299/itjrd.2018.vol3(1).1658,,10.25299/itjrd.2018.vol3(1).1658,2898508302,,0,,7,true,cc-by-sa,gold 079-532-400-549-646,MEMORY FORENSIC DEVELOPMENT AND CHALLENGES IN IDENTIFYING DIGITAL CRIME : A REVIEW,2022-03-02,2022,journal article,TEKNOKOM,26863219; 26218070,Universitas Wiralodra,,Yasep Azzery; Nur Dwi Mulyanto; Taufik Hidayat,"Digital forensic technology is currently advancing along with the demands to uncover various crimes using technology. Memory Forensic is one of the investigative fields in digital forensics. We use the Systematic Literature Review method to identify the developments and challenges of Forensic Memory in identifying digital crimes, analyzed from various reference papers according to the Include and Exclude Criteria and based on the specified Research Question. Authors chose from 30 reference journals from 3 online journal databases namely IEEE Explore, Sciencedirect, and Springer with themes related to forensic memory based on certain criteria for further review to determine the development of digital crime. The results of the SLR that we convey are the result of a study related to the use of Memory Forensic in identifying various digital attacks and challenges faced in the future.",5,1,96,102,Digital forensics; Computer science; Forensic science; Digital evidence; Computer forensics; Data science; Crime scene; Computer security,,,,,,http://dx.doi.org/10.31943/teknokom.v5i1.73,,10.31943/teknokom.v5i1.73,,,0,,0,true,,hybrid 079-624-398-794-48X,A UML-Based Approach for Analysing Potential Digital Forensic Evidence,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Victor R. Kebande; Nickson M. Karie,,7,4,354,362,Software engineering; Unified Modeling Language; Computer science; Wireless; Digital forensics,,,,,http://sdiwc.net/digital-library/a-umlbased-approach-for-analysing-potential-digital-forensic-evidence,http://sdiwc.net/digital-library/a-umlbased-approach-for-analysing-potential-digital-forensic-evidence,,,2892001513,,0,,0,false,, 079-726-245-728-809,A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics,,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Asanka Sayakkara; Nhien-An Le-Khac; Mark Scanlon,"Abstract The increasing prevalence of Internet of Things (IoT) devices has made it inevitable that their pertinence to digital forensic investigations will increase into the foreseeable future. These devices produced by various vendors often posses limited standard interfaces for communication, such as USB ports or WiFi/Bluetooth wireless interfaces. Meanwhile, with an increasing mainstream focus on the security and privacy of user data, built-in encryption is becoming commonplace in consumer-level computing devices, and IoT devices are no exception. Under these circumstances, a significant challenge is presented to digital forensic investigations where data from IoT devices needs to be analysed. This work explores the electromagnetic (EM) side-channel analysis literature for the purpose of assisting digital forensic investigations on IoT devices. EM side-channel analysis is a technique where unintentional electromagnetic emissions are used for eavesdropping on the operations and data handling of computing devices. The non-intrusive nature of EM side-channel approaches makes it a viable option to assist digital forensic investigations as these attacks require, and must result in, no modification to the target device. The literature on various EM side-channel analysis attack techniques are discussed – selected on the basis of their applicability in IoT device investigation scenarios. The insight gained from the background study is used to identify promising future applications of the technique for digital forensic analysis on IoT devices – potentially progressing a wide variety of currently hindered digital investigations.",29,1,43,54,Group method of data handling; Encryption; Eavesdropping; Computer security; Computer science; Side channel attack; USB; Bluetooth; Wireless; Digital forensics,,,,EM; EM,https://www.markscanlon.co/papers/SurveyEMSideChannelsForensics.php https://www.sciencedirect.com/science/article/abs/pii/S1742287618303840 https://ui.adsabs.harvard.edu/abs/2019arXiv190307703S/abstract https://markscanlon.co/papers/SurveyEMSideChannelsForensics.pdf http://arxiv.org/pdf/1903.07703.pdf https://doi.org/10.1016/j.diin.2019.03.002 https://forensicsandsecurity.com/papers/SurveyEMSideChannelsForensics.php http://dblp.uni-trier.de/db/journals/corr/corr1903.html#abs-1903-07703 https://forensicsandsecurity.com/papers/SurveyEMSideChannelsForensics.pdf https://arxiv.org/abs/1903.07703 https://dblp.uni-trier.de/db/journals/corr/corr1903.html#abs-1903-07703 http://arxiv.org/abs/1903.07703,http://dx.doi.org/10.1016/j.diin.2019.03.002,,10.1016/j.diin.2019.03.002,3105177289; 2921035272,,0,004-935-670-222-50X; 006-204-392-444-738; 009-745-160-749-680; 009-935-696-637-959; 011-792-058-837-127; 012-673-816-043-057; 012-867-377-866-486; 014-137-537-326-066; 014-995-077-316-676; 015-315-804-193-751; 015-704-870-742-148; 016-139-631-313-175; 016-661-251-213-668; 016-820-759-114-076; 017-328-201-360-86X; 017-335-677-993-203; 017-916-684-775-525; 018-728-219-873-777; 021-998-933-410-065; 022-391-080-797-645; 023-170-919-695-853; 024-831-771-938-864; 024-993-702-381-603; 025-837-173-916-001; 026-591-248-665-825; 027-163-958-987-808; 027-265-141-482-204; 027-933-119-794-851; 029-159-400-662-132; 029-748-683-221-796; 030-644-948-433-321; 030-879-422-716-26X; 032-501-427-040-287; 033-089-942-594-860; 034-306-162-114-437; 035-008-147-148-461; 036-198-835-759-991; 036-315-839-495-866; 037-304-752-152-900; 038-294-110-895-85X; 038-334-854-136-016; 039-627-889-157-293; 040-565-525-219-769; 040-595-011-464-174; 042-636-923-996-676; 043-588-566-141-540; 044-367-276-167-133; 045-216-191-719-769; 045-470-586-870-387; 046-267-876-132-772; 047-818-759-270-572; 050-834-445-581-19X; 051-174-262-378-725; 051-544-952-658-711; 051-870-124-075-370; 057-662-229-017-371; 058-638-649-158-740; 059-527-744-465-444; 060-369-813-003-88X; 060-517-968-088-162; 063-818-522-978-273; 063-878-126-628-743; 064-092-804-942-240; 064-446-276-797-689; 064-832-676-494-842; 065-472-112-492-569; 066-529-103-339-301; 066-759-931-116-967; 067-682-730-995-831; 068-491-843-060-017; 069-007-833-693-813; 069-607-942-284-68X; 071-311-399-697-624; 074-614-672-576-143; 075-492-908-245-230; 081-034-805-666-007; 081-519-923-581-499; 082-042-701-545-24X; 082-746-024-018-906; 083-139-412-854-983; 084-979-800-495-589; 085-868-644-488-858; 088-023-546-650-123; 089-885-926-905-621; 091-352-470-901-517; 093-795-930-617-994; 095-736-127-631-909; 099-985-373-806-439; 104-773-981-185-87X; 107-999-389-297-283; 108-005-459-485-988; 110-311-156-990-220; 111-386-363-549-545; 111-442-189-014-994; 116-516-196-774-036; 117-795-652-474-055; 118-286-558-259-165; 118-783-365-990-346; 120-462-880-448-150; 122-118-487-000-106; 122-494-525-238-756; 126-201-670-860-991; 127-616-531-697-881; 133-753-731-718-112; 137-755-137-054-864; 144-493-153-671-981; 150-470-771-960-137; 160-370-472-488-703; 160-630-210-597-764; 163-360-724-847-54X; 165-994-624-449-955; 166-252-929-809-812; 170-972-427-798-244; 177-636-893-655-197; 183-574-974-997-451,42,true,,green 080-282-279-211-788,Network Forensics for Detecting SQL Injection Attacks Using NIST Method,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Arif Roid Caesarano; Riadi,,7,4,436,443,NIST; Operating system; SQL injection; Computer science; Network forensics; Wireless,,,,,http://www.sdiwc.net/digital-library/network-forensics-for-detecting-sql-injection-attacks-using-nist-method.html,http://www.sdiwc.net/digital-library/network-forensics-for-detecting-sql-injection-attacks-using-nist-method.html,,,2895448980,,0,124-129-640-160-197,5,false,, 080-720-916-061-995,The Digital Forensic Tools Accuracy and Specifications,2022-03-05,2022,journal article,Academic Journal of Research and Scientific Publishing,27066495,Sciegate,,Jasir Adel Altheyabi,"The research aims to provide an overview of computer forensics, the history of computer forensics tools, and the accuracy and specifications of these tools. With the great and accelerating technological development, the reliance on the Internet has become greater and stronger than before. The world has become dependent on technology in all production and economic operations. And we talked in the second axis of the search for The Computer Forensic Legal Requirement, and Presentation of the tools used in the criminal investigation and an explanation of each tool. The digital forensic investigation tools that we will explain in this research are FTK. Forensic Toolkit, Prodiscovery, Autopsy, p2commander, OSForensics. We conclude that digital investigation tools have outstanding performance on different mediums. It has high accuracy and efficiency in digital investigation, and no single tool is superior to some other tools in all media. With more than one tool on a range of devices, it improves the investigation and testimony capabilities of examinees during exploration.",3,35,58,65,Business; Risk analysis (engineering); Transport engineering; Operations management; Finance,,,,,,http://dx.doi.org/10.52132/ajrsp.e.2022.35.3,,10.52132/ajrsp.e.2022.35.3,,,0,,0,true,,bronze 080-731-392-562-484,Development of Windows forensic tool for verifying a set of data,2015-12-31,2015,journal article,Journal of the Korea Institute of Information Security and Cryptology,15983986,Korea Institute of Information Security and Cryptology,,Minseo Kim; Sang-jin Lee,"For an accurate analysis through the forensic of digital devices and computer, it is a very important validation of the reliability of digital forensic tools. To verify the reliability of the tool, it is necessary to research and development of the data set to be input to the tool. In many-used Windows operating system of the computer, there is a Window forensic artifacts associated with time and system behavior. In this paper, we developed a set of data in the Windows operating system to be able to analyze all of the two Windows artifacts and we conducted a test with published digital forensic tools. Therefore, the developed data set presents the use of the following method. First, artefacts education for growing ability can be analyzed acts standards. Secondly, the purpose of tool tests for verifying the reliability of digital forensics. Lastly, recyclability for new artifact analysis.",25,6,1421,1433,Data mining; Set (abstract data type); Development (topology); Window (computing); Artifact (software development); Computer science; Reliability (statistics); Microsoft Windows; Data set; Digital forensics,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2015_v25n6_1421,http://dx.doi.org/10.13089/jkiisc.2015.25.6.1421,,10.13089/jkiisc.2015.25.6.1421,2318429789,,0,001-960-134-177-077; 004-190-067-200-599; 004-652-388-189-304; 040-393-580-637-973; 043-409-832-398-87X; 058-631-300-195-90X; 064-062-472-395-879; 099-347-849-544-731; 104-220-579-021-738; 108-086-708-688-274; 130-516-859-801-769; 133-752-203-150-119; 135-717-892-795-412; 142-226-580-142-17X; 142-729-737-144-734; 184-948-841-629-735; 185-343-535-827-64X,0,true,,bronze 080-788-467-889-236,The Definition of Digital Criminalistics as the Origin of a Misleading Direction in Science. Part 2,2021-03-25,2021,journal article,Legal education and science,18131190,The Publishing Group Jurist,,Oleg S. Kuchin; Yaroslava O. Kuchina,"Purpose. To compare and analyze the trend of appearance of the pseudo-term ‘digital criminology’ in the science of criminology and prove that this is incorrect. Methodology: induction, deduction, synthesis, analysis, formal legal method, comparative legal method, logical method. Conclusions. The evolution of methods of committing crimes and instruments of crime does not always require the evolution of the science of criminology and the emergence of its varieties. You just have to assess the prospects of extrapolative ways and methods of proving the circumstances of the crimes in the era of digitalization of social relations, in terms of the provisions of modern criminal law and only criminal-legal research unit. The definition of ‘digital criminalistics’, which has recently appeared in science, actually misleads the scientific community with its novelty and originality, since such criminalistics in nature does not exist a priori. It is necessary to speak only about forensic or expert research of carriers of digital (electronic or computer) information. In criminalistics, it is logical to develop a new direction-the forensic study of electronic media of digital information and the use of computer expertise in establishing all the circumstances of the crime committed. And this is just a new section of forensic technology, studying a new subject of research for this naki. Here, the traditional forensic methodology should be applied, which will be aimed ‘atlinking’ the electronic carrier of digital information and the digital information itself to a specific crime and to a specific person. Scientific and practical significance. The research is aimed at orienting forensic theory and practice towards the study of specific objects and contributes to the fact that all these studies are further applicable to the practice of crime investigation, and not only for theoretical purposes.",3,,25,33,Epistemology; Philosophy,,,,,http://dx.doi.org/10.18572/1813-1190-2021-3-25-33,http://dx.doi.org/10.18572/1813-1190-2021-3-25-33,,10.18572/1813-1190-2021-3-25-33,3215654066,,0,,0,true,,bronze 081-140-064-081-587,Building Ontologies for Digital Forensic Terminologies,,2016,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Nickson M. Karie; Victor R. Kebande,"Digital forensics (DF) is a relatively new discipline with a lot of technical and non-technical terminologies that can be hard to comprehend. During a timeintensive digital forensic investigation process, for example, investigators may at times encounter several new terminologies. In such a scenario, the time required to unearth and analyse the root cause of a potential security incident might be influenced by the complexity involved in resolving the meaning of new terminologies encountered. The difficulty lies in the lack of an approach in DF that can help investigators in resolving the meaning of terminologies or even how these terminologies are perceived by individuals especially when used in their domain of expertise. If existing digital forensic tools, for example, were to be designed in such a way as to allow investigators to automatically resolve or incorporate the meaning of new terminologies used or encountered during investigations, then the time required to unearth and analyse the root cause of a security incident might be reduced extensively. The main problem addressed in this paper therefore, is that, there exists no approaches in DF that have the ability to help investigators in reasoning with regard to the perceived meaning of different digital forensic terminologies encountered during a digital forensics investigation process. Existing tools thus needs to incorporate new approaches that can help in resolving or clarifying the meaning of new terminologies used during investigation processes. For this reason, this paper examines the concept of building ontologies for digital forensic terminologies and proposes an ontological approach to resolve the meaning of different digital forensic terminologies. Besides, ontologies are known to provide a form of knowledge in a given discipline of interest. In the authors’ opinion, thus, building ontologies for digital forensic terminologies can support the development of future investigative tools as well as new techniques to a degree of certainty.",5,2,75,82,Existential quantification; Domain (software engineering); Information retrieval; Data science; Meaning (existential); Degree of certainty; Digital forensic investigation; Computer science; Process (engineering); Digital forensics; Root cause,,,,,http://www.sdiwc.net/digital-library/building-ontologies-for-digital-forensic-terminologies.html,http://dx.doi.org/10.17781/p002032,,10.17781/p002032,2339452396,,0,024-496-616-601-772; 026-712-844-452-082; 026-787-086-442-120; 027-803-437-597-006; 030-136-936-524-671; 036-132-248-316-123; 065-873-523-989-876; 089-373-543-566-272; 102-527-262-841-07X; 118-214-545-268-860,16,false,, 081-152-890-798-991,Digital forensic standards and digital evidence in Polish criminal proceedings. An updated definition of digital evidence in forensic science,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Piotr Lewulis,Digital evidence is increasingly popular in criminal proceedings - not only to those commonly referred to as 'cybercrimes'. The credibility criteria of such evidence are in theory governed by a set...,13,1,403,417,Forensic science; Set (abstract data type); Data science; Credibility; Digital evidence; Computer science; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.116024,http://dx.doi.org/10.1504/ijesdf.2021.10034988,,10.1504/ijesdf.2021.10034988,3122539278,,0,,0,false,, 081-274-353-682-729,Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging & Tagging of Digital Devices in Immersive Virtual Reality,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Courtney Hassenfeldt; Jillian Jacques; Ibrahim Baggili,"Abstract This work presents the first account of evaluating learning inside a VR experience created to teach Digital Forensics (DF) concepts, and a hands-on laboratory exercise in Bagging & Tagging a crime scene with digital devices. First, we designed and developed an immersive VR experience which included a lecture and a lab. Next, we tested it with (n = 57) participants in a controlled experiment where they were randomly assigned to a VR group or a physical group. Both groups were subjected to the same lecture and lab, but one was in VR and the other was in the real world. We collected pre- and post-test results to assess the participants’ knowledge in DF concepts learned. Our experimental results indicated no significant differences in scores between the immersive VR group and the physical group. However, our results showed faster completion times in VR by the participants, which hints at VR being more time efficient, as virtual environments can be spun programmatically with little downtime.",33,,301011,,Crime scene; Virtual reality; Controlled experiment; Time efficient; Computer science; Multimedia; Digital forensics,,,,National Science Foundation,https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1102&context=electricalcomputerengineering-facpubs https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/101/ https://dfrws.org/wp-content/uploads/2020/10/2020_USA_paper-exploring_the_learning_efficacy_of_digital_forensics_concepts.pdf https://www.sciencedirect.com/science/article/pii/S2666281720302602 https://doi.org/10.1016/j.fsidi.2020.301011 https://dfrws.org/presentation/is-my-digital-forensics-professor-better-in-virtual-reality-vr-exploring-learning-in-vr-versus-the-physical-world/,http://dx.doi.org/10.1016/j.fsidi.2020.301011,,10.1016/j.fsidi.2020.301011,3080767672,,0,000-490-412-762-138; 002-413-691-537-198; 002-569-181-368-890; 003-103-703-899-739; 004-916-146-042-728; 005-733-361-126-371; 007-790-059-029-953; 011-006-176-487-462; 014-425-849-204-654; 017-429-170-321-915; 020-449-343-773-669; 022-041-246-309-040; 046-408-723-602-346; 049-223-763-769-747; 066-264-702-071-211; 074-169-238-052-790; 078-327-902-374-330; 100-595-188-241-720; 109-149-174-428-014; 115-048-509-763-725; 118-244-930-021-861; 129-632-250-604-450; 147-117-297-573-555; 149-617-274-050-94X; 151-378-930-836-964; 151-419-635-835-131; 172-573-079-472-196; 193-779-398-308-524; 194-308-670-883-17X,5,true,cc-by-nc-nd,hybrid 081-833-857-658-915,Digital forensics : the missing piece of the internet of things promise,,2016,journal article,Computer Fraud & Security,13613723,Mark Allen Group,United Kingdom,Steve Watson; Ali Dehghantanha,"As technology advances at a blinding pace, the promise of new gadgets to enhance every facet of our lives tempts every consumer and organisation. From the ease of automation, control and monitoring of the most mundane aspects of our lives to advanced lifesaving and monitoring capabilities, our world is changing daily. ; No reliable forensics application or digital forensics guidance exists to retrieve the data from IoT devices in the event of an attack, an active investigation or a litigation request. ; The digital forensics of Internet of things (IoT) technologies is the missing conversation in our headlong rush to the promise of connecting every device on the planet. Steve Watson of VTO Labs and Ali Dehghantanha of the University of Salford discuss the issues and the importance of further development in this field. And they elaborate on how forensics practitioners, device manufacturers and legal authorities could share their efforts and minimise this gap.",2016,6,5,8,Internet privacy; Automation; Watson; Conversation; Pace; Computer security; Computer science; Event (computing); Internet of Things; Digital forensics,,,,,http://www.sciencedirect.com/science/article/pii/S1361372315300452 https://www.sciencedirect.com/science/article/abs/pii/S1361372315300452 https://usir.salford.ac.uk/id/eprint/39539/,http://dx.doi.org/10.1016/s1361-3723(15)30045-2,,10.1016/s1361-3723(15)30045-2,2462696620,,0,002-678-878-129-227; 074-815-704-684-263; 078-431-972-023-034; 112-181-239-331-730,82,true,,green 082-140-450-245-734,IDENTIFICATION OF DIGITAL EVIDENCE FACEBOOK MESSENGER ON MOBILE PHONE WITH NATIONAL INSTITUTE OF STANDARDS TECHNOLOGY (NIST) METHOD,2019-01-15,2019,journal article,Kursor,23016914; 02160544,University of Trunojoyo Madura,,Anton Yudhana; Riadi; Ikhwan Anshori,"Facebook Messenger is a popular social media. The increasing number of Facebook Messenger users certainly has a positive and negative impact, one of the negative effects is being used for digital crime. One of the sciences to get digital evidence is to do Digital forensics. Digital forensics can be done on a smartphone used by criminals. This research will carry out as much evidence of digital crime as possible from Facebook Messenger. In this study the forensic devices, Magnet AXIOM and Oxygen Forensics Suite 2014 were used using the National Institute of Standards Technology (NIST) method. NIST has work guidelines for both policies and standards to ensure that each examiner follows the same workflow so that their work is documented and the results can be repeated and maintained. The results of the research in the Magnet AXIOM and Oxygen Forensics Suite 2014 get digital evidence in the form of accounts, conversation texts, and images. This study successfully demonstrated the results of an analysis of forensic devices and digital evidence on Facebook Messenger. The results of the performance evaluation of forensic tools in the acquisition process using AXIOM Magnets are considered the best compared to Oxygen Forensics Suite 2014.",9,3,,,NIST; World Wide Web; Mobile phone; Digital evidence; Computer science; Identification (information),,,,,http://kursorjournal.org/index.php/kursor/article/view/152 https://kursorjournal.org/index.php/kursor/article/download/152/95,http://dx.doi.org/10.28961/kursor.v9i3.152,,10.28961/kursor.v9i3.152,2915261871,,0,000-225-165-729-99X; 070-740-822-724-693; 087-863-544-029-830,0,true,cc-by,gold 082-306-008-484-107,Review of: Practical Digital Imaging—Applications and Techniques,2012-04-19,2012,journal article,Journal of Forensic Sciences,00221198,Wiley,United States,B S Rod Englert,,57,3,849,849,Digital imaging; Computer science; Computer hardware,,,,,http://onlinelibrary.wiley.com/doi/10.1111/j.1556-4029.2012.02061.x/abstract http://onlinelibrary.wiley.com/doi/10.1111/j.1556-4029.2012.02061.x/full,http://dx.doi.org/10.1111/j.1556-4029.2012.02061.x,,10.1111/j.1556-4029.2012.02061.x,2170251726,,0,,0,false,, 082-417-796-624-941,A near-miss management system architecture for the forensic investigation of software failures.,2015-10-28,2015,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,M.A. Bihina Bella; Jan H. P. Eloff,"Abstract Digital forensics has been proposed as a methodology for doing root-cause analysis of major software failures for quite a while. Despite this, similar software failures still occur repeatedly. A reason for this is the difficulty of obtaining detailed evidence of software failures. Acquiring such evidence can be challenging, as the relevant data may be lost or corrupt following a software system's crash. This paper proposes the use of near-miss analysis to improve on the collection of evidence for software failures. Near-miss analysis is an incident investigation technique that detects and subsequently analyses indicators of failures. The results of a near-miss analysis investigation are then used to detect an upcoming failure before the failure unfolds. The detection of these indicators – known as near misses – therefore provides an opportunity to proactively collect relevant data that can be used as digital evidence, pertaining to software failures. A Near Miss Management System (NMS) architecture for the forensic investigation of software failures is proposed. The viability of the proposed architecture is demonstrated through a prototype.",259,,234,245,Architecture; Software system; Crash; Management system; Near miss; Software; Digital evidence; Computer security; Computer science; Digital forensics,Digital evidence; Digital forensics; Near miss; Near-miss management system (NMS); Software failure,,,,https://www.sciencedirect.com/science/article/pii/S0379073815004314 https://www.ncbi.nlm.nih.gov/pubmed/26727616 https://europepmc.org/abstract/MED/26727616 https://repository.up.ac.za/handle/2263/56011 https://repository.up.ac.za/bitstream/2263/56011/1/Bella_NearMiss_2016.pdf,http://dx.doi.org/10.1016/j.forsciint.2015.10.007,26727616,10.1016/j.forsciint.2015.10.007,2193388524,,0,001-808-197-846-489; 002-366-662-229-867; 005-867-919-846-09X; 005-902-773-372-039; 009-662-282-544-479; 011-905-511-601-111; 013-081-766-379-747; 013-887-768-477-01X; 021-448-156-714-737; 031-611-368-763-776; 042-185-248-691-579; 045-920-797-897-761; 045-930-609-986-652; 056-639-947-708-941; 058-507-647-155-191; 064-314-255-895-12X; 079-314-174-384-71X; 079-406-212-807-655; 109-985-341-960-184; 110-398-250-080-48X; 114-542-186-088-354; 114-839-605-739-519; 147-557-846-895-696; 153-054-383-154-973; 166-411-911-305-152; 168-678-724-053-274; 191-707-142-292-682,0,true,,green 082-558-751-788-933,Analisis Forensik Rekayasa Dokumen Digital dengan Metode NIST,2022-08-31,2022,journal article,INFORMAL: Informatics Journal,2503250x,UPT Penerbitan Universitas Jember,,Arizona Firdonsyah; Danur Wijayanto,"Digital Forensics is one of the technological fields contained many sub-fields that can assist technically in collecting digital evidence to be presented in a trial in accordance with applicable law. The example of digital forensics sub-field is Image Forensics, which aims to digitally collect and look for evidentiary facts in determining the authenticity of an image or document that contained images. Various criminal and pornographic cases involving image files are still happening nowadays, therefore forensics on images as evidence is an important key to assist the court in making decisions. This research examines the authenticity of documents in the form of digital letters using National Institute of Standard and Technology (NIST) method by applying the forensic ELA (Error Level Analysis). Several previous researches have proven that the forensic ELA is able to detect modifications that have been made to images. Differences with previous researches and this research are the authors also checked the metadata of the images before performing the ELA examination using Fotoforensics. The results of the analysis shows a high level of consistency in the images and writings due to the accumulation of white dots in several places such as in headers, logos, header’s writings, text contents, footnotes, and signatures.",7,2,121,121,Digital forensics; Header; Computer science; Consistency (knowledge bases); NIST; Metadata; Field (mathematics); Forensic examination; Digital image; Key (lock); Digital evidence; Information retrieval; Data science; World Wide Web; Image (mathematics); Computer security; Artificial intelligence; Engineering; Image processing; Natural language processing; Computer network; Mathematics; Forensic engineering; Pure mathematics,,,,,,http://dx.doi.org/10.19184/isj.v7i2.31198,,10.19184/isj.v7i2.31198,,,0,,0,true,,gold 082-660-953-020-851,Feature: Challenges ahead on the digital forensics and audit trails,,2014,journal article,Network Security,13534858,Mark Allen Group,Netherlands,Steve Gold,"Digital forensics is a relatively new science in the increasing complex field of IT security, data governance and auditing. This was why the Forensic Science Society recently held its inaugural conference in York on the topic - at which a range of speakers drawn from the rapidly-emerging industry gave a series of presentations - along with a discussion of some of the key issues that affecting IT security professionals at the sharp end. Digital forensics is a relatively new science in the increasingly complex field of IT security, data governance and auditing. This was why the Forensic Science Society recently held its inaugural conference in York. A range of speakers drawn from this rapidly-emerging industry revealed a lot about the challenges that face even senior and well-experienced IT security professionals, largely as a result of the rapid pace of evolution in the security ecosphere. Steve Gold on the issues raised at the event",2014,6,12,17,Data governance; Audit; Pace; Face (sociological concept); Ecosphere; Computer security; Public relations; Computer science; Event (computing); Audit trail; Digital forensics,,,,,https://doi.org/10.1016/S1353-4858(14)70060-1 https://www.sciencedirect.com/science/article/abs/pii/S1353485814700601 http://www.sciencedirect.com/science/article/pii/S1353485814700601 https://www.sciencedirect.com/science/article/abs/pii/S1353485814700601#! https://dblp.uni-trier.de/db/journals/ns/ns2014.html#Gold14a https://www.infona.pl/resource/bwmeta1.element.elsevier-57a1405b-e0ff-39df-97db-9bb4da6d536f,http://dx.doi.org/10.1016/s1353-4858(14)70060-1,,10.1016/s1353-4858(14)70060-1,2478359822,,0,090-966-234-339-091,1,false,, 082-793-334-095-933,Scenario-Based Digital Forensics Challenges in Cloud Computing,2016-10-20,2016,journal article,Symmetry,20738994,MDPI AG,Switzerland,Erik Miranda Lopez; Seo Yeon Moon; Jong Hyuk Park,"The aim of digital forensics is to extract information to answer the 5Ws (Why, When, Where, What, and Who) from the data extracted from the evidence. In order to achieve this, most digital forensic processes assume absolute control of digital evidence. However, in a cloud environment forensic investigation, this is not always possible. Additionally, the unique characteristics of cloud computing create new technical, legal and architectural challenges when conducting a forensic investigation. We propose a hypothetical scenario to uncover and explain the challenges forensic practitioners face during cloud investigations. Additionally, we also provide solutions to address the challenges. Our hypothetical case scenario has shown that, in the long run, better live forensic tools, development of new methods tailored for cloud investigations and new procedures and standards are indeed needed. Furthermore, we have come to the conclusion that forensic investigations biggest challenge is not technical but legal.",8,10,107,,Digital evidence; Cloud forensics; Scenario based; Computer security; Computer science; Cloud computing; Digital forensics,,,,Ministry of Science ICT and Future Planning,https://www.mdpi.com/2073-8994/8/10/107/pdf https://dblp.uni-trier.de/db/journals/symmetry/symmetry8.html#LopezMP16 https://doaj.org/article/16744493008a4c63a18fc76483706aef https://ui.adsabs.harvard.edu/abs/2016Symm....8..107M/abstract https://core.ac.uk/display/90726715 https://www.mdpi.com/2073-8994/8/10/107,http://dx.doi.org/10.3390/sym8100107,,10.3390/sym8100107,2538056117,,0,000-360-120-513-679; 001-148-044-584-317; 011-972-444-921-827; 017-708-113-657-756; 019-119-495-482-994; 023-338-081-058-709; 025-319-861-345-580; 027-031-165-049-753; 028-180-038-189-484; 028-290-062-141-840; 029-934-518-651-564; 035-448-415-847-226; 042-767-661-429-064; 047-221-550-114-462; 048-001-521-822-787; 049-977-511-720-26X; 050-032-081-738-330; 052-152-063-024-042; 058-122-722-153-464; 058-631-300-195-90X; 061-960-915-134-527; 074-503-636-433-987; 083-322-626-930-350; 086-091-202-010-191; 086-365-780-774-340; 091-619-263-117-914; 092-655-509-442-333; 100-459-328-094-990; 115-547-184-477-216; 116-798-667-947-625; 121-704-965-852-836; 124-912-663-881-389; 125-371-043-627-395; 144-124-797-675-052; 148-434-515-794-491; 148-732-709-522-772; 156-313-798-378-998; 166-183-210-534-575; 170-108-067-251-840; 171-483-137-477-150; 179-568-985-512-784,10,true,cc-by,gold 082-851-209-039-37X,Towards reliable digital forensics investigations through measurement science,2020-01-03,2020,journal article,WIREs Forensic Science,25739468,Wiley,,Nicolas Hughes; Umit Karabiyik,,2,4,,,Data science; Measurement science; Computer science; Digital forensics,,,,,https://wires.onlinelibrary.wiley.com/doi/10.1002/wfs2.1367 https://onlinelibrary.wiley.com/doi/full/10.1002/wfs2.1367,http://dx.doi.org/10.1002/wfs2.1367,,10.1002/wfs2.1367,2998225505,,0,000-084-741-857-185; 000-225-165-729-99X; 004-652-388-189-304; 010-963-610-208-920; 011-340-105-227-149; 015-084-347-434-584; 020-885-011-437-897; 021-039-461-635-181; 023-418-828-545-549; 030-178-593-043-926; 036-112-898-081-145; 038-509-596-583-914; 043-093-846-816-675; 047-386-524-667-691; 054-004-313-233-495; 064-549-392-650-90X; 104-153-499-789-950; 104-787-005-142-28X; 106-964-315-836-68X; 114-315-827-345-69X; 131-807-250-432-699; 131-948-799-258-180,5,false,, 082-858-847-767-875,The Role of Social Media Forensics in Digital Forensics,,2022,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Vivekananth. P,,,,,,,,,,,,http://dx.doi.org/10.2139/ssrn.4202753,,10.2139/ssrn.4202753,,,0,,0,false,, 082-965-731-295-793,Towards green frameworks for digital forensics investigation,2013-01-31,2013,journal article,Journal of Convergence Information Technology,19759320; 22339299,AICIT,South Korea,Ali Dehghantanha; Ramlan Mahmod; Nur Izura Udzir,"Despite the fact that digital forensics involves strict procedures and complies with fixed regulations and principles, but as this paper presents, there are plenty of opportunities that can be practically employed in digital forensics to make this science greener. Virtualization can cost effectively reduce the number of workstations running forensic tools in the lab. Cloud computing and consolidating; servers and storage devices in green data centers not only facilitate managing and securing services but also decline the number of required network and cooling facilities. Forensic labs can also be optimized with regard to environmental preservation. Using remote protocols and digitalizing paperwork procedures are environmentally helpful practices to accelerate investigation progress as; well. Improving electrical power needs of labs and forensic devices is another issue that should be taken into consideration. Employing storage devices with optimal energy usage in digital forensics may highly reduce energy consumption. This paper study established green technologies particularly in information technology field and suggests a framework for implementing compatible techniques in digital forensics in order to reduce greenhouse gas pollutants, limit carbon emissions, and preserve the environment.",8,2,669,678,Risk analysis (engineering); Information technology; Energy consumption; Field (computer science); Computer security; Computer science; Virtualization; Workstation; Cloud computing; Digital forensics; Server,,,,,http://psasir.upm.edu.my/id/eprint/30595/ https://core.ac.uk/display/153811845 https://core.ac.uk/download/153811845.pdf,http://dx.doi.org/10.4156/jcit.vol8.issue2.80,,10.4156/jcit.vol8.issue2.80,2078143495,,0,,4,true,,green 082-979-454-097-058,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,37,,301203,301203,Computer science; Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00111-6,,10.1016/s2666-2817(21)00111-6,,,0,,0,true,,bronze 083-400-942-048-619,Comparative Analysis of Forensic Software on Android-based Blackberry Messenger using NIJ Framework,2018-11-01,2018,journal article,Proceeding of the Electrical Engineering Computer Science and Informatics,2407439x,Institute of Advanced Engineering and Science,," Riadi; Sunardi Sunardi; Arizona Firdonsyah","Instant Messaging application is the most widely used application all over the world. Blackberry Messenger is a multiplatform instant messaging with lots of features that can be a magnet for many people to use Blackberry Messenger for commiting digital crimes. In the process of investigating digital crime cases, digital evidences are required. To obtain digital evidence, a set of forensic tools are needed to conduct forensic process on physical evidences. The topic of this research is to describe the forensic process and to compare the current forensic tools used based on acquired digital evidences by using method that refers to mobile device forensic guidelines made by the National Institute of Justice (NIJ). The forensic tools used in this research are Magnet AXIOM, Belkasoft Evidence Center, and MOBILedit Forensic Express. The outcome shows that Magnet AXIOM has the highest capability to obtain digital evidences, Belkasoft Evidence Center has superiority in terms of data text acquisition, and MOBILedit Forensic Express has superiority in physical evidence preserving and cloning.",5,1,472,477,Forensic science; Mobile device; Data science; Software; Digital evidence; Instant messaging; Computer science; Android (operating system); Digital forensics,,,,,http://journal.portalgaruda.org/index.php/EECSI/article/view/1615 http://journal.portalgaruda.org/index.php/EECSI/article/download/1615/1128 https://core.ac.uk/download/pdf/296976143.pdf,http://dx.doi.org/10.11591/eecsi.v5.1615,,10.11591/eecsi.v5.1615,2981464727,,0,002-633-335-300-244; 006-700-167-776-341; 055-473-899-043-485; 185-798-265-234-254,0,true,, 083-440-224-273-957,Book Review: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Stephen Larson,"Sammons, John. (2012). The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Waltham, MA: Syngress, 208 pages, Print Book ISBN: 9781597496612. eBook ISBN : 9781597496629. Print: US $29.95. eBook: US$20.97. Includes exercises, case studies, references, and index. Reviewed by Stephen Larson, PhD. Assistant Professor, Slippery Rock University of PA The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics is well-named–it really is very basic. And it should be, as the book’s intended audience includes entry-level digital forensics professionals and complimentary fields such as law enforcement, legal, and general information security. Though the copyright is 2012, some of the data is from 2009, and there is mention of estimates for 2010. (see PDF for full review)",9,1,83,85,Engineering; World Wide Web; Assistant professor; Index (publishing); Law enforcement; Information security; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#Larson14 https://www.mendeley.com/catalogue/053135be-1606-3571-9356-cb16e93b5830/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1165&context=jdfsl https://commons.erau.edu/jdfsl/vol9/iss1/6/,http://dx.doi.org/10.15394/jdfsl.2014.1165,,10.15394/jdfsl.2014.1165,1566879384,,0,,2,true,cc-by-nc,gold 083-529-261-546-580,Design of expert system for tool selection in digital forensics investigation,2020-07-01,2020,journal article,IOP Conference Series: Materials Science and Engineering,17578981; 1757899x,IOP Publishing,,Erika Ramadhani; Elyza Gustri Wahyuni; Hanif R. Pratama,"Along with the diverse types of electronic goods and digital evidence, techniques have also developed in conducting digital forensic investigations. Another effect is the increase in types and types of tools for conducting digital forensic investigations. The problem is the increasing number of digital forensic tools is not always developed in conjunction with the manual book. So this is what makes the investigator to check the tool to make it suitable for investigations. Choosing the right tool is very important in the investigation process, because each stage of the forensic investigation process has a different treatment for each of its staging. Seeing these conditions, then in this paper we make a system design to facilitate investigators in choosing the right digital forensic tool and in accordance with using an expert system. The design system shows that it's still needed to confirm to an expert to get a match output if there is a new rule. Later this system will be implemented with website technology.",852,1,012137,,Software engineering; Selection (linguistics); Digital evidence; Design systems; Systems design; Computer science; Process (engineering); Expert system; Digital forensics,,,,,http://ui.adsabs.harvard.edu/abs/2020MS&E..852a2137R/abstract https://iopscience.iop.org/article/10.1088/1757-899X/852/1/012137,http://dx.doi.org/10.1088/1757-899x/852/1/012137,,10.1088/1757-899x/852/1/012137,3044515827,,0,004-349-162-988-304; 012-857-477-749-00X; 055-856-741-899-572; 070-450-084-258-436; 110-850-368-587-487; 139-527-080-444-375,1,true,,gold 084-021-092-390-691,"Control systems/SCADA forensics, what's the difference?",,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,R.M. van der Knijff,,11,3,160,174,SCADA; Information technology; Network security; Crash; Business continuity; USable; Field (computer science); Computer security; Computer science; Process safety,,,,Dutch National Coordinator for Security and Counterterrorism,https://doi.org/10.1016/j.diin.2014.06.007 https://www.sciencedirect.com/science/article/pii/S1742287614000814 https://dl.acm.org/citation.cfm?id=2724492 https://dl.acm.org/doi/10.1016/j.diin.2014.06.007 http://www.sciencedirect.com/science/article/pii/S1742287614000814,http://dx.doi.org/10.1016/j.diin.2014.06.007,,10.1016/j.diin.2014.06.007,2009166708,,0,007-472-112-945-149; 011-691-926-649-618; 013-330-516-271-455; 017-815-064-018-299; 024-806-994-188-875; 037-321-675-678-849; 050-572-314-303-635; 056-715-378-869-201; 065-760-418-407-837; 074-933-143-629-826; 117-132-049-546-221; 121-437-625-840-931; 127-188-165-826-250; 128-790-975-772-352; 149-984-104-390-727; 177-696-123-391-61X; 182-848-793-036-01X; 189-104-249-595-291,37,false,, 084-161-464-980-559,Method of Digital Content Tort Distribute and Forensics,,2013,journal article,Video Engineering,,,,Tang Shiju,"By combining with characteristics of social network open widely and asymmetric digital watermarking technology leakage keys difficultly, a method of the digital content tort distribute and forensics is presented. It uses asymmetric digital watermarking algorithm loading the inseparable of copyright information to meet the requirements of difficult to be forged and quite good attack- resisting capability. Watermarks are extracted from the digital contents which have been attacked in the process of network transmission. Watermarks are transformed into frequency domain, then extracted tort information through the clustering algorithm. Finally, this method is simulated and analyzed. Results show that it has higher security and forensics integrity and can prevent illegal copy and proliferation, so that it protects intellectual copyright rights.",,,,,Digital watermarking; Frequency domain; Tort; Digital content; Computer security; Computer science; Cluster analysis,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-DSSS201316022.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-DSSS201316022.htm,,,2361225265,,0,,0,false,, 084-240-004-733-026,Cybercrimes Solutions using Digital Forensic Tools,2015-11-08,2015,journal article,International Journal of Wireless and Microwave Technologies,20761449; 20769539,MECS Publisher,,Dhwaniket Ramesh Kamble; Nilakshi Jain; Swati Deshpande,"The crimes using computers is growing with rapid speed. As computer crimes have hit up to a high mark, the tools used to fight such crimes is budding faster. In today's world the use of Digital Forensics have also become vital. Digital Forensics is a step-by-step process of scientific methods and techniques to investigate crime obtained from digital evidences. For investigating the digital evidence there are many Digital Forensic tools which are used to investigate digital crimes by identifying the digital evidences. The study results in giving the solutions for Digital Forensic tools for investigators looking to spread out their serviceability in using Digital Forensic tools.",5,6,11,18,Engineering; Digital evidence; Serviceability (computer); Computer security; Process (engineering); Computer forensics; Digital forensics,,,,,http://www.mecs-press.org/ijwmt/ijwmt-v5-n6/v5n6-2.html http://www.mecs-press.org/ijwmt/ijwmt-v5-n6/IJWMT-V5-N6-2.pdf,http://dx.doi.org/10.5815/ijwmt.2015.06.02,,10.5815/ijwmt.2015.06.02,2198066681,,0,092-733-362-703-818,2,true,,bronze 084-366-417-503-417,The State of Art in Digital Audio Forensic Authentication,,2014,journal article,Chinese Journal of Forensic Sciences,16712072,,,Zeng Jin-hu,"With the popularity of digital recorders, and the popular trend of audio tampering methods, the traditional techniques have met great challenges in the current practice of digital audio forensic authentication. The latest progress in the field of the pattern recognition and artificial intelligence offers a feasible way for digital audio forensic authentication. In this paper,the latest achievements of digital audio forensic authentication in the fields of the machine learning and pattern recognition were reviewed and the current main methods in the practice of digital audio forensic authentication were analyzed. Then, problems, challenges, and future trends of digital audio forensic authentication were discussed. It was concluded that the collaborative coexistence of traditional methods based on expert experience and statistical quantitative computation techniques would be an inevitable trend and an efficient solution for digital audio forensic authentication.",,,,,Authentication (law); Pattern recognition (psychology); Digital recording; Popularity; State of art; Current practice; Field (computer science); Computer science; Multimedia; Digital audio,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201404013.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201404013.htm,,,2368419307,,0,,0,false,, 084-473-799-141-231,Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies,,2017,journal article,International Journal of Information Security and Privacy,19301650; 19301669,IGI Global,United Kingdom,Regner Sabillon; Jordi Serra-Ruiz; Víctor Cavaller; Jeimy J. Cano,"This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing prevention knowledge and lessons learned. The authors also introduce a compact cyber forensics model for diverse technological ecosystems called Cyber Forensics Model in Digital Ecosystems CFMDE. Transferring the knowledge, international collaboration, best practices and adopting new digital forensic tools, methodologies and techniques will be hereinafter paramount to obtain digital evidence, enforce organizational cybersecurity policies, mitigate security threats, fight anti-forensics practices and indict cybercriminals. The global Digital Forensics community ought to constantly update current practices to deal with cybercriminality and foreseeing how to prepare to new technological environments where change is always constant.",11,2,25,37,Chain of custody; Best practice; Cybercrime; Digital evidence; Computer security; Computer science; Computer forensics; Digital forensics,,,,,https://doi.org/10.4018/IJISP.2017040103 https://dl.acm.org/doi/10.4018/IJISP.2017040103 https://www.ideas.repec.org/a/igg/jisp00/v11y2017i2p25-37.html https://dl.acm.org/citation.cfm?id=3077898 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.2017040103 https://dblp.uni-trier.de/db/journals/ijisp/ijisp11.html#SabillonSCC17 https://www.igi-global.com/article/digital-forensic-analysis-of-cybercrimes/178643,http://dx.doi.org/10.4018/ijisp.2017040103,,10.4018/ijisp.2017040103,2594254612,,0,012-459-130-312-50X; 020-944-423-224-895; 021-850-998-857-676; 024-381-049-056-789; 028-180-038-189-484; 028-828-573-289-865; 028-874-299-732-939; 030-634-360-648-226; 032-697-093-668-898; 038-668-970-194-854; 041-026-099-291-867; 045-645-917-018-028; 047-630-600-014-492; 050-612-532-454-179; 057-705-375-581-007; 067-950-012-629-210; 092-506-898-894-624; 101-914-860-452-14X; 111-090-978-711-139; 127-948-386-055-225; 132-355-634-397-986; 133-397-275-695-990; 138-421-957-980-413; 140-821-103-436-654; 143-562-788-834-457; 170-299-458-679-224; 177-696-123-391-61X; 190-065-821-748-92X; 199-172-967-270-034,8,false,, 084-624-696-297-925,Let the robots do it! – Taking a look at Robotic Process Automation and its potential application in digital forensics,,2019,journal article,Forensic Science International: Reports,26659107,Elsevier BV,,Alisha Asquith; Graeme Horsman,"Abstract The challenges of tackling increasing caseloads, large volumes of digital data and maintaining examination efficiency in order to adhere to tight criminal justice system deadlines persist. As the field looks towards techniques for improving efficiency, forms of automation are both simultaneously touted as a potential solution, whilst also attracting criticism. The potential for techniques which mechanise parts of the digital forensic examination process, and do it reliably, is great, however developing the capability to do this remains a challenge. This work provides an introductory discussion to Robotic Process Automation, a form of service task automation. Its potential application is debated and two case studies are offered demonstrating potential areas of applicability. An objective evaluation is offered, debating whether technology has a place in improving efficiency in this field.",1,,100007,,Risk analysis (engineering); Automation; Process automation system; Task (project management); Field (computer science); Service (systems architecture); Computer science; Process (engineering); Digital forensics; Robot,,,,"School of Science, Engineering & Design, Teesside University, Middlesbrough, United Kingdom",https://research.tees.ac.uk/ws/files/8028012/Let_the_robots_do_it.pdf https://research.tees.ac.uk/en/publications/let-the-robots-do-it-taking-a-look-at-robotic-process-automation- https://www.sciencedirect.com/science/article/pii/S2665910719300076 https://core.ac.uk/download/pdf/225624897.pdf,http://dx.doi.org/10.1016/j.fsir.2019.100007,,10.1016/j.fsir.2019.100007,2956049776,,0,005-859-821-142-158; 014-713-031-827-317; 014-767-056-602-687; 023-858-572-607-02X; 025-319-861-345-580; 031-522-316-310-252; 042-134-300-645-458; 050-366-537-900-675; 050-513-243-638-138; 059-220-411-265-931; 061-549-181-856-861; 065-520-849-771-46X; 080-196-042-005-758; 090-138-553-295-037; 100-136-470-500-690; 131-068-965-289-412; 144-724-915-219-138; 150-249-549-372-358; 154-517-106-328-503,25,true,"CC BY, CC BY-NC-ND",gold 084-939-441-327-367,"Media Watermarking, Security, and Forensics - StegoAppDB: a Steganography Apps Forensics Image Database",2019-01-13,2019,journal article,electronic imaging,,,,Jennifer Newman; Li Lin; Wenhao Chen; Stephanie Reinders; Yangxiao Wang; Min Wu; Yong Guan,"In this paper, we present a new reference dataset simulating digital evidence for image steganography. Steganography detection is a digital image forensic topic that is relatively unknown in practical forensics, although stego app use in the wild is on the rise. This paper introduces the first database consisting of mobile phone photographs and stego images produced from mobile stego apps, including a rich set of side information, offering simulated digital evidence. StegoAppDB, a steganography apps forensics image database, contains over 810,000 innocent and stego images using a minimum of 10 different phone models from 24 distinct devices, with detailed provenanced data comprising a wide range of ISO and exposure settings, EXIF data, message information, embedding rates, etc. We develop a camera app, Cameraw, specifically for data acquisition, with multiple images per scene, saving simultaneously in both DNG and high-quality JPEG formats. Stego images are created from these original images using selected mobile stego apps through a careful process of reverse engineering. StegoAppDB contains cover-stego image pairs including for apps that resize the stego dimensions. We retainthe original devices and continue to enlarge the database, and encourage the image forensics community to use StegoAppDB. While designed for steganography, we discuss uses of this publicly available database to other digital image forensic topics.",2019,5,536-1,536-12,Steganalysis; Steganography; Set (abstract data type); JPEG; Reverse engineering; Information retrieval; Mobile phone; Digital evidence; Computer science; Digital image,,,,,https://www.ingentaconnect.com/content/ist/ei/2019/00002019/00000005/art00011 https://dblp.uni-trier.de/db/journals/corr/corr1904.html#abs-1904-09360 https://lib.dr.iastate.edu/cgi/viewcontent.cgi?article=1005&context=csafe_conf https://lib.dr.iastate.edu/csafe_pubs/61/ https://doi.org/10.2352/ISSN.2470-1173.2019.5.MWSF-536,https://www.ingentaconnect.com/content/ist/ei/2019/00002019/00000005/art00011,,,2975621618,,0,,4,false,, 085-204-724-336-334,Computer Forensic Methodology and Tools,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Hriday Raval,"The Computer Forensic has long played a vital role across the domains - Cyber Crimes Investigations, Incident Response, Cyber Threat Intelligence and Corporate Cybersecurity. In the past Digital Evidence lost their validity in the Courtrooms. Prior, similar to some other Physical Evidence, courts used to consider evidence procured from computer systems as genuine. In any case, as time passed, we figured out the fact that it is so natural to corrupt, destroy, or alter computer data, all three stages - storage, network and computation. In the least complex model, if an individual basically opens a computer file, it's absolutely impossible to demonstrate the last date that the document was refreshed aka updated. Computers are intended to record the time and date of an accessed file on its own by default features of an operating system. Examiners later understood that they have to build up the essential devices and procedures to separate the necessary data from computers without influencing the data all the while. With time, specialists concocted systems to securely recover data, preserve and analyze to derive the insights useful in Computer related Crimes. This part of forensic science is currently well known as Computer Forensics.",,,15,20,Forensic science; Data science; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.02,http://dx.doi.org/10.46293/4n6/2020.02.02.02,,10.46293/4n6/2020.02.02.02,3022560827,,0,,0,false,, 085-666-602-084-614,KES - Semantic Representation and Integration of Digital Evidence,,2013,journal article,Procedia Computer Science,18770509,Elsevier BV,,Spyridon Dosis; Irvin Homem; Oliver Popov,"The ever-increasing complexity and sophistication of computer and network attacks challenge society's dependability on digital infrastructure. Digital investigations recover and reconstruct the digital trails of such events and may employ practices from various subfields (computer, network forensics), each with its own set of techniques and tools. Integration of evidence from heterogeneous sources of data (e.g. disk images, network packet captures, logs) is often a manual and time- consuming process relying significantly on the investigator's expertise. In this paper, we propose and develop an approach, based on the Semantic Web framework, for ontologically representing and integrating digital evidence. The presented approach enhances existing forensic analysis techniques by providing partial and eventually full automation of the investigative process.",22,,1266,1275,Forensic science; Network packet; Knowledge representation and reasoning; Information system; Semantic Web; Data science; Digital evidence; Computer science; Process (engineering); Network forensics; Dependability,,,,,https://doi.org/10.1016/j.procs.2013.09.214 https://dblp.uni-trier.de/db/conf/kes/kes2013.html#DosisHP13 https://core.ac.uk/display/82030201 http://su.diva-portal.org/smash/record.jsf?pid=diva2%3A676278 http://www.sciencedirect.com/science/article/pii/S1877050913010077 http://www.diva-portal.org/smash/record.jsf?pid=diva2:676278 https://www.sciencedirect.com/science/article/pii/S1877050913010077 https://core.ac.uk/download/pdf/82030201.pdf,http://dx.doi.org/10.1016/j.procs.2013.09.214,,10.1016/j.procs.2013.09.214,1985620065,,0,006-008-915-210-060; 011-051-740-313-213; 014-012-834-363-307; 019-831-293-743-518; 024-559-797-435-528; 024-735-069-822-749; 030-758-631-051-726; 033-877-222-136-260; 038-793-093-462-716; 061-549-181-856-861; 085-958-650-852-408; 104-758-205-558-797; 132-081-686-366-385; 134-927-490-231-285; 178-883-713-153-793; 180-327-460-336-608; 184-948-841-629-735,18,true,,gold 085-816-961-933-906,Temporal Forensics and Anti-Forensics for Motion Compensated Video,,2012,journal article,IEEE Transactions on Information Forensics and Security,15566013; 15566021,Institute of Electrical and Electronics Engineers (IEEE),United States,Matthew C. Stamm; W. S. Lin; K.J.R. Liu,"Due to the ease with which digital information can be altered, many digital forensic techniques have been developed to authenticate multimedia content. Similarly, a number of anti-forensic operations have recently been designed to make digital forgeries undetectable by forensic techniques. However, like the digital manipulations they are designed to hide, many anti-forensic operations leave behind their own forensically detectable traces. As a result, a digital forger must balance the trade-off between completely erasing evidence of their forgery and introducing new evidence of anti-forensic manipulation. Because a forensic investigator is typically bound by a constraint on their probability of false alarm (P_fa), they must also balance a trade-off between the accuracy with which they detect forgeries and the accuracy with which they detect the use of anti-forensics. In this paper, we analyze the interaction between a forger and a forensic investigator by examining the problem of authenticating digital videos. Specifically, we study the problem of adding or deleting a sequence of frames from a digital video. We begin by developing a theoretical model of the forensically detectable fingerprints that frame deletion or addition leaves behind, then use this model to improve upon the video frame deletion or addition detection technique proposed by Wang and Farid. Next, we propose an anti-forensic technique designed to fool video forensic techniques and develop a method for detecting the use of anti-forensics. We introduce a new set of techniques for evaluating the performance of anti-forensic operations and develop a game theoretic framework for analyzing the interplay between a forensic investigator and a forger. We use these new techniques to evaluate the performance of each of our proposed forensic and anti-forensic techniques, and identify the optimal actions of both the forger and forensic investigator.",7,4,1315,1329,Frame (networking); Forensic science; Message authentication code; Set (psychology); Information retrieval; False alarm; Computer security; Computer science; Computer forensics; Data compression; Digital forensics,,,,,http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000006222325 https://dblp.uni-trier.de/db/journals/tifs/tifs7.html#StammLL12 http://dx.doi.org/10.1109/TIFS.2012.2205568 https://ieeexplore.ieee.org/document/6222325/ https://dl.acm.org/doi/10.1109/TIFS.2012.2205568 https://www.infona.pl/resource/bwmeta1.element.ieee-art-000006222325 https://dx.doi.org/10.1109/TIFS.2012.2205568 http://ieeexplore.ieee.org/document/6222325/ http://sig.umd.edu/publications/Stamm_TIFS_201208.pdf,http://dx.doi.org/10.1109/tifs.2012.2205568,,10.1109/tifs.2012.2205568,2016828421,,0,006-715-003-756-565; 012-624-635-540-803; 015-717-506-603-742; 018-172-332-749-013; 023-624-827-239-301; 024-242-565-906-946; 024-793-013-451-77X; 031-876-583-652-183; 040-639-509-253-00X; 041-796-476-831-023; 045-294-718-031-754; 051-035-217-903-949; 055-256-082-961-475; 056-148-934-103-963; 068-413-789-098-79X; 077-218-726-181-521; 079-709-089-662-769; 083-097-133-928-799; 092-522-060-753-940; 106-688-419-298-857; 120-453-234-664-794; 122-164-403-164-304; 135-262-782-091-897; 140-408-113-219-371; 166-999-959-693-14X,162,true,,green 086-018-338-372-932,Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email,2017-03-30,2017,journal article,JISKA (Jurnal Informatika Sunan Kalijaga),25280074; 25275836,Al-Jamiah Research Centre,,Muhammad Nur Faiz; Rusydi Umar; Anton Yudhana,"Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.",1,3,108,114,The Internet; Engineering; World Wide Web; Browser security; Sales operations; Software; Digital data; Computer security; Network forensics; Computer forensics; Digital forensics,,,,,https://conference.uin-suka.ac.id/saintek/JISKA/article/view/1113 http://ejournal.uin-suka.ac.id/saintek/JISKA/article/download/13-02/1025 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/13-02 http://202.0.92.5/saintek/JISKA/article/view/13-02 https://core.ac.uk/download/267117312.pdf,http://dx.doi.org/10.14421/jiska.2017.13-02,,10.14421/jiska.2017.13-02,2763218909,,0,008-441-081-714-181; 028-043-751-937-264; 039-774-603-243-832; 043-658-180-859-745; 065-870-242-356-219; 071-290-587-503-241; 085-138-340-371-322; 104-590-685-835-768; 150-705-862-708-66X,3,true,cc-by-nc,gold 086-248-055-124-414,Sample Preparation For Pesticide Analysis in A Forensic Toxicology Laboratory: A Review,2018-05-07,2018,journal article,Journal of Forensic Sciences and Digital Investigation,26377136,Northern California Open Access Publications,,,,,,27,45,Forensic toxicology; Toxicology; Computational biology; Biology; Chemistry; Chromatography,,,,,,http://dx.doi.org/10.29199/2637-7136/fsdi-101016,,10.29199/2637-7136/fsdi-101016,,,0,,0,true,cc-by,gold 086-653-920-850-621,Dataset construction challenges for digital forensics,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Graeme Horsman; James R. Lyle,,38,,301264,,Work (electrical); Order (exchange); Best practice; Data science; Test (assessment); Task (project management); Field (computer science); Computer science; Reliability (statistics); Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S2666281721001815,http://dx.doi.org/10.1016/j.fsidi.2021.301264,,10.1016/j.fsidi.2021.301264,3193013883,,0,000-084-741-857-185; 004-652-388-189-304; 005-116-312-278-527; 006-933-430-647-14X; 009-512-003-529-193; 029-537-963-034-821; 030-178-593-043-926; 032-451-540-235-796; 032-994-506-285-854; 036-112-898-081-145; 043-542-316-129-203; 044-914-554-944-765; 047-386-524-667-691; 054-004-313-233-495; 068-278-591-200-390; 075-950-021-558-098; 077-287-216-746-675; 079-608-144-438-784; 082-851-209-039-37X; 089-925-000-216-519; 104-153-499-789-950; 132-772-069-558-472; 134-927-490-231-285; 152-714-058-023-050; 159-513-941-346-557,5,false,, 086-705-619-249-214,Preparing for the age of the digital palimpsest,2012-08-31,2012,journal article,Library Hi Tech,07378831,Emerald,United Kingdom,Jason Bengtson,"Purpose – The purpose of this paper is to define and stimulate interest in a potential new specialty within the information science field.Design/methodology/approach – Sources on digital forensics and digital archeology are discussed, and the topic is examined critically from a librarian perspective. The author examines the possibility of an information science specialty pursuing the reconstruction of “digital palimpsests”, where data that later becomes historically significant has been deleted or partially overwritten on digital media.Findings – The author identifies at least one key incident (the NASA moon landing tapes) where this potential field has already started to be defined. Examination of the literature indicates that emphasis in data recovery to this point has centered on the needs of law enforcement and disaster recovery rather than on the considerations of manuscript preservation, recovery, and curation. The author emphasizes the need for librarians to bring together the skills of multiple fi...",30,3,513,522,Information technology; Disaster recovery; Data management; Data science; Law enforcement; Computer science; Digital library; Engineering ethics; Digital forensics; Data curation; Information science,,,,,https://dblp.uni-trier.de/db/journals/lht/lht30.html#Bengtson12 https://www.emerald.com/insight/content/doi/10.1108/07378831211266636/full/html https://core.ac.uk/display/33381889 https://www.emeraldinsight.com/doi/abs/10.1108/07378831211266636 https://core.ac.uk/download/33381889.pdf,http://dx.doi.org/10.1108/07378831211266636,,10.1108/07378831211266636,2042602410,,0,016-983-559-523-04X; 040-576-453-232-211; 044-834-247-088-997; 074-933-143-629-826; 081-056-635-953-384; 113-785-550-473-284; 149-881-992-194-908,2,true,,green 086-772-265-875-364,Evidence Based Reconstruction for Digital Forensics,2022-07-15,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Ellen Akongwin Abanga,"Evidence based reconstruction may often be even more illuminating than other traditional evidence gathering strategies, but it is also extremely delicate and unpredictable due to the fact that evidence may not always be conclusive. The integrity of digital evidence is therefore extremely important, particularly when it comes from allegedly unlawful, illegitimate, or harmful activity. Regardless of the good or bad consequences of the acts and activities that created the evidence, the capture and reconstruction of events are critical to the operation of the digital world. Owing to the lack of skill and knowledge of digital forensics in Ghana, it creates a susceptible environment for criminals to continue their operations while avoiding prosecution due to a lack of evidence to prosecute them. The reconstruction of occurrences based on evidence is considered an eminent need for Africa and for that matter Ghana. Hence, the need for well-defined and advanced knowledge in evidence based reconstruction in digital forensics investigation to bridge the gap currently existing. This paper reviews literature on the concept of evidence based reconstruction as a means to advance knowledge on its relevance to the Africa region and Ghana for that matter. This would help forensics investigators to better understand the need for focus on using digital tools for reconstruction and focusing on evidence driven activities in case of crime and investigations. Finally, this paper presents an elaborated view from a literature point of view over the evidence based reconstruction and also helps other fellow colleagues in their quest to further understand the concept. Keywords: Evidence, Reconstruction, Digital evidence, Digital forensics, Investigation.",1,1,185,190,Digital evidence; Digital forensics; Relevance (law); Empirical evidence; Crime scene; Computer science; Data science; Best evidence; Internet privacy; Computer security; Psychology; Political science; Criminology; Epistemology; Law; Medicine; Philosophy; Family medicine,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p30,,10.22624/aims/crp-bk3-p30,,,0,,0,true,,bronze 086-941-914-029-374,Prelim iii - Contents List,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,33,,300991,300991,Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30225-0,,10.1016/s2666-2817(20)30225-0,,,0,,0,true,,bronze 087-342-951-350-054,The Kodak Syndrome: Risks and Opportunities Created by Decentralization of Forensic Capabilities.,2018-07-05,2018,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Eoghan Casey; Olivier Ribaux; Claude Roux,"Forensic science laboratories are being challenged by the expanding decentralization of forensic capabilities, particularly for digital traces. This study recommends laboratories undertake digital transformations to capitalize on the decentralization movement, develop a more comprehensive understanding of crime and security-relevant problems, and play a more central role in problem-solving collaboratively with law enforcement organizations and other stakeholders. A framework for the bilateral transfer of information and knowledge is proposed to magnify the impact of forensic science laboratories on abating crime, strengthening security, and reinforcing the criminal justice system. To accomplish digital transformations, laboratories require personnel with different expertise, including investigative reasoning, knowledge codification, data analytics, and forensic intelligence. Ultimately, this study encourages managers, educators, researchers, and policymakers to look beyond the usefulness of forensic results for solving individual investigations, and to realize the value of combined forensic knowledge and intelligence for developing broader strategies to deal with crime in digitalized society.",64,1,127,136,Criminal justice; Decentralization; Forensic science; Business; Value (ethics); Law enforcement; Forensic intelligence; Engineering ethics; Big data; Problem-oriented policing,Kodak syndrome; big data analysis; forensic intelligence; forensic science; intelligence-led strategies; knowledge management; problem-oriented policing; systematic knowledge reuse,,,,https://europepmc.org/abstract/MED/29975983 https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.13849 https://dialnet.unirioja.es/servlet/articulo?codigo=6794302 https://serval.unil.ch/notice/serval:BIB_9B5E17694E54 https://www.ncbi.nlm.nih.gov/pubmed/29975983 https://pubmed.ncbi.nlm.nih.gov/29975983/,http://dx.doi.org/10.1111/1556-4029.13849,29975983,10.1111/1556-4029.13849,2821019258,,0,010-639-953-090-261; 010-951-806-548-929; 011-524-509-576-368; 014-466-907-950-761; 015-168-306-989-485; 016-609-780-602-820; 017-176-620-267-416; 019-791-004-497-741; 022-358-546-399-506; 031-872-123-976-197; 035-031-257-128-045; 042-944-602-727-47X; 053-522-882-246-521; 056-524-463-164-028; 058-052-081-943-595; 063-257-284-816-393; 067-307-278-774-180; 094-295-279-676-447; 094-768-593-308-084; 106-728-147-372-737; 117-605-535-046-57X; 121-670-778-513-502; 125-939-677-745-616; 142-790-196-752-819,38,false,, 087-597-848-929-337,Awareness and Understanding of Computer Forensics in the Ghana Legal System,2014-03-26,2014,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Michael AdjeiFrempong; Kamal Kant Hiran,"era of Technological age also called digital age, most transactions are conducted electronically. This modern-day paradigm makes way for the possibility of harmful unanticipated information security breaches of both civil and criminal nature. However, there is a tremendous knowledge gap in the legal system concerning computer/digital forensics with respect to digital evidence. Courtroom and Legal issues relevant to computer/digital forensics are extensive and differs with respect to procedural evidence rules that ensure reliability of the evidence so produced in the court of law for fair adjudication. Electronic evidence is very fundamental to the successful handling of cases related to such information security breaches. This paper on the impact of awareness and understanding of computer/digital forensics in the Ghana Legal System especially Judges, with regards to the electronic evidence, laws and jurisprudence covered twenty (20) superior Judges. The findings revealed a gap between the Judges and issues on computer forensics which if not looked at may create problems in relation to the influx of computer related crimes.",89,20,54,59,Internet privacy; Civil law (legal system); Adjudication; Relation (database); Digital evidence; Computer security; Computer science; Information security; Computer forensics; Jurisprudence; Digital forensics,,,,,http://ui.adsabs.harvard.edu/abs/2014IJCA...89t..54A/abstract https://research.ijcaonline.org/volume89/number20/pxc3894640.pdf https://www.ijcaonline.org/archives/volume89/number20/15752-4640,http://dx.doi.org/10.5120/15752-4640,,10.5120/15752-4640,2165564806,,0,048-645-419-219-088; 052-320-348-197-350; 086-103-316-225-727; 087-348-393-776-727; 098-323-575-091-372; 119-385-247-230-234; 124-038-348-278-602; 140-402-089-386-286; 199-172-967-270-034,3,true,,bronze 087-687-602-305-742,Making it Work! Adding a Digital Forensics Unit to Your Laboratory,,2022,journal article,Forensic Science International: Synergy,2589871x,Elsevier BV,,Tracy Walraven,,4,,100256,100256,Digital forensics; Unit (ring theory); Computer science; Computer forensics; Work (physics); Digital evidence; Data science,,,,,,http://dx.doi.org/10.1016/j.fsisyn.2022.100256,,10.1016/j.fsisyn.2022.100256,,,0,,0,true,"CC BY, CC BY-NC-ND",gold 087-788-401-737-824,A STUDY OF FORENSIC IMAGING IN THE ABSENCE OF WRITE-BLOCKERS,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Gary C. Kessler; Gregory H. Carlton,"Best practices in digital forensics demand the use of write-blockers when creating forensic images of digital media, and this has been a core tenet of computer forensics training for decades. The practice is so ingrained that the integrity of images created without a write-blocker are immediately suspect. This paper describes a research framework that compares forensic images acquired with and without utilizing write-blockers in order to understand the extent of the differences, if any, in the resultant forensic copies. We specifically address whether differences are superficial or evidentiary, and we discuss the impact of admitting evidence acquired without write blocking. The experiments compare the changes made to a hard drive and flash drive when imaged and examined with a Windows-based forensics workstation.",9,3,51,58,Digital media; Best practice; Suspect; Flash drive; Forensic imaging; Computer security; Computer science; Multimedia; Computer forensics; Workstation; Digital forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1187&context=jdfsl https://core.ac.uk/display/108502354 https://works.bepress.com/gary_kessler/22/ https://commons.erau.edu/db-security-studies/28/,http://dx.doi.org/10.15394/jdfsl.2014.1187,,10.15394/jdfsl.2014.1187,764792898,,0,157-481-301-540-451,4,true,cc-by-nc,gold 088-597-318-557-237,Towards the Development of a Test Corpus of Digital Objects for the Evaluation of File Format Identification Tools and Signatures,2012-03-09,2012,journal article,International Journal of Digital Curation,17468256,Edinburgh University Library,,Andrew Fetherston; Tim Gollins,"The digital preservation community currently utilises a number of tools and automated processes to identify and validate digital objects. The identification of digital objects is a vital first step in their long-term preservation, but the results returned by tools used for this purpose are lacking in transparency, and are not easily tested or verified. This paper suggests that a test corpus of digital objects is one way of providing this verification and validation, ultimately improving trust in the tools, and providing further stimulus to their development. Issues to be considered are outlined, and attention is drawn to particular examples of existing digital corpora which could conceivably provide a useable framework or starting point for our own communities needs. This paper does not seek to answer all questions in this area, but merely attempts to set out areas for consideration in any next step that is taken.",7,1,16,26,World Wide Web; Information retrieval; Digital preservation; Computer science; File format,,,,,http://www.ijdc.net/index.php/ijdc/article/download/201/270 http://www.ijdc.net/index.php/ijdc/article/view/201 https://core.ac.uk/display/91041797 https://dblp.uni-trier.de/db/journals/ijdc/ijdc7.html#FetherstonG12 https://dx.doi.org/10.2218/ijdc.v7i1.211 http://dx.doi.org/10.2218/ijdc.v7i1.211 https://core.ac.uk/download/pdf/162675717.pdf,http://dx.doi.org/10.2218/ijdc.v7i1.211,,10.2218/ijdc.v7i1.211,2132913549,,0,004-652-388-189-304; 084-728-993-518-663; 120-072-322-429-12X,2,true,cc-by,gold 088-648-039-264-770,SBBox: A Tamper-Resistant Digital Archiving System,,2016,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Monjur Alam,,5,3,122,131,Digital media; Information system; Tamper resistance; Computer science; Multimedia; Wireless,,,,,http://sdiwc.net/digital-library/sbbox-a-tamperresistant-digital-archiving-system.html https://gnosis.library.ucy.ac.cy/handle/7/42727,http://dx.doi.org/10.17781/p002085,,10.17781/p002085,2521489234,,0,004-022-528-441-49X; 008-143-910-329-438; 008-295-920-051-532; 016-004-319-477-572; 017-890-768-257-247; 018-029-184-282-56X; 018-708-952-477-373; 029-648-389-747-342; 030-826-959-775-017; 032-761-363-352-02X; 033-720-241-809-648; 038-735-525-163-045; 041-023-425-576-515; 041-719-597-940-972; 062-002-531-320-264; 063-128-918-481-572; 088-965-465-936-241; 114-270-567-109-909; 116-136-129-754-823; 150-753-220-962-769; 154-025-503-611-66X; 159-459-723-637-730; 159-985-286-834-671; 170-326-522-228-585; 173-831-291-795-414; 175-791-313-672-423,2,false,, 089-380-540-556-832,Forensic Inspection of Sensitive User Data and Artifacts from Smartwatch Wearable Devices,2019-06-10,2019,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Nicole R. Odom; Jesse M. Lindmar; John Hirt; Josh Brunty,"Wearable devices allow users the ability to leave mobile phones behind while remaining connected to the digital world; however, this creates challenges in the examination, acquisition, identification, and analysis of probative data. This preliminary research aims to provide an enhanced understanding of where sensitive user data and forensic artifacts are stored on smartwatch wearable devices, both through utilization as a connected and standalone device. It also provides a methodology for the forensically sound acquisition of data from a standalone smartwatch wearable device. The results identify significant amounts of data on the SamsungTM Gear S3 Frontier, greater than that stored on the companion mobile phone. An Apple Watch Series 3 manual examination method which produces native screenshots was identified; however, the companion mobile phone was found to store the greatest amount of data. As a result of this research, a data extraction tool for the SamsungTM Gear S3 Frontier was created.",64,6,1673,1686,Human–computer interaction; Wearable computer; Mobile phone; Data extraction; Smartwatch; Computer science; Data recovery; Wearable technology; Mobile device forensics; Digital forensics,data recovery; digital forensics; forensic artifacts; forensic science; internet of things; mobile forensics; smartwatch wearable devices,Artifacts; Computer Security; Forensic Sciences; Humans; Information Storage and Retrieval; Smartphone; Wearable Electronic Devices,,,https://dialnet.unirioja.es/servlet/articulo?codigo=7121547 https://www.ncbi.nlm.nih.gov/pubmed/31674672 https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.14109,http://dx.doi.org/10.1111/1556-4029.14109,31674672,10.1111/1556-4029.14109,2952607946,,0,000-281-222-726-856; 019-698-064-288-240; 024-225-776-970-302; 025-549-978-484-457; 051-558-525-539-694; 084-452-444-628-355,15,false,, 089-419-432-581-673,A Survey on Digital Forensics in Internet of Things,,2020,journal article,IEEE Internet of Things Journal,23274662; 23722541,Institute of Electrical and Electronics Engineers (IEEE),United States,Jianwei Hou; Yuewei Li; Jingyang Yu; Wenchang Shi,"Internet of Things (IoT) is increasingly permeating peoples’ lives, gradually revolutionizing our way of life. Due to the tight connection between people and IoT, now civil and criminal investigations or internal probes must take IoT into account. From the forensic perspective, the IoT environment contains a rich set of artifacts that could benefit investigations, while the forensic investigation in IoT paradigm may have to alter to accommodate characteristics of IoT. Therefore, in this article, we analyze the impact of IoT on digital forensics and systematize the research efforts made by previous researchers from 2010 to 2018. We sketch the landscape of IoT forensics and examine the state of IoT forensics under a 3-D framework. The 3-D framework consists of a temporal dimension, a spatial dimension, and a technical dimension. The temporal dimension walks through the standard digital forensic process while the spatial dimension explores where to identify sources of evidence in IoT environment. These two dimensions attempt to provide principles and guidelines for standardizing digital investigations in the context of IoT. The technical dimension guides a way to the exploration of tools and techniques to ensure the enforcement of digital forensics in the ever-evolving IoT environment. Put together, we present a holistic overview of digital forensics in IoT. We also highlight open issues and outline promising suggestions to inspire future study.",7,1,1,15,Criminal investigation; Forensic science; Data science; Digital forensic process; Dimension (data warehouse); Enforcement; Context (language use); Computer science; Cloud computing; Digital forensics,,,,National Natural Science Foundation of China; Natural Science Foundation of Beijing Municipality; National High-tech Research and Development Program,https://doi.org/10.1109/JIOT.2019.2940713 https://ieeexplore.ieee.org/document/8831387 https://dblp.uni-trier.de/db/journals/iotj/iotj7.html#HouLYS20,http://dx.doi.org/10.1109/jiot.2019.2940713,,10.1109/jiot.2019.2940713,2972531726,,0,000-725-081-314-034; 001-507-239-208-313; 002-927-911-483-709; 003-029-378-692-335; 004-611-464-291-773; 004-750-320-878-25X; 005-630-640-664-939; 006-138-917-123-177; 009-747-804-607-928; 010-084-169-561-57X; 011-630-171-346-715; 013-013-001-967-18X; 015-239-387-608-474; 016-526-859-340-786; 018-362-897-068-538; 018-552-581-098-658; 019-360-393-097-72X; 019-698-064-288-240; 019-912-316-692-552; 020-957-111-490-556; 024-462-843-796-80X; 024-846-790-183-200; 026-764-618-898-849; 027-267-966-628-617; 029-164-830-214-360; 029-934-518-651-564; 030-433-196-114-204; 035-417-616-880-24X; 035-859-793-614-223; 039-999-270-718-277; 042-767-661-429-064; 046-143-775-958-052; 046-357-391-782-442; 047-125-525-662-686; 047-492-292-707-760; 047-782-671-230-742; 049-871-818-826-194; 050-834-040-747-382; 053-242-584-326-535; 054-888-023-799-702; 055-811-656-615-740; 055-996-756-667-066; 056-205-328-777-528; 057-980-219-952-36X; 058-156-586-882-704; 060-294-953-084-788; 064-733-456-850-063; 065-322-784-190-818; 065-654-832-541-493; 066-807-833-482-350; 067-749-619-156-62X; 068-520-918-599-405; 072-070-835-286-795; 080-792-696-174-439; 081-067-855-263-493; 081-833-857-658-915; 083-134-473-348-002; 083-232-193-192-073; 084-021-092-390-691; 084-312-028-371-525; 084-452-444-628-355; 091-339-033-909-469; 091-540-399-535-662; 092-827-935-965-207; 093-117-308-515-186; 103-681-534-784-390; 106-885-306-836-498; 107-942-544-689-539; 112-181-239-331-730; 118-008-780-783-558; 125-166-157-303-425; 125-682-509-275-554; 128-603-018-655-844; 134-072-762-404-610; 134-300-841-995-57X; 138-518-998-385-929; 144-184-475-249-995; 156-972-666-676-888; 167-751-222-897-487; 170-516-749-420-456; 172-334-035-729-772; 175-905-531-284-640,41,false,, 089-695-854-791-989,A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Shahzad Saleem; Oliver Popov; Ibrahim Baggili,"The omnipresence of mobile devices (or small scale digital devices - SSDD) and more importantly the utility of their associated applications for our daily activities, which range from financial transactions to learning, and from entertainment to distributed social presence, create an abundance of digital evidence for each individual. Some of the evidence may be a result of illegal activities that need to be identified, understood and eventually prevented in the future. There are numerous tools for acquiring and analyzing digital evidence extracted from mobile devices. The diversity of SSDDs, types of evidence generated and the number of tools used to uncover them posit a rather complex and challenging problem of selecting the best available tool for the extraction and the subsequent analysis of the evidence gathered from a specific digital device. Failing to select the best tool may easily lead to incomplete and or improper extraction, which eventually may violate the integrity of the digital evidence and diminish its probative value. Moreover, the compromised evidence may result in erroneous analysis, incorrect interpretation, and wrong conclusions which may eventually compromise the right of a fair trial. Hence, a digital forensics investigator has to deal with the complex decision problem from the very start of the investigative process called preparatory phase. The problem could be addressed and possibly solved by using multi criteria decision analysis. The performance of the tool for extracting a specific type of digital evidence, and the relevance of that type of digital evidence to the investigative problem are the two central factors for selecting the best available tool, which we advocate in our work. In this paper we explain the method used and showcase a case study by evaluating two tools using two mobile devices to demonstrate the utility of our proposed approach. The results indicated that XRY (Alt1) dominates UFED (Alt2) for most of the cases after balancing the requirements for both performance and relevance.",16,,S55,S64,Multiple-criteria decision analysis; Decision problem; Data mining; Relevance (law); Decision analysis; Mobile device; Data science; Digital evidence; Computer science; Mobile device forensics; Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287616300020 https://core.ac.uk/display/82434076 https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/52/ https://doi.org/10.1016/j.diin.2016.01.008 https://dl.acm.org/doi/10.1016/j.diin.2016.01.008 https://www.sciencedirect.com/science/article/pii/S1742287616300020 http://www.diva-portal.org/smash/record.jsf?pid=diva2:806835 http://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1052&context=electricalcomputerengineering-facpubs https://core.ac.uk/download/pdf/82434076.pdf,http://dx.doi.org/10.1016/j.diin.2016.01.008,,10.1016/j.diin.2016.01.008,638340418,,0,002-633-335-300-244; 013-428-450-747-670; 021-274-925-963-096; 024-696-473-476-447; 050-956-099-345-084; 067-545-085-582-063; 088-133-805-930-451; 092-879-045-056-401; 094-587-727-381-031; 098-955-499-112-850; 114-090-829-194-843; 132-942-022-718-554; 153-061-100-745-489; 154-092-845-528-110; 159-094-605-033-945; 192-810-463-153-431,12,true,cc-by-nc-nd,hybrid 090-632-465-818-866,IoT network traffic analysis: Opportunities and challenges for forensic investigators?,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Tina Wu; Frank Breitinger; Stephen Niemann,,38,,301123,,Data science; Traffic analysis; Computer science; Internet of Things,,,,,https://dfrws.org/presentation/iot-network-traffic-analysis-opportunities-and-challenges-for-forensic-investigators/ https://dfrws.org/wp-content/uploads/2021/01/2021_APAC_paper-iot_network_traffic_analysis_opportunities_and_challenges_for_forensic_investigators.pdf,http://dx.doi.org/10.1016/j.fsidi.2021.301123,,10.1016/j.fsidi.2021.301123,3121924025,,0,012-448-745-874-660; 039-999-270-718-277; 086-481-092-658-846; 088-553-642-323-93X; 097-939-114-561-254,0,true,cc-by-nc-nd,hybrid 090-980-715-883-62X,Trustworthy Digital Forensics in the Cloud,,2016,journal article,Computer,00189162,Institute of Electrical and Electronics Engineers (IEEE),United States,Shams Zawoad; Ragib Hasan,"Digital forensics is used to help investigate cybercrime. Because of its characteristics and rapid adoption, the cloud requires its own form of forensics, which must be reliable. The authors have developed the Open Cloud Forensics (OCF) model and FECloud architecture, which would enable effective cloud forensics.",49,3,78,81,Forensic science; Trustworthiness; Cloud computing security; Cybercrime; Cloud forensics; Computer security; Computer science; Cloud computing; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/computer/computer49.html#ZawoadH16 http://ieeexplore.ieee.org/document/7433340/ https://ieeexplore.ieee.org/document/7433340/ https://www.computer.org/csdl/magazine/co/2016/03/mco2016030078/13rRUwwslxu https://doi.org/10.1109/MC.2016.89,http://dx.doi.org/10.1109/mc.2016.89,,10.1109/mc.2016.89,2303474472,,0,042-458-608-620-40X; 059-655-726-130-137; 088-909-224-066-322; 118-008-780-783-558; 125-817-456-334-439; 132-342-259-584-364,14,false,, 091-023-567-376-838,Image super-resolution for outdoor digital forensics. Usability and legal aspects,,2018,journal article,Computers in Industry,01663615,Elsevier BV,Netherlands,Salvador Villena; Miguel Vega; Javier Mateos; Duska Rosenberg; Fionn Murtagh; Rafael Molina; Aggelos K. Katsaggelos,"Abstract Digital Forensics encompasses the recovery and investigation of data, images, and recordings found in digital devices in order to provide evidence in the court of law. This paper is devoted to the assessment of digital evidence which requires not only an understanding of the scientific technique that leads to improved quality of surveillance video recordings, but also of the legal principles behind it. Emphasis is given on the special treatment of image processing in terms of its handling and explanation that would be acceptable in a court of law. In this context, we propose a variational Bayesian approach to multiple-image super-resolution based on Super-Gaussian prior models that automatically enhances the quality of outdoor video recordings and estimates all the model parameters while preserving the authenticity, credibility and reliability of video data as digital evidence. The proposed methodology is validated both quantitatively and visually on synthetic videos generated from single images and real-life videos and applied to a real-life case of damages and stealing in a private property.",98,,34,47,Scientific technique; Usability; Information retrieval; Context (language use); Credibility; Digital evidence; Computer science; Reliability (statistics); Digital forensics; Image processing,,,,Spanish Ministry of Economy and Competitiveness; Spanish Ministry of Economy and Competitiveness; Department of Energy; ONR; NSF IDEAS; DARPA ReImagine,https://pure.hud.ac.uk/ws/files/12535345/Villena_et_al_Image_super_resolution_for_outdoor_digital_forensics_ComputersInIndustry_Feb2018.pdf https://pure.hud.ac.uk/en/publications/image-super-resolution-for-outdoor-digital-forensics-usability-an https://doi.org/10.1016/j.compind.2018.02.004 https://www.scholars.northwestern.edu/en/publications/image-super-resolution-for-outdoor-digital-forensics-usability-an https://www.sciencedirect.com/science/article/pii/S0166361517306358 https://core.ac.uk/download/237460172.pdf,http://dx.doi.org/10.1016/j.compind.2018.02.004,,10.1016/j.compind.2018.02.004,2793898592,,0,000-324-540-227-902; 001-178-621-720-858; 001-608-908-883-352; 004-117-785-181-23X; 004-723-592-537-121; 004-958-229-709-669; 008-215-658-916-277; 010-037-102-410-599; 011-306-628-371-474; 012-016-836-079-639; 013-491-140-953-577; 014-062-160-299-737; 014-862-525-960-731; 016-134-735-893-511; 016-915-586-462-874; 017-815-064-018-299; 019-831-293-743-518; 019-894-616-057-466; 021-496-988-088-093; 023-644-847-408-449; 025-384-948-751-89X; 035-262-200-703-668; 038-668-970-194-854; 038-985-210-009-934; 041-012-928-243-751; 043-730-176-138-623; 044-400-889-251-073; 046-053-037-634-196; 057-967-268-379-508; 062-196-740-572-626; 063-532-297-436-449; 064-280-057-388-079; 065-589-633-902-745; 066-173-954-451-110; 069-544-521-452-109; 071-908-933-643-362; 072-245-054-212-971; 074-006-536-890-200; 075-555-480-212-889; 079-806-321-227-601; 081-015-835-254-704; 082-218-851-096-466; 082-850-619-602-511; 084-009-578-367-756; 084-031-713-999-539; 085-379-403-609-164; 089-769-185-795-841; 091-048-622-639-68X; 091-107-184-025-131; 092-098-207-359-420; 095-563-603-963-814; 095-907-092-910-396; 101-330-403-204-926; 111-710-523-428-585; 114-599-315-973-390; 114-651-231-792-299; 114-791-371-428-899; 116-398-928-717-260; 128-199-263-914-537; 134-927-490-231-285; 142-043-074-549-848; 165-101-260-380-991; 173-034-553-635-460,4,true,cc-by-nc-nd,green 091-095-676-173-055,From Fingers to Faces: Visual Semiotics and Digital Forensics.,2020-09-08,2020,journal article,International journal for the semiotics of law = Revue internationale de semiotique juridique,15728722; 09528059,Springer Netherlands,Netherlands,Massimo Leone,"Identification is a primary need of societies. It is even more central in law enforcement. In the history of crime, a dialectics takes place between felonious attempts at concealing, disguising, or forging identities and societal efforts at unmasking the impostures. Semiotics offers specialistic skills at studying the signs of societal detection and identification, including those of forensics and criminology. In human history, no sign more than the face is attached a value of personal identity. Yet, modern forensics realizes that the face can mislead and, inspired by eastern models (China, Japan, India), adopts fingerprinting. In the digital era, however, fingerprinting first goes digital, then it is increasingly replaced by facial recognition. The face is back in digital AI forensics, together with a tangle of sociocultural biases. Semiotics can play a key role in studying their surreptitious influence.",34,2,579,599,Aesthetics; Semiotics; Sign (semiotics); Sociology; Sociocultural evolution; Value (semiotics); Face (sociological concept); Visual semiotics; Personal identity; Digital forensics,Artificial intelligence; Face; Fingerprinting; Forensics; Semiotics,,,European Research Council; Università degli Studi di Torino,https://link.springer.com/article/10.1007/s11196-020-09766-x https://europepmc.org/article/PMC/PMC7902585 http://www.ncbi.nlm.nih.gov/pubmed/33679005 https://link.springer.com/content/pdf/10.1007/s11196-020-09766-x.pdf https://philpapers.org/rec/LEOFFT-2,http://dx.doi.org/10.1007/s11196-020-09766-x,33679005,10.1007/s11196-020-09766-x,3084149874,PMC7902585,0,000-934-790-240-526; 001-332-269-937-371; 002-084-436-260-502; 005-729-296-889-409; 006-417-336-632-864; 008-173-570-185-809; 010-251-348-460-059; 010-822-692-733-104; 011-668-961-276-997; 012-382-347-302-254; 013-579-914-066-098; 017-455-116-009-882; 017-967-261-379-707; 020-213-858-033-669; 021-726-600-370-887; 024-433-338-455-825; 024-777-112-208-695; 025-424-433-390-443; 027-827-932-600-58X; 028-857-636-801-145; 029-580-051-056-298; 029-673-724-933-551; 033-449-436-713-237; 035-958-327-139-940; 041-019-520-513-633; 043-609-043-621-318; 047-292-046-377-51X; 048-729-913-877-842; 049-549-868-383-189; 055-411-169-871-218; 056-767-070-367-090; 057-434-160-435-756; 059-265-958-504-886; 060-030-811-269-921; 067-920-037-838-601; 068-172-061-909-591; 070-593-541-528-461; 073-081-075-865-136; 076-038-316-235-449; 078-529-917-631-833; 084-830-546-655-042; 092-855-559-924-441; 094-616-297-781-624; 096-313-948-754-561; 096-436-652-379-168; 099-962-872-474-828; 100-556-632-686-864; 100-785-496-496-001; 107-303-483-407-487; 108-370-654-349-434; 111-501-646-961-821; 121-967-461-356-227; 125-059-895-701-114; 126-924-630-123-064; 130-480-128-021-492; 137-814-597-737-479; 140-867-568-470-741; 147-551-616-698-411; 155-359-366-196-733; 159-387-115-519-589; 170-217-466-363-084; 170-377-669-705-729; 170-491-082-666-264; 174-914-215-838-312; 177-129-736-095-679; 184-808-381-426-771; 187-112-407-792-766; 190-987-239-151-571; 191-158-565-957-915,7,true,cc-by,hybrid 091-282-514-263-879,Book Review: The X-Ways Forensics Practitioner's Guide,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Linda K. Lau,"Shavers, B., and Zimmerman, E. (2013). The X-Ways Forensics Practitioner's Guide. Waltham, MA: Syngress, 242 pages. ISBN: 978-0-12-411605-4. Print: US $50.90. Includes exercises, case studies, references, and index.  Reviewed by Linda K. Lau, Longwood University Brett Shavers is a former law enforcement officer, a digital forensics examiner, an adjunct instructor, and a frequent speaker at many conferences. After writing his first book, titled Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, he co-wrote his 2nd book with Eric Zimmerman and Jimmy Weg, who is a knowledgeable technical editor. Both Brett and Eric are experts in cyber forensics, with many years of law enforcement experience at both the state and federal levels.",9,3,59,61,Law; Suspect; Cybercrime; Law enforcement; Law enforcement officer; Investigative Techniques; Computer security; Computer science; Digital forensics,,,,,https://core.ac.uk/display/92098202 https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#Lau14 https://commons.erau.edu/jdfsl/vol9/iss3/5/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1188&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2014.1188,,10.15394/jdfsl.2014.1188,1541752380,,0,,0,true,cc-by-nc,gold 091-341-449-257-890,Digging Up the Narrative: Forensic Practices between Objectivity and Interpretation,,2016,journal article,Membrana Journal of Photography,27124894; 24638501,Membrana Institute,,Lisa Andergassen,"Photography traditionally generates a truth-claim, while at the same time undermining it by holding the potential of being altered or staged. Since the rise of digital techniques, we are facing different (and easier) ways to manipulate pictures, leading to the notion of the digital photograph as generally mutable and therefore not trustworthy. But as there have been more and easier ways to “manipulate” photographs, so has there been an increase in the ways to detect them. Which today puts digital forensics in the position of re-establishing “reality” as a referential point by tracing every step of the process of alteration, turning the dubitative image into one that is doubt-free once its metadata has been analysed. But is this the whole story? By addressing digital forensic practices that have been used within the investigation of the Abu Ghraib torture scandal, I am showing that the hidden narrative of photographic production can be dug up by using forensic methods, but not without creating a new narrative.",,"Vol. 1, no. 1",48,51,Epistemology; Art; Narrative; Objectivity (philosophy); Digging,,,,,http://dx.doi.org/10.47659/m1.048.art,http://dx.doi.org/10.47659/m1.048.art,,10.47659/m1.048.art,3094339227,,0,033-543-032-954-465; 040-610-972-230-628,0,false,, 091-454-341-452-919,A Study of Minimization of Cybercrimes by the Implementation of Cyber Forensics Tool Kit,2022-03-31,2022,journal article,International Journal for Research in Applied Science and Engineering Technology,23219653,International Journal for Research in Applied Science and Engineering Technology (IJRASET),,Danish Rehman; Er. Jasdeep Singh,"Abstract: To identify whether the victim has committed a crime, both criminal and forensic investigators need the help of digital forensics. As a result, an investigator must use an adequate, accurate, affordable, and trustworthy cyber forensic tool for forensics investigations related to crimes. Digital forensics, also known as computer forensic analysis, computer analysis, and computer inspection, is the practise of painstakingly evaluating computer media (hard discs, diskettes, cassettes, and so on) for evidence. A comprehensive inspection by a qualified examiner may result in the reorganisation of a computer's operations. It's a step-by-step technique for investigating crimes utilising digital evidence employing scientific methodologies and processes. While many amazing solutions have been developed to protect our information communication networks, these devices require much more frequent updating. Individuals with both research abilities and a professional grasp of how the internet works, as well as those who know how to examine PC network security problems, are in great demand. This gives an attack-resistant investigative framework, as well as understanding of how the internet operates and the skills to assess cybercrime apparatus to discover who, what, when, why, and how. The study's findings led to the development of Digital Forensic tool solutions for investigators looking to expand their capabilities in using these tools. Keywords: Forensic, Cybercrime, investigation, toolkit",10,3,1335,1345,Computer forensics; Cybercrime; Digital forensics; Computer science; Digital evidence; Network forensics; The Internet; Computer security; GRASP; Trustworthiness; Criminal investigation; Data science; Internet privacy; World Wide Web; Software engineering; Criminology; Psychology,,,,,,http://dx.doi.org/10.22214/ijraset.2022.40867,,10.22214/ijraset.2022.40867,,,0,,0,true,,gold 091-619-263-117-914,Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics,2012-04-01,2012,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,George Grispos; Tim Storer; William Bradley Glisson,"Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments (among others). Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment. Several new research challenges addressing this changing context are also identified and discussed.",4,2,28,48,Information technology; Information technology management; Audit; Key (cryptography); Context (language use); Law enforcement; Computer security; Computer science; Cloud computing; Digital forensics; Context (archaeology); Key (lock); Data science,,,,,https://arxiv.org/pdf/1410.2123 https://dblp.uni-trier.de/db/journals/corr/corr1410.html#GrisposSG14 http://eprints.gla.ac.uk/68013/1/ID68013.pdf http://eprints.gla.ac.uk/68013/ https://digitalcommons.unomaha.edu/cgi/viewcontent.cgi?article=1043&context=interdiscipinformaticsfacpub https://ui.adsabs.harvard.edu/abs/2014arXiv1410.2123G/abstract https://shsu-ir.tdl.org/handle/20.500.11875/3196 https://experts.nebraska.edu/en/publications/calm-before-the-storm-the-challenges-of-cloud-computing-in-digita-2 https://dx.doi.org/10.4018/jdcf.2012040103 http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf https://www.igi-global.com/article/calm-before-storm/68408 https://arxiv.org/abs/1410.2123 https://works.bepress.com/george-grispos/2/ https://digitalcommons.unomaha.edu/interdiscipinformaticsfacpub/44/ https://core.ac.uk/download/pdf/296143974.pdf,http://dx.doi.org/10.4018/jdcf.2012040103,,10.4018/jdcf.2012040103,3102095724; 1971580317,,0,002-288-358-355-198; 002-506-228-487-750; 005-221-029-321-635; 006-994-826-441-382; 012-295-616-254-09X; 015-264-924-343-905; 021-039-461-635-181; 021-850-998-857-676; 024-695-810-060-22X; 030-341-862-818-724; 032-609-573-479-049; 032-697-093-668-898; 038-668-970-194-854; 042-653-566-399-199; 047-630-600-014-492; 049-446-135-635-21X; 050-618-920-212-97X; 051-278-209-038-859; 051-368-118-380-383; 052-152-063-024-042; 052-320-348-197-350; 053-666-953-083-583; 056-122-492-187-163; 056-294-265-787-418; 059-697-278-686-056; 062-712-470-776-220; 064-707-477-630-693; 075-976-616-114-109; 086-185-263-136-078; 086-365-780-774-340; 096-416-027-558-541; 097-567-011-227-46X; 110-010-690-717-911; 113-264-745-950-390; 119-385-247-230-234; 123-304-888-889-490; 155-855-942-114-621; 158-468-997-833-921; 168-819-441-615-181; 181-755-184-835-108; 184-948-841-629-735; 199-745-676-923-766,125,true,,green 091-696-315-070-855,Explainable digital forensics AI: Towards mitigating distrust in AI-based digital forensics analysis using interpretable models,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Abiodun A. Solanke,"The present level of skepticism expressed by courts, legal practitioners, and the general public over Artificial Intelligence (AI) based digital evidence extraction techniques has been observed, and understandably so. Concerns have been raised about closed-box AI models’ transparency and their suitability for use in digital evidence mining. While AI models are firmly rooted in mathematical, statistical, and computational theories, the argument has centered on their explainability and understandability, particularly in terms of how they arrive at certain conclusions. This paper examines the issues with closed-box models; the goals; and methods of explainability/interpretability. Most importantly, recommendations for interpretable AI-based digital forensics (DF) investigation are proposed.",42,,301403,301403,Interpretability; Skepticism; Distrust; Transparency (behavior); Computer science; Digital forensics; Argument (complex analysis); Digital evidence; Artificial intelligence; Data science; Computer security; Psychology; Epistemology; Psychotherapist; Philosophy; Biochemistry; Chemistry,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301403,,10.1016/j.fsidi.2022.301403,,,0,000-360-120-513-679; 000-449-131-016-986; 003-015-137-620-130; 003-026-991-770-318; 003-360-732-233-044; 007-392-723-533-629; 018-822-581-363-834; 023-063-388-078-229; 025-060-592-657-50X; 025-415-725-538-599; 033-344-357-648-800; 036-563-037-799-705; 044-638-092-768-171; 052-696-669-041-854; 053-071-743-643-578; 054-547-096-894-887; 054-819-045-052-125; 055-502-988-908-057; 055-807-088-113-125; 059-149-073-001-124; 059-786-079-109-47X; 065-001-388-509-041; 066-042-439-542-747; 070-717-463-864-129; 071-860-959-402-137; 083-839-515-156-421; 086-574-303-424-904; 087-323-490-534-091; 094-581-471-765-72X; 102-225-149-387-887; 109-466-069-133-838; 123-498-859-171-509; 124-191-464-465-991; 125-939-677-745-616; 139-924-660-355-079; 153-221-094-384-217; 189-305-371-273-262,0,true,,hybrid 091-892-724-900-950,"Amino acid profiling from fingerprints, a novel methodology using UPLC-MS",,2017,journal article,Analytical Methods,17599660; 17599679,Royal Society of Chemistry (RSC),United Kingdom,Ward van Helmond; Chris Jan Kuijpers; Elise Van Diejen; Jincey Spiering; Brent Maagdelijn; Marcel de Puit,"Fingermark evidence is extensively used in criminal investigations. Hence, there have been many investigations into the chemical compounds present in fingerprint deposits. In this technical note we describe the analysis of non-derivatised amino acid profiles obtained from fingerprints. We used UPLC with an amide stationary phase and subsequent detection using a triple quadrupole MS/MS and TOF-MS detector. The linearity (R2) was satisfactory for both MS detectors (>0.98 for all amino acids in the case of the triple quadrupole MS/MS and >0.96 in the case of the TOF-MS). Although the triple quadrupole had a higher sensitivity for most amino acids, both mass spectrometers were able to retrieve the amino acid profiles of fingerprints from 19 donors. Between these profiles, only minor differences were observed between the separate analyses on the different mass analyzers, mainly in L-proline, L-lysine and L-phenylalanine abundances. Surprisingly, the mean RSD in amino acid profiles from duplicate fingerprints turned out to be lower for the TOF-MS (18.6% ± 6.6% vs. 13.2% ± 3.8%), as did the mean RSD of the intraday reproducibility (8.22% ± 1.94% vs. 9.54% ± 3.07%).",9,38,5697,5702,Analytical chemistry; Mass spectrometry; Triple quadrupole mass spectrometer; High-performance liquid chromatography; Chemistry; Amide; Stationary phase; Uplc ms ms; Chromatography; Amino acid; Reproducibility,,,,Nederlandse Organisatie voor Wetenschappelijk Onderzoek,https://hbo-kennisbank.nl/resolve/hogeschoolamsterdam/eyJoIjogImRmN2Q4MTFlZTJlMTFiMmE5MzI3Y2FmYzI5MzVhNGI1OThhZGYzYzA5MGY4NWI3OWY5NzRhNzA1MjI0YWM0OTciLCAidSI6ICJodHRwczovL3B1cmUuaHZhLm5sL3dzL2ZpbGVzLzQzNzU1NDgvYzdheTAxNjAzZC5wZGYifQ== https://repository.tudelft.nl/islandora/object/uuid%3A07404946-1ecd-4d88-927b-a644e2c8b7b1/datastream/OBJ/download http://pubs.rsc.org/en/content/articlelanding/2017/ay/c7ay01603d https://pure.hva.nl/ws/files/4375548/c7ay01603d.pdf http://pubs.rsc.org/en/content/articlehtml/2017/ay/c7ay01603d?page=search https://repository.tudelft.nl/islandora/object/uuid%3A07404946-1ecd-4d88-927b-a644e2c8b7b1 http://xlink.rsc.org/?DOI=C7AY01603D https://research.tudelft.nl/en/publications/amino-acid-profiling-from-fingerprints-a-novel-methodology-using- https://www.narcis.nl/publication/RecordID/oai%3Atudelft.nl%3Auuid%3A07404946-1ecd-4d88-927b-a644e2c8b7b1 https://pubs.rsc.org/en/content/articlepdf/2017/ay/c7ay01603d https://pubs.rsc.org/en/content/articlelanding/2017/ay/c7ay01603d,http://dx.doi.org/10.1039/c7ay01603d,,10.1039/c7ay01603d,2743386892,,0,017-475-159-795-447; 019-313-265-814-008; 022-926-871-843-546; 027-173-519-900-466; 031-577-843-822-493; 033-835-248-545-913; 041-608-181-694-032; 045-830-532-366-077; 053-551-505-531-143; 067-030-451-906-169; 067-255-920-027-544; 092-849-252-226-832; 094-496-234-007-777,17,true,cc-by-nc,hybrid 091-934-600-025-114,Likelihood ratio method for the interpretation of iPhone health app data in digital forensics,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,M. (Marouschka) Vink; M.J. (Marjan) Sjerps; A. (Abdul) Boztas; J.P. (Jan Peter) van Zandwijk,,41,,301389,301389,Computer science; Digital forensics; Field (mathematics); Sensitivity (control systems); Interpretation (philosophy); Data mining; Calibration; Statistics; Computer security; Mathematics; Engineering; Electronic engineering; Pure mathematics; Programming language,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301389,,10.1016/j.fsidi.2022.301389,,,0,005-715-450-998-72X; 007-199-278-427-478; 008-733-402-517-23X; 009-678-795-915-075; 011-085-215-003-810; 012-693-115-841-628; 014-961-689-075-177; 016-886-829-561-085; 022-896-866-582-746; 023-766-437-138-867; 025-010-654-468-777; 034-180-335-918-441; 036-237-056-429-781; 039-158-280-114-980; 046-919-141-111-859; 048-011-673-789-33X; 054-126-844-371-315; 056-029-289-343-419; 058-506-041-812-981; 059-216-039-945-794; 066-193-937-643-661; 074-695-197-880-37X; 084-264-375-349-935; 091-016-585-939-256; 096-986-617-825-552; 103-760-328-285-801; 109-526-829-068-859; 116-473-356-479-419; 119-261-946-266-987; 120-388-714-246-243; 121-368-250-344-993; 138-332-223-612-203,0,false,, 091-946-490-975-722,Deteksi Pemalsuan Foto Digital Menggunakan Image Forensics,2019-09-26,2019,journal article,Mobile and Forensics,26566257,Universitas Ahmad Dahlan,," Riadi; Anton Yudhana; Wicaksono Yuli Sulistyo","Perkembangan foto yang semakin maju membuatnya memiliki banyak keunggulan dan kekurangan, salah satunya adalah mudahnya dimanipulasi dengan software editing . Perubahan foto dapat dibuat atau diedit dengan mudah, sehingga dapat merubah informasi yang disampaikan menjadi berbeda dan membuatnya rawan digunakan untuk tindak kejahatan. Forensics citra digital merupakan salah satu metode ilmiah pada bidang penelitian yang bertujuan untuk mendapatkan fakta-fakta pembuktian dalam menentukan keaslian image. Hal ini menjadi dasar penelitian ini untuk mendeteksi pemalsuan foto digital. Penelitian ini menggunakan analisa dengan 3 tools forensics yaitu FotoForensics, ForensicallyBeta dan Opanda IExif. Hasil yang didapat dari penelitian ini adalah terdeteksinya perbedaan metadata dan perbedaan kontras antara foto asli dan foto manipulasi yang menunjukan adanya perubahan pada foto tersebut.",1,1,13,21,,,,,,http://journal2.uad.ac.id/index.php/mf/article/download/703/pdf http://journal2.uad.ac.id/index.php/mf/article/view/703 https://core.ac.uk/download/pdf/267886815.pdf,http://dx.doi.org/10.12928/mf.v1i1.703,,10.12928/mf.v1i1.703,2982277947,,0,,0,true,cc-by-sa,gold 091-995-132-929-145,New Era of Cloud Forensics-Challenges and Opportunities,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Sailaja Vadlamudi,,,,,,Data science; Cloud forensics; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.08,http://dx.doi.org/10.46293/4n6/2021.03.01.08,,10.46293/4n6/2021.03.01.08,3161080518,,0,,0,false,, 092-046-002-157-986,Digital Forensic Logistics: The Basics of Scientific Theory,,2021,journal article,International Journal of Law and Society,26401894,Science Publishing Group,,Sergey Zuev; Dmitry Bakhteev,"Investigations of complex crimes with digital evidence increasingly require the use of modern digital devices and computer programs. Working with big data involves the accumulation, processing, and analysis of forensic information for further algorithmization and modeling of investigative actions, as well as the automation of the organizational activities of investigators. The article substantiates the need for the use of digital forensic logistics to optimize information flows and build the most effective analytical human and computer processing, not excluding the use of artificial intelligence systems. Digital forensic logistics is a sub-branch of digital forensics in the collection, identification, storage, verification, and analysis of data, as well as the generation of electronic evidence for evidence in court. The article provides the main directions of digital forensic logistics, including the logistics of evidence in criminal cases; logistics of the general organization of crime investigation; logistics planning (selection of tools and methods of investigation); logistics of putting forward versions of events; logistics of decisions in criminal matters. It is argued that the efficiency of the entire system will largely depend on the establishment of information flows and the prioritization of tasks. Quality work requires the improvement of applied digital technologies capable of providing the necessary algorithms of the evidentiary process. The use of special software, including the use of artificial intelligence systems, is becoming increasingly relevant. The logistics of making decisions in criminal cases ideally represents an electronic assistant, endowed with artificial intelligence or in the form of a special computer program, capable, based on the determination of the forensic significance of the obtained digital information (electronic evidence), to offer the investigator solutions that can change the course of the investigation and transfer the entire information system in a new state.",4,2,83,,Automation; Information system; Data science; Digital evidence; Computer science; Process (engineering); State (computer science); Big data; Identification (information); Digital forensics,,,,,https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijls.20210402.14.pdf https://membership.sciencepublishinggroup.com/journal/paperinfo?journalid=306&doi=10.11648/j.ijls.20210402.14 http://www.sciencepublishinggroup.com/journal/paperinfo?journalid=306&doi=10.11648/j.ijls.20210402.14,http://dx.doi.org/10.11648/j.ijls.20210402.14,,10.11648/j.ijls.20210402.14,3163211431,,0,,0,true,cc-by,gold 092-223-657-810-83X,THE INTEGRATION OF DIGITAL FORENSICS SCIENCE AND ISLAMIC EVIDENCE LAWS,2019-12-15,2019,journal article,"International Journal of Law, Government and Communication",01281763,Global Academic Excellence (M) Sdn Bhd,,Mohamad Khairudin Kallil; Ahmad Che Yaacob,"Evidence is anything that tends to prove or disprove a fact at issue in legal action. It involves the offering of alleged proof through testimony or objects at court proceedings to persuade the trier of fact about an issue in dispute. Islamic Evidence Law is a body of rules that helps to govern conduct and determines what will admissible in certain legal proceedings and trials. In the proceeding that involves digital evidence, the court will consider whether the digital evidence is admissible or inadmissible depends on the requirements of admissibility stated in law statutes in force and the existence of any Standard Operating Procedure (SOP). Under section 33 of the Syariah Court (Federal Territories) Evidence Act or other Syariah Evidence Enactments, digital evidence is subjected to be authenticated by the digital forensics experts. In digital forensics, the process of identification, preservation, collection, analysis, and presentation is the main procedures contained in any Standard Operating Procedure (SOP) of any digital forensics services. The court will ensure that this procedure can maintain the authenticity and the originality of the evidence especially on the issue of expert qualification, a chain of custody and analysis part. Thus, digital forensics is integrated with the Islamic law of evidence to maintain justice in delivering judgment. Therefore, this article examines the standard requirement of the admissibility of digital evidence by digital forensic methodology by using the qualitative approach on the analysis of articles, books, law statutes documents and law cases. The results show that the need for amendment of Syariah Court Evidence and Procedure statutes and the necessity of the existence of Standard Operating Procedure (SOP) on digital evidence in the Syariah courts as a guideline for judges, lawyers and parties involved.",4,17,61,70,Law; Computer science; Islam; Digital forensics,,,,,http://dx.doi.org/10.35631/ijlgc.417006,http://dx.doi.org/10.35631/ijlgc.417006,,10.35631/ijlgc.417006,2999286939,,0,,1,true,,gold 092-461-654-973-880,Studying the Documentation Process in Digital Forensic Investigation Frameworks/ Models,,2015,journal article,Journal of Al-Nahrain University-Science,18145922; 25190881,Al-Nahrain Journal of Science,,Talib M. Jawad Abbas,"With the proliferation of the digital crime around the world, there are numerous and diverse digital forensic investigation models for driving digital investigation processes. Now more than ever, it must be a criminal investigation to obtain digital evidence which wouldn't be admissible in court. Therefore, digital forensic investigation should be implemented successfully, and there are a number of significant steps that should be taken into account. Each step and phase produces documents that are essential in understanding how the investigation process is built.The aim of this paper is to study models/ frameworks for the digital forensic investigation over a time period of ten years and find out the degree and level of attention to the process of documentation. This paper also includes definitions and descriptions of the basic and core concepts that the frameworks/ models use.",18,4,153,162,Criminal investigation; Systems engineering; Data science; Digital evidence; Digital forensic investigation; Computer science; Process (engineering); Documentation; Digital forensics,,,,,https://anjs.edu.iq/index.php/anjs/article/download/299/1699 https://anjs.edu.iq/index.php/anjs/article/view/299 https://www.iasj.net/iasj?func=fulltext&aId=107014,http://dx.doi.org/10.22401/jnus.18.4.21,,10.22401/jnus.18.4.21,2588900731,,0,006-708-208-065-949; 010-086-703-646-194; 019-698-064-288-240; 032-697-093-668-898; 109-482-615-363-500; 170-299-458-679-224; 170-346-482-774-626; 190-065-821-748-92X; 199-172-967-270-034; 199-745-676-923-766,1,false,, 092-506-898-894-624,Towards a Comprehensive Ontology Based-Investigation for Digital Forensics Cybercrime,2015-10-31,2015,journal article,International Journal on Communications Antenna and Propagation (IRECAP),25332929; 20395086,Praise Worthy Prize,Italy,Amir Mohamed Talib; Fahad Omar Alomary,"Cyber physical attacks against information and computer systems are a tangible and dangerous threat that requires an effective response. In this paper, digital forensics cybercrime ontology is proposed to collect, examine, analyze, prepare, acquire and preserve evidence of computer crimes of digital forensics in cyberspace. The power of the proposed ontology is to determine the difficulties of association of the digital crime types and their collection evidences in digital forensics cases. Ontology development has consists three main steps, 1) domain, purpose and scope setting, 2) important terms acquisition, classes and class hierarchy conceptualization and 3) instances creation. Digital forensics and ontology are two normally unrelated topics. Ontology congruent to this paper is method that will help to better understanding and defining terms of digital forensics. Our proposed digital forensics cybercrime ontology resulting from the Protege has a total of 180 classes, 179 subclasses and 84 instances regarding digital forensics crime cases.",5,5,263,268,World Wide Web; Ontology (information science); Protégé; Cybercrime; Cyberspace; Class hierarchy; Computer science; Computer forensics; Digital forensics; Conceptualization,,,,,https://www.praiseworthyprize.org/jsm/index.php?journal=irecap&page=article&op=view&path%5B%5D=17418,http://dx.doi.org/10.15866/irecap.v5i5.6112,,10.15866/irecap.v5i5.6112,2283915427,,0,014-384-963-565-48X; 095-437-078-101-003; 105-646-650-348-579; 160-810-323-281-473; 181-072-396-769-365; 187-367-973-147-176,8,false,, 092-704-658-903-701,Digital Forensic Readiness of Information Systems: A cost-benefit variable analysis,2022-02-04,2022,journal article,International Journal on Cyber Situational Awareness,20572182; 2633495x,"Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC)",,Antonis Mouhtaropoulos,"Despite the increasing amount of research on the pre-incident side within a digital forensic investigation, little steps have been taken towards assessing the effectiveness of such a plan in terms of cost effectiveness. This research paper lays the foundations of a cost-benefit variable analysis within a digital forensic readiness context by defining a cost-benefit relationship effect model. We collect novel, primary data from organisations and institutions that implement a digital forensic readiness plan to identify cost variables of each measure and threat, and benefit variables of each measure to be taken. We conduct data analysis to portray that specific cost variables have a significant effect on specific benefit variables and present the results of the data collection process amongst organisations and institutions applying a digital forensic readiness plan. Lastly, we produce hypotheses testing results and determine the validity between each cost-benefit relationship.",6,1,,,Plan (archaeology); Variable (mathematics); Context (archaeology); Digital forensics; Computer science; Measure (data warehouse); Data collection; Process (computing); Data science; Forensic science; Variables; Risk analysis (engineering); Process management; Knowledge management,,,,,,http://dx.doi.org/10.22619/ijcsa.2021.100136,,10.22619/ijcsa.2021.100136,,,0,,0,true,,bronze 092-765-349-680-750,The different types of reports produced in digital forensic investigations.,2021-06-27,2021,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Graeme Horsman,"Abstract The importance of ensuring the results of any digital forensic (DF) examination are effectively communicated cannot be understated. In most cases, this communication will be done via written report, yet despite this there is arguably limited best practice guidance available which is specific for this field in regards to report construction. Poor reporting practices in DF are likely to undermine the reliability of evidence provided across this field, where there is a need for formalised guidance regarding the requirements for effective DF report construction; this should not be a task left solely to each individual practitioner to determine without instruction. For this, the field of DF should look to the wider forensic community and the existing work in this area for support. In line with many other ‘traditional’ forensic science types, a DF practitioner can be commissioned to report in one of three ways - ‘technical’, ‘investigative’ or ‘evaluative’, where each reporting type maintains a specific purpose and interpretative-context, determined by the examination workflow undertaken by a practitioner following client instruction. This work draws upon guidance set out in fundamental forensic science reporting literature in order to describe each reporting type in turn, outlining their scope, content and construction requirements in an attempt to provide support for the DF field.",61,5,627,634,Set (psychology); Work (electrical); Workflow; Best practice; Task (project management); Scope (project management); Field (computer science); Computer science; Engineering ethics; Digital forensics,Digital forensics; Evaluation; Investigation; Report,Forensic Medicine; Forensic Sciences/methods; Humans; Reproducibility of Results,,,https://www.sciencedirect.com/science/article/abs/pii/S1355030621000927,http://dx.doi.org/10.1016/j.scijus.2021.06.009,34482943,10.1016/j.scijus.2021.06.009,3176874416,,0,001-691-716-197-657; 002-062-018-830-835; 004-934-589-759-348; 005-715-450-998-72X; 007-702-479-851-182; 009-512-003-529-193; 010-061-391-662-193; 036-597-490-099-438; 038-668-970-194-854; 040-450-549-766-994; 041-365-301-128-075; 061-560-419-292-70X; 064-376-774-486-022; 067-505-834-517-458; 071-616-341-516-576; 101-549-415-202-81X; 102-243-142-344-71X; 121-830-022-805-361; 133-397-275-695-990; 142-790-196-752-819; 143-959-640-326-451; 173-145-269-859-717,6,false,, 092-878-184-623-918,Digital video forensics: a comprehensive survey,,2019,journal article,International Journal of Advanced Intelligence Paradigms,17550386; 17550394,Inderscience Enterprises Ltd,United Kingdom,Mohammad A. Alsmirat; Ruba A. Al-Hussien; Walaa Al-Sarayrah; Yaser Jararweh; Morad Etier,"The wide spread of digital devices and tools causes the simplification of the manipulation of any digital multimedia content. As a result, digital videos and photos are not trusted to be used as evidence in courts. This fact raises the need for finding techniques to ensure the authenticity of digital multimedia contents. Experts in digital-signal processing conducted a huge number of researches to find new strategies, using digital forensics, to verify digital evidences and trace its origins. The aim of this paper is to collect and provide the definitions of the main concepts related to media forensics. Also, this paper gives an overview of the different techniques used in media forensics concentrating on video forensics. Furthermore, it classifies the work done in the field according to the main technique used in the proposed solution approach.",15,3,437,456,Double compression; Digital multimedia; Image forensics; Digital video; Field (computer science); Computer science; Multimedia; TRACE (psycholinguistics); Data compression; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJAIP.2020.106040 https://dblp.uni-trier.de/db/journals/ijaip/ijaip15.html#AlsmiratAAJE20 http://dblp.uni-trier.de/db/journals/ijaip/ijaip15.html#AlsmiratAAJE20 https://doi.org/10.1504/IJAIP.2020.106040,https://www.inderscienceonline.com/doi/abs/10.1504/IJAIP.2020.106040,,,2810653893,,0,,3,false,, 093-098-656-285-339,Paytm Digital Wallet And Online Transactions Security Measures,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Rahul Pandey,,,,58,62,,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.12,http://dx.doi.org/10.46293/4n6/2020.02.02.12,,10.46293/4n6/2020.02.02.12,3021597832,,0,,0,false,, 093-327-100-232-043,Application of Static Forensics Method for Extracting Steganographic Files on Digital Evidence Using the DFRWS Framework,2020-06-20,2020,journal article,Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi),25800760,Ikatan Ahli Informatika Indonesia (IAII),,null Sunardi; Riadi; Muh. Hajar Akbar,"Steganography is one of the anti-forensic techniques that allow criminals to hide information in other messages so that during the investigation, the investigator will experience problems and difficulty in getting evidence of original information on the crime. Therefore an investigator is required to have the ability to be able to find and extract (decoding) using the right tools when opening messages that have been inserted by steganography techniques. The purpose of this study is to analyze digital evidence using the static forensics method by applying the six stages to the Digital Forensics Research Workshop (DFRWS) framework and extracting steganography on files that have been compromised based on case scenarios involving digital crime. The tools used are FTK Imager, Autopsy, WinHex, Hiderman, and StegSpy. The results of extraction of 9 out of 10 files that were scanned by steganography files had 90% success and 10% of steganography files were not found, so it can be concluded that the extraction files in steganographic messages can be used as legal digital proofs according to law.",4,3,576,583,Mathematical proof; Steganography; Information retrieval; Digital evidence; Computer science; Decoding methods; Digital forensics,,,,,http://jurnal.iaii.or.id/index.php/RESTI/article/view/1906 http://jurnal.iaii.or.id/index.php/RESTI/article/download/1906/265,http://dx.doi.org/10.29207/resti.v4i3.1906,,10.29207/resti.v4i3.1906,3036917890,,0,,0,true,cc-by,gold 093-431-358-523-075,Enhancing Digital Forensic Analysis throughDocument Clustering,,2014,journal article,International Journal of Innovative Research in Computer and Communication Engineering,23209798,,,null B.Vidhya; R. Priya Vaijayanthi,"Digital forensic is the process of uncovering and interpreting process of uncovering and interpreting electronic data for use in a court of law. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting identifying and validating the digital information for the purpose of reconstructing past events. Digital forensics deals with the analysis of artifacts on all types of digital devices. The role of digital forensics is to facilitate the investigation of criminal activities that involve digital devices, to preserve, gather, analyze and provide scientific and technical evidence, and to prepare the documentation for law enforcement authorities. Clustering methods can be used to automatically group the retrieved documents into a list of meaningful categories. Document clustering involves descriptors and descriptor extraction. Descriptors are sets of words that describe the contents within the cluster. Document cluster is generally considered to be a centralized process. Example of document clustering is web document clustering. Application of document clustering can be categorized to two types that are online and offline. Seized digital devices can provide precious information and evidence about facts. Large amount of data analyzed. Digital tools supported. In this paper do the work of extracting document and get a brief knowledge.",2,1,2496,2501,Document clustering; k-means clustering; Information retrieval; Online and offline; Law enforcement; Computer science; Process (engineering); Documentation; Cluster analysis; Digital forensics,,,,,http://www.rroij.com/open-access/enhancing-digital-forensic-analysis-throughdocument-clustering.pdf https://www.rroij.com/open-access/enhancing-digital-forensic-analysis-throughdocument-clustering.pdf,http://www.rroij.com/open-access/enhancing-digital-forensic-analysis-throughdocument-clustering.pdf,,,2611297783,,0,,0,false,, 093-441-380-401-516,PENERAPAN COMPOSITE LOGIC DALAM MENGKOLABORASIKAN FRAMEWORK TERKAIT MULTIMEDIA FORENSIK,2017-08-29,2017,journal article,JISKA (Jurnal Informatika Sunan Kalijaga),25280074; 25275836,Al-Jamiah Research Centre,,Nora Lizarti; Bambang Sugiantoro; Yudi Prayudi,"Like the digital forensics in general, multimedia forensics requires an integrated and flexible framework that can guide the process of proof is procedurally in order to maintain the validity of a digital evidence so that it can be justified in court. But this time, the digital forensics investigation framework that develops more emphasis on computer forensic investigations in general and did not give a specific stage of multimedia forensics. Often in investigating multimedia forensics investigator uses a framework that vary depending on the type of multimedia content to be analyzed, of course it becomes inflexible and inefficient, whereas multimedia content share characteristics that allow it to be integrated into a single unit. This study develops a forensic multimedia framework by implementing the Composite Logic to collaborate on several multimedia framework and related documents. Logic Composite method is a method of modeling the distribution of structured logical modularization techniques with explicit interface in which a model consists of a set of components that are interconnected with the principle of decomposition. In other words, the application of this method will allow researchers to extract and merge several frameworks into a single unit does not eliminate the function and the basic structure of the frameworks.",2,1,26,33,Structure (mathematical logic); Interface (Java); Multimedia framework; Digital evidence; Computer science; Process (engineering); Multimedia; Function (engineering); Digital forensics; Modular programming,,,,,http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/21-04 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/download/21-04/1061 https://core.ac.uk/download/267117302.pdf,http://dx.doi.org/10.14421/jiska.2017.21-04,,10.14421/jiska.2017.21-04,2759058413,,0,,0,true,cc-by-nc,gold 093-622-612-071-02X,"Maintaining Continuity of Evidence Within Forensic Labs Through Training, Accreditation, and Developing Better Digital Communication with Investigators and Prosecutors",,2019,journal article,Forensic Science International: Synergy,2589871x,Elsevier BV,,Stephen Campbell,,1,,S4,,Forensic science; Psychology; Training (civil); Medical education; Accreditation,,,,,https://api.elsevier.com/content/article/PII:S2589871X19300075?httpAccept=text/xml,http://dx.doi.org/10.1016/j.fsisyn.2019.02.006,,10.1016/j.fsisyn.2019.02.006,2933984024,,0,,0,true,"CC BY, CC BY-NC-ND",gold 093-958-345-280-896,Welcome to the 9th annual DFRWS Europe conference!,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,40,,301356,301356,Political science; History,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301356,,10.1016/j.fsidi.2022.301356,,,0,,0,true,,bronze 094-142-794-127-63X,The COLLECTORS ranking scale for 'at-scene' digital device triage.,2020-10-09,2020,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Graeme Horsman,"As digital evidence now features prominently in many criminal investigations, such large volumes of requests for the forensic examination of devices has led to well publicized backlogs and delays. In an effort to cope, triage policies are frequently implemented in order to reduce the number of digital devices which are seized unnecessarily. Often first responders are tasked with performing triage at scene in order to decide whether any identified devices should be seized and submitted for forensic examination. In some cases, this is done with the assistance of software which allows device content to be ""previewed""; however, in some cases, a first responder will triage devices using their judgment and experience alone, absent of knowledge of the devices content, referred to as ""decision-based device triage"" (DBDT). This work provides a discussion of the challenges first responders face when carrying out DBDT at scene. In response, the COLLECTORS ranking scale is proposed to help first responders carry out DBDT and to formalize this process in an effort to support quality control of this practice. The COLLECTORS ranking scale consists of 10 categories which first responders should rank a given device against. Each devices cumulative score should be queried against the defined ""seizure thresholds"" which offer support to first responders in assessing when to seize a device. To offer clarify, an example use-case involving the COLLECTORS ranking scale is included, highlighting its application when faced with multiple digital devices at scene.",66,1,179,189,Rank (computer programming); Criminal investigation; Data science; First responder; Triage; Quality (business); Digital evidence; Computer science; Process (engineering); Digital forensics,crime scence; digital evidence; digital forensics; investigation; triage,,,,https://www.ncbi.nlm.nih.gov/pubmed/33034896 https://onlinelibrary.wiley.com/doi/epdf/10.1111/1556-4029.14582 https://research.tees.ac.uk/en/publications/the-collectors-ranking-scale-for-atscene-digital-device-triage,http://dx.doi.org/10.1111/1556-4029.14582,33034896,10.1111/1556-4029.14582,3092108380,,0,003-982-227-180-136; 009-512-003-529-193; 025-290-159-757-335; 032-451-540-235-796; 039-999-270-718-277; 044-601-892-223-509; 062-137-637-964-947; 066-032-563-680-259; 066-235-037-082-291; 074-706-219-689-754; 081-447-017-308-327; 090-752-043-508-733; 131-516-331-360-906; 184-069-302-229-82X,8,true,cc-by-nc-nd,green 094-631-307-774-31X,Digital Forensics Specialist Group,2014-01-28,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Miranda Moore; Simon Iveson,Miranda Moore QC and Simon Iveson give a personal impression on the work of the Digital Forensics Specialist Group and the difficulties in identifying appropriately qualified digital evidence specialists in the UK Index words: Digital Forensics Specialist Group; Forensic Science Regulator; Forensic Science Advisory Council; accreditation; digital forensic methods; validation,9,0,,,Psychology; Index (publishing); Digital evidence; Computer security; Medical education; Computer forensics; Accreditation; Digital forensics,,,,,https://journals.sas.ac.uk/deeslr/article/view/1995 https://sas-space.sas.ac.uk/5418/,http://dx.doi.org/10.14296/deeslr.v9i0.1995,,10.14296/deeslr.v9i0.1995,2150343373,,0,,0,true,cc-by-nc-nd,hybrid 094-926-047-905-405,BIMI - Brand Indicators for Message Identification,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Venkata Satish Guttula,,,,,,Identification (biology); Information retrieval; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.04,http://dx.doi.org/10.46293/4n6/2020.02.04.04,,10.46293/4n6/2020.02.04.04,3097920458,,0,,0,false,, 095-686-500-915-641,Application of Adobe® Photoshop® CC 2018 for Identifying the Source of HP® Color Laser Printouts,2019-06-15,2019,journal article,Arab Journal of Forensic Sciences & Forensic Medicine,16586786; 16586794,Naif Arab University for Security Sciences,,Ahmad S. Salim; Asmaa A. Abdall,"Abstract In today’s digital world, printer forensics is one of the most important disciplines to reveal the authenticity of printed documents and track criminals. Digital steganography is an advanced approach to secure color laser printing processes, but it cannot be applied to monochrome laser printers. Therefore, the identity of the machine used to print color questioned documents provides a valuable means for detecting forgery crimes in digital forensic labs and law enforcement agencies. Based on this, we introduced a new forensic method that unveils the steganography (hidden information) embedded in color laser printouts via an adopted preset in Adobe® Photoshop® CC 2018. This forensic tool can be applied as a nondestructive and indirect tool for image processing. In the present work, printing, scanning, extraction, and measurements for the embedded tracking dots of candidate color laser printouts were conducted. Thirty-five HP® color laser printers were selected with different and same models with different serial numbers and used to print a hundred color laser printouts. The defined coded dots matrix patterns that characterized the color laser machines of the HP® brand could clearly be determined. Therefore, this procedure could successfully be applied to distinguish between various color laser printouts printed by HP® printers with a variant serial number in digital forensic labs with a conclusive accuracy ratio attained to one hundred percent.",1,9,1164,1164,Steganography; Computer graphics (images); Monochrome; Laser printing; Adobe photoshop; Computer science; Laser; Digital forensics; Image processing,,,,,https://repository.nauss.edu.sa/handle/123456789/66175,http://dx.doi.org/10.26735/16586794.2019.002,,10.26735/16586794.2019.002,2944947099,,0,,0,true,cc-by-nc,gold 095-691-114-276-825,An integrated conceptual digital forensic framework for cloud computing,,2012,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Ben Martini; Kim-Kwang Raymond Choo,"Increasing interest in and use of cloud computing services presents both opportunities for criminal exploitation and challenges for law enforcement agencies (LEAs). For example, it is becoming easier for criminals to store incriminating files in the cloud computing environment but it may be extremely difficult for LEAs to seize these files as the latter could potentially be stored overseas. Two of the most widely used and accepted forensic frameworks – McKemmish (1999) and NIST (Kent et al., 2006) – are then reviewed to identify the required changes to current forensic practices needed to successfully conduct cloud computing investigations. We propose an integrated (iterative) conceptual digital forensic framework (based on McKemmish and NIST), which emphasises the differences in the preservation of forensic data and the collection of cloud computing data for forensic purposes. Cloud computing digital forensic issues are discussed within the context of this framework. Finally suggestions for future research are made to further examine this field and provide a library of digital forensic methodologies for the various cloud platforms and deployment models.",9,2,71,80,Software deployment; NIST; World Wide Web; Context (language use); Law enforcement; Digital evidence; Computer science; Computer forensics; Cloud computing; Digital forensics,,,,,http://www.sciencedirect.com/science/article/pii/S174228761200059X http://dx.doi.org/10.1016/j.diin.2012.07.001 https://www.sciencedirect.com/science/article/abs/pii/S174228761200059X https://www.infona.pl/resource/bwmeta1.element.elsevier-f6af9062-2002-39d9-b1f2-0f2f2e2559b0 https://doi.org/10.1016/j.diin.2012.07.001 https://fenix.tecnico.ulisboa.pt/downloadFile/563568428736506/Martini2012.pdf https://dblp.uni-trier.de/db/journals/di/di9.html#MartiniC12 https://dx.doi.org/10.1016/j.diin.2012.07.001,http://dx.doi.org/10.1016/j.diin.2012.07.001,,10.1016/j.diin.2012.07.001,2122122011,,1,004-753-336-309-960; 009-832-452-035-773; 014-851-281-685-88X; 019-698-064-288-240; 028-325-831-077-28X; 034-773-286-616-44X; 035-448-415-847-226; 043-386-830-253-686; 045-051-768-618-936; 052-152-063-024-042; 066-521-283-222-779; 073-545-912-961-452; 075-976-616-114-109; 093-158-141-304-133; 124-837-341-752-034; 134-927-490-231-285; 135-567-652-645-895; 155-855-942-114-621; 162-255-141-911-414; 167-109-432-601-404; 170-108-067-251-840,210,true,,green 095-847-865-864-079,Forensic Importance of SIM Cards as a Digital Evidence,,2016,journal article,Journal of Forensic Research,21577145,OMICS Publishing Group,,Ankit Srivastava; Pratik Vatsal,"Digital Forensics is a branch of Forensic Science pertaining to evidential articles of digital and electronic nature, of which mobile forensics is a major stream. A proliferation of handheld cellular devices and crimes involving mobile phones in the previous years has led to an enormous demand for specialists in the field of mobile forensics. The interesting part is that any mobile phone is incomplete without a SIM card. Therefore, SIM cards are the most common type of forensic evidence to be found in cases where handheld devices are involved, a SIM card is imperative, no matter the phone belongs to the normal mobile phones category or the satellitephones that contain an iDEN (Integrated Digital Enhanced Network) SIM. These cards are all around us and are now being integrated in driving licenses, debit cards, credit cards, ATM cards, Identity cards, etc. Digital Forensic Science is the skill of a forensic expert to apply the knowledge of computer sciences and the investigative measures for a legal cause requiring the analysis of digital evidences. It is the process of identifying, preserving, analyzing, and presenting digital evidence in a manner that is legally acceptable. The motive of the process is to preserve any digital evidence in its most original form while performing a planned analysis by identifying, collecting and validating the digital information for the purpose of reconstructing past events.",7,2,1,4,ATM card; Mobile device; Mobile phone; Digital evidence; Computer security; Subscriber identity module; Computer science; Computer forensics; Mobile device forensics; Digital forensics,,,,,https://www.hilarispublisher.com/open-access/forensic-importance-of-sim-cards-as-a-digital-evidence-2157-7145-1000322.pdf https://www.hilarispublisher.com/abstract/forensic-importance-of-sim-cards-as-a-digital-evidence-36355.html https://www.omicsonline.org/open-access/forensic-importance-of-sim-cards-as-a-digital-evidence-2157-7145-1000322.pdf https://www.mendeley.com/catalogue/e95a0629-9d1f-3e8a-9e81-8ab38be513b3/,http://dx.doi.org/10.4172/2157-7145.1000322,,10.4172/2157-7145.1000322,2516654580,,0,084-620-225-862-010; 132-234-095-047-23X; 155-784-834-321-193; 159-516-414-584-397,2,true,cc-by,hybrid 095-972-507-485-24X,Research of Blind Forensics Algorithm on Digital Image Tampering,2014-07-01,2014,journal article,Indonesian Journal of Electrical Engineering and Computer Science,25024752,,,Hongying Jin,"With rapid development of the internet and the multimedia technology, the digital images tampering with blind forensics technology become a new research direction in the study of information security. The technology is based on the digital image, and it is only to realize image integrity and authenticity of the certification, so it is widely used in the civil fields such as news reports, judicial proof and military fields such as military intelligence analysis. So the research of it has great significance and broad application prospect.  In the paper, the exploration and research on the paste tampering and splicing tampering with blind forensics algorithm are made. The blind forensics algorithm based on radial Krawtchouk copy-and-paste invariant moment is proposed. As the current copy-and-paste blind forensics algorithm has low localization accuracy, and poor robustness of the post-processing in solving the problem. Based on sliding window block matching method and the radial Krawtchouk invariant moment, it proposes a copy-and-paste tampering with blind forensics algorithm. The experimental results show that the algorithm can effectively locate the tampered area, and it has very strong robustness of the rotating operation, JPEG compression, Gaussian noise, etc.",12,7,5399,5407,The Internet; Algorithm; Forensic science; Computer science; Gaussian noise; Digital image; Invariant (mathematics); Information security; Robustness (computer science),,,,,http://ijeecs.iaescore.com/index.php/IJEECS/article/download/3643/1923 http://ijeecs.iaescore.com/index.php/IJEECS/article/view/3643 http://iaesjournal.com/online/index.php/TELKOMNIKA/article/view/5373,http://ijeecs.iaescore.com/index.php/IJEECS/article/view/3643,,,2003143664,,0,,2,false,, 096-483-556-640-313,Editorial: The epic story of scientific interpretation in digital investigations,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Eoghan Casey,,34,,301063,,EPIC; Literature; Interpretation (philosophy); History,,,,,https://doi.org/10.1016/j.fsidi.2020.301063,http://dx.doi.org/10.1016/j.fsidi.2020.301063,,10.1016/j.fsidi.2020.301063,3091008978,,0,,0,false,, 096-655-404-701-429,Forensic analysis of newer TomTom devices,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Jens Elstner; Mark Roeloffs,,16,16,29,37,Embedded system; Data acquisition; Flash memory; Navigation system; Task (project management); First generation; Computer science; Process (engineering); Global Positioning System; Core dump,,,,,https://dblp.uni-trier.de/db/journals/di/di16.html#ElstnerR16 https://dl.acm.org/doi/10.1016/j.diin.2016.01.016 https://www.sciencedirect.com/science/article/pii/S174228761630010X#! https://www.infona.pl/resource/bwmeta1.element.elsevier-256ee770-72a8-3a3e-add9-0e0e37f2b710 https://www.sciencedirect.com/science/article/abs/pii/S174228761630010X https://dl.acm.org/citation.cfm?id=2906705,http://dx.doi.org/10.1016/j.diin.2016.01.016,,10.1016/j.diin.2016.01.016,2278766910,,0,010-127-508-296-844; 016-046-803-187-724; 017-815-064-018-299; 055-967-961-527-254; 066-807-833-482-350; 074-933-143-629-826; 084-021-092-390-691; 094-777-730-460-109,3,false,, 096-725-651-767-207,Empirical Evaluation of the Reliability of Photogrammetry Software in the Recovery of Three‐Dimensional Footwear Impressions,2020-05-14,2020,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Hannah J Larsen; Matthew R. Bennett,"This paper examines the reliability of Structure from Motion (SfM) photogrammetry as a tool in the capture of forensic footwear marks. This is applicable to photogrammetry freeware DigTrace but is equally relevant to other SfM solutions. SfM simply requires a digital camera, a scale bar, and a selection of oblique photographs of the trace in question taken at the scene. The output is a digital three-dimensional point cloud of the surface and any plastic trace thereon. The first section of this paper examines the reliability of photogrammetry to capture the same data when repeatedly used on one impression, while the second part assesses the impact of varying cameras. Using cloud to cloud comparisons that measure the distance between two-point clouds, we assess the variability between models. The results highlight how little variability is evident and therefore speak to the accuracy and consistency of such techniques in the capture of three-dimensional traces. Using this method, 3D footwear impressions can, in many substrates, be collected with a repeatability of 97% with any variation between models less than ~0.5 mm.",65,5,1722,1729,Photogrammetry; Point cloud; Structure from motion; Artificial intelligence; Software; Digital camera; Computer vision; Computer science; Reliability (statistics); Scale (map); Cloud computing,3D; digital evidence; evidence recovery; footwear impression; reliability testing; three-dimensional; validity,,,U.K. Natural Environment Research Council (NE/M021459/1),https://pubmed.ncbi.nlm.nih.gov/32407555/ https://www.onlinelibrary.wiley.com/doi/pdf/10.1111/1556-4029.14455 https://www.ncbi.nlm.nih.gov/pubmed/32407555 https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.14455 http://eprints.bournemouth.ac.uk/34012/ https://europepmc.org/article/MED/32407555 https://core.ac.uk/download/323108559.pdf,http://dx.doi.org/10.1111/1556-4029.14455,32407555,10.1111/1556-4029.14455,3025651539,,0,013-821-112-405-687; 015-123-182-480-038; 039-684-326-140-341; 041-423-699-652-143; 047-348-590-414-767; 047-375-324-891-038; 052-010-126-807-228; 121-847-862-251-147; 134-425-675-466-849; 136-371-932-328-861; 170-502-821-118-095; 178-564-771-899-288,3,true,cc-by,hybrid 096-899-831-703-200,Using a standard approach to the design of next generation e-Supply Chain Digital Forensic Readiness systems,,2016,journal article,SAIEE Africa Research Journal,19911696,Institute of Electrical and Electronics Engineers (IEEE),,D.J.E. Masvosvere; Hein S. Venter,"The internet has had a major impact on how information is shared within supply chains, and in commerce in general. This has resulted in the establishment of information systems such as e-supply chains (eSCs) amongst others which integrate the internet and other information and communications technology (ICT) with traditional business processes for the swift transmission of information between trading partners. Many organisations have reaped the benefits that come from adopting the eSC model, but have also faced the challenges with which it comes. One such major challenge is information security. With the current state of cybercrime, system developers are challenged with the task of developing cutting edge digital forensic readiness (DFR) systems that can keep up with current technological advancements, such as (eSCs). Hence, the problem addressed in this paper is the lack of a well-formulated DFR approach that can assist system developers in the development of e-supply chain digital forensic readiness systems. The main objective of such a system being that it must be able to provide law enforcement/digital forensic investigators (DFI) with forensically sound and readily available potential digital evidence that can expedite and support digital forensics incident response processes. This approach, if implemented can also prepare trading partners for security incidents that might take place, if not prevent them from occurring. Therefore, the work presented in this paper is aimed at providing a procedural approach that is based on digital forensics principles. This paper discusses the limitations of current system monitoring tools in relation to the kind of specialised DFR systems that are needed in the eSC environment and proposes an eSC-DFR process model and architectural design model that can lead to the development of next-generation eSC DFR systems. It is the view of the authors that the conclusions drawn from this paper can spearhead the development of cutting-edge next-generation digital forensic readiness systems, and bring attention to some of the shortcomings of current system monitoring tools.",107,2,104,120,Supply chain; The Internet; Risk analysis (engineering); Information system; System monitoring; Digital evidence; Computer science; Information security; Information and Communications Technology; Digital forensics,,,,,https://ieeexplore.ieee.org/document/8531546,http://dx.doi.org/10.23919/saiee.2016.8531546,,10.23919/saiee.2016.8531546,2903793168,,0,006-435-365-660-88X; 015-568-093-985-132; 019-831-293-743-518; 030-252-857-464-20X; 031-119-185-862-726; 036-436-057-429-275; 106-885-306-836-498; 160-562-609-354-05X; 172-491-030-512-776,5,true,"CC BY, CC BY-NC-ND",gold 096-993-850-376-090,Triage in Live Digital Forensic Analysis,2013-07-02,2013,journal article,The International Journal of Forensic Computer Science,18099807; 19807333,ABEAT - Associacao Brasileira de Especialistas em Alta Tecnologia,,Muhammad Shamraiz Bashir; M. A. Khan; Shaheed Zulfikar; Ali Bhutto,"Due to frequent use of Internet and with technological advancements, cyber and malware attacks over the digital devices have increased manifold. Activities performed electronically can be investigated by means of digital forensic analysis methodologies. Live digital forensic tools are used for digital evidence collection and investigations of malicious activities that occurred on a standalone system or networks. Since compromised system remains active while using these tools, some serious issues relating to malicious functionalities and policy violations could lead to serious damages like data theft or data loss. In this paper, we present a critical review of the triage in live forensic. This paper discusses several techniques being used for performing live forensic analysis and critically evaluate their efficacy in terms of their applicability and reliability. A brief anecdote about the pros and cons of these techniques are also discussed. We present the findings of our study in the critical section.",8,1,35,44,The Internet; Engineering; Data loss; Triage; Damages; Data theft; Digital evidence; Computer security; Malware; Digital forensics,,,,,http://www.ijofcs.org/V08N1-PP05-TRIAGE-IN-LIVE-DIGITAL.pdf http://www.ijofcs.org/abstract-v08n1-pp05.html,http://dx.doi.org/10.5769/j201301005,,10.5769/j201301005,2314982172,,0,003-871-070-011-964; 020-626-957-505-364; 026-024-733-636-162; 030-351-009-711-953; 035-269-627-388-435; 037-483-791-552-006; 040-105-187-457-272; 040-483-292-320-671; 051-645-938-939-51X; 052-209-716-598-874; 062-325-585-829-185; 093-448-702-012-591; 105-002-898-852-695; 127-286-301-080-684; 132-606-863-800-090; 147-707-428-925-566,27,false,, 097-034-132-251-966,A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution,,2017,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Ilane Cunha; Ahmed Patel; Jefferson Cavalcante,,9,3,209,209,Cybercrime; Digital forensics; Computer science; Computer forensics; Curriculum; Training (meteorology); Computer security; Digital evidence; Medical education; Criminology; World Wide Web; The Internet; Psychology; Law; Political science; Medicine; Physics; Meteorology,,,,,,http://dx.doi.org/10.1504/ijesdf.2017.10005633,,10.1504/ijesdf.2017.10005633,,,0,,0,false,, 097-610-747-427-14X,The PRNU Algorithm of Video Forensics,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Shreya Pai; Madhavi Bhilegaonkar; Vipul Borhade; Shweta Tripathi,"The A video sequence provides more proof of an occurring event than a photo or a group of photos. Hence it is important to identify the source of the video. In this paper, we explore how the Photo Response Non-Uniformity (PRNU) noise is useful for the detection of source cameras- Metadata of a Camera. With this method, we aim to determine whether the video originated from the given camera or not.",,,72,78,Artificial intelligence; Computer vision; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.15,http://dx.doi.org/10.46293/4n6/2020.02.02.15,,10.46293/4n6/2020.02.02.15,3023758872,,0,,0,false,, 097-729-559-656-234,Cyber Forensic – A Literature Review,,2019,journal article,"Trinity Journal of Management, IT & Media",23206470,ACS Publisher,,Aparna Chaturvedi; Ashish Awasthi,"Cyber Forensics is a branch of forensic science that is aimed to restore, collect and examine the digital evidence of materials found in digital devices, in relation to cybercrimes. With the advancement in cyber area, frequent use of internet and technologies leads to cyber-attacks. Cyber forensic is opted for acquiring electronic information and investigation of malicious evidence found in system or on network in such a manner that makes it admissible in court. It is also used to recover lost information in a system. The retrived information is used to prosecute a criminal. Number of crimes committed against an internet and malware attacks over the digital devices have increased. This paper contains a brief review of the literature aimed to identify the relevant pieces of knowledge in the digital forensics field.",10,1,24,29,Digital forensics; Digital evidence; Computer forensics; Computer security; Cyber crime; The Internet; Malware; Computer science; Network forensics; Relation (database); Field (mathematics); Internet privacy; Forensic examination; Cybercrime; Data science; World Wide Web; Engineering; Data mining; Forensic engineering; Mathematics; Pure mathematics,,,,,,http://dx.doi.org/10.48165/tjmitm.2019.1002,,10.48165/tjmitm.2019.1002,,,0,,1,false,, 097-817-585-854-322,Internet Epoch Intelligence-Evolution of Open-Source Intelligence,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),," Hanji",,,,,,The Internet; Astronomy; Open-source intelligence; Epoch (reference date); History,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.03,http://dx.doi.org/10.46293/4n6/2021.03.01.03,,10.46293/4n6/2021.03.01.03,3161575146,,0,,0,false,, 097-848-147-291-445,Proceduralization in Cybersecurity: A Socio-Technical Systems Perspective,,2020,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,John W. Coffey,,9,3,126,138,Sociotechnical system; Perspective (graphical); Computer science; Engineering ethics,,,,,http://sdiwc.net/digital-library/proceduralization-in-cybersecurity-a-sociotechnical-systems-perspective,http://dx.doi.org/10.17781/p002660,,10.17781/p002660,3126709873,,0,007-507-736-887-722; 026-774-296-742-022; 067-950-012-629-210; 073-997-683-020-831; 094-719-521-419-139; 099-989-901-692-411; 103-358-174-303-812; 106-458-055-177-080; 170-185-475-008-11X; 187-495-955-466-903,1,false,, 097-939-114-561-254,IoT forensic challenges and opportunities for digital traces,,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Francesco Servida; Eoghan Casey,"Abstract The increasing number of IoT devices in personal environments such as smarthomes presents opportunities and risks from a forensic perspective. These devices generate traces that can be useful for investigative and forensic purposes in any type of offense. At the same time, newer IoT devices are not supported by existing digital forensic tools and methods, making it difficult for practitioners to extract data from them without the support of a forensic advisor with specialized knowledge in this area. In addition, these traces can present evaluation challenges for forensic scientists, and can contain vulnerabilities that pose privacy risks. Security vulnerabilities of IoT devices create opportunities for extracting traces but might also be used by criminals to undermine a device. The aim of this work is to increase familiarity with traces from various IoT devices in a smarthome, and demonstrate how traces from IoT devices in a smarthome can be useful for investigative and forensic purposes. This work presents a study of IoT devices and associated smartphone applications, providing approaches to extracting and analyzing digital traces. This research led to the discovery of vulnerabilities in multiple devices, and a scenario for the DFRWS IoT forensic challenge was developed.",28,,S22,S29,Data science; Specialized knowledge; Smartphone application; Computer science; Internet of Things; Digital forensics,,,,,https://www.mendeley.com/catalogue/e3cf9d1d-4196-3739-9172-1f7e473d2f3e/ https://www.sciencedirect.com/science/article/pii/S1742287619300222 https://dfrws.org/wp-content/uploads/2021/05/2019_EU_paper-iot_forensic_challenges_and_opportunities_for_digital_traces.pdf https://dfrws.org/presentation/iot-forensic-challenges-and-opportunities-for-digital-traces/ https://doi.org/10.1016/j.diin.2019.01.012 https://core.ac.uk/download/226982753.pdf,http://dx.doi.org/10.1016/j.diin.2019.01.012,,10.1016/j.diin.2019.01.012,2942103749,,0,005-630-640-664-939; 009-747-804-607-928; 014-184-535-135-778; 014-466-907-950-761; 018-552-581-098-658; 019-831-293-743-518; 029-200-392-412-396; 029-434-105-390-369; 039-999-270-718-277; 060-294-953-084-788; 061-269-967-405-492; 130-633-255-506-737,60,true,cc-by-nc-nd,hybrid 098-259-555-485-151,From IT forensics to forensic computing,2015-12-01,2015,journal article,it - Information Technology,16112776; 21967032,Walter de Gruyter GmbH,,Felix C. Freiling,"With the proliferation of digital computers and information systems into all fields of our society the amount of crime involving such systems (cybercrime) is steadily increasing. This involves both more traditional crimes in which digital systems are merely used as tools (e. g., different types of fraud, blackmailing, hidden communication) as well as new forms of crime in which digital systems are the target (e. g., computer abuses, malicious software, malicious remote control networks like botnets). For many years now, computer professionals have attempted to help in fighting cybercrime not only by devising preventive techniques to detect or prevent cyberattacks, but also by supporting the juridical system to investigate cybercrime and (in the long run) to identify, arrest and prosecute cybercriminals. In this feat, computer professionals play various roles: Not only do they support in identifying, preserving and analyzing evidence connected with digital systems, they also have to adapt investigative techniques and tools to the elusive behavior of cybercriminals. This broad field has become known as the field of digital forensics, computer forensics or IT forensics. The emergence of this field was mainly driven by practitioners trying to satisfy immediateneedswithin concretedigital investigations andRogers and Seigfried [3] identified “a disproportional focus on the applied aspects of computer forensics, at the expense of the development of fundamental theories”. Despite the scientific immaturity of the field, many universities (especially in the UK and the US) have started to establish academic degree programs and research labs in this area because of the need of scientific credibility in a court of law, but also partly driven by the enormous popularity of television series like “CSI”. After performing research in this area for almost 10 years, it appears to me as if the field is in many cases pretending to be scientific while it actually is executing best practices. Garfinkel [2] observed a “crisis” of digital forensics, and Casey [1, p. 1],",57,6,337,338,Forensic science; Information system; Botnet; Cybercrime; Credibility; Field (computer science); Computer security; Computer science; Malware; Computer forensics; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/it/it57.html#Freiling15,http://dx.doi.org/10.1515/itit-2015-0039,,10.1515/itit-2015-0039,2220589576,,0,007-790-059-029-953; 134-927-490-231-285; 199-172-967-270-034,1,false,, 098-397-152-347-251,Digital Forensic Report,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Santosh Khadsare,,,,,,Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.01,http://dx.doi.org/10.46293/4n6/2020.02.04.01,,10.46293/4n6/2020.02.04.01,3096495016,,0,,0,false,, 098-711-946-154-008,Legal Regulation thе Forensic Activities in Digitalization,2022-05-09,2022,journal article,Courier of Kutafin Moscow State Law University (MSAL)),27826163; 23115998,Kutafin Moscow State Law University,,A. A. Sarkisian,"The article is devoted to the analysis some features of legal regulation of digitalization of forensic science. Some aspects of development of professional standards were also considered. The author examines in detail the main purposes of accreditation of testing and calibration laboratories. From a practical point of view, the shortcomings of some approaches to the legal regulation of digital traces research in forensic science.",,2,157,160,Accreditation; Digital forensics; Engineering ethics; Forensic science; Point (geometry); Political science; Computer science,,,,,,http://dx.doi.org/10.17803/2311-5998.2022.90.2.157-160,,10.17803/2311-5998.2022.90.2.157-160,,,0,,0,true,,hybrid 098-748-261-333-651,Digital forensic research: current state of the art,2012-11-13,2012,journal article,CSI Transactions on ICT,22779078; 22779086,Springer Science and Business Media LLC,,Sriram Raghavan,"Digital forensics is the process of employing scientific principles and processes to analyze electronically stored information and determine the sequence of events which led to a particular incident. In this digital age, it is important for researchers to become aware of the recent developments in this dynamic field and understand scope for the future. The past decade has witnessed significant technological advancements to aid during a digital investigation. Many methodologies, tools and techniques have found their way into the field designed on forensic principles. Digital forensics has also witnessed many innovative approaches that have been explored to acquire and analyze digital evidence from diverse sources. In this paper, we review the research literature since 2000 and categorize developments in the field into four major categories. In recent years the exponential growth of technological has also brought with it some serious challenges for digital forensic research which is elucidated. Within each category, research is sub-classified into conceptual and practical advancements. We highlight the observations made by previous researchers and summarize the research directions for the future.",1,1,91,114,Electronically stored information; Data science; Scope (project management); Digital evidence; Research literature; Field (computer science); Computer science; Process (engineering); State (computer science); Digital forensics,,,,,https://link.springer.com/content/pdf/10.1007%2Fs40012-012-0008-7.pdf https://link.springer.com/article/10.1007/s40012-012-0008-7/fulltext.html https://paperity.org/p/33082795/digital-forensic-research-current-state-of-the-art https://securecyberspace.org/yahoo_site_admin/assets/docs/df-survey.334154504.pdf https://link.springer.com/article/10.1007/s40012-012-0008-7 http://securecyberspace.org/yahoo_site_admin/assets/docs/df-survey.334154504.pdf,http://dx.doi.org/10.1007/s40012-012-0008-7,,10.1007/s40012-012-0008-7,1996767106,,1,000-004-275-385-957; 001-170-920-458-777; 001-255-768-346-633; 002-495-833-326-831; 002-534-435-127-422; 003-126-053-087-131; 003-182-041-034-40X; 003-412-732-826-511; 004-441-167-148-170; 004-652-388-189-304; 004-723-592-537-121; 007-455-522-527-690; 007-579-380-265-043; 007-832-595-971-443; 008-202-966-214-573; 008-769-224-564-600; 009-692-861-529-254; 010-388-991-543-520; 011-569-292-128-546; 012-495-836-083-305; 013-518-815-622-627; 013-610-410-193-416; 014-595-195-942-667; 014-761-788-507-645; 015-056-577-655-683; 015-123-573-514-32X; 016-046-803-187-724; 017-840-378-634-021; 017-890-768-257-247; 018-625-482-431-173; 019-166-656-621-783; 019-831-293-743-518; 020-944-423-224-895; 021-850-998-857-676; 022-530-184-398-582; 024-216-399-693-64X; 024-547-287-369-649; 024-735-069-822-749; 025-166-987-232-333; 025-492-951-217-100; 025-811-569-298-195; 026-810-683-474-561; 027-678-595-672-200; 028-149-820-987-827; 028-863-422-831-18X; 029-830-915-206-759; 030-121-862-351-330; 030-359-893-882-572; 031-542-664-705-080; 031-977-004-268-359; 032-192-641-675-455; 032-512-289-321-120; 033-241-817-699-448; 035-223-520-491-228; 035-381-853-639-810; 035-748-805-312-328; 036-412-863-725-881; 038-668-970-194-854; 039-280-558-160-949; 040-092-459-357-823; 041-327-075-056-562; 042-450-851-467-680; 043-093-846-816-675; 043-386-830-253-686; 043-570-313-872-171; 046-505-599-865-150; 046-527-367-793-765; 047-937-309-229-62X; 047-955-569-661-805; 050-000-944-827-798; 051-165-387-606-715; 052-308-687-231-910; 053-376-195-646-045; 054-432-750-459-549; 055-090-334-937-061; 055-574-774-155-611; 056-689-263-355-386; 056-766-410-127-532; 057-329-251-106-443; 057-339-420-567-97X; 058-409-370-512-563; 058-448-820-778-759; 060-650-561-577-338; 060-688-922-446-557; 061-326-248-978-030; 061-549-181-856-861; 062-026-157-734-278; 063-257-284-816-393; 068-247-722-587-280; 071-079-281-371-668; 071-303-820-692-940; 072-072-328-028-440; 073-524-789-009-542; 074-503-617-334-537; 075-597-189-600-363; 079-111-468-801-62X; 080-018-383-947-573; 080-288-823-874-989; 080-351-281-760-491; 081-437-161-307-223; 081-933-261-712-915; 082-897-694-197-796; 083-257-751-016-80X; 085-214-277-668-01X; 085-343-554-667-033; 085-669-579-012-375; 085-945-868-640-464; 087-690-831-820-163; 087-814-787-159-954; 088-568-925-253-101; 093-378-923-246-489; 093-668-583-258-461; 093-924-528-715-586; 095-219-247-465-217; 095-701-116-223-192; 096-169-714-378-299; 097-070-578-392-34X; 097-567-011-227-46X; 098-037-265-553-060; 102-602-192-826-532; 102-697-093-502-764; 105-427-271-392-801; 108-086-708-688-274; 109-426-377-800-755; 109-598-947-309-943; 111-471-986-310-852; 112-642-164-834-390; 117-211-438-018-858; 117-239-595-156-183; 118-095-530-189-407; 118-151-141-280-905; 120-697-354-224-33X; 121-127-640-488-995; 123-830-244-984-847; 125-082-012-062-802; 125-430-871-426-81X; 126-548-323-218-403; 127-444-480-388-473; 128-450-652-988-596; 129-842-013-619-240; 133-752-203-150-119; 134-927-490-231-285; 135-262-782-091-897; 135-717-892-795-412; 139-495-561-188-858; 142-226-580-142-17X; 142-729-737-144-734; 142-816-347-811-541; 142-870-885-548-418; 142-884-607-464-932; 147-855-964-291-004; 149-010-267-691-537; 150-249-549-372-358; 150-280-000-852-253; 152-771-716-159-330; 153-558-290-301-726; 155-310-759-030-139; 156-571-272-274-491; 156-991-897-001-400; 157-954-859-648-506; 161-171-671-691-645; 162-485-003-594-995; 162-864-397-044-696; 166-298-834-407-97X; 166-842-256-824-283; 169-067-821-124-904; 172-965-192-520-527; 178-883-713-153-793; 183-320-282-603-781; 184-948-841-629-735; 185-786-886-555-378; 190-065-821-748-92X; 191-232-053-606-145; 191-787-431-475-170; 195-393-139-218-445; 196-123-893-303-752; 196-559-417-455-648; 199-745-676-923-766,100,true,,bronze 098-758-324-126-430,Assessment of uniformity of byte distribution in a file based on the wavelet transform as an approach to search encrypted data,2015-05-01,2015,journal article,International Journal of Electronic Security and Digital Forensics,1751911x,,,null MatveevaVesta,"This article is focused on the search of the encrypted data in the file system, which is an important step in digital forensics. Encryption is widely used today, among others by malefactors to conc...",,,,,Data mining; Encryption; Wavelet transform; Distribution (number theory); File system; Computer science; Byte; Digital forensics,,,,,https://dl.acm.org/doi/10.5555/2787057.2787060,https://dl.acm.org/doi/10.5555/2787057.2787060,,,3014751323,,0,,0,false,, 098-789-704-370-365,An Analysis of Zinc-Toxicological Profiling from Forensic Biological Evidence-Urine,2019-04-25,2019,journal article,Journal of Forensic Sciences and Digital Investigation,,Northern California Open Access Publications,,,,,,55,59,Forensic science; Profiling (computer programming); Urine; DNA profiling; Biology; Computational biology; Computer science; Genetics; Biochemistry; DNA; Operating system,,,,,,http://dx.doi.org/10.29199/2637-7136/fsdi-201023,,10.29199/2637-7136/fsdi-201023,,,0,,0,true,cc-by,hybrid 098-818-169-461-619,Secure and reliable electronic record management system using digital forensic technologies,2014-03-08,2014,journal article,The Journal of Supercomputing,09208542; 15730484,Springer Science and Business Media LLC,Netherlands,Sekie Amanuel Majore; Hyunguk Yoo; Taeshik Shon,"Currently, most records are produced and stored digitally using various types of media storage and computer systems. Unlike physical records such as paper-based records, identifying, collecting, and analyzing digital records require technical knowledge and tools that are not found in archival institutions. As a result, archival institutions face challenges in their attempt to collect digital archives. One approach to overcome this problem is for archival institutions to use digital forensic knowledge and technologies. In this paper, we propose the Digital Archive Management System that integrates digital forensic technologies and archival information management systems to acquire, identify, analyze, and manage digital records in archival intuitions.",70,1,149,165,World Wide Web; Management system; Digital Archives; Management information systems; Electronic records; Computer science; Computer forensics; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/tjs/tjs70.html#MajoreYS14 http://dblp.uni-trier.de/db/journals/tjs/tjs70.html#MajoreYS14 https://link.springer.com/article/10.1007/s11227-014-1137-6 https://rd.springer.com/article/10.1007/s11227-014-1137-6 https://doi.org/10.1007/s11227-014-1137-6,http://dx.doi.org/10.1007/s11227-014-1137-6,,10.1007/s11227-014-1137-6,2133826811,,0,033-216-422-514-467; 042-638-724-786-181; 054-928-581-262-030; 058-736-328-857-558; 067-629-806-155-212; 107-745-435-451-959; 113-801-918-269-079; 142-884-607-464-932; 193-402-288-501-243,6,false,, 098-869-712-584-566,A Comparative Study of Analysis and Extraction of Digital Forensic Evidences from exhibits using Disk Forensic Tools,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Kumarshankar Raychaudhuri,,8,3,194,205,Forensic science; Information retrieval; Computer science; Extraction (chemistry); Wireless; Digital forensics,,,,,http://sdiwc.net/digital-library/a-comparative-study-of-analysis-and-extraction-of-digital-forensic-evidences-from-exhibits-using-disk-forensic-tools,http://dx.doi.org/10.17781/p002608,,10.17781/p002608,3039935325,,0,025-832-466-975-926; 052-417-651-826-763; 054-471-285-379-894; 099-582-340-445-44X; 151-798-189-363-682,0,false,, 098-880-940-361-257,The use of Artificial Intelligence in digital forensics: An introduction,2014-01-27,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,F. Mitchell,"Dr Faye Mitchell argues that the use of Artificial Intelligence, which is a well-established area of modern computer science that is capable of dealing with computationally large or complex problems, could be useful for digital forensics. Digital forensics is becoming increasingly important, and often requires the intelligent analysis of large amounts of complex data. Artificial Intelligence could help to bridge the gap.",7,0,35,41,Artificial intelligence; Bridge (interpersonal); Complex problems; Computer science; Digital forensics,,,,,https://pureportal.coventry.ac.uk/en/publications/the-use-of-artificial-intelligence-in-digital-forensics-an-introd https://sas-space.sas.ac.uk/5533/ https://journals.sas.ac.uk/deeslr/article/view/1922/1859 https://core.ac.uk/download/228154935.pdf,http://dx.doi.org/10.14296/deeslr.v7i0.1922,,10.14296/deeslr.v7i0.1922,2026744384,,0,,15,true,cc-by-nc-nd,hybrid 098-901-576-786-493,Forensic Investigation on Whatsapp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2.,2018-10-01,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Bery Actoriano; Riadi,,7,4,410,419,Forensic science; Digital forensic investigation; Computer science; Multimedia; Wireless; Computer forensics,,,,,http://sdiwc.net/digital-library/forensic-investigation-on-whatsapp-web-using-framework-integrated-digital-forensic-investigation-framework-version-2,http://sdiwc.net/digital-library/forensic-investigation-on-whatsapp-web-using-framework-integrated-digital-forensic-investigation-framework-version-2,,,2890864488,,0,004-379-948-536-390; 185-798-265-234-254,3,false,, 099-085-540-086-878,A Novel Android Memory Forensics for Discovering Remnant Data,2020-06-13,2020,journal article,"International Journal on Advanced Science, Engineering and Information Technology",24606952; 20885334,Insight Society,Indonesia,Gandeva Bayu Satrya; Febrian Kurniawan,"As recently updated on the vulnerability statistics shown in 2019, Android-driven smartphones, tablet PCs, and other Android devices are vulnerable, whether from internal or external threats. Most users store sensitive data like emails, photos, cloud storage access, and contact lists on Android smartphones. This information holds a growing-importance for the digital investigation process of mobile devices, e.g., internal memory or random-access memory (RAM) forensics, or external memory or read-only memory (ROM) forensics on Android smartphones. Internal memory retrieval is considered flawed and difficult by some researchers as it alters the digital evidence in an intrusive way. On the other hand, external memory retrieval also called logical acquisition that implies the image of logical storage items (e.g., files, database, directories, etc.) that locate on logical storage. This research provides a novel methodology that focuses only on internal memory forensic in a forensically sound manner. This research also contributes two algorithms, e.g., collect raw information (CRI) for parsing the raw data, and investigate raw information (IRI) for extracting the digital evidence to be more readable. This research conducted with fourteenth events to be analyzed, and each event was captured by SHA-1 as digital evidence. By using GDrive as the case study, the authors concluded that the proposed methodology could be used as guidance by forensics analyst(s), cyberlaw practitioner(s), and expert witness(es) in the court.",10,3,1008,1015,Raw data; Parsing; Mobile device; Information retrieval; Memory forensics; Cloud storage; Digital evidence; Computer science; Android (operating system); Auxiliary memory,,,,,https://dx.doi.org/10.18517/ijaseit.10.3.9363 http://dx.doi.org/10.18517/ijaseit.10.3.9363 http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=9363 https://core.ac.uk/download/pdf/325990748.pdf,http://dx.doi.org/10.18517/ijaseit.10.3.9363,,10.18517/ijaseit.10.3.9363,3039367688,,0,007-429-717-105-19X; 032-742-818-342-992; 046-708-956-042-655; 080-161-175-307-872; 092-015-325-499-970; 092-198-110-549-592; 096-319-685-631-822; 099-208-939-924-674; 111-484-206-251-752; 135-711-521-588-783,3,true,, 099-331-890-581-992,Predictive biometrics: a review and analysis of predicting personal characteristics from biometric data,2017-07-13,2017,journal article,IET Biometrics,20474938; 20474946,Institution of Engineering and Technology (IET),United Kingdom,Michael Fairhurst; Cheng Li; Marjory Da Costa-Abreu,"Interest in the exploitation of soft biometrics information has continued to develop over the last decade or so. In comparison with traditional biometrics, which focuses principally on person identification, the idea of soft biometrics processing is to study the utilisation of more general information regarding a system user, which is not necessarily unique. There are increasing indications that this type of data will have great value in providing complementary information for user authentication. However, the authors have also seen a growing interest in broadening the predictive capabilities of biometric data, encompassing both easily definable characteristics such as subject age and, most recently, `higher level' characteristics such as emotional or mental states. This study will present a selective review of the predictive capabilities, in the widest sense, of biometric data processing, providing an analysis of the key issues still adequately to be addressed if this concept of predictive biometrics is to be fully exploited in the future.",6,6,369,378,Biometrics; Data science; Value (ethics); Soft biometrics; Subject Age; Biometric data; User authentication; Key issues; Computer science; Identification (information),,,,,https://dblp.uni-trier.de/db/journals/iet-bmt/iet-bmt6.html#FairhurstLA17 https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/iet-bmt.2016.0169 http://dblp.uni-trier.de/db/journals/iet-bmt/iet-bmt6.html#FairhurstLA17 https://digital-library.theiet.org/content/journals/10.1049/iet-bmt.2016.0169 https://shura.shu.ac.uk/25394/ https://doi.org/10.1049/iet-bmt.2016.0169 https://core.ac.uk/download/pdf/286269435.pdf,http://dx.doi.org/10.1049/iet-bmt.2016.0169,,10.1049/iet-bmt.2016.0169,2616635204,,0,000-495-030-849-599; 000-746-373-924-806; 001-010-322-376-074; 001-484-119-723-59X; 001-907-971-520-271; 002-344-199-218-623; 003-031-749-286-970; 003-033-121-743-418; 003-548-910-140-356; 003-641-697-102-92X; 004-723-938-044-763; 005-459-810-351-031; 006-427-825-461-815; 006-760-526-041-692; 007-100-823-708-492; 008-188-893-072-907; 009-066-602-059-958; 010-227-657-608-600; 011-151-305-999-693; 012-181-382-721-12X; 012-504-971-764-367; 012-643-619-236-805; 013-677-053-829-426; 013-704-051-644-840; 013-838-705-695-115; 015-961-782-385-854; 016-835-314-422-465; 017-262-487-652-93X; 017-793-641-645-475; 017-847-868-796-228; 018-910-390-388-449; 019-154-145-141-325; 020-036-181-980-941; 020-624-508-002-842; 020-727-368-133-841; 021-527-106-531-575; 021-807-700-515-734; 021-959-493-763-681; 022-839-283-468-895; 023-017-331-962-42X; 023-538-314-994-597; 023-778-640-730-469; 024-088-484-940-63X; 024-216-051-039-399; 024-795-316-240-135; 025-276-801-412-350; 026-633-694-999-772; 027-875-481-123-521; 028-349-074-103-810; 028-478-300-568-343; 028-520-885-658-673; 028-824-054-650-235; 029-645-660-588-825; 029-938-967-057-120; 030-538-317-807-80X; 030-812-652-406-607; 031-532-168-814-617; 032-946-891-794-316; 033-032-929-692-020; 033-332-999-768-03X; 033-356-927-630-951; 034-853-926-249-511; 036-412-249-509-556; 037-721-152-321-35X; 037-904-745-634-88X; 038-384-238-543-06X; 038-571-326-529-755; 038-649-453-181-074; 038-794-896-895-050; 039-315-888-655-968; 040-866-982-104-587; 041-319-285-288-206; 042-895-918-727-988; 043-013-098-062-077; 043-418-208-001-589; 044-462-242-330-823; 045-342-795-433-46X; 046-414-167-925-013; 046-834-350-267-363; 048-859-009-491-04X; 049-137-662-281-055; 049-195-163-313-61X; 051-397-275-696-392; 052-024-428-963-557; 052-824-545-912-826; 053-007-822-713-240; 053-336-565-463-902; 054-646-663-208-462; 054-919-519-112-934; 055-551-279-025-869; 058-141-299-788-182; 058-218-998-404-769; 059-869-375-152-177; 060-410-854-317-756; 060-686-420-539-64X; 061-499-152-919-306; 061-660-550-350-061; 061-689-414-022-556; 062-616-633-569-585; 063-229-014-956-486; 064-390-177-610-751; 066-235-384-977-938; 066-972-121-109-653; 067-486-078-072-834; 068-820-114-654-303; 069-167-407-938-075; 070-737-038-070-916; 071-320-638-709-376; 071-939-440-373-976; 071-951-812-805-824; 073-401-706-589-562; 073-713-371-955-585; 073-869-773-072-946; 075-774-031-084-500; 075-789-850-907-189; 076-181-418-919-632; 077-325-194-576-314; 078-215-336-717-40X; 078-673-954-153-435; 081-595-819-464-385; 082-604-389-470-619; 082-900-937-559-785; 082-915-259-924-748; 084-660-815-932-302; 084-706-226-493-824; 084-868-010-850-409; 086-086-777-079-177; 086-358-870-532-032; 087-309-622-816-840; 089-884-786-817-130; 090-593-669-588-91X; 093-265-742-190-497; 093-592-445-238-763; 096-055-671-298-858; 098-239-621-203-004; 098-405-524-809-689; 099-145-643-633-020; 099-823-087-160-727; 102-741-541-121-785; 102-902-258-065-030; 104-102-177-890-52X; 104-456-304-650-675; 104-579-905-493-951; 105-363-698-214-481; 105-703-978-819-336; 108-507-532-818-241; 108-871-455-511-529; 108-893-833-008-910; 108-935-646-853-556; 108-964-854-965-221; 114-588-926-712-022; 116-694-301-651-76X; 117-220-039-057-555; 117-754-012-070-57X; 118-979-286-489-320; 119-304-465-254-384; 119-357-456-853-122; 121-323-080-592-599; 124-876-877-298-476; 128-612-912-986-474; 131-758-743-712-682; 132-543-217-323-319; 132-772-252-591-844; 136-508-315-164-990; 137-449-122-952-551; 140-700-018-507-12X; 143-403-997-441-264; 144-926-736-997-036; 146-352-624-378-946; 151-328-547-068-354; 154-447-691-752-805; 155-935-171-761-272; 160-118-618-371-117; 160-278-643-092-729; 164-196-946-362-331; 165-916-185-452-680; 168-390-706-505-027; 169-468-497-334-877; 170-421-611-210-235; 172-572-166-912-802; 176-609-378-874-651; 177-671-454-985-606; 179-746-591-701-936; 184-725-242-927-206; 195-866-068-401-88X,10,true,"CC BY, CC BY-ND, CC BY-NC, CC BY-NC-ND",gold 099-377-733-522-116,Part 1: The need for peer review in digital forensics,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Graeme Horsman; Nina Sunde,"Abstract The importance of peer review in the field of digital forensics cannot be underestimated as it often forms the primary, and sometimes only form of quality assurance process an organisation will apply to their practitioners' casework. Whilst there is clear value in the peer review process, it remains an area which is arguably undervalued and under-researched, where little academic and industrial commentary can be found describing best practice approaches. This work forms the first of a two part series discussing why the digital forensics discipline and its organisations should conduct peer review in their laboratories, what it should review as part of this process, and how this should be undertaken. Here in part one, a critical review of the need to peer review is offered along with a discussion of the limitations of existing peer review mechanisms. Finally, the ‘Peer Review Hierarchy’ is offered, outlining the seven levels of peer review available for reviewing practitioner findings.",35,,301062,,Peer review; Sociology; Work (electrical); Best practice; Value (ethics); Hierarchy; Process (engineering); Engineering ethics; Digital forensics,,,,Norwegian Police University College,https://dblp.uni-trier.de/db/journals/di/di35.html#HorsmanS20 https://www.sciencedirect.com/science/article/pii/S2666281720303590 https://research.tees.ac.uk/en/publications/part-1-the-need-for-peer-review-in-digital-forensics https://core.ac.uk/download/362894515.pdf,http://dx.doi.org/10.1016/j.fsidi.2020.301062,,10.1016/j.fsidi.2020.301062,3087768853,,0,003-168-641-529-165; 005-232-046-693-557; 005-392-088-749-603; 005-542-560-321-688; 007-337-082-788-602; 007-582-851-613-954; 012-189-717-454-526; 012-410-670-929-028; 018-607-295-495-260; 019-831-293-743-518; 030-178-593-043-926; 034-021-215-110-765; 035-519-584-610-671; 036-963-912-777-09X; 042-230-817-975-353; 047-386-524-667-691; 047-859-979-695-194; 049-404-833-736-24X; 050-994-414-657-166; 075-950-021-558-098; 080-545-688-531-696; 083-828-164-442-528; 091-872-704-948-238; 093-309-498-241-337; 094-498-765-194-523; 102-599-064-891-853; 103-294-378-905-305; 109-098-876-649-367; 149-467-515-040-638; 167-366-167-352-677; 171-256-463-941-932; 181-545-693-146-583; 197-872-262-830-083,9,true,cc-by-nc-nd,hybrid 099-446-510-492-905,Digital investigations: relevance and confidence in disclosure,2021-09-21,2021,journal article,ERA Forum,16123093; 18639038,Springer Science and Business Media LLC,Germany,Philip Anderson; Dave Sampson; Seanpaul Gilroy,"AbstractThe field of digital forensics has grown exponentially to include a variety of digital devices on which digitally stored information can be processed and used for different types of crimes. As a result, as this growth continues, new challenges for those conducting digital forensic examinations emerge. Digital forensics has become mainstream and grown in importance in situations where digital devices used in the commission of a crime need examining. This article reviews existing literature and highlights the challenges while exploring the lifecycle of a mobile phone examination and how the disclosure and admissibility of digital evidence develops.",22,4,587,599,,,,,,,http://dx.doi.org/10.1007/s12027-021-00687-1,,10.1007/s12027-021-00687-1,,,0,009-284-801-057-774; 050-618-920-212-97X; 088-938-096-763-07X; 094-468-232-325-36X; 167-751-222-897-487,0,true,cc-by,hybrid 099-681-525-938-447,Artificial Intelligence: An Expedition from Archaic to Advanced Technologies,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Tanmayee Tilekar; Avinash Kumar,,,,,,Engineering; Cognitive science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.08,http://dx.doi.org/10.46293/4n6/2020.02.04.08,,10.46293/4n6/2020.02.04.08,3095508078,,0,,0,false,, 099-820-647-132-182,A Detailed Study to Examine Digital Forensics and Cyber Security: Trends and Pattern in India,,2020,journal article,International Journal of Forensic Sciences,25731734,Medwin Publishers,,Zlatko Jakjovski,,5,2,,,Digital forensics; Computer security; Cyber crime; Computer forensics; Internet privacy; Computer science,,,,,,http://dx.doi.org/10.23880/ijfsc-16000184,,10.23880/ijfsc-16000184,,,0,,0,false,, 099-824-336-659-348,Cloud Forensics Investigation in Cloud Storage Using IDFIF V2 Method,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Ahmad Muhammad Ridho; Nuril Anwar,,8,3,232,240,Operating system; Cloud storage; Cloud forensics; Computer science; Wireless,,,,,http://sdiwc.net/digital-library/cloud-forensics-investigation-in-cloud-storage-using-idfif-v2-method,http://dx.doi.org/10.17781/p002621,,10.17781/p002621,3039532573,,0,026-641-935-890-517; 055-086-544-213-027; 060-949-600-123-897,0,false,, 100-154-746-639-394,A Proactive Approach in Network Forensic Investigation Process,2016-05-23,2016,journal article,International Journal of Computer Applications Technology and Research,23198656,Association of Technology and Science,,Joseph MbuguaChahira; Jane KinanuKiruki; Peter KipronoKemei,"Information Assurance and Security (IAS) is a crucial component in the corporate environment to ensure that the secrecy of sensitive data is protected, the integrity of important data is not violated, and the availability of critical systems is guaranteed. The advancement of Information communication and technology into a new era and domain such as mobility and Internet of Things, its ever growing user’s base and sophisticated cyber-attacks forces the organizations to deploy automated and robust defense mechanism to manage resultant digital security incidences in real time. Digital forensic is a scientific process that facilitates detection of illegal activities and in-appropriate behaviors using scientific tools, techniques and investigation frameworks. This research aims at identifying processes that facilitate and improves digital forensic investigation process. Existing digital forensic framework will be reviewed and the analysis will be compiled toderive a network forensic investigation framework that include evidence collection, preservation and analysis at a sensor level and in real time. It is aimed to discover complete relationship with optimal performance among known and unseen/new alerts generated by multiple network sensors in order to improve the quality of alert and recognize attack strategy",5,5,304,311,Scientific instrument; Data science; Secrecy; Quality (business); Digital security; Information assurance; Computer science; Process (engineering); Component (UML); Digital forensics,,,,,http://ijcat.com/archives/volume5/issue5/ijcatr05051012.pdf,http://dx.doi.org/10.7753/ijcatr0505.1012,,10.7753/ijcatr0505.1012,2395405024,,0,004-706-447-836-905; 005-102-962-333-180; 005-515-442-506-880; 010-086-703-646-194; 014-147-422-032-729; 016-661-251-213-668; 020-944-423-224-895; 021-850-998-857-676; 031-604-145-879-389; 032-697-093-668-898; 038-668-970-194-854; 042-744-922-949-227; 047-630-600-014-492; 051-380-288-368-274; 099-306-422-758-350; 109-482-615-363-500; 111-090-978-711-139; 118-859-184-492-143; 133-397-275-695-990; 143-562-788-834-457; 183-000-233-873-221; 187-515-487-119-788; 190-065-821-748-92X; 199-745-676-923-766,0,true,,bronze 100-166-340-709-899,Digital Autopsy: Moving From Fiction to Reality,,2014,journal article,Journal of Indian Academy of Forensic Medicine,09710973,,,Navpreet Kaur; R.K Chaudhary; Pankaj Gupta; Baljeet Singh,"With the technology ruling over each sphere of our modern lives it is no wonder that it is also proving to be a source of great help to the forensic experts who with their work make the dead talk. Technology is fast replacing the manual and mental traditional methods and with the launching of igene and autopsy suites virtual autopsy/digital autopsy/autopsy imaging is indeed moving from fiction to becoming a factual reality. Though forensic radiology has been in use since the discovery of X-rays but the technique which was used to visualize and analyze the mummified remains of people who died thousands of years ago sowed the seed of digital visualization being promoted commercially as digital autopsy. In the setting of Forensic evaluation, 3D surface scanning using multislice CT technology provides excellent visualization of the body and allows re-examination of digital images of the deceased long after the actual time of death.",36,2,195,198,Engineering; Visual arts; Digital autopsy; Wonder; Forensic radiology; Time of death; Multislice ct; Surface scanning; Visualization; Forensic engineering,,,,,http://www.indianjournals.com/ijor.aspx?target=ijor:jiafm&volume=36&issue=2&article=017&type=pdf,http://www.indianjournals.com/ijor.aspx?target=ijor:jiafm&volume=36&issue=2&article=017&type=pdf,,,2245387430,,0,,0,false,, 100-289-225-534-501,Challenges and Requirements of Digital Forensics Investigation in Wireless Ad-hoc Networks,,2012,journal article,International Journal of Advanced Research in Computer Science,09765697,,,Muhammad Sufyian Mohd Azmi; Labeeb Mohsin Abdullah Abdulrahman H. Altalhi; Zailani Mohamed Sidek,"Digital forensics involves the acquisition and investigation of materials that are collected from digital devices involved in digital crimes. Currently, the term ―digital forensics ― is used to cover the investigation of all devices used to store digital data .There are some technologies that have the ability of expanding, and wireless ad-hoc network technology is one of them. Due to the nature of wireless ad-hoc networks, difficulties commonly arise, and as a result, investigating such networks, create large challenges. Thus, the goals of this paper are to understand the concepts of wireless ad-hoc networks and the challenges of collecting live evidence on such networks, to highlight the research requirements, and to propose solutions to some of these challenges. Keywords: Digital forensics, Wireless Ad-hoc networks, Digital crimes, Digital investigation.",3,1,26,30,Digital data; Cover (telecommunications); Computer science; Multimedia; Wireless; Term (time); Digital forensics; Wireless ad hoc network,,,,,https://www.ijarcs.info/index.php/Ijarcs/article/view/980,https://www.ijarcs.info/index.php/Ijarcs/article/view/980,,,2948414786,,0,,0,false,, 100-812-050-439-994,Prelim iii - Contents List,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,34,,301068,301068,Information retrieval; Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30365-6,,10.1016/s2666-2817(20)30365-6,,,0,,0,true,,bronze 100-852-334-797-730,Value and prospects of constructing digital slides data of forensic medicine,2013-01-20,2013,journal article,Chinese Journal of Medical Education Research,20951485,,,Jun Su; Liang Liu; Shaohua Zhu; Hongmei Dong; Man Liang; Qian Liu,"As a rising histological specimen carrier,digital slide has advantages of easy search and fast browse.By digital scanning and stitching of traditional slides and uploading traditional slides as well as pathological information to network servers,the construction of digital slides data can take its own superiority to assist forensic medicine teaching.Combined with our research and teaching experience,this article discussed the application prospects of digital slide technology and digital slides data so as to provide references for the improvement and reformation of forensic medicine education.; ; Key words: ; Medical education; Forensic medicine; Digital slide; Practice",12,01,39,41,Key (cryptography); Value (mathematics); Image stitching; Digital slide; Computer science; Multimedia; Upload; Server,,,,,http://rs.yiigle.com/CN116021201301/216148.htm,http://rs.yiigle.com/CN116021201301/216148.htm,,,3032519862,,0,,0,false,, 101-083-734-725-35X,The complexity of internet of things forensics: A state-of-the-art review,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Pantaleon Lutta; Mohamed Sedky; Mohamed Hassan; Uchitha Jayawickrama; Benhur Bakhtiari Bastaki,,38,,301210,,The Internet; Systematic review; Key (cryptography); Data science; Cybercrime; State of the art review; Computer science; Home automation; Internet of Things; Digital forensics,,,,,http://eprints.staffs.ac.uk/6934/ https://www.sciencedirect.com/science/article/abs/pii/S2666281721001189 https://repository.lboro.ac.uk/articles/journal_contribution/The_complexity_of_internet_of_things_forensics_A_state-of-the-art_review/14884137/1,http://dx.doi.org/10.1016/j.fsidi.2021.301210,,10.1016/j.fsidi.2021.301210,3171151628,,0,000-490-412-762-138; 000-781-175-000-905; 003-029-378-692-335; 004-611-464-291-773; 004-750-320-878-25X; 005-630-640-664-939; 010-196-658-878-056; 014-144-528-890-509; 015-239-387-608-474; 016-526-859-340-786; 018-552-581-098-658; 019-360-393-097-72X; 019-912-316-692-552; 025-484-846-284-184; 026-764-618-898-849; 026-885-005-782-449; 030-433-196-114-204; 034-581-158-056-04X; 035-859-793-614-223; 047-125-525-662-686; 047-782-671-230-742; 051-330-401-796-575; 055-811-656-615-740; 056-161-895-385-676; 058-156-586-882-704; 060-294-953-084-788; 061-461-493-341-860; 065-322-784-190-818; 065-654-832-541-493; 067-746-157-973-903; 074-204-121-502-453; 075-366-793-103-250; 075-623-366-558-183; 084-452-444-628-355; 085-425-338-426-218; 088-553-642-323-93X; 090-774-592-907-144; 092-827-935-965-207; 093-117-308-515-186; 104-098-703-521-179; 111-753-203-548-051; 112-181-239-331-730; 122-568-647-193-751; 125-682-509-275-554; 128-603-018-655-844; 137-153-736-677-264; 145-501-944-463-55X; 167-751-222-897-487; 170-108-067-251-840; 170-516-749-420-456,5,false,, 101-313-419-021-994,Understanding Computer Forensics Requirements in China via the “Panda Burning Incense” Virus Case,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Kam-Pui Chow; Frank Y. W. Law; Y. H. Mai,"In March 2012, Mainland China has amended its Criminal Procedure Law, which includes the introduction of a new type of evidence, i.e., digital evidence, to the court of law. To better understand the development of computer forensics and digital evidence in Mainland China, this paper discusses the Chinese legal system in relation to digital investigation and how the current legal requirements affect the existing legal and technical usage of digital evidence at legal proceedings. Through studying the famous ""Panda Burning Incense (Worm.WhBoy.cw)"" virus case that happened in 2007, this paper aims to provide a better understanding of how to properly conduct computer forensics examination and present digital evidence at court of law in Mainland China.",9,2,51,58,Mainland China; Political science; China; Law; Digital evidence; Computer security; Criminal procedure; Incense; Computer forensics,,,,,https://core.ac.uk/display/91667418 https://doaj.org/article/d8d352362129465b89a2631dfcac16ab https://commons.erau.edu/jdfsl/vol9/iss2/5/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1170&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#ChowLM14 https://www.mendeley.com/catalogue/5cc31364-f57d-3fb0-8321-cb4f4a8f7c35/,http://dx.doi.org/10.15394/jdfsl.2014.1170,,10.15394/jdfsl.2014.1170,2130476451,,0,001-139-787-841-711; 021-850-998-857-676; 029-611-752-396-235; 110-079-538-894-548; 140-967-697-100-606; 199-172-967-270-034,0,true,cc-by-nc,gold 101-417-271-073-240,A comparative study on data protection legislations and government standards to implement Digital Forensic Readiness as mandatory requirement,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Sungmi Park; Nikolay Akatyev; Yunsik Jake Jang; Jisoo Hwang; Dong-Hyun Kim; Woonseon Yu; Hyun Woo Shin; Changhee Han; Jonghyun Kim,"Abstract Many data breaches happened due to poor implementation or complete absence of security controls in private companies as well as in government organizations. Many countries work on improvement of security requirements and implementing them in their legislation. However, most of the security frameworks are reactive and do not address relevant threats. The existing research suggests Digital Forensic Readiness as proactive measures, but there is only one example of its implementation as a policy. Our work surveys the current state of data protection legislation in the selected countries and their initiatives for the implementation of Digital Forensic Readiness. Then we discuss if Digital Forensic Readiness as a mandatory requirement can improve data protection state in both public and private sectors, evaluating possible challenges. We contribute suggestions for the adoption of Digital Forensic Readiness as a mandatory requirement for private companies and government organizations.",24,,S93,S100,Private sector; Government; Data breach; Work (electrical); Security controls; Legislation; Public relations; Computer science; Data Protection Act 1998; Digital forensics,,,,KITRI (Korea IT Research Institute),https://dblp.uni-trier.de/db/journals/di/di24.html#ParkAJHKYSHK18 https://www.sciencedirect.com/science/article/pii/S1742287618300446 https://www.sciencedirect.com/science/article/abs/pii/S1742287618300446,http://dx.doi.org/10.1016/j.diin.2018.01.012,,10.1016/j.diin.2018.01.012,2790971054,,0,000-123-040-686-642; 008-751-783-762-210; 019-698-064-288-240; 021-486-901-460-202; 035-565-993-122-262; 054-331-725-373-265; 062-160-327-683-926; 097-675-162-158-578; 130-919-597-852-457; 136-618-607-762-754; 144-924-692-716-271; 183-365-568-336-243,11,true,cc-by-nc-nd,hybrid 101-448-987-380-635,Customized blockchain-based architecture for secure smart home for lightweight IoT,,2021,journal article,Information Processing & Management,03064573; 18735371,Elsevier BV,United Kingdom,Meryem Ammi; Shatha Alarabi; Elhadj Benkhelifa,,58,3,102482,,The Internet; Information system; Interoperability; Cloud storage; Service (systems architecture); Computer security; Computer science; Home automation; Server; Transparency (human–computer interaction),,,,,https://dblp.uni-trier.de/db/journals/ipm/ipm58.html#AmmiAB21 https://www.sciencedirect.com/science/article/abs/pii/S0306457320309717,http://dx.doi.org/10.1016/j.ipm.2020.102482,,10.1016/j.ipm.2020.102482,3125425014,,0,002-602-949-519-361; 004-232-346-311-155; 006-129-714-228-417; 009-225-827-148-391; 009-733-726-448-062; 014-448-058-704-128; 018-541-770-775-407; 021-886-834-162-282; 022-281-420-650-598; 026-037-120-558-475; 039-049-374-311-077; 039-503-976-801-29X; 054-079-583-763-10X; 055-520-745-133-145; 055-694-149-090-820; 058-729-147-158-648; 068-201-598-480-086; 077-864-008-508-362; 081-138-471-843-208; 095-059-171-903-312; 096-091-715-269-337; 118-813-006-449-763; 121-097-801-793-903; 130-057-547-194-322; 131-338-927-190-080; 142-528-666-471-197; 161-688-509-157-403; 170-656-000-611-976,27,false,, 101-549-415-202-81X,Standardization of forming and expressing preliminary evaluative opinions on digital evidence,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Eoghan Casey,,32,,200888,,Standardization; Data science; Standardized approach; Interim; International community; Digital evidence; Computer science; Reliability (statistics); Interpretation (philosophy); Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287619303147 https://doi.org/10.1016/j.fsidi.2019.200888,http://dx.doi.org/10.1016/j.fsidi.2019.200888,,10.1016/j.fsidi.2019.200888,3003603895,,0,009-512-003-529-193; 010-963-610-208-920; 014-966-931-773-938; 015-238-949-406-002; 018-182-926-340-45X; 021-798-083-032-603; 028-472-372-312-622; 040-376-945-320-975; 041-724-921-575-089; 048-250-488-210-056; 050-296-813-523-597; 058-717-000-287-105; 061-269-967-405-492; 064-549-392-650-90X; 066-351-117-066-660; 085-315-744-117-237; 085-370-444-410-812; 087-342-951-350-054; 106-010-372-725-049; 117-555-147-368-574; 123-006-126-477-128; 131-696-619-498-120; 141-366-693-391-357; 148-223-435-969-407; 173-145-269-859-717,15,false,, 101-711-086-084-623,Application of quality in use model to assess the user experience of open source digital forensics tools,,2020,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Manar Abu Talib; Reem Alnanih; Adel Khelifi,,12,1,43,43,Computer science; Open source; Digital forensics; Quality (philosophy); Digital evidence; Data science; Computer forensics; World Wide Web,,,,,,http://dx.doi.org/10.1504/ijesdf.2020.103870,,10.1504/ijesdf.2020.103870,,,0,,0,true,,bronze 101-819-655-568-965,Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web,2017-06-30,2017,journal article,Jurnal Ilmiah Teknik Elektro Komputer dan Informatika,23383062; 23383070,"Universitas Ahmad Dahlan, Kampus 3",,Nuril Anwar; Riadi,"Perkembangan telekomunikasi meningkat sangat pesat semenjak layanan pesan instan berbasis internet merambat cepat ke Indonesia. WhatsApp adalah aplikasi pesan instan paling populer dibanding layanan pesan instan lain, menurut situs website statista pengguna per Januari 2017 sebanyak 1,2 miliar orang secara aktif menggunakan aplikasi ini. Seiring pembaruan WhatsApp berbagai fitur disematkan dalam aplikasi ini diantaranya Whatsapp Berbasis Web untuk Komputer, fitur ini mempermudah pengguna dalam berbagi file tertentu serta dapat tersinkronisasi terhadap smartphone maupun komputer penggunanya. Disamping sisi positif yang didapati aplikasi, WhatsApp juga memberikan celah keamanan akan privasi penggunanya salah satunya yaitu penyadapan percakapan yang melibatkan kedua devices ; smartphone dan komputer. Penanganan tindak kejahatan yang melibatkan piranti digital perlu ditekankan sehingga dapat membantu proses peradilan akan efek yang ditimbulkannya. Investigasi Forensika Digital turut berperan serta terhadap penindakan penyalahgunaan fitur layanan pesan instan WhatsApp diantaranya langkah investigasi penanganan kasus penyadapan percakapan WhatsApp melalui serangkaian tahapan baku sesuai prosedur forensika digital. Eksplorasi barang bukti (digital evidence) percakapan WhatsApp akan menjadi acuan akan tindak kejahatan penyadapan telekomunikasi yang selanjutnya akan dilakukan report investigation forensics yang melibatkan barang bukti smartphone dan komputer korban.",3,1,1,10,,,,,,http://dx.doi.org/10.26555/jiteki.v3i1.6643 http://journal.uad.ac.id/index.php/JITEKI/article/download/6643/3530 https://dx.doi.org/10.26555/jiteki.v3i1.6643 http://journal.uad.ac.id/index.php/JITEKI/article/view/6643/3530 https://core.ac.uk/download/pdf/295348216.pdf,http://dx.doi.org/10.26555/jiteki.v3i1.6643,,10.26555/jiteki.v3i1.6643,2748440010,,0,,7,true,cc-by-sa,gold 101-875-322-318-577,Mobile Digital Forensic Procedure for Crime Investigation in Social Network Service,2013-06-30,2013,journal article,The Journal of Korea Navigation Institute,12269026,The Korea Navigation Institute,,Yu Jong Jang; Jin Kwak,"Social network services(SNS) has been used as a means of communication for user or express themselves user. Therefore, SNS has a variety of information. This information is useful to help the investigation can be used as evidence. In this paper, A study of mobile digital forensic procedure for crime investigation in social network service. Analysis of database file taken from the smartphone at social network service application for mobile digital forensic procedure. Therefore, we propose a procedure for the efficient investigation of social network service mobile digital forensic.",17,3,325,331,Engineering; Variety (cybernetics); World Wide Web; Crime investigation; Social network service; Database file; Digital forensics; Social network,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=HHHHBI_2013_v17n3_325,http://dx.doi.org/10.12673/jkoni.2013.17.3.325,,10.12673/jkoni.2013.17.3.325,2041159558,,0,105-128-303-857-483; 159-397-815-304-211; 199-745-676-923-766,4,false,, 101-894-461-425-579,A New Digital Evidence Retrieval Model for Gambling Machine Forensic Investigation,2012-01-20,2012,journal article,Jurnal Teknologi,21803722; 01279696,Penerbit UTM Press,Malaysia,Pritheega Magalingam; Azizah Abdul Manaf; Zuraimi Yahya; Rabiah Ahmad,"Analisis forensik perkakasan melibatkan proses menganalisa data yang di perolehi secara elektronik untuk menunjukkan bukti sama ada peralatan elektronik adalah digunakan untuk melakukan jenayah, mengandungi bukti jenayah atau ia adalah satu sasaran jenayah. Penyalahgunaan mesin permainan merupakan sumber utama permainan haram dijalankan. Kerja penyelidikan ini memperkenalkan kaedah mendapatkan maklumat dari satu mesin permainan yang telah dirampas oleh PDRM dan menganalisis data yang diterjemahkan untuk membuktikan bahawa mesin permainan tersebut digunakan secara haram. Prosedur mendapatkan bukti digital ini dibina untuk membantu pihak polis atau penyiasat dalam penganalisaan maklumat digital dan ia boleh dijadikan sebagai satu garis panduan untuk mengenalpasti bukti yang relevan untuk menunjukan aktiviti perjudian haram dijalankan.; Kata kunci: Forensik digital, analisis forensik, mesin judi, kaedah pengambilan informasi, penterjemahan, pencarian kata; Hardware forensic analysis involves the process of analyzing digital evidence derived from digital sources. The analysis is done to facilitate and prove either the device is used to commit crime, whether it contains evidence of a crime or is the target of a crime. Gambling machines serve as the main source by which illegal games are conducted. This paper presents a method for retrieving information from a seized gaming machine, along with an analysis of the interpreted information to prove that the gaming machine was used illegally. The proposed procedures for the gambling machine forensic process will be important for forensic investigators (e.g., the police or private investigators), as they will assist these individuals in the digital forensic evidence analysis necessary to produce evidence relevant to illegal gambling.; Key words: digital forensic, forensic analysis, gambling machine, information retrieval method, interpretation, string search",54,1,55,69,Forensic science; Psychology; Information retrieval; Digital evidence; Computer security; Digital forensics,,,,,http://jurnalteknologi.utm.my/index.php/jurnalteknologi/article/view/91 https://www.researchgate.net/profile/Pritheega_Magalingam/publication/269758697_A_New_Digital_Evidence_Retrieval_Model_For_Gambling_Machine_Forensic_Investigation/links/557a3f2108ae75363756ffdf.pdf https://core.ac.uk/display/42912128 https://journals.utm.my/jurnalteknologi/article/view/91 http://www.ijofcs.org/V04N1-PP05%20-%20A%20New%20Digital%20Evidence%20Retrieval%20Model%20for%20Gambling%20Machine.pdf http://eprints.utm.my/id/eprint/44692/,http://dx.doi.org/10.11113/jt.v54.91,,10.11113/jt.v54.91,2039523489,,0,026-810-683-474-561; 074-933-143-629-826; 087-705-894-476-40X; 105-427-271-392-801; 107-096-001-312-874; 126-338-081-626-731,0,false,, 102-117-623-922-990,ISSE - Digital Forensics as a Big Data Challenge,,2013,journal article,ISSE 2013 Securing Electronic Business Processes,,Springer Fachmedien Wiesbaden,,Alessandro Guarino,"Digital Forensics, as a science and part of the forensic sciences, is facing new challenges that may well render established models and practices obsolete. The dimensions of potential digital evidence supports has grown exponentially, be it hard disks in desktop and laptops or solid state memories in mobile devices like smartphones and tablets, even while latency times lag behind. Cloud services are now sources of potential evidence in a vast range of investigations and network traffic also follows a growing trend and in cyber security the necessity of sifting through vast amount of data quickly is now paramount. On a higher level investigations - and intelligence analysis - can profit from sophisticated analysis of such datasets as social network structures, corpora of text to be analysed for authorship and attribution. All of the above highlights the convergence between so-called data science and digital forensics, to tack the fundamental challenge of analyse vast amount of data (""big data"") in actionable time while at the same time preserving forensic principles in order for the results to be presented in a court of law. The paper, after introducing digital forensics and data science, explores the challenges above and proceed to propose how techniques and algorithms used in big data analysis can be adapted to the unique context of digital forensics, ranging from the managing of evidence via Map-Reduce to machine learning techniques for triage and analysis of big forensic disk images and network traffic dumps. In the conclusion the paper proposes a model to integrate this new paradigm into established forensic standards and best practices and tries to foresee future trends.",,,197,203,Solid-state; Internet privacy; Best practice; Mobile device; Data science; Digital evidence; Computer science; Intelligence analysis; Big data; Cloud computing; Digital forensics,,,,,https://doi.org/10.1007/978-3-658-03371-2_17 https://rd.springer.com/chapter/10.1007/978-3-658-03371-2_17 http://www.studioag.pro/wp-content/uploads/2013/10/DigitalForensicsBigData.pdf https://link.springer.com/chapter/10.1007/978-3-658-03371-2_17 https://dblp.uni-trier.de/db/conf/isse/isse2013.html#Guarino13,http://dx.doi.org/10.1007/978-3-658-03371-2_17,,10.1007/978-3-658-03371-2_17,138782056,,0,001-741-032-719-461; 087-690-831-820-163,54,false,, 102-169-873-723-040,Reconstructing streamed video content: A case study on YouTube and Facebook Live stream content in the Chrome web browser cache,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Graeme Horsman,"Abstract With the increased popularity of online video streaming comes the risk of this technology's subsequent abuse. With a number of cases noted in 2017 where individuals have engaged with illegal or policy breaching video content, digital forensics practitioners are often tasked with investigating the subsequent ‘fingerprint’ of such acts. This is often to determine both the content of a stream in question, and, how it has been interacted with, typically from an analysis of data residing on a suspect's local device. This article provides an examination of the forensic procedures required to identify and reconstruct cached video stream data using both YouTube and Facebook Live as example case studies. Stream reconstruction methodologies are offered where results show that where a YouTube and Facebook Live video have been played, buffered video stream data can be reassembled to produce a viewable video clip of content.",26,,S30,S37,Cache; World Wide Web; Suspect; Content (Freudian dream analysis); Popularity; Stream data; Web browser; Live video; Computer science; Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287618301932 https://dblp.uni-trier.de/db/journals/di/di26.html#Horsman18a https://research.tees.ac.uk/en/publications/reconstructing-streamed-video-content-a-case-study-on-youtube-and https://doi.org/10.1016/j.diin.2018.04.017 https://research.tees.ac.uk/ws/files/6554397/621817.pdf https://www.sciencedirect.com/science/article/pii/S1742287618301932 https://core.ac.uk/download/322331504.pdf,http://dx.doi.org/10.1016/j.diin.2018.04.017,,10.1016/j.diin.2018.04.017,2795378978,,0,,16,true,cc-by-nc-nd,hybrid 102-243-142-344-71X,Formalising investigative decision making in digital forensics: Proposing the Digital Evidence Reporting and Decision Support (DERDS) framework,,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Graeme Horsman,"Abstract In the field of digital forensics it is crucial for any practitioner to possess the ability to make reliable investigative decisions which result in the reporting of credible evidence. This competency should be considered a core attribute of a practitioner’s skill set and it is often taken for granted that all practitioners possess this ability; in reality this is not the case. A lack of dedicated research and formalisation of investigative decision making models to support digital forensics practitioner’s is an issue given the complexity of many digital investigations. Often, the ability to make forensically sound decisions regarding the reliability of any findings is arguably an assumed trait of the practitioner, rather than a formally taught competency. As a result, the digital forensic discipline is facing increasing recent scrutiny with regards to the quality and validity of evidence it’s practitioners are producing. This work offers the Digital Evidence Reporting and Decision Support (DERDS) framework, designed to help the practitioner assess the reliability of their ‘inferences, assumptions of conclusions’ in relation to any potentially evidential findings. The structure and application of the DERDS framework is discussed, demonstrating the stages of decision making a practitioner must undergo when evaluating the accuracy of their findings, whilst also recognising when content may be deemed unsafe to report.",28,,146,151,Decision support system; Set (psychology); Relation (database); Scrutiny; Quality (business); Digital evidence; Decision-making models; Computer science; Knowledge management; Digital forensics,,,,,https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902227595710700 https://research.tees.ac.uk/en/publications/formalising-investigative-decision-making-in-digital-forensics-pr https://dblp.uni-trier.de/db/journals/di/di28.html#Horsman19 https://www.sciencedirect.com/science/article/pii/S1742287618302731,http://dx.doi.org/10.1016/j.diin.2019.01.007,,10.1016/j.diin.2019.01.007,2911386828,,0,000-659-280-122-390; 004-200-813-216-207; 008-598-808-594-324; 012-410-670-929-028; 026-774-296-742-022; 034-773-286-616-44X; 042-230-817-975-353; 050-513-243-638-138; 061-269-967-405-492; 064-549-392-650-90X; 066-235-037-082-291; 075-529-701-912-32X; 078-730-781-174-18X; 080-196-042-005-758; 111-488-239-742-003; 120-454-127-510-479; 137-755-137-054-864; 142-790-196-752-819; 182-670-398-460-931,24,true,cc-by-nc-nd,green 102-385-975-365-674,Forensic analysis of a Sony PlayStation 4,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Matthew Davies; Huw Read; Konstantinos Xynos; Iain Sutherland,"The primary function of a games console is that of an entertainment system. However the latest iteration of these consoles has added a number of new interactive features that may prove of value to the digital investigator. This paper highlights the value of these consoles, in particular Sony's latest version of their PlayStation. This console provides a number of features including web browsing, downloading of material and chat functionality; all communication features that will be of interest to forensic investigators. In this paper we undertake an initial investigation of the PlayStation 4 games console. This paper identifies potential information sources of forensic value with the PlayStation 4 and provides a method for acquiring information in a forensically sound manner. In particular issues with the online and offline investigative process are also identified.",12,,S81,S89,World Wide Web; Online and offline; Computer science; Process (engineering); Video game packaging; Multimedia; Entertainment; Web navigation; Upload; Function (engineering),,,,,https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1939&context=ecuworkspost2013 https://core.ac.uk/display/82136117 https://www.sciencedirect.com/science/article/pii/S1742287615000146 https://www.sciencedirect.com/science/article/abs/pii/S1742287615000146 https://www.mendeley.com/catalogue/09696697-6a81-3f40-ae11-bde85b2dac7f/ https://dl.acm.org/doi/10.1016/j.diin.2015.01.013 https://doi.org/10.1016/j.diin.2015.01.013 https://dblp.uni-trier.de/db/journals/di/di12.html#DaviesRXS15 https://ro.ecu.edu.au/ecuworkspost2013/938/ https://core.ac.uk/download/pdf/82136117.pdf,http://dx.doi.org/10.1016/j.diin.2015.01.013,,10.1016/j.diin.2015.01.013,2090057777,,0,027-835-655-333-208; 045-793-574-611-616; 052-783-938-076-074; 081-216-246-651-622; 087-705-894-476-40X; 109-496-095-188-012; 160-818-318-297-75X,11,true,cc-by-nc-nd,hybrid 102-410-389-190-13X,Prelim iii - Contents List,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,32,,300967,300967,Information retrieval; Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30145-1,,10.1016/s2666-2817(20)30145-1,,,0,,0,false,, 102-562-783-311-06X,A Comprehensive Collection and Analysis Model for the Drone Forensics Field.,2022-08-29,2022,journal article,"Sensors (Basel, Switzerland)",14248220; 14243210,Multidisciplinary Digital Publishing Institute (MDPI),Switzerland,Fahad Mazaed Alotaibi; Arafat Al-Dhaqm; Yasser D Al-Otaibi; Abdulrahman A Alsewari,"Unmanned aerial vehicles (UAVs) are adaptable and rapid mobile boards that can be applied to several purposes, especially in smart cities. These involve traffic observation, environmental monitoring, and public safety. The need to realize effective drone forensic processes has mainly been reinforced by drone-based evidence. Drone-based evidence collection and preservation entails accumulating and collecting digital evidence from the drone of the victim for subsequent analysis and presentation. Digital evidence must, however, be collected and analyzed in a forensically sound manner using the appropriate collection and analysis methodologies and tools to preserve the integrity of the evidence. For this purpose, various collection and analysis models have been proposed for drone forensics based on the existing literature; several models are inclined towards specific scenarios and drone systems. As a result, the literature lacks a suitable and standardized drone-based collection and analysis model devoid of commonalities, which can solve future problems that may arise in the drone forensics field. Therefore, this paper has three contributions: (a) studies the machine learning existing in the literature in the context of handling drone data to discover criminal actions, (b) highlights the existing forensic models proposed for drone forensics, and (c) proposes a novel comprehensive collection and analysis forensic model (CCAFM) applicable to the drone forensics field using the design science research approach. The proposed CCAFM consists of three main processes: (1) acquisition and preservation, (2) reconstruction and analysis, and (3) post-investigation process. CCAFM contextually leverages the initially proposed models herein incorporated in this study. CCAFM allows digital forensic investigators to collect, protect, rebuild, and examine volatile and nonvolatile items from the suspected drone based on scientific forensic techniques. Therefore, it enables sharing of knowledge on drone forensic investigation among practitioners working in the forensics domain.",22,17,6486,6486,Drone; Context (archaeology); Digital forensics; Field (mathematics); Computer science; Network forensics; Process (computing); Crime scene; Computer security; Data science; Data collection; Geography; Statistics; Genetics; Mathematics; Pure mathematics; Biology; Operating system; Archaeology,UAV; design science research; drone forensics; smart cities,Forensic Medicine; Unmanned Aerial Devices,,King Abdulaziz University (IFPRC-062-611-2020),,http://dx.doi.org/10.3390/s22176486,36080945,10.3390/s22176486,,PMC9460793,0,003-098-343-640-278; 003-905-226-015-068; 004-829-487-366-119; 008-667-688-301-190; 010-084-169-561-57X; 010-206-941-178-65X; 010-992-143-070-67X; 013-086-940-357-037; 013-467-951-735-805; 013-718-596-619-888; 017-000-288-040-682; 017-401-436-617-234; 018-648-349-943-059; 020-810-000-409-691; 024-725-750-359-063; 029-239-733-639-707; 035-361-375-885-946; 038-444-083-130-202; 042-354-079-994-804; 042-467-831-044-091; 045-273-252-346-857; 047-976-152-994-121; 048-014-163-114-221; 049-482-656-997-863; 051-970-323-275-12X; 053-991-905-768-763; 056-748-337-856-317; 058-258-776-859-131; 059-025-029-154-030; 063-660-644-964-526; 063-920-550-419-453; 064-421-137-320-740; 070-697-536-773-450; 072-085-485-974-257; 072-183-867-595-593; 082-349-614-760-490; 082-411-807-694-99X; 087-277-393-686-275; 088-125-215-873-987; 089-691-112-427-434; 090-055-896-921-710; 091-777-010-917-052; 094-653-770-630-278; 101-999-935-205-318; 102-058-634-554-487; 105-606-711-193-894; 106-493-355-516-535; 106-498-187-784-620; 110-126-104-344-257; 110-286-232-290-188; 113-763-888-485-306; 114-264-712-796-928; 118-967-097-205-079; 119-090-938-429-332; 122-505-249-443-681; 123-270-078-215-31X; 123-623-736-184-422; 140-930-491-847-027; 145-157-030-537-719; 154-999-855-381-883; 158-752-499-155-521; 159-105-758-152-663; 162-557-179-336-48X; 169-354-069-570-392; 176-972-878-781-87X; 182-533-951-303-229; 184-428-240-098-87X; 193-314-328-330-910; 197-747-601-577-121,0,true,cc-by,gold 102-664-242-084-236,Forensic analysis of BiP Messenger on android smartphones,2019-05-06,2019,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Erhan Akbal; Ibrahim Baloglu; Turker Tuncer; Sengul Dogan,"Nowadays, social media applications and communication tools are utilized as communication platforms and the vast majority of communication is performed using these tools. The instant messaging appl...",52,5,590,609,Instant messaging; Computer science; Multimedia; Social media; Android (operating system); Mobile device forensics; Digital forensics,,,,,https://www.tandfonline.com/doi/full/10.1080/00450618.2019.1610064,http://dx.doi.org/10.1080/00450618.2019.1610064,,10.1080/00450618.2019.1610064,2944445773,,0,004-379-948-536-390; 017-815-064-018-299; 029-159-400-662-132; 029-819-338-371-65X; 036-213-488-430-19X; 038-208-479-675-255; 049-131-797-799-081; 053-516-207-442-042; 058-248-784-098-150; 077-859-446-810-741; 085-214-277-668-01X; 088-938-096-763-07X; 098-880-940-361-257; 113-193-064-453-131; 119-637-551-813-328; 123-393-129-372-391; 152-061-431-586-535; 155-758-692-373-705; 166-183-210-534-575,7,false,, 102-814-076-156-265,Establishing the Validity of Md5 and Sha-1 Hashing in Digital Forensic Practice in Light of Recent Research Demonstrating Cryptographic Weaknesses in these Algorithms,2013-04-18,2013,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Veronica Schmitt; Jason Jordaan,"and SHA-1 cryptographic hash algorithms are a standard practice in digital forensics that is used in the preservation of digital evidence and ensuring the integrity of the digital evidence. Recent studies have shown that both MD5 and SHA-1 have vulnerabilities and collisions. Based on this, the use of MD5 and SHA-1 hash algorithms in the practice of digital forensics to preserve and ensure the integrity of digital evidence has been questioned in certain instances. Using experimentation, the researcher proves the validity of using either MD5 or SHA-1 hashing algorithms to ensure the integrity of seized digital evidence, from the moment of seizure of the evidence, through to eventual presentation and use of the evidence in court; thus demonstrating that the use of hashing remains a valid forensic methodology to ensure the integrity of digital evidence. Keywordsforensics, integrity of digital evidence, hash collisions,",68,23,40,43,Algorithm; Forensic science; MD5; Cryptography; Digital evidence; Computer security; Computer science; Cryptographic hash function; SHA-1; Digital forensics; Hash function,,,,,http://www.lex-informatica.org/2%20Ensuring%20the%20Legality%20of%20the%20Digital%20Forensics%20Process%20in%20South%20Africa.pdf https://www.ijcaonline.org/archives/volume68/number23/11723-7433 https://research.ijcaonline.org/volume68/number23/pxc3887433.pdf https://www.ijcaonline.org/archives/volume68/number23/11723-7433?format=pdf,http://dx.doi.org/10.5120/11723-7433,,10.5120/11723-7433,2106303773,,0,017-167-454-912-226; 033-361-255-406-653; 085-214-277-668-01X; 095-080-443-019-181; 124-466-422-768-986; 142-108-488-120-966; 154-255-264-599-600; 159-970-925-091-033,9,true,,bronze 103-294-378-905-305,Part 1:- quality assurance mechanisms for digital forensic investigations: Introducing the Verification of Digital Evidence (VODE) framework,,2020,journal article,Forensic Science International: Reports,26659107,Elsevier BV,,Horsman Graeme,"Abstract Quality assurance measures in the field of digital forensics play a vital role for upholding and developing investigatory standards. Coupled with the fast pace of technology, practitioners in this discipline are often faced with the challenge of interpreting previously unseen or undocmented forms of potentially evidential digital data, content which may be crucial to a current case under investigation. Mechanisms to support this interpretative process offer support for the practitioner, helping to guide them through this task and the steps involved in ensuring any reported information is accurate. This work presents the Verification of Digital Evidence (VODE) framework, designed to support digital forensic practitioners when testing and verifying their interpretation of digital data. The stages of VODE are discussed and its application placed in context.",2,,100038,,Quality assurance; Data science; Pace; Digital data; Context (language use); Task (project management); Digital evidence; Computer science; Process (engineering); Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S2665910719300386 https://research.tees.ac.uk/en/publications/part-1-quality-assurance-mechanisms-for-digital-forensic-investig https://core.ac.uk/download/pdf/232941017.pdf,http://dx.doi.org/10.1016/j.fsir.2019.100038,,10.1016/j.fsir.2019.100038,2981002495,,0,006-933-430-647-14X; 010-963-610-208-920; 017-792-811-186-108; 018-552-581-098-658; 026-810-683-474-561; 028-413-064-651-69X; 030-178-593-043-926; 038-803-786-854-954; 039-999-270-718-277; 047-386-524-667-691; 061-269-967-405-492; 063-579-080-753-513; 064-549-392-650-90X; 066-840-680-591-488; 078-730-781-174-18X; 089-048-294-489-077; 095-691-114-276-825; 102-243-142-344-71X; 105-904-512-640-36X; 111-488-239-742-003; 137-755-137-054-864; 142-790-196-752-819; 184-948-841-629-735,2,true,"CC BY, CC BY-NC-ND",gold 103-309-873-918-823,Bureau of Justice Assistance Student Computer and Digital Forensics Educational Opportunities Program,2022-03-02,2022,journal article,International Conference on Cyber Warfare and Security,20489889; 20489870,Academic Conferences International Ltd,,Kyung-Shick Choi; Lou Chitkushev; Kyung-Seok Choo; Claire Lee,"The current capabilities of many law enforcement agencies are tightly constrained despite the heightened level of awareness and concern for the role recent technology has in facilitating cybercrime and instances of online victimization. More specialized computer forensics and digital evidence training programs are necessary to meet the needs of local and state law enforcement agencies. Based on the context, this paper discusses an interdisciplinary approach to addressing this dilemma while providing in-depth computer forensics and cybercrime investigation training that is both informative andpragmatic to future law enforcement officers. Using pre- and post-test results, this study assesses students’ technical background levels, reflecting comprehensive course learning objectives and pre-training levels of applied digital forensic investigation knowledge. Results suggest that students’ technical abilities and knowledge of different investigative tools significantly improved after the program. In particular, the program not only strengthened students’ knowledge of digital forensic investigation, but also helped students achieve higher t-test scores. We expect our study results to provide recommendations for cyber programs in other higher education institutions. The findings will serve as a guide for enhancing the current capacities of other higher education institutions to better serve their students in areas of computer forensics and digital evidence. In the long term, these efforts will lead to more effective cybercrime investigation and successful prosecutions, ultimately reducing cybercrime victimization.",17,1,36,44,Cybercrime; Digital forensics; Law enforcement; Digital evidence; Computer forensics; Context (archaeology); Dilemma; Test (biology); Economic Justice; Computer science; Computer security; Internet privacy; Public relations; Medical education,,,,,,http://dx.doi.org/10.34190/iccws.17.1.30,,10.34190/iccws.17.1.30,,,0,,0,true,cc-by-nc-nd,hybrid 104-464-081-213-100,Cyber Forensic Challenges: Escaping Holes for Cyber Attackers Series 01: Extracting Forensic Evidences from Non- Functional Computer Devices,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Amrit Chhetri,"According to Forensic Terminology, Cyber Forensic Challenge is a state, a competitive situation, unavailability of reliable evidences and bottleneck constraint in Computer Forensic Investigation and its Procedures. A Forensic Challenge can either be Technical, Admistrative or Legislative/Legal and Anti-Forensic is an example of Technical Challenge, it adds complexity in acquiring and accessing an evidence or sets of evidences during Forensic Investigation. In real-world scenarios, it hurdles Forensic Examiners from acquiring an image of evidences to continue with Forensic Examinations and makes the Attackers or Adversaries ""Scape Goats"" during Criminal Prosecution or in a Corporate Forensic Investigation, as where it arises. In Public Computer Forensic domains, one of the Challenges is unavailability of Public Repositories of MACs, Bluetooth, IMEI and NFC Addresses -of Mobile Phones, WiFi Routers, Printers, Biometric Scanners and other IOT Devices(such as Amazon Alexa, Smart Watch and FitBit). Globally, not adequate, but there are reasonable numbers of such Repositories to overcome the challenges in the concerned fields and countable numbers of systems dedicated to such collections and innovative ones to name are CEIR(Central Equipment Identity Repository) for IMEI Databases(India), WIGLE for WiFi SSID(Global) but there is still shortfalls of ethical Repositories of Bluetooth Addresses (Private and Public) and Identifiers associated with NFC and RFID !",,,50,52,Series (mathematics); Non functional; Computer security; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.09,http://dx.doi.org/10.46293/4n6/2020.02.02.09,,10.46293/4n6/2020.02.02.09,3022354455,,0,,0,false,, 104-787-005-142-28X,ARTIFICIAL INTELLIGENCE BASED DIGITAL FORENSICS FRAMEWORK,2017-10-20,2017,journal article,International Journal of Advanced Research in Computer Science,09765697,IJARCS International Journal of Advanced Research in Computer Science,,Parag H. Rughani,"With increase in number of Internet and smartphone users, cyber crimes are equally increased. Current resources including man power are not sufficient to investigate and solve cyber crimes with the pace they are committed. Present tools and technology require human interaction at large scale, which slows down the process. There is acute need to optimize speed and performance of Digital Forensic Tools to keep pace with the reported cyber crimes. An Artificial Intelligence Based Digital Forensics Framework is proposed in this paper to overcome above issues. The framework proposed in this paper require minimum user interaction and does majority of routine operations by intelligence acquired from training. Outcome of the work is mentioned in the form of proposed framework to optimize digital forensics process.",8,8,10,14,The Internet; Artificial architecture; Artificial intelligence; Pace; Scale (chemistry); Human interaction; Cyber crime; Computer science; Process (engineering); Digital forensics,,,,,http://www.ijarcs.info/index.php/Ijarcs/article/download/4571/4116 http://ijarcs.info/index.php/Ijarcs/article/view/4571,http://dx.doi.org/10.26483/ijarcs.v8i8.4571,,10.26483/ijarcs.v8i8.4571,2765088361,,0,016-661-251-213-668; 038-668-970-194-854; 095-691-114-276-825; 119-234-785-721-155; 134-927-490-231-285,12,true,cc-by,hybrid 105-095-237-899-969,Pertimbangan Hakim Atas Penghadiran Bukti Digital Forensik dalam Perkara Kejahatan Fraud,2021-10-15,2021,journal article,Wajah Hukum,2598604x,Universitas Batanghari Jambi,,Wahdah Prasetya; Puti Priyana,"The problems in this research are regulate digital forensic law in proving crime in Indonesia, judges consider the presence of digital forensic evidence in fraud crime. This research uses normative juridical approach, by examining and interpreting matters relating theoretical principles, conceptions, doctrines and legal norms relating to the presence of forensic digital evidence. The result showed that digital Forensic Arrangements in analyzing digital evidence in terms of proving criminal acts are not specifically regulated in the Criminal Procedure Code (KUHAP) because exceptions to electronic / digital evidence are regulated in the Information and Electronic Transaction (ITE) Act so that can be a legal basis for digital forensics. Law No. 11 of 2008 on Information and Electronic Transactions on Article 5 has been clearly stated that electronic information is a valid legal evidence in the form of electronic information and / or electronic documents and / or printout. The rise of data fraud requires a legal arrangement that is expected to be able to prevent and reduce these crimes. For this reason, it is important to elaborate legal arrangements for both implementation and criminal sanctions related to data fraud in Indonesia.",5,2,448,459,Law; Sanctions; Digital evidence; Legal evidence; Electronic information; Electronic transaction; Normative; Criminal procedure; Medicine; Digital forensics,,,,,http://wajahhukum.unbari.ac.id/index.php/wjhkm/article/view/472 https://wajahhukum.unbari.ac.id/index.php/wjhkm/article/download/472/172,http://dx.doi.org/10.33087/wjh.v5i2.472,,10.33087/wjh.v5i2.472,3210705332,,0,,0,true,cc-by-sa,gold 105-101-095-930-34X,Digital Forensics,2020-12-30,2020,journal article,Advanced Computing and Communications,,Advanced Computing and Communications Society - ACCS,,Sanjay Sahay,"Digital forensics is the science of recovery and investigation of material found on digital devices. It started in correlation to computer / cybercrimes. In reality, digital forensics use is not limited to criminal investigation in the strict sense of the term, it can proactively encompass the investigative element of every facet of our digital life. The very nature of technology by way of strict and infallible documentation allows for its all pervasiveness. It has the potential to provide an intelligence of the functional type, which generally seems to be missing besides adding a new dimension to criminal investigation.",,,,,Digital forensics; Computer forensics; Digital evidence; Computer science; Documentation; Facet (psychology); Dimension (graph theory); Computer security; Crime scene; Criminal investigation; Term (time); Data science; World Wide Web,,,,,,http://dx.doi.org/10.34048/2020.4.f2,,10.34048/2020.4.f2,,,0,,0,true,,bronze 105-295-175-724-974,Acquisition and Interpretation of Digital Information in Forensic Assessments.,2021-03-04,2021,journal article,Harvard review of psychiatry,14657309; 10673229,Informa Healthcare,United States,Barbara Burton; Eric Y. Drogin,"ABSTRACT Despite the now ubiquitous presence of technology in everyday life, there is little written on the subject of personal digital data as it pertains to forensic mental health evaluations. Ethical concerns and limited consensus guidance on this issue have previously made it challenging to use this information in a responsible way. This Perspectives article elaborates on the different types of personal data that exist and the practical aspects of acquiring such information, including data location and legal considerations. Incorporation of personal digital information into the forensic assessment as a form of collateral information is discussed, along with the current state of the literature on technology use and its relationship to psychopathology and risk. Given the important role of technology in the life of the modern individual, deeper research into this topic will be necessary in the immediate future to establish practice standards for the safe and ethical use of digital information in both forensic and non-forensic mental health assessments.",29,3,234,239,Mental health; Psychology; Subject (documents); Collateral; Digital data; Everyday life; MEDLINE; State (computer science); Interpretation (philosophy); Engineering ethics,,Humans; Mental Health,,,https://www.ncbi.nlm.nih.gov/pubmed/33660624 https://europepmc.org/article/MED/33660624 https://pubmed.ncbi.nlm.nih.gov/33660624/,http://dx.doi.org/10.1097/hrp.0000000000000291,33660624,10.1097/hrp.0000000000000291,3134853268,,0,002-582-923-538-155; 004-091-227-804-161; 004-444-718-123-214; 005-602-986-752-276; 011-641-833-566-340; 013-371-173-953-139; 013-756-236-178-14X; 017-477-667-536-395; 020-992-030-664-212; 032-907-790-670-072; 048-505-063-178-873; 049-173-683-237-641; 053-260-904-334-18X; 075-149-751-974-356; 078-221-917-889-593; 079-868-145-940-152; 101-381-521-172-400; 108-506-392-569-073; 124-004-144-226-792,0,false,, 106-021-721-854-935,The Art and Science of Digital Visual Media Forensics,2018-12-26,2018,journal article,"Forensic, Legal & Investigative Sciences",2473733x,Herald Scholarly Open Access,,Raahat Devender Singh,,4,,1,6,Visual media; Computer science; Multimedia,,,,,http://dx.doi.org/10.24966/flis-733x/100021 https://dx.doi.org/10.24966/flis-733x/100021,http://dx.doi.org/10.24966/flis-733x/100021,,10.24966/flis-733x/100021,2911759662,,0,,0,true,cc-by,gold 106-169-386-186-36X,P2DF: A Privacy-Preserving Digital Forensics Framework,2021-11-01,2021,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Muhammad Abulaish; Nur Al Hasan Haldar; Jahiruddin Jahiruddin,"

The extensive use of digital devices by individuals generates a significant amount of private data which creates challenges for investigation agencies to protect suspects' privacy. Existing digital forensics models illustrate the steps and actions to be followed during an investigation, but most of them are inadequate to investigate a crime with all the processes in an integrated manner and do not protect suspect's privacy. In this paper, we propose the development of a privacy-preserving digital forensics (P2DF) framework, which facilitates investigation through maintaining confidentiality of the suspects through various privacy standards and policies. It includes an access control mechanism which allows only authorized investigators to access private data and identified digital evidences. It is also equipped with a digital evidence preservation mechanism which could be helpful for the court of law to ensure the authenticity, confidentiality, and reliability of the evidences, and to verify whether privacy of the suspect was preserved during the investigation process.

",13,6,1,15,Privacy preserving; Computer security; Computer science; Digital forensics,,,,,https://www.igi-global.com/viewtitle.aspx?TitleId=288547,http://dx.doi.org/10.4018/ijdcf.288547,,10.4018/ijdcf.288547,3206525595,,0,001-381-793-304-07X; 012-608-868-939-962; 020-944-423-224-895; 021-850-998-857-676; 026-774-296-742-022; 028-656-707-596-927; 031-400-709-717-795; 035-129-008-760-918; 039-365-534-871-351; 041-018-610-330-094; 045-581-544-307-619; 062-325-585-829-185; 087-665-408-966-240; 089-048-294-489-077; 098-748-261-333-651; 105-972-775-368-649; 109-652-769-766-539; 121-830-022-805-361; 125-833-554-920-626; 127-948-386-055-225; 134-927-490-231-285; 142-388-561-082-054; 159-477-048-665-066,0,true,,gold 106-181-462-850-018,Anti-Forensics: A Practitioner Perspective,,2015,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Jean-Paul Van Belle,,4,2,390,403,,,,,,,http://dx.doi.org/10.17781/p001593,,10.17781/p001593,,,0,,3,false,, 106-326-322-500-176,Digital forensics in a post-truth age.,2018-06-06,2018,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Hany Farid,,289,,268,269,Internet privacy; Social responsibility; Deception; MEDLINE; Post truth; Computer science; Digital forensics,,Deception; Forensic Sciences; Humans; Social Media/legislation & jurisprudence; Social Responsibility,,,https://pubmed.ncbi.nlm.nih.gov/29909299/ https://www.ncbi.nlm.nih.gov/pubmed/29909299,http://dx.doi.org/10.1016/j.forsciint.2018.05.047,29909299,10.1016/j.forsciint.2018.05.047,2805243269,,0,,12,false,, 106-327-211-472-998,The Presumption of Innocence as a Source for Universal Rules on Digital Evidence: The guiding principle for digital forensics in producing digital evidence for criminal investigations,2021-08-11,2021,journal article,Computer law review international,16107608,,,Radina Stoykova,"This paper proposes a conceptual framework for the development of digital evidence rules in technology-assisted investigations based on the presumption of innocence. The presumption of innocence (PI) is examined as a general principle of criminal procedure to delineate its scope and application on pre-trial and clarify its role for the development and harmonization of practical and enforceable rules for digital evidence. It is demonstrated that PI provides a theoretical background for digital evidence regulation, digital forensics standards, and harmonized rules on the use of technology for investigative purposes irrespective of jurisdictional differences. The derived PI-based evidence rules reveal missing techno-legal policy for their implementation in digital evidence systems and processes. After introducing the wide-spread use of digital evidence by law enforcement in the course of criminal investigations and proceedings (I.), this article reviews the schools of thought regarding the impact of PI on evidence procedures focussing on the question whether PI’s protection against wrongful conviction could support measures against arbitrary and intrusive investigations (II.). The reviewing analysis strives to balance contradictory opinions about the scope and application of the PI, before examining digital forensics specifics in the context of the derived PI-based evidence rules to identify techno-legal policy tailored for the digital investigations and its effective implementation in digital evidence systems (III.).",22,3,74,82,Criminal investigation; Conceptual framework; Law and economics; Presumption of innocence; Context (language use); Law enforcement; Digital evidence; Computer science; Criminal procedure; Digital forensics,,,,,https://research.rug.nl/en/publications/the-presumption-of-innocence-as-a-source-for-universal-rules-on-d https://www.narcis.nl/publication/RecordID/oai%3Apure.rug.nl%3Apublications%2F4164567c-4dc7-4e5e-a050-6b3ca0f42833,https://research.rug.nl/en/publications/the-presumption-of-innocence-as-a-source-for-universal-rules-on-d,,,3192800931,,0,,0,false,, 106-335-104-403-831,A novel neural network based image descriptor for texture classification,,2019,journal article,Physica A: Statistical Mechanics and its Applications,03784371,Elsevier BV,Netherlands,Turker Tuncer; Sengul Dogan; Fatih Ertam,,526,,120955,,Curse of dimensionality; Normalization (statistics); Artificial intelligence; Pixel; Pattern recognition; Normalization (image processing); Principal component analysis; Activation function; Computer science; Feedforward neural network; Artificial neural network; Feature extraction; Histogram; Linear discriminant analysis; Image processing,,,,,https://www.sciencedirect.com/science/article/pii/S0378437119305497 http://ui.adsabs.harvard.edu/abs/2019PhyA..52620955T/abstract,http://dx.doi.org/10.1016/j.physa.2019.04.191,,10.1016/j.physa.2019.04.191,2937800999,,0,004-026-543-079-124; 004-121-464-006-66X; 006-041-665-465-558; 006-312-114-062-439; 006-560-711-367-567; 007-588-121-886-421; 007-635-002-062-509; 007-662-807-884-01X; 008-271-327-871-824; 010-154-758-590-433; 014-166-020-318-269; 015-979-793-981-921; 016-705-527-926-469; 017-956-524-305-731; 018-399-977-529-129; 022-664-789-919-348; 025-920-255-032-987; 028-233-520-332-337; 032-133-843-134-075; 034-701-541-555-865; 038-370-364-156-231; 038-375-110-657-557; 038-805-774-629-96X; 039-342-945-114-214; 041-075-015-117-257; 045-174-924-381-900; 048-550-840-448-915; 049-405-868-114-613; 050-804-418-665-825; 054-060-415-607-853; 057-006-530-509-951; 057-090-151-217-726; 062-511-150-382-504; 069-515-826-457-944; 070-373-210-747-745; 071-024-485-421-403; 075-924-822-451-240; 076-475-741-171-461; 077-300-584-938-439; 077-522-575-038-061; 079-391-240-847-25X; 081-772-752-266-812; 082-314-034-414-110; 083-432-356-782-50X; 084-186-869-573-477; 089-334-721-643-401; 092-365-367-138-903; 097-666-601-855-240; 115-882-536-250-954; 120-588-671-187-744; 140-292-380-000-09X; 141-961-077-487-036; 143-478-140-082-211; 155-424-773-165-625; 156-893-709-983-402; 199-027-964-379-551,9,false,, 106-438-149-842-522,“Scaffolding” responses to digital forensic inquiries,2021-11-27,2021,journal article,WIREs Forensic Science,25739468,Wiley,,Graeme Horsman,,4,4,,,Engineering; Multimedia; Digital forensics; Scaffold,,,,,https://wires.onlinelibrary.wiley.com/doi/pdf/10.1002/wfs2.1451,http://dx.doi.org/10.1002/wfs2.1451,,10.1002/wfs2.1451,3215802464,,0,000-084-741-857-185; 002-288-892-034-343; 005-715-450-998-72X; 006-933-430-647-14X; 009-512-003-529-193; 010-061-391-662-193; 010-963-610-208-920; 012-564-492-558-122; 021-850-998-857-676; 024-350-847-240-124; 024-445-108-979-867; 036-189-930-199-369; 075-128-417-091-483; 077-287-216-746-675; 079-858-593-881-513; 086-653-920-850-621; 092-765-349-680-750; 099-377-733-522-116; 102-243-142-344-71X; 110-700-351-633-754; 111-488-239-742-003; 113-520-825-550-67X; 118-838-969-146-870; 142-790-196-752-819; 173-145-269-859-717; 179-703-555-795-891,0,false,, 106-997-247-556-643,A review on impacts of cloud computing and digital forensics,,2014,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Farid Daryabar; Ali Dehghantanha,"Nowadays, digital storage of computer data is moving toward cloud computing which is a set of infrastructure provides data storage for organizations and individuals. Due to this large scale, in case an attack occurs in the network of a cloud it would be a big challenge to investigate the cloud. Therefore, digital forensics in cloud computing is a new discipline related to the increasing use of computers, networks and digital storage devices in numerous criminal activities in both traditional and Hi-Tech. This study reviews the literature on some challenges in cloud computing forensic investigation, and it is followed by evaluation and analysis of all types of information on cloud computing and its impacts on computer forensic investigations in publishing alliances with the survey was carried out in the field.",2,2,77,94,Digital transformation; World Wide Web; Data; Cloud computing security; Computer data storage; Data science; Field (computer science); Computer science; Wireless; Cloud computing; Digital forensics,,,,,http://sdiwc.net/digital-library/a-review-on-impacts-of-cloud-computing-on-digital-forensics.html https://usir.salford.ac.uk/34013/,http://sdiwc.net/digital-library/a-review-on-impacts-of-cloud-computing-on-digital-forensics.html,,,1592371139,,0,,24,false,, 107-291-552-186-572,"Drone GPS data analysis for flight path reconstruction: A study on DJI, Parrot & Yuneec make drones",,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Ravin Kumar; Animesh Kumar Agrawal,,38,,301182,,Personalization; restrict; Gps data; Field (computer science); Computer security; Computer science; Drone,,,,,https://www.sciencedirect.com/science/article/pii/S2666281721000901 https://doi.org/10.1016/j.fsidi.2021.301182,http://dx.doi.org/10.1016/j.fsidi.2021.301182,,10.1016/j.fsidi.2021.301182,3167698676,,0,008-667-688-301-190; 011-755-498-862-139; 016-443-729-291-767; 028-151-765-287-993; 029-563-465-806-154; 046-314-745-466-915; 122-122-879-514-001; 170-162-481-967-059,4,false,, 107-338-245-292-063,THE USE OF ONTOLOGIES IN FORENSIC ANALYSIS OF SMARTPHONE CONTENT,,2015,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Mohammed Alzaabi; Thomas Martin; Kamal Taha; Andrew Jones,"Digital forensics investigators face a constant challenge in keeping track with evolving technologies such as smartphones. Analyzing the contents of these devices to infer useful information is becoming more time consuming as the volume and complexity of data are increasing. Typically, such analysis is undertaken by a human, which makes it dependent on the experience of the investigator. To overcome such impediments, an automated technique can be utilized in order to aid the investigator to quickly and eciently analyze the data. In this paper, we propose F-DOS; a set of ontologies that models the smartphone content for the purpose of forensic analysis. F-DOS can form a knowledge management component in a forensic analysis system. Its importance lies in its ability to encode the semantics of the smartphone content using concepts and their relationships that are modeled by F-DOS.",10,4,105,114,Semantics; World Wide Web; Set (psychology); Ontology (information science); Data science; Computer science; Component (UML); Network forensics; ENCODE; Mobile device forensics; Digital forensics,,,,,https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=3507&context=ecuworkspost2013 https://commons.erau.edu/jdfsl/vol10/iss4/9/ https://core.ac.uk/display/81695325 https://commons.erau.edu/cgi/viewcontent.cgi?article=1215&context=jdfsl https://ro.ecu.edu.au/ecuworkspost2013/2496/ https://core.ac.uk/download/81695325.pdf,http://dx.doi.org/10.15394/jdfsl.2015.1215,,10.15394/jdfsl.2015.1215,2277703527,,0,016-123-869-009-118; 019-963-643-739-67X; 036-673-313-594-640; 071-645-975-039-209; 085-666-602-084-614; 095-437-078-101-003; 104-788-654-788-51X; 181-072-396-769-365,3,true,cc-by-nc,gold 107-814-078-721-776,Record File Carving Technique for Efficient File Recovery in Digital Forensic Investigation,2013-02-28,2013,journal article,KIPS Transactions on Computer and Communication Systems,22875891,Korea Information Processing Society,,Min Su Park; Jung Heum Park; Sang Jin Lee,"These days digital data have become essential for digital investigation because most of the crime was occurred by using the digital devices. However, digital data is very easier to falsify or delete. If digital data was deleted, it is necessary to recover the deleted data for obtain digital evidence. Even though file carving is the most important thing to gather. digital evidence in digital forensic investigation, most of popular carving tools don`t contemplate methods of selection or restoration for digital forensic investigation. The goal of this research is suggested files which can obtain useful information for digital forensic investigation and proposed new record file carving technique to be able to recover data effectively than before it.",2,2,93,102,Selection (linguistics); World Wide Web; File carving; Carving; Digital data; Digital evidence; Digital forensic investigation; Computer science; Multimedia,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBCRIN_2013_v2n2_93 http://www.ndsl.kr/soc_img/society/kips/JBCRIN/2013/v2n2/JBCRIN_2013_v2n2_93.pdf http://koreascience.or.kr/journal/view.jsp?kj=JBCRIN&py=2013&vnc=v2n2&sp=93 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001743148 http://ktccs.kips.or.kr/digital-library/4660,http://dx.doi.org/10.3745/ktccs.2013.2.2.093,,10.3745/ktccs.2013.2.2.093,2067157203,,0,002-449-146-256-491; 009-832-452-035-773; 077-066-116-235-027; 082-272-471-651-277; 085-214-277-668-01X; 091-812-839-578-217; 121-786-737-888-521,1,true,,bronze 107-992-128-750-519,Implementation of ACPO Framework for Digital Evidence Acquisition in Smartphones,2022-02-07,2022,journal article,CCIT Journal,26554275; 19788282,iLearning Journal Center,,Muhammad Saleh Jafri; Suwanto Raharjo; M. Rudiyanto Arief,"A forensic investigator or analyst should implement an appropriate digital forensic framework to acquire valid digital evidence to be presented at court. Choosing an unsuitable digital forensic framework with the investigation process may lead to failure at acquiring or maintaining complete digital evidence. Missing a step or turning a certain step into another irrelevant step may lead to unclear results and invalid conclusions. Digital evidence extracted from risky electronic evidence cannot be accepted by the court. Accordingly, a forensic investigator or forensic analyst should refer to a structuralized standard structure to perform well.Several internal digital forensic frameworks are available, one of which is the Good Practice Guide for Computer-based Electronic Evidence [1], an English issuance by ACPO (Association of Chief Police Officers) in cooperation with 7Safe. The digital forensic framework is commonly called the digital forensic framework from ACPO or the ACPO Framework. This research brings into focus the analysis of the percentage of success rate for using the ACPO digital forensic framework or the ACPO Framework in comparison with another digital forensic framework, i.e., NIST Framework. This research is also aimed at examining the performance of a mobile forensic tool, i.e., Cellebrite’s UFED Touch2 in comparison with another mobile forensic tool for digital evidence acquisition in smartphones.The research objects were smartphones containing deleted WhatsApp messages. This research successfully implemented the ACPO Framework for digital evidence acquisition in smartphones using Cellebrite’s UFED Touch2 as the mobile forensic tool.",15,1,82,105,Digital evidence; Digital forensics; Computer science; Mobile device; Computer forensics; Data science; Process (computing); Forensic science; Computer security; World Wide Web; Geography; Archaeology; Operating system,,,,,,http://dx.doi.org/10.33050/ccit.v15i1.1586,,10.33050/ccit.v15i1.1586,,,0,,0,true,,bronze 108-070-913-448-812,From time theft to time stamps: mapping the development of digital forensics from law enforcement to archival authority,2019-03-04,2019,journal article,International Journal of Digital Humanities,25247832; 25247840,Springer Science and Business Media LLC,,Corinne Rogers,"The field of digital forensics seems at first glance quite separate from archival work and digital preservation. However, professionals in both fields are trusted to attest to the identity and integrity of digital documents and traces – they are regarded as experts in the acquisition, interpretation, description and presentation of that material. Archival science and digital forensics evolved out of practice and grew into established professional disciplines by developing theoretical foundations, which then returned to inform and standardize that practice. They have their roots in legal requirements and law enforcement. A significant challenge to both fields, therefore, is the identification of records (archival focus) and evidence (digital forensics focus) in digital systems, establishing their contexts, provenance, relationships, and meaning. This paper traces the development of digital forensics from practice to theory and presents the parallels with archival science.",1,1,13,28,Data science; Parallels; Presentation; Digital preservation; Law enforcement; Archival science; Interpretation (philosophy); Identification (information); Digital forensics; History,,,,,https://link.springer.com/article/10.1007/s42803-019-00002-y,http://dx.doi.org/10.1007/s42803-019-00002-y,,10.1007/s42803-019-00002-y,2920267616,,0,002-214-848-360-115; 002-328-258-595-526; 004-441-167-148-170; 005-573-416-928-102; 013-133-468-228-985; 016-004-336-259-323; 017-840-378-634-021; 020-944-423-224-895; 021-850-998-857-676; 025-421-213-608-128; 031-234-153-523-379; 032-960-619-192-843; 037-647-066-964-858; 038-113-177-930-482; 038-668-970-194-854; 043-589-904-668-295; 055-740-268-775-122; 066-537-795-300-925; 067-629-806-155-212; 069-713-118-371-629; 088-309-759-208-842; 091-484-846-148-688; 098-120-541-214-151; 111-741-773-111-021; 127-086-844-715-002; 127-948-386-055-225; 133-397-275-695-990; 134-927-490-231-285; 149-080-386-855-18X; 151-378-930-836-964; 157-954-859-648-506; 167-906-378-249-754; 178-883-713-153-793; 190-065-821-748-92X; 199-745-676-923-766,2,false,, 108-082-937-872-755,Practical Digital Forensics at Accession for Born-Digital Institutional Records,2016-01-28,2016,journal article,Code4Lib Journal,19405758,,,Gregory Wiedeman,,,31,,,Internet privacy; Born-digital; Accession; Computer security; Computer science; Digital forensics,,,,,https://journal.code4lib.org/articles/11239,https://journal.code4lib.org/articles/11239,,,2605861898,,0,,1,true,cc-by,gold 108-429-571-486-082,The application of forensics examination in crime-related prosecution,2020-11-02,2020,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Davidson C. Onwubiko; Felix E. Eboibi,"The increased use of the internet and information technology in Nigeria has led to the need to utilize technologies to identify and prosecute perpetrators of crimes. In today’s world, the application of forensics in the investigation and prosecution of crimes is essential. This paper critically examines the effect of the absence of a coordinated standard for the execution and presentation of forensic investigations utilizing electronic evidence in Nigeria. It examines the nature and scope of the various forensic models proposed, while questioning the appropriateness or otherwise of their usefulness in criminal prosecutions. The paper suggests the need for the regulation of forensics practices, the provision of standards, and a universal model for the successful prosecution of crimes in Nigeria. ; Index words: Nigeria; forensic examination; digital crime; standardization",,,83,93,Political science; Criminology,,,,,https://journals.sas.ac.uk/deeslr/article/download/5228/5075,http://dx.doi.org/10.14296/deeslr.v17i0.5228,,10.14296/deeslr.v17i0.5228,3112413245,,0,,0,true,cc-by-nc-nd,gold 108-433-759-883-41X,A Recovery Technique against File Wiping for Digital Forensic on NAND Flash Memory,,2012,journal article,Journal of KIISE:Databases,12297739,,,Yoon-Bin Lim; Myung-Sub Shin; Dong-Joo Park,"Recently, flash memory is used as storage system of digital devices. Anti-forensic techniques like file wiping is being tried to completely delete the stored files on flash memory, since they are clues in a criminal investigation. Therefore, it is necessary to develop digital forensic techniques for the analysis of digital evidence on flash memory to win anti-forensic techniques. Recently, data recovery approaches on flash memory have been proposed, which are heavily dependent of metadata stored on flash memory. This paper suggests a new technique to be able to recover data on flash memory deleted by file wiping. Differently from the previous techniques, our scheme can recovery deleted files without metadata on flash memory. Through diverse experiments, we show that our approach is a higher level of the data recovery technique compared with the existing techniques.",39,2,100,108,Operating system; Memory management; Computer data storage; Universal memory; Flash file system; Flash memory; Computer science; Memory map; Computer memory; Flash memory emulator,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBGHEH_2012_v39n2_100 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001652284,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBGHEH_2012_v39n2_100,,,2403417595,,0,,0,false,, 108-757-813-890-372,ABHED - Artificial Intelligence Based Human Efface Detection,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Himani Rawat,,,,,,Artificial intelligence; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.13,http://dx.doi.org/10.46293/4n6/2020.02.03.13,,10.46293/4n6/2020.02.03.13,3096367383,,0,,0,false,, 109-348-478-867-966,Assessing the Psychological Well-being and Coping Mechanisms of Law Enforcement Investigators vs. Digital Forensic Examiners of Child Pornography Investigations,2017-12-04,2017,journal article,Journal of Police and Criminal Psychology,08820783; 19366469,Springer Science and Business Media LLC,Germany,Kathryn C. Seigfried-Spellar,"Previous research indicates law enforcement investigators and digital forensic examiners working child exploitation cases are at an increased risk for experiencing psychological distress; however, the roles of digital forensic examiners and investigators often overlap substantially when working child pornography cases. Thus, the current study was the first to compare the psychological well-being, job satisfaction, coping mechanisms, and attitudes toward mental health services for individuals working as either digital forensic examiners and/or investigators of child pornography cases. Law enforcement officers were solicited from the Internet Crimes Against Children task force listserv, and based on their current self-reported duties, 20 were classified as digital forensic examiners-only, 71 as investigators-only, and 38 as both digital forensic examiners and investigators of cases involving Internet child pornography. Results showed significant differences between groups; individuals performing both duties scored significantly higher on secondary traumatic stress, higher on feelings of worthlessness, and lower on concentration compared to digital forensic examiners-only. Individuals performing both duties also reported significantly lower scores on job satisfaction compared to investigators-only. Finally, individuals working both duties were significantly more likely to know someone who sought counseling as a result of work-related stress. The study’s mental health implications and future research suggestions are discussed.",33,3,215,226,Compassion fatigue; Feeling; Mental health; Legal psychology; Psychology; Psychological well-being; Job satisfaction; Child pornography; Law enforcement; Clinical psychology,,,,University of Alabama,https://link.springer.com/article/10.1007%2Fs11896-017-9248-7 https://link.springer.com/content/pdf/10.1007%2Fs11896-017-9248-7.pdf,http://dx.doi.org/10.1007/s11896-017-9248-7,,10.1007/s11896-017-9248-7,2772137463,,0,000-490-412-762-138; 007-790-059-029-953; 013-176-763-001-388; 013-568-618-083-770; 013-717-900-010-205; 016-714-762-385-310; 018-005-352-608-818; 021-201-295-792-01X; 023-205-079-263-974; 026-595-897-410-847; 026-918-579-601-799; 029-442-923-036-644; 041-010-815-625-113; 045-583-164-562-588; 047-353-646-775-446; 053-339-196-107-235; 055-046-286-108-710; 055-212-525-283-817; 059-562-542-068-452; 059-982-120-158-213; 060-169-748-750-953; 062-222-443-665-400; 067-144-932-123-187; 073-313-808-035-835; 077-205-567-824-784; 078-107-853-109-113; 078-385-199-956-202; 079-819-982-015-318; 080-161-175-307-872; 088-958-937-400-993; 100-436-172-024-424; 104-298-972-263-215; 111-901-632-410-562; 119-029-461-264-24X; 143-811-701-631-820; 157-454-151-474-60X; 165-774-156-145-795; 167-446-807-052-825; 197-860-668-008-411; 199-372-341-017-471,18,false,, 109-597-940-114-831,Prelim i - Editorial Board,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,40,,301382,301382,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00063-4,,10.1016/s2666-2817(22)00063-4,,,0,,0,true,,bronze 109-629-313-549-75X,FALI: Time Memory Information of Windows Computer Systems,2013-12-01,2013,journal article,International Journal of Intelligent Computing Research,20424655,Infonomics Society,,Funminiyi Olajide; Richard Trafford,"In today digital investigation, forensic application level information (FALI) has become an important part of digital forensic research. In this research, information stored on Windows computer systems was analysed. The user input gathered from the volatile memory (RAM) of Windows applications has been described as the most important aspect of digital forensic investigation. User input is made at set interval when the application is still opened. This research will report the quantitative assessment of forensically relevant information on Windows application.",4,4,354,357,Set (abstract data type); Quantitative assessment; Digital forensic investigation; User input; Relevant information; Computer security; Computer science; Multimedia; Volatile memory; Digital forensics,,,,,http://infonomics-society.org/wp-content/uploads/ijicr/published-papers/volume-4-2013/FALI-Time-Memory-Information-of-Windows-Computer-Systems.pdf,http://dx.doi.org/10.20533/ijicr.2042.4655.2013.0046,,10.20533/ijicr.2042.4655.2013.0046,2508066546,,0,055-259-800-283-255; 068-404-690-853-48X; 076-095-910-918-008; 141-182-449-198-823; 146-991-652-523-750; 161-183-838-006-143,0,true,,bronze 109-904-428-698-679,The forensic imagination: interdisciplinary approaches to tracing creativity in writers' born-digital archives,2019-08-11,2019,journal article,Archives and Manuscripts,01576895; 21646058,Australian Society of Archivists,United Kingdom,Paul Gooding; Jos Smith; Justine Mann,"In 2013, Matthew Kirschenbaum advocated for increased collaboration between digital archivists and digital humanities specialists to make the most out of born-digital archives. Since then, researchers and archivists have experimented with innovative interfaces for access to writer’s archives that emerge from individual research cultures and practices. Simultaneously, archives such as the British Archive for Contemporary Writing (BACW) at the University of East Anglia (UEA) are beginning to collect the work of authors who work in inventive digital ways. This article will therefore explore the following question: how might archivists, authors and researchers profitably collaborate to explore the nature of creativity in the born-digital archive, so that both digital preservation and digital scholarship take place? In doing so, the authors look to the complementary fields of genetic criticism and digital humanities to inform the development of archival tools as ‘hermeneutical instruments’. They will explore how such instruments might allow us to read horizontally across archival strata, building on an ‘esthetic of the possible’ to develop a ‘jouer avec les fonds’, supported through collaboration between researchers, archivists and writers. Finally, the authors consider how this approach challenges archival practices, and propose forms of collaboration that might address both archival practice and emerging forms of scholarship.",47,3,374,390,Creativity; Sociology; Visual arts; Work (electrical); Digital humanities; Born-digital; Scholarship; Digital preservation; Digital scholarship; Criticism,,,,,http://eprints.gla.ac.uk/184018/ https://www.tandfonline.com/doi/full/10.1080/01576895.2019.1608837 https://ueaeprints.uea.ac.uk/70967/ https://research-portal.uea.ac.uk/en/publications/the-forensic-imagination-interdisciplinary-approaches-to-tracing- https://core.ac.uk/download/200201245.pdf,http://dx.doi.org/10.1080/01576895.2019.1608837,,10.1080/01576895.2019.1608837,2954062211,,0,,5,true,cc0,green 110-131-476-217-052,Data Mining Technique to Data Collection and Analysis for Cyber Forensic,2020-01-30,2020,journal article,International Journal of Recent Technology and Engineering (IJRTE),22773878,Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP,,Prashant Khobragade*; Pranay Saraf; Preeti Thakre; Priya maidamwar,"In the world of Digital forensic the uncovered digital may contain vital information for digital data investigation for investigator. Digital data collected from the crime scene leads to find out the clue after performing analysis by the examiner. This process of data examination data collection and analysis plays important role in cyber world for the forensic investigator. The cybercrime is a part of computer forensics where the digital evidences are analyze by the investigator and to perform analysis special measurements and techniques are required in order to use this details that has to be accepted in court of law for law enforcement. The data collection of evidence is a key aspect for the investigator, such kind of digital data has to be collected from different sources at the crime scene and this process involves to collect each and every evidence of digital crime scene and later this gather data will be analyze by the experts to reach to the conclusion. In this paper the proposed method collected the data from the crime scene efficiently which includes log data, transactional data, physical drive data, and network data; later this collected data analyzed to find out the theft node in the network. In this paper FTK 4.0 digital forensic tool used to reduce plenty of time for data processing and later report will be produce that will be accepted tin the court of law. This paper also focuses the data collection method with in the network and reach to the faulty node and later this faulty node analyzed with all collected data for forensic analysis. For this standard algorithm used to analyze the performance of distinct features used for network attacks. Kmeans clustering methodology is used to create cluster of victim node and represent victim data in systematic manner for the ease of law enforcement.",8,5,2786,2789,Digital evidence; Digital forensics; Law enforcement; Computer science; Data collection; Crime scene; Digital data; Network forensics; Node (physics); Cybercrime; Process (computing); Data science; Computer security,,,,,,http://dx.doi.org/10.35940/ijrte.d8543.018520,,10.35940/ijrte.d8543.018520,,,0,,0,true,,gold 110-142-835-904-035,Digital Evidence Object Model for Situation Awareness and Decision Making in Digital Forensics Investigation,2021-09-01,2021,journal article,IEEE Intelligent Systems,15411672; 19411294,Institute of Electrical and Electronics Engineers (IEEE),United States,Sarunas Grigaliunas; Jevgenijus Toldinas; Algimantas Venčkauskas; Nerijus Morkevicius; Robertas Damasevicius,"The aim of a forensic investigation is to provide situation awareness in terms of identification and preservation of digital evidence, extraction of information, and analysis of extracted information to facilitate time-critical decision making. Digital forensic investigation is a process of collecting, examining, and analyzing digital data from various places such as digital devices, networks, and big data in the cloud. Here we propose a novel digital evidence object (DEO) model for the reduction of forensics data in digital forensic investigation and describe its application. The proposed DEO model is based on the synergy of category theory and integration of 5Ws (Who, What, When, Where, and Why) of digital investigation analysis techniques for digital evidence acquisition. We present a real-life case study to demonstrate its suitability for assisting computer forensics experts in the digital evidence investigation. Our results demonstrate that the application of the DEO model can noticeably decrease the number of false positive evidence objects submitted to a forensics expert, thus reducing his/her workload and improving decision making performance in a time-critical setting.",36,05,39,48,Situation awareness; Data science; Digital data; Digital evidence; Computer science; Computer forensics; Intelligent decision support system; Big data; Identification (information); Digital forensics,,,,,https://www.computer.org/csdl/magazine/ex/2021/05/09178959/1mDpBvAEzn2 https://ieeexplore.ieee.org/abstract/document/9178959/ https://dblp.uni-trier.de/db/journals/expert/expert36.html#GrigaliunasTVMD21,http://dx.doi.org/10.1109/mis.2020.3020008,,10.1109/mis.2020.3020008,3082246520,,0,031-733-321-509-944; 033-826-748-864-027; 046-568-990-053-305; 057-744-964-946-459; 062-032-128-092-406; 067-752-747-116-312; 088-553-642-323-93X; 112-910-981-584-836; 122-299-786-698-239; 133-508-126-407-763; 146-021-806-272-345; 167-751-222-897-487,5,false,, 110-377-139-748-215,The case for Zero Trust Digital Forensics,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Christopher Neale; Ian Kennedy; Blaine Price; Yijun Yu; Bashar Nuseibeh,"It is imperative for all stakeholders that digital forensics investigations produce reliable results to ensure the field delivers a positive contribution to the pursuit of justice across the globe. Some aspects of these investigations are inevitably contingent on trust, however this is not always explicitly considered or critically evaluated. Erroneously treating features of the investigation as trusted can be enormously damaging to the overall reliability of an investigation's findings as well as the confidence that external stakeholders can have in it. As an example, digital crime scenes can be manipulated by tampering with the digital artefacts left on devices, yet recent studies have shown that efforts to detect occurrences of this are rare and argue that this leaves digital forensics investigations vulnerable to accusations of inaccuracy. In this paper a new approach to digital forensics is considered based on the concept of Zero Trust, an increasingly popular design in network security. Zero Trust describes the practitioner mindset and principles upon which the reliance on trust in network components is eliminated in favour of dynamic verification of network interactions. An initial Definition of Zero Trust Digital Forensics will be proposed and then a specific example considered showing how this strategy can be applied to digital forensic investigations to mitigate against the specific risk of evidence tampering. A definition of Zero Trust Digital Forensics is proposed, specifically that it is ‘a strategy adopted by investigators whereby each aspect of an investigation is assumed to be unreliable until verified’. A new principle will be introduced, namely the ‘multifaceted verification of digital artefacts’ that can be used by practitioners who wish to adopt a Zero Trust Digital Forensics strategy during their investigations. A qualitative review of existing artefact verification techniques is also conducted in order to briefly evaluate the viability of this approach based on current research efforts. • Trust influences the reliability of forensic investigations yet is rarely explicitly considered. • A new strategy for investigations is proposed influenced by Zero Trust principles. • A motivating example illustrates the need for such a strategy.",40,,301352,301352,Digital forensics; Mindset; Computer security; Computer science; Globe; Network forensics; Computer forensics; Digital evidence; Zero (linguistics); Field (mathematics); Internet privacy; Data science,,,,UK Research and Innovation; Engineering and Physical Sciences Research Council; Science Foundation Ireland,,http://dx.doi.org/10.1016/j.fsidi.2022.301352,,10.1016/j.fsidi.2022.301352,,,0,003-232-363-219-004; 007-832-595-971-443; 009-344-895-342-85X; 009-512-003-529-193; 016-145-301-135-450; 022-626-519-506-300; 045-783-901-971-215; 047-386-524-667-691; 048-250-488-210-056; 062-168-384-023-533; 078-598-867-814-365; 081-032-497-600-401; 131-807-250-432-699; 134-927-490-231-285; 166-999-959-693-14X,0,true,cc-by,hybrid 111-488-239-742-003,Framework for Reliable Experimental Design (FRED):: A research framework to ensure the dependable interpretation of digital data for digital forensics,,2018,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Graeme Horsman,"Abstract The establishment of fact forms the cornerstone of any forensic discipline, with digital analysis being no exception. Practitioners are under an obligation as expert witnesses to provide factual accounts of digital scenarios, which must be underpinned by robust knowledge and evidential findings. To achieve this level of reliability, investigatory research must be suitably planned, implemented and analysed in a way which instills confidence in the accuracy of any findings. This is particularly important as digital forensic organisations are now facing the impending requirement to have acquired ISO/IEC 17025 accreditation. This article proposes the Framework for Reliable Experimental Design (FRED) to support those engaged in the field of digital forensics research to contribute reliable, robust findings. FRED focuses on the underpinning procedures involved within undertaking the reverse engineering of digital data structures and the process of extracting and interpreting digital content in a reliable way. The proposed framework is designed to be a resource for those operating within the digital forensic field, both in industry and academia, to support and develop research best practice within the discipline.",73,,294,306,Forensic science; Conceptual framework; Data science; Digital data; Digital content; Digital evidence; Computer security; Computer science; Process (engineering); Resource (project management); Digital forensics,,,,,https://doi.org/10.1016/j.cose.2017.11.009 https://research.tees.ac.uk/en/publications/framework-for-reliable-experimental-design-fred-a-research-framew https://research.tees.ac.uk/ws/files/4355231/621551.pdf https://dblp.uni-trier.de/db/journals/compsec/compsec73.html#Horsman18 https://www.sciencedirect.com/science/article/pii/S0167404817302468 https://core.ac.uk/download/pdf/196166325.pdf,http://dx.doi.org/10.1016/j.cose.2017.11.009,,10.1016/j.cose.2017.11.009,2769542598,,0,002-625-978-577-247; 004-706-447-836-905; 007-790-059-029-953; 009-386-221-930-423; 011-946-587-391-596; 012-410-670-929-028; 019-620-931-459-002; 021-039-461-635-181; 032-697-093-668-898; 033-877-222-136-260; 035-672-281-328-899; 037-886-407-309-770; 038-668-970-194-854; 043-947-795-550-171; 045-243-807-828-458; 050-171-086-268-964; 050-513-243-638-138; 066-235-037-082-291; 066-403-963-486-412; 067-577-414-064-539; 067-844-385-207-96X; 074-014-335-505-388; 074-299-373-252-299; 075-128-417-091-483; 078-275-236-083-731; 081-896-209-272-043; 086-419-575-179-359; 090-894-834-543-459; 093-650-425-263-585; 095-691-114-276-825; 098-748-261-333-651; 101-436-770-235-826; 111-090-978-711-139; 118-838-969-146-870; 125-384-800-661-375; 127-053-349-240-432; 129-080-110-367-50X; 133-397-275-695-990; 133-828-777-357-301; 134-927-490-231-285; 137-755-137-054-864; 172-364-607-042-640; 174-414-868-068-131; 184-948-841-629-735,29,true,cc-by-nc-nd,green 112-744-755-472-229,Forensic Analysis using Text Clustering in the Age of Large Volume Data: A Review,,2019,journal article,International Journal of Advanced Computer Science and Applications,21565570; 2158107x,The Science and Information Organization,,Bandar Saleh Mouhammed ِAlmaslukh,"Exploring digital devices in order to generate digital evidence related to an incident being investigated is essential in modern digital investigation. The emergence of text clustering methods plays an important role in developing effective digital forensics techniques. However, the issue of increasing the number of text sources and the volume of digital devices seized for analysis has been raised significantly over the years. Many studies indicated that this issue should be resolved urgently. In this paper, a comprehensive review of digital forensic analysis using text-clustering methods is presented, investigating the challenges of large volume data on digital forensic techniques. Moreover, a meaningful classification and comparison of the text clustering methods that have been frequently used for forensic analysis are provided. The major challenges with solutions and future research directions are also highlighted to open the door for researchers in the area of digital forensics in the age of large volume data.",10,6,,,Volume (computing); Forensic science; Document clustering; Data science; Digital evidence; Computer science; Digital forensics,,,,,https://thesai.org/Publications/ViewPaper?Volume=10&Issue=6&Code=IJACSA&SerialNo=10 https://thesai.org/Downloads/Volume10No6/Paper_10-Forensic_Analysis_using_Text_Clustering.pdf https://repository.psau.edu.sa/xmlui/handle/123456789/92614,http://dx.doi.org/10.14569/ijacsa.2019.0100610,,10.14569/ijacsa.2019.0100610,2955593819,,0,,8,true,cc-by,gold 112-917-373-753-714,Editorial,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Bruce Nikkel,,40,,301388,301388,Psychology,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301388,,10.1016/j.fsidi.2022.301388,,,0,,0,true,,bronze 112-972-498-965-560,A Study on Digital Forensics in Hadoop,2016-11-01,2016,journal article,Indonesian Journal of Electrical Engineering and Computer Science,25024760; 25024752,Institute of Advanced Engineering and Science,,Sachin Arun Thanekar; K. Subrahmanyam; A. B. Bagwan,"Nowadays we all are surrounded by Big data. The term ‘Big Data’ itself indicates huge volume, high velocity, variety and veracity i.e. uncertainty of data which gave rise to new difficulties and challenges. Hadoop is a framework which can be used for tremendous data storage and faster processing. It is freely available, easy to use and implement. Big data forensic is one of the challenges of big data. For this it is very important to know the internal details of the Hadoop. Different files are generated by Hadoop during its process. Same can be used for forensics. In our paper our focus is on digital forensics and different files generated during different processes. We have given the short description on different files generated in Hadoop. With the help of an open source tool ‘Autopsy’ we demonstrated that how we can perform digital forensics using automated tool and thus big data forensics can be done efficiently.",4,2,473,478,Volume (computing); Variety (cybernetics); Forensic science; Computer data storage; Focus (computing); Computer science; Process (engineering); Big data; Database; Digital forensics,,,,,http://ijeecs.iaescore.com/index.php/IJEECS/article/view/5989 http://ijeecs.iaescore.com/index.php/IJEECS/article/download/5989/5324 https://www.iaescore.com/journals/index.php/IJEECS/article/view/5989/5324,http://dx.doi.org/10.11591/ijeecs.v4.i2.pp473-478,,10.11591/ijeecs.v4.i2.pp473-478,2528158907,,0,051-375-511-393-776; 053-351-390-495-712; 058-248-784-098-150; 061-033-869-892-660; 079-911-249-105-531; 099-006-406-150-578,5,false,, 112-973-164-071-334,PENERAPAN METODE COMPOSITE LOGIC UNTUK PERANCANGAN FRAMEWORK PENGUMPULAN BUKTI DIGITAL PADA MEDIA SOSIAL,2019-08-31,2019,journal article,ILKOM Jurnal Ilmiah,25487779; 20871716,Universitas Muslim Indonesia,,Muhammad Naim Al Jumah; Bambang Sugiantoro; Yudi Prayudi,"Social media has become a major part of society. But most of the time social media is used as a way people commit the crime. Due to numerous crimes that use social media, it is essential to design a framework to gather digital evidence on social media. This study develops the design of Framework by implementing Composite Logic Model.  A logic Composite model can be used to determine the role model of any variable or pattern that need to collaborate. Composite Logic Model will produce a role model that has a role to produce patterns so that it can produce the same goal. A method of Composite Logic will collaborate with the Digital Forensics Investigation framework to produce a Digital Evidence Collection Framework on Social Media. Based on data and facts, this study has been producing a new framework of gathering digital evidence on social media. The framework has four main stages in the process of collecting digital evidence on social media including pre-process, collection, analysis, and report.",11,2,135,142,Commit; Variable (computer science); Data science; Logic model; Digital evidence; Computer science; Process (engineering); Role model; Social media; Digital forensics,,,,,http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/download/442/185 http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/view/442 https://doaj.org/article/efcb636576584f61b976088a5506c006 https://core.ac.uk/download/pdf/228866360.pdf,http://dx.doi.org/10.33096/ilkom.v11i2.442.135-142,,10.33096/ilkom.v11i2.442.135-142,2974808412,,0,,0,true,cc-by-sa,gold 113-231-146-599-024,A new anti-forensic scheme--hiding the single JPEG compression trace for digital image.,2014-12-01,2014,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Yanjun Cao; Tiegang Gao; Guorui Sheng; Li Fan; Lin Gao,"To prevent image forgeries, a number of forensic techniques for digital image have been developed that can detect an image's origin, trace its processing history, and can also locate the position of tampering. Especially, the statistical footprint left by JPEG compression operation can be a valuable source of information for the forensic analyst, and some image forensic algorithm have been raised based on the image statistics in the DCT domain. Recently, it has been shown that footprints can be removed by adding a suitable anti-forensic dithering signal to the image in the DCT domain, this results in invalid for some image forensic algorithms. In this paper, a novel anti-forensic algorithm is proposed, which is capable of concealing the quantization artifacts that left in the single JPEG compressed image. In the scheme, a chaos-based dither is added to an image's DCT coefficients to remove such artifacts. Effectiveness of both the scheme and the loss of image quality are evaluated through the experiments. The simulation results show that the proposed anti-forensic scheme can verify the reliability of the JPEG forensic tools.",60,1,197,205,Digital image processing; Artificial intelligence; JPEG; Quantization (image processing); Computer vision; Computer science; Digital image; Image quality; JPEG 2000; Lossless JPEG; Image processing,anti-forensic; chaotic signal; digital fingerprint; digital image forgery; forensic science; single JPEG compression,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=5215319 https://www.onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.12618 https://www.ncbi.nlm.nih.gov/pubmed/25442510,http://dx.doi.org/10.1111/1556-4029.12618,25442510,10.1111/1556-4029.12618,2038618066,,0,001-689-344-329-133; 004-530-492-547-92X; 007-414-852-040-315; 031-876-583-652-183; 041-796-476-831-023; 051-035-217-903-949; 055-846-173-386-410; 074-602-449-941-680; 079-164-168-107-23X; 101-218-430-388-564; 108-082-852-052-555; 122-164-403-164-304; 135-262-782-091-897; 136-713-989-335-402; 147-457-693-761-284,7,false,, 114-090-829-194-843,KES - Extended abstract digital forensics model with preservation and protection as umbrella principles,,2014,journal article,Procedia Computer Science,18770509,Elsevier BV,,Shahzad Saleem; Oliver Popov; Ibrahim Bagilli,"Abstract In this research, a literature review was conducted where twenty (n=20) frameworks and models highlighting preservation of the integrity of digital evidence and protection of basic human rights during digital forensic investigations were studied. The models not discussing the process at an abstract level were excluded. Therefore, thirteen (n=13) of the studied models were included in our analysis. The results indicated that published abstract models lack preserving the integrity of digital evidence and protecting the basic human rights as explicit overarching umbrella principles. To overcome this problem, we proposed an extension to Reith's abstract digital forensics model explicating preservation of integrity and protection of human rights as the two necessary umbrella principles.",35,,812,821,Human rights; Information system; Digital evidence; Computer security; Computer science; Process (engineering); Engineering ethics; Digital forensics,,,,,https://dblp.uni-trier.de/db/conf/kes/kes2014.html#SaleemPB14 https://core.ac.uk/display/82554968 http://www.diva-portal.org/smash/record.jsf?pid=diva2:773761 https://www.researchgate.net/profile/Ibrahim_Baggili/publication/265848150_Extended_abstract_digital_forensics_model_with_preservation_and_protection_as_umbrella_principles/links/541e2d720cf2218008d1dd10.pdf https://www.sciencedirect.com/science/article/abs/pii/S1877050914012113 https://www.sciencedirect.com/science/article/pii/S1877050914012113 https://core.ac.uk/download/pdf/82554968.pdf,http://dx.doi.org/10.1016/j.procs.2014.08.246,,10.1016/j.procs.2014.08.246,2080628430,,0,001-009-008-665-240; 001-135-038-170-705; 002-633-335-300-244; 009-701-742-236-493; 011-972-444-921-827; 017-840-378-634-021; 019-505-819-376-748; 019-698-064-288-240; 019-831-293-743-518; 020-944-423-224-895; 021-274-925-963-096; 021-850-998-857-676; 032-697-093-668-898; 035-223-520-491-228; 035-877-258-121-493; 038-668-970-194-854; 041-227-773-004-745; 043-557-221-344-121; 045-581-544-307-619; 062-325-585-829-185; 065-452-675-566-99X; 067-545-085-582-063; 076-578-517-786-850; 078-072-950-053-679; 080-145-245-150-605; 094-587-727-381-031; 097-723-876-253-714; 110-079-538-894-548; 111-741-773-111-021; 124-912-663-881-389; 132-355-634-397-986; 138-304-979-688-517; 145-002-823-706-838; 154-446-346-619-232; 159-094-605-033-945; 160-240-603-104-314; 178-883-713-153-793; 181-095-475-426-346; 184-948-841-629-735; 199-745-676-923-766,15,true,,gold 114-239-357-516-674,A Study of Mobile Forensic Tools Evaluation on Android-Based LINE Messenger,,2018,journal article,International Journal of Advanced Computer Science and Applications,21565570; 2158107x,The Science and Information Organization,," Riadi; Abdul Fadlil; Ammar Fauzan","The limitation of forensic tool and the mobile device’s operating system are two problems for researchers in mobile forensics field. Nevertheless, some kinds of forensic tools testing in several devices might be helpful in an investigation. Therefore, the evaluation of forensic tool is one gate to reach the goal of a digital forensics study. Mobile forensics as one of the digital forensics branch that focusing on data recovery process on mobile devices has some problems in the analytical ability because of the different features of forensic tools. In this research, the researchers present studies and techniques on tools ability and evaluated them based on digital evidence of LINE analysis. The experiment was combined VV methods and NIST standard forensic methods to produce a model of forensic tool evaluation steps. As the result of the experiment, Oxygen Forensic has 61.90% of index number and MOBILedit Forensic has the highest index number at 76.19% in messenger application analysis. This research has successfully assessed the performance of forensic tools.",9,10,,,Forensic science; Mobile device; Data science; Digital evidence; Computer science; Android (operating system); Mobile device forensics; Digital forensics,,,,,https://thesai.org/Publications/ViewPaper?Volume=9&Issue=10&Code=IJACSA&SerialNo=24 https://thesai.org/Downloads/Volume9No10/Paper_24-A_Study_of_Mobile_Forensic_Tools.pdf,http://dx.doi.org/10.14569/ijacsa.2018.091024,,10.14569/ijacsa.2018.091024,2900096525,,0,000-225-165-729-99X; 008-717-383-265-216; 021-039-461-635-181; 055-473-899-043-485; 075-128-417-091-483; 087-287-435-836-200; 089-695-854-791-989; 185-798-265-234-254,7,true,cc-by,gold 114-473-027-477-559,Distributed Network Forensics Framework: A Systematic Review,2015-06-18,2015,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Gurpal Singh Chhabra; Prashant Kumar Singh,"Network forensics is a branch of digital forensics, which applies to network security. It is used to relate monitoring and analysis of the computer network traffic, that helps us in collecting information and digital evidence, for the protection of network that can use as firewall and IDS. Firewalls and IDS can’t always prevent and find out the unauthorized access within a network. This paper presents an extensive survey of several forensic frameworks. There is a demand of a system which not only detects the complex attack, but also it should be able to understand what had happened. Here it talks about the concept of the distributed network forensics. The concept of the Distributed network forensics is based on the distributed techniques, which are useful for providing an integrated platform for the automatic forensic evidence gathering and important data storage, valuable support and an attack attribution graph generation mechanism to depict hacking events.",119,19,31,35,Forensic science; Network security; Firewall (construction); Computer data storage; Data science; Digital evidence; Computer science; Network forensics; Digital forensics; Hacker,,,,,https://www.ijcaonline.org/archives/volume119/number19/21178-4201 https://research.ijcaonline.org/volume119/number19/pxc3904201.pdf http://ui.adsabs.harvard.edu/abs/2015IJCA..119s..31S/abstract,http://dx.doi.org/10.5120/21178-4201,,10.5120/21178-4201,2335966069,,0,004-706-447-836-905; 015-503-477-862-142; 018-352-322-450-825; 027-099-591-941-569; 027-265-141-482-204; 032-244-297-444-421; 035-829-068-594-103; 038-668-970-194-854; 042-268-262-351-304; 044-353-273-186-518; 073-744-995-689-459; 089-048-294-489-077; 128-489-282-993-184; 142-226-580-142-17X; 161-527-786-273-341,7,true,,green 114-642-612-579-69X,PERANAN ILMU DIGITAL FORENSIK TERHADAP PENYIDIKAN KASUS PERETASAN WEBSITE,2020-07-14,2020,journal article,Vol. 21 No 1 April 2020,24422274,Universitas Pasundan,,Synthiana Rachmie,"Digital forensic is part of forensic science being used for investigation and cases inquiry in terms of digital datafinding. This research focusedon understandingthe application of investigator’s expertise on digital forensic to support identification process of a case to obtain evidence in a relatively fast and precise time and to reveal the motive and mens rea behind the act of the offender. Conceptual approach was used in this research alongsidethe case approach. The findings showed that digital forensic science has been applied by investigators however it cannot be maximal for it also depends on what case the investigator is working on. In the case of website hacking, investigator used internet/network forensic through surveillance and collecting evidence as leads. It is suggested that every investigator should learn and master digital forensic science to support their expertise and other non-legal knowledge and it is vital to provide sufficientfacilities and infrastructures to obtain a comprehensive investigation.",,21,104,127,,,,,,http://dx.doi.org/10.23969/litigasi.v21i1.2388,http://dx.doi.org/10.23969/litigasi.v21i1.2388,,10.23969/litigasi.v21i1.2388,3049232542,,0,022-036-544-197-474; 052-054-657-975-487; 055-086-544-213-027; 075-591-424-638-445; 076-463-766-205-148; 086-018-338-372-932; 086-586-745-336-678; 104-993-530-236-37X; 113-002-819-576-830; 118-397-112-434-709; 119-753-128-756-504,0,true,cc-by,gold 114-976-379-033-024,Review of the accreditation of digital forensics in China,2018-07-03,2018,journal article,Forensic sciences research,24711411; 20961790,Informa UK Limited,England,Hong Guo; Junlei Hou,"As a result of the many developments in information technology, digital evidence plays an increasingly important role in criminal and civil litigation. Because digital evidence is necessary for litigation, the judicial system must be assured of its accuracy, reliability, and verifiability, which can be assured by accreditation. This paper focuses on a comparison of the evolution of the accreditation of digital forensics internationally and domestically, discusses the existing problems that such accreditation encounters, and proposes the corresponding solutions. Moreover, this paper discusses the future of digital forensic laboratory accreditation and its implementation.",3,3,194,201,Engineering management; Information technology; Engineering; China; Digital evidence; Civil litigation; Reliability (statistics); Accreditation; Digital forensics,Accreditation; digital forensics; forensic science; methodology; personnel training,,,National Key Research and Development Program of China; Shanghai Forensic Service Platform; Shanghai Key Laboratory of Forensic Medicine,https://pubmed.ncbi.nlm.nih.gov/30483669/ https://doaj.org/article/8f9b08b437904df595539a131ea9c9a5 https://www.tandfonline.com/doi/full/10.1080/20961790.2018.1503526 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6201810 https://europepmc.org/article/MED/30483669,http://dx.doi.org/10.1080/20961790.2018.1503526,30483669,10.1080/20961790.2018.1503526,2895746766,PMC6201810,0,085-669-579-012-375,4,true,"CC BY, CC BY-NC",gold 115-332-981-445-059,Forensic analysis in Mobile Cloud Computing architecture,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yugal Pathak,"Data has become a bigger challenge to handle in mobile networks, today. In case of mobile devices data needs to be processed in large amounts so insufficient space issues may occur in case of low hardware configurations. For this, cloud platform provides ease of migrating apps to various places without giving platform dependency, space issues and also giving better data processing on low hardware costs. But is highly susceptible to malware attacks and data loss due to various factors and in case of digital data forensics becomes a greater challenge. In this paper, we present an overview of MCC and digital forensics, focusing on its key aspects and significant forensic challenges faced by digital investigators in MCC. The purpose of this paper is to provide a comprehensive understanding about forensic research challenges and re-direct researchers towards new research areas.",,,25,30,Computer architecture; Architecture; Mobile cloud computing; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.04,http://dx.doi.org/10.46293/4n6/2020.02.02.04,,10.46293/4n6/2020.02.02.04,3021049698,,0,,0,false,, 115-364-165-954-740,Design of Image Copy-Paste Forensics System Based on Moment Invariants,2021-11-01,2021,journal article,International Journal for Innovation Education and Research,24112933; 24113123,International Journal for Innovation Education and Research,,Jingyi Shen; Yun Yao; Hao Mei,"Copy-paste tampering is a common type of digital image tampering, which refers to copying a part of the image area in the same image, and then pasting it into another area of the image to generate a forged image, so as to carry out malicious operations such as fraud and framing. This kind of malicious forgery leads to the security problem of digital image. The research of digital image copy paste forensics has important theoretical significance and practical value. For digital image copy-paste tampering, this paper is based on moment invariant image copy paste tampering detection algorithm, and use Matlab software to design the corresponding tampering forensics system.",9,11,552,555,Image (mathematics); Artificial intelligence; Copy paste; Computer vision; Computer science; Moment (mathematics),,,,,https://ijier.net/ijier/article/download/3547/2387,http://dx.doi.org/10.31686/ijier.vol9.iss11.3547,,10.31686/ijier.vol9.iss11.3547,3216156770,,0,013-129-292-733-467; 040-331-306-755-615; 055-501-435-466-928,0,true,cc-by-nd,gold 115-729-001-970-735,Video steganalysis to obstruct criminal activities for digital forensics: a survey,,2018,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Mukesh Dalal; Mamta Juneja,,10,4,338,338,Steganalysis; Digital forensics; Computer science; Digital evidence; Computer security; Computer forensics; Steganography; Criminal investigation; Internet privacy; Artificial intelligence; Criminology; Image (mathematics); Psychology,,,,,,http://dx.doi.org/10.1504/ijesdf.2018.095122,,10.1504/ijesdf.2018.095122,,,0,,8,false,, 116-473-356-479-419,"The phone reveals your motion: Digital traces of walking, driving and other movements on iPhones",,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Jan Peter van Zandwijk; Abdul Boztas,,37,,301170,,Motion (physics); Human–computer interaction; Cache; Reliability (computer networking); Phone; Everyday life; Movement (music); Differential analysis; Drop tests; Computer science,,,,,https://www.sciencedirect.com/science/article/abs/pii/S2666281721000780 https://doi.org/10.1016/j.fsidi.2021.301170 https://dblp.uni-trier.de/db/journals/di/di37.html#ZandwijkB21,http://dx.doi.org/10.1016/j.fsidi.2021.301170,,10.1016/j.fsidi.2021.301170,3163998125,,0,039-158-280-114-980,1,false,, 116-690-629-016-841,X-Ways Forensics Platform For Digital Forensics Examiners,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Seth Adjei Gyimah,"Digital Forensics & Cyber Security Graduate Programme Department Of Information Systems & Innovations Ghana Institute of Management & Public Administration Greenhill, Accra, Ghana E-mails: sethadjeigyimah@gmail.com/ seth-adjei.gyimah@st.gimpa.edu.gh Phone: +233244475540 ABSTRACT Crime has evolved over the years from its traditional form to digital crimes. Those who commit such crimes use advanced and sophisticated tools, equipment and techniques to perpetuate such crimes. In order to effectively and efficiently investigate, examine and gather evidence from such complex crimes, digital examiners have to employ various tools and techniques to analyze, extract and recover data as evidence to assist in prosecution of the perpetrators of the crime. This paper analyzes X-Ways Forensics platform which is an application software for forensic examiners as a forensic tool for data extraction, analysis and recovery. Dr. Larry Leibrock, Founder and CTO of eForensics revealed his admiration for X-Ways Forensics application when he said “As a professional forensics examiner, I have used X-Ways Forensics as a forensics instrument in recovering and analyzing digital information. I have tested and validated the professional version and it has proved to be accurate and trustworthy in its reporting. I have the highest level of confidence in X-Ways Forensics efficacy in digital forensics cases. I am confident that the tool and my use of this instrument would stand legal review and opposing challenge.” Keywords: X_ways, Cybersecurity, Forensics, Detection, Cyber space, Examiners BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Seth Adjei Gyimah (2022): X-Ways Forensics Platform For Digital Forensics Examiners Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 353-356 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P56",1,1,353,356,Digital forensics; Digital evidence; Computer forensics; Computer science; Computer security; Commit; Internet privacy; Database,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p56,,10.22624/aims/crp-bk3-p56,,,0,,0,true,,bronze 117-070-059-884-741,Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments.,2022-09-19,2022,journal article,"Sensors (Basel, Switzerland)",14248220; 14243210,Multidisciplinary Digital Publishing Institute (MDPI),Switzerland,Raffaele Cuomo; Davide D'Agostino; Mario Ianulardo,"This paper presents several scenarios where digital evidence can be collected from mobile devices, their legal value keeping untouched. The paper describes a robust methodology for mobile forensics developed through on-field experiences directly gained by the authors over the last 10 years and many real court cases. The results show that mobile forensics, digital analysis of smartphone Android or iOS can be obtained in two ways: on the one hand, data extraction must follow the best practice of the repeatability procedure; on the other hand, the extraction of the data must follow the best practice of the non-repeatability procedure. The laboratory study of the two methods for extracting digital data from mobile phones, for use as evidence in court trials, has shown that the same evidence can be obtained even when the procedure of unavailability of file mining activities has been adopted. Indeed, thanks to laboratory tests, the existence of multiple files frequently and continuously subjected to changes generated by the presence of several hashes found at forensic extractions conducted in very short moments of time (sometimes not exceeding 15 min) has been proven. If, on the other hand, the examination of a device is entrusted to a judicial police officer in order to conduct a forensic analysis to acquire data produced and managed by the user (such as images, audio, video, documents, SMS, MMS, chat conversations, address book content, etc.) we have sufficient grounds to believe that such examination can be organized according to the system of repeatable technical assessments.",22,18,7096,7096,Unavailability; Computer science; Digital forensics; Android (operating system); Mobile device; Digital evidence; Computer security; Multimedia; World Wide Web; Engineering; Reliability engineering; Operating system,computer forensics; cybercrime; digital analysis; digital evidence; forensic extraction; mobile forensics; repeatability; unrepeatability,"Cell Phone; Computers, Handheld; Forensic Medicine; Forensic Sciences; Smartphone",,,,http://dx.doi.org/10.3390/s22187096,36146443,10.3390/s22187096,,PMC9505885,0,,0,true,cc-by,gold 117-095-420-741-153,On Integrating Mobile Applications into the Digital Forensic Investigative Process,,2013,journal article,International Journal of Advanced Computer Science and Applications,2158107x; 21565570,The Science and Information Organization,,April Tanner; Soniael Duncan,"What if a tool existed that allowed digital forensic investigators to create their own apps that would assist them with the evidence identification and collection process at crime scenes? First responders are responsible for ensuring that digital evidence is examined in such a way that the integrity of the evidence is not jeopardized. Furthermore, they play a pivotal part in preserving evidence during the collection of evidence at the crime scene and transport to the laboratory. This paper proposes the development of a mobile application that can be developed for or created by a first responder to assist in the identification, acquisition, and preservation of digital evidence at a crime scene. Keywords—mobile device forensics; digital forensics; forensic process, forensic models; MIT App Inventor I. INTRODUCTION Digital Forensics involves the identification, preservation, collection, examination, and analysis of digital devices. These devices include, but are not limited to, digital cameras, flash drives, computers, internal and external memory drives, mobile devices, etc. Some mobile devices that can be examined include graphic tablets, cell phones, smart phones, CDs, DVDs, and MP3s. Digital evidence has to be collected under certain parameters as to maintain the integrity of the investigation. This process is referred to as a forensic process. While there is not a concrete set of rules for the forensic process there are models that have been proposed to aid in trying to eliminate damage and contamination that can occur at crime scenes. This paper identifies the types of damage and contamination that can occur at crime scenes when inexperienced first responders arrive at the scene; in addition, we discuss the models that address the preservation and acquisition of evidence at crime scenes, and also explore possible solutions to aid first responders in utilizing techniques to preserve digital evidence at the scene of the crime. In this paper, we propose the development and implementation of a mobile application that first responders can create and use as a guide when identifying, preserving, collecting, and securing evidence. As a result, this application would be useful in assisting first responders during the acquisition process of a digital forensics investigation.",4,8,,,Forensic science; Crime scene; Mobile device; Data science; Digital evidence; Computer security; Computer science; Network forensics; Computer forensics; Mobile device forensics; Identification (information); Digital forensics,,,,,https://thesai.org/Downloads/Volume4No8/Paper_9-On_Integrating_Mobile_Applications_into_the_Digital_Forensic.pdf https://thesai.org/Publications/ViewPaper?Volume=4&Issue=8&Code=IJACSA&SerialNo=9,http://dx.doi.org/10.14569/ijacsa.2013.040809,,10.14569/ijacsa.2013.040809,2145109049,,0,100-246-306-965-821; 171-464-767-472-377,1,true,cc-by,hybrid 117-319-780-113-791,Teaching computer forensics course: challenges and opportunities,2017-06-01,2017,journal article,Journal of Computing Sciences in Colleges,19374763,,,Yana Kortsarts,"Computer forensics, still a relatively new discipline in computer security, focuses on finding digital evidence after a computer security incident has occurred. Computer forensics is the scientific examination and analysis of data held on, or retrieved from, computer storage media in such a way that the information can be used as evidence in a court of law. Computer evidence is often transparently created by the operating system without the knowledge of the computer user. The information may be hidden from view. To find it, special forensic software tools and techniques are required. Technology is expanding at a fast rate, and along with the increased use of computers, the Internet, and digital devices comes an increase in digital crime. With the increased use of computers to commit crimes, a need has rapidly developed for forensic experts to extract useful information from computer evidence. Computer forensics is a fast-growing field with high long-term projected demand for trained professionals.",32,6,208,209,The Internet; World Wide Web; Forensic science; Computer literacy; Data science; Digital evidence; Computer science; Network forensics; Information and Computer Science; Computer forensics; Digital forensics,,,,,https://dl.acm.org/citation.cfm?id=3069693,https://dl.acm.org/citation.cfm?id=3069693,,,2727309882,,0,074-246-041-325-050; 085-214-277-668-01X,0,false,, 117-509-642-665-78X,A Study on Development of Digital Forensic Capability Evaluation Indices,2015-10-31,2015,journal article,Journal of the Korea Institute of Information Security and Cryptology,15983986,Korea Institute of Information Security and Cryptology,,Hee-il Park; Jongseong Yoon; Sangjin Lee,"ABSTRACT With the acceleration of information digitization caused by fas t growth of Information Technology, the application of digital forensics has increased but it is underestimated becaus e digital evidence is easy to forge. Especially, the evaluation of the reliability of digital forensics organization is judged onl y by judges domestically because there is no objective verification system or evaluation method of the capability of d igital forensics organization. Therefore, the evaluation model and indices of the capability of digital forensics concentrated on the digital forensics organization, personnel, technology, facilities and the procedure in domestic justice system was pre sented in this research after reviewing the domestic and foreign evaluation method and the standard of the capability of digital forensics and informati on security. The standard for judicial evaluation of digital evidence and composition, manage ment, evaluation of digital forensics organization would be presented based on this research.Keywords: Digital Forensics, Digital Forensic Capability Evaluation, Cap ability Evaluation Indices",25,5,1153,1166,Information technology; Digitization; Digital evidence; Verification system; Evaluation methods; Computer security; Computer science; Reliability (statistics); Digital forensics,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002042112 http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2015_v25n5_1153,http://dx.doi.org/10.13089/jkiisc.2015.25.5.1153,,10.13089/jkiisc.2015.25.5.1153,2343682835,,0,029-632-996-742-459; 035-200-969-642-039; 067-938-325-014-282; 083-578-059-674-117,1,true,,bronze 117-594-679-776-482,A Proposed Model of Digital Forensic on Cloud Computing Security Infrastructure,2018-07-30,2018,journal article,International Journal of Innovation in Enterprise System,25803050,Telkom University,,Mohammad Hafiz Hersyah,"Over the past decades, practitioners and researchers have made remarkable achievements in digital forensic. The abilities to conquer major technical obstacles are bestowing practitioners greater access to digital evidence. Sophisticated forensic techniques and tools are being developed to assist forensic acquisition and extraction of volatile data, inspection of remote repositories system and analysis of network traffic. Computer forensic is a comprehensive work that based on several attributes that are : objectivity, relevance and legitimacy to compose a system model that projected to be an electronic evidence forensic system. Latest studies show that the rapid growing of cloud computing facilities usage that has enable various improvements as part of the innovation process at organisations. Information systems are in frequently exposed to various types of threats which able to trigger different types of bad consequences as more and more information stored, problems arise especially about security information technology risk aspects.; Keywords—computer forensic, cloud computing, electronic evidence forensic system, security, information technology risk, information system",2,02,18,23,System model; Information system; Cloud computing security; IT risk; Data science; Digital evidence; Computer science; Cloud computing; Digital forensics; Relevance (information retrieval),,,,,https://www.neliti.com/publications/349400/a-proposed-model-of-digital-forensic-on-cloud-computing-security-infrastructure https://ijies.sie.telkomuniversity.ac.id/index.php/IJIES/article/download/21/19 https://core.ac.uk/download/pdf/295356391.pdf,http://dx.doi.org/10.25124/ijies.v2i02.21,,10.25124/ijies.v2i02.21,2912999517,,0,035-448-415-847-226; 190-025-622-260-327,0,true,,gold 117-843-664-085-149,A Forensic Email Analysis Tool Using Dynamic Visualization,,2017,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Johannes Stadlinger; Andreas Dewald,,12,1,6,,World Wide Web; Dynamic visualization; Visualization; Computer science; Network forensics; Computer forensics,,,,,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#StadlingerD17 https://commons.erau.edu/cgi/viewcontent.cgi?article=1413&context=jdfsl https://commons.erau.edu/jdfsl/vol12/iss1/6/ https://doi.org/10.15394/jdfsl.2017.1413,http://dx.doi.org/10.15394/jdfsl.2017.1413,,10.15394/jdfsl.2017.1413,2624808154,,0,038-368-734-159-243; 044-641-967-355-570; 052-049-593-503-686; 103-309-933-900-466; 134-927-490-231-285; 158-363-867-842-044,4,true,cc-by-nc,gold 118-103-890-724-159,Pypette: A Platform for the Evaluation of Live Digital Forensics,2012-10-01,2012,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Brett Lempereur; Madjid Merabti; Qi Shi,"Live digital forensics presents unique challenges with respect to maintaining forensic soundness, but also offers the ability to examine information that is unavailable to quiescent analysis. Any perturbation of a live operating system by a forensic examiner will have far-reaching effects on the state of the system being analysed. Numerous approaches to live digital forensic evidence acquisition have been proposed in the literature, but relatively little attention has been paid to the problem of identifying how the effects of these approaches, and their improvements over other techniques, can be evaluated and quantified. In this paper, the authors present Pypette, a novel platform enabling the automated, repeatable analysis of live digital forensic acquisition techniques.",4,4,31,46,Computer security; Soundness; Computer science; Computer forensics; Digital forensics,,,,,https://www.igi-global.com/article/pypette-platform-evaluation-live-digital/74804 https://doi.org/10.4018/jdcf.2012100103 http://doi.org/10.4018/jdcf.2012100103 https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf4.html#LempereurMS12,http://dx.doi.org/10.4018/jdcf.2012100103,,10.4018/jdcf.2012100103,2009967747,,0,002-495-833-326-831; 004-441-167-148-170; 005-296-771-590-748; 010-240-301-659-307; 035-448-415-847-226; 035-467-233-982-594; 040-911-574-660-701; 042-880-741-738-793; 050-513-243-638-138; 054-507-171-824-189; 089-048-294-489-077; 093-448-702-012-591; 097-567-011-227-46X; 099-520-470-483-918; 106-885-306-836-498; 120-462-880-448-150; 142-816-347-811-541,2,false,, 118-444-471-106-597,KOMPARATIVNA ANALIZA OPEN-SOURCE ALATA ZA DIGITALNU FORENZIKU MOBILNIH UREĐAJA,2021-11-07,2021,journal article,Zbornik radova Fakulteta tehničkih nauka u Novom Sadu,25605925; 0350428x,Faculty of Technical Sciences,,Bojan Trifković,"The paper deals with the presentation of open-source tools for digital forensics of mobile devices, with a part dedicated to digital forensics itself as a technological discipline. The paper describes how to use certain tools, as well as their advantages and disadvantages.",36,11,1910,1913,Mobile device; Presentation; Computer science; Multimedia; Digital forensics,,,,,http://ftn.uns.ac.rs/ojs/index.php/zbornik/article/view/1831,http://dx.doi.org/10.24867/15be14trifkovic,,10.24867/15be14trifkovic,3217518061,,0,,0,true,,bronze 118-504-831-882-891,DIGITAL FORENSIC READINESS FRAMEWORK BASED ON HONEYPOT AND HONEYNET FOR BYOD,2021-09-07,2021,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Audrey Asante; Vincent Amankona,,16,2,2,,Honeypot; Computer security; Computer science; Digital forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1706&context=jdfsl https://commons.erau.edu/jdfsl/vol16/iss2/2/,https://commons.erau.edu/jdfsl/vol16/iss2/2/,,,3202317257,,0,046-163-300-072-846; 062-305-572-479-624; 109-180-764-457-953; 113-529-751-754-389,0,true,cc-by-nc,gold 118-589-466-619-969,Signature File Analysis Using The National Institute Standard Technology Method Base on Digital Forensic Concepts,2020-09-30,2020,journal article,Jurnal Informatika Universitas Pamulang,26224615; 25411004,Universitas Pamulang,,Randi Rizal; Ruuhwan Ruuhwan; Septian Chandra,"The number of crimes committed by utilizing advances in information technology such as information leakage, embezzlement of money in banks, credit card fraud, pornography, terrorism, drug trafficking and many more are definitely related to the name digital data. File signatures or magic numbers are one of the forensic science techniques that assist in processing this digital data. The method used in this research is the National Institute Standards Technology method to analyze the authenticity of digital data and the method of proof to obtain valid evidence during the identification process of data or file content. This research is presented in the form of an analysis of the use of signature files in investigations to determine the type of file in the case of leaking company information xyz, the research stage uses evidence handling procedures in the laboratory. Contributions made after conducting a series of case investigations using signature files have been successfully carried out using the Access Data FTK Imager application version 4.2.0 and WinHex version 18.6. Signature files can be used for case investigations in identifying and verifying file types so that files that have been modified can be restored and can be read by the operating system by checking file types through hexadecimal values in the header file (file prefix) that show the characteristics of each type file so that the file type can be found and the file can be read by the operating system.",5,3,364,370,Hexadecimal; Digital data; Information leakage; Digital evidence; Computer science; Header; Database; Identification (information); Digital forensics; File format,,,,,http://openjournal.unpam.ac.id/index.php/informatika/article/download/6073/pdf http://openjournal.unpam.ac.id/index.php/informatika/article/view/6073 https://core.ac.uk/download/337610059.pdf,http://dx.doi.org/10.32493/informatika.v5i3.6073,,10.32493/informatika.v5i3.6073,3094746511,,0,005-383-648-053-571; 013-731-482-888-787; 029-748-683-221-796; 058-734-389-352-474; 079-499-568-978-91X; 138-109-881-604-975,0,true,cc-by-nc,gold 118-838-969-146-870,Taxonomy of Challenges for Digital Forensics.,2015-07-14,2015,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Nickson M. Karie; Hein S. Venter,"Since its inception, over a decade ago, the field of digital forensics has faced numerous challenges. Despite different researchers and digital forensic practitioners having studied and analysed various known digital forensic challenges, as of 2013, there still exists a need for a formal classification of these challenges. This article therefore reviews existing research literature and highlights the various challenges that digital forensics has faced for the last 10 years. In conducting this research study, however, it was difficult for the authors to review all the existing research literature in the digital forensic domain; hence, sampling and randomization techniques were employed to facilitate the review of the gathered literature. Taxonomy of the various challenges is subsequently proposed in this paper based on our review of the literature. The taxonomy classifies the large number of digital forensic challenges into four well-defined and easily understood categories. The proposed taxonomy can be useful, for example, in future developments of automated digital forensic tools by explicitly describing processes and procedures that focus on addressing specific challenges identified in this paper. However, it should also be noted that the purpose of this paper was not to propose any solutions to the individual challenges that digital forensics face, but to serve as a survey of the state of the art of the research area.",60,4,885,893,Engineering; Domain (software engineering); Data science; Randomization techniques; Poison control; Research literature; Field (computer science); Computer security; State (computer science); Digital forensics; Taxonomy (general),digital forensic challenges; digital forensics; forensic sciences; formal classification of challenges; taxonomy,,,,https://repository.up.ac.za/bitstream/2263/51104/1/Karie_Taxonomy_2015.pdf https://repository.up.ac.za/handle/2263/51104 https://dialnet.unirioja.es/servlet/articulo?codigo=5312745 https://www.ncbi.nlm.nih.gov/pubmed/26175261 https://onlinelibrary.wiley.com/doi/10.1111/1556-4029.12809 https://europepmc.org/article/MED/26175261 https://pubmed.ncbi.nlm.nih.gov/26175261/,http://dx.doi.org/10.1111/1556-4029.12809,26175261,10.1111/1556-4029.12809,2097392047,,0,004-110-423-124-981; 005-069-037-045-980; 005-102-962-333-180; 009-671-935-335-418; 016-363-794-426-365; 021-495-249-615-203; 021-850-998-857-676; 033-877-222-136-260; 036-132-248-316-123; 040-524-943-701-266; 044-026-347-309-827; 051-288-268-472-187; 058-723-704-218-926; 063-195-309-093-275; 067-927-462-113-654; 074-543-232-543-385; 076-870-357-267-514; 077-532-025-251-756; 084-559-361-318-175; 089-048-294-489-077; 098-748-261-333-651; 115-531-623-920-069; 130-217-725-914-477; 134-927-490-231-285; 179-703-555-795-891,38,true,,green 118-968-004-680-589,The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics,,2020,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Aine MacDermott; Thar Baker; Paul Buck; Farkhund Iqbal; Qi Shi,"The Internet of Things (IoT) represents the seamless merging of the real and digital world, with new devices created that store and pass around data. Processing large quantities of IoT data will proportionately increase workloads of data centres, leaving providers facing new security, capacity and analytics challenges. Handling this data conveniently is a critical challenge, as the overall application performance is highly dependent on the properties of the data management service. This paper explores the challenges posed by cybercrime investigations and digital forensics concerning the shifting landscape of crime – the IoT and the evident investigative complexity – moving to the Internet of Anything (IoA)/Internet of Everything (IoE) era. IoT forensics requires a multi-faceted approach where evidence may be collected from a variety of sources such as sensor devices, communication devices, fridges, cars and drones, to smart swarms and intelligent buildings.",12,1,1,13,The Internet; Variety (cybernetics); Data management; Cybercrime; Service (systems architecture); Computer security; Computer science; Drone; Analytics; Digital forensics,,,,,https://researchonline.ljmu.ac.uk/id/eprint/9496/ https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf12.html#MacDermottBBIS20 https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902221890881455 https://www.igi-global.com/article/the-internet-of-things-challenges-and-considerations-for-cybercrime-investigations-and-digital-forensics/240648 https://core.ac.uk/download/pdf/237431131.pdf,http://dx.doi.org/10.4018/ijdcf.2020010101,,10.4018/ijdcf.2020010101,2981336747,,0,004-916-495-289-390; 005-630-640-664-939; 010-196-658-878-056; 015-264-924-343-905; 017-325-802-595-724; 017-840-378-634-021; 023-858-572-607-02X; 025-319-861-345-580; 027-265-141-482-204; 029-748-683-221-796; 038-668-970-194-854; 039-999-270-718-277; 040-132-585-260-276; 041-350-452-684-86X; 046-357-391-782-442; 047-125-525-662-686; 047-492-292-707-760; 051-738-543-964-887; 063-101-076-395-60X; 083-312-117-071-763; 111-488-239-742-003; 112-181-239-331-730; 131-373-334-471-817; 133-397-275-695-990; 134-927-490-231-285; 145-062-913-009-934; 162-110-149-751-921,6,true,,green 118-998-556-606-739,The Impact of Digital Evidence in Forensic Laboratories,,2021,journal article,Forensic Science International: Synergy,2589871x,Elsevier BV,,Tracy Walraven,,3,,100178,,Engineering; Forensic science; Data science; Digital evidence,,,,,https://api.elsevier.com/content/article/PII:S2589871X21000486?httpAccept=text/xml,http://dx.doi.org/10.1016/j.fsisyn.2021.100178,,10.1016/j.fsisyn.2021.100178,3208116366,,0,,0,true,"CC BY, CC BY-NC-ND",gold 119-046-468-612-395,Forensic Examination Of Android Mobile Devices,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Aswathi Balachandran; Ribu Hassini,,,,,,Mobile device; Forensic examination; Computer science; Multimedia; Android (operating system),,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.14,http://dx.doi.org/10.46293/4n6/2020.02.04.14,,10.46293/4n6/2020.02.04.14,3097389684,,0,,0,false,, 119-423-654-801-14X,Performance measurement for mobile forensic data acquisition in Firefox OS,,2014,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Mohd Najwadi Yusoof; Ramlan Mahmod; Ali Dehghantanha,"Mozilla Corporation has recently released a Linux-based open source operating system, namely Firefox OS. The arrival of this Firefox OS has created new challenges, concentrations and opportunities for digital investigators. Currently, Firefox OS is still not fully supported by most of the existing mobile forensic tools. Even when the phone is detected as Android, only pictures from removable memory was able to be captured. Furthermore, the internal data acquisition is still not working. Therefore, there are very huge opportunities to explore the Firefox OS on every stages of mobile forensic procedures. This paper will present an approach for mobile forensic data acquisition in a forensically sound manner from a Firefox OS running device. This approach will largely use the UNIX dd command to create a forensic image from the Firefox OS running device. Apart from that, performance measurement will be made to find the best block size for acquisition process in Firefox OS.",3,3,130,140,Operating system; Unix; World Wide Web; Performance measurement; Data acquisition; Information system; Phone; Open source; Computer science; Android (operating system),,,,,http://sdiwc.net/digital-library/performance-measurement-for-mobile-forensic-data-acquisition-in-firefox-os http://psasir.upm.edu.my/id/eprint/34877/ https://core.ac.uk/download/153815451.pdf,http://dx.doi.org/10.17781/p001333,,10.17781/p001333,2039394463,,0,000-116-031-001-044; 005-899-402-239-840; 008-271-908-703-378; 013-930-958-675-421; 014-510-444-730-433; 019-960-255-195-267; 023-767-546-806-478; 026-641-935-890-517; 030-351-009-711-953; 030-674-871-669-121; 031-259-255-251-803; 031-982-129-275-33X; 043-817-597-356-962; 048-141-687-795-752; 049-979-701-385-094; 065-459-442-784-779; 068-192-150-986-714; 079-699-370-692-859; 082-520-594-872-109; 084-615-004-577-981; 085-503-013-586-695; 088-938-096-763-07X; 097-103-869-237-065; 102-182-774-566-752; 117-614-574-133-806; 142-657-351-097-509; 154-808-033-424-405; 159-516-414-584-397; 177-615-975-039-432; 181-008-425-506-841,11,true,, 119-712-669-804-088,Public Security & Digital Forensics in the United States: The Continued Need for Expanded Digital Systems for Security,,2017,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Deborah G. Keeling; Michael Losavio,,12,3,47,60,Business; Law enforcement; Public security; Computer security; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#KeelingL17 https://commons.erau.edu/jdfsl/vol12/iss3/6/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1452&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2017.1452,,10.15394/jdfsl.2017.1452,2788085562,,0,007-790-059-029-953; 012-661-000-867-434; 027-552-429-711-055; 031-234-153-523-379; 098-323-575-091-372; 132-355-634-397-986,2,true,cc-by-nc,gold 119-855-179-161-858,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,38,,301279,301279,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00197-9,,10.1016/s2666-2817(21)00197-9,,,0,,0,true,,bronze 120-503-453-870-160,Strengthening trust: Integration of digital investigation and forensic science,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Eoghan Casey,,33,,301000,,Engineering; Forensic science; Engineering ethics,,,,,https://dblp.uni-trier.de/db/journals/di/di33.html#Casey20b https://www.sciencedirect.com/science/article/pii/S2666281720302481,http://dx.doi.org/10.1016/j.fsidi.2020.301000,,10.1016/j.fsidi.2020.301000,3038126843,,0,,0,false,, 120-936-178-540-100,Digital forensics investigation jurisprudence: issues of admissibility of digital evidence,2020-07-31,2020,journal article,"Journal of Forensic, Legal & Investigative Sciences",2473733x,Herald Scholarly Open Access,,Abel Yeboah-Ofori; Akoto Derick Brown,"Digital Forensics investigations represent the science and legal process of investigating cybercrimes and digital media or objects to gather evidence. The digital evidence must prove that it has been used to commit a crime or used to gain unauthorized access. Digital Forensics investigations jurisprudence is the theory and philosophy of the study of law and the principles upon which a law is based. For digital evidence to appear at court and be legally admissible, the evidence must be authentic, accurate, complete, and convincing to the jury. Presenting digital forensic evidence at court has proved to be challenging, due to factors such as inadequate chain of custody, not maintaining legal procedures and inadequate evidential integrity. Following legal procedures in evidence gathering at a digital crime scene is critical for admissibility and prosecution. However, inadequate evidence gathering and maintaining accuracy, authenticity, completeness has prevented many cases to be inadmissible at court. This paper aims to discuss digital forensics investigations jurisprudence and the issues of authentic, accurate, complete, and convincing evidence leading to inadmissibility at court. To achieve the applicability of the study, we highlight the legal and technical factors required to harmonize these issues and how it could be addressed. This paper does not follow any forensic investigations process. Rather, it discusses how digital evidence could be admissible irrespective of the process implemented. The observations and outcomes of these legal criteria will contribute to the improvement of the evolving nature of digital evidence gathering phases.",6,1,1,8,Chain of custody; Internet privacy; Crime scene; Digital media; Jury; Legal process; Digital evidence; Computer science; Jurisprudence; Digital forensics,,,,,https://www.scilit.net/article/e17394e85b9e94a3191647c7d867a22e https://repository.uwl.ac.uk/id/eprint/8012/,http://dx.doi.org/10.24966/flis-733x/100045,,10.24966/flis-733x/100045,3080215576,,0,,3,true,cc-by,gold 121-036-341-441-560,A novel octopus based Parkinson’s disease and gender recognition method using vowels,,2019,journal article,Applied Acoustics,0003682x; 1872910x,Elsevier BV,United Kingdom,Turker Tuncer; Sengul Dogan,,155,,75,83,k-nearest neighbors algorithm; Euclidean distance; Support vector machine; Feature selection; Artificial intelligence; Pattern recognition; octopus (software); Feature (machine learning); Computer science; Feature extraction; Pooling,,,,,https://www.sciencedirect.com/science/article/pii/S0003682X19304219,http://dx.doi.org/10.1016/j.apacoust.2019.05.019,,10.1016/j.apacoust.2019.05.019,2947796043,,0,001-965-280-842-39X; 006-169-257-799-439; 007-945-370-599-370; 011-446-103-861-950; 013-912-515-846-763; 015-979-793-981-921; 016-697-858-461-312; 017-956-524-305-731; 024-785-384-743-077; 028-694-305-175-430; 034-701-541-555-865; 037-261-517-317-245; 037-902-883-847-606; 042-563-657-632-399; 044-258-346-677-110; 045-405-761-386-55X; 048-003-882-416-089; 048-406-213-582-617; 048-639-473-094-756; 049-860-251-887-83X; 053-294-748-194-626; 054-676-655-830-312; 057-314-695-164-183; 061-392-301-489-195; 063-352-645-381-15X; 065-179-703-899-640; 066-414-992-554-967; 075-597-189-600-363; 079-404-930-011-126; 081-275-399-657-531; 084-984-040-217-266; 086-598-934-713-75X; 086-736-670-575-770; 088-611-830-138-400; 091-106-410-640-235; 091-135-784-365-402; 092-759-914-505-912; 094-631-836-853-021; 096-349-210-087-058; 098-628-415-652-65X; 102-590-685-204-250; 103-752-355-885-562; 119-532-248-066-410; 143-478-140-082-211; 147-727-426-085-098; 149-363-172-624-204; 159-343-458-647-078; 160-016-424-942-017,32,false,, 121-207-616-071-874,Identifying artefact on Microsoft OneDrive client to support Android forensics,,2017,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Gandeva Bayu Satrya; A. Ahmad Nasrullah; Soo Young Shin,"Microsoft software is perhaps the most widely used around the world. As computing technology has evolved they have been at the cutting edge and have developed a number of groundbreaking and useful applications. Microsoft OneDrive is one such application. OneDrive is a cloud storage service offering 7 GB free storage to users. This technology can be misused and through it laws governing the cyber world violated. Current solutions to this are to perform digital forensics when cybercrime has occurred. This research used two different vendors of Android smartphones as experimentation objects. A model has been developed in this research, which provides instructions for digital mobile forensics analysis in finding artefacts related to the client's activities on OneDrive cloud storage application. These artefacts can be used as digital evidence by digital forensics investigators and the research increases the knowledge of cyber law practitioners.",9,3,269,291,World Wide Web; Cloud storage; Software; Cybercrime; Digital evidence; Computer science; Network forensics; Android (operating system); Mobile device forensics; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2017.085192,http://dx.doi.org/10.1504/ijesdf.2017.085192,,10.1504/ijesdf.2017.085192,2734893936,,0,,3,false,, 121-668-843-429-348,Problem Based Learning in Digital Forensics,2014-07-28,2014,journal article,Innovation in Teaching and Learning in Information and Computer Sciences,14737507,Informa UK Limited,United Kingdom,Alastair Irons; Paula Thomas,AbstractThe purpose of this paper is to compare and contrast the efforts of two universities to address the issue of providing computer forensics students with the opportunity to get involved in the practical aspects of forensic search and seizure procedures. The paper discusses the approaches undertaken by the University of Sunderland and the University of South Wales (Glamorgan) to give the students the opportunity to process a case from the crime scene through to the court room. In order to do this both institutions adopted a problem based learning (PBL) approach – to reflect real-world solutions and encourage students to work in groups to seek further knowledge and understanding of the various processes and procedures – in particular the steps around search and seizure of digital evidence from a crime scene. The PBL activities at Sunderland and Glamorgan were designed in order to help the students understand the processes of digital crime scene analysis and search and seizure procedures and to give th...,,,1,10,Mathematics education; Crime scene; Pedagogy; Order (business); Problem-based learning; Digital evidence; Computer science; Process (engineering); Computer forensics; Search and seizure; Digital forensics,,,,,https://www.tandfonline.com/doi/full/10.11120/ital.2014.00013 https://core.ac.uk/display/74367909 https://core.ac.uk/download/74367909.pdf,http://dx.doi.org/10.11120/ital.2014.00013,,10.11120/ital.2014.00013,2542008930,,0,005-733-361-126-371; 007-790-059-029-953; 014-261-775-435-338; 042-429-973-776-901; 046-474-638-122-984; 052-361-056-422-596; 066-198-497-514-876; 070-048-250-044-834,1,true,cc-by-nc-nd,green 121-931-608-998-802,Identification of User Ownership in Digital Forensic using Data Mining Technique,2012-07-28,2012,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,KM Kumar; Sanjeev Sofat; Naveen Aggarwal; Shreyans K. Jain,"As existing technology used by criminal rapidly changes and growing, digital forensics is also growing and important fields of research for current intelligence, law enforcement and military organizations today. As huge information is stored in digital form, the need and ability to analyze and process this information for relevant evidence has grown in complexity. During criminal activities crime committed use digital devices, forensic examiners have to adopt practical frameworks and methods to recover data for analysis which can comprise as evidence. Data Preparation/ Generation, Data warehousing and Data Mining, are the three essential features involved in the investigation process. The purpose of data mining technique is to find the valuable relationships between data items. This paper proposes an approach for preparation, generation, storing and analyzing of data, retrieved from digital devices which pose as evidence in forensic analysis. Attribute classification model has been presented to categorized user files. The data mining tools has been used to identify user ownership and validating the reliability of the pre-processed data. This work proposes a practical framework for digital forensics on hard drives.",50,4,1,5,Data mining; Data warehouse; Forensic science; Reliability (computer networking); Work (electrical); Data preparation; Law enforcement; Computer science; Process (engineering); Identification (information); Digital forensics,,,,,https://ui.adsabs.harvard.edu/abs/2012IJCA...50d...1K/abstract https://www.ijcaonline.org/archives/volume50/number4/7756-0818 https://research.ijcaonline.org/volume50/number4/pxc3880818.pdf,http://dx.doi.org/10.5120/7756-0818,,10.5120/7756-0818,2099922782,,0,003-448-142-212-67X; 003-868-023-351-977; 009-101-513-978-03X; 037-927-986-476-095; 062-202-545-220-180; 083-366-581-383-158; 094-999-990-049-790; 096-459-953-942-294; 115-547-184-477-216; 125-658-973-713-722; 128-983-879-520-615; 132-355-634-397-986; 136-606-982-080-327,5,true,,green 122-368-421-118-373,Cloud Computing and Digital Forensics Challenges,2016-08-22,2016,journal article,GSTF Journal on computing,,,,Samah Mansour,"Abstract—Nowadays, the storage of computer data is moving rapidly toward cloud computing as an evolving information technology phenomenon. Instead of building, maintaining, and managing a physical Information technology infrastructure, the organizations start to replace the physical infrastructure with remote and virtual environments that are managed by third parties. This shift has a significant impact on forensics investigators, hardware and software vendors, IT experts, law enforcements and corporate audit departments since more crimes are committed with the involvement of computers. Digital forensics helps courts and law enforcement agencies to collect valuable evidence for investigations. This paper presents a general overview of cloud computing and digital forensics. Also, it discusses the major benefits and challenges of using cloud computing on digital forensics.",5,1,,,Information technology; Data; Audit; Law enforcement; Computer security; Computer science; Network forensics; Computer forensics; Cloud computing; Digital forensics,,,,,,,,,2541046143,,0,,1,false,, 123-067-775-038-87X,Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology,,2013,journal article,International Journal of Advanced Computer Science and Applications,2158107x; 21565570,The Science and Information Organization,,Adedayo M. Balogun; Shao Ying Zhu,"Owing to a number of reasons, the deployment of encryption solutions are beginning to be ubiquitous at both organizational and individual levels. The most emphasized reason is the necessity to ensure confidentiality of privileged information. Unfortunately, it is also popular as cyber-criminals' escape route from the grasp of digital forensic investigations. The direct encryption of data or indirect encryption of storage devices, more often than not, prevents access to such information contained therein. This consequently leaves the forensics investigation team, and subsequently the prosecution, little or no evidence to work with, in sixty percent of such cases. However, it is unthinkable to jeopardize the successes brought by encryption technology to information security, in favour of digital forensics technology. This paper examines what data encryption contributes to information security, and then highlights its contributions to digital forensics of disk drives. The paper also discusses the available ways and tools, in digital forensics, to get around the problems constituted by encryption. A particular attention is paid to the Truecrypt encryption solution to illustrate ideas being discussed. It then compares encryption's contributions in both realms, to justify the need for introduction of new technologies to forensically defeat data encryption as the only solution, whilst maintaining the privacy goal of users.",4,5,,,Software deployment; Forensic science; Encryption; Work (electrical); Cryptography; Computer security; Computer science; Information security; Confidentiality; Digital forensics,,,,,https://thesai.org/Publications/ViewPaper?Volume=4&Issue=5&Code=IJACSA&SerialNo=6 https://dblp.uni-trier.de/db/journals/corr/corr1312.html#BalogunZ13 https://thesai.org/Downloads/Volume4No5/Paper_6-Privacy_Impacts_of_Data_Encryption_on_the_Efficiency_of_Digital_Forensics_Technology.pdf http://ui.adsabs.harvard.edu/abs/2013arXiv1312.3183B/abstract,http://dx.doi.org/10.14569/ijacsa.2013.040506,,10.14569/ijacsa.2013.040506,2962922800,,0,002-144-887-718-545; 005-102-962-333-180; 010-882-535-434-404; 017-335-677-993-203; 025-743-892-862-313; 025-832-466-975-926; 039-253-046-125-791; 048-314-987-416-85X; 050-513-243-638-138; 058-205-117-706-853; 060-808-935-547-406; 080-117-008-231-77X; 133-839-073-755-612; 134-927-490-231-285; 145-616-913-856-289; 186-019-966-947-987,8,true,cc-by,hybrid 123-275-701-676-787,Are mobile device examinations practiced like ‘forensics’?,2015-11-16,2015,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Gary C. Kessler,"Gary C. Kessler considers the issue of mobile device forensics and the relationship between digital forensics and other forensic sciences, and compares mobile device forensics to the broader field of digital forensics. Index words: Cell phone forensics, computer forensics, digital forensics, mobile device forensics",12,0,3,9,Mobile device; Computer security; Computer science; Network forensics; Computer forensics; Mobile device forensics; Digital forensics,,,,,https://journals.sas.ac.uk/deeslr/article/download/2237/2170 https://commons.erau.edu/cgi/viewcontent.cgi?article=1127&context=publication https://journals.sas.ac.uk/deeslr/article/view/2237 https://commons.erau.edu/publication/119/ https://works.bepress.com/gary_kessler/50/,http://dx.doi.org/10.14296/deeslr.v12i0.2237,,10.14296/deeslr.v12i0.2237,2206488084,,0,,6,true,cc-by-nc-nd,gold 123-315-590-178-091,Survey on Techniques of Composite Image Passive Forensics,,2013,journal article,Journal of Nantong University,,,,Wang We,"Composite image forensics is a vital research area of digital image forensics. The research on techniques of composite image passive forensics is important to ensure the originality and authenticity of digital image. According to different research areas, the techniques of composite image passive forensics fall into three categories: techniques based on traditional characteristics, techniques based on blind source separation, and techniques based on sparse representation. The basic characteristics, typical methods, as well as comparison and analysis of various algorithms are summarized in detail for each category. The main problems in the current research are pointed out and the future directions are presented.",,,,,Blind signal separation; Sparse approximation; Data mining; Originality; Digital image forensics; Research areas; Computer science; Digital image; Multimedia; Composite image filter,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-NGZK201303001.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-NGZK201303001.htm,,,2372330419,,0,,0,false,, 123-591-979-675-820,OpenForensics: a digital forensics GPU pattern matching approach for the 21st century,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Ethan Bayne; Robert Ian Ferguson; Adam T. Sampson,"Abstract Pattern matching is a crucial component employed in many digital forensic (DF) analysis techniques, such as file-carving. The capacity of storage available on modern consumer devices has increased substantially in the past century, making pattern matching approaches of current generation DF tools increasingly ineffective in performing timely analyses on data seized in a DF investigation. As pattern matching is a trivally parallelisable problem, general purpose programming on graphic processing units (GPGPU) is a natural fit for this problem. This paper presents a pattern matching framework – OpenForensics – that demonstrates substantial performance improvements from the use of modern parallelisable algorithms and graphic processing units (GPUs) to search for patterns within forensic images and local storage devices.",24,,S29,S37,Data mining; General purpose; Current generation; Computer science; Component (UML); General-purpose computing on graphics processing units; Pattern matching; Digital forensics,,,,NVIDIA Corporation,https://doi.org/10.1016/j.diin.2018.01.005 https://www.sciencedirect.com/science/article/pii/S1742287618300379 https://core.ac.uk/display/153400622 https://dblp.uni-trier.de/db/journals/di/di24.html#BayneFS18 https://rke.abertay.ac.uk/en/publications/openforensics-a-digital-forensics-gpu-pattern-matching-approach-f https://core.ac.uk/download/153400622.pdf,http://dx.doi.org/10.1016/j.diin.2018.01.005,,10.1016/j.diin.2018.01.005,2789491237,,0,008-653-605-343-591; 012-089-942-653-099; 023-341-419-324-638; 023-539-140-993-037; 033-877-222-136-260; 042-423-526-530-806; 043-093-846-816-675; 047-756-135-201-412; 050-513-243-638-138; 067-108-699-595-293; 072-072-328-028-440; 079-731-827-037-297; 098-748-261-333-651; 126-916-335-288-384; 134-927-490-231-285,5,true,cc-by-nc-nd,hybrid 123-822-670-262-791,Emerging Role of Digital Forensics in the Investigation of Online Child Pornography,,2019,journal article,Indian Journal of Forensic Medicine & Toxicology,09739122; 09739130,Diva Enterprises Private Limited,India,Nirmal Rallan; Komal Vig,"Information Technology has been of immense use to the mankind. It has heralded a new age of faster and easier communication and access to information. But it has also provided a new platform for criminal activities such as child pornography. Online Child pornography is a global crime whose investigation may require the joint support of several countries. Detection and investigation of online child pornography involves the role of digital forensics to ensure admissibility of digital evidence in a court of law. In this paper, the authors have presented an overview of online child pornography, its impact and the role of digital forensics in the investigation of online child pornography.",13,3,199,202,Internet privacy; Information technology; Sociology; Child pornography; Pornography; Digital evidence; Access to information; Digital forensics,,,,,https://www.indianjournals.com/ijor.aspx?target=ijor:ijfmt&volume=13&issue=3&article=042,http://dx.doi.org/10.5958/0973-9130.2019.00195.6,,10.5958/0973-9130.2019.00195.6,2961286481,,0,,0,false,, 124-255-859-306-442,An investigation into Unmanned Aerial System (UAS) forensics: Data extraction & analysis,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Greg Thornton; Pooneh Bagheri Zadeh,"Recent developments of drone technologies have shown a surge of commercial sales of drone devices, which have found use in many industries. However, the technology has been misused to commit crimes such as drug trafficking, robberies, and terror attacks. The digital forensics industry must match the speed of development with forensic tools and techniques. However, it has been identified that there is a lack of an agreed framework for the extraction and analysis of drone devices and a lack of support in commercial digital forensics tools available. In this research, an investigation into the extraction tools available for drone devices and analysis techniques has been performed to identify best practices for handling drone devices in a forensically sound manner. A new framework to perform a full forensic analysis of small to medium sized commercial drone devices and their controllers has been proposed to give investigators a plan of action to perform forensic analysis on these devices. The proposed framework overcomes some limitations of other drone forensics investigation frameworks presented in the literature. • Digital Forensics investigation Framework. • Drone Forensics Investigation. • Drone Data Analysis.",41,,301379,301379,Drone; Digital forensics; Computer science; Commit; Computer security,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301379,,10.1016/j.fsidi.2022.301379,,,0,003-504-554-245-316; 008-667-688-301-190; 010-084-169-561-57X; 011-755-498-862-139; 013-832-431-848-470; 028-638-405-790-741; 042-467-831-044-091; 046-314-745-466-915; 072-183-867-595-593; 083-401-248-269-053; 089-695-854-791-989,0,true,,hybrid 124-358-741-540-008,Developing Past and Beyond: 3D Mapping of Crime Scenes in India,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Himani Rawat,,,,,,Crime scene; 3d mapping; Cartography; History,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.11,http://dx.doi.org/10.46293/4n6/2021.03.01.11,,10.46293/4n6/2021.03.01.11,3161105141,,0,,0,false,, 125-020-771-045-081,Application of quality in use model to assess the user experience of open source digital forensics tools,,2020,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Manar Abu Talib; Reem Alnanih; Adel Khelifi,"Open source digital forensics tools are playing an important role for forensics investigations. So, there is a need to assess these tools to ensure they meet users' needs. The existing literature does not satisfy the requirements of assessing their quality-in-use. This paper assesses three most used digital forensics tools, namely autopsy, DFF, and DART using five quality-in use characteristics, namely, effectiveness, productivity, efficiency, error safety, and cognitive load. The results demonstrated that Autopsy, DFF, and DART performances are similar in terms of efficiency and productivity. DDF outperformed the other two in effectiveness. Autopsy was the best in terms of error safety, and DART had the highest cognitive load. The relevant community may consider these findings in selecting solutions to perform its duties. The future researches can involve more studies to encompass additional aspects of software quality, to compare open and closed source digital forensics programs and to enhance testing efforts",12,1,43,76,Software quality; User experience design; Data science; Quality (business); Open source software; Open source; Computer science; Cognitive load; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2020.103870 https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf12.html#TalibAK20,http://dx.doi.org/10.1504/ijesdf.2020.10025165,,10.1504/ijesdf.2020.10025165,2989154068,,0,,0,true,,bronze 125-274-621-659-002,Learning Maliciousness in Cybersecurity Graphs,,2017,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Liz Maida,,6,3,121,125,,,,,,,http://dx.doi.org/10.17781/p002277,,10.17781/p002277,,,0,,0,false,, 125-429-401-452-724,A survey of machine learning applications in digital forensics,2021-04-08,2021,journal article,Trends in Computer Science and Information Technology,26413086,Peertechz Publications Private Limited,,Hilmand Khan; Sarmad Hanif; Bakht Muhammad,"We address the role of machine learning in digital forensics in this paper, in order to have a better understanding of where machine learning stand in today’s cyber security domain when it comes to collecting digital evidence. We started by talking about Digital Forensics and its past. Then, to illustrate the fields of digital forensics where machine learning methods have been used to date, we recommend a brief literature review. The aim of this paper is to promote machine learning applications in digital forensics. We went through different applications of machine learning in different areas and analysed how machine learning can potentially be used in other areas by considering its current applications and we believe that the ideas presented here will provide promising directions in the pursuit of more powerful and successful digital forensics tools.",6,1,020,024,Machine learning; Artificial intelligence; Domain (software engineering); Digital evidence; Computer science; Digital forensics,,,,,https://www.peertechzpublications.com/articles/TCSIT-6-134.php https://www.peertechzpublications.com/articles/TCSIT-6-134.pdf,http://dx.doi.org/10.17352/tcsit.000034,,10.17352/tcsit.000034,3157681744,,0,006-296-899-452-535; 012-446-212-270-670; 015-084-347-434-584; 015-434-377-944-478; 029-539-345-954-419; 032-810-296-055-161; 034-183-561-604-364; 036-720-465-389-565; 041-561-245-686-942; 059-151-526-215-807; 062-421-316-909-478; 089-932-159-207-310; 093-668-583-258-461; 115-547-184-477-216; 131-948-799-258-180; 139-610-896-512-796; 153-826-237-509-69X; 170-516-749-420-456; 184-428-240-098-87X,0,true,cc-by-nc,hybrid 125-551-429-663-864,ON THE USE OF DIGITAL LOGISTICS IN CRIMINAL PROCEEDINGS AND CRIMINALISTICS,2020-09-28,2020,journal article,Juridical Journal of Samara University,2542047x,Samara State National Research University,,Е В Христинина; E. V. Christinina,"The scientific article explores the concept and content of digital forensic logistics. The author substantiates the close relationship of digital forensic logistics with the process of organizing criminal investigations, building forensic versions, planning investigative actions and operational search activities. The author presents several areas of forensic logistics: logistics of evidence in criminal cases; logistics of the overall organization of the investigation of crimes; logistics of planning (selection of means and methods of investigation); logistics of putting forward versions; logistics of decisions made in criminal cases. The article makes a logical conclusion that the entire process of criminal investigation is carried out using a single digital logistics platform that includes algorithmization of actions and decisions in a criminal case. The author has established that the digital platform is based on various information flows, which are: digital forensic records; digital traces; electronic requests and instructions; digital video library, audio recording and photography; electronic assistant to the investigator; digital expertise; electronic forensic recommendations for the investigation of criminal cases. In conclusion, it is concluded that it is necessary to use digital logistics in criminal proceedings and criminalistics to improve the efficiency of investigative bodies in the investigation of criminal crimes.",6,3,128,132,Engineering management; Criminal investigation; Photography; Logical consequence; Forensic science; Criminal case; Close relationship; Computer science; Process (engineering); Digital forensics,,,,,https://journals.ssau.ru/jjsu/article/view/8122 https://journals.ssau.ru/jjsu/article/download/8122/7845,http://dx.doi.org/10.18287/2542-047x-2020-6-3-128-132,,10.18287/2542-047x-2020-6-3-128-132,3111382255,,0,,0,true,,gold 125-647-772-745-687,"Internet Forensics-Tools, Procedure And Framework",2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Tanmayee P. Tilekar,,,,,,The Internet; World Wide Web; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.09,http://dx.doi.org/10.46293/4n6/2021.03.02.09,,10.46293/4n6/2021.03.02.09,3162126447,,0,,0,false,, 125-682-509-275-554,IoT Device Forensics and Data Reduction,,2018,journal article,IEEE Access,21693536,Institute of Electrical and Electronics Engineers (IEEE),United States,Darren Quick; Kim-Kwang Raymond Choo,"The growth in the prevalence of the plethora of digital devices has resulted in growing volumes of disparate data, with potential relevance to criminal and civil investigations. With the increase in data volume, there is an opportunity to build greater case-related knowledge and discover evidence, with implications at all stages of the digital forensic analysis process. The growth in digital devices will potentially further contribute to the growth in big digital forensic data, with a need for practitioners to consider a wider range of data and devices that may be relevant to an investigation. A process of data reduction by selective imaging and quick analysis, coupled with automated data extraction, gives potential to undertake the analysis of the growing volume of data in a timely manner. In this paper, we outline a process of bulk digital forensic data analysis including disparate device data. We research the process with a research data corpus and apply our process to real-world data. The challenges of the growing volume of devices and data will require forensic practitioners to expand their ability to undertake research into newly developed data structures, and be able to explain this to the court, judge, jury, and investigators.",6,,47566,47574,The Internet; Forensic science; Data structure; Disparate system; Data science; Jury; Electronic mail; Computer science; Process (engineering); Digital forensics; Relevance (information retrieval),,,,Cloud Technology Endowed Professorship,https://doi.org/10.1109/ACCESS.2018.2867466 https://ieeexplore.ieee.org/document/8449277/ https://dblp.uni-trier.de/db/journals/access/access6.html#QuickC18,http://dx.doi.org/10.1109/access.2018.2867466,,10.1109/access.2018.2867466,2889226801,,0,003-135-959-594-644; 009-040-429-083-368; 010-388-991-543-520; 010-985-077-415-59X; 011-211-518-312-834; 042-767-661-429-064; 054-888-023-799-702; 083-322-626-930-350; 137-574-018-964-352; 163-330-758-807-944; 198-820-820-012-184,33,true,"CC BY, CC BY-NC-ND",gold 125-934-140-322-856,Forensic document examination of electronically captured signatures,2014-01-28,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Heidi H. Harralson,"Heidi H. Harralson considers the use of biodynamic electronic signatures by which a person provides a signature in electronic format that is reproduced on the screen as a representation of their manuscript signature, and analyzes the procedures used in the forensic analysis of such system, indicating that not all systems produce reliable information to support forensic opinions, and that examiners are failing to understand the need to analyze the digital data. Index words:electronic signature; biometric signature; biodynamic signature; digital signature; forensic document examination; forensic handwriting examination",9,0,,,Digital signature; World Wide Web; Forensic science; Signature (logic); Biometrics; Electronic signature; Information retrieval; Index (publishing); Digital data; Handwriting; Computer science,,,,,https://sas-space.sas.ac.uk/5587/ https://journals.sas.ac.uk/deeslr/article/view/1991,http://dx.doi.org/10.14296/deeslr.v9i0.1991,,10.14296/deeslr.v9i0.1991,2020370348,,0,,2,true,cc-by-nc-nd,hybrid 125-939-677-745-616,Digital forensics as a service,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,H.M.A. van Beek; E.J. van Eijk; R.B. van Baar; M. Ugen; J.N.C. Bodde; A.J. Siemelink,"The big data era has a high impact on forensic data analysis. Work is done in speeding up the processing of large amounts of data and enriching this processing with new techniques. Doing forensics calls for specific design considerations, since the processed data is incredibly sensitive. In this paper we explore the impact of forensic drivers and major design principles like security, privacy and transparency on the design and implementation of a centralized digital forensics service.",15,,20,38,Work (electrical); Transparency (behavior); Design elements and principles; Service (systems architecture); Computer security; Computer science; Network forensics; Computer forensics; Big data; Digital forensics,,,,,https://doi.org/10.1016/j.diin.2015.07.004 https://dl.acm.org/doi/10.1016/j.diin.2015.07.004 https://core.ac.uk/display/81195448 https://www.sciencedirect.com/science/article/abs/pii/S1742287615000857 https://www.sciencedirect.com/science/article/pii/S1742287615000857 https://core.ac.uk/download/pdf/81195448.pdf,http://dx.doi.org/10.1016/j.diin.2015.07.004,,10.1016/j.diin.2015.07.004,1446195290,,0,000-360-120-513-679; 003-926-917-446-708; 007-598-060-754-474; 007-648-632-822-878; 010-985-077-415-59X; 013-193-256-548-818; 015-868-814-003-691; 020-936-498-613-334; 024-735-069-822-749; 026-774-296-742-022; 033-241-817-699-448; 033-877-222-136-260; 039-490-429-585-065; 045-702-359-549-884; 050-044-034-502-956; 051-645-938-939-51X; 056-715-378-869-201; 061-033-869-892-660; 062-325-585-829-185; 063-278-462-775-305; 064-380-336-432-376; 076-536-068-980-117; 079-070-981-899-105; 086-091-202-010-191; 087-535-177-904-679; 092-655-509-442-333; 097-567-011-227-46X; 098-892-902-051-803; 131-516-331-360-906; 134-927-490-231-285; 137-292-579-653-532; 150-165-602-099-023; 150-821-707-731-403; 158-369-352-218-573; 160-737-306-581-249; 163-330-758-807-944; 166-178-398-716-39X; 181-095-475-426-346; 199-172-967-270-034; 199-745-676-923-766,51,true,cc-by-nc-nd,hybrid 126-996-381-341-302,Analysis of Steganographic on Digital Evidence using General Computer Forensic Investigation Model Framework,,2020,journal article,International Journal of Advanced Computer Science and Applications,21565570; 2158107x,The Science and Information Organization,,Muh. Hajar Akbar; null Sunardi; Riadi,"Steganography is one of the anti-forensic techniques used by criminals to hide information in other messages which can cause problems in the investigation process and difficulties in obtaining original information evidence on the digital crime. Digital forensic analysts are required ability to find and extract the messages that have been inserted by using proper tools. The purpose of this research is to analyze the hidden digital evidence using steganography techniques. This research uses the static forensics method by applying five stages in the Generic Forensics Investigation Model framework, namely pre-process, acquisition & preservation, analysis, presentation, and post-process as well as extracting files that have been infiltrated based on case scenarios involving digital crime. The tools used are FTK Imager, Autopsy, WinHex, Hiderman, and StegSpy. The results on the steganographic file insertion experiment of 20 files indicate that StegSpy and Hiderman are effective on the steganographic analysis of digital evidence. StegSpy can detect the presence of secret messages with 85% success rate. The extraction process using Hiderman for 18 files with containing steganographic messages had 100% successful.",11,11,,,Steganography; Forensic science; Information retrieval; Digital evidence; Computer science; Process (engineering); Digital forensics,,,,,https://thesai.org/Downloads/Volume11No11/Paper_41-Analysis_of_Steganographic_on_Digital_Evidence.pdf https://thesai.org/Publications/ViewPaper?Volume=11&Issue=11&Code=IJACSA&SerialNo=41,http://dx.doi.org/10.14569/ijacsa.2020.0111141,,10.14569/ijacsa.2020.0111141,3113162624,,0,,0,true,cc-by,gold 127-027-322-002-654,HGA: Hierarchical Feature Extraction With Graph and Attention Mechanism for Linguistic Steganalysis,,2022,journal article,IEEE Signal Processing Letters,10709908; 15582361,Institute of Electrical and Electronics Engineers (IEEE),United States,Zhangjie Fu; Qi Yu; Fan Wang; Changhao Ding,"Linguistic steganalysis is an important topic in the field of information security and signal processing. In recent years, linguistic steganalysis have mainly utilized deep learning techniques and make great success. But suffer from the following major disadvantages. From the perspective of model structure, current methods only extract coarse features of the text, without focusing on the fine-grained representations. In terms of application, most of the studies only focus on single hidden scene and ignore the more realistic mixed hidden scenes which are more complex and realistic. These weaknesses limit the performance and the application of linguistic steganalysis in reality. In this paper, we propose a novel linguistic steganalysis method to overcome these weaknesses. This proposed method can extract distinguished text representation which fuses hierarchical features and perform excellently in sophisticated conditions. Firstly, we adapt gated graph neural networks as the coarse graph updater to update node representations on the graph level. Then we design a fine graph updater composed of the graph attention mechanism to focus on the highlighted nodes on the node-level. Moreover, we extract the most notable feature on the dimension-level of node by the graph channel attention module. Finally, the readout function is designed to fuse the hierarchical features and make the classification. The experimental results show that our method achieves the best results compared with the previous methods in both single hidden scene and mixed hidden scenes, which prove the effectiveness of the proposed method.",29,,1734,1738,Steganalysis; Computer science; Graph; Artificial intelligence; Feature extraction; Focus (optics); Pattern recognition (psychology); Node (physics); Natural language processing; Data mining,,,,National Key R&D Program of China; National Natural Science Foundation of China; National Natural Science Foundation of China; Jiangsu Basic Research Programs–Natural Science Foundation; Collaborative Innovation Center of Atmospheric Environment and Equipment Technology,,http://dx.doi.org/10.1109/lsp.2022.3194844,,10.1109/lsp.2022.3194844,,,0,006-226-063-672-219; 010-881-186-573-195; 011-331-216-034-599; 013-982-697-944-340; 018-193-483-515-989; 019-865-688-107-968; 024-556-976-517-808; 046-157-441-978-317; 059-783-343-108-940; 061-065-523-494-469; 061-656-453-317-540; 066-810-084-927-507; 067-480-120-151-011; 067-980-880-214-610; 068-984-373-113-043; 069-585-566-320-733; 072-122-833-427-306; 077-933-671-553-828; 081-427-001-573-355; 084-260-386-043-570; 086-823-378-252-910; 093-229-793-148-784; 128-667-751-863-307; 143-678-006-810-130,0,false,, 127-207-908-207-727,Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020,,2022,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Martin Novak,"This study is a follow-up to Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration – 2010 to 2015. The current study examines appeals of criminal cases before the United States Courts of Appeal from January 2016 through August 2020, where one or more appeal claims were related to digital evidence. The purpose of this research was to determine if the legal landscape has changed since 2015; examine the most relevant legal issues related to digital evidence; and analyze how precedential cases may have affected digital forensics as evidence.",,,,,Appeal; Law; Political science; Digital evidence; Digital forensics; Criminal procedure; Criminology,,,,,,http://dx.doi.org/10.15394/jdfsl.2022.1734,,10.15394/jdfsl.2022.1734,,,0,,0,true,cc-by-nc,gold 127-364-049-570-112,Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment,2018-04-16,2018,journal article,Sustainability,20711050,MDPI AG,Switzerland,Sangho Park; Yanghoon Kim; Gwangmin Park; Onechul Na; Hangbae Chang,"Recently, the work environments of organizations have been in the process of transitioning into smart work environments by applying cloud computing technology in the existing work environment. The smart work environment has the characteristic of being able to access information assets inside the company from outside the company through cloud computing technology, share information without restrictions on location by using mobile terminals, and provide a work environment where work can be conducted effectively in various locations and mobile environments. Thus, in the cloud computing-based smart work environment, changes are occurring in terms of security risks, such as an increase in the leakage risk of an organization’s information assets through mobile terminals which have a high risk of loss and theft and increase the hacking risk of wireless networks in mobile environments. According to these changes in security risk, the reactive digital forensic method, which investigates digital evidence after the occurrence of security incidents, appears to have a limit which has led to a rise in the necessity of proactive digital forensic approaches wherein security incidents can be addressed preemptively. Accordingly, in this research, we design a digital forensic readiness model at the level of preemptive prevention by considering changes in the cloud computing-based smart work environment. Firstly, we investigate previous research related to the cloud computing-based smart work environment and digital forensic readiness and analyze a total of 50 components of digital forensic readiness. In addition, through the analysis of the corresponding preceding research, we design seven detailed areas, namely, outside the organization environment, within the organization guideline, system information, terminal information, user information, usage information, and additional function. Then, we design a draft of the digital forensic readiness model in the cloud computing-based smart work environment by mapping the components of digital forensic readiness to each area. To verify the draft of the designed model, we create a survey targeting digital forensic field-related professionals, analyze their validity, and deduce a digital forensic readiness model of the cloud computing-based smart work environment consisting of seven detailed areas and 44 components. Finally, through an analytic hierarchy process analysis, we deduce the areas that should be emphasized compared to the existing work environment to heighten the forensic readiness in the cloud computing-based smart work environment. As a result, the weightings of the terminal information Universal Subscriber Identity Module(USIM) card, collect/gain virtual machine image, etc.), user information (user account information analysis, analysis of user’s used service, etc.), and usage information (mobile OS artifact timeline analysis, action analysis through timeline, etc.) appear to be higher than those of the existing work environment. This is analyzed for each organization to preemptively prepare for the components of digital forensic readiness in the corresponding areas.",10,4,1203,,Forensic science; Virtual machine; User information; Digital evidence; Computer security; Computer science; Asset (computer security); Cloud computing; Digital forensics; Hacker; Analytic hierarchy process,,,,,https://www.mdpi.com/2071-1050/10/4/1203 https://core.ac.uk/display/155255554 https://www.mdpi.com/2071-1050/10/4/1203/pdf,http://dx.doi.org/10.3390/su10041203,,10.3390/su10041203,2799919344,,0,002-625-978-577-247; 002-768-711-065-857; 006-435-365-660-88X; 009-510-455-727-116; 015-029-723-578-919; 018-948-094-812-86X; 024-462-843-796-80X; 024-894-908-869-686; 026-774-296-742-022; 045-701-748-075-614; 045-912-944-128-365; 046-143-775-958-052; 053-344-396-276-136; 063-274-848-736-685; 064-313-388-228-262; 096-993-850-376-090; 098-748-261-333-651; 102-692-471-615-799; 109-763-344-484-044; 124-912-663-881-389; 125-939-677-745-616; 162-922-011-677-486; 163-330-758-807-944,17,true,cc-by,gold 127-735-596-370-849,Ensuring Online Safety Of Women Through Indian Penal Code,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Nagarathna A,,,,,,Indian Penal Code; Political science; Law,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.01,http://dx.doi.org/10.46293/4n6/2021.03.01.01,,10.46293/4n6/2021.03.01.01,3126216580,,0,,0,false,, 128-257-405-271-69X,Forensic Cell Site Analysis: Mobile Network Operator Evidence Integrity Maintenance Research,,2019,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,John B. Minor,,14,2,59,85,Mobile network operator; Computer network; Computer science; Site analysis,,,,,https://commons.erau.edu/jdfsl/vol14/iss2/5/ https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl14.html#Minor19 https://commons.erau.edu/cgi/viewcontent.cgi?article=1608&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2019.1608,,10.15394/jdfsl.2019.1608,2979873562,,0,,0,true,cc-by-nc,gold 128-306-516-043-751,Prelim i - Editorial Board,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,41,,301410,301410,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00091-9,,10.1016/s2666-2817(22)00091-9,,,0,,0,true,,bronze 128-315-885-884-18X,ASIST - Integrating digital forensics into born-digital workflows: The BitCurator project,,2012,journal article,Proceedings of the American Society for Information Science and Technology,00447870,Wiley,,Martin Gengenbach; Alexandra Chassanoff; Porter Olsen,"There is a growing body of work investigating the needs and desires of collecting institutions as they adapt to the acquisition of born-digital materials. The incorporation of digital forensics tools and techniques into digital curation workflows offers great promise for addressing the complexities bound up in ingesting and preserving digital objects at multiple levels of representation. This poster presents preliminary results from ongoing research conducted as part of the BitCurator project, a two-year grant funded initiative to build, test, and analyze systems and software for incorporating digital forensics methods into collecting institutions' workflows. The project arose out of a perceived need in the library, archives, and museum (LAM) communities for better documentation, interfaces, and functionality in processing born-digital archival materials.",49,1,1,4,Engineering; World Wide Web; Work (electrical); Workflow; Digital curation; Born-digital; Software; Documentation; Digital forensics,,,,,https://dblp.uni-trier.de/db/conf/asist/asist2012.html#GengenbachCO12 https://asistdl.onlinelibrary.wiley.com/doi/pdf/10.1002/meet.14504901343 https://asistdl.onlinelibrary.wiley.com/doi/abs/10.1002/meet.14504901343 http://onlinelibrary.wiley.com/doi/10.1002/meet.14504901343/abstract https://onlinelibrary.wiley.com/doi/abs/10.1002/meet.14504901343,http://dx.doi.org/10.1002/meet.14504901343,,10.1002/meet.14504901343,2114988520,,0,022-250-300-795-993; 037-647-066-964-858; 067-629-806-155-212; 074-028-601-448-433; 081-235-060-337-938,0,true,,bronze 128-473-609-330-555,Preprocessing and Edge Detection of Natural Images and Computer Generated Images,2013-05-31,2013,journal article,"International Journal of Signal Processing, Image Processing and Pattern Recognition",20054254,NADIA,Australia,Yan Wang; Xiao Wang; Henan Xinxiang,"Digital image tamper detection by analyzing the statistical properties of the image content of the authenticity of the digital image, the scene authenticity and integrity of authentication methods, namely determine whether the image is the original image, whether the image is real and whether it contains other secret information image, these techniques is the digital image forensics. Digital image forensics technology is dependent on the basis of the original carrier may be divided into active and passive two technologies forensics evidence. This paper generated image detection research for digital image forensics scene authenticity certification in natural images and computer. Combining the results of recent research, based on systematic analysis of the differences between two types of image generation, high-end features for wavelet conducted a detailed study of the effectiveness, from the validity of the characteristic data, proposed several general-purpose computer generating an image detection algorithm. Compared with the previous detection algorithm, strong stability of the proposed algorithm, computational complexity is low, and has easy implementation.",9,5,281,290,Digital image processing; Feature detection (computer vision); Artificial intelligence; Standard test image; Binary image; Automatic image annotation; Computer vision; Computer science; Digital image; Image texture; Image processing,,,,,http://www.sersc.org/journals/IJSIP/vol9_no5/25.pdf,http://dx.doi.org/10.14257/ijsip.2016.9.5.25,,10.14257/ijsip.2016.9.5.25,2437213383,,0,018-036-210-381-349; 021-370-624-920-711; 023-438-345-162-875; 044-882-969-009-943; 066-598-818-406-482; 069-742-474-278-095; 090-456-276-093-907; 108-205-292-416-249; 120-521-136-445-08X; 123-071-011-725-815; 129-912-833-395-159; 130-755-022-110-85X; 139-040-911-677-344,1,false,, 128-840-927-006-269,The Digital Forensics and Security Challenge of QR Codes,2013-06-30,2013,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Nik Thompson; Kevin Lee,"The disciplines of digital forensics and IT security must adapt to new technologies and methods of interaction with those technologies.  New technologies present both challenges and opportunities for providing evidence for digital forensics investigations.  These may be in the form of new devices such as smartphones or new methods of sharing information, such as social networks.  One such rapidly emerging interaction technology is the use of Quick Response (QR) codes.  These offer a physical mechanism for quick access to web sites for advertising and social interaction.  This paper argues that the common implementation of QR codes potentially presents security issues which must be considered.  It analyzes potential privacy problems with QR codes and studies a range of devices as they may have implications for the process of evidence collection and analysis.",8,2,41,72,Emerging technologies; Interaction technology; Evidence collection; Computer security; Computer science; Process (engineering); Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#ThompsonL13,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#ThompsonL13,,,2991927012,,0,,0,true,cc-by-nc,gold 129-060-946-634-518,An extended digital forensic readiness and maturity model,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Felix Bankole; Ayankunle Taiwo; Ivan Claims,"Digital forensics readiness (DFR) is an important part of the growing forensic domain. Research on DFR has been given little attention, while available DFR models have focused on theoretical investigations with inadequate input from practicing information security experts in the industry. Using feedback from practicing forensic experts in the industry and academia, this research investigates the structure required to implement and manage digital forensic readiness (DFR) within an enterprise. The research extended the DFR Commonalities framework (DFRCF) and utilised the structure to design a digital forensic maturity assessment model (DFMM) that will enable organisations to assess their forensic readiness and security incident responses. A combination of qualitative and research design approaches was utilised to perform a comparative analysis of various DFR frameworks. A top-down design approach was utilised in developing the DFMM model which was validated with forensic practitioners and academics through semi-structured interviews. The structure extracted from DFR frameworks was practical since most participants agreed with the structure of the extended DFRCF and the matrix of the maturity model. Overall, key changes were introduced to enhance both the extended DFRCF and the DFMM. The study was limited to participants who have a forensic footprint and are knowledgeable about DFR. This paper thereby provides practitioners, academics and organisations with access to a non-propriety DFMM maturity model. • Extending the digital forensics readiness commonalities framework. • Proposing digital forensics maturity model. • Extended digital forensic readiness and maturity model for COVID19 pandemic and beyond.",40,,301348,301348,Digital forensics; Capability Maturity Model; Maturity (psychological); Computer science; Data science; Knowledge management; Engineering; Process management; Computer security; Psychology; Software; Developmental psychology; Programming language,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301348,,10.1016/j.fsidi.2022.301348,,,0,001-261-260-701-260; 003-803-598-122-748; 004-706-447-836-905; 014-359-308-542-324; 016-533-769-215-821; 032-460-061-944-952; 033-128-301-658-595; 040-277-700-312-914; 041-266-949-737-670; 041-805-592-234-965; 057-247-653-161-438; 079-042-778-256-448; 079-924-320-756-189; 088-273-808-364-904; 091-664-230-499-576; 095-691-114-276-825; 102-734-676-905-303; 106-108-913-089-037; 114-796-071-425-023; 127-364-049-570-112; 145-627-679-536-968; 166-895-487-744-941; 167-751-222-897-487,0,true,,bronze 129-356-514-852-901,Digital Forensic Issues in Civil Proceedings,,2014,journal article,Journal of Civil & Legal Sciences,21690170,OMICS Publishing Group,,Greg Gogolin; James H. Jones,"Digital Forensics is an emerging field that has quickly become a key source of evidence in criminal and civil cases. While digital forensics has been challenging to incorporate into both criminal and civil cases, the environment of civil cases does not have the structure of the law enforcement processes to serve as a framework from which to conduct digital forensic examinations. Further, there is often a lack of understanding of digital forensic capabilities and evidence, which has the potential to influence legal judgments and misconstrue outcomes.",3,1,1,3,Sociology; Law; Criminal law; Forensic nursing; Law enforcement; Intellectual property; Computer forensics; Conflict of laws; Jurisprudence; Digital forensics,,,,,https://www.omicsonline.org/peer-reviewed/digital-forensic-issues-in-civil-proceedingsp-23638.html https://www.omicsonline.org/open-access/digital-forensic-issues-in-civil-proceedings-2169-0170.1000110.php?aid=23638,http://dx.doi.org/10.4172/2169-0170.1000110,,10.4172/2169-0170.1000110,2106572033,,0,005-646-077-565-566; 009-358-080-914-72X; 050-721-573-791-625; 073-847-291-567-156; 076-470-845-108-034; 082-061-692-717-698; 085-858-927-316-897; 094-549-705-844-333; 110-291-798-326-65X; 140-906-156-416-318; 192-869-837-381-364,2,false,, 129-508-826-592-168,Visual Object Tracking Based on Adaptive Background-Awareness and Spatial Constraint,2022-06-29,2022,journal article,Mathematical Problems in Engineering,15635147; 1024123x; 10267077,Hindawi Limited,Egypt,Keqi Fan; Qianqian Yu; Yiyang Wang; Deng Chen; Yuhui Zheng,"The correlation filter method is effective in visual tracking tasks, whereas it suffers from the boundary effect and filter degradation in complex situations, which can result in suboptimal performance. Aiming at the solving above problem, this study proposes an object tracking method with a discriminant correlation filter, which combines an adaptive background perception and a spatial dynamic constraint. In this method, an adaptive background-awareness strategy is used to filter the background information trained by the interference filter to improve the discriminability between the object and the background. In addition, the spatial regularization term is introduced, and the dynamic change of the real filter and the predefined spatial constraint template is used to optimize filter learning to enhance the spatial information capture ability of the filter model. Experiments on the OTB100, VOT2018, and TrackingNet standard datasets demonstrate that our method achieves favorable accuracy and success rates. Compared with the current popular correlation filter methods, the proposed method can still maintain stable tracking performance with a scene scale variation, complex background, motion blur, and fast motion.",2022,,1,11,Artificial intelligence; Computer vision; Computer science; Filter (signal processing); Adaptive filter; Kernel adaptive filter; Video tracking; Constraint (computer-aided design); Eye tracking; Spatial filter; Tracking (education); Object (grammar); Pattern recognition (psychology),,,,Zhejiang Provincial Science and Technology Program in China; Zhejiang Provincial Science and Technology Program in China; Zhejiang Provincial Science and Technology Program in China; Zhejiang Provincial Science and Technology Program in China; Zhejiang Provincial Science and Technology Program in China; Zhejiang Provincial Science and Technology Program in China; Zhejiang Provincial Science and Technology Program in China,,http://dx.doi.org/10.1155/2022/6062283,,10.1155/2022/6062283,,,0,000-568-694-378-624; 000-941-819-103-222; 002-140-227-338-020; 003-532-678-017-874; 004-075-446-271-043; 008-898-717-380-560; 012-225-431-707-546; 012-231-098-593-063; 020-270-503-155-959; 025-112-431-982-303; 026-876-078-323-433; 030-160-171-033-909; 031-363-970-453-113; 035-263-145-036-771; 037-171-857-000-659; 044-882-969-009-943; 055-006-112-952-253; 057-646-093-503-708; 066-810-719-172-735; 073-376-574-462-030; 077-739-003-456-580; 079-599-023-979-777; 082-940-914-821-96X; 083-724-630-996-266; 090-292-539-525-938; 109-752-500-472-675; 124-411-545-803-229; 131-546-469-964-566; 175-774-870-500-953,0,true,cc-by,gold 129-777-443-651-197,Deriving Priorities of Competences Required for Digital Forensic Experts using AHP,2017-02-28,2017,journal article,The Journal of Society for e-Business Studies,22883908,Society for e-Business Studies,,Haejung Yun; Seung Yong Lee; Choong C. Lee Lee,"Nowadays, digital forensic experts are not only computer experts who restore and find deleted files, but also general experts who posses various capabilities including knowledge about processes/laws, communication skills, and ethics. However, there have been few studies about qualifications or competencies required for digital forensic experts comparing with their importance. Therefore, in this study, AHP questionnaires were distributed to digital forensic experts and analyzed to derive priorities of competencies; the first-tier questions which consisted of knowledge, technology, and attitude, and the second-tier ones which have 20 items. Research findings showed that the most important competency was knowledge, followed by technology and attitude but no significant difference was found. Among 20 items of the second-tier competencies, the most important competency was “digital forensics equipment/tool program utilization skill” and it was followed by “data extraction and imaging skill from storage devices.” Attitude such as “judgment,” “morality,” “communication skill,” “concentration” were subsequently followed. The least critical one was “substantial law related to actual cases.” Previous studies on training/education for digital forensics experts focused on law, IT knowledge, and usage of analytic tools while attitude-related competencies have not given proper attention. We hope this study can provide helpful implications to design curriculum and qualifying exam to foster digital forensic experts.",22,1,107,122,Morality; Data extraction; Communication skills; Significant difference; Research findings; Computer science; Curriculum; Knowledge management; Digital forensics; Analytic hierarchy process,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002200518 http://calsec.or.kr/jsebs/index.php/jsebs/article/download/258/245 http://calsec.or.kr/jsebs/index.php/jsebs/article/view/258,http://dx.doi.org/10.7838/jsebs.2017.22.1.107,,10.7838/jsebs.2017.22.1.107,2609049478,,0,,2,true,,gold 130-080-242-566-434,"Digital Forensic Investigation of Social Media, Acquisition and Analysis of Digital Evidence",,2019,journal article,International Journal of Strategic Engineering,25724959; 25724967,IGI Global,,Reza Montasari; Richard Hill; Victoria Carpenter; Farshad Montaseri,"Various social networking sites (SNSs), widely referred to as social media, provide services such as email, blogging, instant messaging and photo sharing for social and commercial interactions. SNSs are facilitating new forms of social interaction, dialogue, exchange and collaboration. They allow millions of users and organisations worldwide to exchange ideas, post updates and comments or participate in activities and events, while sharing their wider interests. At the same time, such a phenomenon has led to an upsurge in significant criminal activities by perpetrators who are becoming increasingly sophisticated in their attempts to deploy technology to circumvent detection. Digital forensic Examiners (DFEs) often face serious challenges in relation to data acquisition. Therefore, this article aims to analyse the significance of SNSs in DFIs and challenges that DFEs often encounter when acquiring evidence from SNSs. Furthermore, this article describes the steps of the digital forensic investigation process that must be taken to acquire digital evidence that is both authentic and forensically sound.",2,1,52,60,Psychology; Digital evidence; Digital forensic investigation; Multimedia; Social media; Computer forensics; Digital forensics,,,,,https://cronfa.swan.ac.uk/Record/cronfa54932 https://www.igi-global.com/article/digital-forensic-investigation-of-social-media-acquisition-and-analysis-of-digital-evidence/219324 https://pure.hud.ac.uk/en/publications/digital-forensic-investigation-of-social-media-acquisition-and-an,http://dx.doi.org/10.4018/ijose.2019010105,,10.4018/ijose.2019010105,2902802592,,0,000-294-596-965-264; 004-668-612-287-432; 020-774-682-563-067; 024-711-735-736-003; 034-008-964-356-002; 034-190-709-015-829; 035-718-168-907-750; 049-404-833-736-24X; 052-052-141-922-342; 065-482-476-781-264; 067-840-274-503-047; 077-963-490-848-763; 120-697-354-224-33X; 127-948-386-055-225; 134-115-618-621-757; 134-132-593-731-945; 150-729-802-745-094; 173-034-553-635-460; 178-493-652-351-054; 179-881-224-143-743; 180-327-460-336-608; 190-065-821-748-92X,8,false,, 130-433-366-389-733,File Type Identification - Computational Intelligence for Digital Forensics,,2017,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Konstantinos Karampidis; Giorgos Papadourakis,,12,2,6,,Data mining; Computational intelligence; Data integrity; Computer science; Artificial neural network; Identification (information); Digital forensics; Genetic algorithm; File format,,,,,https://doi.org/10.15394/jdfsl.2017.1472 https://commons.erau.edu/cgi/viewcontent.cgi?article=1472&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#KarampidisP17 https://commons.erau.edu/jdfsl/vol12/iss2/6/,http://dx.doi.org/10.15394/jdfsl.2017.1472,,10.15394/jdfsl.2017.1472,2788571554,,0,,8,true,cc-by-nc,gold 130-533-255-442-114,A Digital Forensic Analysis for Directory in Windows File System,2015-06-30,2015,journal article,Journal of the Korea Society of Digital Industry and Information Management,17386667,Korea Society of Digital Industry and Information Management,,Gyusang Cho,,11,2,73,90,Timestamp; Symbolic link; World Wide Web; Directory; File system; Transactional NTFS; Computer science; Windows Vista; Database; B-tree; Digital forensics,,,,,http://koreascience.or.kr/article/JAKO201520448048465.page,http://dx.doi.org/10.17662/ksdim.2015.11.2.073,,10.17662/ksdim.2015.11.2.073,2486447642,,0,043-409-832-398-87X; 049-198-020-808-467; 079-331-405-716-414; 100-032-278-433-356,0,true,,bronze 131-000-976-357-571,Digital Forensics Investigation for Attacks on Artificial Intelligence,2022-04-24,2022,journal article,ECS Transactions,19385862; 19386737; 21512051,The Electrochemical Society,United States,Sanyasi Manasa; Kukatlapalli Pradeep Kumar,"The new research approaches are needed to be adopted to deal with security threats in Artificial Intelligence (AI)-based systems. This research is aimed at investigating the AI attacks that are “malicious by design.” It also deals with conceptualization of the problem and strategies for attacks on AI using digital forensic tools. A specific class of problems in adversarial attacks are tampering of images for computational processing in applications of digital photography, computer vision, pattern recognition (facial capping algorithms). State-of-the-art developments in forensics, such as 1. Application of end-to-end Neural Network training pipeline for image rendering and provenance analysis. 2. Deep fake image analysis using frequency methods, wavelet analysis, and tools like Amped Authenticate. 3. Capsule networks for detecting forged images. 4. Information transformation for feature extraction via image forensic tools, such as EXIF-SC, Splice Radar, and Noiseprint. 5. Application of generative adversarial networks (GAN) based models as anti-image forensics [8], will be studied in great detail and a new research approach will be designed incorporating these advancements for utility of digital forensics.",107,1,19639,19645,Computer science; Artificial intelligence; Digital forensics; Rendering (computer graphics); Computer security; Machine learning,,,,,,http://dx.doi.org/10.1149/10701.19639ecst,,10.1149/10701.19639ecst,,,0,,0,false,, 131-030-713-249-824,A Comparative Study of Digital Forensic Tools for Data Extraction From Electronic Devices,,2021,journal article,Journal of Punjab Academy of Forensic Medicine & Toxicology,09725687; 0974083x,Diva Enterprises Private Limited,India,Harshita Tara; Amarnath Mishra,,21,1,97,104,Electronics; Data extraction; Computer science; Database; Digital forensics,,,,,http://dx.doi.org/10.5958/0974-083x.2021.00016.9,http://dx.doi.org/10.5958/0974-083x.2021.00016.9,,10.5958/0974-083x.2021.00016.9,3202691716,,0,,0,false,, 131-118-636-696-570,Review,2018-11-30,2018,journal article,International Journal of Engineering & Technology,2227524x,Science Publishing Corporation,,Gopinath Muruti; Siti Hawa Mokhtar; Fiza Abdul Rahim; Zul-Azri Ibrahim; Abbas M. Al-Ghaili,"Forensics is a vital point for law enforcement, civil litigators, and different experts who manage complex advanced examinations. Digital forensics has assumed a noteworthy part in a portion of the biggest criminal and civil investigations. However, the ascent in the prevalence of big data as a better approach for unraveling the challenges exhibited by huge, complex data due to the progression of innovations such as the Internet, Internet of Things (IoT), and Cloud Computing. These challenges have contributed to data deluge and forensics tool limitations in the digital forensics investigation. In this paper, a number of challenges faced by the digital forensics investigator in a big data environment are discussed. The identified challenges could significantly contribute to a more efficient digital forensics process in the big data environment. ",7,4.35,866,866,Big data; Digital forensics; Law enforcement; Computer science; Cloud computing; Digital evidence; Internet of Things; Data science; Process (computing); The Internet; Computer security; Point (geometry); Internet privacy; World Wide Web; Political science; Data mining; Law; Geometry; Mathematics; Operating system,,,,,,http://dx.doi.org/10.14419/ijet.v7i4.35.26271,,10.14419/ijet.v7i4.35.26271,,,0,,0,true,cc-by,green 131-654-072-552-211,Improvising the input process of traceability model for digital forensic investigation,,2014,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Iman Ahmeid Mohamed; Azizah Abdul Manaf,"In this paper, we present an enhancement input in the traceability model of digital forensic investigation. Plus, we present a literature review about existing traceability models. Furthermore, the outcome of this model expected to help and improvise the traceability model with theoretically proven justifications.",3,2,106,110,Improvisation; Outcome (game theory); Traceability; Digital forensic investigation; Computer science; Process (engineering); Multimedia; Wireless,,,,,http://sdiwc.net/digital-library/improvising-the-input-process-of-traceability-model-for-digital-forensic-investigation http://eprints.utm.my/id/eprint/59791/,http://dx.doi.org/10.17781/p001300,,10.17781/p001300,2018811932,,0,012-779-911-526-394; 013-560-904-249-085; 044-204-570-951-600; 054-807-178-292-239; 068-107-373-977-621; 068-931-665-572-533; 079-337-699-435-921; 081-101-710-547-862; 084-491-190-473-067; 089-963-839-663-899; 126-391-076-222-970; 134-836-932-890-840; 140-862-146-798-760; 141-208-107-719-601; 180-176-605-708-973,0,false,, 131-789-340-932-05X,Trusted computing and the digital crime scene,2014-01-28,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Yianna Danidou; Burkhard Schafer,"Yianna Danidou and Burkhard Schafer provide an analysis of the future of digital forensics in an environment where control is increasingly taken away from PC users and remotely managed by trusted third parties, typically to improve internet security by considering Trusted Computing to illustrate some of the possible legal issues that arise.",8,0,,,Internet privacy; Direct Anonymous Attestation; Crime scene; Trusted Network Connect; Internet security; Control (management); Trusted Computing; Computer security; Computer science; Digital forensics,,,,,https://sas-space.sas.ac.uk/5412/ https://journals.sas.ac.uk/deeslr/article/view/1960 http://www.research.ed.ac.uk/portal/files/13519397/Schafer_Trusted_Computing.pdf https://www.research.ed.ac.uk/portal/files/13519397/Schafer_Trusted_Computing.pdf https://core.ac.uk/download/28968734.pdf,http://dx.doi.org/10.14296/deeslr.v8i0.1960,,10.14296/deeslr.v8i0.1960,2066768986,,0,,0,true,cc-by-nc-nd,hybrid 131-796-930-292-035,A triage framework for digital forensics,,2015,journal article,Computer Fraud & Security,13613723,Mark Allen Group,United Kingdom,Muhammad Shamraiz Bashir; Muhammad Naeem Ahmed Khan,"A sharp increase in malware and cyber-attacks has been observed in recent years. Analysing cyber-attacks on the affected digital devices falls under the purview of digital forensics. The Internet is the main source of cyber and malware attacks, which sometimes result in serious damage to the digital assets. The motive behind digital crimes varies – such as online banking fraud, information stealing, denial of services, security breaches, deceptive output of running programs and data distortion. Digital forensics analysts use a variety of tools for data acquisition, evidence analysis and presentation of malicious activities. This leads to device diversity posing serious challenges for investigators. For this reason, some attack scenarios have to be examined repeatedly, which entails tremendous effort on the part of the examiners when analysing the evidence. To counter this problem, Muhammad Shamraiz Bashir and Muhammad Naeem Ahmed Khan at the Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Islamabad, Pakistan propose a novel triage framework for digital forensics.",2015,3,8,18,Internet privacy; The Internet; Variety (cybernetics); Bhutto; Triage; Denial; Computer security; Computer science; Malware; Computer forensics; Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S136137231530018X,http://dx.doi.org/10.1016/s1361-3723(15)30018-x,,10.1016/s1361-3723(15)30018-x,2030555322,,0,002-633-789-384-681; 003-871-070-011-964; 017-071-408-718-290; 020-626-957-505-364; 026-024-733-636-162; 030-351-009-711-953; 032-372-560-487-047; 035-269-627-388-435; 037-483-791-552-006; 040-105-187-457-272; 040-483-292-320-671; 042-251-875-510-426; 052-209-716-598-874; 062-325-585-829-185; 087-690-831-820-163; 093-448-702-012-591; 105-002-898-852-695; 127-286-301-080-684; 132-606-863-800-090,6,false,, 131-874-028-513-738,Network Forensics for Detecting Flooding Attack on Internet of Things (IoT) Device,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Randi Rizal; Yudi Prayudi Imam Riadi,,7,4,382,390,Flooding attack; Computer security; Computer science; Network forensics; Wireless; Internet of Things,,,,,http://sdiwc.net/digital-library/network-forensics-for-detecting-flooding-attack-on-internet-of-things-iot-device,http://sdiwc.net/digital-library/network-forensics-for-detecting-flooding-attack-on-internet-of-things-iot-device,,,2890450137,,0,000-459-858-701-166; 005-235-444-045-604; 024-381-049-056-789; 039-017-118-332-745; 052-439-768-589-13X; 060-294-953-084-788; 087-287-435-836-200; 093-117-308-515-186; 108-830-956-418-92X; 117-577-672-405-801; 147-631-422-817-38X,6,false,, 131-877-210-773-759,Development of Evidence Analysis Tool based on Active Data for Digital Forensics,,2012,journal article,Journal of Digital Convergence,17381916,,,Lee Jun Yeon,"The digital forensics are new kinds of security that investigate and verificate fact relation about activities based on digital data. In this paper, we implemented digital forensic tool that can be used in collecting, analyzing, and reporting evidences. This tool support intuitional GUI that everybody can analyze easily. And a simple operation can collect and analyze active data. Also, we can decrease much time and endeavor by using this forensic tool that support reliable data.",10,3,99,104,Engineering; World Wide Web; Data science; Relation (database); SIMPLE (military communications protocol); Digital data; Active data; Evidence analysis; Network forensics; Digital forensics,,,,,http://www.koreascience.or.kr:80/article/JAKO201219565295897.pdf https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001660385 http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=DJTJBT_2012_v10n3_99,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=DJTJBT_2012_v10n3_99,,,2398398601,,0,,0,false,, 132-698-173-062-570,Problem based learning in digital forensics,2016-03-21,2016,journal article,Higher Education Pedagogies,23752696,Informa UK Limited,United Kingdom,Alastair Irons; Paula Thomas,AbstractThe purpose of this paper is to compare and contrast the efforts of two universities to address the issue of providing computer forensics students with the opportunity to get involved in the practical aspects of forensic search and seizure procedures. The paper discusses the approaches undertaken by the University of Sunderland and the University of South Wales (Glamorgan) to give the students the opportunity to process a case from the crime scene through to the court room. In order to do this both institutions adopted a problem-based learning (PBL) approach – to reflect real-world solutions and encourage students to work in groups to seek further knowledge and understanding of the various processes and procedures – in particular the steps around search and seizure of digital evidence from a crime scene. The PBL activities at Sunderland and Glamorgan were designed in order to help the students understand the processes of digital crime scene analysis and search and seizure procedures and to give th...,1,1,95,105,Likert scale; Engineering; Mathematics education; Crime scene; Information system; Problem-based learning; Digital evidence; Computer security; Computer forensics; Search and seizure; Digital forensics,,,,,https://sure.sunderland.ac.uk/5059/1/04082014a.pdf https://tandfonline.com/doi/pdf/10.1080/23752696.2015.1134200 http://eprints.glos.ac.uk/4289/ https://eric.ed.gov/?id=EJ1147563 https://www.tandfonline.com/doi/full/10.1080/23752696.2015.1134200 https://sure.sunderland.ac.uk/6133/ https://www.tandfonline.com/doi/ref/10.1080/23752696.2015.1134200 https://core.ac.uk/display/76979856 https://core.ac.uk/download/74368705.pdf,http://dx.doi.org/10.1080/23752696.2015.1134200,,10.1080/23752696.2015.1134200,2157169106,,0,005-733-361-126-371; 007-790-059-029-953; 014-261-775-435-338; 046-474-638-122-984; 052-361-056-422-596; 066-198-497-514-876; 070-048-250-044-834; 087-300-425-406-630,5,true,"CC BY, CC BY-NC",gold 133-052-309-017-335,Automated Book Location and Classification Method using RFID Tags for Smart Libraries,,2021,journal article,Microprocessors and Microsystems,01419331,Elsevier BV,Netherlands,Orhan Yaman; Turker Tuncer; Fatih Ertam,,87,,104388,,Data mining; Position (vector); Redundancy (engineering); Signal strength; Principal component analysis; Classifier (linguistics); Classification methods; Computer science; Decision tree; Relevance (information retrieval),,,,,https://www.sciencedirect.com/science/article/pii/S0141933121005354,http://dx.doi.org/10.1016/j.micpro.2021.104388,,10.1016/j.micpro.2021.104388,3216545150,,0,003-859-818-993-151; 006-169-782-834-503; 006-198-158-868-85X; 006-752-222-865-553; 008-900-327-777-570; 010-955-615-069-982; 012-143-222-613-106; 013-493-258-558-395; 013-727-243-326-283; 022-458-508-323-568; 023-345-836-616-138; 030-509-298-236-366; 030-693-220-298-527; 031-349-318-263-879; 034-504-524-749-913; 039-223-288-474-436; 040-885-254-494-234; 041-765-116-830-316; 043-911-498-033-173; 047-338-340-336-787; 047-360-327-948-595; 049-315-062-956-636; 049-761-358-942-321; 051-240-950-492-794; 054-489-653-005-315; 059-114-170-788-520; 060-808-708-563-027; 063-006-382-575-515; 066-969-809-562-168; 071-179-499-285-269; 075-349-906-700-824; 076-366-409-637-140; 083-367-207-363-899; 085-779-613-440-873; 094-296-959-678-635; 096-935-361-056-680; 097-257-267-733-127; 099-687-236-719-229; 103-577-386-694-974; 103-984-276-286-601; 105-886-517-704-848; 109-911-722-460-245; 110-906-032-359-19X; 113-465-879-866-670; 124-689-704-994-381; 124-703-084-235-031; 125-145-367-055-543; 126-396-237-183-697; 128-960-538-861-612; 132-907-402-882-731; 142-425-323-419-037; 153-262-626-890-817; 163-418-505-282-55X; 166-697-315-119-659,0,false,, 133-401-132-549-688,Prelim iii - Contents List,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,33,,301047,301047,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30336-x,,10.1016/s2666-2817(20)30336-x,,,0,,0,false,, 133-532-326-238-319,CURRENT EVIDENCE ON BIOINFORMATICS ROLE AND DIGITAL FORENSICS THAT CONTRIBUTE TO FORENSIC SCIENCE: UPCOMING THREAT,2022-04-22,2022,journal article,JURNAL RISET RUMPUN MATEMATIKA DAN ILMU PENGETAHUAN ALAM,28289390; 28289382,Politeknik Pratama Purwokerto,,Rosyid Al Hakim; Esa Putri; Hexa Hidayah; Agung Pangestu; Sri Riani,"Forensics has become an essential part of the disclosure of criminal evidence. A bioinformatics approach in the form of DNA forensics and digital forensics can be a good combination in disclosing digital-based criminal evidence. This study explains how the role of bioinformatics through the digital approach can be a means of forming new approaches in integration with digital forensics, called cyber-bioinformatics. Despite many hopes and challenges ahead, it does not rule out the possibility of criminal cases related to the privacy of human genomic data, so it proposes a new hypothesis, “cyber-bioinformatics.” The role of cyber-bioinformatics is very central in this regard.",1,1,25,32,,,,,,,http://dx.doi.org/10.55606/jurrimipa.v1i1.157,,10.55606/jurrimipa.v1i1.157,,,0,,0,false,, 133-793-757-735-03X,Digital forensic investigation challenges based on cloud computing characteristics,2018-10-07,2018,journal article,International Journal of Engineering & Technology,2227524x,Science Publishing Corporation,,Ganthan Narayana Samy; Nurazean Maarop; Mohd Shahidan Abdullah; Sundresan Perum; Sameer Hasan Albakri; Bharanidharan Shanmugam; Premylla Jeremiah,"One of the most popular computing technologies is cloud computing. There are many benefits in adopting cloud computing such as high-performance, flexibility and availability ondemand, more focused on the business objective and low-cost. However, the characteristics of the cloud computing environment have created many difficulties and challenges for digital forensic investigation processes. Therefore, this paper focuses on the digital forensic investigation challenges based on cloud computing characteristics.",7,4.15,7,,Data science; Flexibility (engineering); Digital forensic investigation; Computer science; Cloud computing,,,,,http://eprints.utm.my/id/eprint/86633/ https://core.ac.uk/download/334606705.pdf,http://dx.doi.org/10.14419/ijet.v7i4.15.21361,,10.14419/ijet.v7i4.15.21361,2941775230,,0,,1,true,,bronze 134-032-265-239-814,Internet of things devices: digital forensic process and data reduction,,2020,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Reza Montasari; Richard Hill; Farshad Montaseri; Hamid Jahankhani; Amin Hosseinian Far,,12,4,424,424,Computer science; Digital forensics; Process (computing); Digital evidence; Computer security; Internet of Things; The Internet; Reduction (mathematics); Data science; Internet privacy; World Wide Web,,,,,,http://dx.doi.org/10.1504/ijesdf.2020.110676,,10.1504/ijesdf.2020.110676,,,0,,3,true,,green 134-264-047-754-183,The Role of “Digital Forensic Photography”- In the Indian Criminal Justice System,2021-05-01,2021,journal article,Journal of emerging technologies and innovative research,23495162,,,Rakesh Mia; Vijay R. Panchal; Yukta Guglot,"Photography is one of the most critical factors in any crime scene solving cases. Crime Scene photography or forensic photography is an important role depending on the crime scene as well as its a photo in the criminal justice system as a scene of crime evidence. In the 21st century all over the world, all respective forensic science authorities used high-resolution camera, lens and modern instrumentation technology to capture crime scene occur photos. Evidence collection and preservation using digital forensic photography is a crucial aspect of a future legal proceeding. In this paper, we summarize the modern aspects of digital forensic photography in the Indian criminal justice system",8,5,,,Criminal justice; Photography; Visual arts; Crime scene; Forensic photography; Legal proceeding; Critical factors; Evidence collection; Digital forensics; History,,,,,https://www.jetir.org/view?paper=JETIR2105285 https://www.jetir.org/papers/JETIR2105285.pdf,https://www.jetir.org/view?paper=JETIR2105285,,,3160362477,,0,,1,false,, 134-271-291-397-152,Digital Forensic Technology of Solaris,,2012,journal article,Advanced Materials Research,16628985,"Trans Tech Publications, Ltd.",,Fei Zhao; Jing Sheng Zhang; Zhong Xia Wang,"The UFS file system of Solaris is not supported undelete operation, so it is a difficult thing to digital forensic. This paper based on the UFS documents of 10 Solaris’ the log file system and the physical structure of UFS file system’s storage, putting forward the method of digital forensic for it. In cases of actual digital forensic for Solaris 10, it can restore the required documents, so this method has good effect",601,,342,346,Unix file types; File system; Physical structure; Computer science; Database; Digital forensics,,,,,https://www.scientific.net/AMR.601.342,http://dx.doi.org/10.4028/www.scientific.net/amr.601.342,,10.4028/www.scientific.net/amr.601.342,2019721255,,0,,0,false,, 134-478-091-171-675,О теоретических аспектах использования в криминалистике понятия электронно-цифрового следа,,2020,journal article,Юридические исследования,24097136,"Aurora Group, s.r.o",,Иванов Владислав Юрьевич,"; This article examines the theoretical problem of formulating a definition for new type of traced manifested in computer space. The subject of this research is concept of digital footprint. Special attention is paid to different approaches of forensic specialists towards interpretation of trace pattern formed as a result of a crime committed with the use of technical devices, including the Internet. Analysis is conducted on various opinions of forensic specialists dealing with this problem. The author provides and substantiates the original opinion on introduction of the term &ldquo;digital footprint&rdquo;. The conclusion is formulated on the need to accept digital footprint as most appropriate term for describing any type of trace manifested in computer space, including the Internet. The article also presents an original definition of such type of trace intelligible to general audience. The author indicates the trends and prospects in formation and further development of the new branch of forensic technology &ndash; &ldquo;forensic examination of digital footprint"". The proposed conclusions may be valuable in scientific and educational activity.; ",,7,75,80,,,,,,https://www.nbpublish.com/library_read_article.php?id=33682 https://www.nbpublish.com/library_get_pdf.php?id=33682 https://e-notabene.ru/lr/article_33682.html,http://dx.doi.org/10.25136/2409-7136.2020.7.33682,,10.25136/2409-7136.2020.7.33682,3088951709,,0,085-976-961-234-411,1,true,cc-by-nc,gold 134-957-252-728-269,A Practical Approach for Digital Forensic Triage,,2015,journal article,Applied Mechanics and Materials,16627482,"Trans Tech Publications, Ltd.",,Jianguo Jiang; Bo Yang; Sen Lin; Ming Xing Zhang; Kun Ying Liu,"In order to uncover truths to serve justice, case-related data collected from a digital investigation requires substantial resources to analyze, especially in time-critical situations. At present, however, digital forensics has not evolved to meet this ever-increasing demand. Digital forensic triage is a promising solution, as it is designed to maximize the use of resources according to a system of priorities, and hence the efficiency and effectiveness of forensic examinations can be increased. Nevertheless, the lack of concrete methods limits efforts to implement triage. This paper presents a practical approach that is designed to build a prioritizing solution. In this work a new process model is derived based on the presented approach, and it is particularly suited to scenarios where forensic examiners do not have enough time and resources to conduct a full examination and analysis. An example is described to demonstrate how this approach can be used to meet the requirements of network forensic investigations.",742,,437,444,Risk analysis (engineering); Engineering; Work (electrical); Justice (ethics); Triage; Computer security; Process (engineering); Digital forensics,,,,,https://www.scientific.net/AMM.742.437 https://zh.scientific.net/AMM.742.437.pdf,http://dx.doi.org/10.4028/www.scientific.net/amm.742.437,,10.4028/www.scientific.net/amm.742.437,2075057275,,0,000-750-047-594-348; 003-982-227-180-136; 019-698-064-288-240; 029-025-221-262-260; 029-938-776-068-353; 032-697-093-668-898; 038-668-970-194-854; 047-630-600-014-492; 065-452-675-566-99X; 087-262-232-954-302; 090-752-043-508-733; 091-619-263-117-914; 122-880-373-616-302; 125-384-800-661-375; 131-516-331-360-906; 132-355-634-397-986; 184-948-841-629-735; 199-745-676-923-766,2,false,, 135-024-140-709-532,Darknet Intelligence in Digital Forensics,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Amartya Mohan Tagore,,,,,,Darknet; Computer security; Computer science; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.04,http://dx.doi.org/10.46293/4n6/2021.03.02.04,,10.46293/4n6/2021.03.02.04,3162995776,,0,,0,false,, 135-172-175-862-937,Forensic Analysis of Android-based WhatsApp Messenger Against Fraud CrimeUsing The National Institute of Standard and Technology Framework,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Helmy Trisnasenjaya; Riadi,,8,1,89,97,World Wide Web; Computer science; Wireless; Android (operating system),,,,,http://sdiwc.net/digital-library/forensic-analysis-of-androidbased-whatsapp-messenger-against-fraud-crimernusing-the-national-institute-of-standard-and-technology-framework,http://dx.doi.org/10.17781/p002567,,10.17781/p002567,2974462574,,0,,0,false,, 135-404-754-742-569,US2022-Print-Ad,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,42,,301426,301426,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00107-x,,10.1016/s2666-2817(22)00107-x,,,0,,0,false,, 135-644-852-278-088,Effectiveness of OSForensic in Digital Forensic Investigation to Curb cybercrime,2021-05-12,2021,journal article,Indian Journal of Forensic Medicine & Toxicology,09739122; 09739130,Institute of Medico-legal Publications Private Limited,India,Bandr Siraj Fakiha,"With the rapid development and higher level of dependence on new information and technology by various organizations across the world, cybercrime issues are increasing, and there are no technologies that seem flawless in combatting the issue. The use of concepts relating to digital forensic investigation of criminal activities and digital forensics will, therefore, tackle the problem with finding digital evidence in cybercrimes. OSForensics is one of the various digital forensic investigation tools that allows the use of Hash Sets for identifying known safe files in program and operating system files. The tool is essential for identifying suspected files like Trojans, viruses, and hacker scripts. The problem presented in this paper, therefore, entails utilizing combinations of digital forensic investigation of criminal activities and investigation concepts. The paper seeks to establish the effectiveness of OSForensic in Digital Forensic Investigation to curb cybercrime. That is, the capabilities of OSForensics and the accuracy of OSForensics with regards to retrieving and analyzing data from a hard drive in order to investigate and curb cybercrime at the workplace. The researcher investigated a case in which a company security had been threatened by an employee whose contract had recently been terminated. The company suspected that this employee had some serious pictures, locations, and employee details belong to company. The image of the employee’s personal flash was sent to the researcher to help initiate the investigation using OSForensicssoftware so as to establish any evidence that the employee still had pictures, locations, and employee details belong to company. In overall, OSForensic was able to identify company details that the employee was having. The research was able to identify sensitive information about the company that the suspect was having, including the names of the employees, images, company system structure and what seemed to be their respective identification numbers.",15,3,2149,2153,Internet privacy; Information sensitivity; Suspect; Cybercrime; Digital evidence; Computer science; Scripting language; Identification (information); Digital forensics; Hacker,,,,,https://medicopublication.com/index.php/ijfmt/article/view/15633,http://dx.doi.org/10.37506/ijfmt.v15i3.15633,,10.37506/ijfmt.v15i3.15633,3195510639,,0,,0,false,, 135-646-933-254-458,HANDWRITING EXPERTISE IN THE FORENSIC SCIENCE CENTRE OF LITHUANIA: PRESENT ACTIONS AND FUTURE VISION,2022-08-09,2022,journal article,Criminalistics and Forensics,01302655,Kyiv Scientific Research Institute of Forensic Expertise,,Rasa Tamošiūnaitė,"Recently, the number of expert investi gations in handwriting evidence at the Lithuanian Forensic Examination Centre (LTEC) has significantly decreased. The decrease has been observed for several years already.; ; The present article analyses possible reasons for the decrease in the number of expert investigations in handwriting in LT EC and the importance of such investigation in the context of judicial research, court proceeding, and criminal investigations.; ; Also, the article deals with the use of electronic signatures and associated security problems in the digital environment.; ; Key words: handwriting examination, signature, digital signature, digitized sig-; nature, informativeness of signatures.",,67,365,371,Handwriting; Lithuanian; Context (archaeology); Forensic examination; Forensic science; Digital signature; Signature (topology); Computer science; Criminal investigation; Computer security; Data science; Psychology; Artificial intelligence; Engineering; Criminology; History; Linguistics; Forensic engineering; Mathematics; Hash function; Philosophy; Geometry; Archaeology,,,,,,http://dx.doi.org/10.33994/kndise.2022.67.37,,10.33994/kndise.2022.67.37,,,0,,0,true,,gold 136-400-281-116-450,Blockchain in Big Data Security for Intelligent Transportation With 6G,,2022,journal article,IEEE Transactions on Intelligent Transportation Systems,15249050; 15580016,Institute of Electrical and Electronics Engineers (IEEE),United States,Zhili Zhou; Meimin Wang; Jingwang Huang; Shengliang Lin; Zhihan Lv,,23,7,9736,9746,,,,,"National Key Research and Development Program of China; National Natural Science Foundation of China; Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) Fund; Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) Fund, China; National Natural Science Foundation of China; Key Research and Development Plan-Major Scientific and Technological Innovation Projects of Shan Dong Province",,http://dx.doi.org/10.1109/tits.2021.3107011,,10.1109/tits.2021.3107011,,,0,000-011-491-611-440; 000-485-788-343-744; 016-570-710-853-004; 017-545-329-534-639; 018-100-712-291-478; 021-356-321-827-56X; 021-366-140-005-38X; 023-628-555-025-470; 024-157-397-156-077; 027-096-043-528-331; 029-398-614-412-735; 032-681-151-128-894; 033-626-869-265-446; 033-806-179-572-332; 042-007-790-969-735; 042-062-310-431-592; 044-505-693-910-904; 045-311-173-303-183; 045-968-687-151-048; 048-020-457-650-67X; 050-225-205-577-083; 061-439-638-833-25X; 061-909-337-739-060; 063-248-380-987-446; 065-380-115-215-243; 066-311-471-847-244; 071-176-890-544-418; 078-153-154-866-171; 085-379-313-234-901; 086-959-383-959-374; 089-073-066-008-897; 089-683-685-882-012; 092-596-905-671-376; 101-105-320-099-082; 111-893-720-044-323; 112-913-230-973-033; 114-889-854-098-295; 120-418-036-914-955; 121-225-796-399-648; 122-682-468-170-924; 124-555-210-006-28X; 138-423-145-544-850; 152-934-938-742-066,1,false,, 136-582-664-371-301,Role of Windows Registry Forensics in Digital Forensics Investigation,2018-06-07,2018,journal article,International Journal for Electronic Crime Investigation,26166003; 25223429,Lahore Garrison University,,Mohsin Ali Mohsin Ali,"The research paper covers one of the most important aspect of the digital forensics investigation “Registry Forensics” as there are several components that are necessary for carrying out digital forensics investigation, one cannot overall the windows registry. The research paper is basically divided into two segments, where the first segment fully explains what registry is, how it works, and what important information stored in it. Moreover, the research paper covers the aspect of anti-forensics elements that are incorporated by different cyber criminals in order to wipe the traces of fraudulent activities, and finally the author has concluded the research paper by highlighting the importance of windows registry in digital forensics investigation.",2,3,9,,,,,,,,http://dx.doi.org/10.54692/ijeci.2018.020318,,10.54692/ijeci.2018.020318,,,0,,0,false,, 136-652-465-419-22X,CONCEPT AND SIGNS OF DIGITAL TRACES THAT FORM DURING CYBERCRIMES,2020-05-18,2020,journal article,Criminalistics and Forensics,01302655,Kyiv Scientific Research Institute of Forensic Expertise,,O. Omelian,"The article considers scientific views on terminology in the field of forensics and forensic examination for the investigation of cybercrime, as well as taking into account the specific use of information and telecommunication technologies in forensics, the validity of the term’s use “digital traces” is substantiated.; ; The author’s definition of the concept of digital traces that are formed during the commission of cybercrimes is proposed. Its specific signs and properties are presented and analyzed as well. The necessity of using special knowledge and appropriate expert equipment to search for, detect and record digital tracks has been noted. It is emphasized the importance of the speed of detection and investigation of digital traces in the process of investigating cybercrimes. The necessity of developing the concept of digital tracks, research of new, different from traditional methods, methods and means of their detection, fixation, analysis and preservation is substantiated.",,65,457,466,,,,,,http://dx.doi.org/10.33994/kndise.2020.65.45,http://dx.doi.org/10.33994/kndise.2020.65.45,,10.33994/kndise.2020.65.45,3037683530,,0,,0,true,,gold 136-921-865-701-702,A review study on blockchain-based IoT security and forensics,2021-09-01,2021,journal article,Multimedia Tools and Applications,13807501; 15737721,Springer Netherlands,Netherlands,Randa Kamal; Ezz El-Din Hemdan; Nawal El-Fishway,"The term Internet of Things (IoT) represents all communicating countless heterogeneous devices to share data and resources via the internet. The speedy advance of IoT devices proposes limitless benefits, but it also brings new challenges regarding security and forensics. Likewise, IoT devices can generate a massive amount of data that desires integrity and security during its handling and processing in an efficient way. IoT devices and data can be vulnerable to various types of cyber-crimes at each IoT layer. For combating these cyber-crimes in IoT infrastructure, IoT forensic term has shown up. The IoT forensic is the process of performing digital forensic investigation in the IoT environment in a forensically sound and timely fashion manner. Sundry challenges face the IoT forensics that requires urgent solutions and mitigation methods; digital evidence needs to be collected, preserved, analyzed, processed, and reported in a trusted manner to be acceptable for presenting in the court of law. Preserving the evidence unchanged or tampered with is the most critical challenge in digital forensics. Authentication is another challenge facing digital forensics; who is allowed to deal with the evidence? One of the most recent solutions for supporting IoT forensics is the use of Blockchain. Using Blockchain in digital forensics guarantees data integrity, immutability, scalability, and security. Therefore, this paper presents a comprehensive review of IoT security and forensics with the integration with Blockchain technology. It begins by providing an inclusive discussion of IoT security, as well as the need for IoT forensics, and the concepts of Blockchain. Then, a review of Blockchain-based IoT security and forensics issues is presented. Finally, a discussion of open research directions is provided.",,,1,32,The Internet; Authentication; Open research; Digital evidence; Data integrity; Computer security; Computer science; Process (engineering); Scalability; Digital forensics,,,,,https://link.springer.com/article/10.1007%2Fs11042-021-11350-9,https://link.springer.com/article/10.1007%2Fs11042-021-11350-9,,,3197657744,,0,001-255-393-025-47X; 002-020-246-447-998; 002-833-179-413-429; 004-137-132-720-257; 004-615-796-313-121; 005-012-690-926-011; 005-224-642-777-474; 006-307-345-966-439; 006-318-177-787-16X; 007-320-554-486-362; 007-633-216-828-494; 008-807-158-661-924; 010-978-011-367-884; 011-965-831-977-868; 012-418-911-164-537; 014-448-058-704-128; 015-973-222-946-009; 017-562-642-083-445; 017-843-938-494-981; 020-587-089-761-077; 020-898-202-535-134; 021-134-599-167-021; 021-703-134-019-886; 022-048-109-808-996; 022-763-404-461-908; 023-465-371-433-193; 024-910-782-556-015; 025-259-885-861-617; 026-334-089-671-023; 026-698-451-512-277; 029-489-501-199-089; 029-610-096-288-863; 029-892-989-646-160; 030-824-319-524-202; 030-997-038-769-92X; 031-012-491-963-576; 031-398-229-671-548; 031-941-891-090-264; 032-191-634-122-495; 032-480-663-490-749; 033-434-879-329-689; 034-177-354-328-802; 034-940-557-037-083; 035-731-194-139-501; 038-002-080-319-757; 039-420-403-957-058; 040-143-785-791-905; 041-694-566-692-090; 042-935-076-531-009; 043-396-872-320-567; 043-990-897-373-907; 045-545-290-957-356; 047-193-826-883-209; 048-759-356-661-308; 050-241-071-432-208; 050-391-026-832-281; 051-662-461-185-849; 051-785-078-933-787; 053-142-074-890-154; 053-173-166-061-419; 054-079-583-763-10X; 054-147-266-467-026; 055-498-537-115-235; 055-811-656-615-740; 056-948-667-641-374; 058-028-339-076-776; 058-183-025-760-225; 058-216-449-390-342; 059-257-554-844-104; 060-577-614-625-105; 062-239-752-997-805; 062-600-341-536-072; 063-350-974-331-285; 063-365-805-979-031; 064-065-630-353-572; 065-654-832-541-493; 066-129-449-973-964; 066-976-962-367-399; 068-502-312-271-078; 069-808-303-777-278; 072-541-155-917-90X; 074-407-533-215-290; 076-688-332-542-46X; 077-858-823-212-989; 078-076-784-684-405; 081-677-124-683-871; 082-403-932-515-639; 082-655-762-381-068; 083-366-430-872-667; 083-888-956-568-609; 087-864-339-137-909; 088-553-642-323-93X; 088-815-757-467-332; 089-419-984-563-123; 090-277-922-829-920; 090-746-449-797-220; 092-827-935-965-207; 093-586-085-641-725; 094-132-495-303-526; 097-939-114-561-254; 098-495-821-664-529; 098-955-808-363-478; 099-532-580-533-443; 102-224-315-391-490; 102-673-073-835-039; 104-120-419-034-347; 105-453-220-486-612; 106-443-463-834-498; 108-114-708-601-04X; 109-244-833-901-828; 111-834-007-975-130; 118-734-946-098-646; 118-985-625-047-182; 131-447-324-046-074; 131-581-925-248-197; 134-170-516-223-565; 135-366-444-347-040; 147-906-708-243-924; 153-430-890-325-227; 159-237-651-629-403; 160-518-804-288-395; 163-498-042-271-565; 165-911-959-289-387; 166-294-209-773-802; 167-729-551-082-27X; 173-254-366-740-139; 183-678-779-320-097; 184-229-080-509-446,1,false,, 137-320-816-794-079,A Forensic Audit of the Tor Browser Bundle,,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Matt Muir; Petra Leimich; William J Buchanan,"Abstract The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protocol, as its main focus is to protect the privacy of the user, in both its local footprint within a host and over a network connection. The Tor browser, though, can leave behind digital artefacts which can be used by an investigator. This paper outlines an experimental methodology and provides results for evidence trails which can be used within real-life investigations.",29,,118,128,Footprint; Encryption; Host (network); Audit; Bundle; Network connection; Computer security; Focus (computing); Computer science; Protocol (object-oriented programming),,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287619300829 https://doi.org/10.1016/j.diin.2019.03.009 https://dblp.uni-trier.de/db/journals/corr/corr1907.html#abs-1907-10279 https://arxiv.org/pdf/1907.10279.pdf https://arxiv.org/abs/1907.10279 https://core.ac.uk/download/195354109.pdf,http://dx.doi.org/10.1016/j.diin.2019.03.009,,10.1016/j.diin.2019.03.009,2935234850,,0,020-774-682-563-067; 025-319-861-345-580; 062-433-321-011-994; 098-833-276-904-716; 127-411-064-172-146; 133-479-985-342-849; 140-202-585-278-528; 183-699-905-653-662,12,true,,green 137-402-861-825-929,Professionalism in digital forensics,2014-01-21,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Alistair Irons; Anastasia Konstadopoulou,Alastair Irons and Anastasia Konstadopoulou explore some of the issues that affect the emergence of a new breed of expert: the digital forensic specialist.,4,0,,,Computer science; Multimedia; Computer forensics; Digital forensics,,,,,https://journals.sas.ac.uk/deeslr/article/view/1798 https://sas-space.sas.ac.uk/5584/ https://sure.sunderland.ac.uk/id/eprint/1661/,http://dx.doi.org/10.14296/deeslr.v4i0.1798,,10.14296/deeslr.v4i0.1798,2074474473,,0,,0,true,cc-by-nc-nd,hybrid 137-471-096-969-114,Prelim iii - Contents List,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,35,,301100,301100,Information retrieval; Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30402-9,,10.1016/s2666-2817(20)30402-9,,,0,,0,true,,bronze 137-692-081-537-430,eDiscovery With Belkasoft,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yuri Gubanov,,,,,,,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.02,http://dx.doi.org/10.46293/4n6/2020.02.04.02,,10.46293/4n6/2020.02.04.02,3095181402,,0,,0,false,, 138-173-404-908-550,"Digital Forensics, A Need for Credentials and Standards",,2019,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Nima Zahadat,,14,1,3,,Quality assurance; Engineering; Credentialing; Certification; Curriculum; Engineering ethics; Computer forensics; Accreditation; Digital forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1560&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl14.html#Zahadat19 https://mdsoar.org/handle/11603/18740 https://commons.erau.edu/jdfsl/vol14/iss1/3/,http://dx.doi.org/10.15394/jdfsl.2019.1560,,10.15394/jdfsl.2019.1560,2992114667,,0,004-652-388-189-304; 007-790-059-029-953; 011-212-632-773-778; 017-815-064-018-299; 019-831-293-743-518; 032-286-659-568-014; 038-668-970-194-854; 042-230-817-975-353; 078-327-902-374-330; 119-234-785-721-155; 134-927-490-231-285; 161-212-502-492-31X; 172-906-636-987-575,1,true,cc-by-nc,gold 139-924-660-355-079,"Digital Forensics AI: Evaluating, Standardizing and Optimizing Digital Evidence Mining Techniques",2022-05-12,2022,journal article,KI - Künstliche Intelligenz,09331875; 16101987,Springer Science and Business Media LLC,,Abiodun A. Solanke; Maria Angela Biasiotti,"AbstractThe impact of AI on numerous sectors of our society and its successes over the years indicate that it can assist in resolving a variety of complex digital forensics investigative problems. Forensics analysis can make use of machine learning models’ pattern detection and recognition capabilities to uncover hidden evidence in digital artifacts that would have been missed if conducted manually. Numerous works have proposed ways for applying AI to digital forensics; nevertheless, scepticism regarding the opacity of AI has impeded the domain’s adequate formalization and standardization. We present three critical instruments necessary for the development of sound machine-driven digital forensics methodologies in this paper. We cover various methods for evaluating, standardizing, and optimizing techniques applicable to artificial intelligence models used in digital forensics. Additionally, we describe several applications of these instruments in digital forensics, emphasizing their strengths and weaknesses that may be critical to the methods’ admissibility in a judicial process.",,,,,Digital forensics; Computer science; Standardization; Process (computing); Computer forensics; Digital evidence; Strengths and weaknesses; Data science; Domain (mathematical analysis); Variety (cybernetics); Artificial intelligence,,,,Alma Mater Studiorum - Università  di Bologna,,http://dx.doi.org/10.1007/s13218-022-00763-9,,10.1007/s13218-022-00763-9,,,0,000-452-908-115-500; 003-137-879-936-770; 003-360-732-233-044; 005-465-138-684-882; 006-110-132-701-331; 006-915-702-173-584; 007-017-884-126-763; 007-123-902-810-016; 007-514-616-400-882; 008-758-179-867-86X; 009-803-691-567-926; 010-591-271-586-999; 010-963-610-208-920; 011-869-845-196-579; 011-973-615-168-206; 013-193-200-485-010; 017-866-764-672-013; 018-339-128-070-611; 021-122-712-929-959; 021-152-929-670-076; 021-495-249-615-203; 021-709-633-408-146; 021-716-208-836-655; 022-001-306-594-001; 022-890-782-823-074; 023-113-470-652-173; 024-470-739-770-394; 025-218-336-182-063; 025-949-648-968-582; 026-637-070-870-880; 026-706-598-228-85X; 026-716-755-237-573; 027-879-891-266-259; 029-011-000-053-812; 030-025-798-038-613; 030-244-355-954-065; 033-225-943-167-901; 036-112-898-081-145; 036-384-272-299-395; 038-851-975-868-307; 040-024-171-977-455; 041-131-516-156-274; 041-351-456-338-328; 042-975-716-732-789; 045-287-244-826-938; 045-591-020-022-945; 048-011-673-789-33X; 048-689-227-588-57X; 048-802-610-388-273; 054-208-541-333-61X; 055-284-632-827-86X; 056-966-379-476-801; 058-717-000-287-105; 059-149-073-001-124; 059-878-189-173-964; 063-034-594-210-284; 064-549-392-650-90X; 065-574-846-834-06X; 067-253-447-599-854; 069-812-790-278-688; 071-925-887-884-193; 072-231-013-731-09X; 072-900-763-568-602; 073-427-478-125-189; 074-182-263-979-316; 075-431-891-877-59X; 075-859-615-742-549; 076-668-645-822-018; 077-902-632-083-884; 080-245-103-101-902; 083-012-787-425-351; 085-332-269-532-11X; 086-653-920-850-621; 088-142-137-151-413; 094-159-592-916-885; 095-263-442-186-414; 096-185-757-909-037; 096-838-446-149-582; 098-340-878-853-594; 098-669-156-394-924; 099-538-623-020-689; 101-549-415-202-81X; 102-940-527-584-734; 103-760-328-285-801; 106-604-221-665-323; 106-820-019-891-26X; 107-362-112-311-662; 108-877-455-100-938; 110-366-692-800-871; 112-744-755-472-229; 113-460-781-457-18X; 113-743-452-135-075; 117-555-147-368-574; 119-357-929-624-478; 120-806-014-141-917; 129-758-715-381-618; 131-559-179-609-745; 137-320-213-389-496; 139-320-230-645-968; 142-790-196-752-819; 143-176-456-443-067; 146-785-925-828-561; 154-735-209-819-28X; 156-905-641-435-682; 162-183-378-458-523; 168-213-788-701-998; 172-928-027-348-61X; 176-679-069-400-341; 176-882-505-758-504; 182-614-300-667-701,1,true,,hybrid 140-176-426-122-829,Prelim iii - Contents List,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,40,,301368,301368,World Wide Web; Geography; Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00040-3,,10.1016/s2666-2817(22)00040-3,,,0,,0,true,,bronze 141-400-075-412-153,Introducing digitalization in forensic and economic expertise,,2022,journal article,Obshchestvo i ekonomika,02073676,The Russian Academy of Sciences,,Arina Belyaeva,"The purpose of the study is to identify factors that affect the quality of forensic economic examination and to consider the ways to neutralize those using digital technologies. The subject of the study is the application of digital technologies to the work of an expert economist. The research methods were the analysis of scientific literature and judicial practice of Russian and foreign researchers, analysis of websites of expert institutions, comparison of expert activities, data aggregation, classification of types and methods of forensic economic examination, description of the expert&apos;s activities. The article presents the types and objects of forensic economic examinations in accordance with current regulatory legal acts.; The developments in forensic economic examinations are considered. The potential for introducing modern end-to-end digital technologies into the work of expert economists is analyzed and seven components of technological progress in the field identified. The factors influencing the quality of the forensic economic examination are identified. The measures to minimize and neutralize the threats to expert activity in the context of digitalization are proposed.",,9,115,115,,,,,,,http://dx.doi.org/10.31857/s020736760021867-2,,10.31857/s020736760021867-2,,,0,,0,false,, 141-923-050-043-761,A Method to Encrypt Information with DNA-Based Cryptography,,2015,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Mohammadreza Najaftorkaman,,4,3,417,426,,,,,,,http://dx.doi.org/10.17781/p001648,,10.17781/p001648,,,1,,13,false,, 142-007-449-034-886,Digital Forensics In Multimedia,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Frey John Wisdom,"Digital forensics and multimedia forensics are rapidly growing disciplines where electronic information is extracted and interpreted using scientifically accepted and validated processes, to be used in and outside of a court of law. As personal computing and the internet becomes more widespread, these two fields are becoming increasingly important in law enforcement and cybercrime investigation.Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics which focuses on extracting and analyzing contents such as images, videos, and audio to produce forensic evidence from both regular computer systems and special multimedia devices, such as digital cameras, voice recorders etc. This paper seeks to shed some light on digital forensics in multimedia, methods of authentication and challenges. Keywords: Forensics, Multimedia, Scrutiny, Analysis, Video, Voice, Data, Camera, Authentication BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Frey John Wisdom (2022): Digital Forensics In Multimedia Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 239-250 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P39",1,1,239,250,Computer forensics; Computer science; Digital forensics; Digital evidence; Law enforcement; Multimedia; Authentication (law); Cybercrime; The Internet; Nexus (standard); Computer security; World Wide Web,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p39,,10.22624/aims/crp-bk3-p39,,,0,,0,false,, 142-482-498-545-140,Prelim i - Editorial Board,,2022,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,,,42,,301433,,,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00114-7,,10.1016/s2666-2817(22)00114-7,,,0,,0,false,, 142-682-709-033-759,Stitcher: Correlating digital forensic evidence on internet-of-things devices,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Yee Ching Tok; Chundong Wang; Sudipta Chattopadhyay,"Abstract The increasing adoption of Internet-of-Things (IoT) devices present new challenges to digital forensic investigators and law enforcement agencies when investigation into cybercrime on these new platforms are required. However, there has been no formal study to document actual challenges faced by investigators and whether existing tools help them in their work. Prior issues such as the correlation and consistency problem in digital forensic evidence have also become a pressing concern in light of numerous evidence sources from IoT devices. Motivated by these observations, we conduct a user study with 39 digital forensic investigators from both public and private sectors to document the challenges they faced in traditional and IoT digital forensics. We also created a tool, Stitcher , that addresses the technical challenges faced by investigators when handling IoT digital forensics investigation. We simulated an IoT crime that mimics sophisticated cybercriminals and invited our user study participants to utilize Stitcher to investigate the crime. The efficacy of Stitcher is confirmed by our study results where 96.2% of users indicated that Stitcher assisted them in handling the crime, and 61.5% of users who used Stitcher with its full features solved the crime completely.",35,,301071,,Internet privacy; Private sector; Work (electrical); Cybercrime; Law enforcement; Consistency problem; Computer science; Internet of Things; Digital forensics,,,,Ministry of Education - Singapore,https://www.sciencedirect.com/science/article/abs/pii/S2666281720303681 http://dblp.uni-trier.de/db/journals/corr/corr2003.html#abs-2003-07242 http://www.sciencedirect.com/science/article/pii/S2666281720303681 https://doi.org/10.1016/j.fsidi.2020.301071 https://dblp.uni-trier.de/db/journals/corr/corr2003.html#abs-2003-07242,http://dx.doi.org/10.1016/j.fsidi.2020.301071,,10.1016/j.fsidi.2020.301071,3093759093,,0,001-507-239-208-313; 019-360-393-097-72X; 019-831-293-743-518; 022-056-178-362-107; 035-031-257-128-045; 037-435-312-083-42X; 044-046-807-728-773; 073-194-524-558-213; 097-939-114-561-254; 098-748-261-333-651; 142-388-561-082-054; 150-249-549-372-358; 162-374-469-230-059; 173-034-553-635-460; 177-638-047-045-946,2,true,,green 142-790-196-752-819,Accrediting digital forensics: what are the choices?,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Peter Sommer,"Abstract There are three apparent competing routes to providing re-assurance about the quality of digital forensics work: accredit the individual expert, accredit the laboratory and its processes, let the courts test via its procedures. The strengths and weaknesses of each are discussed against the variety of activities within “forensic science”. The particular problems of digital forensics, including its complexity and rate of change, are reviewed. It is argued that formal standards may not always be practical or value for money compared with advisory good practice guides.",25,,116,120,Variety (cybernetics); Work (electrical); Test (assessment); Quality (business); Value for money; Good practice; Computer science; Engineering ethics; Strengths and weaknesses; Digital forensics,,,,,https://core.ac.uk/display/158373139 https://www.open-access.bcu.ac.uk/6008/ https://dblp.uni-trier.de/db/journals/di/di25.html#Sommer18 https://www.sciencedirect.com/science/article/pii/S1742287618301701 https://core.ac.uk/download/158373139.pdf,http://dx.doi.org/10.1016/j.diin.2018.04.004,,10.1016/j.diin.2018.04.004,2800365291,,0,,24,true,,green 143-347-787-372-092,"Forensics Analysis of Skype, Viber and WhatsApp Messenger on Android Platform",,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Peter E. Onovakpuri,,7,2,119,131,Computer science; Multimedia; Wireless; Android (operating system),,,,,http://www.sdiwc.net/digital-library/forensics-analysis-of-skype-viber-and-whatsapp-messenger-on-android-platform.html,http://dx.doi.org/10.17781/p002369,,10.17781/p002369,2794262205,,0,014-299-240-901-551; 014-510-444-730-433; 026-641-935-890-517; 033-059-274-408-956; 049-979-701-385-094; 060-647-372-531-456; 086-355-175-274-285; 098-520-592-151-771; 106-759-637-118-717; 131-924-951-958-91X; 163-227-995-393-241,5,false,, 143-408-563-865-265,What does a digital forensics opinion look like? A comparative study of digital forensics and forensic science reporting practices.,2021-07-01,2021,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Nina Sunde,"Abstract This study explores digital forensics (DF) reporting practices and compares the results with other forensic science disciplines. Forty reports were obtained from a quasi-experiment involving DF examiners, and a quantitative content analysis was performed to determine which conclusion types they applied and which content they included with relevance to the credibility of the reported results. A qualitative analysis was performed to examine the certainty expressions used in the conclusions. The results were compared to a study of eight forensic science disciplines performed by Bali et al. [24,26]. The results show that the DF examiners tend to present their conclusions either as Categorical conclusion or Strength of support (SoS) conclusion types and that they address source, activity, and offence level issues in their conclusions. The content analysis indicates deficiencies in DF reporting practices, and several of the challenges seem to be shared with other FS disciplines. The analysis of certainty expressions showed that a plethora of expressions was used, and that they lacked reference to an established framework. The results indicate that more research on DF evaluation and reporting practices is necessary and justifies a need for enhanced focus on quality control and peer review within the DF discipline.",61,5,586,596,Psychology; Relevance (law); Content analysis; Opinion evidence; Quality (business); Credibility; Categorical variable; Certainty; Applied psychology; Digital forensics,Certainty expressions; Conclusion types; Digital Forensics; Forensic Science; Opinion evidence; Reporting practices,Forensic Medicine; Forensic Sciences/methods; Humans; Peer Review; Quality Control,,,https://www.sciencedirect.com/science/article/pii/S1355030621000939 https://www.ncbi.nlm.nih.gov/pubmed/34482939,http://dx.doi.org/10.1016/j.scijus.2021.06.010,34482939,10.1016/j.scijus.2021.06.010,3174820259,,0,002-288-892-034-343; 003-168-641-529-165; 004-652-388-189-304; 005-715-450-998-72X; 010-963-610-208-920; 018-182-926-340-45X; 019-407-699-112-721; 023-848-663-068-771; 024-303-555-608-167; 030-178-593-043-926; 058-717-000-287-105; 060-255-062-097-751; 064-549-392-650-90X; 064-814-734-852-283; 067-505-834-517-458; 071-616-341-516-576; 073-790-480-897-758; 079-233-866-287-529; 083-486-398-213-608; 091-694-294-283-771; 092-283-444-951-14X; 099-377-733-522-116; 101-549-415-202-81X; 103-636-086-365-041; 129-505-938-088-958; 136-503-503-059-765; 138-369-427-159-841; 141-366-693-391-357; 142-790-196-752-819; 153-185-768-708-340; 173-145-269-859-717; 182-670-398-460-931; 189-064-913-996-787,3,true,cc-by-nc-nd,hybrid 143-427-291-811-40X,Ten years of computer forensic tool testing,2014-01-28,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Barbara Guttman; James R. Lyle; Richard P. Ayers,"Barbara Guttman, James R. Lyle and Richard Ayers give an overview of the Computer Forensic Tool Testing project at the National Institute of Standards and Technology, setting out the test procedures, criteria and test data sets for computer forensic software tools, together with a brief illustration of some of the failures that they encounter that can affect digital evidence.",8,0,,,Forensic science; Test data; Data science; Software; Digital evidence; Test procedures; Computer science; Guttman scale,,,,,http://journals.sas.ac.uk/deeslr/article/view/1963/1900 https://journals.sas.ac.uk/deeslr/article/view/1963 https://sas-space.sas.ac.uk/5550/,http://dx.doi.org/10.14296/deeslr.v8i0.1963,,10.14296/deeslr.v8i0.1963,1976187906,,0,,5,true,cc-by-nc-nd,hybrid 143-467-824-641-527,Windows registry harnesser for incident response and digital forensic analysis,2018-12-18,2018,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Avinash Singh; Hein S. Venter; Adeyemi Richard Ikuesan,"The extraction of digital evidence from storage media is a growing concern in digital forensics, due to the time and space complexity in acquiring, preserving and analysing digital evidence. Micros...",52,3,337,353,Information retrieval; Windows Registry; Digital evidence; Incident response; Digital forensic investigation; Computer science; Digital forensics,,,,,https://repository.up.ac.za/handle/2263/68290 https://www.tandfonline.com/doi/full/10.1080/00450618.2018.1551421,http://dx.doi.org/10.1080/00450618.2018.1551421,,10.1080/00450618.2018.1551421,2904398394,,0,001-960-134-177-077; 010-400-879-519-423; 040-393-580-637-973; 043-112-794-493-421; 046-527-367-793-765; 052-859-404-222-610; 055-416-156-661-003; 059-176-636-138-196; 071-953-659-705-163; 074-030-202-389-635; 080-585-092-668-778; 091-011-436-489-252; 118-347-856-286-336; 139-495-561-188-858,10,false,, 143-664-346-231-12X,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,38,,301291,301291,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00209-2,,10.1016/s2666-2817(21)00209-2,,,0,,0,true,,bronze 144-763-618-319-855,Digital evidence experts in the law enforcement community: understanding the use of forensics examiners by police agencies,2021-01-07,2021,journal article,Security Journal,09551662; 17434645,Palgrave Macmillan Ltd.,United States,Scott H. Belshaw; Brooke Nodeland,"Mobile phones are often used in criminal enterprises as well as by individual offenders. In criminal cases, almost 80–90% of the cases criminal computer forensic examiners work on are related to child pornography (Nodeland et al. J Crim Justice Educ 30:71–90, 2018). In an effort to fight electronic crime and to collect digital evidence for criminal acts, law enforcement agencies are incorporating the collection of tools for analysis of digital evidence, also known as computer forensics, into their law enforcement infrastructure. Police agencies are challenged with the need to train officers to collect digital evidence and keep up with large and evolving technologies such as computer operating systems and cell phone technologies. Digital evidence is now being used to prosecute all types of crimes. Skilled officers and examiners are needed to examine this critical need in the criminal justice system. This research surveyed 59 (N = 59) Texas police agencies in their use of digital forensic examiners. The findings reflect that numerous agencies often use a part-time police officer/examiner to investigate the digital evidence that comes into the agency that can limit the expertise in the agency. Implications for this research are discussed.",,,1,15,Criminal justice; Agency (sociology); Political science; Justice (ethics); Child pornography; Law enforcement; Digital evidence; Public relations; Computer forensics; Digital forensics,,,,,https://link.springer.com/article/10.1057/s41284-020-00276-w,https://link.springer.com/article/10.1057/s41284-020-00276-w,,,3120397426,,0,004-260-804-798-107; 006-638-571-383-289; 012-314-515-683-048; 013-568-618-083-770; 015-875-327-892-861; 026-918-579-601-799; 036-754-354-530-672; 037-793-667-167-120; 044-274-107-809-614; 049-223-763-769-747; 064-150-889-060-337; 067-844-385-207-96X; 073-313-808-035-835; 074-971-049-279-863; 078-327-902-374-330; 085-222-802-372-082; 096-867-891-629-069; 106-215-046-097-04X; 108-837-763-480-251; 112-518-746-315-963; 114-955-439-966-393; 119-531-502-608-218; 164-392-011-156-848; 165-956-283-954-04X,0,false,, 145-706-153-221-342,COMPUTER FORENSIC PROJECTS FOR ACCOUNTANTS,,2015,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Grover S. Kearns,"Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers a set of exercises to provide an introduction to obtaining and analyzing data with forensics software that are available free online. In most cases, figures of important steps are provided. Educators will benefit when developing the course learning goals and curriculum.",10,3,7,34,Data security; World Wide Web; Analytical skill; Element (criminal law); Software; Forensic accounting; Computer science; Curriculum; Engineering ethics; Computer forensics; Digital forensics,,,,,https://doi.org/10.15394/jdfsl.2015.1203 https://commons.erau.edu/jdfsl/vol10/iss3/1/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1203&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2015.1203,,10.15394/jdfsl.2015.1203,2165428869,,0,008-598-808-594-324; 013-528-274-906-318; 019-831-293-743-518; 023-038-026-507-343; 037-935-317-887-33X; 042-419-321-697-627; 051-051-291-274-255; 070-101-051-160-111; 159-099-378-533-087; 165-770-474-971-736; 199-172-967-270-034,0,true,cc-by-nc,gold 146-021-806-272-345,A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics,,2019,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Reza Montasari; Victoria Carpenter; Richard Hill,"Compared to other well-established scientific fields computer forensics (CF) is still evolving as a new scientific field. CF lacks standardisation in various aspects including process models, datasets, procedures, techniques, and formal research methodologies. Consequently, progress in the establishment of CF as a scientific field has been hindered. Therefore, this paper aims to address one of such issues concerning the lack of standardisation, namely the absence of formal research methods in CF. Our study adds to the body of knowledge by filling the gap that there does not currently exist a well-established research methodology in CF. To this end, we borrow a well-established research methodology from the domain of IS, namely Peffers et al.'s (2006), adapt and extend it and make it relevant to research studies in CF. Our study sets a precedent for other researchers to identify, adapt, extend and apply other well-established research methods to studies in CF.",11,2,194,224,Domain (software engineering); Information system; Body of knowledge; Road map; Data science; Design science research; Computer science; Process (engineering); Computer forensics; Digital forensics,,,,,http://cronfa.swan.ac.uk/Record/cronfa54931 https://doi.org/10.1504/IJESDF.2019.098784 https://pure.hud.ac.uk/en/publications/a-road-map-for-digital-forensics-research-a-novel-approach-for-es https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2019.098784 https://ray.yorksj.ac.uk/id/eprint/3051/ https://cronfa.swan.ac.uk/Record/cronfa54931 https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf11.html#MontasariCH19 https://core.ac.uk/download/237461123.pdf,http://dx.doi.org/10.1504/ijesdf.2019.098784,,10.1504/ijesdf.2019.098784,2886461126,,0,,3,true,,green 146-159-881-844-536,Prelim iii - Contents List,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,41,,301412,301412,Computer science; Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00093-2,,10.1016/s2666-2817(22)00093-2,,,0,,0,true,,bronze 146-240-425-087-023,Column: The Science of Digital Forensics: Analysis of Digital Traces,2012-09-30,2012,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Fred Cohen,"In part 1 of this series (Cohen, 2011a), Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces. “Input sequences to digital systems produce outputs and state changes as a function of the previous state. To the extent that the state or outputs produce stored and/or captured bit sequences, these form traces of the event sequences that caused them. Thus the definition of a trace may be stated as: ""A set of bit sequences produced from the execution of a finite state machine."" (see PDF for full column)",7,3,5,12,Column (database); Finite-state machine; Set (abstract data type); Programming language; Trace (semiology); Computer science; State (computer science); Event (computing); Theoretical computer science; Digital forensics; Process (computing),,,,,https://doaj.org/article/690f42ad727049e29923116d47600484,https://doaj.org/article/690f42ad727049e29923116d47600484,,,2103182465,,0,,0,true,cc-by-nc,gold 146-351-183-180-613,Analysis of Digital Forensic Evidence on Email Delivery Crime,2017-02-25,2017,journal article,Applied Science and Technology,25794086,,,Evans Fuad; null Hasanuddin; Ardi Nugraha,"Digital forensics is the application of science and computer technology to carry out the examination and analysis of electronic evidence and digital evidence in its association with crime. Technically, tech crimes can be divided into off-line crime, semi on-line crime, and cyber crime. Each has its own characteristics, but the main difference between them is the connectedness of public information network (internet). One of the example is defamation via e-mail, to solve these cases the need for an information that can give clues and needed some software for acquisitions or analysis of the evidence in order to get a trace or information that can be used as evidence and accountable in the court. software used is FTK (forensic toolkit), Autopsy, USBwrite Blocker, Hashcalc.",1,1,53,58,Internet privacy; The Internet; Engineering; Social connectedness; Trace (semiology); Software; Digital evidence; Computer technology; Computer forensics; Digital forensics,,,,,https://www.estech.org/index.php/IJSAT/article/view/10 http://www.estech.org/index.php/IJSAT/article/download/10/pdf_1,https://www.estech.org/index.php/IJSAT/article/view/10,,,2625026711,,0,,0,false,, 146-445-364-945-053,Cryptocurrency and the Blockchain: A Discussion of Forensic Needs,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Douglas A. Orr; Drew M. Lancaster,,7,4,420,435,Cryptocurrency; Blockchain; Computer security; Computer science,,,,,http://sdiwc.net/digital-library/cryptocurrency-and-the-blockchain-a-discussion-of-forensic-needs,http://sdiwc.net/digital-library/cryptocurrency-and-the-blockchain-a-discussion-of-forensic-needs,,,2957736131,,0,,0,false,, 146-449-968-597-756,.Txtual Forensics,2015-12-04,2015,journal article,Textual Cultures,19337418; 15592936,IUScholarWorks,,Matthew Kirschenbaum,"This appreciative essay explores David Greetham’s notions of “textual forensics” in light of new forms of textual analytics practiced upon born-digital materials. It argues that computers and computational environments ask us to rethink basic evidentiary categories, i.e. “internal” vs. “external,” as well as such concepts as normality, agency, and intentionality in relation to textual criticism. In the process—through a forensic examination of one specific piece of digital media—we also learn something about David’s own personal computing habits.",9,1,55,64,Agency (philosophy); Relation (database); Intentionality; Criticism; Epistemology; Normality; Computer forensics; Computer science; Sociology; Digital forensics; Psychology; Literature; Art; Philosophy; Social psychology; Computer security; Database,,,,,,http://dx.doi.org/10.14434/tc.v9i1.20115,,10.14434/tc.v9i1.20115,,,0,,0,false,, 146-651-722-674-271,Digital Forensic and Distributed Evidence,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Emmanuel Kpakpo Brown,"Digital Forensics investigation is the science and legal process of investigating computer/cybercrimes and digital media or objects to gather evidence. This new and fast evolving field encompasses computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics; and for this reason have digital evidence distributed widely when the need arises for crime prosecution. Digital evidence must be authentic, accurate, complete, and convincing to the jury for legal admissibility at the court of law. In many instances due to the distributed nature of digital forensic evidence and the legal procedures to be adhered to in evidence gathering at a digital crime scene, presenting at the law courts have proven to be challenging and in some instances inadmissible. Following legal procedures in evidence gathering at a digital crime scene is critical for admissibility and prosecution. This paper aims to discuss digital forensics investigations jurisprudence in relation to distributed digital evidence. For the study to be relevant to policy and practice, forensic tools and frameworks, legal and ethical obligations, and digital evidence handling and admissibility are highlighted. This paper does not follow any forensic investigations process; but rather discusses the need for development and implementation of unique frameworks that could be utilised to gather distributed digital evidence required for admissibility in court. Keywords - Digital forensics investigations; Digital evidence; Jurisprudence BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Emmanuel Kpakpo Brown (2022): Digital Forensic and Distributed Evidence Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 357-362 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P57",1,1,357,362,Digital evidence; Digital forensics; Computer forensics; Nexus (standard); Computer science; Computer security; Network forensics; Process (computing); Jurisprudence; Data science; Law; Internet privacy; Political science; Embedded system; Operating system,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p57,,10.22624/aims/crp-bk3-p57,,,0,,0,true,,bronze 146-950-696-881-567,High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks,2022-03-01,2022,journal article,IEEE Transactions on Network Science and Engineering,23274697; 2334329x,Institute of Electrical and Electronics Engineers (IEEE),United States,Ruohan Meng; Qi Cui; Zhili Zhou; Zhetao Li; Q. M. Jonathan Wu; Xingming Sun,,9,2,848,862,,,,,National Key Research and Development Program of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; Jiangsu Basic Research Programs Natural Science Foundation; Jiangsu Basic Research Programs Natural Science Foundation; Priority Academic Program Development of Jiangsu Higher Education Institutions; Collaborative Innovation Center of Atmospheric Environment and Equipment Technology; Postgraduate Research & Practice Innovation Program of Jiangsu Province; Research Startup Foundation of NUIST,,http://dx.doi.org/10.1109/tnse.2021.3137829,,10.1109/tnse.2021.3137829,,,0,,0,false,, 147-434-307-975-304,Mobile Digital Forensics Framework for Smartphone User Analysis,2022-01-20,2022,journal article,Webology,1735188x,NeuroQuantology Journal,"Iran, Islamic Republic of",Sang Young Lee,"Blockchain-based digital forensics technology is an efficient way to prevent forgery/modulation of evidence including collecting and analyzing evidential data using the technology in compliance with smartphone forensics procedures after a smartphone is seized. Moreover, the use of large-capacity storage devices and various digital devices have become a realistic solution for its development of IT in situations where the existing digital forensics analysis methods are regarded as limitations. This paper analyzed user’s status on smartphone application and implemented a smartphone user analysis framework that may extract significant digital evidence in a digital forensic way based on a blockchain perspective. In this paper researched a system that may provide important information to digital forensic analysts through these frameworks. It is expected that the proposed system will be expanded by much more structured data and online unstructured data such as SNS reports.",19,1,4335,4351,Digital forensics; Computer science; Digital evidence; Perspective (graphical); Network forensics; Computer security; Mobile device; Computer forensics; Smartphone application; World Wide Web; Multimedia; Data science,,,,,,http://dx.doi.org/10.14704/web/v19i1/web19285,,10.14704/web/v19i1/web19285,,,0,,0,true,cc-by-nc-nd,gold 147-546-528-129-204,SIFT Multi-Purpose Forensic Operating System For Digital Forensic Process.,2022-07-23,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Francis Wodugah,"The number of cyber incidents in which computer system or device is currently increasing every day. This requiring the opening up of forensic investigations in to multi-purpose forensic operating system for digital forensic process, a research that can shed light on what has occurred, In order to be able to provide investigators with proper solutions. for performing complete and efficient examinations in this new environment, operating systems platform and devices are being studied from a forensic perspective so that tools and procedures can be designed accordingly Keywords: Forensic Investigations, Cyber Forensic, Multi-Purpose Forensic Operating.",1,1,55,58,Forensic science; Digital forensics; Computer science; Process (computing); Computer forensics; Computer security,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p9,,10.22624/aims/crp-bk3-p9,,,0,,0,true,,bronze 147-988-605-182-606,Basic aspects concerning the evidence aquisition in digital forensic analysis,2015-07-10,2015,journal article,Forum Criminalistic / Forensic Science Forum,18442641,European Association of Scientific Research,,Cezara Craciunescu,,8,17 (1/2015),,,Digital evidence; Digital forensics; Forensic science; Computer science; Psychology; Data science; Computer security; History; Archaeology,,,,,,http://dx.doi.org/10.18283/forum.viii.17.12015.315,,10.18283/forum.viii.17.12015.315,,,0,,0,false,, 148-456-164-437-392,Analyzing Cyber Trends in Online Financial Frauds using digital Forensics Techniques,2020-07-30,2020,journal article,International Journal of Innovative Technology and Exploring Engineering,22783075,Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP,,Simran Koul*; Yash Raj; Simriti Koul,"Online financial frauds are one of the leading issues in the fields of digital forensics and cyber-security today. Various online firms have been employing several methodologies for the prevention of finance-related malpractices. This domain of criminal activity is becoming increasingly common in the present cyberspace. In this paper, we will try to implement an online financial fraud investigation using the digital forensics tool: Autopsy. A few existing cyber-security techniques for the investigation of such crimes, namely the Formal Concept Analysis and Confirmatory Factor Analysis; have been analyzed and reviewed. These techniques are primarily based on mathematical cyber-security concepts. Henceforth, it has been tried to find out whether the investigation of similar crimes can be done satisfactorily using the readily-accessible digital forensics tool: Autopsy. Also, it has been explored whether the aforementioned cyber-security techniques can be embedded along with the digital forensics tool to achieve the best results, through training a bot to automatically perform accurate investigations of such crimes. Thus, it has been tried to automate the process of online financial fraud investigation.",9,9,446,451,Cyberspace; Digital forensics; Computer forensics; Computer science; Cyber crime; Computer security; Process (computing); Domain (mathematical analysis); Cybercrime; Data science,,,,,,http://dx.doi.org/10.35940/ijitee.i7185.079920,,10.35940/ijitee.i7185.079920,,,0,,0,true,,gold 148-500-781-775-122,PeekaTorrent: Leveraging P2P hash values for digital forensics,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Sebastian Neuner; Martin Schmiedecker; Edgar Weippl,"Abstract Sub-file hashing and hash-based carving are increasingly popular methods in digital forensics to detect files on hard drives that are incomplete or have been partially overwritten/modified. While these techniques have been shown to be usable in practice and can be implemented efficiently, they face the problem that a-priori specific “target files” need to be available and at hand. While it is always feasible and, in fact, trivial to create case-specific sub-file hash collections, we propose the creation of case-independent sub-file hash databases. For facilitating hash databases which can be publicly shared among investigators, we propose the usage of data from peer-to-peer file sharing networks such as BitTorrent. Most of the file sharing networks in use today rely on large quantities of hash values for integrity checking and chunk identification, and can be leveraged for digital forensics. In this paper we show how these hash values can be of use for identifying possibly vast amounts of data and thus present a feasible solution to cope with the ever-increasing case sizes in digital forensics today. While the methodology used is independent of the used file sharing protocol, we harvested information from the BitTorrent network. In total we collected and analyzed more than 3.2 billion hash values from 2.3 million torrent files, and discuss to what extent they can be used to identify otherwise unknown file fragments and data remnants. Using open-source tools like bulk_extractor and hashdb, these hash values can be directly used to enhance the effectiveness of sub-file hashing at scale.",18,,S149,S156,Hash chain; Double hashing; Hash list; SHA-2; Merkle tree; Hash tree; Torrent file; Computer science; Database; Hash function,,,,Austrian Research Promotion Agency (FFG),https://cyberleninka.org/article/n/865439 https://cyberleninka.org/article/n/865439.pdf https://www.sciencedirect.com/science/article/pii/S1742287616300445 https://doi.org/10.1016/j.diin.2016.04.011 https://core.ac.uk/display/82223047 https://core.ac.uk/download/pdf/82223047.pdf,http://dx.doi.org/10.1016/j.diin.2016.04.011,,10.1016/j.diin.2016.04.011,2525607610,,0,007-455-522-527-690; 010-985-077-415-59X; 017-790-269-405-50X; 018-304-870-600-752; 019-175-479-295-992; 020-102-151-624-738; 026-564-773-645-052; 029-159-400-662-132; 036-884-542-282-034; 047-630-600-014-492; 054-182-695-649-382; 061-317-181-338-930; 066-764-363-673-55X; 085-138-340-371-322; 085-214-277-668-01X; 099-309-660-717-953; 102-692-377-462-124; 122-880-373-616-302; 128-940-875-499-986; 130-750-724-951-650; 131-516-331-360-906; 134-927-490-231-285; 167-681-711-973-339; 168-211-791-741-422; 177-654-940-586-315,2,true,cc-by-nc-nd,hybrid 148-617-284-942-187,Decision-theoretic file carving,,2017,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Pavel Gladyshev; Joshua I. James,,22,,46,61,Decision problem; World Wide Web; Completeness (order theory); JPEG; Information retrieval; File carving; Carving; Resource constraints; Computer science; Digital forensics; Reduction (complexity),,,,,https://doi.org/10.1016/j.diin.2017.08.001 https://dblp.uni-trier.de/db/journals/di/di22.html#GladyshevJ17 http://www.sciencedirect.com/science/article/pii/S1742287617301329 https://www.sciencedirect.com/science/article/abs/pii/S1742287617301329,http://dx.doi.org/10.1016/j.diin.2017.08.001,,10.1016/j.diin.2017.08.001,2746531026,,0,003-982-227-180-136; 004-652-388-189-304; 005-831-171-574-471; 015-537-933-151-383; 018-304-870-600-752; 023-341-419-324-638; 041-055-817-137-745; 043-093-846-816-675; 082-440-435-702-102; 087-950-081-760-226; 090-752-043-508-733; 092-237-744-940-330; 094-295-279-676-447; 114-862-246-585-217; 122-474-821-859-110; 126-591-597-706-715; 145-062-913-009-934; 162-485-003-594-995,11,false,, 148-968-873-601-051,IMPORTANCE OF NETWORK DEVICES AND THEIR SECURE CONFIGURATIONS AT DIGITAL FORENSICS,2013-07-30,2013,journal article,Engineering Sciences,1308 7231,,,Fatih Ertam; Turker Tuncer; Engin Avci,"Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. Network forensics is a sub-branch of digital forensics. Network device forensics is also a sub-branch of network digital forensics. Forensic IT applications and examination of suspicious users` personal computers to be copied to all of the data alone is not sufficient for the determination of guilt or innocence. Users before the event and during the event is logged on the network traffic to be carried out is important. These records are necessary to preserve the security measures on the network devices, the devices required by the user on the network can not use, the internet user`s IP address and MAC address of the output to be significant, the user attempts to disrupt the functioning of the network is very important in minimizing. Users, network devices must not interfere with the records. In this study, as well as to facilitate network forensics investigations on network devices to improve network security configuration settings to be discussed.",8,3,171,181,The Internet; Engineering; Network Access Control; Networking hardware; Network security; MAC address; Computer security; Network forensics; Event (computing); Digital forensics,,,,,http://www.newwsa.com/makale_detay_ozet_bilgiler.asp?d=1&makale_detay_id=3273&makale_upload_id=11563&islem_turu=0 http://dergipark.ulakbim.gov.tr/nwsaeng/article/view/5000066813/5000062187,http://www.newwsa.com/makale_detay_ozet_bilgiler.asp?d=1&makale_detay_id=3273&makale_upload_id=11563&islem_turu=0,,,2333416154,,0,,0,false,, 149-337-279-544-141,An Overview of Data Extraction Techniques of Mobile Device,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Ashish Suthar,,,,,,Mobile device; Data extraction; Computer science; Computer hardware,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.16,http://dx.doi.org/10.46293/4n6/2020.02.03.16,,10.46293/4n6/2020.02.03.16,3096130804,,0,,0,false,, 149-440-914-154-448,Prelim i - Editorial Board,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,33,,301045,301045,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30334-6,,10.1016/s2666-2817(20)30334-6,,,0,,0,false,, 149-758-552-549-038,Cloud-Based Framework for Performing Digital Forensic Investigations,2022-07-04,2022,journal article,International Journal of Wireless Information Networks,10689605; 15728129,Springer Science and Business Media LLC,United States,Vijay Prakash; Alex Williams; Lalit Garg; Pradip Barik; Rajesh Kumar Dhanaraj,"Cloud computing has created paradigm transitions from traditional computing. Acquisition rates increase with benefits such as lower costs and better utilization of resources. However, these benefits are accompanied by some of the challenges of computer forensics practice. The complexity of the Cloud computing, its key features, and its implementation all present several challenges for computer forensic researchers. In this paper, two surveys have been conducted to collect Cloud computing/forensic recommendations. The impact assessment (survey 1) has been conducted to determine the nature and extent of the impact of Cloud computing on computer forensics. A total of 104 Cloud Computing-based or computer forensics-based responses have been collected. Based on the impact assessment results, a Cloud-based framework has been proposed to assist in the fight against global digital crime, especially those committed within the cloud environment, bringing it with the challenges of law enforcement and digital forensic professionals. The proposed framework contains a set of guidelines and a cloud-based forensics model. In addition, the proposed framework will assist in the investigation. It is thought that criminals use the complexity of the cloud to hide strong and obvious evidence away from investigators and thus avoid prosecution and sentencing. In addition, this study identifies limitations and research gaps in existing solutions. The framework has been then validated with an online survey (survey 2) focused on 20 cloud computing or computer forensics experts. The result of study 1 confirms the impact of cloud computing on computer forensics. Further, it indicates that environmental factors and structures such as distributed storage, high recruitment, and virtualization have posed various challenges to the digital forensics process. In addition, the result concludes that the proposed framework addresses many of the issues and challenges discussed at a particular level of efficiency and effectiveness.",,,,,Cloud computing; Digital forensics; Computer science; Digital evidence; Computer forensics; Law enforcement; Computer security; Data science; Network forensics; Cybercrime; Cloud computing security,,,,,,http://dx.doi.org/10.1007/s10776-022-00560-z,,10.1007/s10776-022-00560-z,,,0,000-566-000-503-971; 001-582-154-824-328; 001-893-584-671-77X; 002-288-358-355-198; 003-642-671-730-64X; 004-942-595-617-530; 008-308-597-135-954; 008-589-433-282-265; 009-945-925-742-082; 011-367-436-492-537; 011-972-444-921-827; 013-568-618-083-770; 014-127-277-237-390; 015-654-094-120-991; 016-550-890-218-383; 018-176-630-610-077; 018-948-094-812-86X; 019-698-064-288-240; 021-014-524-429-705; 023-858-572-607-02X; 024-462-843-796-80X; 025-019-480-061-555; 026-926-997-253-117; 028-290-062-141-840; 029-200-392-412-396; 032-176-657-149-732; 034-872-896-955-434; 037-320-586-379-973; 047-386-524-667-691; 047-748-955-171-36X; 053-731-227-547-943; 060-971-363-644-947; 061-414-916-530-216; 062-486-998-356-491; 071-644-146-903-042; 075-895-669-363-649; 076-889-170-335-628; 077-532-025-251-756; 091-381-973-315-491; 091-420-789-124-328; 091-540-399-535-662; 095-691-114-276-825; 095-804-279-876-042; 098-748-261-333-651; 116-288-436-546-314; 118-838-969-146-870; 131-923-136-263-017; 134-927-490-231-285; 136-798-153-498-59X; 139-894-097-165-561; 144-124-797-675-052; 147-175-496-906-928; 148-732-709-522-772; 154-014-516-026-896,0,false,, 149-934-631-443-119,A mathematical approach to NAND flash-memory descrambling and decoding,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Jan Peter van Zandwijk,,12,,41,52,Error detection and correction; NAND gate; Code (cryptography); Parallel computing; Scrambling; Cyclic code; Flash (photography); Computer science; BCH code; Decoding methods; Computer hardware,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287615000043 http://www.sciencedirect.com/science/article/pii/S1742287615000043 https://dblp.uni-trier.de/db/journals/di/di12.html#Zandwijk15,http://dx.doi.org/10.1016/j.diin.2015.01.003,,10.1016/j.diin.2015.01.003,2078023065,,0,007-918-160-435-809; 023-114-150-053-694; 033-027-137-279-186; 074-933-143-629-826; 075-638-759-979-271; 086-288-023-774-224; 117-022-631-068-897; 140-792-335-288-478,11,false,, 150-042-119-479-43X,Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,2018-11-29,2018,journal article,Scientific Journal of Informatics,24600040; 24077658,Universitas Negeri Semarang,," Riadi; Anton Yudhana; Muhamad Caesar Febriansyah Putra","The growth of Android-based smartphone users to access media in communicating using Instagram social media is very fast. Activities are carried out when using Instagram social media in communicating to share information such as sending chat texts and pictures. A large number of Instagram users make this application vulnerable to abuse of Instagram such as pornography crimes from Instagram users. This case can be forensic to get digital evidence in the form of chat text and pictures from Instagram messenger is a feature of Instagram. The investigation in this study uses the National Institute of Standards and Technology (NIST) method which provides several stages of collecting, examining, analyzing, reporting while forensic tools use forensic oxygen and axiom magnets. The results of the recovery and comparison of data result using Oxygen forensics and Axiom Magnets obtained digital evidence in the form of data in the form of images and chat. The data obtained by Magnet Axiom is 100% while forensic oxygen is 84%. These data are the results of the performance of both forensic applications in obtaining digital evidence that has been deleted from the Instagram messenger.",5,2,235,247,NIST; World Wide Web; Pornography; Digital evidence; Computer science; Social media; Android (operating system),,,,,https://journal.unnes.ac.id/nju/index.php/sji/article/view/16545 https://journal.unnes.ac.id/nju/index.php/sji/article/download/16545/pdf,http://dx.doi.org/10.15294/sji.v5i2.16545,,10.15294/sji.v5i2.16545,2907516871,,0,006-700-167-776-341; 016-039-721-963-229; 039-626-669-719-288; 055-473-899-043-485; 070-740-822-724-693; 087-287-435-836-200; 131-874-028-513-738; 162-814-268-960-713; 177-580-843-965-429; 187-108-280-798-543; 188-509-533-602-208,8,true,cc-by,gold 150-681-841-306-967,Digital forensics: you can run but you can't hide: conference tutorial,2015-04-01,2015,journal article,Journal of Computing Sciences in Colleges,19374763,,,Bilal Shebaro,"Digital crimes, such as identity theft, child pornography, denial of service attacks, insider threats, phishing, and other cyber-crimes are now a fact of life. As computers and digital devices are becoming a valuable resource of evidence in many physical and digital crimes, proper handling of forensic investigations become a key in fighting back against such crimes. Therefore, understanding digital forensics and how digital forensic investigations should be carried out is an essential process to learn by IT and other law enforcement personnel in every organization, as they will eventually deal with cyber-crimes. Such learning essentials are necessary for detection and prevention of crime and in any dispute where evidence is stored digitally. This tutorial will explain and discuss the major phases of digital investigation; the practice of gathering digital evidence (Acquisition), examining data and extracting evidence (Analysis), and documenting evidence and key information (Reporting). In addition, it will include a hands-on and practical exercise on how digital investigation is carried; mainly focusing on the practice of memory forensics, as it is the most fruitful and interesting part of digital forensics. By learning how to capture computer memory and profile its contents, the audience will gain an invaluable resource on how to examine data and extract evidence from tested machines, and in our case, machines infected with malware. Tools used in digital investigations need to be forensically sound so they can obtain reliable data as evidence. This tutorial will explain how a tool can qualify to be forensically sound and will discuss some of the forensic tools offered in BackTrack and CAINE as an example of forensics-based operating systems. In addition, we will apply our digital investigation and memory forensics on the SANS Investigative Forensic Toolkit (SIFT), mainly using the Volatility framework. SIFT, written by an international team of forensics experts, is a free toolkit that matches any modern forensic tool suite with cutting-edge open-source tools. All of our tool examinations and experiments will be performed on virtual machines. This tutorial will provide an overview of digital forensics and give the audience a taste of how digital investigations run. Therefore, the intended audience for this tutorial is people curious to know about the digital forensics process. Even though this tutorial serves as an overview of the digital forensics science, it can also serve as a good start for faculty interested in integrating such topic in their Computer Security classes or as its own Digital Forensics course.",30,4,46,46,Forensic science; Data science; Memory forensics; Law enforcement; Digital evidence; Computer science; Identity theft; Malware; Resource (project management); Phishing; Digital forensics,,,,,http://dl.acm.org/citation.cfm?id=2752628.2752637,http://dl.acm.org/citation.cfm?id=2752628.2752637,,,2992792080,,0,,0,false,, 150-957-964-090-611,Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving,2012-10-23,2012,journal article,International Journal of Digital Curation,17468256,Edinburgh University Library,,Yunhyong Kim; Seamus Ross,"In this paper we discuss archival storage container formats from the point of view of digital curation and preservation, an aspect of preservation overlooked by most other studies. Considering established approaches to data management as our jumping off point, we selected seven container format attributes that are core to the long term accessibility of digital materials. We have labeled these core preservation attributes. These attributes are then used as evaluation criteria to compare storage container formats belonging to five common categories: formats for archiving selected content (e.g. tar, WARC), disk image formats that capture data for recovery or installation (partimage, dd raw image), these two types combined with a selected compression algorithm (e.g. tar+gzip), formats that combine packing and compression (e.g. 7-zip), and forensic file formats for data analysis in criminal investigations (e.g. aff – Advanced Forensic File format). We present a general discussion of the storage container format landscape in terms of the attributes we discuss, and make a direct comparison between the three most promising archival formats: tar, WARC, and aff. We conclude by suggesting the next steps to take the research forward and to validate the observations we have made.",7,2,21,39,Container (abstract data type); Digital curation; Web archiving; Digital preservation; Computer science; Image file formats; Database; Data compression; Digital forensics; File format,,,,,http://www.ijdc.net/index.php/ijdc/article/download/217/286 https://dblp.uni-trier.de/db/journals/ijdc/ijdc7.html#KimR12 http://eprints.gla.ac.uk/79800/ http://www.ijdc.net/index.php/ijdc/article/view/217 http://eprints.gla.ac.uk/79800/1/79800.pdf https://doaj.org/article/dc9449a8a7b6440785206318421de124 https://core.ac.uk/display/16458809 https://core.ac.uk/download/pdf/296152550.pdf,http://dx.doi.org/10.2218/ijdc.v7i2.227,,10.2218/ijdc.v7i2.227,2062133553,,0,017-215-239-686-426; 024-216-399-693-64X; 024-775-073-655-919; 025-421-213-608-128; 051-457-536-845-758; 056-211-020-434-992; 126-176-453-947-183; 133-053-709-996-16X; 152-008-550-136-841; 168-394-204-709-730,3,true,cc-by,gold 151-680-718-283-212,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,37,,301259,301259,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00173-6,,10.1016/s2666-2817(21)00173-6,,,0,,0,true,,bronze 152-581-982-148-813,Privacy challenges in cyber security against cybercrime in digital forensic. A systematic literature review in Pakistan.,2021-09-15,2021,journal article,Journal of Computing & Biomedical Informatics,27101614; 27101606,Research Center of Computing and Biomedical Informatics,,null Omer Aziz; null M. Abdullah Siraj; null Abdul Rehman,"Cybercrime is a criminal activity that either target or uses a computer network or a network device. IOT become the biggest domain in these days.it is difficult to adopt digital forensics tools in IoT but somehow digital forensics play an important role in cyber security of IoT. Privacy and security challenges are increased day by day in digital forensics. Cybercrime in cyber security is increased day by day in digital forensics. Privacy and security are relate with each other but difference is that privacy relate to any right you have to control your personal information and how it’s used. Lots of work has been done in security issue but less focus on privacy. In the recent year, privacy in cyber security is the biggest challenge against cybercrime in digital forensics. To overcome these challenges of privacy in cyber security we must have deep knowledge which threats and attacks are harmful of our network.in this article we discuss the current privacy threats and attack for cybercrime in digital forensics with the deep knowledge and proposed classification matrix and also define proposed system which control threats and attacks. To the best of our knowledge there is no survey on privacy challenges in cyber security against cybercrime in digital forensics.",2,2,158,164,Cybercrime; Digital forensics; Computer security; Computer forensics; Internet privacy; Computer science; Digital evidence; Network forensics; Cyber crime; Information security,,,,,,http://dx.doi.org/10.56979/202/2021/31,,10.56979/202/2021/31,,,0,,0,true,,bronze 152-695-541-254-683,Study on the trend and characteristics of digital forensics,,2014,journal article,Automation and Instrumentation,,,,Jia Zhi-chen,"This paper will study the results from digital forensics definition, development, characteristics,summarized, in order to make the reader for digital forensics research methods, research characteristic and the direction of development, can have a more comprehensive understanding, providing reference for the related research.",,,,,Engineering; World Wide Web; Order (business); Digital evidence; Related research; Digital forensics,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZDYY201407006.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZDYY201407006.htm,,,2363132563,,0,,0,false,, 153-185-768-708-340,Structuring the Evaluation of Location-Related Mobile Device Evidence,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Eoghan Casey; David-Olivier Jaquet-Chiffelle; Hannes Spichiger; Elénore Ryser; Thomas Souvignet,"Abstract Location-related mobile device evidence is increasingly used to address forensic questions in criminal investigations. Evaluating this form of evidence, and expressing evaluative conclusions in this forensic discipline, are challenging because of the broad range of technological subtleties that can interact with circumstantial features of cases in complex ways. These challenges make this type of digital evidence prone to misinterpretations by both forensic practitioners and legal decision-makers. To mitigate the risk of misleading digital forensic findings, it is crucial to follow a structured approach to evaluation of location-related mobile device evidence. This work presents an evaluation framework widely used in forensic science that employs scientific reasoning within a logical Bayesian framework to clearly distinguish between, on the one hand, what has been observed (i.e., what data are available) and, on the other hand, how those data shed light on uncertain target propositions. This paper provides case examples to illustrate the advantages and difficulties of applying this approach to location-based mobile device evidence. This work helps digital forensic practitioners follow the principles of balanced evaluation and convey location-related mobile device evidence in a way that allows decision-makers to properly understand the relative strength of, and limitations in, digital forensic results.",32,,300928,,Criminal investigation; Mobile device; Data science; Structuring; Digital evidence; Scientific reasoning; Bayesian framework; Computer science; Circumstantial evidence; Digital forensics,,,,,https://serval.unil.ch/en/notice/serval:BIB_99D09A242835 https://www.sciencedirect.com/science/article/pii/S2666281720300238,http://dx.doi.org/10.1016/j.fsidi.2020.300928,,10.1016/j.fsidi.2020.300928,3029496844,,0,001-872-507-889-182; 006-106-790-585-940; 008-321-492-596-021; 009-512-003-529-193; 015-238-949-406-002; 019-831-293-743-518; 020-932-340-092-358; 024-131-573-638-521; 024-793-920-484-727; 025-273-020-668-018; 026-943-588-349-358; 027-669-021-337-265; 035-457-870-364-976; 036-017-937-159-609; 040-997-734-554-028; 050-296-813-523-597; 068-721-919-773-533; 069-906-125-551-995; 070-427-732-319-159; 075-518-198-327-92X; 082-676-890-491-344; 085-370-444-410-812; 099-407-105-258-080; 113-310-395-905-331; 123-400-070-960-457; 170-831-892-006-047; 172-357-540-521-552; 175-578-826-231-866; 181-826-022-794-521,3,true,cc-by-nc-nd,hybrid 154-076-720-609-283,Analysis of Digital Forensic Tools,2020-06-01,2020,journal article,Journal of Computational and Theoretical Nanoscience,15461955; 15461963,American Scientific Publishers,United States,Shaweta Sachdeva; B. L. Raina; Avinash Sharma,"This paper aims to analyze different tools for Forensic Data Analysis comes under the branch of Digital Forensics. Forensic data analysis is done with digital techniques. Digital forensics becomes more important in law enforcement, due to the large use of computers and mobile devices.; The pattern recognition system most appropriately fits into the Analysis Phase of the Digital Forensics. Pattern Recognition involves two processes. One Process is an analysis and the second process is recognition. The result of the analysis is taken out of the attributes from the patterns; to be recognized i.e., a pattern of different faces and fingerprints. These attributes are then utilized for the further process in the analysis phase which provides attention on various techniques of pattern recognition that are applied to digital forensic examinations and is proposed to; develop different forensic tools to collect evidence that would be helpful to solve specific types of crimes. This evidence further helps the examiner in the analysis phase of the digital forensic process by identifying the applicable data.",17,6,2459,2467,Data science; Digital forensics,,,,,https://www.ingentaconnect.com/content/asp/jctn/2020/00000017/00000006/art00007 https://ui.adsabs.harvard.edu/abs/2020JCTN...17.2459S/abstract,http://dx.doi.org/10.1166/jctn.2020.8916,,10.1166/jctn.2020.8916,3094127989,,0,005-974-814-807-485; 037-105-622-240-257; 064-531-736-566-934; 091-619-263-117-914,2,false,, 154-517-106-328-503,An automated timeline reconstruction approach for digital forensic investigations,,2012,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Christopher Hargreaves; Jonathan Patterson,"Existing work on digital forensics timeline generation focuses on extracting times from a disk image into a timeline. Such an approach can produce several million ‘low-level’ events (e.g. a file modification or a Registry key update) for a single disk. This paper proposes a technique that can automatically reconstruct high-level events (e.g. connection of a USB stick) from this set of low-level events. The paper describes a framework that extracts low-level events to a SQLite backing store which is automatically analysed for patterns. The provenance of any high-level events is also preserved, meaning that from a high-level event it is possible to determine the low-level events that caused its inference, and from those, the raw data that caused the low-level event to be initially created can also be viewed. The paper also shows how such high-level events can be visualised using existing tools.",9,,S69,S79,Timestamp; Automation; Data mining; Set (abstract data type); Event reconstruction; Visualization; Computer science; Timeline; Event (computing); Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/di/di9.html#HargreavesP12 http://dspace.lib.cranfield.ac.uk/bitstream/1826/8103/1/DFRWS_2012_RC5c.pdf https://www.sciencedirect.com/science/article/pii/S174228761200031X https://www.sciencedirect.com/science/article/abs/pii/S174228761200031X https://dspace.lib.cranfield.ac.uk/handle/1826/8103 https://core.ac.uk/display/19542424 https://dspace.lib.cranfield.ac.uk/bitstream/1826/8103/1/DFRWS_2012_RC5c.pdf,http://dx.doi.org/10.1016/j.diin.2012.05.006,,10.1016/j.diin.2012.05.006,2009229022,,0,000-537-535-465-34X; 012-649-691-693-493; 024-503-401-931-849; 054-507-171-824-189; 060-650-561-577-338; 064-170-716-528-26X; 087-690-831-820-163; 162-201-727-094-331; 177-965-894-694-179,95,true,cc-by-nc-nd,hybrid 154-718-497-162-213,Forensics Analysis of Router On Computer Networks Using Live Forensics Method,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Nita Hildayanti; Riadi,,8,1,74,81,Router; Live forensics; Computer network; Computer science; Wireless,,,,,http://sdiwc.net/digital-library/forensics-analysis-of-router-on-computer-networks-using-live-forensics-method,http://dx.doi.org/10.17781/p002559,,10.17781/p002559,2946054145,,0,008-073-276-328-495; 016-039-721-963-229; 047-558-436-316-283; 065-339-011-233-469; 092-171-631-621-799; 123-484-869-375-145; 147-586-557-677-337,3,false,, 154-729-674-764-578,Integrating Digital Forensics Techniques into Curatorial Tasks: A Case Study,2014-09-09,2014,journal article,International Journal of Digital Curation,17468256,Edinburgh University Library,,Sam Meister; Alexandra Chassanoff,"In this paper, we investigate how digital forensics tools can support digital curation tasks around the acquisition, processing, management and analysis of born-digital materials. Using a real world born-digital collection as our use case, we describe how BitCurator, a digital forensics open source software environment, supports fundamental curatorial activities such as secure data transfer, assurance of authenticity and integrity, and the identification and elimination of private and/or sensitive information. We also introduce a workflow diagram that articulates the processing steps for institutions processing born-digital materials. Finally, we review possibilities for further integration, development and use of digital forensic tools.",9,2,6,16,World Wide Web; Information sensitivity; Workflow; Data science; Digital curation; Open source software; Computer science; Data transmission; Identification (information); Digital forensics,,,,,https://www.mendeley.com/catalogue/32be5481-980d-35c2-b198-fca72f89ff55/ http://www.ijdc.net/index.php/ijdc/article/download/9.2.6/364 https://doaj.org/article/a444a368c1f54b6085aa5e20b1e23253 https://core.ac.uk/display/91790644 https://dx.doi.org/10.2218/ijdc.v9i2.325 http://www.ijdc.net/index.php/ijdc/article/view/9.2.6 https://core.ac.uk/download/pdf/162675816.pdf,http://dx.doi.org/10.2218/ijdc.v9i2.325,,10.2218/ijdc.v9i2.325,2058634680,,0,,2,true,cc-by,gold 155-250-068-040-504,Evaluation and Use the Forensic Financial and Economic Expertise's Results of Operations with Digital Assets,2022-05-09,2022,journal article,Courier of Kutafin Moscow State Law University (MSAL)),27826163; 23115998,Kutafin Moscow State Law University,,S. M. Kolotov,"The article considers the problem of assessment and use of the results of forensic financial and economic examination of transactions with digital assets, including those created using blockchain technology. The problems of assessing the competence of the forensic expert, as well as the peculiarities of assessing the expert opinion of the forensic financial and economic examination of transactions with digital assets created using blockchain technology were determined. The issue of suitability of objects used by the forensic expert in the course of these examinations is considered.",,2,143,149,Forensic accounting; Competence (human resources); Expert opinion; Forensic science; Digital forensics; Forensic examination; Blockchain; Computer science; Computer security; Finance; Business; Risk analysis (engineering),,,,,,http://dx.doi.org/10.17803/2311-5998.2022.90.2.143-149,,10.17803/2311-5998.2022.90.2.143-149,,,0,,0,true,,hybrid 155-282-926-860-477,Automated brain disease classification using exemplar deep features,,2022,journal article,Biomedical Signal Processing and Control,17468094; 17468108,Elsevier BV,Netherlands,Ahmet Kursad Poyraz; Sengul Dogan; Erhan Akbal; Turker Tuncer,,73,,103448,103448,Artificial intelligence; Computer science; Support vector machine; Preprocessor; Pattern recognition (psychology); Feature extraction; Feature (linguistics); Deep learning; Feature selection; Classifier (UML); Feature vector; Extractor; Philosophy; Linguistics; Process engineering; Engineering,,,,,,http://dx.doi.org/10.1016/j.bspc.2021.103448,,10.1016/j.bspc.2021.103448,,,0,002-387-036-562-112; 010-205-475-989-839; 012-006-273-954-516; 014-550-284-832-807; 018-479-140-242-871; 019-949-603-887-319; 021-003-243-940-183; 022-368-409-764-115; 025-986-195-101-697; 026-319-886-695-823; 027-027-458-821-602; 027-791-721-408-932; 030-600-759-246-610; 030-840-181-864-297; 032-574-671-060-973; 033-481-004-872-998; 042-222-040-967-193; 045-462-496-191-807; 049-310-240-219-856; 053-686-448-806-005; 055-613-739-931-602; 063-557-684-054-986; 070-837-480-766-076; 077-501-098-239-705; 078-487-322-397-854; 079-172-440-035-168; 115-593-892-742-778; 120-943-050-057-81X; 127-087-851-515-871; 141-436-270-134-130; 179-109-552-553-094,3,false,, 155-298-486-497-278,Survey : video forensic tools,2013-01-10,2013,journal article,Journal of theoretical and applied information technology,18173195,,,Ahmad Salehi Shahraki; Hamed Sayyadi; Mohamad Hussein Amri; Mehrnaz Nikmaram,"Due to extension of using CCTVs and the other video security systems in all areas, these sorts of devices have been introduced as the most important digital evidences to search and seizure crimes. Video forensics tools are developed as a part of digital forensics tools to analyze digital evidences and clear vague points of them for presenting in the courts Existing video forensics tools have been facilitated the investigation process by providing different features based on various video editing techniques. In this paper, some of the most popular video forensics tools are discussed and the strengths and shortages of them are compared and consequently, an alternative framework which includes the strengths of existing popular tools is introduced.",,,,,Economic shortage; Video editing; Analysis tools; Computer science; Process (engineering); Multimedia; Computer forensics; Digital forensics,,,,,https://eprints.qut.edu.au/74465/,https://eprints.qut.edu.au/74465/,,,758581677,,0,,3,false,, 155-382-013-507-319,Energy deviation measure: a technique for digital image forensics,,2018,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Surbhi Gupta; Neeraj Mohan; Parvinder Singh Sandhu,,10,4,401,401,Computer science; Measure (data warehouse); Digital forensics; Computer forensics; Cybercrime; Image (mathematics); Computer security; Digital image; Data science; Data mining; Artificial intelligence; Computer vision; Image processing; The Internet; World Wide Web,,,,,,http://dx.doi.org/10.1504/ijesdf.2018.095141,,10.1504/ijesdf.2018.095141,,,0,,2,false,, 155-772-239-137-393,A Survey of Artificial Intelligence Techniques for Cybersecurity Improvement,,2020,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Athari M. Alrajhi,,9,1,34,41,Computer security; Computer science; Wireless,,,,,http://sdiwc.net/digital-library/a-survey-of-artificial-intelligence-techniques-for-cybersecurity-improvement,http://dx.doi.org/10.17781/p002650,,10.17781/p002650,3124764632,,0,006-330-528-386-088; 012-758-652-403-628; 045-198-984-947-001; 046-896-690-273-536; 047-513-057-385-511; 051-296-320-381-072; 061-195-572-606-821; 063-344-541-540-03X; 066-824-705-306-330; 099-140-363-540-265; 101-588-174-999-89X; 107-193-036-786-53X; 141-303-670-171-361; 153-442-264-211-634; 159-847-650-871-909; 184-287-782-343-597,3,false,, 155-874-936-366-797,Analysis of Time Records on Digital forensics,2015-04-01,2015,journal article,Indian Journal of Science and Technology,09745645; 09746846,Indian Society for Education and Environment,India,Sungjin Lee; Sunghyuck Hong,"Time analysis is important for digital forensic area, and Windows 7/8 are common to be used. However, there is not much research on time analysis for Windows 7 and 8. Time analysis is a critical proof for accusing criminal. There are various time zones, and time records on Windows operating system are not clear to understand which means RTC time or local time. Therefore, time analysis on Windows operating system must be firmed and documented for investigating forensic crime. We contribute to analysis time records whenever files are generated or modified by users, so we expect that our research will be able to make ambiguous time records clear for investigating digital forensics.",8,S7,365,372,Computer security; Computer science; Component (UML); Microsoft Windows; Digital forensics,,,,,https://www.indjst.org/index.php/indjst/article/view/70420/55111 https://indjst.org/articles/analysis-of-time-records-on-digital-forensics,http://dx.doi.org/10.17485/ijst/2015/v8is7/70420,,10.17485/ijst/2015/v8is7/70420,1833896173,,0,007-790-059-029-953; 013-331-920-213-649; 015-660-699-824-554; 040-533-091-712-76X; 046-505-599-865-150; 053-376-195-646-045; 073-353-835-723-47X; 085-214-277-668-01X; 125-473-815-302-935; 144-838-089-175-246; 167-592-705-831-583; 172-966-955-729-869; 185-583-187-622-076,2,true,,gold 156-374-578-445-529,THE ROLE OF DIGITAL FORENSIC IN REVEALING CRIMINAL ACTS OF ONLINE PROSTITUTION AT KEPOLISIAN DAERAH JAWA TIMUR,2020-07-31,2020,journal article,LIGAHUKUM,2085577x,University of Pembangunan Nasional Veteran Jawa Timur,,Valdha Regytha Gana Atthoriq,"This thesis talks about the role of digital forensic in revealing criminal acts of online prostitution. Digital forensic itself is not specifically regulated in the Indonesian Criminal Code Act, but digital forensic is very important in its role in the process of analyzing an item of evidence obtained from a criminal offence. The subject matter that the author discusses is, how the digital forensic role in exposing the criminal acts of online prostitution and whether the barriers in the application of digital forensic in exposing the criminal acts of online prostitution. The research methods that the author uses are juridical empirical. The author also conducted an analysis on the role of digital forensic in exposing the criminal acts of online prostitution associated with the Information and Electronic Transaction Law which is then presented by the author's thought. The results of this study can be seen through several digital forensic roles at the level of investigation, prosecution and also the courts, in addition, there are also some obstacles that faced by the experts of Digital Forensic Examiner and the efforts that can be done in overcoming those obstacles. ;   ; Keyword : Digital Forensic, Online Prostitution, Information and Electronic Transaction Law",1,1,,,,,,,,,http://dx.doi.org/10.33005/ligahukum.v1i1.21,,10.33005/ligahukum.v1i1.21,,,0,,0,false,, 156-753-375-839-827,Review of: Forensic Mental Health Evaluations in the Digital Age: A Practitioner’s Guide to Using Internet‐Based Data,2020-07-21,2020,journal article,Journal of Forensic Sciences,00221198; 15564029,Wiley,United States,Scott A. Bresler,,65,5,1799,1799,Mental health; Forensic science; Psychology; Internet based; Medical education,,,,,https://onlinelibrary.wiley.com/doi/10.1111/1556-4029.14509,http://dx.doi.org/10.1111/1556-4029.14509,,10.1111/1556-4029.14509,3043985155,,0,,1,false,, 156-792-567-405-806,Digital Forensic Challenges in Internet of Things (IoT),2022-07-23,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Albert Quist,"With emerging technology and the connection of electronic devices to the internet, Internet of Things (IoT) has become part of human life. From the development of smartphones to smartwatches and smart-homes, electronic devices now have the capability of performing human activities or aiding humans in performing activities such as turning hall lights on or off with their voice. Although a large number of people use these devices for the greater good, a few individuals or group of people hide behind these devices to perform malicious activities. In order to apprehend and prosecute perpetuators who hide behind smart devices for evil gains, forensic examinations or investigations must be conducted. This review aims to identify digital forensic challenges in IoT. The inclusion criteria for this paper were international journals, articles, conference papers and case studies published from 2019 to 2022. Thematic analysis was used to analyze and synthesis the literature. Three themes emerged from the analysis; automated compromised smart-home tracer; data volatility and reconstruction; IoT forensic investigation framework. This integrative review combines evidence of digital forensic challenges in diverse IoT devices. Keyword IoT forensics, IoT challenges, Digital forensics, Smart-home forensics.",1,1,119,124,Internet of Things; Digital evidence; Digital forensics; Computer science; Smartwatch; Computer security; Internet privacy; Thematic analysis; The Internet; World Wide Web; Data science,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p20,,10.22624/aims/crp-bk3-p20,,,0,,0,true,,bronze 158-226-982-585-038,Innovative Techniques of Digital Crime Investigation,2016-12-01,2016,journal article,Journal of Engineering Education Transformations,09715843,,,Shrinivas D. Desai; Prashant Narayankar,"Computer forensics is a new and fast growing form of investigative technique in which forensic specialist use modern forensic software tools, to solve digital crime cases. Choosing appropriate forensic tool for solving real-time digital crime cases is most expected graduate attribute, for those who have opted ""Computer forensic"" as an elective course. In this paper we present pedagogy for developing skill of choosing most appropriate software tool for analyzing and investigating digital crime cases. Assignment activities are designed to develop competencies such as i) Ability to identify, select and apply forensic tool to solve image, audio and video doctored cases. ii) Ability to evaluate the suitability and limitations of the tool used to solve problem. To solve image forensic cases, a tool having feature of error level analysis and meta data analysis is found to be more appropriate, while for solving audio doctored cases, tool having feature of frequency response analysis as well as difference calculator is found to be most appropriate. In case of video doctored crimes, tools having feature of noise analysis, level sweep, clone detection, and magnification is found to be most appropriate. Assessment of outcome is carried out by recording attainment of Graduate Attribute (GA), Competency (CA) and Performance Indicators (PI). Skill of identifying, choosing and applying appropriate forensic tool to solve digital crime cases is observed among student.",30,,,,Machine learning; Performance indicator; Artificial intelligence; Calculator; Software; Digital evidence; Computer security; Computer science; Computer forensics; Feature (computer vision); Metadata; Noise (video),,,,,http://ischolar.info/index.php/JEETRIT/article/view/139929 http://www.journaleet.org/index.php/jeet/article/download/111605/78225,http://ischolar.info/index.php/JEETRIT/article/view/139929,,,2730592809,,0,,0,false,, 158-859-761-919-911,The architecture of a digital forensic readiness management system,2013-02-01,2013,journal article,Computers & Security,01674048,,,null ReddyK.,"A coordinated approach to digital forensic readiness (DFR) in a large organisation requires the management and monitoring of a wide variety of resources, both human and technical. The resources inv...",,,,,Engineering management; Architecture; Variety (cybernetics); Management system; Computer science; Digital forensics,,,,,https://dl.acm.org/doi/10.5555/2748150.2748582,https://dl.acm.org/doi/10.5555/2748150.2748582,,,3145715434,,0,,0,false,, 159-399-684-784-145,Audio enhancement and application of digital filters for speech intelligibility in forensic digital analysis expert work (Computer Forensics),2020-09-25,2020,journal article,International Journal of Emerging Trends in Engineering Research,23473983,The World Academy of Research in Science and Engineering,,,,8,9,6045,6050,Digital forensics; Computer science; Intelligibility (philosophy); Computer forensics; Digital filter; Speech recognition; Digital audio; Forensic science; Multimedia,,,,,,http://dx.doi.org/10.30534/ijeter/2020/186892020,,10.30534/ijeter/2020/186892020,,,0,,0,true,,bronze 160-624-462-765-065,The survey on cross-border collection of digital evidence by representatives from Polish prosecutors’ offices and judicial authorities,2021-09-30,2021,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Paweł Olber,,16,2,3,,Business; Law; Jurisdiction; Cybercrime; Digital evidence; Computer forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1700&context=jdfsl https://commons.erau.edu/jdfsl/vol16/iss2/3/,https://commons.erau.edu/jdfsl/vol16/iss2/3/,,,3212570151,,0,000-566-000-503-971; 012-155-430-901-071; 016-545-450-234-850; 020-233-315-826-687; 029-638-263-419-336; 056-254-180-340-08X; 063-572-994-319-332; 094-800-645-372-553; 098-194-155-526-060; 130-080-242-566-434; 196-758-971-020-221,0,true,cc-by-nc,gold 161-135-504-333-527,Design and Implementation of a Digital Evidence Management Model Based on Hyperledger Fabric,2020-08-01,2020,journal article,Journal of Information Processing Systems,1976913x,,,Junho Jeong; Donghyo Kim; Byungdo Lee; Yunsik Son,"When a crime occurs, the information necessary for solving the case, and various pieces of the evidence needed to prove the crime are collected from the crime scene. The tangible residues collected through scientific methods at the crime scene become evidence at trial and a clue to prove the facts directly against the offense of the suspect. Therefore, the scientific investigation and forensic handling for securing objective forensic in crime investigation is increasingly important. Today, digital systems, such as smartphones, CCTVs, black boxes, etc. are increasingly used as criminal information investigation clues, and digital forensic is becoming a decisive factor in investigation and trial. However, the systems have the risk that digital forensic may be damaged or manipulated by malicious insiders in the existing centralized management systems based on client/server structure. In this paper, we design and implement a blockchain based digital forensic management model using Hyperledger Fabric and Docker to guarantee the reliability and integrity of digital forensic. The proposed digital evidence management model allows only authorized participants in a distributed environment without a central management agency access the network to share and manage potential crime data. Therefore, it could be relatively safe from malicious internal attackers compared to the existing client/server model.",16,4,760,773,Agency (sociology); Crime scene; Structure (mathematical logic); Suspect; Smart contract; Digital evidence; Distributed Computing Environment; Computer security; Computer science; Digital forensics,,,,,http://jips-k.org/digital-library/2020/16/4/760,http://jips-k.org/digital-library/2020/16/4/760,,,3084378120,,0,,3,false,, 161-425-249-830-942,An Enhanced Digital Forensic Model for Internet of Things Forensic,2018-01-22,2018,journal article,"World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering",,,,Tina Wu; Andrew Martin,,5,1,,,World Wide Web; Forensic science; Computer science; Internet of Things; Digital forensics,,,,,https://waset.org/abstracts/76982,https://waset.org/abstracts/76982,,,2797483384,,0,,0,false,, 161-682-090-897-914,A Conceptual Framework to Improve Cyber Forensic Administration in Industry 5.0: Qualitative Study Approach,2022-02-03,2022,journal article,Forensic Sciences,26736756,MDPI AG,,Amr Adel,"As organizations strive to be compliant in a digitally evolving world, they need to ensure that they are forensically ready. Digital forensic readiness ensures compliance in legal, regulatory, functional, and operational structures. A literature review revealed a gap in detailed and comprehensive guidance on how such readiness ought to be accomplished. This is as a result of unfamiliar concepts and terms that revolve around digital forensic readiness. This research paper highlights and elaborates on a framework that can be achieved from research within focus groups. The insights drawn from the focus groups are used to critically assess the issues affecting practitioners in achieving complete digital forensic readiness.",2,1,111,129,Digital forensics; Conceptual framework; Focus (optics); Focus group; Engineering ethics; Knowledge management; Qualitative research; Computer science; Digital evidence; Process management; Data science; Engineering; Computer security; Business; Sociology; Social science; Physics; Marketing; Optics,,,,,,http://dx.doi.org/10.3390/forensicsci2010009,,10.3390/forensicsci2010009,,,0,002-449-146-256-491; 002-625-978-577-247; 006-435-365-660-88X; 006-912-721-410-174; 011-850-758-874-52X; 014-494-420-328-995; 014-700-420-212-76X; 015-264-924-343-905; 024-894-908-869-686; 028-249-665-354-840; 033-394-274-571-989; 055-036-284-492-537; 064-138-810-036-202; 077-598-249-628-673; 077-958-224-288-437; 096-777-977-622-731; 098-748-261-333-651; 106-108-913-089-037; 107-469-336-935-773; 111-488-239-742-003; 163-530-964-806-770; 194-646-821-795-161,1,true,cc-by,gold 161-786-953-020-998,Android forensics,,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,M. Kaart; S. Laraghy,,11,3,234,248,Timestamp; Time zone; Android forensics; Android device; Computer science; Daylight saving time; Android (operating system); Clock skew; Mobile device forensics; Real-time computing,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287614000449 https://doi.org/10.1016/j.diin.2014.05.001,http://dx.doi.org/10.1016/j.diin.2014.05.001,,10.1016/j.diin.2014.05.001,2060998013,,0,003-504-554-245-316; 007-066-403-548-609; 010-088-513-928-018; 023-767-546-806-478; 029-159-400-662-132; 030-674-871-669-121; 046-505-599-865-150; 058-631-300-195-90X; 062-185-276-692-750; 065-459-442-784-779; 066-214-056-369-914; 085-214-277-668-01X; 088-938-096-763-07X; 092-043-845-339-506; 095-409-130-263-862; 098-520-592-151-771; 160-001-504-152-793,14,false,, 161-921-610-463-171,Secure and Trusted Environment as a Strategy to Maintain the Integrity and Authenticity of Digital Evidence,2015-06-30,2015,journal article,International Journal of Security and Its Applications,17389976,NADIA,South Korea,Yudi Prayudi; Tri Kuntoro Priyambodo,"The authenticity and the integrity of digital evidence are critical issues in digital forensics activities. Both aspects are directly related to the application of The Locard Exchange Principle (LEP), which is a basic principle of the existence of evidence in an event. This principle, not only applies before and at the time the event occurs, but also applies to the investigation process. In the handling of digital evidence, all activities to access the digital evidence are not likely to occur without the mediation of a set of instruments or applications, whereas every application is made possible for the existence of bugs. In addition, the presence of illegal access to the system, malicious software as well as vulnerabilities of a computer system are a number of potential problems that can have an impact on the change in the authenticity and the integrity of digital evidence. If this is the case, secure and trust characteristics that should appear in the activity of digital forensics may be reduced. This paper tries to discuss how the concept of a secure and trusted environment can be applied to maintain the authenticity and integrity of digital evidence. The proposed concept includes the unity of five components, namely standard and forensics policy, security policy, model and trusted management system, trusted computing, secure channel communication, and human factor. The ultimate purpose of this paper is to provide an overview of how the recommendation can be applied to meet the requirements of a secure and trusted environment in digital forensics for keeping the authenticity and the integrity of digital evidence. In general, this paper tends to explain a high-level concept and does not discuss low-level implementation of a secure and trusted environment.",9,6,299,314,Internet privacy; Locard's exchange principle; Engineering; Security policy; Secure channel; Trusted Computing; Digital evidence; Computer security; Event (computing); Malware; Digital forensics,,,,,https://www.earticle.net/Article/A251453,http://dx.doi.org/10.14257/ijsia.2015.9.6.28,,10.14257/ijsia.2015.9.6.28,2556333987,,0,001-576-026-446-552; 002-383-410-319-043; 014-886-222-930-515; 017-793-641-645-475; 025-697-732-683-864; 026-144-692-799-50X; 028-359-027-680-438; 030-266-326-999-894; 031-234-153-523-379; 032-246-414-391-330; 033-075-569-155-300; 040-173-986-975-775; 041-017-598-844-767; 043-589-904-668-295; 044-424-086-644-152; 045-553-653-288-228; 047-491-706-271-238; 049-570-763-365-976; 055-416-156-661-003; 060-139-253-208-292; 066-219-211-495-201; 073-582-404-994-103; 081-366-851-480-757; 082-188-923-827-797; 091-580-195-401-036; 098-748-261-333-651; 099-610-658-392-435; 100-952-909-965-132; 118-181-746-710-581; 124-066-378-359-073; 132-355-634-397-986; 133-508-126-407-763; 134-927-490-231-285; 138-735-529-589-081; 143-114-367-163-473; 151-883-793-490-174; 183-471-286-339-242; 191-920-670-388-656; 192-243-367-271-931; 192-955-966-543-738; 199-172-967-270-034,4,true,,bronze 162-110-149-751-921,The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice,,2013,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Richard Adams; Valerie Hobbs; Graham Mann,"As with other types of evidence, the courts make no presumption that digital evidence is reliable without some evidence of empirical testing in relation to the theories and techniques associated with its production. The issue of reliability means that courts pay close attention to the manner in which electronic evidence has been obtained and in particular the process in which the data is captured and stored. Previous process models have tended to focus on one particular area of digital forensic practice, such as law enforcement, and have not incorporated a formal description. We contend that this approach has prevented the establishment of generally accepted standards and processes that are urgently needed in the domain of digital forensics. This paper presents a generic process model as a step towards developing such a generally-accepted standard for a fundamental digital forensic activity-the acquisition of digital evidence.",8,4,25,48,Empirical research; Data science; Presumption; Law enforcement; Digital evidence; Computer security; Computer science; Process (engineering); Computer forensics; Process modeling; Digital forensics,,,,,https://doaj.org/article/7abfdd6ed4c4408987cce9d292cb156d https://researchrepository.murdoch.edu.au/id/eprint/26688/ https://oaji.net/articles/2014/1095-1408891264.pdf https://research-repository.uwa.edu.au/en/publications/the-advanced-data-acquisition-model-adam-a-process-model-for-digi https://researchrepository.murdoch.edu.au/26688/1/advanced_data_acquisition.pdf https://research-repository.uwa.edu.au/en/publications/the-advanced-data-acquisition-model-adam-a-process-model-for-digital-forensic-practice(11eb6e68-4886-4b1b-a4a9-013e44274c3f)/export.html https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#AdamsHM13 https://commons.erau.edu/jdfsl/vol8/iss4/2/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1154&context=jdfsl https://doi.org/10.15394/jdfsl.2013.1154 https://core.ac.uk/display/77134060,http://dx.doi.org/10.15394/jdfsl.2013.1154,,10.15394/jdfsl.2013.1154,1525847438,,0,000-557-324-827-169; 010-086-703-646-194; 019-698-064-288-240; 020-944-423-224-895; 021-850-998-857-676; 022-502-903-446-942; 030-634-360-648-226; 032-697-093-668-898; 038-668-970-194-854; 067-726-260-424-525; 132-355-634-397-986; 133-397-275-695-990; 142-244-092-034-937; 143-562-788-834-457; 190-065-821-748-92X; 199-745-676-923-766,28,true,cc-by-nc,gold 162-226-718-103-313,Visualizing Digital Forensic Datasets: A Proof of Concept,2017-02-01,2017,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Christopher Tassone; Ben Martini; Kim-Kwang Raymond Choo,"Digital forensic visualization is an understudied area despite its potential to achieve significant improvements in the efficiency of an investigation, criminal or civil. In this study, a three-stage forensic data storage and visualization life cycle is presented. The first stage is the decoding of data, which involves preparing both structured and unstructured data for storage. In the storage stage, data are stored within our proposed database schema designed for ensuring data integrity and speed of storage and retrieval. The final stage is the visualization of stored data in a manner that facilitates user interaction. These functionalities are implemented in a proof of concept to demonstrate the utility of the proposed life cycle. The proof of concept demonstrates the utility of the proposed approach for the storage and visualization of digital forensic data.",62,5,1197,1204,Proof of concept; World Wide Web; Computer data storage; Information retrieval; Unstructured data; Database schema; Data integrity; Visualization; Computer science; Mobile device forensics; Digital forensics,"MSAB XRY ; digital forensics; forensic science; forensic visualization; geographic map plots; mobile device forensics; treemap; word cloud",,,,https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.13431 https://www.ncbi.nlm.nih.gov/pubmed/28144943 http://europepmc.org/abstract/MED/28144943 http://onlinelibrary.wiley.com/doi/10.1111/1556-4029.13431/full https://dialnet.unirioja.es/servlet/articulo?codigo=6108040,http://dx.doi.org/10.1111/1556-4029.13431,28144943,10.1111/1556-4029.13431,2586033114,,0,000-360-120-513-679; 005-594-976-962-141; 009-885-874-541-907; 011-051-740-313-213; 018-447-058-666-847; 024-735-069-822-749; 033-877-222-136-260; 042-767-661-429-064; 047-221-550-114-462; 056-715-378-869-201; 065-671-045-136-370; 077-537-743-482-973; 079-070-981-899-105; 084-871-301-547-140; 096-289-210-165-616; 106-885-306-836-498; 113-462-435-754-981; 123-707-719-752-131; 149-749-567-387-540; 163-330-758-807-944,18,false,, 162-814-268-960-713,Examination of Digital Evidence on Android-based LINE Messenger,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),," Riadi; Ammar Fauzan Sunardi",,7,3,336,343,Operating system; Digital evidence; Computer science; Wireless; Android (operating system),,,,,https://sdiwc.net/digital-library/examination-of-digital-evidence-on-androidbased-line-messenger.html,http://dx.doi.org/10.17781/p002472,,10.17781/p002472,2891077758,,0,000-225-165-729-99X; 006-700-167-776-341; 053-394-227-052-76X; 152-458-317-042-249; 185-798-265-234-254,3,false,, 162-831-197-622-390,"Condición .txtual, crítica .txtual y edición .txtual hispánicas",2018-12-03,2018,journal article,Revista de Humanidades Digitales,25311786,UNED - Universidad Nacional de Educacion a Distancia,,Bénédicte Vauthier,"El impacto de las nuevas tecnologias sobre el proceso de escritura no es nada nuevo. Esta revolucion digital se tradujo primero por la aparicion de nuevos formatos de textos y el desarrollo de una teoria literaria ad hoc. En el ambito angloamericano, esta revolucion llevo a los filologos y a las instituciones patrimoniales a reflexionar sobre la necesidad de desarrollar formatos de estudio, de edicion y de conservacion perenne de estos nuevos formatos de textos digitales. ?A que se debe el atraso que en estas mismas areas se observa en Europa? ?Por que se puede afirmar que la digital forensicsy la media archaeology(Kirschenbaum) no son disciplinas trasnacionales? En esta contribucion, se hace balance del impacto de la .Txtual Conditionen Europa y en el area angloamericana, y se contrasta estas conclusiones con las respuestas que tres escritores emblematicos de la ‘nueva narrativa espanola’ han dado a una encuesta sobre las ‘formas de gestionar y de conservar archivos digitales’.",2,2,77,97,,,,,,http://revistas.uned.es/index.php/RHD/article/download/22198/18514 http://revistas.uned.es/index.php/RHD/article/view/22198 https://dialnet.unirioja.es/servlet/articulo?codigo=6700082 https://core.ac.uk/download/222976460.pdf,http://dx.doi.org/10.5944/rhd.vol.2.2018.22198,,10.5944/rhd.vol.2.2018.22198,2903406945,,0,,0,true,cc-by-nc,gold 162-922-011-677-486,Digital Forensics Framework for Cloud Computing,2013-02-28,2013,journal article,The Journal of Korea Navigation Institute,12269026,The Korea Navigation Institute,,Changhoon Lee,"Recently, companies seek a way to overcome their financial crisis by reducing costs in the field of IT. In such a circumstance, cloud computing is rapidly emerging as an optimal solution to the crisis. Even in a digital forensic investigation, whether users of an investigated system have used a cloud service is a very important factor in selecting additional investigated subjects. When a user has used cloud services, such as Daum Cloud and Google Docs, it is possible to connect to the could service from a remote place by acquiring the user`s log-in information. In such a case, evidence data should be collected from the remote place for an efficient digital forensic investigation, and it is needed to conduct research on the collection and analysis of data from various kinds of cloud services. Thus, this study suggested a digital forensic framework considering cloud environments by investigating collection and analysis techniques for each cloud service.",17,1,63,68,Cloud testing; Engineering; Data analysis; Cloud computing security; Digital evidence; Field (computer science); Service (systems architecture); Computer security; Cloud computing; Digital forensics,,,,,https://www.koreascience.kr:443/article/JAKO201310635656332.pdf https://www.koreascience.kr/article/JAKO201310635656332.page http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=HHHHBI_2013_v17n1_63 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001749418 http://koreascience.or.kr/journal/view.jsp?kj=HHHHBI&py=2013&vnc=v17n1&sp=63,http://dx.doi.org/10.12673/jkoni.2013.17.01.063,,10.12673/jkoni.2013.17.01.063,2087909567,,0,,1,true,,bronze 163-055-558-077-509,A Secure Non-Repudiable General Proxy Signature,,2015,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Samaneh Mashhadi,,4,2,380,389,,,,,,,http://dx.doi.org/10.17781/p001556,,10.17781/p001556,,,0,,1,false,, 163-308-959-548-845,"Forensic and Digital Evidence be used as Substantial Evidence in Criminal Cases, an Effective Alternative of Ocular Account: Evaluation in the Light of New Amendments. What are the Requirements of Admissibility and Reliability of Digital and Forensic Evidence?",2022-01-01,2022,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Dr. Muhammad Ramzan,,,,,,Digital evidence; Admissible evidence; Criminology; Psychology; Law; Computer science; Political science; Computer security; Digital forensics,,,,,,http://dx.doi.org/10.2139/ssrn.4021315,,10.2139/ssrn.4021315,,,0,,0,false,, 163-853-761-819-084,Anti-forensics,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Kevin J. Conlan; Ibrahim Baggili; Frank Breitinger,"Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital forensic community. Thus, new research initiatives and strategies must be formulated to address this growing problem. In this work we first collect and categorize 308 anti-digital forensic tools to survey the field. We then devise an extended anti-forensic taxonomy to the one proposed by Rogers (2006) in order to create a more comprehensive taxonomy and facilitate linguistic standardization. Our work also takes into consideration anti-forensic activity which utilizes tools that were not originally designed for anti-forensic purposes, but can still be used with malicious intent. This category was labeled as Possible indications of anti-forensic activity, as certain software, scenarios, and digital artifacts could indicate anti-forensic activity on a system. We also publicly share our data sets, which includes categorical data on 308 collected anti-forensic tools, as well as 2780 unique hash values related to the installation files of 191 publicly available anti-forensic tools. As part of our analysis, the collected hash set was ran against the National Institute of Standards and Technology's 2016 National Software Reference Library, and only 423 matches were found out of the 2780 hashes. Our findings indicate a need for future endeavors in creating and maintaining exhaustive anti-forensic hash data sets.",18,,S66,S75,Digital artifact; World Wide Web; Set (abstract data type); Standardization; Data science; National Software Reference Library; Field (computer science); Computer science; Computer forensics; Digital forensics; Hash function,,,,,https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1054&context=electricalcomputerengineering-facpubs https://www.sciencedirect.com/science/article/pii/S1742287616300378 https://core.ac.uk/display/82295331 https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/54/ https://www.sciencedirect.com/science/article/abs/pii/S1742287616300378 https://dl.acm.org/citation.cfm?id=2988605 https://core.ac.uk/download/pdf/82295331.pdf,http://dx.doi.org/10.1016/j.diin.2016.04.006,,10.1016/j.diin.2016.04.006,2508545160,,0,005-102-962-333-180; 014-403-336-708-18X; 018-483-378-650-703; 021-850-208-884-128; 026-201-331-634-716; 035-853-217-426-112; 045-294-718-031-754; 045-935-396-341-342; 049-693-826-680-544; 058-559-419-151-003; 060-051-915-220-236; 064-665-774-871-511; 067-508-826-235-446; 078-598-867-814-365; 081-032-497-600-401; 103-103-595-689-579; 135-717-892-795-412; 144-786-887-819-307; 173-147-024-044-113,43,true,cc-by-nc-nd,hybrid 163-940-179-223-192,Appointment of comprehensive forensic examinations in case of the study of digital traces in the investigation of economic crimes,,2022,journal article,Полицейская деятельность,24540692,"Aurora Group, s.r.o",,Dmitrii Olegovich Buinov,"; Due to the ongoing digitalization of the economy, the study of digital traces in the framework of forensic examinations in criminal cases in the field of economic activity is one of the most relevant topics in forensic expert science. The purpose of this study is to identify and analyze the features of the production of complex forensic economic and computer–technical expertise in the study of digital traces, to determine the limits of competence of an expert economist in the expert study of digital traces. Within the framework of the study, the author set the following tasks: to analyze the types of crimes in the field of economics and the ways of their commission for the possibility of the formation of digital traces during the implementation of these offenses, to determine the types of digital traces characteristic of crimes in the field of economic activity, to determine the appropriateness of the appointment of comprehensive examinations, to analyze an example of expert practice for the use of special economic knowledge and special knowledge in the field of forensic computer-technical expertise.The author came to the conclusion that the appointment of a comprehensive forensic computer-technical and economic expertise is unnecessary in most cases, since the simultaneous joint participation of an expert economist and an expert in the field of IT technologies in writing an opinion and formulating a general conclusion is not necessary in most cases when investigating crimes in the field of economic activity. As a rule, the participation of a specialist in the field of IT technologies is sufficient to withdraw computer information from the carrier and then provide this information to an expert economist for research. At the same time, an expert economist is able to work independently with software products and computer files, for the study of which there is enough well-known knowledge.; ",,4,20,28,Digital forensics; Field (mathematics); Forensic science; Competence (human resources); Commission; Expert opinion; Computer forensics; Set (abstract data type); Forensic examination; Expert system; Computer science; Economic crime; Data science; Engineering; Law; Computer security; Psychology; Political science; Artificial intelligence; Forensic engineering; Medicine; Social psychology; Mathematics; Intensive care medicine; Veterinary medicine; Pure mathematics; Programming language,,,,,,http://dx.doi.org/10.7256/2454-0692.2022.4.38601,,10.7256/2454-0692.2022.4.38601,,,0,,0,true,,gold 164-385-694-618-291,Digital forensics in Malaysia,2014-01-23,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Aswami Ariffin; Izwan Iskandar Ishak,"Conference paper on Digital forensics in Malaysia by Aswami Fadillah Mohd Ariffin and Izwan Iskandar Ishak. Aswami Fadillah Mohd Ariffin is the Head of Digital Forensic, CyberSecurity Malaysia and Izwan Iskandar Ishak is a Senior Executive, Strategic Policy & Legal Research of CyberSecurity (Malaysia).",5,0,,,Engineering; Strategic policy; Computer security; Public relations; Legal research; Digital forensics,,,,,https://journals.sas.ac.uk/deeslr/article/view/1849 https://sas-space.sas.ac.uk/5441/,http://dx.doi.org/10.14296/deeslr.v5i0.1849,,10.14296/deeslr.v5i0.1849,2053558031,,0,,2,true,cc-by-nc-nd,hybrid 164-392-011-156-848,On the Development of a Digital Forensics Curriculum,,2012,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Manghui Tu; Dianxiang Xu; Samsuddin Wira; Cristian Balan; Kyle Cronin,"Computer Crime and computer related incidents continue their prevalence and frequency, resulting in losses approaching billions of dollars. To fight against these crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce that can effectively investigate computer crimes and incidents. There is presently no standard to guide the design of digital forensics curriculum for an academic program. In this research, previous work on digital forensics curriculum design and existing education programs are thoroughly investigated. Both digital forensics educators and practitioners were surveyed and results were analyzed to determine the industry and law enforcement need for skills and knowledge for their digital forensic examiners. Based on the survey results and the topics that make up certificate programs in digital forensics, topics that are desired in digital forensics courses are identified. Finally, based on the research findings, six digital forensics courses and required 1 Corresponding author. Tel: +1 219 989 3253, Email: manghui.tu@purduecal.edu Journal of Digital Forensics, Security and Law, Vol. 7(3) 14 topics are proposed to be offered in both undergraduate and graduate digital forensics programs.",7,3,2,,Engineering; Work (electrical); Workforce; Law enforcement; Academic program; Survey result; Curriculum; Engineering ethics; Digital forensics; Certificate,,,,,https://commons.erau.edu/jdfsl/vol7/iss3/2/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1126&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2012.1126,,10.15394/jdfsl.2012.1126,2463041832,,0,002-569-181-368-890; 005-733-361-126-371; 007-790-059-029-953; 012-314-515-683-048; 012-806-731-619-471; 014-425-849-204-654; 021-618-983-657-405; 025-216-090-579-394; 028-161-558-897-878; 030-244-803-361-520; 036-733-117-655-399; 046-177-920-187-772; 054-389-084-057-423; 057-991-197-390-530; 066-701-921-148-891; 115-434-273-826-886; 125-416-939-855-653; 130-239-147-323-022; 167-592-705-831-583,8,true,cc-by-nc,gold 164-788-241-444-459,When is a line of inquiry 'reasonable'? - a focus on digital devices,2022-03-18,2022,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Graeme Horsman,,,,1,12,Focus (optics); Line (geometry); Computer science; Digital forensics; Data science; Psychology,,,,,,http://dx.doi.org/10.1080/00450618.2022.2048691,,10.1080/00450618.2022.2048691,,,0,,0,false,, 164-838-567-614-73X,Performance Measures for Evaluating the Dynamic Authentication Techniques,,2016,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Jing-Chiou Liou,,5,2,83,93,Authentication (law); Information system; Computer science; Multimedia; Wireless,,,,,http://sdiwc.net/digital-library/performance-measures-for-evaluating-the-dynamic-authentication-techniques,http://dx.doi.org/10.17781/p002052,,10.17781/p002052,2359350347,,0,,1,false,, 164-989-739-953-649,A Comprehensive Study of Passive Digital Image Forensics Techniques based on Intrinsic Fingerprints,2015-04-22,2015,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Ajit Singh; Jyoti Malik,"Over the past decade digital images has become a very popular way to communicate, store and process information. With the rapid advancement and easy availability of technology, there is a flood of devices that are able to capture, store and create digital images. Over the past years image processing techniques have been developed that makes it really easy to tamper images. From journalism to social media edited images are appearing everywhere with increasing frequency. Authentication of images is very necessary as visual data effects what people perceive and believe. Digital image Forensics is an emerging field that uses intrinsic and extrinsic methods to authenticate digital images. Passive techniques extract and analyze inherent patterns introduced by various image processing steps and use these artifacts to associate the image with source device as well as to detect tampering of the digital images. This paper gives an overview of passive techniques of Digital Image Forensics which are based on intrinsic fingerprints inherent in digital images.",116,19,16,21,Image (mathematics); Artificial intelligence; Digital image forensics; Computer vision; Field (computer science); Computer science; Digital image; Multimedia; Image processing,,,,,https://www.ijcaonline.org/archives/volume116/number19/20444-2794 https://research.ijcaonline.org/volume116/number19/pxc3902794.pdf https://ui.adsabs.harvard.edu/abs/2015IJCA..116s..16S/abstract,http://dx.doi.org/10.5120/20444-2794,,10.5120/20444-2794,2331300927,,0,004-023-060-478-098; 005-663-388-424-669; 006-715-003-756-565; 008-944-622-967-339; 014-079-494-188-077; 016-167-894-033-755; 028-250-456-206-030; 029-093-526-590-26X; 032-763-540-112-828; 040-425-146-348-064; 060-409-308-040-210; 076-704-896-134-67X; 086-832-985-542-578; 087-814-787-159-954; 098-449-049-825-579; 114-599-315-973-390; 140-241-199-301-269; 162-318-120-415-302; 179-834-398-565-338; 180-088-494-514-913,4,true,,bronze 165-408-203-311-152,Proposal for a digital forensic investigation model in accordance with the legislation in Mexico,2019-12-31,2019,journal article,ECORFAN Journal Spain,24443204,ECORFAN,,Carlos Ortega-Laurel; Jacobo Sandoval-Gutierrez; Juan López-Sauceda; Adan Fernando Serrano-Orozco,"In this paper we collect and observes the existing digital forensic investigation models, which are essentially the application of information systems and communications engineering for forensic purposes. In addition, a review of the federal criminal situation in Mexico is presented (through the revision of the regulations in the Federal Criminal Code), because the Code indirectly describes the reality of what can be prosecuted and admitted as evidence, criminally speaking, with the application of digital forensic investigation models in Mexico. This is due to the significant deficiency in the proposal of digital forensic investigation models, in which there is not enough emphasis on the potential admissibility of the evidence gathered through the models, to give attention to the need to provide “evidence” to Institutions responsible for the impartation of justice, as if doing digital forensic investigation to be a technological issue and not as it really is: a socio-legal-technological issue. Therefore, considering the criminal reality in Mexico, locating the practices of existing models that make sense in accordance with the norm, an abbreviated model is proposed that really helps successful prosecutions.",,,1,9,Law; Legislation; Digital forensic investigation; Computer science,,,,,http://dx.doi.org/10.35429/ejs.2019.11.6.1.9,http://dx.doi.org/10.35429/ejs.2019.11.6.1.9,,10.35429/ejs.2019.11.6.1.9,3144221687,,0,004-706-447-836-905; 004-872-169-627-620; 010-086-703-646-194; 020-944-423-224-895; 022-502-201-281-354; 032-697-093-668-898; 038-668-970-194-854; 047-630-600-014-492; 055-628-715-083-217; 067-950-012-629-210; 072-603-853-459-193; 087-665-408-966-240; 132-355-634-397-986; 133-397-275-695-990; 140-821-103-436-654; 159-477-048-665-066; 170-299-458-679-224; 190-065-821-748-92X; 199-745-676-923-766,0,false,, 165-638-803-131-183,Unboxing the digital forensic investigation process.,2022-01-20,2022,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Graeme Horsman; Nina Sunde,"As digital forensics continues to play an important role in criminal investigations, its investigative work must be underpinned with well-defined and robust methodologies. Over the last 20 years, a substantial body of research has been produced to define and codify the digital forensic investigation process and the stages/sub-processes involved. Whilst current digital forensic investigation process models provide a solid foundation, it is argued that existing attempts often only focus on those physical tasks, which a practitioner must carry out at any given stage of an examination, omitting to identify those core thought processes, decisions and behaviours that form part of effective investigative practices. This work presents the Digital Forensic Workflow Model (DFWM), a novel approach to the structuring and definition of the procedures and tasks involved in the digital forensic investigation process starting from the initial 'Review of Client Requirements & Planning' stage, right through to the 'Evaluation of Deployed Workflow' stage. The DFWM contributes to the digital forensic management toolbox, where it enables the identification and management of risk and supports error mitigation at each stage of the workflow. The paper demonstrates how the DFWM functions as a framework for unboxing the digital forensic investigation process based on the investigative strategy of the particular case, providing a detailed structure and depiction of the physical and investigative tasks and decisions. From a research perspective, DFWM is a descriptive starting point, and future empirical studies may expand and provide further detail to the various physical and cognitive tasks and associated risks during the DF workflow.",62,2,171,180,Workflow; Digital forensics; Computer science; Toolbox; Process (computing); Structuring; Computer forensics; Digital evidence; Identification (biology); Data science,Digital forensics process; Investigative decision-making; Risk; Task analysis,Forensic Medicine; Humans; Workflow,,,,http://dx.doi.org/10.1016/j.scijus.2022.01.002,35277231,10.1016/j.scijus.2022.01.002,,,0,001-334-079-265-518; 003-232-363-219-004; 004-934-589-759-348; 005-232-046-693-557; 005-997-056-658-776; 006-435-365-660-88X; 010-061-391-662-193; 010-963-610-208-920; 020-944-423-224-895; 021-862-840-020-92X; 022-013-057-077-326; 026-774-296-742-022; 035-233-982-194-067; 046-143-775-958-052; 049-347-540-283-189; 058-052-081-943-595; 062-168-384-023-533; 065-332-103-727-835; 074-706-219-689-754; 075-529-701-912-32X; 092-765-349-680-750; 094-142-794-127-63X; 124-114-990-459-947; 143-408-563-865-265; 149-526-118-910-836; 162-110-149-751-921; 163-376-020-626-884; 190-343-104-111-19X,1,true,cc-by-nc-nd,hybrid 165-956-283-954-04X,Digital evidence and digital forensic education,2016-11-05,2016,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Goran Oparnica,"Introduction by editor: I invited Goran to write about the need for education in digital evidence from his perspective: that is, somebody that moved into digital forensics in Croatia some years ago because of a need by his then employers. Goran is well aware of some of the excellent books on digital forensics, as well as the books written by lawyers on the topic. This is a polemic and a personal view from a person providing a digital forensics service in a country that does not have the luxury of resources that other, better off, countries have. This article has been written in an attempt to convince the people responsible for the curricula that it is not possible to respond against organized crime without a substantial shift in approach towards digital evidence. Index words: digital evidence; digital forensics; education; lawyers; judges; legal academics",13,0,143,147,Political science; Digital native; Law; Organised crime; Index (publishing); Digital evidence; Göran; Media studies; Curriculum; Computer forensics; Digital forensics,,,,,https://journals.sas.ac.uk/deeslr/article/view/2305,http://dx.doi.org/10.14296/deeslr.v13i0.2305,,10.14296/deeslr.v13i0.2305,2555146856,,0,,6,true,cc-by-nc-nd,gold 166-314-098-559-795,MACHINE LEARNING FORENSICS:A NEW BRANCH OF DIGITAL FORENSICS,2017-08-30,2017,journal article,International Journal of Advanced Research in Computer Science,09765697,IJARCS International Journal of Advanced Research in Computer Science,,Parag H. Rughani; Prerak Bhatt,"The objective of this research is to understand how machine learning can be used in digital crime and its forensic importance, setting up an environment to train artificial neural networks and investigate as well as analyze them to find artefacts that can be helpful in forensic investigation.",8,8,217,222,Machine learning; Artificial intelligence; Computer science; Artificial neural network; Computer forensics; Digital forensics,,,,,http://www.ijarcs.info/index.php/Ijarcs/article/download/4613/4155 http://ijarcs.info/index.php/Ijarcs/article/view/4613,http://dx.doi.org/10.26483/ijarcs.v8i8.4613,,10.26483/ijarcs.v8i8.4613,2765947859,,0,,10,true,cc-by,hybrid 166-800-654-194-357,Contents List,,2016,journal article,Digital Investigation,17422876; 1873202x,Elsevier BV,Netherlands,,,18,,iii,iii,Computer science; World Wide Web; Computer security,,,,,https://core.ac.uk/download/pdf/82035161.pdf,http://dx.doi.org/10.1016/s1742-2876(16)30067-6,,10.1016/s1742-2876(16)30067-6,,,0,,0,true,cc-by-nc-nd,hybrid 167-000-265-524-448,Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes,2013-03-07,2013,journal article,SPIE Proceedings,0277786x,SPIE,,Mario Hildebrandt; Stefan Kiltz; Jana Dittmann,"The digitization of physical traces from crime scenes in forensic investigations in effect creates a digital chain-of-custody and entrains the challenge of creating a link between the two or more representations of the same; trace. In order to be forensically sound, especially the two security aspects of integrity and authenticity need; to be maintained at all times. Especially the adherence to the authenticity using technical means proves to; be a challenge at the boundary between the physical object and its digital representations. In this article we; propose a new method of linking physical objects with its digital counterparts using two-dimensional bar codes; and additional meta-data accompanying the acquired data for integration in the conventional documentation; of collection of items of evidence (bagging and tagging process). Using the exemplary chosen QR-code as; particular implementation of a bar code and a model of the forensic process, we also supply a means to integrate; our suggested approach into forensically sound proceedings as described by Holder et al.1 We use the example of; the digital dactyloscopy as a forensic discipline, where currently progress is being made by digitizing some of the; processing steps. We show an exemplary demonstrator of the suggested approach using a smartphone as a mobile; device for the verification of the physical trace to extend the chain-of-custody from the physical to the digital; domain. Our evaluation of the demonstrator is performed towards the readability and the verification of its; contents. We can read the bar code despite its limited size of 42 x 42 mm and rather large amount of embedded; data using various devices. Furthermore, the QR-code's error correction features help to recover contents of; damaged codes. Subsequently, our appended digital signature allows for detecting malicious manipulations of; the embedded data.",8667,,213,223,Digital signature; Forensic science; Crime scene; Mobile device; Information retrieval; Digitization; Computer science; Multimedia; Computer forensics; TRACE (psycholinguistics); Process (computing),,,,,https://www.spiedigitallibrary.org/conference-proceedings-of-spie/8667/1/Digitized-forensics--retaining-a-link-between-physical-and-digital/10.1117/12.2004548.full https://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=1662470 https://ui.adsabs.harvard.edu/abs/2013SPIE.8667E..0SH/abstract,http://dx.doi.org/10.1117/12.2004548,,10.1117/12.2004548,1981711882,,0,,1,false,, 168-059-072-881-871,An Approach for Estimating Forensic Data Provenance of an Object in the Cloud Environment using One Dimensional Successive Bisection Method,2016-04-15,2016,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Victor R. Kebande; Nickson M. Karie,"The decline in traditional forensics and the emergence of cloud forensics has made it hard for digital forensic investigators to conduct digital investigations due to inadaptability of the cloud to digital forensic processes. Additionally, data that resides in the cloud is normally scattered across constantly changing data centers, hosts and virtual instances are easily destroyed as they are created. On the same note it is not easy to seize physical devices where a particular crime has occurred and locating the origin of an object in the cloud can be a challenge when we do not know where the actual data resides. Data provenance provides a solution whereby one can trace data based on the tag as it keeps changing directions in the cloud. However, if the distance between two particular tagged data is taken into account then the source and destination of an object can be located easily which can then enable digital forensic investigators to locate the physical devices. The problem that this paper is addressing is that, there is no easy way of locating data provenance in the cloud environment without estimating the distance between tagged data that moves in the cloud. Based on this, the authors have proposed a mechanism for locating the provenance of an object using successive bisection method. Similar test have been carried using different intervals in an experiment and the results are very promising. General Terms Digital Forensics, provenance, cloud.",140,1,34,39,Forensic science; Bisection method; Information retrieval; Data science; Provenance; Cloud forensics; Computer science; Object (computer science); TRACE (psycholinguistics); Cloud computing; Digital forensics,,,,,https://www.ijcaonline.org/archives/volume140/number1/24562-2016909211 https://www.ijcaonline.org/research/volume140/number1/kebande-2016-ijca-909211.pdf,http://dx.doi.org/10.5120/ijca2016909211,,10.5120/ijca2016909211,2340968873,,0,007-355-906-471-544; 011-024-396-292-56X; 012-447-467-503-151; 023-709-114-205-69X; 032-182-801-166-90X; 044-373-289-676-771; 052-152-063-024-042; 056-150-947-987-596; 070-124-235-657-650; 071-184-460-604-724; 093-335-524-097-076; 111-987-302-074-551; 136-798-153-498-59X; 174-186-817-525-708,0,true,,bronze 168-245-076-589-180,Contemporaneous notes for digital forensic examinations,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Graeme Horsman,,37,,301173,,Work (electrical); Data science; Process (engineering); Digital forensics; History,,,,,https://www.sciencedirect.com/science/article/pii/S2666281721000810 https://dblp.uni-trier.de/db/journals/di/di37.html#Horsman21,http://dx.doi.org/10.1016/j.fsidi.2021.301173,,10.1016/j.fsidi.2021.301173,3162273119,,0,004-026-832-392-918; 005-232-046-693-557; 007-067-502-103-925; 007-868-297-443-532; 010-061-391-662-193; 010-963-610-208-920; 031-499-165-456-98X; 038-668-970-194-854; 071-908-933-643-362; 082-589-789-111-858; 099-377-733-522-116; 102-243-142-344-71X; 111-488-239-742-003; 135-251-586-815-292; 173-034-553-635-460,1,false,, 169-019-682-180-36X,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,39,,301323,301323,Information retrieval; Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00249-3,,10.1016/s2666-2817(21)00249-3,,,0,,0,true,,bronze 169-037-688-817-615,Prelim iii - Contents List,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,43,,301468,301468,Computer science; Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00149-4,,10.1016/s2666-2817(22)00149-4,,,0,,0,false,, 169-163-572-570-013,Physical security design of a digital forensic lab,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Doug Weeks; Bing Zhou,,13,4,418,418,Computer science; Digital forensics; Digital evidence; Computer forensics; Forensic science; Computer security; Data science; Physical security,,,,,,http://dx.doi.org/10.1504/ijesdf.2021.116017,,10.1504/ijesdf.2021.116017,,,0,,0,false,, 169-416-347-273-381,Detection of Metasploit Attacks Using RAM Forensic on Proprietary Operating Systems,2020-05-22,2020,journal article,"Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control",25032267; 25032259,Universitas Muhammadiyah Malang,,Danar Cahyo Prakoso; Riadi; Yudi Prayudi,"Information technology has become an essential thing in the digital era as it is today. With the support of computer networks, information technology is used as a medium for exchanging data and information. Much information is confidential. Therefore, security is also essential. Metasploit is one of the frameworks commonly used by penetration testers to audit or test the security of a computer system legally, but it does not rule out the possibility that Metasploit can also be used for crime. For this reason, it is necessary to carry out a digital forensic process to uncover these crimes. In this study, a simulation of attacks on Windows 10 will be carried out with Metasploit. Then the digital forensics process uses live forensics techniques on computer RAM, where the computer RAM contains information about the processes running on the computer. The live forensic technique is important because information on RAM will be lost if the computer is off. This research will use FTK Imager, Dumpit, and Magnet RAM Capture as the RAM acquisition tool and Volatility as the analysis tool. The results of the research have successfully shown that the live forensics technique in RAM is able to obtain digital evidence in the form of an attacker's IP, evidence of exploits/Trojans, processes running on RAM, operating system profiles used and the location of the exploits/Trojan when executed by the victim.",5,2,155,160,Operating system; Information technology; Exploit; Trojan; Digital forensic process; Digital evidence; Computer science; Confidentiality; Digital forensics; Process (computing),,,,,https://kinetik.umm.ac.id/index.php/kinetik/article/view/1037 https://kinetik.umm.ac.id/index.php/kinetik/article/download/1037/pdf https://core.ac.uk/download/pdf/326780305.pdf,http://dx.doi.org/10.22219/kinetik.v5i2.1037,,10.22219/kinetik.v5i2.1037,3027882824,,0,007-204-348-441-229; 008-441-081-714-181; 008-656-244-710-010; 017-662-176-550-891; 033-624-790-871-700; 036-409-985-618-198; 039-398-086-365-500; 043-703-546-622-938; 049-150-093-915-025; 055-473-899-043-485; 058-884-035-549-345; 101-819-655-568-965; 120-177-024-117-719; 121-266-887-418-366; 123-693-711-254-942; 131-861-074-437-518; 150-042-119-479-43X,0,true,cc-by-nc-sa,gold 170-481-935-489-564,Digital Autopsy (Virtopsy) in India: Steps taken and journey ahead,,2022,journal article,Journal of Indian Academy of Forensic Medicine,09710973; 09740848,Diva Enterprises Private Limited,,Adarsh Kumar,,44,suppl,43,46,,,,,,,http://dx.doi.org/10.5958/0974-0848.2022.00011.2,,10.5958/0974-0848.2022.00011.2,,,0,,0,false,, 170-961-216-449-905,10-13-DFRWS-Baltimore-2023 (2),,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,42,,301422,301422,Environmental science; Gerontology; Medicine,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00103-2,,10.1016/s2666-2817(22)00103-2,,,0,,0,false,, 171-177-825-236-988,Computer forensics on Android devices,2016-06-01,2016,journal article,Revista Ingenio,2389864x; 2011642x,Universidad Francisco de Paula Santander,,Dewar Rico Bautista; Johan Smith Rueda Rueda," ; En este artículo se estudian los principales conceptos de la informática forense. Qué es la informática forense, cuáles son sus objetivos y sus principios. También se mencionan algunas técnicas anti-forenses, el manejo de la evidencia digital, los modelos forenses y la legislación colombiana relacionada con la evidencia digital. Se hace énfasis en las buenas prácticas para la realización de un análisis forense.  ; ",9,1,21,34,Operating system; Computer science; Computer forensics; Android (operating system),,,,,https://doaj.org/article/31e4dee6b9fa403fa7a45bd05de4562c https://core.ac.uk/download/322563884.pdf,http://dx.doi.org/10.22463/2011642x.2063,,10.22463/2011642x.2063,3195445183,,0,013-331-920-213-649; 019-698-064-288-240; 030-674-871-669-121; 042-653-566-399-199; 061-733-902-008-548; 087-868-527-983-406; 109-279-350-025-229; 118-722-872-870-470; 179-503-171-644-756; 186-737-030-900-301,0,true,cc-by-nc,gold 171-959-362-512-494,Development of National Digital Evidence Metadata,2019-09-06,2019,journal article,Jurnal Online Informatika,25279165; 25281682,Sunan Gunung Djati State Islamic University of Bandung,,Bambang Sugiantoro,"The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line. The description process will return EXIF decryption results in the header image. This can secure EXIF Metadata information without changing the image quality",4,1,24,27,Encryption; Information retrieval; Digital evidence; Computer science; Digital image; Header; Line (text file); Information and Communications Technology; Metadata; File format,,,,,http://join.if.uinsgd.ac.id/index.php/join/article/download/292/118 http://join.if.uinsgd.ac.id/index.php/join/article/view/292 https://core.ac.uk/download/pdf/295600543.pdf,http://dx.doi.org/10.15575/join.v4i1.292,,10.15575/join.v4i1.292,2970970599,,0,,0,true,cc-by-nc-nd,gold 172-288-045-781-65X,A Survey on digital forensic investigation and its challenges in cloud using VM snapshots,,2018,journal article,International Journal of Advance Research and Innovative Ideas in Education,23954396,,,M Sirisha,Cloud computing is becoming most promising technology in recent days. It offers the scalable elastic services to many users at a time and it helps to access the resources quickly from cloud service provider. Digital forensics is part of computer forensics. Various challenges of cloud hinder the process of cloud forensics so that no standard framework for cloud forensics can be designed. This paper gathers the challenges and possible solutions. As new technologies develop criminals find ways to apply these technologies to commit crimes. With the explosion of web technologies almost all major businesses in the world have web presence thus exposing their data to legitimate and illegitimate users. All forensic work should be done with care including documenting clear chain of custody in order for the evidence to be admissive in a court of law.There is need of dedicated digital forensic framework for cloud environment. System proposes an efficient approach to forensic investigation in cloud using Virtual Machine (VM) snapshots.,4,3,1509,1514,Chain of custody; Commit; Emerging technologies; Data science; Virtual machine; Web presence; Computer science; Computer forensics; Cloud computing; Digital forensics,,,,,http://ijariie.com/FormDetails.aspx?MenuScriptId=107511,http://ijariie.com/FormDetails.aspx?MenuScriptId=107511,,,2806803373,,0,,0,false,, 172-453-362-846-118,A Proposed Model of Digital Forensic on Cloud Computing Security Infrastructure,2018-07-31,2018,journal article,International Journal of Innovation in Enterprise System,25803050,Telkom University,,Mohammad Hafiz Hersyah,"Over the past decades, practitioners and researchers have made remarkable achievements in digital forensic. The abilities to conquer major technical obstacles are bestowing practitioners greater access to digital evidence. Sophisticated forensic techniques and tools are being developed to assist forensic acquisition and extraction of volatile data, inspection of remote repositories system and analysis of network traffic. Computer forensic is a comprehensive work that based on several attributes that are : objectivity, relevance and legitimacy to compose a system model that projected to be an electronic evidence forensic system. Latest studies show that the rapid growing of cloud computing facilities usage that has enable various improvements as part of the innovation process at organisations. Information systems are in frequently exposed to various types of threats which able to trigger different types of bad consequences as more and more information stored, problems arise especially about security information technology risk aspects.",2,1,,,Digital forensics; Cloud computing; Computer science; Digital evidence; Computer security; Data science; Process (computing); Relevance (law); Objectivity (philosophy); Information security,,,,,,http://dx.doi.org/10.25124/ijies.v2i01.49,,10.25124/ijies.v2i01.49,,,0,,0,true,,gold 173-080-183-794-495,Ontology based model of digital forensic virtual lab and curriculum design,,2014,journal article,International Journal of Engineering Education,0949149x,,,Igor Franc; Ivan Stanković; Irina Branovic; Ranko Popovic,"Digital forensics (DF) is a discipline that uses investigative methods to find digital evidence and prepare it for legal proceedings incomputer crime cases. Since this is a relatively new teaching subject in higher education institutions, syllabi and curricula are notyet standardized. In this paper we present an ontological approach to DF curriculum design, and discuss its implementation in avirtual digital forensic laboratory. The virtual educational environment is designed for the generic study of digital forensics, and isbased on ontology and a composite-component approach. Basic components of our virtual DF are objects to be related, put intonew compositions and placed in a library; relationships between all of the components are defined in ontology. Based on gatheredexperience, we designed and described DF curricula for undergraduate, graduate and Ph.D. studies that are tailored to our needs,but at the same time can be used as the starting point for introducing digital forensics courses at universities.",30,4,964,976,Higher education; Point (typography); Ontology; Subject (documents); Digital evidence; Computer science; Syllabus; Curriculum; Multimedia; Digital forensics,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=7360948,https://dialnet.unirioja.es/servlet/articulo?codigo=7360948,,,3027993264,,0,,1,false,, 173-242-189-728-551,Sample Preparation For Pesticide Analysis in A Forensic Toxicology Laboratory: A Review,2018-05-07,2018,journal article,Journal of Forensic Sciences and Digital Investigation,,Northern California Open Access Publications,,,,,,27,45,Toxicology; Forensic science; Forensic toxicology; Pesticide; Sample (material); Laboratory safety; Environmental science; Biology; Medicine; Veterinary medicine; Ecology; Chemistry; Chromatography; Nuclear medicine,,,,,,http://dx.doi.org/10.29199/fsdi.101016,,10.29199/fsdi.101016,,,0,,1,true,cc-by,hybrid 174-410-429-997-045,Cyber Crime Intervention- Attacks Analysis for Digital Forensics,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Gp. Capt P Aanand Naidu,,,,,,Intervention (counseling); Cyber crime; Computer security; Computer science; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.02,http://dx.doi.org/10.46293/4n6/2021.03.02.02,,10.46293/4n6/2021.03.02.02,3161248771,,0,,1,false,, 174-412-922-343-845,Robotic Process Automation - An Overview,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Mohith Yadav,,,,,,Engineering; Systems engineering; Process automation system,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.06,http://dx.doi.org/10.46293/4n6/2020.02.04.06,,10.46293/4n6/2020.02.04.06,3095528212,,0,,1,false,, 175-273-946-966-114,Twenty Second Annual DFRWS Conference,,2022,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,,,42,,301430,,,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301430,,10.1016/j.fsidi.2022.301430,,,0,,0,false,, 175-630-039-571-779,Digital Forensic Signal Instant Messages Services in Case of Cyberbullying using Digital Forensic Research Workshop Method,2022-10-20,2022,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Aji Gelar Prayogo; Imam Riadi,,184,32,21,29,,,,,,,http://dx.doi.org/10.5120/ijca2022922393,,10.5120/ijca2022922393,,,0,,0,false,, 175-631-077-425-11X,Viability of Consumer Grade Hardware for Learning Computer Forensics Principles,2021-04-19,2021,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Lazaro A Herrera,,16,1,3,,Computer science; Multimedia; Computer forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1683&context=jdfsl https://commons.erau.edu/jdfsl/vol16/iss1/3/,https://commons.erau.edu/jdfsl/vol16/iss1/3/,,,3164729417,,0,,0,true,cc-by-nc,gold 176-304-954-831-493,Application of multiple criteria decision making in the selection of digital forensics software,,2016,journal article,Vojnotehnicki glasnik,00428469,Centre for Evaluation in Education and Science (CEON/CEES),,Dejan Stanivukovic; Dragan Randjelovic,"Nowadays there is almost no criminal offense in the investigation of which digital evidence does not play a key role. Constant increase of the capacity of media that store digital data leads to continuous increase of the time necessary to identify and copy (acquire) digital evidence. Selection of appropriate digital forensics software is gaining in importance. Selection of adequate software includes a previous comparative analysis of two or more digital forensics software tools and an optimization process. The objective of the comparative analysis of these software tools is to determine and compare each of their realistic and comparable performances. Optimization aims to determine which of digital forensics software tools has better performances. This paper shows one of possible variants of selecting digital forensics software, using the latest scientific achievements in support of decision making based on the analytic hierarchy process (AHP) method and the Expert Choice computer program.",64,4,1083,1101,Software engineering; Data mining; Key (cryptography); Computer program; Software; Digital data; Digital evidence; Computer science; Process (engineering); Digital forensics; Analytic hierarchy process,,,,,https://scindeks-clanci.ceon.rs/data/pdf/0042-8469/2016/0042-84691604083S.pdf https://scindeks.ceon.rs/Article.aspx?artid=0042-84691604083S https://cyberleninka.ru/article/n/application-of-multiple-criteria-decision-making-in-the-selection-of-digital-forensics-software,http://dx.doi.org/10.5937/vojtehg64-8938,,10.5937/vojtehg64-8938,2516568482,,0,,0,true,cc-by,gold 176-605-425-739-746,The Hierarchy of Case Priority (HiCaP):- A proposed method for case prioritisation in digital forensic laboratories,,2022,journal article,Science & Justice,13550306; 18764452,Elsevier BV,United Kingdom,Graeme Horsman,"The need for digital forensic science (DFS) services has grown due to widespread and consistent engagement with technology by members of society. Whilst digital evidence often plays an important role in many inquiries, available investigative resources have failed to keep pace with such demand for them. As a result, the use case prioritisation models for backlog/workload management are of increasing importance to ensure the effective deployment of laboratory resources. This work focuses on the concept of ​​case prioritisation in a digital forensic laboratory setting, following the submission of exhibits for examination, where this workflow is described. The challenges of case management and prioritisation in laboratories are discussed, with both ‘case acceptance’ and ‘case prioritisation’ procedures explained. Finally, the ‘Hierarchy of Case Priority’ (HiCaP) - a transparent, risk-based approach for the prioritisation of cases for examination, is proposed and described using examples.",62,5,594,601,Workflow; Hierarchy; Software deployment; Workload; Pace; Computer science; Risk analysis (engineering); Digital forensics; Work (physics); Computer security; Process management; Engineering; Business; Software engineering; Mechanical engineering; Geodesy; Database; Economics; Market economy; Geography; Operating system,,,,,,http://dx.doi.org/10.1016/j.scijus.2022.08.008,,10.1016/j.scijus.2022.08.008,,,0,000-360-120-513-679; 003-232-363-219-004; 031-655-872-268-787; 039-464-927-660-188; 040-567-901-099-238; 079-273-634-331-435; 083-937-536-208-584; 094-142-794-127-63X; 108-884-210-316-066; 126-591-597-706-715; 184-069-302-229-82X; 190-343-104-111-19X,0,true,,hybrid 176-777-857-831-803,CYBER FORENSIC TOOLS AND ITS APPLICATION IN THE INVESTIGATION OF DIGITAL CRIMES: PREVENTIVE MEASURES WITH CASE STUDIES,2022-02-01,2022,journal article,INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH,,World Wide Journals,,Yerriswamy K; G. S. Venumadhava,"Forensics, the science of using physical evidence to crack crime, has taken on a new avatar. The cyber forensic process is also advancing in new; ways. Digital forensics is the science of identifying, extracting, analyzing, and presenting the digital evidence that has been stored in digital; devices. Various digital tools and techniques are being used to achieve this. Here, the new cyber sleuths step in, armed with cyber forensics tools.; According to Section 65 of the Indian IT Act, a person who intentionally conceals or destroys or alters or intentionally or knowingly causes another; to conceal, destroy or alter any computer source code used for a computer, computer program, computer system, or network. To primary objective; of this study is to nd the role of Cyber Forensic Tools in Cyber investigation. It is better to sue security programmers by the body corporate to; control information on sites. Strict statutory laws need to be passed by the legislatures keeping in mind the interest of citizens. Working on this; paper helped me understand the primary aim of the cyber lab in solving the cases by analyzing the evidence given to them. Using cyber forensic; tools allows us to extract the data from the targeted devices, which plays a signicant role in detecting and collecting information regarding; cybercrimes.",,,71,73,Computer forensics; Digital evidence; Digital forensics; Computer science; Cyber crime; Computer security; Process (computing); Hacker; Data science; World Wide Web; The Internet; Operating system,,,,,,http://dx.doi.org/10.36106/ijsr/9633529,,10.36106/ijsr/9633529,,,0,007-362-065-583-626; 009-671-935-335-418; 014-065-195-857-333; 015-264-924-343-905; 021-563-550-669-43X; 023-252-810-319-853; 030-269-579-295-629; 032-810-109-985-524; 040-097-713-526-921; 042-972-111-603-681; 044-688-819-027-098; 046-527-367-793-765; 047-221-550-114-462; 055-590-023-850-939; 092-733-362-703-818; 095-437-078-101-003; 097-291-912-559-74X; 114-586-389-130-502; 133-332-986-537-019; 151-978-817-476-177; 192-212-429-382-054,0,false,, 177-886-630-508-584,Accrediting a Digital Evidence Laboratory,,2019,journal article,Forensic Science International: Synergy,2589871x,Elsevier BV,,Tracy Walraven,,1,,S7,,Engineering; Digital evidence; Medical education,,,,,https://api.elsevier.com/content/article/PII:S2589871X19301056?httpAccept=text/xml,http://dx.doi.org/10.1016/j.fsisyn.2019.06.022,,10.1016/j.fsisyn.2019.06.022,2969145815,,0,,0,true,"CC BY, CC BY-NC-ND",gold 178-083-319-545-064,Digital Forensics: Smart Aid for Digital Evidences,2018-04-24,2018,journal article,International journal of engineering research and technology,22780181,,,Mukul Kumar Srivastava; Devansh Chopra; null Vaishali,,5,10,,,Computer science; Multimedia; Digital forensics,,,,,https://www.ijert.org/research/digital-forensics-smart-aid-for-digital-evidences-IJERTCONV5IS10048.pdf https://www.ijert.org/digital-forensics-smart-aid-for-digital-evidences,https://www.ijert.org/digital-forensics-smart-aid-for-digital-evidences,,,2940971534,,0,,0,false,, 178-861-239-354-75X,Distance Learning in Forensic Nursing: The Lived Educational Experience,2018-04-17,2018,journal article,Journal of Forensic Sciences and Digital Investigation,26377136,Northern California Open Access Publications,,,,,,18,26,Forensic nursing; Forensic science; Psychology; Nursing; Medical education; Medicine; Geography; Archaeology,,,,,,http://dx.doi.org/10.29199/2637-7136/fsdi-101015,,10.29199/2637-7136/fsdi-101015,,,0,,0,true,cc-by,gold 179-322-950-074-016,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,36,,301143,301143,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00041-x,,10.1016/s2666-2817(21)00041-x,,,0,,0,false,, 179-683-412-689-404,Second Annual DFRWS APAC Conference,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,43,,301462,301462,Political science,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301462,,10.1016/j.fsidi.2022.301462,,,0,,0,false,, 179-762-953-856-987,A Block-chain based Enforcement to Reduce Cybercrimes in Digital Forensics,2021-07-01,2021,journal article,Journal of emerging technologies and innovative research,23495162,,,Susheel George Joseph; Tincy Thomas; Sahal P Najeeb; Sangeetha Sathyapal,"The fundamental aim of digital forensics is to discover, investigate, and protect an evidence, increasing cybercrime enforces, digital forensics team have to more accurate evidence handling. It makes digital evidence as an important factor to link persons with criminal activities. A chain of custody refers to a process of recording and preserving in court of law. It forms the forensic link of evidence sequence of control, transfer, analysis to preserve integrity, and to prevent its contamination. Thus it is of utmost importance to guarantee integrity, authenticity, of digital evidences in cyber-crime investigation. So guaranteeing the authenticity and legality of processes and procedures used to gather and transfer the evidence in a digital society is a real challenge. Block-chain technologies of enabling view of transaction back to origination provide enormous promise for the coming era.it is also used for securing IoT devices through efficient authentication and data transfer mechanisms. Block-chain based digital forensics chain of custody, influence forensic applications in bringing integrity to digital forensics.",8,7,,,Chain of custody; Authentication (law); Cybercrime; Enforcement; Digital evidence; Computer security; Computer science; Process (engineering); Database transaction; Digital forensics,,,,,https://www.jetir.org/papers/JETIR2107536.pdf https://www.jetir.org/view?paper=JETIR2107536,https://www.jetir.org/view?paper=JETIR2107536,,,3186463163,,0,,0,false,, 179-768-158-884-687,BeatClass: A Sustainable ECG Classification System in IoT-Based eHealth,2022-05-15,2022,journal article,IEEE Internet of Things Journal,23274662; 23722541,Institute of Electrical and Electronics Engineers (IEEE),United States,Le Sun; Yilin Wang; Zhiguo Qu; Neal N. Xiong,,9,10,7178,7195,,,,,National Natural Science Foundation of China; Priority Academic Program Development,,http://dx.doi.org/10.1109/jiot.2021.3108792,,10.1109/jiot.2021.3108792,,,0,000-099-369-206-782; 000-300-029-616-517; 003-036-167-472-899; 004-328-157-921-129; 005-834-508-447-755; 005-969-590-439-807; 006-720-431-080-617; 007-938-231-874-71X; 008-548-466-272-724; 008-845-774-303-685; 013-830-938-681-770; 014-430-146-200-135; 015-871-394-747-842; 017-041-772-309-963; 018-152-293-983-502; 019-626-708-661-862; 021-116-237-608-310; 021-270-808-127-891; 022-797-858-011-915; 023-979-812-700-057; 024-237-994-854-746; 025-716-961-802-207; 026-193-038-313-22X; 029-425-452-049-996; 031-824-904-893-988; 034-297-493-798-528; 035-797-753-090-129; 036-230-871-730-894; 037-749-870-845-291; 039-032-160-233-455; 043-252-925-112-751; 048-075-250-484-879; 048-589-423-925-74X; 051-123-575-499-851; 051-691-464-234-311; 055-436-967-663-668; 057-179-637-180-282; 063-496-550-304-162; 070-222-741-649-089; 082-932-537-054-872; 084-305-564-542-847; 086-396-555-703-986; 088-955-369-233-66X; 098-051-089-135-038; 099-300-786-330-833; 117-500-513-151-386; 118-236-461-472-212; 132-856-699-721-658; 136-104-577-044-031; 144-189-203-158-371; 162-919-031-232-954; 164-900-611-021-857; 186-755-774-542-817,17,false,, 180-118-259-265-800,Storing Forensic Data Against Interference,2022-07-20,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Amenuveve Gracious Adzogbley,"Digital forensic investigators face a wide range of inquiry goals, such as dealing with cybercrime. Digital forensic tools are no different. Different digital traces were examined on persistent storage devices (SSDs, SD cards, and USB drives), volatile memory snapshots, and network captures. A large realistic, timely training data is required to train experts, improve the forensic tools and keep their knowledge and capabilities up to date. However, there is a significant gap in digital forensic training data due to many factors such as privacy, secrecy, data protection, and intellectual property rights. Multiple frameworks for generating realistic digital forensic data sets have been proposed in recent years. None of these frameworks offers a comprehensive strategy for creating digital forensic tools, for relevant traces, from many sources. Keywords s: Data Storage, Cybersecurity, Cybercrime, Protection, Forensics, interference. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Amenuveve Gracious Adzogbley (2022). Storing Forensic Data Against Interference SMART-IEEE-Creative Research Publications Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 7-14. www.isteams.net/ITlawbookchapter2022. dx.doi.org/",1,1,7,14,Digital forensics; Computer science; Computer security; Nexus (standard); Cybercrime; Secrecy; Intellectual property; Law enforcement; Data science; World Wide Web; The Internet; Law; Political science; Embedded system; Operating system,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p2,,10.22624/aims/crp-bk3-p2,,,0,,0,true,,bronze 180-706-989-021-884,Digital Evidence for Database Tamper Detection,,2012,journal article,Journal of Information Security,21531234; 21531242,"Scientific Research Publishing, Inc.",,Shweta Tripathi; Bandu B. Meshram,"Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. Starting with the basics of oracle architecture, continuing with the basic steps of forensic analysis the paper elaborates the extraction of suspicious locations in oracle. As a forensic examiner, collecting digital evidence in a database is a key factor. Planned and a modelled way of examination will lead to a valid detection. Based on the literature survey conducted on different aspects of collecting digital evidence for database tamper detection, the paper proposes a block diagram which may guide a database forensic examiner to obtain the evidences.",3,2,113,121,Block diagram; Key (cryptography); Digital evidence; Oracle database; Literature survey; Focus (computing); Computer science; Oracle; Database; Identification (information),,,,,https://dblp.uni-trier.de/db/journals/jisec/jisec3.html#TripathiM12 https://www.scirp.org/html/7-7800072_18796.htm https://file.scirp.org/pdf/JIS20120200006_49093321.pdf https://file.scirp.org/Html/7-7800072_18796.htm https://www.scirp.org/journal/PaperDownload.aspx?paperID=18796 https://dx.doi.org/10.4236/jis.2012.32014 http://dx.doi.org/10.4236/jis.2012.32014,http://dx.doi.org/10.4236/jis.2012.32014,,10.4236/jis.2012.32014,2135960911,,0,043-328-161-679-384; 043-742-356-311-540; 129-415-196-725-196; 138-851-840-986-301; 193-611-410-267-544; 193-668-588-183-329,21,true,,gold 180-750-337-060-181,Rise of Digital Forensics and its impact on criminal justice: A study of tools and techniques involved,2021-10-01,2021,journal article,Technoarete Transactions on Advances in Social Sciences and Humanities,25831127,Technoarete Research and Development Association,,Askar Mohammed Ali Garad,"With the technological advancement in various fields, the digital forensics technology has also been revolutionized and as a result, criminal justice system has been substantially changed. However, various information technologies has not just enabled the researchers to find out the criminals but also helped them to identify the root cause for crimes. Along with that, there has been a growth in justice system as a result of the technological advancements. In the study, various aspects of digital forensics have been identified and described effectively. In India, the numbers of crimes are growing faster and their techniques are changing as well. That is creating challenges to make justice against it without adequate evidence. In that case, which kinds of evidence can be collected and from which resources, have been discussed here with clear information. How the technological changes are impacting the criminal investigation procedures and bringing more efficiency, have been discussed as well. Keyword : Digital forensic technologies, Criminal activities, Criminal justice, Justice System, Evidence.",1,1,16,20,,,,,,,http://dx.doi.org/10.36647/ttassh/01.01.a005,,10.36647/ttassh/01.01.a005,,,0,,0,false,, 181-046-082-158-36X,Digital Forensics Triage Classification Model using Hybrid Learning Approaches,2022-05-01,2022,journal article,International Journal of Innovative Research in Computer Science & Technology,23475552,Innovative Research Publication,,Mohmed Afridhi L; Palanivel K,"The Internet and the accessibility of gadgets with connectivity have resulted in the global spread of cyber threats and cybercrime, posing significant hurdles for digital forensics. Consequently, the volume of information that may need to be investigated is growing, necessitating the development of new forensic technologies and methods. Those now in use are, in fact, old-fashioned, as they are more focused on complete device extraction for case-relevant device identification. A practical approach, a Digital Forensics Triage, tries to quickly collect facts and give essential insight into this circumstance, which could be described as data-rich but information-poor. In time- sensitive scenarios, digital forensics triage approaches can prioritize some electronic gadgets over others based on their significance to the criminal case. The Digital Forensic Laboratories (DFS) make it easier to identify essential gadgets in criminal proceedings when time, significant accumulations, and the accused's confidentiality are critical considerations. Consequently, digital forensics and machine learning techniques allow for the rapid classification of appropriate gadgets despite dipping the quantity of information that has to be adequately studied. This study presents a digital forensic model that may be utilized to build a robotic digital device categorization tool employed in real- world criminal investigations.",,,29,39,Digital forensics; Computer science; Cybercrime; Computer forensics; Triage; Identification (biology); Confidentiality; Computer security; The Internet; Categorization; Digital evidence; Data science; Criminal investigation; World Wide Web,,,,,,http://dx.doi.org/10.55524/ijircst.2022.10.3.7,,10.55524/ijircst.2022.10.3.7,,,0,,0,true,,gold 181-079-576-381-773,Prelim i - Editorial Board,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,34,,301066,301066,Editorial board; Library science; Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30363-2,,10.1016/s2666-2817(20)30363-2,,,0,,0,true,,bronze 181-095-475-426-346,A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS,,2014,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Asou Aminnezhad; Ali Dehghantanha,"Privacy issues have always been a major concern in ; computer forensics and security and in case of any ; investigation whether it is pertaining to computer or ; not always privacy issues appear. To enable ; privacy’s protection in the physical world we need ; the law that should be legislated, but in a digital ; world by rapidly growing of technology and using ; the digital devices more and more that generate a ; huge amount of private data it is impossible to ; provide fully protected space in cyber world ; during the transfer, store and collect data. Since its ; introduction to the field, forensics investigators, ; and developers have faced challenges in finding the ; balance between retrieving key evidences and ; infringing user privacy. This paper looks into ; developmental trends in computer forensics and ; security in various aspects in achieving such a ; balance. In addition, the paper analyses each ; scenario to determine the trend of solutions in these ; aspects and evaluate their effectiveness in resolving ; the aforementioned issues.",1,4,311,323,Internet privacy; Information privacy; Privacy by Design; Key (cryptography); Space (commercial competition); Field (computer science); Computer security; Computer science; Privacy software; Computer forensics; Digital forensics,,,,,https://oaji.net/articles/2014/541-1394063756.pdf http://sdiwc.net/digital-library/a-survey-on-privacy-issues-in-digital-forensics.html https://usir.salford.ac.uk/id/eprint/34016/ https://usir.salford.ac.uk/34016/1/asurvey.pdf,http://sdiwc.net/digital-library/a-survey-on-privacy-issues-in-digital-forensics.html,,,1777986895,,0,001-135-038-170-705; 002-309-657-882-780; 005-371-287-203-15X; 009-701-742-236-493; 011-972-444-921-827; 014-299-240-901-551; 014-843-854-619-370; 021-081-859-033-024; 025-697-732-683-864; 026-641-935-890-517; 029-556-786-638-555; 033-418-529-263-94X; 035-877-258-121-493; 041-227-773-004-745; 043-424-400-377-990; 045-581-544-307-619; 049-510-490-983-722; 050-308-742-156-878; 055-171-589-229-352; 055-298-070-090-639; 062-325-585-829-185; 076-578-517-786-850; 078-308-540-254-61X; 085-438-282-926-16X; 093-551-054-279-495; 096-551-303-281-385; 101-175-825-913-864; 106-457-582-124-533; 116-992-792-378-045; 117-614-574-133-806; 128-881-441-058-633; 162-294-443-562-944; 174-154-493-004-474,47,false,, 181-649-072-258-458,Defining principles for preserving privacy in digital forensic examinations,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Graeme Horsman,"As digital devices play an increasing role in criminal investigations, where in some cases the data they contain may describe events where few other sources of information exist, there is an increasing concern regarding potential privacy invasion caused by their examination. ICO, 2020, the Information Commissioner's Office called for the greater evaluation and scrutiny of data extraction and examination processes deployed by investigating authorities with regard to smartphone data. In doing so, a light was shone on the wider issues and balancing act of maintaining data privacy whilst still allowing for an effective investigation to be conducted by law enforcement. This article proposes a set of ten Privacy-Preserving Data Processing Principles (PPDPP) for consideration by those conducting the digital forensic extraction and examination of data from a digital device. These principles define conduct that is indicative of privacy-preserving, where it is encouraged that those undertaking device investigations demonstrate evidence of adherence to the spirit of them. • The challenges of maintaining privacy whilst conducting a digital investigation are discussed. • The balancing act of carrying out effective investigations Vs. limiting intrusion is explored. • 10 Privacy-Preserving Data Processing Principles (PPDPP) for digital forensic examinations are offered.",40,,301350,301350,Scrutiny; Limiting; Computer science; Internet privacy; Law enforcement; Computer security; Digital forensics; Intrusion; Information privacy; Data extraction; Digital evidence; Privacy policy; Digital data; Enforcement; Law; Political science; Engineering; Data transmission; Mechanical engineering; Computer network; Geochemistry; MEDLINE; Geology,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301350,,10.1016/j.fsidi.2022.301350,,,0,006-138-917-123-177; 010-963-610-208-920; 016-526-859-340-786; 032-451-540-235-796; 045-581-544-307-619; 053-514-971-073-351; 061-269-967-405-492; 062-137-637-964-947; 102-243-142-344-71X; 114-090-829-194-843,1,true,,bronze 182-664-038-879-615,Methods for forgery detection in digital forensics,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Punam Sunil Raskar; Sanjeevani Kiran Shah,,13,5,528,528,Computer science; Digital forensics; Computer forensics; Computer security; Digital evidence; Cybercrime; Data science,,,,,,http://dx.doi.org/10.1504/ijesdf.2021.117310,,10.1504/ijesdf.2021.117310,,,0,,0,false,, 182-757-173-672-636,Smart Digital Forensic Readiness Model for Shadow IoT Devices,2022-01-12,2022,journal article,Applied Sciences,20763417,MDPI AG,,Funmilola Ikeolu Fagbola; Hein S. Venter,"Internet of Things (IoT) is the network of physical objects for communication and data sharing. However, these devices can become shadow IoT devices when they connect to an existing network without the knowledge of the organization’s Information Technology team. More often than not, when shadow devices connect to a network, their inherent vulnerabilities are easily exploited by an adversary and all traces are removed after the attack or criminal activity. Hence, shadow connections pose a challenge for both security and forensic investigations. In this respect, a forensic readiness model for shadow device-inclusive networks is sorely needed for the purposes of forensic evidence gathering and preparedness, should a security or privacy breach occur. However, the hidden nature of shadow IoT devices does not facilitate the effective adoption of the most conventional digital and IoT forensic methods for capturing and preserving potential forensic evidence that might emanate from shadow devices in a network. Therefore, this paper aims to develop a conceptual model for smart digital forensic readiness of organizations with shadow IoT devices. This model will serve as a prototype for IoT device identification, IoT device monitoring, as well as digital potential evidence capturing and preservation for forensic readiness.",12,2,730,730,Shadow (psychology); Digital forensics; Computer science; Computer security; Internet of Things; Digital evidence; Identification (biology); Adversary; Network forensics; Data science,,,,,,http://dx.doi.org/10.3390/app12020730,,10.3390/app12020730,,,0,007-394-596-774-68X; 008-782-115-725-766; 010-056-989-204-596; 016-526-859-340-786; 018-203-874-457-567; 025-484-846-284-184; 030-049-554-857-766; 030-467-408-846-630; 033-988-523-544-139; 034-940-557-037-083; 045-098-715-794-977; 069-321-740-091-392; 071-286-450-911-218; 098-597-156-681-069; 099-237-242-218-916; 114-116-684-871-032; 144-332-771-355-17X; 166-496-298-791-206,5,true,cc-by,gold 182-962-693-791-500,A generalized approach to automotive forensics,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Kevin Klaus Gomez Buquerin; Christopher Corbett; Hans-Joachim Hof,"Abstract In the past years, software became an essential topic in modern vehicles, e.g., with the rise of more and more complex driver assistance systems. The advent of automated driving will drive this trend even further. Today, accident investigation, as well as warranty claim analysis, need to take into consideration an analysis of the rapidly increasing proportion of software and security based implementations as part of modern vehicles, the so-called digital forensics. This paper evaluates the general feasibility of digital forensics on a state-of-the-art vehicle. To do so, we analyzed current digital forensics techniques on a state-of-the-art vehicle to constitute gaps in the automotive forensics process used on in-vehicle systems. We present a general process for automotive forensics to close existing gaps and implemented it on a state-of-the-art vehicle in an in-vehicle device manipulation scenario. The implementation uses the on-board diagnostics interface, the diagnostics over internet protocol, as well as the unified diagnostic services for communication. Our implementation requires automotive Ethernet at the diagnostic interface. Our research shows future directions for efficient automotive forensic as well as the exemplary feasibility of automotive forensic analysis on state-of-the-art vehicles without the need for additional in-vehicle components such as intrusion detection systems or event data recorders.",36,,301111,,Interface (computing); Systems engineering; Implementation; Software; Intrusion detection system; Computer science; Process (engineering); Automotive industry; Digital forensics; Advanced driver assistance systems,,,,,https://www.sciencedirect.com/science/article/pii/S2666281721000056 https://dfrws.org/wp-content/uploads/2021/08/2021_EU_paper-a_generalized_approach_to_automotive_forensics.pdf https://dfrws.org/presentation/a-generalized-approach-to-automotive-forensics/,http://dx.doi.org/10.1016/j.fsidi.2021.301111,,10.1016/j.fsidi.2021.301111,3138203095,,0,004-902-840-417-30X; 005-899-402-239-840; 024-846-790-183-200; 056-136-854-556-542; 058-156-586-882-704; 061-579-640-433-241; 098-748-261-333-651; 101-524-637-170-787; 112-810-718-627-378; 113-275-562-703-091; 124-724-491-020-815; 131-190-659-305-284; 133-680-557-338-223; 154-726-837-554-003; 158-761-508-726-627; 164-237-361-721-835; 176-677-801-635-928; 180-201-633-247-977; 196-559-417-455-648,2,true,cc-by-nc-nd,hybrid 183-680-361-426-436,A Secure Information Transmission Protocol for Healthcare Cyber Based on Quantum Image Expansion and Grover Search Algorithm,,2022,journal article,IEEE Transactions on Network Science and Engineering,23274697; 2334329x,Institute of Electrical and Electronics Engineers (IEEE),,Zhiguo Qu; Hanrong Sun,,,,1,13,,,,,"National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; Natural Science Foundation of Jiangsu Province; Sichuan Youth Science and Technique Foundation; Open Foundation of State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications",,http://dx.doi.org/10.1109/tnse.2022.3187861,,10.1109/tnse.2022.3187861,,,0,,0,false,, 184-069-302-229-82X,Methods and Tools of Digital Triage in Forensic Context: Survey and Future Directions,2017-03-28,2017,journal article,Symmetry,20738994,MDPI AG,Switzerland,Vacius Jusas; Darius Birvinskas; Elvar Gahramanov,"Digital triage is the first investigative step of the forensic examination. The digital triage comes in two forms, live triage and post-mortem triage. The primary goal of the live triage is a rapid extraction of an intelligence from the potential sources. The live triage raises legitimate concerns. The post-mortem triage is conducted in the laboratory and its main goal is ranking of the seized devices for the possible existence of the relevant evidence. The digital triage has the potential to quickly identify items that are likely to contain the evidential data. Therefore, it is a solution to the problem of case backlogs. However, existing methods and tools of the digital triage have limitations, especially, in the forensic context. Nevertheless, we have no better solution for the time being. In this paper, we critically review published research works and the proposed solutions for digital triage. The review is divided into four sections as follows: live triage, post-mortem triage, mobile device triage, and triage tools. We conclude that many challenges are awaiting for the developers in creating methods and tools of digital triage in order to keep pace with the development of new technologies.",9,4,49,,Mobile device; Ranking; Emerging technologies; Data science; Triage; Pace; Context (language use); Forensic examination; Computer security; Computer science; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/symmetry/symmetry9.html#JusasBG17 https://doi.org/10.3390/sym9040049 https://www.mdpi.com/2073-8994/9/4/49 https://www.mdpi.com/2073-8994/9/4/49/pdf https://core.ac.uk/download/80047889.pdf,http://dx.doi.org/10.3390/sym9040049,,10.3390/sym9040049,2604064983,,0,000-750-047-594-348; 003-982-227-180-136; 004-962-084-085-761; 005-169-707-018-083; 009-885-874-541-907; 010-985-077-415-59X; 011-006-176-487-462; 012-089-942-653-099; 014-514-641-367-15X; 016-731-888-079-073; 016-873-099-383-893; 018-447-058-666-847; 025-290-159-757-335; 027-658-395-615-692; 030-351-009-711-953; 031-522-316-310-252; 032-451-540-235-796; 034-008-964-356-002; 042-409-013-562-238; 042-767-661-429-064; 047-630-600-014-492; 049-896-268-388-337; 056-715-378-869-201; 058-052-081-943-595; 061-869-577-104-546; 066-078-012-998-723; 066-235-037-082-291; 075-148-096-695-582; 076-020-683-409-265; 078-995-601-408-182; 081-447-017-308-327; 087-950-081-760-226; 089-115-596-397-298; 089-212-328-523-934; 090-752-043-508-733; 092-237-744-940-330; 094-295-279-676-447; 096-685-107-801-738; 109-749-496-799-933; 125-939-677-745-616; 126-591-597-706-715; 128-940-875-499-986; 130-778-270-601-465; 131-516-331-360-906; 131-796-930-292-035; 136-224-445-947-796; 142-884-607-464-932; 150-305-598-712-279; 155-063-496-030-974; 155-226-042-989-551; 166-178-398-716-39X; 168-211-791-741-422; 170-238-670-627-975,17,true,cc-by,gold 184-298-619-472-94X,Research and Development of Digital Forensics Platforms,,2012,journal article,Journal of Shanghai Jiaotong University,0411972x,,,Yang Chung-huang,"Number of cyber crime increases dramatically these days and there are rapid progress on computer and smartphone systems,therefore,forensic investigators have been facing the difficulty of admissibility of digital evidence.To solve this problem,this paper developed forensic techniques and tools to collect digital evidence for computer systems and Android mobile devices.Forensics were carried out on both Windows and Linux systems to ensure judicial review of the evidence on the effectiveness of digital evidence with credibility.",,,,,Engineering; Credibility; Digital evidence; Cyber crime; Computer security; Judicial review; Network forensics; Computer forensics; Android (operating system); Digital forensics,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SHJT201202019.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SHJT201202019.htm,,,2377639714,,0,,2,false,, 184-546-625-187-133,Generic Digital Forensic Business Model – Malaysian Case Study,2018-05-21,2018,journal article,International Journal of Innovative Computing,21804370,Penerbit UTM Press,,Nurul Haswani Saiman; Mazura Mat Din,"Rapid development of cyberspace has created a healthy competition in the creation of computer systems and other devices. The impact of these developments is that cyber threats had caused hectic in digital security area and its reliability to be the trusted system in the industry. Therefore, in order resolve the problem, many countries began developing their own procedures for investigating cyber-related cases based on their own law and regulations and it when the term of digital forensic take place. Researchers began to provide the best definition of each potential element that said as can be a structure in the digital forensic. On other part, the preparations of designing the investigation procedures were based on various designs. In this research, modified investigative procedures are centered on the Malaysian Chief Government Security Office (MCGSO) as a central authority providing advisory services in the field of physical security, document security, personnel security and ICT security. The comparison between approaches had been made where it cover two (2) approaches namely framework and business model. Based on the survey that been made within the organization, selection of design and framework for digital forensic for this organization is based on the business model in general and the Digital Forensic Business Model in particular and it will link together with the general elements and components of digital forensic.",8,1,,,Engineering management; Government; Physical security; Digital security; Cyberspace; Trusted system; Computer science; Business model; Information and Communications Technology; Digital forensics,,,,,https://ijic.utm.my/index.php/ijic/article/view/160 http://eprints.utm.my/id/eprint/82198/,http://dx.doi.org/10.11113/ijic.v8n1.160,,10.11113/ijic.v8n1.160,2805077520,,0,,2,true,,bronze 185-798-265-234-254,Forensic Investigation Technique on Android’s Blackberry Messenger using NISTFramework,,2017,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),," Riadi; Arizona Firdonsyah Sunardi",,6,4,198,205,World Wide Web; Computer science; Multimedia; Wireless; Android (operating system),,,,,http://sdiwc.net/digital-library/forensic-investigation-technique-on-androids-blackberry-messenger-using-nistframework,http://dx.doi.org/10.17781/p002306,,10.17781/p002306,2766809087,,0,,12,false,, 185-892-083-398-013,Digital Forensics: Where Are We?,2020-09-21,2020,journal article,International Journal of Forensic Research,27672972,Opast Group LLC,,,"Digital Foensics is a branch of Forensic Sciences that involves the recovery of materials in digital devices, e.g. computers, mobile phones and storage devices. Fast and continuous advances in digital techniques and devices are happening. On the other hand, the forensic tools to track these technologies are short lagged. This mini-review discusses the issue and its consequences and recommendations for covering the gap between the two.",1,1,,,Digital forensics; Mobile device; Computer science; Digital evidence; Computer forensics; Computer security; Data science,,,,,,http://dx.doi.org/10.33140/ijfr.01.01.10,,10.33140/ijfr.01.01.10,,,0,,1,true,,bronze 186-940-557-741-427,Forensics chain for evidence preservation system: An evidence preservation forensics framework for internet of things‐based smart city security using blockchain,2022-05-20,2022,journal article,Concurrency and Computation: Practice and Experience,15320626; 15320634,Wiley,United States,Randa Kamal; Ezz El‐Din Hemdan; Nawal El‐Fishway,"In recent times, the new revolution of IoT facilitates communication and information sharing among people in different domains like a smart city. This revolution came with a risk of cyber-attacks that target devices and shared data. The digital evidence resulting from the digital forensics process applied to IoT devices must be kept safe for later analysis. Preserving digital evidence on a centralized server raises the risk of a single point of failure. Evidence preserving on cloud servers raises the tampering risk with the evidence or even sharing them with malicious third parties. Therefore, this paper presents a novel framework called Forensics Chain for Evidence Preservation System for IoT-based smart city security. The proposed framework aims to integrate blockchain with digital forensics to overcome the problems faced by forensic investigators; single point of failure and/or evidence modifications and enhance the security of preserving digital evidence via applying blockchain. Applying blockchain guarantees the immutability and data integrity of the preserved evidence. Furthermore, preserving the digital evidence among the forensic participant nodes eliminates the possibility of the single-point failure of a centralized storage server. The results provided a Proof of Concept for forensic evidence preservation based on blockchain and evaluated its performance.",34,21,,,Blockchain; Internet of Things; Network forensics; Computer security; Computer science; The Internet; Internet privacy; Digital forensics; World Wide Web,,,,,,http://dx.doi.org/10.1002/cpe.7062,,10.1002/cpe.7062,,,0,010-284-227-477-250; 012-199-054-127-602; 014-448-058-704-128; 015-973-222-946-009; 017-843-938-494-981; 026-698-451-512-277; 029-610-096-288-863; 032-169-069-596-979; 041-749-004-943-703; 044-247-442-262-35X; 050-244-001-533-04X; 054-079-583-763-10X; 055-498-537-115-235; 082-403-932-515-639; 083-888-956-568-609; 089-419-984-563-123; 101-258-932-366-249; 131-581-925-248-197; 132-746-973-839-652; 132-810-780-767-932; 154-393-793-915-985,0,false,, 186-989-428-380-116,Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Jonas Takyi Asamoah,"The usage of digital technology in the digital forensic investigation has grown in tandem with the rising importance of technology today. Too many incidences of digital and physical crime which is the focus of the world nowadays. To gather the finest evidence and investigative outcomes, a digital forensic model must be established. This study included a review of the literature on digital forensics and models established in digital forensics. According to the findings, the majority of research involves broad inquiries and procedures that overlap. Furthermore, no model has been developed to design a systemic inquiry. In this study, we propose a methodology for digital forensic examination to address this issue. This model combines several of the previous models and adds some new variables that are relevant to the study. Keywords: Due Diligence, Threats, Forensic Analysis, Preparation, Readiness, Cyber Security, BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Jonas Takyi Asamoah (2022): Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 307-314 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P49",1,,307,314,Digital forensics; Digital evidence; Nexus (standard); Due diligence; Computer forensics; Computer security; Computer science; Data science; Internet privacy,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p49,,10.22624/aims/crp-bk3-p49,,,0,,0,true,,bronze 187-108-280-798-543,WhatsApp Messenger Forensic Analysis Based on Android Using Text Mining Method,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Anang Marfianto; Riadi,,7,3,319,327,World Wide Web; Computer science; Wireless; Android (operating system); Text mining,,,,,http://sdiwc.net/digital-library/whatsapp-messenger-forensic-analysis-based-on-android-using-text-mining-method,http://dx.doi.org/10.17781/p002470,,10.17781/p002470,2887363464,,0,,6,false,, 187-733-044-298-76X,What is Digital Forensics?,2022-05-12,2022,journal article,ITNOW,17465702; 17465710,Oxford University Press (OUP),United Kingdom,Shahrzad Zargari,"Abstract; The definition of digital forensics is the process of uncovering and interpreting electronic data for use in a court of law, writes Shahrzad Zargari, Senior Lecturer and Course Leader in Cybersecurity with Forensics, after recently hosting the BCS webinar, Digital Forensics 101.",64,2,46,47,Digital forensics; Computer forensics; Computer security; Computer science; Network forensics; Process (computing); Digital evidence,,,,,,http://dx.doi.org/10.1093/itnow/bwac055,,10.1093/itnow/bwac055,,,0,,0,false,, 187-947-933-345-849,Disposable Virtual Machines and Challenges to Digital Forensics Investigation,,2021,journal article,International Journal of Advanced Computer Science and Applications,21565570; 2158107x,The Science and Information Organization,,Ahmad Alisher; Mohammed Yousuf Uddin; Mohammad Mazhar Afzal,"Digital forensics field faces new challenges with emerging technologies. Virtualization is one of the significant challenges in the field of digital forensics. Virtual Machines (VM) have many advantages either it be an optimum utilization of hardware resources or cost saving for organizations. Traditional forensics’ tools are not competent enough to analyze the virtual machines as they only support for physical machines, to overcome this challenge Virtual Machine Introspection technologies were developed to perform forensic investigation of virtual machines. Until now, we were dealing with persistent virtual machines; these are created once and used many times. We have extreme version of virtual machine and that is disposable virtual machine. However, the disposable virtual machine once created and are used one time, it vanish from the system without leaving behind any significant traces or artifacts for digital investigator. The purpose of this paper is to discuss various disposable virtualization technologies available and challenges posed by them on the digital forensics investigation process and provided some future directions to overcome these challenges.",12,2,,,Emerging technologies; Virtual machine; Virtual machine introspection; Qubes; Field (computer science); Computer science; Process (engineering); Multimedia; Virtualization; Digital forensics,,,,,https://thesai.org/Downloads/Volume12No2/Paper_99-Disposable_Virtual_Machines_and_Challenges.pdf https://thesai.org/Publications/ViewPaper?Volume=12&Issue=2&Code=IJACSA&SerialNo=99 https://repository.psau.edu.sa/xmlui/handle/123456789/1561178,http://dx.doi.org/10.14569/ijacsa.2021.0120299,,10.14569/ijacsa.2021.0120299,3134892529,,0,003-480-534-241-322; 019-698-064-288-240; 029-069-214-346-997; 052-337-723-472-520; 073-129-712-116-200; 074-022-824-976-957; 086-161-291-588-657; 132-593-656-855-005; 133-397-275-695-990,0,true,cc-by,gold 189-547-854-321-849,Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Jewan Bang; Jungheum Park; Sangjin Lee,"It is increasingly becoming difficult to acquire meaningful information in the field of digital forensics through the traditional approach owing to advances in information security and anti-forensics techniques. To counteract anonymous services such as data in remote areas without authentication information, data encryption, device locks, and cryptocurrencies, it is important to acquire key information through live forensics at search and seizure sites. Thus, it is necessary to establish a response system that explores and processes credential information on site and extracts meaningful information based on the processed information. To this end, this study proposes a new digital forensics framework for application at search and seizure sites. The proposed framework is designed to allow expansion in the form of additional functions on account of a module type development for the system even when new services and digital devices appear in the future. We then explain its applicability through case studies of actual digital investigations. • This work proposes a framework for live system forensics at search and seizure sites. • Procedures and techniques to accessing password-protected resources are explored. • A tool is designed and implemented based on the proposed framework. • Three actual cases are described for demonstrating the proposal's usefulness.",40,,301376,301376,Computer science; Digital forensics; Credential; Password; Digital evidence; Computer security; Authentication (law); Key (lock); Encryption; Password cracking; Field (mathematics); World Wide Web,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301376,,10.1016/j.fsidi.2022.301376,,,0,010-985-077-415-59X; 037-711-093-033-550; 041-277-806-049-882; 042-793-944-798-15X; 063-084-969-285-764; 140-344-223-660-774,0,true,,bronze 189-977-135-419-911,Editorial,2012-10-23,2012,journal article,International Journal of Digital Curation,17468256,Edinburgh University Library,,Alexander Ball,"Alexander Ball, Production Editor, introduces Volume 7, Issue 2 (2012) of the International Journal of Digital Curation.",7,2,1,2,Computer science,,,,,https://core.ac.uk/download/pdf/162675731.pdf,http://dx.doi.org/10.2218/ijdc.v7i2.225,,10.2218/ijdc.v7i2.225,,,0,,0,true,cc-by,gold 189-979-945-502-249,An Enhanced Blockchain-Based IoT Digital Forensics Architecture Using Fuzzy Hash,,2021,journal article,IEEE Access,21693536,Institute of Electrical and Electronics Engineers (IEEE),United States,Wael A. Mahrous; Mahmoud Farouk; Saad M. Darwish,"Due to businesses’ growing use of IoT services in their day-to-day operations and the increased use of smart devices, digital forensic investigations involving such systems will need increasingly sophisticated digital evidence collection and processing. The majority of IoT systems are composed of disparate software and hardware components, which may pose security and privacy concerns. Recently, blockchain technology was presented as one of the options for achieving IoT security via the use of an immutable ledger, a decentralized architecture, and strong cryptographic primitives. Integrating blockchain platforms with IoT-based applications, on the other hand, poses a number of difficulties owing to the trustworthiness, integrity, and real-time responsiveness of IoT data. However, certain IoT devices may be incompatible with existing blockchain-based IoT forensic methods for additional digital evidence processing owing to their usage of conventional hash. A critical feature of cryptographic hash functions is that even if just one bit of the input is altered, the output acts pseudo-randomly, making it impossible to identify identical files. However, in the field of computer forensics, it is essential to locate comparable files (e.g., various versions of a file); therefore, we need a hash function that preserves similarity. It is getting more difficult to establish how forensic investigators might utilize traces from such devices. To effectively deal with IoT digital forensics applications, this article presents an improved blockchain-based IoT digital forensics architecture that uses the fuzzy hash to construct the Blockchain’s Merkle tree in addition to the conventional hash for authentication. Fuzzy hashing enables the identification of potentially damning documents that might otherwise remain undiscovered using conventional hashing techniques. By comparing blocks/files to all nodes in the blockchain network using fuzzy hash similarity, the digital forensics investigator will be able to verify their authenticity. To support the proof of concept, we simulated the suggested model.",9,,151327,151336,Cryptographic primitive; Authentication; Merkle tree; Digital evidence; Computer security; Computer science; Computer forensics; Cryptographic hash function; Digital forensics; Hash function,,,,,https://dblp.uni-trier.de/db/journals/access/access9.html#MahrousFD21 https://ieeexplore.ieee.org/document/9606922,http://dx.doi.org/10.1109/access.2021.3126715,,10.1109/access.2021.3126715,3213609011,,0,002-020-246-447-998; 006-138-917-123-177; 007-321-225-339-593; 008-454-749-236-945; 010-284-227-477-250; 010-458-498-389-380; 012-587-637-705-413; 013-410-561-307-525; 018-552-581-098-658; 019-912-316-692-552; 022-028-128-880-266; 022-338-684-752-242; 023-858-572-607-02X; 025-217-964-155-547; 027-096-043-528-331; 028-705-577-620-56X; 029-164-830-214-360; 030-121-862-351-330; 031-061-623-893-188; 032-456-953-732-97X; 032-725-437-508-413; 035-859-793-614-223; 036-017-549-836-946; 041-749-004-943-703; 047-125-525-662-686; 047-782-671-230-742; 055-811-656-615-740; 056-216-240-850-368; 058-156-586-882-704; 058-882-017-546-096; 060-971-363-644-947; 065-322-784-190-818; 068-520-918-599-405; 074-995-483-560-419; 077-425-502-034-153; 092-827-935-965-207; 093-801-189-809-800; 103-535-795-864-289; 105-030-249-648-537; 124-276-088-610-544; 125-682-509-275-554; 141-227-167-540-818; 148-828-929-349-306; 170-516-749-420-456,2,true,"CC BY, CC BY-NC-ND",gold 190-471-875-086-638,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,37,,301201,301201,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00109-8,,10.1016/s2666-2817(21)00109-8,,,0,,0,true,,bronze 190-571-870-134-934,Computer forensics between the italian legislation and pragmatic questions,,2013,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Gianni Fenu; Fabrizio Solinas,"Over the last few years, analysing a computer or a digital device has become a necessity in the field of criminal investigations. However, during the forensic analysis, some ordinary mistakes are often made. The aim of this paper is to define a new approach to the problem of evidence examination, analysing and studying practical experiences of case studies within the Italian legal system concerning techniques of computer forensic and forensic data analysis. The user of this type of approaches has to guarantee efficient level of both specialized legal competences and technical skills and highly qualified technical skill in order to analyse digital systems in conformity with the best practices, and national and European regulations. In addition, although many types of software are not free and particular hardware could be adopted in this presented work, one of the main objectives has been the only use of the personal computer in order to prove the possibility to obtain the same results minimizing the costs. The cases studies have focused on computer forensic of various magnetic and optical devices (mass memory), such as hard disk, usb flash, memory and cards.",2,1,9,24,Criminal investigation; Best practice; Data science; Software; Cybercrime; Personal computer; Field (computer science); Computer security; Computer science; Computer forensics; Digital forensics,,,,,http://sdiwc.net/digital-library/computer-forensics-between-the-italian-legislation-and-pragmatic-questions https://iris.unica.it/handle/11584/91629,http://sdiwc.net/digital-library/computer-forensics-between-the-italian-legislation-and-pragmatic-questions,,,1485219111,,0,003-741-821-824-144; 004-706-447-836-905; 010-086-703-646-194; 020-944-423-224-895; 021-803-769-323-628; 023-789-485-678-544; 030-252-249-391-836; 032-697-093-668-898; 038-668-970-194-854; 047-630-600-014-492; 055-602-900-718-397; 102-822-532-339-461; 111-090-978-711-139; 124-466-422-768-986; 127-604-905-464-807; 132-355-634-397-986; 170-299-458-679-224; 184-948-841-629-735; 190-065-821-748-92X; 199-745-676-923-766,3,false,, 190-597-436-230-873,Digital forensic models: A comparative analysis,,2018,journal article,"International Journal of Management, IT, and Engineering",,,,Sudesh Rani,"With increase in new and ever evolving technologies like internet and information technology in the 21st century, the digital crimes are also increasing. the evidence of such crimes which are technology driven are in digital form and need to employ technology inclined techniques to uncover evidence that are admissible in court. Digital forensics applies digital investigation and analysis techniques to help in detection of digital crimes. Digital forensics provide the investigation techniques identification, preservation, collection, validation, analysis documentation and presentation of digital evidences. Different models have been presented to study the basics of digital forensics. Methods used for digital forensic investigation play an important role because inappropriate model choice may result in incomplete of missing evidence. In this paper we study different models. Their strengths and weaknesses and finally make a comparative study that which model is best among them.",8,6,432,443,The Internet; Information technology; Data science; Presentation; Analysis Documentation; Model choice; Computer science; Strengths and weaknesses; Identification (information); Digital forensics,,,,,https://www.indianjournals.com/ijor.aspx?target=ijor:ijmie&volume=8&issue=6&article=034,https://www.indianjournals.com/ijor.aspx?target=ijor:ijmie&volume=8&issue=6&article=034,,,3202151067,,0,000-938-884-410-192; 004-872-169-627-620; 008-047-275-222-577; 020-944-423-224-895; 032-697-093-668-898; 038-668-970-194-854; 132-355-634-397-986; 163-581-541-690-876; 190-065-821-748-92X; 199-745-676-923-766,0,false,, 191-992-698-018-836,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,37,,301257,301257,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00171-2,,10.1016/s2666-2817(21)00171-2,,,0,,0,true,,bronze 192-222-612-275-635,Turkish vowel classification based on acoustical and decompositional features optimized by Genetic Algorithm,,2019,journal article,Applied Acoustics,0003682x; 1872910x,Elsevier BV,United Kingdom,Yunus Korkmaz; Aytuğ Boyaci; Turker Tuncer,,154,,28,35,Speaker recognition; Feature selection; Formant; Zero-crossing rate; Vowel; Speech recognition; Computer science; Speech processing; Feature vector; Cepstrum,,,,,https://www.sciencedirect.com/science/article/pii/S0003682X19303573,http://dx.doi.org/10.1016/j.apacoust.2019.04.027,,10.1016/j.apacoust.2019.04.027,2941750937,,0,000-149-293-490-547; 000-802-054-480-690; 001-253-139-363-159; 018-195-105-830-630; 021-467-987-457-747; 026-152-783-597-954; 028-398-793-194-270; 037-668-105-432-321; 040-718-325-548-001; 047-321-935-280-275; 062-921-055-312-809; 074-006-036-662-535; 074-273-174-756-43X; 098-876-081-016-68X; 099-414-007-397-744; 107-742-316-418-482; 125-905-542-132-673; 131-459-589-196-658; 144-775-135-281-440; 181-376-656-550-136,8,false,, 192-955-966-543-738,Digital Forensic Trends and Future,,2013,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Ramlan Mahmoud; Farid Daryabar,"Nowadays, rapid evolution of computers and mobile phones has caused these devices to be used in criminal activities. Providing appropriate and sufficient security measures is a difficult job due to complexity of devices which makes investigating crimes involving these devices even harder. Digital forensic is the procedure of investigating computer crimes in the cyber world. Many researches have been done in this area to help forensic investigation to resolve existing challenges. This paper attempts to look into trends of applications of digital forensics and security at hand in various aspects and provide some estimations about future research trends in this area.",2,2,48,76,Digital transformation; Computer security; Computer science; Wireless; Computer forensics; Digital forensics,,,,,http://sdiwc.net/digital-library/digital-forensic-trends-and-future https://usir.salford.ac.uk/34014/1/digital%20forensics.pdf,http://sdiwc.net/digital-library/digital-forensic-trends-and-future,,,2325821398,,0,000-116-031-001-044; 001-067-333-050-958; 001-255-768-346-633; 001-755-455-053-419; 001-960-134-177-077; 003-021-184-147-818; 003-412-732-826-511; 004-260-804-798-107; 005-116-312-278-527; 005-296-771-590-748; 007-768-465-953-956; 007-902-133-940-280; 008-035-714-410-353; 009-832-452-035-773; 010-637-615-113-45X; 011-972-444-921-827; 014-299-240-901-551; 014-843-854-619-370; 015-055-920-643-15X; 015-264-924-343-905; 015-875-923-802-359; 016-046-803-187-724; 016-648-632-030-746; 017-709-374-060-311; 021-081-859-033-024; 026-641-935-890-517; 028-864-845-913-819; 029-556-786-638-555; 030-209-733-733-785; 030-467-474-056-880; 030-837-615-114-470; 031-053-206-482-767; 031-542-664-705-080; 032-192-641-675-455; 033-418-529-263-94X; 034-773-286-616-44X; 035-098-440-268-982; 035-480-612-079-123; 036-384-272-299-395; 036-720-465-389-565; 039-969-975-233-977; 040-062-000-006-889; 040-483-737-660-282; 042-581-004-806-995; 043-424-400-377-990; 044-452-432-963-876; 049-510-490-983-722; 051-165-387-606-715; 052-420-031-509-262; 052-425-455-819-822; 054-389-084-057-423; 054-956-509-864-828; 055-171-589-229-352; 055-210-121-952-616; 055-298-070-090-639; 056-689-263-355-386; 058-448-820-778-759; 064-484-797-196-528; 065-459-442-784-779; 066-661-875-761-631; 068-795-016-904-418; 068-897-302-908-249; 073-314-575-222-676; 073-399-840-863-155; 074-815-704-684-263; 074-926-358-202-250; 078-341-589-406-121; 084-539-519-373-345; 085-343-554-667-033; 085-438-282-926-16X; 087-822-595-959-826; 088-424-276-289-442; 090-908-568-187-870; 091-848-747-540-654; 092-050-206-285-789; 092-656-354-398-685; 093-372-732-871-479; 094-135-298-524-825; 094-936-739-708-890; 095-676-928-467-342; 095-748-218-155-627; 098-825-093-704-930; 107-218-961-146-992; 108-520-189-704-445; 112-043-085-982-411; 116-992-792-378-045; 117-614-574-133-806; 119-001-475-681-576; 127-387-421-016-487; 128-881-441-058-633; 130-324-491-638-054; 130-547-183-065-459; 139-495-561-188-858; 140-572-617-723-277; 142-729-737-144-734; 145-505-603-683-704; 147-457-693-761-284; 150-249-549-372-358; 150-327-843-369-29X; 150-968-572-984-716; 151-061-311-529-230; 156-925-993-816-946; 160-104-273-869-923; 163-661-153-365-182; 163-843-472-725-971; 170-801-816-294-529; 171-483-137-477-150; 174-154-493-004-474; 176-489-122-876-73X; 179-236-922-448-665; 181-095-475-426-346; 184-176-512-492-048; 186-019-966-947-987; 187-686-058-593-955; 195-136-336-597-694,32,false,, 193-055-388-536-239,Special Issue of Best Papers from the 11th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE 2016),,2017,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,,,,,,,Forensic science; Digital forensics; Engineering ethics; Engineering; Library science; Computer science; History; Computer security; Archaeology,,,,,,http://dx.doi.org/10.15394/jdfsl.2017.1443,,10.15394/jdfsl.2017.1443,,,0,,0,true,cc-by-nc,gold 193-815-688-276-212,Cyber Crime Forensics,2022-05-30,2022,journal article,International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence,27910164,Publishing House International Enterprise,,Saad Subair; Derar Yosif; Abdelgader Ahmed; Christopher Thron,"Cyber crime is becoming more frequent in our daily life since computers are everywhere now and hence the term cyberspace is becoming our ordinary life. Digital forensics or computer forensics which the process of securing digital evidence against the crime is becoming inevitable. Digital evidence is the foundation for any digital forensic investigation that can be collected by several means using technologies and scientific crime scene investigation. Modifications with crime scene data may possibly change the evidences that may lead to different  investigation results. Several models and frameworks to help investigating cybercrimes have been proposed. In this paper we are proposing a frame work that to suit the Sudanese judiciary system. The framework suggested studied several models and frameworks in the globe to come out with a suitable framework model that can help the Sudanese courts taking their decisions concerning cybercrime. The conventional chain of custody is our main platform to construct our framework. That is due to fact that computer crime is different from conventional crime in that it may have no definite place or space. Although The share of people in computer crime is more crucial than the technology itself, achieving evidence integrity is more challenging than normal crimes. This work aims to study and evaluate the applicability of existing digital forensic process models to the Sudanese environment,  analyze each of these frameworks might and then construct a framework to Sudan courts.",1,1,41,49,Cyberspace; Construct (python library); Digital forensics; Computer forensics; Cybercrime; Computer science; Process (computing); Computer security; Globe; Digital evidence; Cyber crime; Crime scene; Frame (networking); Work (physics); Data science; Internet privacy,,,,,,http://dx.doi.org/10.54938/ijemdcsai.2022.01.1.37,,10.54938/ijemdcsai.2022.01.1.37,,,0,,0,true,,hybrid 194-646-821-795-161,An improved forensic-by-design framework for cloud computing with systems engineering standard compliance,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Abdellah Akilal; M-Tahar Kechadi,"“Forensic-by-design” is an emergent and ambitious paradigm that extends the Digital Forensic Readiness (DFR) perspective. Similar to Security-by-design, this new vision advocates the integration of Forensic requirements into the system's design and development stages to get “Forensic-ready” systems. While it seems promising, we hypothesize that: (a) this new alternative is not effective for some open boundaries systems, and (b) this strategy is not fully aligned with the Systems and software Engineering (SE) standards. A six phases research methodology based on systematic literature review, mapping, and analysis was adopted. Our results confirm indeed the stated hypothesis, identify missing key factors, and point out potential omissions. A new System and software Engineering driven Forensic-by-design framework, with an emphasis on Cloud computing systems, is therefore proposed. • “Forensic-by-design” can be seen as an adversarial shift in Digital Forensic Readiness (DFR). • “Forensic-by-design” is more suited to closed boundaries systems and suffers from multiple insufficiencies. • The proposed framework remedy to the observed limits and is compliant with the systems and software engineering standards. • The proposed framework aims to integrate security, privacy, and resiliency requirements into systems design and development.",40,,301315,301315,Computer science; Digital forensics; Cloud computing; Adversarial system; Requirements engineering; Software engineering; Key (lock); Security engineering; Software; Data science; Computer security; Systems engineering,,,,,,http://dx.doi.org/10.1016/j.fsidi.2021.301315,,10.1016/j.fsidi.2021.301315,,,0,000-566-000-503-971; 002-383-410-319-043; 005-800-655-385-595; 008-358-741-185-610; 008-437-429-472-135; 014-558-090-827-619; 018-948-094-812-86X; 022-991-306-740-078; 024-462-843-796-80X; 030-858-457-088-176; 039-756-277-761-714; 043-826-131-546-638; 044-982-723-456-135; 045-273-682-926-448; 046-357-391-782-442; 049-337-278-368-275; 050-304-428-383-118; 054-626-009-006-964; 060-874-727-746-537; 076-889-170-335-628; 080-029-349-030-650; 082-793-334-095-933; 090-980-715-883-62X; 091-540-399-535-662; 091-619-263-117-914; 092-121-205-176-412; 107-272-816-064-541; 120-361-603-676-195; 120-848-133-769-462; 124-837-341-752-034; 124-912-663-881-389; 130-150-403-430-724; 132-342-259-584-364; 138-518-998-385-929; 151-944-242-677-668,1,true,,bronze 195-616-478-575-653,Digital forensics in private Seafile cloud storage from both client and server side,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Asgarali Bouyer; Mojtaba Zirak,,13,3,233,233,Computer science; Client-side; Cloud storage; Cloud computing; Computer security; Server-side; Digital forensics; Side channel attack; World Wide Web; Internet privacy; Digital evidence; Digital storage; Operating system; Database,,,,,,http://dx.doi.org/10.1504/ijesdf.2021.114954,,10.1504/ijesdf.2021.114954,,,0,,0,false,, 198-188-537-910-708,Distance Learning in Forensic Nursing: The Lived Educational Experience,2017-09-13,2017,journal article,Journal of Forensic Sciences and Digital Investigation,,Northern California Open Access Publications,,,,,,18,26,Lived experience; Forensic nursing; Forensic science; Psychology; Nursing; Medical education; Medicine; Psychoanalysis; Veterinary medicine,,,,,,http://dx.doi.org/10.29199/fsdi.101015,,10.29199/fsdi.101015,,,0,,0,true,cc-by,hybrid 198-480-779-430-174,Radio-morphometric Analysis of Sella Turcica in the South Indian Population: A Digital Cephalometric Study,2017-06-15,2017,journal article,Arab Journal of Forensic Sciences and Forensic Medicine,16586786; 16586794,Naif Arab University for Security Sciences,,,,1,5,,,Sella turcica; Orthodontics; Cephalometric analysis; Population; Geography; Anatomy; Medicine; Environmental health,,,,,,http://dx.doi.org/10.26735/16586794.2017.019,,10.26735/16586794.2017.019,,,0,,1,true,cc-by-nc,gold 198-534-899-847-91X,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,38,,301277,301277,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00195-5,,10.1016/s2666-2817(21)00195-5,,,0,,0,true,,bronze 199-320-642-531-170,Alt-tech social forensics: Forensic analysis of alternative social networking applications,,2022,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Hailey Johnson; Karl Volk; Robert Serafin; Cinthya Grajeda; Ibrahim Baggili,,42,,301406,,,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301406,,10.1016/j.fsidi.2022.301406,,,0,003-504-554-245-316; 008-667-688-301-190; 008-855-420-001-822; 020-405-975-217-252; 039-999-270-718-277; 042-746-308-855-318; 049-131-797-799-081; 072-302-303-718-198; 085-317-975-978-471; 089-038-694-381-605,0,false,,