; Computer science; Computer forensics; Cloud computing; Digital forensics,,,,,https://periodicos.ufsm.br/reget/article/view/63798 https://periodicos.ufsm.br/reget/article/download/63798/pdf,http://dx.doi.org/10.5902/2236117063798,,10.5902/2236117063798,3155457967,,0,,0,true,cc-by-nc-sa,gold
042-177-113-700-263,"Artificial Intelligence Forensics, Machine Learning Forensics and Digital Forensics",2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Hriday Raval,,,,,,Computer science; Multimedia; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.05,http://dx.doi.org/10.46293/4n6/2020.02.04.05,,10.46293/4n6/2020.02.04.05,3095358219,,0,,1,false,,
042-388-684-756-121,"Wounded to the bone: Digital microscopic analysis of traumas in a medieval mass grave assemblage (Sandbjerget, Denmark, AD 1300-1350).",2017-11-02,2017,journal article,International journal of paleopathology,18799825; 18799817,Elsevier BV,Netherlands,Alexandra Boucherie; Marie Louise Jørkov; Martin J. Smith,"Abstract Battle-related mass burials are considered the most unequivocal evidence of past violence. However, most published studies involve only macroscopic analysis of skeletal remains, commonly arriving only at broad conclusions regarding trauma interpretation. The current study considers a possible avenue for achieving both greater detail and accuracy through digital microscopy. Patterns of injury were investigated among 45 individuals from a Medieval Danish mass grave (Sandbjerget, AD 1300–1350). Injuries were recorded on every anatomical element, except hand and foot bones. Each was photographed and cast, facilitating remote evaluations. Macroscopic analysis was compared with digital microscopy in order to test the relative utility of the latter in characterizing skeletal injuries (mechanism, weapon class, direction, timing of injury). The location of 201 observed injuries, mainly sharp force defects, suggested that many lesions were probably not inflicted by face-to-face opponents. Some microscopic features were indicative of a specific lesion type and weapon class. Digital microscopy was therefore demonstrated to be a complementary tool to macroscopic assessment, enhancing feature observation and quantification and serving to compensate for many of the limitations of macroscopic assessment.",19,,66,79,Anatomy; Pathology; Paleopathology; Assemblage (archaeology); Digital microscopy; Foot Bones; Relative utility; Sharp force; Lesion type; History,Digital microscopy; Lesion morphology; Mass grave; Medieval archaeology; Paleopathology; Traumatology,"Adolescent; Adult; Age Determination by Skeleton; Armed Conflicts/history; Bone and Bones/injuries; Burial/history; Child; Denmark/epidemiology; History, Medieval; Humans; Microscopy; Paleopathology/methods; Prevalence; Violence/history; Weapons/history; Wounds and Injuries/epidemiology; Young Adult",,,https://www.sciencedirect.com/science/article/pii/S1879981716300730 https://core.ac.uk/display/132195733 https://www.ncbi.nlm.nih.gov/pubmed/29198401 http://eprints.bournemouth.ac.uk/30028/ https://difusion.ulb.ac.be/vufind/Record/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/261791/Details https://core.ac.uk/download/132195733.pdf,http://dx.doi.org/10.1016/j.ijpp.2017.10.005,29198401,10.1016/j.ijpp.2017.10.005,2766517719,,0,001-717-189-403-270; 003-713-944-354-850; 005-389-211-946-956; 005-739-768-385-524; 007-059-931-241-63X; 007-978-706-272-285; 008-018-811-400-830; 008-272-023-737-778; 008-926-843-467-099; 009-481-875-308-233; 009-554-467-261-282; 009-847-311-194-828; 010-283-515-536-142; 010-431-980-930-155; 011-054-465-710-364; 011-177-178-483-824; 013-179-989-114-485; 013-785-006-611-350; 015-818-819-988-332; 017-229-374-543-003; 018-645-968-236-085; 021-193-535-230-589; 021-745-861-312-865; 025-076-704-666-088; 030-616-089-195-645; 030-804-886-613-06X; 031-056-855-501-837; 031-757-169-698-811; 032-554-830-138-515; 037-842-010-642-36X; 042-229-754-619-854; 042-705-658-682-014; 043-073-958-036-763; 044-770-051-605-649; 044-870-283-439-262; 044-880-927-937-603; 045-766-463-919-964; 048-198-364-623-662; 050-329-252-705-929; 050-986-075-902-824; 051-523-568-627-694; 053-489-588-864-140; 053-650-463-239-366; 055-210-504-415-973; 056-773-382-417-49X; 057-031-042-677-424; 057-831-917-583-048; 058-934-134-593-723; 062-134-927-775-016; 062-627-232-206-904; 063-524-038-345-462; 063-867-680-167-004; 063-988-169-869-835; 065-308-078-290-52X; 067-749-584-427-994; 069-064-798-493-832; 071-104-157-956-839; 075-477-417-950-095; 077-246-580-849-514; 079-088-698-517-859; 084-719-044-126-604; 086-729-023-293-202; 089-848-297-586-409; 091-963-966-078-993; 092-420-910-125-696; 093-595-468-484-020; 097-304-512-447-888; 098-537-562-534-115; 102-769-814-597-346; 106-729-138-122-079; 106-974-083-875-952; 108-740-965-814-802; 114-091-187-112-096; 120-530-590-359-24X; 121-025-811-768-012; 122-909-599-387-641; 125-141-726-042-405; 125-860-211-735-502; 134-744-534-676-197; 143-476-426-615-205; 144-886-025-343-876; 151-431-018-856-537; 161-796-518-307-758; 173-709-546-640-803; 199-972-185-690-080,11,true,,green
042-746-308-855-318,Using digital humanities and linguistics to help with terrorism investigations.,2020-11-06,2020,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Julien Longhi,"This article seeks to offer a response to the digital transformation of forensic science by employing a tool-based linguistic analysis, integrated into the paradigm of digital humanities. It is a way to scientifically model the analysis of digital texts using digital methods. Computer science comes in support of linguistic skills in order to deal with investigative situations and help analyze criminal acts. It presents a case report thanks to the analysis of a corpus made up of 23 texts relating to criminal acts related to suspected terrorist groups with links to the far left. The goal is to help investigators by providing results which can help find stylistic similarities or exclusions between texts and thus potentially between the authors of those texts, offering authors profiling hypothsesis that may be included in the investigation process. While linguistics alone cannot solve such cases, a better understanding of language data, including topics, style and grammar, bring additional clues that can be very useful information in the investigation of crimes (linguists can ""translate"" information to investigators, so that it can be integrated to the investigation). Digital tools provide a form of objectification since they are based on statistical calculations which reveal regularities that are otherwise invisible to the naked eye. These tools, when used properly in investigations, can prove invaluable in extracting ""clues"" from the linguistic ""traces"" that make up texts.",318,,110564,110564,Stylometry; Digital transformation; Profiling (information science); Grammar; Objectification; Style (sociolinguistics); Forensic linguistics; Computer science; Linguistics; Process (engineering),Corpus; Forensic linguistics; Linguistics; Stylometry; Textometry,"Algorithms; Forensic Sciences/methods; Humanities; Humans; Linguistics; Models, Theoretical; Terrorism",,Institut Universitaire de France,https://europepmc.org/article/MED/33218794 https://pubmed.ncbi.nlm.nih.gov/33218794/ https://hal.archives-ouvertes.fr/hal-03083645 https://www.ncbi.nlm.nih.gov/pubmed/33218794 https://www.sciencedirect.com/science/article/pii/S0379073820304266,http://dx.doi.org/10.1016/j.forsciint.2020.110564,33218794,10.1016/j.forsciint.2020.110564,3096152115,,0,007-024-765-536-335; 010-951-806-548-929; 022-107-254-239-002; 025-800-315-851-620; 038-622-207-031-37X; 052-303-372-427-385; 055-090-331-018-166; 055-443-982-472-937; 066-937-282-076-772; 070-283-562-203-769; 074-920-935-733-645; 077-607-479-314-655; 090-815-393-485-581; 131-806-648-718-123; 137-963-576-723-413; 138-212-583-543-778; 174-649-277-909-708; 178-746-001-922-59X; 182-724-395-147-916,5,true,,bronze
042-767-661-429-064,Big forensic data reduction: digital forensic images and electronic evidence,2016-03-21,2016,journal article,Cluster Computing,13867857; 15737543,Springer Science and Business Media LLC,Netherlands,Darren Quick; Kim-Kwang Raymond Choo,"An issue that continues to impact digital forensics is the increasing volume of data and the growing number of devices. One proposed method to deal with the problem of ""big digital forensic data"": the volume, variety, and velocity of digital forensic data, is to reduce the volume of data at either the collection stage or the processing stage. We have developed a novel approach which significantly improves on current practice, and in this paper we outline our data volume reduction process which focuses on imaging a selection of key files and data such as: registry, documents, spreadsheets, email, internet history, communications, logs, pictures, videos, and other relevant file types. When applied to test cases, a hundredfold reduction of original media volume was observed. When applied to real world cases of an Australian Law Enforcement Agency, the data volume further reduced to a small percentage of the original media volume, whilst retaining key evidential files and data. The reduction process was applied to a range of real world cases reviewed by experienced investigators and detectives and highlighted that evidential data was present in the data reduced forensic subset files. A data reduction approach is applicable in a range of areas, including: digital forensic triage, analysis, review, intelligence analysis, presentation, and archiving. In addition, the data reduction process outlined can be applied using common digital forensic hardware and software solutions available in appropriately equipped digital forensic labs without requiring additional purchase of software or hardware. The process can be applied to a wide variety of cases, such as terrorism and organised crime investigations, and the proposed data reduction process is intended to provide a capability to rapidly process data and gain an understanding of the information and/or locate key evidence or intelligence in a timely manner.",19,2,723,740,The Internet; Data mining; Test case; Forensic science; Data science; Organised crime; Software; Law enforcement; Computer science; Volume (compression); Intelligence analysis; Computer forensics; Big data; Digital forensics,,,,,https://dl.acm.org/doi/10.1007/s10586-016-0553-1 https://link.springer.com/article/10.1007/s10586-016-0553-1/fulltext.html https://dblp.uni-trier.de/db/journals/cluster/cluster19.html#QuickC16 https://link.springer.com/article/10.1007/s10586-016-0553-1,http://dx.doi.org/10.1007/s10586-016-0553-1,,10.1007/s10586-016-0553-1,2303287830,,0,000-360-120-513-679; 003-391-896-636-538; 003-982-227-180-136; 004-508-802-364-299; 004-652-388-189-304; 004-795-963-795-748; 004-984-401-090-239; 009-885-874-541-907; 010-388-991-543-520; 010-951-806-548-929; 011-640-228-143-441; 017-790-269-405-50X; 018-396-779-403-273; 020-599-787-613-117; 021-563-550-669-43X; 021-971-576-965-168; 024-735-069-822-749; 025-290-159-757-335; 027-366-761-223-724; 027-658-395-615-692; 028-343-398-840-609; 031-570-876-692-486; 034-815-736-764-355; 035-381-853-639-810; 035-504-355-395-566; 036-412-863-725-881; 044-518-560-475-833; 046-527-367-793-765; 049-533-570-086-513; 050-513-243-638-138; 052-665-370-203-554; 056-715-378-869-201; 058-052-081-943-595; 059-841-509-046-069; 073-256-200-904-686; 078-144-022-647-386; 079-070-981-899-105; 085-343-554-667-033; 089-267-063-170-413; 090-752-043-508-733; 094-295-279-676-447; 098-068-833-666-576; 098-748-261-333-651; 101-145-299-712-378; 106-267-355-831-636; 115-471-022-347-349; 115-633-018-722-782; 121-716-218-592-354; 123-057-683-615-458; 124-198-527-546-193; 125-402-335-950-812; 125-939-677-745-616; 133-096-532-539-560; 133-378-009-445-67X; 134-927-490-231-285; 160-331-694-886-887; 166-184-952-634-027; 168-211-791-741-422,101,false,,
042-776-427-483-657,Recent Advancements in Digital Forensics,,2017,journal article,IEEE Security & Privacy,15407993; 15584046,Institute of Electrical and Electronics Engineers (IEEE),United States,Wojciech Mazurczyk; Luca Caviglione; Steffen Wendzel,"Modern digital forensics is a multidisciplinary effort that embraces several fields, including law, computer science, finance, networking, data mining, and criminal justice. Professionals will increasingly face a mixed set of challenges and issues regarding the efficiency of digital evidence processing and related forensic procedures. This special issue of IEEE Security & Privacy is an attempt to collect the most interesting ideas from the community of researchers and professionals working on digital forensics.",15,6,10,11,Criminal justice; Forensic science; Data science; Face (sociological concept); Cybercrime; Digital evidence; Computer science; Digital forensics,,,,,https://ieeexplore.ieee.org/document/8123495 https://dblp.uni-trier.de/db/journals/ieeesp/ieeesp15.html#MazurczykCW17 https://www.computer.org/csdl/api/v1/periodical/mags/sp/2017/06/msp2017060010/13rRUx0xPSh/download-article/pdf https://www.computer.org/csdl/magazine/sp/2017/06/msp2017060010/13rRUx0xPSh,http://dx.doi.org/10.1109/msp.2017.4251106,,10.1109/msp.2017.4251106,2769249151,,0,,2,true,,bronze
043-127-893-811-79X,Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases,2019-01-07,2019,journal article,IJID (International Journal on Informatics for Development),25497448; 22527834,Al-Jamiah Research Centre,,Firmansyah Gustav Hikmatyar; Bambang Sugiantoro,"As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.",7,2,64,67,Crime scene; Phone; Cybercrime; Digital evidence; Computer science; Multimedia; Computer forensics; Android (operating system); Mobile device forensics; Digital forensics,,,,,http://ejournal.uin-suka.ac.id/saintek/ijid/article/download/1335/1620 http://ejournal.uin-suka.ac.id/saintek/ijid/article/view/1335 https://core.ac.uk/download/267117037.pdf,http://dx.doi.org/10.14421/ijid.2018.07204,,10.14421/ijid.2018.07204,2913916508,,0,009-862-177-957-585; 048-141-687-795-752; 087-309-749-401-300; 095-972-507-485-24X; 111-494-798-747-370; 188-636-279-613-199,5,true,cc-by-nc-nd,gold
043-184-565-697-319,USE OF CRIMINALLY SIGNIFICANT INFORMATION POSTED ON SOCIAL NETWORKS IN CRIME DETECTION AND INVESTIGATION,2022-04-14,2022,journal article,Расследование преступлений: проблемы и пути их решения,24111627,Moscow Academy of the Investigative Committee of the Russian Federation,,Александр Александрович СМИРНОВ,"В статье исследуется развитие криминалистической науки в эпоху цифровизации, рассматривается понятие «цифровая криминалистика». Раскрывается понятие цифровых следов, а также рассмотрены особенности их фиксации и изъятия. Проанализированы перспективы развития криминалистики с учетом поставленных в настоящее время перед ней задач.; The article examines the development of forensic science in the era of digitalization, considers the concept of “digital forensics”. The concept of “digital traces” is revealed, and the features of their fixation and seizure are considered. The author analyzes the prospects for the development of forensic science, taking into account the tasks it faces.",,4(34),114,118,Digital forensics; Forensic science; Internet privacy; Criminology; Digital evidence; Computer security; Criminal investigation; Crime scene; Fixation (population genetics); Computer science; Political science; Data science; Sociology,,,,,,http://dx.doi.org/10.54217/2411-1627.2021.34.4.019,,10.54217/2411-1627.2021.34.4.019,,,0,,0,false,,
043-253-906-424-260,A Primary of Study on the General Method of Forensic Digital Image Enhancement And Restoration,,2012,journal article,Chinese Journal of Forensic Sciences,16712072,,,Zhang Da-zhi,"Basictechniques of forensic digital image enhancement and restoration,are discussed with the demonstration of real cases,including problem analysis and evaluation,noise reducing,detail enhancement,interference background reducing,blurred image restoration and surveillant video frame rebuilding.General approaches and tactics of forensic digital image enhancement and restoration are summaried.",,,,,Image restoration; Frame (networking); Artificial intelligence; Image enhancement; General method; Computer vision; Interference (communication); Computer science; Digital image; Noise (video),,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201204009.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201204009.htm,,,2356088612,,0,,0,false,,
043-261-465-467-889,A method of forensic authentication of audio recordings generated using the Voice Memos application in the iPhone.,2021-01-23,2021,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Park Nam In; JiWoo Lee; Kyu-Sun Shim; Byun Jun Seok; Oc-Yeub Jeon,,320,,110702,110702,Timestamp; Sound recording and reproduction; Advanced Audio Coding; File size; Audio codec; Apple Lossless; Speech recognition; Computer science; Latency (audio); File format,Audio forensic; Audio latency time; Digital forensic investigation; Forensic authentication; Log history; iPhone,Forensic Sciences/methods; Humans; Mobile Applications; Smartphone; Sound Spectrography; Voice,,,https://pubag.nal.usda.gov/catalog/7259989 https://www.sciencedirect.com/science/article/abs/pii/S0379073821000220 https://europepmc.org/article/MED/33561789 https://www.ncbi.nlm.nih.gov/pubmed/33561789,http://dx.doi.org/10.1016/j.forsciint.2021.110702,33561789,10.1016/j.forsciint.2021.110702,3121149555,,0,001-458-381-243-357; 039-614-975-031-707; 046-034-142-979-678; 048-715-989-260-702; 056-466-128-964-13X; 057-114-681-558-820; 091-970-428-713-932; 175-390-273-605-893,3,false,,
043-664-411-083-202,A Proposed Model for Investigating on Web Whatsapp Application,2017-05-01,2017,journal article,Advanced Science Letters,19366612; 19367317,American Scientific Publishers,United States,Fietyata Yudha; Ahmad Luthfi; Yudi Prayudi,,23,5,4050,4054,Computer science,,,,,https://www.ingentaconnect.com/content/asp/asl/2017/00000023/00000005/art00051,http://dx.doi.org/10.1166/asl.2017.8308,,10.1166/asl.2017.8308,2792213121,,0,,2,false,,
043-810-977-349-13X,A Comprehensive Study of XSS Attack and the Digital Forensic Models to Gather the Evidence,2022-04-24,2022,journal article,ECS Transactions,19385862; 19386737; 21512051,The Electrochemical Society,United States,Saurabh Kumar; S.K. Pathak; Jagendra Singh,"Cyber Crime and fraud are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use digital platform in order to commit the crime, forensic examiners apply practical frameworks and methods to collect digital evidences. Digital forensics method involves the analysis of network traffic for detecting intrusions and investigating them. Different models have been proposed for the cyber crime investigation with the merits and demerit. This research paper explores cross-site scripting (XSS) attacks, features of the existing digital forensic investigation models and discusses some of the issues related to digital forensic research.",107,1,7153,7163,Digital forensics; Commit; Cross-site scripting; Computer science; Scripting language; Computer forensics; Digital evidence; Computer security; Cyber crime; Data science; Forensic science; Law enforcement; World Wide Web; Law; The Internet; Database; Political science; Web development; Web application security; Archaeology; History; Operating system,,,,,,http://dx.doi.org/10.1149/10701.7153ecst,,10.1149/10701.7153ecst,,,0,,0,false,,
043-827-643-358-90X,The effect of image quality and forensic expertise in facial image comparisons.,2014-12-23,2014,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Kristin Norell; Klas Brorsson Läthén; Peter Bergström; Allyson Rice; Vaidehi Natu; Alice J. O'Toole,"Images of perpetrators in surveillance video footage are often used as evidence in court. In this study, identification accuracy was compared for forensic experts and untrained persons in facial image comparisons as well as the impact of image quality. Participants viewed thirty image pairs and were asked to rate the level of support garnered from their observations for concluding whether or not the two images showed the same person. Forensic experts reached their conclusions with significantly fewer errors than did untrained participants. They were also better than novices at determining when two high-quality images depicted the same person. Notably, lower image quality led to more careful conclusions by experts, but not for untrained participants. In summary, the untrained participants had more false negatives and false positives than experts, which in the latter case could lead to a higher risk of an innocent person being convicted for an untrained witness.",60,2,331,340,Forensic science; Psychology; Biometrics; Witness; Image quality; False positive paradox; Applied psychology; Social psychology; Identification (information),CCTV; biometric identification; facial image comparison; forensic science; image quality; information science,Biometric Identification; Face/anatomy & histology; Forensic Sciences; Humans; Professional Competence; Videotape Recording,,,http://onlinelibrary.wiley.com/doi/10.1111/1556-4029.12660/full https://www.researchgate.net/profile/Vaidehi_Natu/publication/260249007_The_Effect_of_Image_Quality_and_Forensic_Expertise_in_Facial_Image_Comparisons/links/54ac39ad0cf2479c2ee78da8.pdf https://pubmed.ncbi.nlm.nih.gov/25537273/ http://doi.wiley.com/10.1111/1556-4029.12660 https://www.ncbi.nlm.nih.gov/pubmed/25537273 https://www.infona.pl/resource/bwmeta1.element.wiley-jfo-v-60-i-2-jfo12660 https://dialnet.unirioja.es/servlet/articulo?codigo=5233095,http://dx.doi.org/10.1111/1556-4029.12660,25537273,10.1111/1556-4029.12660,2049664898,,0,012-829-385-796-687; 015-111-980-466-419; 016-747-170-993-313; 019-466-667-607-252; 020-170-447-797-333; 025-883-071-858-995; 036-555-052-193-015; 037-026-528-693-473; 039-921-464-148-815; 045-837-664-148-225; 049-805-853-319-539; 056-970-067-581-33X; 062-618-194-192-331; 077-453-655-805-05X; 143-987-744-245-531,20,false,,
043-865-919-965-282,Analysis of Forensic Video in Storage Data Using Tampering Method,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Amirul Putra Justicia; Riadi,,7,3,328,335,Forensic science; Computer science; Multimedia; Wireless,,,,,http://www.sdiwc.net/digital-library/analysis-of-forensic-video-in-storage-data-using-tampering-method.html,http://dx.doi.org/10.17781/p002471,,10.17781/p002471,2888181830,,0,010-001-509-758-162; 014-859-901-321-603; 024-793-013-451-77X; 052-732-399-490-806; 081-554-153-097-003; 087-635-981-525-707; 141-847-161-303-501,0,false,,
044-016-316-658-216,PNG Data Detector for DECA,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Kingson Chinedu Odogwu; Pavel Gladyshev; Babak Habibnia,"Abstract DECA, a novel file carving application, is an example of digital forensic tools that rely heavily on accurately detecting the type of data fragments stored in the disk blocks. This work is an attempt to create a method of detection and classification of PNG data types for DECA which originally only identifies and extracts JPEG data. The PNG file format was examined in order to implement the PNG data detector that was integrated into DECA. We then examined the results of decision-theoretic file carving, implemented in DECA, combined with the implemented PNG data detector.",32,,300910,,Portable Network Graphics; Data type; JPEG; File carving; Deca-; Computer science; Database; Digital forensics; Detector,,,,,https://www.sciencedirect.com/science/article/pii/S2666281720300056,http://dx.doi.org/10.1016/j.fsidi.2020.300910,,10.1016/j.fsidi.2020.300910,3030862625,,0,,1,true,cc-by-nc-nd,hybrid
044-021-303-931-726,Network Forensics Analysis of Man in the Middle Attack Using Live Forensics Method,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Dedy Saputra; Riadi,,8,1,66,73,Man-in-the-middle attack; Live forensics; Computer security; Computer science; Network forensics,,,,,http://sdiwc.net/digital-library/network-forensics-analysis-of-man-in-the-middle-attack-using-live-forensics-method,http://dx.doi.org/10.17781/p002558,,10.17781/p002558,2946711436,,0,,4,false,,
044-212-524-673-427,Forensic Technique for Detecting Image Tampering using Statistical Intrinsic Fingerprints-A Survey,,2014,journal article,International Journal of Scientific Engineering and Technology,22771581,,,Dhanshri P. Patil,"The digital images are becoming important part in the field of information forensics and security, because of the popularity of image editing tools, digital images can be altered. Therefore it is must to create forensic techniques which is capable of detecting tampering in image. This paper reviews to the forensic methods for detecting contrast enhancement and copy-move forgery in image by identifying the features of each operation's intrinsic fingerprint.",3,7,919,920,Image (mathematics); Artificial intelligence; Geography; Image editing; Fingerprint (computing); Contrast enhancement; Copy move forgery; Computer vision; Field (computer science); Digital image; Digital forensics,,,,,https://www.indianjournals.com/ijor.aspx?target=ijor:ijset1&volume=3&issue=7&article=020,https://www.indianjournals.com/ijor.aspx?target=ijor:ijset1&volume=3&issue=7&article=020,,,2493333624,,0,000-980-904-065-103; 006-676-219-053-907; 023-624-827-239-301; 024-793-013-451-77X; 029-093-526-590-26X; 037-412-312-132-875; 040-425-146-348-064; 045-812-091-260-656; 053-875-001-621-170; 064-665-774-871-511; 076-346-829-732-533; 076-527-439-347-165; 089-196-708-023-731; 101-344-254-382-936; 104-279-390-845-094; 111-534-293-475-684; 133-788-221-347-278; 180-552-666-228-97X,2,false,,
044-295-409-596-282,Decision support for first responders and digital device prioritisation,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Graeme Horsman,,38,,301219,,Decision support system; Data science; Relation (database); First responder; Quality (business); Task (project management); Computer science; Process (engineering); Identification (information); Relevance (information retrieval),,,,,https://www.sciencedirect.com/science/article/abs/pii/S266628172100127X,http://dx.doi.org/10.1016/j.fsidi.2021.301219,,10.1016/j.fsidi.2021.301219,3175131308,,0,002-495-833-326-831; 013-568-618-083-770; 052-994-192-178-620; 067-844-385-207-96X; 077-339-303-043-478; 094-142-794-127-63X; 120-697-354-224-33X; 167-751-222-897-487; 187-762-907-549-695,1,false,,
044-617-125-816-983,Ethics in forensic science: Renewed commitments and a call for papers across the Forensic Science International family,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,37,,301207,301207,Forensic science; Engineering ethics; Forensic genetics,,,,,,http://dx.doi.org/10.1016/j.fsidi.2021.301207,,10.1016/j.fsidi.2021.301207,,,0,,0,true,,bronze
044-896-919-263-756,A Forensic Enabled Data Provenance Model for Public Cloud,,2018,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Shariful Haque; Travis Atkison,,13,3,47,66,Forensic science; Conceptual model (computer science); Data science; Provenance; Digital evidence; Cloud architecture; Computer science; Confidentiality; Cloud computing; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl13.html#HaqueA18 https://commons.erau.edu/jdfsl/vol13/iss3/7/ https://paperity.org/p/179699027/a-forensic-enabled-data-provenance-model-for-public-cloud https://doi.org/10.15394/jdfsl.2018.1570,http://dx.doi.org/10.15394/jdfsl.2018.1570,,10.15394/jdfsl.2018.1570,2913510281,,0,019-698-064-288-240; 022-517-091-282-12X; 028-328-874-304-52X; 029-859-696-996-816; 032-182-801-166-90X; 033-292-300-474-828; 035-661-294-852-768; 040-646-327-684-402; 043-325-403-302-464; 043-822-135-285-713; 045-778-650-696-16X; 047-600-704-780-223; 081-593-340-888-566; 082-260-669-254-279; 089-155-214-146-087; 093-493-966-186-07X; 151-944-242-677-668; 173-952-459-161-812; 191-014-103-069-742; 199-745-676-923-766,4,true,cc-by-nc,gold
045-098-715-794-977,A Strategic Model for Forensic Readiness,2018-06-01,2018,journal article,Athens Journal of Sciences,22418466,Athens Institute for Education and Research ATINER,,Jan Collie,"Forensic readiness has been defined as: ‘…the capability of an organisation to use digital evidence in a forensic investigation’. For businesses, especially medium or small enterprises, gaining this capability can seem time consuming and expensive: it may involve a number of processes, it may require new hardware and software and people with specialised skill sets may need to be hired in order to implement any plan. Yet developing and maintaining a forensic readiness capability is vital in the digital age. Fraud and cybercrime cost almost £11bn in the UK alone last year. Across the European Union, the national annual cost of cybercrime now accounts for 0.41% of GDP. Recent figures have also shown that up to 62% of digital incidents are caused by insiders, either accidentally or knowingly. An astonishing 91% of cybersecurity attacks begin with a single email. This research proposes a structured, strategic approach to forensic readiness for businesses that is economic to implement and run. It is based on people and processes rather than complex electronic systems. Key to this approach is a firm’s best asset - its own staff. It is theorised that the foundation stone of forensic readiness is a strong internal security culture. In order to achieve this aim, a unique, scalable model for efficient and inclusive planning is put forward with a reporting construct which aims to assure company-wide involvement.",5,2,167,182,Business; Construct (philosophy); Order (exchange); Cybercrime; Internal security; Digital evidence; European union; Knowledge management; Plan (drawing); Asset (computer security),,,,,http://oro.open.ac.uk/70042/ https://core.ac.uk/download/305114201.pdf,http://dx.doi.org/10.30958/ajs.5-2-4,,10.30958/ajs.5-2-4,2896577214,,0,007-394-596-774-68X; 009-182-817-779-31X; 010-806-135-547-042; 011-328-932-194-908; 021-486-901-460-202; 024-711-735-736-003; 058-723-704-218-926; 066-889-097-119-765; 074-014-335-505-388; 077-514-039-587-286; 080-484-311-806-796; 117-184-355-073-746; 128-954-454-555-916; 147-779-412-802-417; 149-690-584-371-491; 154-191-465-535-558; 189-593-155-056-756; 193-919-622-382-772; 198-826-055-129-939,8,true,cc-by-nc-nd,green
045-159-209-851-330,CAPABLE ARTIFICIAL INTELLIGENCE:DESIGNING AI FOR HUMAN VALUES AND SOCIETY,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Sanjeev Naira,,,,,,Artificial intelligence; Human values; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.06,http://dx.doi.org/10.46293/4n6/2020.02.03.06,,10.46293/4n6/2020.02.03.06,3095635357,,0,,0,false,,
045-199-576-491-919,Microsoft's Your Phone environment from a digital forensic perspective,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Patricio Domingues; Luis Miguel Andrade; Miguel Frade,,38,,301177,,Perspective (graphical); Mobile device; Task (computing); Software; Phone; Android device; Computer science; Multimedia; Android (operating system); Digital forensics,,,,Foundation for Science and Technology,https://www.sciencedirect.com/science/article/pii/S2666281721000858,http://dx.doi.org/10.1016/j.fsidi.2021.301177,,10.1016/j.fsidi.2021.301177,3169098502,,0,006-915-702-173-584; 017-335-677-993-203; 019-831-293-743-518; 023-484-098-291-123; 025-723-055-730-999; 028-041-981-721-013; 028-290-062-141-840; 032-664-290-593-804; 047-558-056-985-493; 055-390-544-993-752; 074-503-636-433-987; 076-889-170-335-628; 090-496-255-429-009; 099-185-063-500-623; 111-903-319-645-399; 117-065-920-586-287; 119-531-842-544-900; 124-912-663-881-389; 128-985-340-093-196; 131-696-619-498-120; 163-330-758-807-944,1,false,,
045-245-164-124-762,"Erasure, an attempt to surpass datafication",2019-09-24,2019,journal article,A Peer-Reviewed Journal About,22457755,Det Kgl. Bibliotek/Royal Danish Library,,Audrey Samson,"Selfies, email archives, twitter posts, likes, places, late night chat logs, health insurance records, bank transfers, search histories… all those bits of identity, involuntarily immortalised as personality profiles in corporate server farms. Could erasure offer some respite from endless datafication? This “undead media” (Chun 134) not only facilitates the surveillance apparatus, the persistence of data also affects how we remember. Digital death (post-mortem digital data ownership concerns) exemplifies how the structure and inner workings of network technologies and software platforms affect our experience in a tangible way. The following research is concerned with what kind of role the materiality of Internet technologies plays in post-mortem digital legacy, and how it bleeds into our mourning practices. It explores these questions by examining how Facebook and Google deal with digital death, and what kind of consequences the materiality of the network entails. The notions of materiality are understood here as a space of interaction between code and hardware (Hayles) and perceived materialization of phenomena iteratively configured by dynamics of “intra-actions” (Barad 140). In the examples considered I look at how terms of agreement apply to memory in the form of externalised tertiary retention in the process of “grammatization” (Stiegler 3). The research also looks at the biological human memory’s materiality and its need to forget (Kirschenbaum). I discuss the ne.me.quittes.pas project as a means to propose digital data funerals as an artistic strategy to make data tangible and to explore how these layers of stockpiled data constantly re-configure our identities. I argue that digital data funerals offer a symbolic ritualised gesture that draws attention to the materiality of data through tangible and physical degradation, in an attempt to surpass post-mortem datafication, and surveillance.",4,1,44,55,Server farm; Internet privacy; The Internet; Materiality (auditing); Engineering; Gesture; Datafication; Erasure; Digital data; Multimedia; Respite care,,,,,https://research.gold.ac.uk/id/eprint/27541 https://gala.gre.ac.uk/id/eprint/17176/ https://core.ac.uk/download/237430438.pdf,http://dx.doi.org/10.7146/aprja.v4i1.116104,,10.7146/aprja.v4i1.116104,2715961299,,0,,1,true,cc-by-nc-sa,gold
045-367-733-413-464,Research of Digital Forensics under Cloud Computing Environment,,2013,journal article,Netinfo Security,,,,Chen Guang-xua,"With the sharp growth of cloud computing,cyber-crimes associated with cloud computing or directly targeted to cloud has increased greatly.Currently,the progress of cloud forensics is still very limited on both technical aspect and legal aspect.These emerging cyber-crimes are a great challenge to the investigators who still adopt traditional digital forensics methods.This paper analyzes the difficulties and challenges of cloud forensics,and then indicates the main forensics object for cloud forensics.Finally,a set of new cloud forensics method,is process and technique is proposed.This paper can bring references for the investigators in investigating cloud associated cybercrimes.",,,,,Cloud computing security; Cloud forensics; Cyber crime; Computer security; Computer science; Process (engineering); Cloud computing; Digital forensics,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-XXAQ201308028.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-XXAQ201308028.htm,,,2365320207,,0,,3,false,,
045-434-062-171-544,Computer Forensics: A Linux Case Study Applied to Pedophilia CrimeInvestigation in Brazil,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Jeferson dos Santos Almeida; Diógenes Antonio Marques José Leonardo de Santana Nascimento,,8,1,31,42,Pedophilia; Computer security; Computer science; Wireless; Computer forensics,,,,,http://sdiwc.net/digital-library/computer-forensics-a-linux-case-study-applied-to-pedophilia-crimerninvestigation-in-brazil,http://dx.doi.org/10.17781/p002543,,10.17781/p002543,2940299278,,0,,1,false,,
045-521-021-813-200,"Digital Forensics and Cyber Forensics Investigation: Security Challenges, Limitations, Open Issues, and Future Direction",,2022,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,S. Awan; M. M. Rind; Mazhar Ali Dootio; Abdullah Ayub Khan; Aftab Ahmed Shaikh; Asif Ali Laghari,,1,1,1,,Computer security; Computer science; Digital forensics,,,,,http://www.inderscienceonline.com/doi/full/10.1504/IJESDF.2022.10037882,http://dx.doi.org/10.1504/ijesdf.2022.10037882,,10.1504/ijesdf.2022.10037882,3176611577,,0,,0,false,,
045-553-653-288-228,A Survey on Digital Forensics Trends,,2014,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Ali Dehghantanha; Ramlan Mahmoud Mohsen Damshenas,"1. ABSTRACT Digital forensic has evolved from addressing minor computer crimes to investigation of complex international cases with massive effect on the world. This paper studies the evolution of the digital forensic; its origins, its current position and its future directions. This paper sets the scene with exploring past literature on digital forensic approaches followed by the assessment and analysis of current state of art in both industrial and academic digital forensics research. The obtained results are compared and analyzed to provide a comprehensive view of the current digital forensics landscape. Furthermore, this paper highlights critical digital forensic issues that are being overlooked and not being addressed as deserved. The paper finally concludes with offering future research directions in this area.",3,4,209,234,Information system; Minor (academic); State of art; Computer science; Multimedia; Wireless; Digital forensics,,,,,https://sdiwc.us/digitlib/journal_paper.php?paper=00001141.pdf http://sdiwc.us/digitlib/journal_paper.php?paper=00001141.pdf http://sdiwc.net/digital-library/a-survey-on-digital-forensics-trends https://core.ac.uk/download/153811846.pdf,http://dx.doi.org/10.17781/p001347,,10.17781/p001347,2008054384,,0,000-116-031-001-044; 000-171-920-580-13X; 000-980-904-065-103; 001-067-333-050-958; 001-255-768-346-633; 001-303-259-599-142; 001-960-134-177-077; 002-449-146-256-491; 003-126-053-087-131; 003-182-041-034-40X; 003-412-732-826-511; 004-119-009-833-695; 004-553-537-193-953; 004-652-388-189-304; 004-706-447-836-905; 005-116-312-278-527; 005-296-771-590-748; 006-188-040-575-112; 007-832-595-971-443; 008-475-550-011-549; 008-676-252-106-807; 009-832-452-035-773; 011-051-740-313-213; 011-569-292-128-546; 011-972-444-921-827; 014-510-444-730-433; 014-595-195-942-667; 017-840-378-634-021; 018-406-989-580-901; 018-467-941-961-210; 019-166-656-621-783; 021-039-461-635-181; 021-081-859-033-024; 021-850-998-857-676; 023-767-546-806-478; 024-735-069-822-749; 025-090-019-547-487; 025-492-951-217-100; 025-743-892-862-313; 026-201-331-634-716; 027-265-141-482-204; 027-835-655-333-208; 028-026-250-612-723; 028-821-293-426-202; 028-863-985-414-208; 029-093-526-590-26X; 030-155-118-042-252; 030-209-733-733-785; 030-674-871-669-121; 031-234-153-523-379; 031-259-255-251-803; 031-542-664-705-080; 031-876-583-652-183; 033-241-817-699-448; 033-877-222-136-260; 034-095-325-733-017; 034-773-286-616-44X; 035-381-853-639-810; 036-584-979-326-138; 037-821-713-720-130; 041-277-806-049-882; 042-880-741-738-793; 044-834-247-088-997; 045-874-145-356-930; 049-724-213-633-947; 050-618-920-212-97X; 052-420-031-509-262; 055-090-334-937-061; 055-210-121-952-616; 055-915-511-599-512; 055-967-961-527-254; 058-448-820-778-759; 061-529-672-595-522; 062-712-470-776-220; 063-777-134-301-668; 064-170-716-528-26X; 064-484-797-196-528; 065-459-442-784-779; 073-399-840-863-155; 073-910-371-295-970; 074-503-617-334-537; 074-926-358-202-250; 075-976-616-114-109; 076-360-269-141-655; 078-598-867-814-365; 078-818-948-736-831; 079-331-405-716-414; 079-466-694-175-199; 080-585-092-668-778; 080-989-620-698-278; 081-032-497-600-401; 081-447-017-308-327; 081-743-188-303-332; 083-097-133-928-799; 083-495-367-906-30X; 085-547-032-022-62X; 087-287-912-803-488; 087-822-595-959-826; 088-568-925-253-101; 091-848-747-540-654; 092-656-354-398-685; 093-171-117-849-738; 093-372-732-871-479; 093-626-174-194-852; 094-135-298-524-825; 095-748-218-155-627; 095-897-732-435-890; 096-551-303-281-385; 097-123-801-131-393; 098-857-083-857-534; 100-974-105-975-105; 102-425-810-040-226; 102-697-093-502-764; 104-758-205-558-797; 105-427-271-392-801; 106-997-247-556-643; 108-086-708-688-274; 110-744-808-081-983; 122-164-403-164-304; 123-009-178-413-605; 124-837-341-752-034; 128-940-875-499-986; 130-547-183-065-459; 132-173-993-325-143; 133-580-170-945-047; 133-586-699-042-46X; 134-927-490-231-285; 135-396-441-868-382; 139-495-561-188-858; 142-657-351-097-509; 142-816-347-811-541; 149-010-267-691-537; 150-249-549-372-358; 150-327-843-369-29X; 151-061-311-529-230; 160-104-273-869-923; 163-843-472-725-971; 166-178-398-716-39X; 166-842-256-824-283; 171-083-956-573-469; 171-483-137-477-150; 176-877-270-345-361; 177-615-975-039-432; 185-343-535-827-64X; 191-324-551-329-724; 192-955-966-543-738; 194-965-580-194-055; 199-172-967-270-034,26,true,,green
045-625-431-295-190,A Spatial Domain Approach of Fingerprinting for Colored Digital Images,2013-10-25,2013,journal article,INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY,22773061,CIRWOLRD,,Vineet Mehan; Renu Dhir; Yadwinder Singh Brar,"In this paper, a spatial domain approach of fingerprinting is presented for colored digital images. A semi-blind fingerprinting conveys a secure arrangement for trading of digital images. The operational significance of the digital fingerprinting system is verified and estimated. Digital fingerprint implanted doesn’t disturb the perceptible feature of the host digital image. Multi-user collusion attacks are prevented using the proposed apparoach. Variable fingerprint size and dissimilar location insertion play significant role for inhibiting attack.",11,1,2156,2160,Artificial intelligence; Colored; Spatial domain; Computer vision; Computer science; Digital image,,,,,https://www.rajpub.com/index.php/ijct/article/download/1185/pdf_231 https://core.ac.uk/download/322473297.pdf,http://dx.doi.org/10.24297/ijct.v11i1.1185,,10.24297/ijct.v11i1.1185,2801255412,,0,,0,true,cc-by,hybrid
045-639-857-637-749,PC3000 Portable III In Digital Forensics,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Igor Michailov,,,,,,Computer science; Multimedia; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.03,http://dx.doi.org/10.46293/4n6/2020.02.04.03,,10.46293/4n6/2020.02.04.03,3097173081,,0,,0,false,,
045-987-509-678-377,Methods to Acquire an Image from “Bricked” Android Device.,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Djalma Fonseca,,,,40,43,Image (mathematics); Artificial intelligence; Android device; Computer vision; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.06,http://dx.doi.org/10.46293/4n6/2020.02.02.06,,10.46293/4n6/2020.02.02.06,3022679688,,0,,1,false,,
045-998-921-549-343,A Computer in Digital Forensic: Computer Forensic,2022-06-06,2022,journal article,INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT,25823930,Indospace Publications,,IJSREM Journal,"The report focuses on computers' roles in digital forensics. All of these industries are implementing digitalization into their operations as the globe progresses toward digitalization. As a result of digitalization, working methods are becoming more productive and convenient. To employ digitalization, all we need is a computer or a system. Some forensics software tools are available, but they must be loaded on computers in order to complete the operation. It gives us the advantage of being able to operate quickly. Crimes committed have grown increasingly frequent in electronic or digital worlds, particularly cyber. Technology is being used by criminals to commit crimes, providing new obstacles for law enforcement agents, lawyers, magistrates, army members, and security experts.",6,6,,,Commit; Digital forensics; Computer forensics; Law enforcement; Globe; Computer security; Computer science; Digital evidence; Order (exchange); Cyber crime; Law; World Wide Web; Business; Political science; The Internet; Database; Medicine; Finance; Ophthalmology,,,,,,http://dx.doi.org/10.55041/ijsrem14213,,10.55041/ijsrem14213,,,0,,0,true,,hybrid
046-034-142-979-678,Identification of source mobile hand sets using audio latency feature.,2019-02-25,2019,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Ashu Goyal; S.K. Shukla; R.K. Sarin,,298,,332,335,Sound recording and reproduction; Software; Speech recognition; Computer science; Latency (audio); Digital audio,Digital audio editing software; Digital audio recording; Source correspondence,,,,https://www.ncbi.nlm.nih.gov/pubmed/30927719 https://www.sciencedirect.com/science/article/pii/S0379073819300635 https://pubag.nal.usda.gov/catalog/6339544,http://dx.doi.org/10.1016/j.forsciint.2019.02.031,30927719,10.1016/j.forsciint.2019.02.031,2917329393,,0,059-705-292-558-832; 106-345-153-172-370; 136-614-990-140-254,6,false,,
046-339-711-582-310,An Advanced Educational Tool for Digital Forensic Engineering,2016-03-30,2016,journal article,International Journal of Emerging Technologies in Learning (iJET),18630383; 18688799,International Association of Online Engineering (IAOE),Germany,Primož Cigoj; Borka Jerman Blažič,"This paper presents a novel approach to education in the area of digital forensics based on a multi-platform cloud-computer infrastructure and an innovative computer based tool. The tool is installed and available through the cloud-based infrastructure of the Dynamic Forensic Education Alliance. Cloud computing provides an efficient mechanism for a wide range of services that offer real-life environments for teaching and training cybersecurity and digital forensics. The cloud-based infrastructure, the virtualized environment and the developed educational tool enable the construction of a dynamic e-learning environment making the training very close to reality and to real-life situations. The paper presents the Dynamic Forensic Digital tool named EduFors and describes the different levels of college and university education where the tool is introduced and used in the training of future investigators of cybercrime events.",11,03,15,23,World Wide Web; Data science; Cybercrime; Computer based; University education; Computer science; Cloud computing; Digital forensics,,,,,http://dblp.uni-trier.de/db/journals/ijet/ijet11.html#CigojB16 https://online-journals.org/index.php/i-jet/article/view/5294 https://www.learntechlib.org/p/172227 https://dblp.uni-trier.de/db/journals/ijet/ijet11.html#CigojB16 http://www.learntechlib.org/p/172227,http://dx.doi.org/10.3991/ijet.v11i03.5294,,10.3991/ijet.v11i03.5294,2318295128,,0,,1,true,cc-by,gold
046-357-391-782-442,Evidence and Forensics in the Cloud: Challenges and Future Research Directions,,2017,journal article,IEEE Cloud Computing,23256095,Institute of Electrical and Electronics Engineers (IEEE),United States,Kim-Kwang Raymond Choo; Christian Esposito; Aniello Castiglione,"Digital investigation in the cloud is challenging, but there's also opportunities for innovations in digital forensic solutions (such as remote forensic collection of evidential data from cloud servers client devices and the underlying supporting infrastructure such as distributed file systems). This column describes the challenges and opportunities in cloud forensics.",4,3,14,19,Cloud testing; Column (database); Cryptography; Cloud computing security; Computer security; Computer science; Network forensics; Cloud computing; Digital forensics; Server,,,,,https://ieeexplore.ieee.org/abstract/document/7962121 https://doi.org/10.1109/MCC.2017.39 https://www.computer.org/csdl/magazine/cd/2017/03/mcd2017030014/13rRUyekIZn http://ieeexplore.ieee.org/document/7962121 https://dblp.uni-trier.de/db/journals/cloudcomp/cloudcomp4.html#ChooEC17,http://dx.doi.org/10.1109/mcc.2017.39,,10.1109/mcc.2017.39,2726142957,,0,006-570-693-842-502; 010-986-818-338-726; 015-654-094-120-991; 024-894-908-869-686; 028-290-062-141-840; 033-856-227-156-292; 038-349-842-640-663; 041-879-975-858-398; 047-221-550-114-462; 057-421-097-368-120; 061-960-915-134-527; 074-503-636-433-987; 085-276-013-350-220; 091-540-399-535-662; 095-691-114-276-825; 101-091-831-428-576; 125-939-677-745-616; 130-093-060-692-651; 132-342-259-584-364; 141-018-737-327-365; 144-124-797-675-052; 155-078-493-307-765; 162-226-718-103-313,21,false,,
046-651-457-949-450,Novel Approach for Forensics Investigation in Cloud Computing Environments,,2016,journal article,"International Journal of Management, IT, and Engineering",,,,Anwar Khan; Savita Rathore,"A traditional digital analysis imply that, with stand alone forensic workstations, analyst are able to achieve a assortment of forensic tasks in sequence, next to limited datasets extract starting target artifact, and assess correspondent results. As a outcome, there is an urgent require to discover novel solution to get better digital examination effectiveness. To solve the concern outline more than, the paper describe an investigative platform for distributed forensic data processing, intended at taking benefit of together mobility and cloud computing capabilities. We integrate logs besides the log with our proof-of-concept application. After an occurrence has been detected and report in a distributed environment such as the Cloud, it is complex to recognize locations where evidence can be collect. Our technique involved in conduct a digital forensic search in the Cloud as well exhibit how the technique nearby in this research minimizes terms of monitory values. An examination of cloud service usage, the efficiency of acquirement methods, an considerate of commercial cloud environment, an investigation of cloud forensic management. furthermore, we experiment on dissimilar accumulators to discover the best fitted accumulate or algorithm.",6,4,27,38,Data processing; Data science; Artifact (software development); Digital examination; Digital analysis; Mathematics; Distributed Computing Environment; Workstation; Cloud computing; Digital forensics,,,,,http://www.indianjournals.com/ijor.aspx?target=ijor:ijmie&volume=6&issue=4&article=003,http://www.indianjournals.com/ijor.aspx?target=ijor:ijmie&volume=6&issue=4&article=003,,,2992408728,,0,,0,false,,
046-729-995-059-874,Considering 'technically possible' alternative meanings for data traces found during a digital forensic examination,2022-05-09,2022,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Graeme Horsman,,,,1,10,Digital forensics; Forensic science; Forensic examination; Computer science; Data science; Psychology; Computer security,,,,,,http://dx.doi.org/10.1080/00450618.2022.2071988,,10.1080/00450618.2022.2071988,,,0,005-715-450-998-72X; 010-963-610-208-920; 023-858-572-607-02X; 054-145-255-092-055; 058-717-000-287-105; 059-397-656-514-952; 073-790-480-897-758; 101-549-415-202-81X; 134-927-490-231-285; 142-790-196-752-819,0,false,,
046-814-931-566-523,Grouping of Professionals in Cyber Forensics,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Santosh Khadsare,,,,,,Computer security; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.15,http://dx.doi.org/10.46293/4n6/2020.02.03.15,,10.46293/4n6/2020.02.03.15,3097525611,,0,,0,false,,
046-857-308-211-173,Nugget: A digital forensics language,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Christopher Stelly; Vassil Roussev,"Abstract One of the long-standing conceptual problems in digital forensics is the dichotomy between the imperative for verifiable and reproducible forensic computations, and the lack of adequate mechanisms to accomplish these goals. With over thirty years of professional practice, investigator notes are still the main source of reproducibility information, and much of it is tied to the functions of specific, often proprietary, tools. In this work, we discuss the design and implementation of a domain specific language (DSL) called nugget, which aims to enable the practical formal specification of digital forensic computations in a tool-agnostic fashion. The core idea of DSLs, such as SQL, is to create an intuitive means for domain experts to describe what computation needs to be performed while abstracting away the technical means of its implementation. In the context of digital forensics, nugget aims to address the following requirements: 1) provide investigators with the means to easily and completely specify the data flow of a forensic inquiry from data source to final results; 2) allow the fully automatic (and optimized) execution of the forensic computation; 3) provide a complete, formal, and auditable log of the inquiry.",24,,S38,S47,Software engineering; Formal specification; Domain (software engineering); Digital subscriber line; Context (language use); Computer science; Data flow diagram; SQL; Digital forensics; Verifiable secret sharing,,,,,https://www.sciencedirect.com/science/article/pii/S1742287618300380 https://doi.org/10.1016/j.diin.2018.01.006 https://dblp.uni-trier.de/db/journals/di/di24.html#StellyR18,http://dx.doi.org/10.1016/j.diin.2018.01.006,,10.1016/j.diin.2018.01.006,2793724466,,0,004-190-067-200-599; 004-611-973-316-051; 010-882-950-408-035; 015-654-094-120-991; 025-329-967-266-177; 033-241-817-699-448; 053-363-195-142-469; 085-138-340-371-322; 097-943-611-521-722; 111-471-986-310-852; 114-903-270-116-216; 115-787-295-968-707; 122-410-119-508-633; 134-927-490-231-285; 137-285-170-428-190; 142-884-607-464-932; 146-548-188-554-839; 153-705-882-254-449; 157-954-859-648-506; 192-651-528-538-864,5,true,cc-by-nc-nd,hybrid
046-941-310-744-835,Crossing Borders: Forensic Science and the Fourth Industrial Revolution.,2019-11-19,2019,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Zeno Geradts,,65,1,6,7,Forensic science; Political science; Law; Industrial Revolution,,,,,https://onlinelibrary.wiley.com/doi/pdf/10.1111/1556-4029.14236 https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.14236 https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F4a409571-a5c0-4033-a8ea-cfe9fc341b48 https://www.ncbi.nlm.nih.gov/pubmed/31743448,http://dx.doi.org/10.1111/1556-4029.14236,31743448,10.1111/1556-4029.14236,2991203514,,0,009-168-289-731-644; 087-342-951-350-054,0,false,,
047-221-550-114-462,Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data,2016-07-22,2016,journal article,Software: Practice and Experience,00380644; 1097024x,Wiley,United States,Darren Quick; Kim-Kwang Raymond Choo,"The growth in the data volume and number of evidential data from heterogeneous distributed systems in smart cities, such as cloud and fog computing systems and Internet-of-Things devices e.g. IP-based CCTVs, has led to increased collection, processing and analysis times, potentially resulting in vulnerable persons e.g. victims of terrorism incidents being at risk. A process of Digital Forensic Data Reduction of source multimedia and forensic images has provided a method to reduce the collection time and volume of data. In this paper, a methodology of Digital Forensic Quick Analysis is outlined, which describes a method to review Digital Forensic Data Reduction subsets to pinpoint relevant evidence and intelligence from heterogeneous distributed systems in a timely manner. Applying the proposed methodology to real-world data from an Australian police agency highlighted the timeliness of the process, resulting in significant improvements in processing times in comparison with processing a full forensic image. The Quick Analysis methodology, combined with Digital Forensic Data Reduction, has potential to locate evidence and intelligence in a timely manner. Copyright © 2016 John Wiley & Sons, Ltd.",47,8,1095,1109,Volume (computing); Distributed computing; Agency (sociology); Forensic science; Data reduction; Data management; Computer science; Process (engineering); Multimedia; Cloud computing; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/spe/spe47.html#QuickC17 https://onlinelibrary.wiley.com/doi/10.1002/spe.2429 https://dl.acm.org/doi/10.1002/spe.2429 https://doi.org/10.1002/spe.2429,http://dx.doi.org/10.1002/spe.2429,,10.1002/spe.2429,2497280683,,0,007-803-508-283-309; 018-618-238-562-758; 034-457-407-452-804; 039-150-867-031-328; 042-767-661-429-064; 046-505-599-865-150; 058-561-577-068-996; 068-459-443-764-162; 068-561-870-711-787; 069-754-697-292-909; 083-322-626-930-350; 086-250-543-936-924; 090-691-670-579-649; 156-972-666-676-888; 163-330-758-807-944,35,false,,
047-325-648-776-516,Applying Digital Forensics to Service Oriented Architecture,,2020,journal article,International Journal of Web Services Research,15457362; 15465004,IGI Global,United States,Aymen Akremi; Hassen Sallay; Mohsen Rouached; Rafik Bouaziz,"Digital forensics is an emerging research field involving critical technologies for obtaining evidence in digital crime investigations. Several methodologies, tools, and techniques have been developed to deal with the acquisition, preservation, examination, analysis, and presentation of digital evidence from different sources. However, new emerging infrastructures such as service-oriented architecture has brought new serious challenges for digital forensic research to ensure that evidence will be neutral, comprehensive, and reliable in such complex environment is a challenging research task. To address this issue, the authors propose in this article a generic conceptual model for digital forensics methodologies to enable their application in a service-oriented architecture. Challenges and requirements to construct a forensically sound evidence management framework for these environments are also discussed. Finally, the authors show how digital forensics standards and recommendations can be mapped to service-oriented architecture.",17,1,17,42,Computer science; Multimedia; Service-oriented architecture; Digital forensics,,,,,https://www.igi-global.com/article/applying-digital-forensics-to-service-oriented-architecture/245307 https://dblp.uni-trier.de/db/journals/jwsr/jwsr17.html#AkremiSRB20,http://dx.doi.org/10.4018/ijwsr.2020010102,,10.4018/ijwsr.2020010102,2997874685,,0,000-087-695-314-553; 001-507-239-208-313; 002-588-694-636-954; 003-296-552-356-852; 005-515-442-506-880; 005-630-640-664-939; 005-997-056-658-776; 010-414-070-550-327; 010-477-959-231-417; 016-150-300-348-872; 016-196-892-326-944; 018-245-873-246-94X; 019-698-064-288-240; 020-944-423-224-895; 026-774-296-742-022; 027-158-847-348-062; 028-103-684-022-268; 028-236-232-769-781; 032-229-233-316-986; 038-600-361-842-907; 039-423-460-322-861; 041-059-041-666-09X; 041-879-975-858-398; 043-557-483-984-559; 045-653-496-451-172; 046-395-342-063-537; 047-859-979-695-194; 049-216-276-407-671; 050-795-675-445-565; 054-601-093-496-749; 057-269-936-036-693; 059-697-278-686-056; 063-274-848-736-685; 065-882-272-263-097; 071-892-155-311-13X; 075-142-959-030-889; 077-702-229-787-594; 080-911-646-702-976; 088-239-867-090-166; 088-265-355-291-06X; 089-760-389-684-915; 090-819-867-759-870; 098-748-261-333-651; 110-619-142-027-944; 111-451-688-160-800; 113-691-446-842-345; 116-418-933-702-149; 116-908-834-541-492; 127-948-386-055-225; 130-217-725-914-477; 130-678-713-954-211; 131-922-138-141-529; 132-081-686-366-385; 134-927-490-231-285; 135-106-811-076-617; 144-124-797-675-052; 148-818-207-232-713; 163-330-758-807-944; 176-493-519-358-203; 180-048-913-144-640; 183-000-233-873-221; 188-762-236-378-448; 190-065-821-748-92X,4,false,,
047-386-524-667-691,Tool testing and reliability issues in the field of digital forensics,,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Graeme Horsman,"Abstract The digital forensic discipline is wholly reliant upon software applications and tools designed and marketed for the acquisition, display and interpretation of digital data. The results of any subsequent investigation using such tools must be reliable and repeatable whilst supporting the establishment of fact, allowing criminal justice proceedings the ability to digest any findings during the process of determining guilt or innocence. Errors present at any stage of an examination can undermine an entire investigation, compromising any potentially evidential results. Despite a clear dependence on digital forensic tools, arguably, the field currently lacks sufficient testing standards and procedures to effectively validate their usage during an investigation. Digital forensics is a discipline which provides decision-makers with a reliable understanding of digital traces on any device under investigation, however, it cannot say with 100% certainty that the tools used to undertake this process produce factually accurate results in all cases. This is an increasing concern given the push for digital forensic organisations to now acquire ISO 17025 accreditation. This article examines the current state of digital forensic tool-testing in 2018 along with the difficulties of sufficiently testing applications for use in this discipline. The results of a practitioner survey are offered, providing an insight into industry consensus surrounding tool-testing and reliability.",28,,163,175,Data science; Innocence; Digital data; Computer science; Process (engineering); Reliability (statistics); State (computer science); Accreditation; Certainty; Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S1742287618303062 https://dblp.uni-trier.de/db/journals/di/di28.html#Horsman19a https://doi.org/10.1016/j.diin.2019.01.009 https://research.tees.ac.uk/en/publications/tool-testing-and-reliability-issues-in-the-field-of-digital-foren,http://dx.doi.org/10.1016/j.diin.2019.01.009,,10.1016/j.diin.2019.01.009,2912047161,,0,004-652-388-189-304; 016-983-559-523-04X; 018-182-926-340-45X; 019-831-293-743-518; 021-039-461-635-181; 029-537-963-034-821; 030-918-415-827-067; 036-112-898-081-145; 054-004-313-233-495; 057-720-182-045-334; 064-376-774-486-022; 075-950-021-558-098; 083-582-672-677-836; 095-080-443-019-181; 099-676-137-335-314; 106-885-306-836-498; 113-462-435-754-981; 124-776-641-347-974; 127-053-349-240-432; 131-807-250-432-699; 134-927-490-231-285; 143-427-291-811-40X; 156-571-272-274-491; 173-622-542-280-95X; 178-883-713-153-793; 187-762-907-549-695; 199-745-676-923-766,32,true,,green
047-506-171-504-11X,An improved multiscale retinex algorithm for motion-blurred iris images to minimize the intra-individual variations,,2013,journal article,Pattern Recognition Letters,01678655,Elsevier BV,Netherlands,D’yia Sarah Md Shukri; Hishammuddin Asmuni; Razib M. Othman; Rohayanti Hassan,,34,9,1071,1077,Iris recognition; Image (mathematics); Artificial intelligence; Motion (geometry); Color constancy; Shadow; Contrast (vision); Iris (anatomy); Intensity histogram; Computer vision; Computer science; Homomorphic filtering,,,,,https://www.sciencedirect.com/science/article/pii/S0167865513000755 https://dblp.uni-trier.de/db/journals/prl/prl34.html#ShukriAOH13 https://ui.adsabs.harvard.edu/abs/2013PaReL..34.1071M/abstract https://doi.org/10.1016/j.patrec.2013.02.017,http://dx.doi.org/10.1016/j.patrec.2013.02.017,,10.1016/j.patrec.2013.02.017,2093180818,,0,000-572-372-633-639; 002-697-172-267-197; 020-101-214-418-794; 023-870-771-510-388; 026-746-017-380-287; 029-876-298-965-058; 032-905-558-553-235; 033-026-607-100-802; 040-177-578-613-60X; 047-135-434-146-191; 047-893-068-506-03X; 052-030-809-178-094; 063-129-579-655-156; 069-347-007-137-883; 069-642-328-160-330; 079-612-757-242-030; 092-391-596-016-423; 093-580-351-555-428; 104-579-905-493-951; 120-783-971-558-088; 124-919-630-700-053; 141-310-715-068-33X,17,false,,
047-592-632-721-234,Prelim i - Editorial Board,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,32,,300938,300938,Editorial board; Computer science; Library science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30100-1,,10.1016/s2666-2817(20)30100-1,,,0,,0,true,,bronze
047-907-955-930-528,Social Network Forensics For LEA,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Hriday Raval,,,,,,Computer security; Computer science; Social network,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.07,http://dx.doi.org/10.46293/4n6/2021.03.02.07,,10.46293/4n6/2021.03.02.07,3161056888,,0,,0,false,,
047-939-884-728-387,Law and Judicial Application of Digital Forensic Evidence in Nigeria,,2020,journal article,"Journal of Law, Policy and Globalization",,"International Institute for Science, Technology and Education",,,"The development of information & communication technology has left the Nigerian polity to the application of technology infrastructure to daily activities. In essence, disputes arising from these activities may ordinarily not be effectively settled without applying electronic evidence in proceedings before the courts. The skills and knowledge of electronic evidence require the ingenuity of forensic experts or examiners for the purpose of bridging the gap that may arise in the mind of the courts. Does the Nigerian Law accept forensic expert evidence? Is every evidence expert evidence? Are there set down conditions before the courts for forensic expert evidence to be accepted or applied to proceedings before the courts? What nature of cases requires forensic evidence? This paper will demonstrate how information and communication technology has resulted in the application of digital devices by Nigerians and the nature of the impact it has . Keywords: Digital Forensics Evidence, Forensics Examiners, Digital Forensics Experts, Law, Judicial application DOI: 10.7176/JLPG/96-08 Publication date: April 30th 202",,,,,,,,,,https://core.ac.uk/download/pdf/327151750.pdf,http://dx.doi.org/10.7176/jlpg/96-08,,10.7176/jlpg/96-08,,,0,,0,true,cc-by,hybrid
048-228-308-826-291,The Need for a New Data Processing Interface for Digital Forensic Examination,,2012,journal article,International Journal of Advanced Research in Artificial Intelligence,21654069; 21654050,The Science and Information Organization,,Inikpi O Ademu; Chris Imafidon,"Digital forensic science provides tools, techniques and scientifically proven methods that can be used to acquire and analyze digital evidence. There is a need for law enforcement agencies, government and private organisations to invest in the advancement and development of digital forensic technologies. Such an investment could potentially allow new forensic techniques to be developed more frequently. This research identifies techniques that can facilitates the process of digital forensic investigation, therefore allowing digital investigators to utilize less time and fewer resources. In this paper, we identify the Visual Basic Integrated Development Environment as an environment that provides set of rich features which are likely to be required for developing tools that can assist digital investigators during digital forensic investigation. Establishing a user friendly interface and identifying structures and consistent processes for digital forensic investigation has been a major component of this research.",1,4,,,World Wide Web; Interface (Java); Visual Basic; Law enforcement; Digital evidence; Computer science; Process (engineering); Component (UML); User Friendly; Digital forensics,,,,,https://thesai.org/Publications/ViewPaper?Volume=1&Issue=4&Code=IJARAI&SerialNo=2 https://thesai.org/Downloads/IJARAI/Volume1No4/Paper_2-The_Need_for_a_New_Data_Processing_Interface_for_Digital_Forensic_Examination.pdf,http://dx.doi.org/10.14569/ijarai.2012.010402,,10.14569/ijarai.2012.010402,2135235429,,0,004-872-169-627-620; 015-455-002-340-996; 019-831-293-743-518; 046-867-351-033-973; 048-576-750-040-030; 119-234-785-721-155; 153-153-144-072-106; 157-954-859-648-506; 158-262-072-312-063; 158-630-449-182-358; 168-712-754-489-980; 170-299-458-679-224,0,true,cc-by,hybrid
048-250-488-210-056,Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science,2017-12-28,2017,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Eoghan Casey,"This work introduces novel methods for conducting forensic analysis of file allocation traces, collectively called digital stratigraphy. These in-depth forensic analysis methods can provide insight into the origin, composition, distribution, and time frame of strata within storage media. Using case examples and empirical studies, this paper illuminates the successes, challenges, and limitations of digital stratigraphy. This study also shows how understanding file allocation methods can provide insight into concealment activities and how real-world computer usage can complicate digital stratigraphy. Furthermore, this work explains how forensic analysts have misinterpreted traces of normal file system behavior as indications of concealment activities. This work raises awareness of the value of taking the overall context into account when analyzing file system traces. This work calls for further research in this area and for forensic tools to provide necessary information for such contextual analysis, such as highlighting mass deletion, mass copying, and potential backdating.",63,5,1383,1391,Empirical research; Data science; Copying; Context (language use); Stratigraphy (archaeology); File system; Digital evidence; Computer science; Context analysis; Digital forensics,best-fit file allocation; contextual forensic analysis; digital evidence; digital forensics; digital stratigraphy; file allocation strategies; file initialization; file system analysis; file tunneling; forensic science; next-available file allocation; valid data length slack,,,,https://www.ncbi.nlm.nih.gov/pubmed/29284066 https://dialnet.unirioja.es/servlet/articulo?codigo=6583741 https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.13722 http://europepmc.org/abstract/MED/29284066 https://core.ac.uk/download/226984361.pdf,http://dx.doi.org/10.1111/1556-4029.13722,29284066,10.1111/1556-4029.13722,2781008863,,0,001-507-239-208-313; 010-127-508-296-844; 022-712-934-601-162; 073-194-524-558-213; 150-354-696-101-675; 165-189-591-866-290,7,true,,green
048-256-115-288-552,Survey on Different Phases of DigitalForensics Investigation Models,2015-03-30,2015,journal article,International Journal of Innovative Research in Computer and Communication Engineering,23209798; 23209801,Ess & Ess Research Publications,,Priya S. Patil; A. S. Kapse,"Most forensics models focus on the investigative process and its different phases and are characterized by a rather informal and intuitive approach. When a formalized process been introduced, in 1984, a new and improved computer forensics investigation processes have been developed. A digital forensics investigation is a process that used science and technology to examine digital objects and tests theories, which can be entered into a court of law, to answer questions about events that occurred. There is various digital forensics investigation models which consist different phases. The interchanging one or any steps may lead the incomplete results hence wrong interpretation and conclusion. In this paper we reviewed a few investigation processes or models; discuss the phases and identifying common phases.",3,3,1529,1534,Data mining; Forensic science; Data science; Digital forensic process; Focus (computing); Computer science; Process (engineering); Interpretation (philosophy); Computer forensics; Digital forensics,,,,,https://www.omicsonline.org/peer-reviewed/survey-on-different-phases-of-digitalforensics-investigation-models-53809.html https://www.rroij.com/open-access/survey-on-different-phases-of-digitalforensics-investigation-models.pdf https://www.rroij.com/open-access/survey-on-different-phases-of-digitalforensics-investigation-models.php?aid=53809,http://dx.doi.org/10.15680/ijircce.2015.0303018,,10.15680/ijircce.2015.0303018,2329603696,,0,005-465-138-684-882; 032-697-093-668-898; 038-668-970-194-854; 055-628-715-083-217; 062-539-825-048-788; 067-950-012-629-210; 163-581-541-690-876; 199-745-676-923-766,3,false,,
048-391-273-328-232,Editorial - Crisis or opportunity?,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Eoghan Casey,,32,,300961,,,,,,,https://doi.org/10.1016/j.fsidi.2020.300961 https://www.sciencedirect.com/science/article/pii/S2666281720301396,http://dx.doi.org/10.1016/j.fsidi.2020.300961,,10.1016/j.fsidi.2020.300961,3014128139,,0,,0,false,,
048-915-789-168-246,Expert didactics in the conditions of the third digital revolution,,2020,journal article,Issues of Forensic Science,05522153,Centralne Laboratorium Kryminalistyczne Policji,,Olga Nedashkivska,"The author raises the issue of the effective application of modern approaches in didactics in the process of training forensic experts, which is related to the specifics of activities in the field of forensic examination and to the requirements and needs of modern digital society. The purpose of the study is to analyze the existing approaches to the training of forensic experts and their skills development, as well as systematic coverage of practical problems of application of the latest didactic approaches in the field. The research was conducted by analyzing the existing classical educational approaches for the training of forensic experts in relevant fields. Taking into account the requirements of modernity associated with the total digitalization of all social and state processes the research determines the need to modernize the basic didactic techniques. The article proposes a systematic solution to the problem – the development and implementation of the latest digital platforms for the training of forensic experts in order to effectively apply their upgraded skills in practice.",308,,65,68,Engineering; Visual arts; Digital Revolution,,,,,http://dx.doi.org/10.34836/pk.2020.308.4,http://dx.doi.org/10.34836/pk.2020.308.4,,10.34836/pk.2020.308.4,3151838372,,0,,0,false,,
049-034-573-414-379,Prelim iii - Contents List,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,40,,301384,301384,Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00065-8,,10.1016/s2666-2817(22)00065-8,,,0,,0,true,,bronze
049-040-456-790-093,Application Information for Forensic Analysis Considerations for Registered Host / Users / Device Name & Bearer Tokens,2022-07-15,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Rosemond O. Addo-Sampong,"As the dependence on digital information and the Internet continues to grow, it changes the way of computer crime. The number of computer crimes increases dramatically in recent years and investigators have been facing the difficulty of admissibility of digital evidence. To solve this problem, we must collect evidence by digital forensics techniques and analyze the digital data or recover the damaged data. One place to collect evidence is from application software. This paper seeks to find out how to collect, store and analyze application information for forensic purposes. This is also to determine gaps in current research works and proffer recommendations on what future works relate to application forensics. Keywords: Digital Forensics, Evidence, Application Information, Analysis, Registered Host BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Rosemond O. Addo-Sampong (2022): Application Information for Forensic Analysis (Considerations for Registered Host / Users / Device Name & Bearer Tokens) Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 167-172 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P27",1,1,167,172,Digital evidence; Computer forensics; Digital forensics; Computer science; Nexus (standard); Host (biology); Network forensics; The Internet; Computer security; World Wide Web; Internet privacy; Data science,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p27,,10.22624/aims/crp-bk3-p27,,,0,,0,false,,
049-049-045-343-425,Mobile Forensic Investigation of Fake News Cases on Instagram Applications with Digital Forensics Research Workshop Framework,2022-07-20,2022,journal article,International Journal of Artificial Intelligence Research,25797298,STMIK Dharma Wacana,,Imam Riadi; Herman Herman; Irhash Ainur Rafiq,"The number of digital crimes or cybercrimes today continues to increase every year, and lately a lot of it happens on social media like Instagram. The social behavior of today's people who communicate more through social media encourages the perpetrators of these digital crimes. Instagram is a social media that is often found content that contains elements of pornography, hoax news, hate speech, etc. This research is aimed at processing digital evidence of cases of the spread of hoax news on the Instagram application. This research follows the framework of the Digital Forensics Research Workshop (DFRWS) with six stages, namely identification, preservation, collection, examination, analysis, and presentation. The process of obtaining digital evidence is assisted by the application of Axiom Magnet and Cellebrite UFED. Digital evidence sought from the smartphone device of the suspected hoax news disseminator seized following the case scenario consists of 8 variables in the form of accounts, emails, images, videos, URLs, times, IP address, and location. The results of this research with the help of the application of Magnet Axiom digital proof obtained 87.5% and the Cellebrite UFED application of 68.75%. The results of this study show that Magnet Axiom has better performance than MOBILedit Forensics.",6,2,,,Hoax; Digital forensics; Social media; Digital evidence; Computer science; Internet privacy; Digital media; Presentation (obstetrics); Computer security; World Wide Web; Advertising; Business; Medicine; Alternative medicine; Pathology; Radiology,,,,,,http://dx.doi.org/10.29099/ijair.v6i2.311,,10.29099/ijair.v6i2.311,,,0,,0,true,,gold
049-182-076-079-260,Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Cinthya Grajeda; Laura Sanchez; Ibrahim Baggili; Devon R. Clark; Frank Breitinger,"Abstract While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. The Artifact Genome Project (AGP) has aimed to create the largest vetted and freely available digital forensics repository for Curated Forensic Artifacts (CuFAs). This paper details the experience of building, implementing, and maintaining such a system by sharing design decisions, lessons learned, and future work. We also discuss the impact of AGP in both the professional and academic realms of digital forensics. Our work shows promise in the digital forensics academic community to champion the effort in curating digital forensic artifacts by integrating AGP into courses, research endeavors, and collaborative projects.",26,,S47,S58,Domain (software engineering); Data science; Champion; Artifact (software development); Academic community; Computer science; Digital forensics; Genome project,,,,National Science Foundation; National Science Foundation; U.S. Department of Homeland Security; U.S. Department of Homeland Security,https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1077&context=electricalcomputerengineering-facpubs https://www.sciencedirect.com/science/article/pii/S1742287618302007 https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/76/ https://dblp.uni-trier.de/db/journals/di/di26.html#GrajedaSBCB18 https://www.sciencedirect.com/science/article/abs/pii/S1742287618302007,http://dx.doi.org/10.1016/j.diin.2018.04.021,,10.1016/j.diin.2018.04.021,2884399119,,0,001-520-732-812-81X; 002-044-330-972-492; 002-768-711-065-857; 003-504-554-245-316; 004-190-067-200-599; 008-667-688-301-190; 010-985-077-415-59X; 016-322-663-058-127; 018-954-504-137-336; 020-405-975-217-252; 023-338-081-058-709; 036-112-898-081-145; 038-826-942-273-281; 039-999-270-718-277; 040-711-141-878-573; 045-478-032-041-196; 045-701-748-075-614; 048-345-694-501-681; 049-492-455-536-947; 051-558-525-539-694; 056-715-378-869-201; 065-671-045-136-370; 068-633-888-560-585; 070-930-940-364-374; 075-268-039-596-63X; 102-441-399-953-42X; 109-199-944-332-859; 121-559-348-653-550; 125-622-261-107-674; 125-939-677-745-616; 159-180-382-976-102; 170-489-073-241-86X,12,true,cc-by-nc-nd,hybrid
049-324-711-593-551,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,36,,301160,301160,Computer science; Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00065-2,,10.1016/s2666-2817(21)00065-2,,,0,,0,true,,bronze
049-415-256-346-121,Forensic Cell Site Analysis: A Validation & Error Mitigation Methodology,,2017,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,John B. Minor,,12,2,7,,Data mining; Forensic science; Error mitigation; Validation error; Computer science; Site analysis,,,,,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#Minor17 https://commons.erau.edu/cgi/viewcontent.cgi?article=1474&context=jdfsl https://commons.erau.edu/jdfsl/vol12/iss2/7/,http://dx.doi.org/10.15394/jdfsl.2017.1474,,10.15394/jdfsl.2017.1474,2787985555,,0,022-757-007-442-155; 053-391-844-157-635,1,true,cc-by-nc,gold
049-979-701-385-094,Forensic access to Windows Mobile pim.vol and other Embedded Database (EDB) volumes,,2013,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Marnix Kaart; C. Klaver; R.B. van Baar,,9,3,170,192,Operating system; Windows Rally; Software versioning; SYSTEM.INI; Computer science; Installable File System; Microsoft Windows; Windows CE; Windows Vista; Database; Group Policy,,,,,https://dblp.uni-trier.de/db/journals/di/di9.html#KaartKB13 https://www.sciencedirect.com/science/article/pii/S1742287612000874,http://dx.doi.org/10.1016/j.diin.2012.12.002,,10.1016/j.diin.2012.12.002,1975642608,,0,014-510-444-730-433; 024-735-069-822-749; 031-982-129-275-33X; 050-308-742-156-878; 073-910-371-295-970; 074-933-143-629-826; 095-158-777-313-687; 142-657-351-097-509,8,false,,
050-015-650-841-609,Digital forensics: Understanding the development of criminal law in England and Wales on images depicting child sexual abuse,,2016,journal article,Computer Law & Security Review,02673649,Elsevier BV,United Kingdom,Graeme Horsman,"Abstract In 2015, offences surrounding the possession, distributing, creation and publication of images depicting child sexual abuse (IDCSA) are prevalent. As a result, it is well publicised that law enforcement and associated digital forensic organisations are incurring substantial case backlogs in this area. As more investigations of this type are faced, it is becoming increasingly essential for practitioners to maintain an understanding of current legislative developments, as a digital forensic investigation of suspected offences surrounding IDCSA does not just involve the blanket recovery of all digital imagery on a device. Governed by this complex area of law, practitioners must appreciate the intricacies of these offences, ensuring any examination policies are correctly defined whilst recovering information that will support criminal justice processes. In addition, as triage strategies are increasingly employed in an effort to speed up investigations, it is crucial to recognise the types of evidence that are of use to a prosecuting authority in order to ensure these examination techniques are both efficient and effective. This paper offers a comprehensive analysis of legislative developments for offences surrounding IDCSA in the United Kingdom, bringing together the disciplines of law and digital forensics. Evidence of value to a prosecution for these offences is also considered taking into account existing case law precedents in line with contentious areas including the Internet cache and unallocated clusters.",32,3,419,432,Criminal justice; Common law; Political science; Law; Criminal law; Legislation; Law enforcement; Child sexual abuse; Computer forensics; Criminology; Digital forensics,,,,,https://core.ac.uk/display/153535686 https://dblp.uni-trier.de/db/journals/clsr/clsr32.html#Horsman16 http://www.sciencedirect.com/science/article/pii/S0267364916300309 https://sure.sunderland.ac.uk/id/eprint/6232 https://www.sciencedirect.com/science/article/pii/S0267364916300309 https://doi.org/10.1016/j.clsr.2016.02.002 https://research.tees.ac.uk/en/publications/digital-forensics-understanding-the-development-of-criminal-law-i https://core.ac.uk/download/74368782.pdf,http://dx.doi.org/10.1016/j.clsr.2016.02.002,,10.1016/j.clsr.2016.02.002,2293335385,,0,004-430-064-731-538; 007-163-998-251-744; 008-485-716-547-052; 013-085-072-203-411; 023-513-295-393-567; 051-669-497-524-322; 054-117-973-018-257; 061-908-629-117-242; 062-496-046-100-949; 065-783-345-234-112; 065-875-008-812-602; 068-760-490-813-839; 073-078-443-164-61X; 078-327-902-374-330; 080-233-270-573-351; 087-299-996-161-037; 094-531-548-047-14X; 109-362-587-188-314; 121-371-955-077-095; 147-659-670-579-979; 147-850-806-726-380; 149-849-349-165-016; 150-482-683-921-128; 169-957-362-102-267; 189-910-079-327-61X,4,true,,green
050-109-368-175-830,Application of data fusion methodology for computer forensics dataset analysis to resolve data quality issues in predictive digital evidence,2012-05-21,2012,journal article,The International Journal of Forensic Computer Science,18099807; 19807333,ABEAT - Associacao Brasileira de Especialistas em Alta Tecnologia,,Suneeta Satpathy; Sateesh Kumar Pradhan; B. N. B. Ray,"The digital information systems have become increasingly complex and inex- tricably intertwined with the infrastructure of national, public, and private organizations. The forensic digital analysis as a whole, in its relative infancy, is the unwilling victim of the rapid advancement of computer technology, so it is at the mercy of ever more new and complex computing approaches. Forensic digital analysis is unique among the forensic sciences in that it is inherently mathematical and generally comprises more data from an investigation than is present in other types of forensics. The digital investigation process can be driven using numerous forensic investigation models. Among these is the need to analyze forensic materials over complex chains of evidence in a wide variety of hetero- geneous computing platforms. The current computer forensic investigation paradigm is laborious and requires significant expertise on the part of the investigators. This paper presents the application of JDL data fusion model in computer forensics for analyzing the information from seized hard drives along with an analysis of the inter- preted information to prove that the respective user has misused internet. This paper is an attempt to use the data fusion and decision mining processes, to help in enhancing the quality of the investigation process which is in turn is validated by statistical evalua- tion. The mining rules generation process is based on the decision tree as a classification method to study the main attributes that may help in detecting the suspicious behavior. A system that facilitates the use of the generated rules is built which allows investigating agencies to predict the suspicious behavior under study.",,,16,23,The Internet; Data mining; Engineering; Information system; Data quality; Data science; Digital evidence; Computer technology; Sensor fusion; Computer forensics; Decision tree,,,,,https://www.ijofcs.org/abstract-v07n1-pp02.html http://www.ijofcs.org/V07N1-PP02-APPLICATION-DATA-FUSION.pdf,http://dx.doi.org/10.5769/j201201002,,10.5769/j201201002,2333839593,,0,000-115-630-626-826; 018-111-574-600-175; 037-504-226-162-718; 042-230-817-975-353; 044-937-786-034-906; 052-665-370-203-554; 099-169-442-324-498; 109-496-533-312-141; 140-535-726-112-27X; 171-950-456-851-517,1,false,,
050-213-824-812-128,Digitalna forenzika iOS uređaja,2020-12-25,2020,journal article,Zbornik radova Fakulteta tehničkih nauka u Novom Sadu,25605925; 0350428x,Faculty of Technical Sciences,,Jelena Maravić,"This paper addresses the theme of digital forensics with an emphasis on digital forensics of iOS devices. As digital forensics implies the application of the scientific method to provide digital evidence, the paper deals with all phases that include a single digital forensic investigation and describes in detail the techniques of data extraction from iOS devices and tools that implement these techniques.",36,01,87,90,Data science; Data extraction; Digital evidence; Digital forensic investigation; Theme (computing); Computer science; Digital forensics,,,,,http://www.ftn.uns.ac.rs/ojs/index.php/zbornik/article/download/1222/1242 http://www.ftn.uns.ac.rs/ojs/index.php/zbornik/article/view/1222,http://dx.doi.org/10.24867/11be14maravic,,10.24867/11be14maravic,3120557873,,0,,0,true,,bronze
050-296-813-523-597,"Digital evidence, 'absence' of data and ambiguous patterns of reasoning",,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Alex Biedermann; Joëlle Vuille,"In this paper we discuss the use of digital data by the Swiss Federal Criminal Court in a recent case of attempted homicide. We use this case to examine drawbacks for the defense when the presentation of scientific evidence is partial, especially when the only perspective mentioned is that of the prosecution. We tackle this discussion at two distinct levels. First, we pursue an essentially non-technical presentation of the topic by drawing parallels between the court's summing up of the case and flawed patterns of reasoning commonly seen in other forensic disciplines, such as DNA and particle traces (e.g., gunshot residues). Then, we propose a formal analysis of the case, using elements of probability and graphical probability models, to justify our main claim that the partial presentation of digital evidence poses a risk to the administration of justice in that it keeps vital information from the defense. We will argue that such practice constitutes a violation of general principles of forensic interpretation as established by forensic science literature and current recommendations by forensic science interest groups (e.g., the European Network of Forensic Science Institutes). Finally, we posit that argument construction and analysis using formal methods can help replace digital evidence appropriately into context and thus support a sound evaluation of the evidence.",16,,S86,S95,Epistemology; Scientific evidence; Parallels; Presentation; Administration of justice; Context (language use); Digital evidence; Computer security; Argument; Computer science; Formal methods,,,,Swiss National Science Foundation; SNSF; ERC; Ambizione; Universities of Lausanne; Neuchâtel,https://www.sciencedirect.com/science/article/abs/pii/S1742287616300056 https://serval.unil.ch/notice/serval:BIB_71F2C58C8DB2 https://www.unil.ch/esc/files/live/sites/esc/files/Fichiers%202016/Biedermann_Vuille_2016.pdf https://www.sciencedirect.com/science/article/pii/S1742287616300056 https://serval.unil.ch/resource/serval:BIB_71F2C58C8DB2.P001/REF.pdf https://core.ac.uk/display/77170769 https://core.ac.uk/download/77170769.pdf,http://dx.doi.org/10.1016/j.diin.2016.01.011,,10.1016/j.diin.2016.01.011,2332805147,,0,004-883-297-684-711; 005-222-685-769-643; 005-715-450-998-72X; 005-877-808-547-694; 011-900-233-916-611; 013-261-137-570-74X; 014-961-689-075-177; 016-976-912-187-206; 022-896-866-582-746; 042-398-266-516-108; 061-276-154-289-08X; 062-121-021-285-333; 079-046-994-186-390; 079-152-497-703-763; 085-370-444-410-812; 087-634-902-634-071; 088-306-589-450-500; 097-942-806-126-453; 101-323-230-956-293; 116-716-614-614-171; 119-299-092-875-116; 128-597-792-698-79X; 193-424-163-457-741; 197-058-703-260-084,9,true,cc-by-nc-nd,hybrid
050-433-166-102-072,A Simple Experiment with Microsoft Office 2010 and Windows 7 Utilizing Digital Forensic Methodology,,2013,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Gregory H. Carlton,"Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent have data been altered. Addressing these expectations results from opinions digital forensic examiners reach concerning their understanding of electronic storage and retrieval methods. The credibility of these opinions evolves from the scientific basis from which they are drawn using forensic methodology. Â Digital forensic methodology, being a scientific process, is derived from observations and repeatable findings in controlled environments. Furthermore, scientific research methods have established that causal conclusions can be drawn only when observed in controlled experiments. With this in mind, it seems beneficial that digital forensic examiners have a library of experiments from which they can perform, observe results, and derive conclusions. After having conducted an experiment on a specific topic, a digital forensic examiner will be in a better position to express with confidence the state of the current data and perhaps the conditions that led to its current state. Â This study provides a simple experiment using the contemporary versions of the most widely used software applications running on the most commonly installed operation system. Here, using the Microsoft Office 2010 applications, a simple Word document, an Excel spreadsheet, a PowerPoint presentation, and an Access database are created and then modified. A forensic analysis is performed to determine the extent in which the changes to the data are identified. The value in this study is not that it yields new forensic analysis techniques, but rather that it illustrates a methodology that other digital forensic examiners can apply to develop experiments representing their specific data challenges.",8,1,17,38,Data mining; Data science; Presentation; SIMPLE (military communications protocol); Software; Credibility; Digital storage; Computer science; State (computer science); Microsoft Office; Digital forensics,,,,,https://commons.erau.edu/jdfsl/vol8/iss1/2/ https://oaji.net/articles/2014/1095-1408889347.pdf https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#Carlton13 https://core.ac.uk/display/91847763 https://commons.erau.edu/cgi/viewcontent.cgi?article=1139&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2013.1139,,10.15394/jdfsl.2013.1139,1512774725,,0,014-267-129-756-476; 027-596-318-311-424; 046-798-347-676-566; 057-991-197-390-530; 098-413-963-027-021; 100-835-129-785-664; 120-393-367-354-288,0,true,cc-by-nc,gold
050-694-164-774-292,Deleting collected digital evidence by exploiting a widely adopted hardware write blocker,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Christopher S. Meffert; Ibrahim Baggili; Frank Breitinger,"In this primary work we call for the importance of integrating security testing into the process of testing digital forensic tools. We postulate that digital forensic tools are increasing in features (such as network imaging), becoming networkable, and are being proposed as forensic cloud services. This raises the need for testing the security of these tools, especially since digital evidence integrity is of paramount importance. At the time of conducting this work, little to no published anti-forensic research had focused on attacks against the forensic tools/process. We used the TD3, a popular, validated, touch screen disk duplicator and hardware write blocker with networking capabilities and designed an attack that corrupted the integrity of the destination drive (drive with the duplicated evidence) without the user's knowledge. By also modifying and repackaging the firmware update, we illustrated that a potential adversary is capable of leveraging a phishing attack scenario in order to fake digital forensic practitioners into updating the device with a malicious operating system. The same attack scenario may also be practiced by a disgruntled insider. The results also raise the question of whether security standards should be drafted and adopted by digital forensic tool makers.",18,,S87,S96,Security testing; Digital evidence; Computer security; Computer science; Forensic disk controller; Computer forensics; Firmware; Cloud computing; Digital forensics; Computer hardware; Vulnerability (computing),,,,,https://www.sciencedirect.com/science/article/pii/S1742287616300354 https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/56/ https://dl.acm.org/doi/10.1016/j.diin.2016.04.004 https://core.ac.uk/display/82539065 https://www.sciencedirect.com/science/article/abs/pii/S1742287616300354 https://core.ac.uk/download/pdf/82539065.pdf,http://dx.doi.org/10.1016/j.diin.2016.04.004,,10.1016/j.diin.2016.04.004,2510465603,,0,007-206-939-862-809; 009-642-902-074-79X; 018-483-378-650-703; 021-039-461-635-181; 021-850-998-857-676; 035-853-217-426-112; 042-880-741-738-793; 047-630-600-014-492; 055-416-156-661-003; 056-590-277-527-716; 059-176-928-707-661; 078-072-950-053-679; 090-792-295-657-205; 110-494-552-257-201; 120-916-795-553-371; 123-830-244-984-847; 146-548-188-554-839; 152-474-715-580-077; 158-931-700-122-435; 159-094-605-033-945; 187-849-196-324-650; 192-810-463-153-431,6,true,cc-by-nc-nd,hybrid
050-759-663-355-409,Digital Forensic Investigation For The Internet Of Medical Things (IoMT),2019-08-31,2019,journal article,"Journal of Forensic, Legal & Investigative Sciences",2473733x,Herald Scholarly Open Access,,Hamid Jahankhani,,5,2,1,6,Internet privacy; The Internet; Digital forensic investigation; Computer science,,,,,http://dx.doi.org/10.24966/flis-733x/100029,http://dx.doi.org/10.24966/flis-733x/100029,,10.24966/flis-733x/100029,3003856626,,0,,6,true,cc-by,gold
050-770-394-368-814,Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art,,2022,journal article,IEEE Access,21693536,Institute of Electrical and Electronics Engineers (IEEE),,Prinkle Sharma; James Gillanders,,,,1,1,,,,,,,http://dx.doi.org/10.1109/access.2022.3213843,,10.1109/access.2022.3213843,,,0,,0,true,"CC BY, CC BY-NC-ND",gold
050-857-984-627-89X,The analysis of data structure to digital forensic of dashboard camera,2015-12-31,2015,journal article,Journal of the Korea Institute of Information Security and Cryptology,15983986,Korea Institute of Information Security and Cryptology,,Hwihang An; Sangjin Lee,"Dashboard camera is important system to store the variable data that not only video but also non-visual information that state of vehicle such as accelerometer, speed, direction. Non-visual information include variable data that can't visualization, so it used important evidence to figure out the situation in accident. It could be missed to non-visual information what can be prove the case in the just digital video forensic procedure. In this paper, We proposal the digital forensic analysis procedure for dashboard camera to all data in dashboard camera extract and analysis data for investigating traffic accident case. And I analyze to some products in with this digital forensic analysis procedure.",25,6,1495,1502,Embedded system; Artificial intelligence; Data analysis; Variable (computer science); Dashboard (business); Computer vision; Visualization; Computer science; State (computer science); Global Positioning System; Digital forensics; Accelerometer,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002070698 http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2015_v25n6_1495,http://dx.doi.org/10.13089/jkiisc.2015.25.6.1495,,10.13089/jkiisc.2015.25.6.1495,2330817826,,0,,3,true,,bronze
051-785-078-933-787,Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef?,,2019,journal article,IEEE Security & Privacy,15407993; 15584046,Institute of Electrical and Electronics Engineers (IEEE),United States,Joseph Ricci; Ibrahim Baggili; Frank Breitinger,"The current state of the art in digital forensics has primarily focused on the acquisition of data from cloud storage. Here, we present a new challenge in digital forensics: blockchain-based distributed cloud storage, using STORJ as a technology example.",17,1,34,42,Operating system; Data acquisition; Cloud storage; Blockchain; Storage management; Computer science; State (computer science); Distributed database; Cloud computing; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/ieeesp/ieeesp17.html#RicciBB19 https://www.computer.org/csdl/api/v1/periodical/mags/sp/2019/01/08674173/18GGpVrSQRW/download-article/pdf https://ieeexplore.ieee.org/abstract/document/8674173 https://doi.org/10.1109/MSEC.2018.2875877,http://dx.doi.org/10.1109/msec.2018.2875877,,10.1109/msec.2018.2875877,2931728404,,1,007-803-508-283-309; 010-499-521-902-738; 015-654-094-120-991; 016-838-645-393-674; 018-696-253-395-568; 024-894-908-869-686; 028-290-062-141-840; 037-482-978-908-24X; 040-711-141-878-573; 045-701-748-075-614; 058-631-300-195-90X; 091-619-263-117-914; 094-116-664-798-989; 101-091-831-428-576; 105-749-330-848-306; 125-817-456-334-439; 129-604-082-098-334; 168-994-901-760-186,23,false,,
051-832-649-225-696,An Ontology-Based Transformation Model for the Digital Forensics Domain,2017-06-15,2017,journal article,Elektronika ir Elektrotechnika,20295731; 13921215,Kaunas University of Technology (KTU),Lithuania,Sarunas Grigaliunas; Jevgenijus Toldinas; Algimantas Venčkauskas,"The creation of an ontology makes it possible to form common information structures, to reuse knowledge, to make assumptions within a domain and to analyse every piece of knowledge. In this paper, we aim to create an ontology-based transformation model and a framework to develop an ontology-based transformation system in the digital forensics domain. We describe the architecture of the ontology-based transformation system and its components for assisting computer forensics experts in the appropriate selection of tools for digital evidence investigation. We consider the use of the attributes of Extensible Markup Language document transformation to map the computer forensics ontology and we use the representations in the National Institute of Standards and Technology’s “Computer Forensics Tool Catalog” for aligning one form with the other.DOI: http://dx.doi.org/10.5755/j01.eie.23.3.18337",23,3,78,82,Transformation (function); Ontology (information science); Domain (software engineering); Information retrieval; Digital evidence; Computer science; Computer-aided software engineering; Computer forensics; Digital forensics; XML,,,,,https://eejournal.ktu.lt/index.php/elt/article/view/18337/8800 https://eejournal.ktu.lt/index.php/elt/article/view/18337 https://core.ac.uk/display/144875785 https://core.ac.uk/download/pdf/144875785.pdf,http://dx.doi.org/10.5755/j01.eie.23.3.18337,,10.5755/j01.eie.23.3.18337,2624936764,,0,,3,true,cc-by,gold
052-054-657-975-487,Analisa Perkembangan Digital Forensik dalam Penyelidikan Cybercrime di Indonesia (Systematic Review),2020-01-04,2020,journal article,Jurnal Telekomunikasi dan Komputer,20854811,Universitas Mercu Buana,,Nur Iman; Aris Susanto; Rahmat Inggi,"Digital forensik dikembangkan untuk menyelidiki perangkat digital dalam mendeteksi kejahatan ( cybercrime ). Tujuan penulisan makalah ini untuk mengidentifikasi sub digital forensik dan menganalisa perkembangan digital forensik dalam penyelidikan kasus kejahatan di Indonesia. Metode yang digunakan adalah kajian sistematis ( systematic review ) dengan melalui proses pemilihan sumber data yaitu Garba Rujukan Digital, Science and Technology Index, RAMA Repository. Hasil dari penelusuran menunjukkan bahwa kejahatan paling banyak ditangani yaitu live forensic , network forensic , dan mobile forensic dengan grafik trend topic diatas 10 dibandingkan dengan computer forensic dan database forensic hanya terdapat 2 topik.",9,3,186,192,Library science; Political science; Digital forensics,,,,,https://www.mendeley.com/catalogue/db3b364e-2779-3df0-ac22-f70dc1853772/ http://publikasi.mercubuana.ac.id/index.php/Incomtech/article/view/7210 https://publikasi.mercubuana.ac.id/index.php/Incomtech/article/view/7210 https://publikasi.mercubuana.ac.id/index.php/Incomtech/article/download/7210/3098 https://incomtech.mercubuana.ac.id/id/publications/293930/analisa-perkembangan-digital-forensik-dalam-penyelidikan-cybercrime-di-indonesia,http://dx.doi.org/10.22441/incomtech.v9i3.7210,,10.22441/incomtech.v9i3.7210,2998235363,,0,,3,true,cc-by-nc,gold
052-114-633-106-705,Fifteenth Annual DFRWS Conference,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Elizabeth Schweinsberg,,14,,S1,S2,Fifteenth; Computer science; Art history,,,,,https://dblp.uni-trier.de/db/journals/di/di14.html#Schweinsberg15 https://doi.org/10.1016/j.diin.2015.07.001 https://www.sciencedirect.com/science/article/pii/S1742287615000729 https://core.ac.uk/display/82783794 https://core.ac.uk/download/pdf/82783794.pdf,http://dx.doi.org/10.1016/j.diin.2015.07.001,,10.1016/j.diin.2015.07.001,2201798142,,0,,0,true,cc-by-nc-nd,hybrid
052-722-033-105-281,Forensically Sound Piecewise Hashing: Integrity checks with DEIC,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Ashok Kumar Mohan,"The integrity of a digital evidence is believed to be the paramount trait in the world of cyber forensics. Cyber- crime investigators face myriad challenges in the process similar to accommodating the call for bulk digital evidence. In due course extraction of useful information while maintaining the integrity and definitive protection against data degradation is mandatory. In this manuscript, we propose a novel approach by applying cryptographic hashing technique to only selected significant portions of the digital evidence, so even if the overall hash does not match, investigators could still verify the integrity of those critical section of the evidence. We put forward two notions in this manuscript, former is Heterogeneous piecewise hashing which is flexible version of piecewise hashing strategy and latter, novel evidence certification strategy which formalizes evidence provability process completely.",,,63,70,Algorithm; Piecewise; Sound (geography); Computer science; Hash function,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.14,http://dx.doi.org/10.46293/4n6/2020.02.02.14,,10.46293/4n6/2020.02.02.14,3023340899,,0,,0,false,,
053-447-315-738-012,Using Blockchain to Ensure the Integrity of Digital Forensic Evidence in an IoT Environment,2022-06-03,2022,journal article,EAI Endorsed Transactions on Creative Technologies,24099708,European Alliance for Innovation n.o.,,Muhammad Akhtar; Tao Feng,"Digital forensics deals with digital evidence. Digital forensics is the study of data detection, acquisition, processing, analysis, and reporting. Encouraging the use of digital forensics in law enforcement investigations. With digital forensics, you can find out what data was taken and how it was c",,,174089,174089,Digital evidence; Digital forensics; Network forensics; Blockchain; Computer security; Internet of Things; Law enforcement; Computer science; Computer forensics; Internet privacy; Data science,,,,,,http://dx.doi.org/10.4108/eai.3-6-2022.174089,,10.4108/eai.3-6-2022.174089,,,0,,0,true,cc-by,gold
053-514-971-073-351,PRECEPT: a framework for ethical digital forensics investigations,2020-03-09,2020,journal article,Journal of Intellectual Capital,14691930,Emerald,United Kingdom,R.I. Ferguson; Karen Renaud; Sara Wilford; Alastair Irons,"This paper argues the need for a practical, ethically grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organizations, as well as acknowledging the needs of law enforcement. The paper derives a set of ethical guidelines, and then maps these onto a forensics investigation framework. The framework to expert review in two stages is subjected, refining the framework after each stage. The paper concludes by proposing the refined ethically grounded digital forensics investigation framework. The treatise is primarily UK based, but the concepts presented here have international relevance and applicability.,In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals' rights to privacy and organizations' rights to control intellectual capital disclosure.,The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically informed approach to digital forensics investigations, as a remedy, is highlighted and a framework proposed to provide this.,The proposed ethically informed framework for guiding digital forensics investigations suggests a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.,Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other.",21,2,257,290,Sociology; Relevance (law); Set (psychology); Right to privacy; Injustice; Precept; Law enforcement; Intellectual capital; Engineering ethics; Digital forensics,,,,,https://dora.dmu.ac.uk/handle/2086/18943 https://pureportal.strath.ac.uk/en/publications/precept-a-framework-for-ethical-digital-forensics-investigations https://rke.abertay.ac.uk/ws/files/23352644/Renaud_PRECEPT_Accepted_2019.pdf https://www.emerald.com/insight/content/doi/10.1108/JIC-05-2019-0097/full/pdf?title=precept-a-framework-for-ethical-digital-forensics-investigations https://dora.dmu.ac.uk/bitstream/2086/18943/1/PRECEPT%20A%20Framework%20for%20Ethical%20Digital%20Forensics%20Investigations.pdf https://rke.abertay.ac.uk/en/publications/precept-a-framework-for-ethical-digital-forensics-investigations https://strathprints.strath.ac.uk/75129/ https://www.emerald.com/insight/content/doi/10.1108/JIC-05-2019-0097/full/html https://sure.sunderland.ac.uk/id/eprint/12067/ https://core.ac.uk/download/287585744.pdf,http://dx.doi.org/10.1108/jic-05-2019-0097,,10.1108/jic-05-2019-0097,2997108533,,0,000-732-818-777-187; 001-135-038-170-705; 002-733-280-021-771; 003-923-093-358-17X; 004-031-611-327-668; 006-138-917-123-177; 006-322-634-212-786; 009-963-198-569-373; 010-760-969-054-219; 013-435-147-083-483; 014-261-775-435-338; 014-492-795-258-365; 014-531-291-102-198; 016-945-345-350-158; 017-805-463-199-729; 019-339-751-892-162; 019-505-819-376-748; 019-968-523-287-376; 021-850-998-857-676; 023-858-572-607-02X; 025-467-886-829-340; 026-774-296-742-022; 027-685-179-504-406; 029-168-311-729-15X; 029-447-091-073-102; 029-518-593-947-995; 030-045-112-792-346; 032-702-492-808-193; 035-742-523-393-097; 036-208-938-233-278; 036-414-888-400-142; 039-103-756-700-945; 041-331-434-774-438; 045-288-167-711-647; 046-328-032-388-440; 046-507-380-373-943; 047-630-600-014-492; 052-196-937-150-029; 062-164-597-894-73X; 062-325-585-829-185; 063-884-128-799-395; 064-387-058-206-177; 064-790-018-018-614; 067-060-814-542-833; 070-378-356-319-383; 072-922-481-935-635; 074-614-672-576-143; 074-875-398-814-107; 089-125-778-648-739; 089-621-912-811-772; 091-306-281-397-166; 092-415-226-886-724; 093-246-849-198-25X; 093-469-342-679-888; 098-686-518-644-578; 112-394-120-551-065; 114-090-829-194-843; 114-098-918-624-354; 116-749-161-883-299; 118-838-969-146-870; 127-651-023-065-320; 127-948-386-055-225; 131-695-373-839-786; 144-884-155-522-62X; 147-196-682-655-889; 148-218-390-171-795; 156-480-578-742-768; 159-450-168-937-396; 161-764-997-528-585; 162-110-149-751-921; 165-962-127-351-782; 179-608-372-698-452; 181-095-475-426-346,5,true,cc-by-nc,green
054-004-313-233-495,Requirements in digital forensics method definition : Observations from a UK study,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Angus M. Marshall; Richard F. Paige,"Abstract During a project to examine the potential usefulness of evidence of tool verification as part of method validation for ISO 17025 accreditation, the authors have examined requirements statements in several digital forensic method descriptions and tools. They have identified that there is an absence of clear requirements statements in the methods and a reluctance or inability to disclose requirements on the part of tool producers. This leads to a break in evidence of correctness for both tools and methods, resulting in incomplete validation. They compare the digital forensics situation with other ISO 17025 accredited organisations, both forensic and non-forensic, and propose a means to close the gap and improve validation. They also review existing projects which may assist with their proposed solution.",27,,23,29,Data science; Computer science; Correctness; Accreditation; Digital forensics,,,,University of York Research Priming Fund,https://dblp.uni-trier.de/db/journals/di/di27.html#MarshallP18 https://www.sciencedirect.com/science/article/pii/S1742287618302718 https://eprints.whiterose.ac.uk/137032/ https://core.ac.uk/download/199218336.pdf,http://dx.doi.org/10.1016/j.diin.2018.09.004,,10.1016/j.diin.2018.09.004,2890279224,,0,019-953-559-571-756; 029-459-233-206-184; 067-938-325-014-282; 142-790-196-752-819,23,true,cc-by-nc-nd,green
054-331-725-373-265,Digital Forensic Readiness: Are We There Yet?,2014-06-30,2014,journal article,Journal of International Commercial Law and Technology,19018401,,,Antonis Mouhtaropoulos; Chang-Tsun Li; Marthie Grobler,Digital Forensic Readiness is defined as the pre-incident plan that deals with an organization’s ability to maximize digital evidence usage and anticipate litigation. The inadequacy of technical research and legislations and the ever-increasing need for evidence preservation mechanisms has brought the need for a common forensic readiness standard. This article reviews a number of key initiatives in order to point out the directions for future policy making governments and organizations and conducts an investigation of the limitations of those initiatives to reveal the gaps needed to be bridged.,9,3,173,179,Business; Order (exchange); Point (typography); Key (cryptography); Digital evidence; Policy making; Public relations; Knowledge management; Plan (drawing); Digital forensics,,,,,https://researchoutput.csu.edu.au/en/publications/digital-forensic-readiness-are-we-there-yet http://dro.deakin.edu.au/view/DU:30119739 https://wrap.warwick.ac.uk/id/eprint/65196,https://researchoutput.csu.edu.au/en/publications/digital-forensic-readiness-are-we-there-yet,,,1947796688,,0,041-291-462-265-899; 098-857-083-857-534,19,false,,
054-464-741-662-365,Forensic Footwear Imprint Examination using Adobe Photoshop Digital Imaging Software - A case study,,2017,journal article,International Journal of Criminal and Forensic Science,25763563,Biocore Group,,Ramakrishnan. P.N,,1,2,28,31,Digital imaging; Computer graphics (images); Engineering; Software; Adobe photoshop,,,,,http://dx.doi.org/10.25141/2576-3563-2017-2.0028,http://dx.doi.org/10.25141/2576-3563-2017-2.0028,,10.25141/2576-3563-2017-2.0028,2794362520,,0,,0,true,cc-by,gold
054-471-285-379-894,Digital Forensic Analysis of Hard Disk for Evidence Collection,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Bandu B. Meshram; Dinesh N. Patil,,7,2,100,110,Evidence collection; Computer science; Multimedia; Wireless; Digital forensics,,,,,http://www.sdiwc.net/digital-library/digital-forensic-analysis-of-hard-disk-for-evidence-collection.html,http://dx.doi.org/10.17781/p002372,,10.17781/p002372,2791423273,,0,020-486-151-034-995; 054-321-069-682-537; 074-999-867-962-351; 085-214-277-668-01X; 110-576-638-767-244; 117-513-040-751-893,5,false,,
054-677-638-335-39X,Effective approaches to three-dimensional digital reconstruction of fragmented human skeletal remains using laser surface scanning,2020-07-31,2020,journal article,Forensic science international. Synergy,2589871x,Elsevier BV,Netherlands,Gargi Jani; Abraham Johnson; Utsav Parekh; Tim Thompson; Astha Pandey,"Abstract The preservation and reconstruction of anthropological and archaeological remains has been given considerable attention in recent years, particularly within the fields of forensic science and palaeoanthropology. However, few studies have tapped the potential of using 3D technology to reconstruct, remodel and recontour remains and artefacts for the purpose of human identification. The aim of this study was to use 3D technology for the reconstruction and remodelling of fragmented and missing elements of skeletal remains. This project presents the application of three dimensional (3D) modalities to two different simulated forensic case scenarios where an attempt was made to remodel the missing element of the human cranium and reconstruction of fragmented replicated human mandible was performed. The accuracy of the reconstructed model was affirmed based on the anatomical features and digital analysis and methods for use in forensic practice are recommended.",2,,215,223,Artificial intelligence; Forensic anthropology; Digitization; Digital reconstruction; Digital analysis; Surface scanning; 3d scanning; Computer vision; Computer science,3D printing; 3D scanning; Digital reconstruction; Digitization; Forensic anthropology,,,Gujarat Forensic Sciences University Student Startup Innovation Policy; Gujarat Forensic Sciences University; Institute of Forensic Science; GFSU-Student Startup Policy,https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7417899 https://europepmc.org/article/MED/32803150 https://www.sciencedirect.com/science/article/pii/S2589871X20300486,http://dx.doi.org/10.1016/j.fsisyn.2020.07.002,32803150,10.1016/j.fsisyn.2020.07.002,3046491710,PMC7417899,0,000-578-174-768-820; 002-372-825-803-01X; 002-757-600-778-594; 003-278-228-480-094; 006-036-539-291-490; 007-650-508-880-766; 011-675-439-503-507; 013-138-622-173-445; 015-123-182-480-038; 016-580-313-404-132; 018-826-363-640-555; 019-885-756-382-127; 023-014-879-325-49X; 024-123-842-118-517; 024-784-179-276-92X; 027-873-458-906-107; 029-518-894-016-342; 032-625-551-023-227; 032-707-982-696-465; 036-403-879-718-18X; 038-602-847-722-162; 042-141-941-221-562; 045-932-907-295-787; 045-977-597-761-939; 049-019-689-376-719; 053-139-478-467-996; 059-572-267-613-848; 063-606-720-330-852; 066-326-667-476-053; 073-189-364-637-601; 073-933-049-544-280; 077-136-183-426-035; 092-224-257-059-076; 092-305-346-660-757; 098-798-263-351-920; 110-494-921-167-835; 121-117-131-742-511; 136-115-119-862-890; 139-729-629-797-721; 151-494-162-718-970; 173-072-899-572-433; 178-456-110-092-227,6,true,"CC BY, CC BY-NC-ND",gold
055-086-544-213-027,Analisis Kelayakan Integrated Digital Forensics Investigation Framework Untuk Investigasi Smartphone,2016-10-25,2016,journal article,Jurnal Buana Informatika,20897642; 20872534,Universitas Atma Jaya Yogyakarta,,Ruuhwan Ruuhwan; Riadi; Yudi Prayudi,"Abstract. The handling of digital evidence each and every digital data that can proof a determination that a crime has been committed; it may also give the links between a crime and its victims or crime and the culprit. How to verify a valid evidence is to investigate using the approach known as the Digital Forensic Examination Procedures. Integrated Digital Forensic Investigation Framework (IDFIF) is the latest developed method, so that it is interesting to further scrutinize IDFIF, particularly in the process of investigation of a smartphone. The current smartphone devices have similar functions with computers. Although its functions are almost the same as the computer, but there are some differences in the process of digital forensics handling between computer devices and smartphones. The digital evidence handling process stages need to overcome the circumstances that may be encountered by an investigator involving digital evidence particularly on electronic media and smartphone devices in the field. IDFIF needs to develop in such a way so it has the flexibility in handling different types of digital evidence. Keywords: digital evidence, IDFIF, investigation, smartphone Abstraks. Penanganan bukti digital mencakup setiap dan semua data digital yang dapat menjadi bukti penetapan bahwa kejahatan telah dilakukan atau dapat memberikan link antara kejahatan dan korbannya atau kejahatan dan pelakunya. Cara pembuktian untuk mendapatkan bukti valid adalah dengan melakukan investigasi dengan pendekatan Prosedur Pemeriksaan Digital Forensic. Integrated Digital Forensics Investigation Framework (IDFIF) merupakan metode terbaru sehingga IDFIF ini menarik untuk diteliti lebih lanjut terutama dalam proses investigasi smartphone. Saat ini perangkat smartphone memiliki fungsi yang sama dengan komputer. Meskipun demikian, ada beberapa perbedaan dalam proses penanganan digital forensics diantara perangkat komputer dan smartphone. Tahapan proses penanganan barang bukti digital seharusnya dibuat untuk mengatasi keadaan umum yang mungkin dihadapi oleh investigator yang melibatkan barang bukti digital terutama pada perangkat smartphone dan media elektronik terkait di lapangan. IDFIF perlu dikembangkan sehingga memiliki fleksibilitas dalam menangani berbagai jenis barang bukti digital. Kata Kunci: bukti digital, IDFIF, investigasi, smartphone",7,4,77775,,,,,,,https://www.neliti.com/publications/77775/analisis-kelayakan-integrated-digital-forensics-investigation-framework-untuk-in https://core.ac.uk/download/pdf/268157138.pdf,http://dx.doi.org/10.24002/jbi.v7i4.767,,10.24002/jbi.v7i4.767,2558693854,,0,,2,true,,
055-166-120-045-285,"DF 2.0: An Automated, Privacy Preserving, and Efficient Digital Forensic Framework That Leverages Machine Learning for Evidence Prediction and Privacy Evaluation",,2019,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Robin Verma; Jayaprakash Govindaraj; Saheb Chhabra; Gaurav Gupta,,14,2,13,44,Automation; Information privacy; Information retrieval; Privacy preserving; Computer science; Digital forensics,,,,,https://commons.erau.edu/jdfsl/vol14/iss2/3/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1606&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl14.html#VermaGCG19,http://dx.doi.org/10.15394/jdfsl.2019.1606,,10.15394/jdfsl.2019.1606,2962333476,,0,000-360-120-513-679; 012-547-708-771-754; 014-561-286-568-118; 020-343-122-748-675; 033-877-222-136-260; 059-078-762-318-13X; 066-271-426-147-659; 074-339-650-704-622; 097-567-011-227-46X; 099-600-335-833-663; 112-181-239-331-730; 119-759-887-719-875; 134-927-490-231-285; 135-626-485-398-950; 137-755-137-054-864; 163-330-758-807-944; 181-095-475-426-346,3,true,cc-by-nc,gold
055-248-229-344-149,Revisión sobre la forensía digital en dispositivos móvil con sistemas operativos Android,2018-12-14,2018,journal article,I+D Tecnológico,22196714; 16808894,Universidad Tecnologica de Panama,,Miguel Vargas Lombardo; José Moreno; Isabel Leguias,"Esta investigación está enfocada en los procedimientos, mecanismos y metodologías de análisis forense digital en dispositivos móviles, con la intención de contar con un manual o metodología para el manejo de evidencias digitales en estos dispositivos. Por otra parte, trataremos las herramientas de software libre y privativas utilizadas para el análisis forense de smartphones con sistemas operativos Android. Como resultado se detectaron métodos de antiforensía que impiden la adquisición de los artefactos en los teléfonos inteligentes. En consecuencia, identificados técnicas antiforensía como técnicas criptográficas empleadas por los cibercriminales para esconder sus huellas o evidencias.",14,2,74,83,,,,,,http://revistas.utp.ac.pa/index.php/id-tecnologico/article/download/2076/3031 https://core.ac.uk/download/pdf/234019593.pdf,http://dx.doi.org/10.33412/idt.v14.2.2076,,10.33412/idt.v14.2.2076,2909994079,,0,,0,true,cc-by-nc-sa,gold
055-628-715-083-217,COMPARATIVE DIGITAL FORENSIC MODEL,,2013,journal article,"International Journal of Innovative Research in Science, Engineering and Technology",23476710,,,Nilakshi Jain,"The computer forensic is the about evidence finding from computer or services using its reliability and justification which can be proved in court or in management. To accomplish this task various digital forensic model has been introduced till now. The proposed model ,Comparative Digital Forensic Model (CDFM) provides the authenticate evidence using less efforts because it based on required output only. Initially all models has been reviewed and listed advantages and disadvantages of all finally the CDFM has been developed, using that model very initial user can also understand the basic concept of digital forensic model.",2,8,3414,3419,Data mining; Data science; Task (project management); Computer science; Reliability (statistics); Digital forensics,,,,,https://www.rroij.com/open-access/comparative-digital-forensic-model.pdf https://www.omicsonline.org/peer-reviewed/comparative-digital-forensic-model-46459.html https://www.rroij.com/open-access/comparative-digital-forensic-model-.php?aid=46459 http://ijirset.com/upload/august/6_COMPARATIVE.pdf https://ijirset.com/upload/august/6_COMPARATIVE.pdf,https://www.omicsonline.org/peer-reviewed/comparative-digital-forensic-model-46459.html,,,2188909317,,0,004-706-447-836-905; 032-697-093-668-898; 035-223-520-491-228; 065-452-675-566-99X; 067-950-012-629-210; 133-397-275-695-990; 170-299-458-679-224; 183-000-233-873-221; 199-745-676-923-766,3,false,,
055-778-828-584-716,A Local Perturbation Generation Method for GAN-generated Face Anti-forensics,,2022,journal article,IEEE Transactions on Circuits and Systems for Video Technology,10518215; 15582205,Institute of Electrical and Electronics Engineers (IEEE),United States,Haitao Zhang; Beijing Chen; Jinwei Wang; Guoying Zhao,"Although the current generative adversarial networks (GAN)-generated face forensic detectors based on deep neural networks (DNNs) have achieved considerable performance, they are vulnerable to adversarial attacks. In this paper, an effective local perturbation generation method is proposed to expose the vulnerability of state-of-the-art forensic detectors. The main idea is to mine the fake faces’ areas of common concern in multiple-detectors’ decision-making, then generate local anti-forensic perturbations by GANs in these areas to enhance the visual quality and transferability of anti-forensic faces. Meanwhile, in order to improve the anti-forensic effect, a double-mask (soft mask and hard mask) strategy and a three-part loss (the GAN training loss, the adversarial loss consisting of ensemble classification loss and ensemble feature loss, and the regularization loss) are designed for the training of the generator. Experiments conducted on fake faces generated by StyleGAN demonstrate the proposed method’s advantage over the state-of-the-art methods in terms of anti-forensic success rate, imperceptibility, and transferability. The source code is available at https://github.com/imagecbj/A-Local-Perturbation-Generation-Method-for-GAN-generated-Face-Anti-forensics.",,,1,1,,,,,National Natural Science Foundation of China; Priority Academic Program Development of Jiangsu Higher Education Institutions,,http://dx.doi.org/10.1109/tcsvt.2022.3207310,,10.1109/tcsvt.2022.3207310,,,0,,0,false,,
056-254-180-340-08X,Applying a Contingency Framework to Digital Forensic Processes in Cloud Based Acquisitions,,2017,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Diane Barrett,,12,2,9,,Data science; Computer science; Contingency theory; Cloud computing; Digital forensics; Contingency,,,,,https://doi.org/10.15394/jdfsl.2017.1473 https://commons.erau.edu/jdfsl/vol12/iss2/9/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1473&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#Barrett17,http://dx.doi.org/10.15394/jdfsl.2017.1473,,10.15394/jdfsl.2017.1473,2788190916,,0,002-889-650-119-073; 004-097-974-459-223; 012-194-001-935-195; 017-600-678-762-743; 029-710-515-750-273; 032-716-805-412-497; 036-770-007-474-194; 043-652-467-015-112; 047-727-383-634-767; 063-513-066-601-773; 064-313-388-228-262; 092-655-509-442-333; 095-106-460-741-427; 096-103-572-025-794; 106-997-247-556-643; 134-927-490-231-285; 144-285-248-757-773; 173-365-121-341-393; 175-767-465-206-720,1,true,cc-by-nc,gold
056-406-725-646-266,Analisis Bukti Digital pada Storage Secure Digital Card Menggunakan Metode Static Forensic,2019-11-20,2019,journal article,Mobile and Forensics,27146685; 26566257,Universitas Ahmad Dahlan,,Muh Fadli Hasa; Anton Yudhana; Abdul Fadlil,"Secure Digital Card (SD Card) merupakan salah satu media untuk mendapatkan bukti digital dalam proses penyelidikan suatu kasus cybercrime . Oleh kerena itu, perlu adanya penelitian tentang analisa bukti digital pada media penyimpanan SD Card . Penelitian ini membahas tentang proses eksaminasi dan analisis bukti digital yang terdapat pada media penyimpanan SD Card yang bertujuan untuk membantu proses penyelidikan kasus cybercrime . Proses penelitian menggunakan tools forensic FTK Imager dan Autopsy serta menggunakan metode forensic static dimana barang bukti eletronik diproses secara bit-by-bit image dalam melakukan proses forensik. Hasil dari penelitian ini adalah barang bukti yang berupa SD Card dilakukan proses examinasi dan recovery data yang hilang, data yang berhasil di recovery dibedakan berdasarkan cara pelaku menghapus datanya. Data yang didapatkan pada SD Card dapat dijadikan sebagai barang bukti pada proses persidangan kasus cybercrime .",1,2,76,84,,,,,,http://journal2.uad.ac.id/index.php/mf/article/view/1217 http://journal2.uad.ac.id/index.php/mf/article/download/1217/pdf https://core.ac.uk/download/pdf/267886817.pdf,http://dx.doi.org/10.12928/mf.v1i2.1217,,10.12928/mf.v1i2.1217,2992134555,,0,,1,true,cc-by-sa,gold
056-522-627-812-660,Visual Computing and Machine Learning Techniques for Digital Forensics,2015-05-18,2015,journal article,Revista de Informática Teórica e Aplicada,21752745; 01034308,Universidade Federal do Rio Grande do Sul,,Tiago Carvalho; Helio Pedrini; Anderson Rocha,"It is impressive how fast science has improved day by day in so many different fields. In special, technology advances are shocking so many people bringing to their reality facts that previously were beyond their imagination. Inspired by methods earlier presented in scientific fiction shows, the computer science community has created a new research area named Digital Forensics, which aims at developing and deploying methods for fighting against digital crimes such as digital image forgery.This work presents some of the main concepts associated with Digital Forensics and, complementarily, presents some recent and powerful techniques relying on Computer Graphics, Image Processing, Computer Vision and Machine Learning concepts for detecting forgeries in photographs. Some topics addressed in this work include: source attribution, spoofing detection, pornography detection, multimedia phylogeny, and forgery detection. Finally, this work highlights the challenges and open problems in Digital Image Forensics to provide the readers with the myriad opportunities available for research.",22,1,128,153,Machine learning; Artificial intelligence; Spoofing attack; Visual computing; Pornography; Computer science; Digital image; Multimedia; Computer forensics; Computer graphics; Digital forensics; Image processing,,,,,https://seer.ufrgs.br/rita/article/view/RITA-VOL22-NR1-128 https://seer.ufrgs.br/rita/article/download/RITA-VOL22-NR1-128/33866 https://core.ac.uk/download/303970495.pdf,http://dx.doi.org/10.22456/2175-2745.49492,,10.22456/2175-2745.49492,1859651454,,0,,2,true,cc-by-nc-nd,gold
056-543-812-810-619,Multileveled ternary pattern and iterative ReliefF based bird sound classification,,2021,journal article,Applied Acoustics,0003682x; 1872910x,Elsevier BV,United Kingdom,Turker Tuncer; Erhan Akbal; Sengul Dogan,,176,,107866,,Tree (data structure); Deep learning; k-nearest neighbors algorithm; Support vector machine; Feature selection; Artificial intelligence; Pattern recognition; Computational complexity theory; Computer science; Discrete wavelet transform; Linear discriminant analysis,,,,,https://www.sciencedirect.com/science/article/pii/S0003682X20309713,http://dx.doi.org/10.1016/j.apacoust.2020.107866,,10.1016/j.apacoust.2020.107866,3119043017,,0,000-896-554-641-104; 001-065-278-896-176; 002-214-489-905-725; 002-621-988-427-244; 003-175-750-069-319; 004-266-052-693-819; 004-922-156-123-952; 006-697-972-006-695; 006-748-330-880-222; 012-344-743-259-836; 014-074-491-491-158; 016-557-431-172-349; 017-510-058-519-209; 021-218-500-954-163; 021-883-413-405-000; 022-032-095-214-380; 025-166-283-182-200; 028-882-462-209-225; 029-867-539-332-231; 030-757-432-979-076; 034-664-033-394-954; 035-370-354-940-357; 035-877-553-042-499; 038-110-909-174-624; 040-061-314-068-869; 043-306-941-858-407; 043-982-493-448-36X; 044-222-307-712-45X; 049-326-688-645-526; 049-860-251-887-83X; 054-429-214-096-011; 056-114-742-941-57X; 057-115-503-939-73X; 058-326-239-568-621; 061-813-819-884-897; 064-115-669-679-548; 070-154-914-102-03X; 073-010-012-677-404; 078-017-620-006-093; 078-857-006-890-191; 082-195-820-959-151; 082-279-562-538-749; 085-236-522-178-311; 086-514-389-587-442; 099-315-738-160-501; 109-986-404-834-80X; 114-830-483-002-920; 126-500-361-100-614; 129-691-409-059-301; 136-940-094-377-214; 147-652-690-009-170; 149-046-610-605-072; 179-062-330-007-64X; 187-218-172-649-214,14,false,,
056-715-378-869-201,Engineering an online computer forensic service,,2012,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,R.A.F. Bhoedjang; A. R. Van Ballegooij; H.M.A. van Beek; J.C. van Schie; Feike W. Dillema; R.B. van Baar; F.A. Ouwendijk; M. Streppel,,9,2,96,108,World Wide Web; Forensic science; Software as a service; Law enforcement; Digital evidence; Service (systems architecture); Computer science; Computer forensics; Digital forensics; User interface,,,,,http://dx.doi.org/10.1016/j.diin.2012.10.001 https://www.sciencedirect.com/science/article/pii/S1742287612000655 https://dblp.uni-trier.de/db/journals/di/di9.html#BhoedjangBBSDBOS12,http://dx.doi.org/10.1016/j.diin.2012.10.001,,10.1016/j.diin.2012.10.001,2036428903,,0,005-116-312-278-527; 024-735-069-822-749; 029-569-577-474-673; 033-241-817-699-448; 033-877-222-136-260; 092-614-171-723-187; 104-758-205-558-797; 118-513-636-363-038; 174-800-010-429-560,28,false,,
056-760-246-560-467,Digital Forensics Techniques Overview,2020-06-15,2020,journal article,Bulletin of Science and Practice,24142948,Publishing Center Science and Practice,,A. Vatsenko,"This article discusses the important issue of the use of forensic technology in computer forensics. The basic techniques of computer forensics existing today, such as real-time tracking, sandboxing, data and password recovery, and so on, are examined. The advantages and disadvantages of existing methods are given and recommendations are made on the development of computer forensics techniques in the future. Conclusions are drawn up on the problem of using forensic technology in computer forensics.",6,6,167,174,Computer science; Multimedia; Digital forensics,,,,,http://dx.doi.org/10.33619/2414-2948/55/21,http://dx.doi.org/10.33619/2414-2948/55/21,,10.33619/2414-2948/55/21,3034267720,,0,080-646-163-420-97X,0,true,,gold
056-772-951-594-695,A survey on digital camera identification methods,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Jarosław Bernacki,,34,,300983,,System identification; Artificial intelligence; Digital camera; Scanner; Identification methods; Computer vision; Computer science; Image sensor; Identification (information); Convolutional neural network; Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S2666281720300536,http://dx.doi.org/10.1016/j.fsidi.2020.300983,,10.1016/j.fsidi.2020.300983,3043385148,,0,000-306-680-140-21X; 000-616-206-600-091; 002-396-286-701-554; 003-386-036-604-847; 004-244-613-184-161; 005-583-670-835-138; 007-040-888-672-003; 007-692-957-904-44X; 010-325-503-542-986; 010-456-752-342-66X; 010-747-424-176-877; 011-291-694-500-933; 012-412-270-035-761; 012-831-587-733-644; 013-209-141-298-955; 015-081-428-851-896; 015-350-463-259-41X; 015-717-506-603-742; 022-360-797-551-835; 022-525-316-440-329; 024-361-797-531-399; 026-290-088-195-051; 027-325-543-720-123; 028-364-359-341-316; 030-393-291-334-527; 030-771-390-917-109; 031-691-974-382-167; 031-858-957-893-83X; 038-345-815-717-313; 039-343-260-416-687; 040-802-087-826-847; 044-914-554-944-765; 045-226-923-439-105; 046-818-423-729-611; 047-041-514-008-293; 049-846-693-001-150; 050-312-325-568-750; 050-417-241-606-669; 051-204-718-024-656; 054-417-000-110-430; 055-101-648-072-719; 059-149-073-001-124; 063-116-795-629-582; 063-504-721-532-205; 065-544-349-079-991; 067-913-828-134-760; 069-847-568-544-420; 070-845-448-634-612; 072-715-374-019-55X; 073-233-361-714-785; 074-378-248-247-330; 075-009-191-029-203; 077-218-726-181-521; 084-651-759-924-070; 087-814-787-159-954; 088-181-508-364-285; 088-467-907-853-194; 089-547-267-411-182; 090-717-555-125-134; 091-492-177-865-216; 093-581-897-523-764; 102-096-005-133-302; 102-514-431-944-641; 102-561-386-891-641; 104-397-600-240-163; 104-629-870-444-377; 104-740-736-079-677; 110-214-841-105-125; 116-388-085-562-969; 119-070-738-216-289; 122-039-039-409-279; 122-912-050-557-786; 130-547-183-065-459; 134-035-857-506-713; 136-294-397-714-798; 138-845-490-726-989; 143-793-077-455-213; 143-797-155-020-230; 145-074-262-530-66X; 148-763-794-558-420; 151-372-268-187-893; 155-074-178-700-550; 173-031-985-087-572; 179-834-398-565-338; 180-088-494-514-913; 184-897-235-429-285,9,false,,
056-882-554-610-740,Is Dating Behavior in Digital Contexts Driven by Evolutionary Programs? A Selective Review.,2022-02-28,2022,journal article,Frontiers in psychology,16641078,Frontiers Media S.A.,Switzerland,Jorge Ponseti; Katharina Diehl; Aglaja Valentina Stirn,"In recent years, millions of citizens all over the world have used digital dating services. It remains unknown to what extent human sexuality will be changed by this. Based on an evolutionary psychological perspective, we assume that sexual selection shaped behavioural tendencies in men and women that are designed to increase the reproductive fitness. These tendencies are referred to as sexual strategies. Males and females sexual strategies differ according to sex-dimorphic reproductive investments. We assume that this inheritance will affect human sexuality also in a digital future. To evaluate this assumption, we conducted a selective review of studies on digital dating services. Based on sexual selection theory, we derived a number of hypotheses regarding how men and women will use digital dating services typically and how the use of digital dating services might affect sexual wellbeing. Out of an initial data set of 2,568 records, we finally reviewed a set of 13 studies. These studies provided support for the notion that men and women act in the digital dating area according to sex-typical strategies. However, sometimes the circumstances of digital dating affect communication flow, e.g., in that men are even more active in establishing contacts than they are in real world conditions. Overall, women appear to accomplish their sexual goals in digital dating arenas more than men do given a surplus of male demand. Our results suggest that future human sexuality will be impacted by an interaction of both: sex-dimorphic ancient sexual strategies and new technologies.",13,,678439,,Human sexuality; Affect (linguistics); Set (abstract data type); Psychology; Sexual dimorphism; Evolutionary psychology; Perspective (graphical); Social psychology; Developmental psychology,dating apps; dating platforms; digital sexual services; evolutionary psychology; sexual selection; sexual strategies,,,,,http://dx.doi.org/10.3389/fpsyg.2022.678439,35295383,10.3389/fpsyg.2022.678439,,PMC8919078,0,001-593-609-544-706; 004-208-972-538-517; 008-303-258-906-723; 009-500-151-954-740; 011-997-658-859-425; 012-043-881-342-567; 013-196-801-274-968; 014-447-330-227-910; 014-784-461-706-038; 016-343-565-485-304; 018-339-500-089-686; 025-825-524-768-146; 025-903-854-328-419; 029-931-577-182-637; 030-852-379-769-39X; 032-331-343-181-729; 033-526-417-013-282; 034-277-050-657-47X; 034-854-289-620-879; 035-290-324-645-55X; 038-770-644-673-99X; 040-800-309-929-667; 045-918-304-183-179; 056-107-869-543-418; 057-658-379-469-849; 062-081-690-822-868; 062-377-727-120-644; 062-929-509-099-042; 065-010-405-236-060; 069-552-634-797-138; 072-527-774-955-090; 078-132-724-641-757; 080-521-242-111-914; 080-697-202-859-61X; 083-477-902-437-658; 087-534-577-713-121; 092-650-592-332-764; 102-516-986-153-156; 104-447-654-068-832; 115-724-741-231-695; 117-332-650-004-34X; 132-179-837-423-881; 133-287-637-946-412; 139-598-111-309-458; 144-832-038-735-218; 176-599-516-084-679,0,true,cc-by,gold
056-887-194-738-347,Analytical Comparison of REFS and XFS File Systems,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Kanamarlapudi Venkatalakshmi Bhargavi; Aishvarya Narayanan Nair,,,,,,ReFS; Computer science; Computational science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.07,http://dx.doi.org/10.46293/4n6/2020.02.04.07,,10.46293/4n6/2020.02.04.07,3097507471,,0,,0,false,,
057-366-982-589-875,Reliability assessment of digital forensic investigations in the Norwegian police,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Radina Stoykova; Stig Andersen; Katrin Franke; Stefan Axelsson,"This case study presents a qualitative assessment of the reliability of digital forensic investigation in criminal cases in Norway. A reliability validation methodology based on international digital forensic standards was designed to assess to what extent those standards are implemented and followed by law enforcement in their casework. 124 reports related to the acquisition, examination, and analysis of three types of digital data sources - computers, mobile phones, and storage devices were examined. The reports were extracted from the criminal case management system used by the police and prosecution services. The reports were examined on technology, method, and application level in order to assess the reliability of digital evidence for criminal proceedings. The study found that digital forensic investigation in 21 randomly sampled criminal cases in Norway were insufficiently documented to assess the reliability of the digital evidence. It was not possible to trace the digital forensic actions performed on each item or link the digital evidence to its source. None of the cases were shown to comply with digital forensic methodology, justify the methods and tools used, or validate tool results and error rates. • Digital forensic investigation in 21 randomly sampled criminal cases in Norway were insufficiently documented to assess the reliability of the digital evidence. • It was not possible to trace the digital forensic actions performed on each item or link the digital evidence to its source. • None of the cases were shown to comply with digital forensic methodology, justify the methods and tools used, or validate tool results.",40,,301351,301351,Digital evidence; Digital forensics; Reliability (semiconductor); Forensic science; Criminal investigation; Law enforcement; Computer science; Computer forensics; Computer security; Data science,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301351,,10.1016/j.fsidi.2022.301351,,,0,004-441-167-148-170; 009-512-003-529-193; 017-779-541-978-693; 017-840-378-634-021; 026-774-296-742-022; 041-061-538-346-924; 054-004-313-233-495; 056-307-204-167-258; 061-269-967-405-492; 075-950-021-558-098; 083-748-342-549-230; 088-502-605-341-215; 111-488-239-742-003,1,true,,hybrid
057-630-673-457-131,A Scaling Robust Copy-Paste Tampering Detection for Digital Image Forensics,,2016,journal article,Procedia Computer Science,18770509,Elsevier BV,,Anil Dada Warbhe; Rajiv V. Dharaskar; Vilas M. Thakare,"Abstract It is crucial in image forensics to prove the authenticity of the digital images. Due to the availability of the using sophisticated image editing software programs, anyone can manipulate the images easily. There are various types of digital image manipulation or tampering possible; like image compositing, splicing, copy-paste, etc. In this paper, we propose a passive scaling robust algorithm for the detection of Copy-Paste tampering. Sometimes the copied region of an image is scaled before pasting to some other location in the image. In such cases, the normal Copy-Paste detection algorithm fails to detect the forgeries. We have implemented and used an improved customized Normalized Cross Correlation for detecting highly correlated areas from the image and the image blocks, thereby detecting the tampered regions from an image. The experimental results demonstrate that the proposed approach can be effectively used to detect copy-paste forgeries accurately and is scaling robust.",79,,458,465,Digital image processing; Image restoration; Feature detection (computer vision); Compositing; Artificial intelligence; Image warping; Binary image; Computer vision; Computer science; Digital image; Image processing,,,,,http://www.sciencedirect.com/science/article/pii/S1877050916001903 https://core.ac.uk/display/82364984 https://www.sciencedirect.com/science/article/pii/S1877050916001903 https://www.mendeley.com/catalogue/796d1fc0-2d74-3738-ae03-c995f66eafe9/ https://core.ac.uk/download/pdf/82364984.pdf,http://dx.doi.org/10.1016/j.procs.2016.03.059,,10.1016/j.procs.2016.03.059,2314313970,,0,007-593-872-409-964; 018-037-484-424-937; 018-714-912-826-875; 019-461-243-164-715; 024-225-405-455-512; 028-462-269-708-347; 029-322-330-771-081; 033-295-070-837-251; 034-121-155-020-714; 037-103-332-118-06X; 037-464-485-150-339; 038-937-237-659-201; 039-055-556-012-538; 040-499-338-725-508; 045-327-928-509-160; 045-496-560-764-477; 062-007-949-183-546; 063-891-549-168-52X; 065-037-301-489-012; 065-369-773-065-673; 065-873-523-989-876; 075-228-376-439-786; 076-346-829-732-533; 076-704-896-134-67X; 080-794-266-877-942; 086-832-985-542-578; 089-363-854-574-422; 090-691-753-970-360; 092-092-246-517-236; 097-461-557-468-286; 102-816-097-773-341; 124-874-123-332-712; 131-740-474-802-798; 132-355-978-858-838; 161-589-884-103-104; 172-264-312-197-129; 173-881-114-277-726,11,true,,gold
057-810-697-639-827,Analisis Digital Forensik pada File Steganography (Studi kasus : Peredaran Narkoba),2017-04-08,2017,journal article,Jurnal Teknik Informatika dan Sistem Informasi,24432229; 24432210,Maranatha Christian University,,Agung Purnama Saputra; Nur Widiyasono,"Kemajuan teknologi selain membawa dampak positif juga membawa dampak negatif, beberapa contoh organized crime termasuk aktivitas yang mengarah pada terorisme dan perdagangan ilegal seperti narkotika, telah teridentifikasi memanfaatkan teknik steganography untuk berkomunikasi dan menyampaikan pesan-pesan diantara kelompoknya. Steganografi merupakan seni dan ilmu menulis atau menyembunyikan pesan tersembunyi dengan cara tertentu sehingga selain si pengirim dan si penerima, tidak ada seorang pun yang mengetahui atau menyadari bahwa ada suatu pesan rahasia. maka peran digital forensik sebagai metode pembuktian suatu kasus kejahatan secara digital menjadi sangat penting, Digital forensik adalah penggunaan teknik analisis dan investigasi untuk mengidentifikasi, mengumpulkan, memeriksa dan menyimpan bukti/informasi yang secara magnetis tersimpan/disandikan pada komputer atau media penyimpanan digital sebagai alat bukti dalam mengungkap kasus kejahatan yang dapat dipertanggungjawabkan secara hukum. Maksud dan tujuan dari penulisan tugas akhir ini adalah untuk menjelaskan cara menemukan bukti digital yang tersembunyi menggunkan teknik steganografi, sehingga informasi yang diperoleh merupakan sebuah fakta yang akurat sesuai peruntukannya. Terdapat banyak tools yang dapat digunakan dalam kasus forensik untuk memeriksabarang bukti, namun dalam penelitian ini tools yang digunakan adalah WinHex dan InvisibleSecrets.",3,1,140628,,,,,,,https://www.neliti.com/publications/140628/analisis-digital-forensik-pada-file-steganography-studi-kasus-peredaran-narkoba https://media.neliti.com/media/publications/140628-ID-analisis-digital-forensik-pada-file-steg.pdf,http://dx.doi.org/10.28932/jutisi.v3i1.594,,10.28932/jutisi.v3i1.594,2625911286,,0,,1,true,,
057-814-822-953-013,Document Clustering in Forensic Investigation by Hybrid Approach,2014-04-18,2014,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,G. Thilagavathi; J. Anitha,"Digital Forensic Investigation is the branch of scientific forensic process for investigation of material found in digital devices related to computer crimes. Digital evidence analogous to particular incident is any digital data that provides hypothesis about incident. The essential part of Digital forensic Process is to analyze the documents present on suspect‟s computer. Due to increasing count of documents and larger size of storage devices makes very difficult to analyze the documents on computer. To overcome these problems, a subject based semantic document clustering algorithm along with bisecting-kmeans has been proposed that allows the examiner to analyze and cluster the documents based on particular subject and also the terms that does not belong to any subject. The accuracy of clustering of documents has been improved by means of this hybrid approach.",91,3,14,19,Data mining; Forensic science; Document clustering; Digital forensic process; Subject (documents); Suspect; Digital evidence; Digital forensic investigation; Computer science; Process (engineering); Cluster analysis,,,,,https://research.ijcaonline.org/volume91/number3/pxc3894784.pdf https://www.ijcaonline.org/archives/volume91/number3/15860-4784 http://ui.adsabs.harvard.edu/abs/2014IJCA...91c..14T/abstract,http://dx.doi.org/10.5120/15860-4784,,10.5120/15860-4784,2099207896,,0,006-169-257-799-439; 021-572-735-190-382; 025-484-182-808-044; 052-814-620-196-112; 063-976-673-171-817; 065-901-777-764-939; 074-249-424-367-729; 080-826-345-483-814; 095-274-059-975-043; 106-849-681-739-149; 120-695-214-222-114; 166-429-669-625-531; 168-493-303-499-04X; 176-271-242-066-828; 184-948-841-629-735,5,true,,green
058-200-891-793-092,Reviewing the Existing Methodologies and Tools of Cloud Forensics: Challenges and Solutions,,2020,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Khalid A Alattas; Magdy Bayoumi,,9,4,147,154,Data science; Cloud forensics; Computer science; Wireless,,,,,http://sdiwc.net/digital-library/reviewing-the-existing-methodologies-and-tools-of-cloud-forensics-challenges-and-solutions,http://dx.doi.org/10.17781/p002677,,10.17781/p002677,3148395164,,0,039-189-453-189-406,0,false,,
058-329-964-903-756,Forensic authentication method for audio recordings generated by Voice Recorder application on Samsung Galaxy Watch4 series.,2022-10-22,2022,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Nam In Park; Seong Ho Lim; Jun Seok Byun; Jin-Hwan Kim; Ji Woo Lee; Chanjun Chun; Yonggang Kim; Oc-Yeub Jeon,"The number of smartwatch users has been rapidly increasing in recent years. A smartwatch is a wearable device that collects various types of data using sensors and provides basic functions, such as healthcare-related measurements and audio recording. In this study, we proposed the forensic authentication method for audio recordings from the Voice Recording application in the Samsung Galaxy Watch4 series. First, a total of 240 audio recordings from each of the four different models, paired with four different smartphones for synchronization via Bluetooth, were collected and verified. To analyze the characteristics of smartwatch audio recordings, we examined the transition of the audio latency, writable audio bandwidth, timestamps, and file structure between those generated in the smartwatches and those edited using the Voice Recording application of the paired smartphones. In addition, the devices with the audio recordings were examined via the Android Debug Bridge (ADB) tool and compared with the timestamps stored in the file system. The experimental results showed that the audio latency, writable audio bandwidth, and file structure of audio recordings generated by smartwatches differed from those generated by smartphones. Additionally, by analyzing the file structure, audio recordings can be classified as unmanipulated, manipulation has been attempted, or manipulated. Finally, we can forensically authenticate the audio recordings generated by the Voice Recorder application in the Samsung Galaxy Watch4 series by accessing the smartwatches and analyzing the timestamps related to the audio recordings in the file system.",,,,,,Galaxy Watch4; M4A; Voice Recorder application; audio forensics; audio forgery detection; audio latency; forensic authentication method; metadata,,,"Ministry of Interior and Safety, Republic of Korea (NFS2022DTB03); Ministry of Interior and Safety, Republic of Korea (NFS2022DTB04)",,http://dx.doi.org/10.1111/1556-4029.15158,36273272,10.1111/1556-4029.15158,,,0,001-458-381-243-357; 006-794-410-339-126; 022-068-312-435-53X; 043-261-465-467-889; 046-034-142-979-678; 051-558-525-539-694; 138-870-891-535-969,0,false,,
058-658-217-563-45X,Twentieth Annual DFRWS Conference,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Alex Nelson,,33,,301028,,,,,,,https://doi.org/10.1016/j.fsidi.2020.301028 https://api.elsevier.com/content/article/PII:S2666281720303115?httpAccept=text/xml http://dblp.uni-trier.de/db/journals/di/di33S.html#Nelson20a,http://dx.doi.org/10.1016/j.fsidi.2020.301028,,10.1016/j.fsidi.2020.301028,3091173488,,0,,0,true,,bronze
058-673-328-503-201,Research summary: The effects of switching the camera module from BlackBerry Curve 9360 devices,,2013,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Floris Gisolf; Zeno Geradts; Dennie Verhoeven; Coert Klaver,,10,1,56,61,Camera resectioning; Computer graphics (images); Camera phone; Artificial intelligence; Smart camera; Camera interface; Stereo camera; Digital camera; Computer vision; Computer science; Camera module; Camera auto-calibration,,,,,https://doi.org/10.1016/j.diin.2013.01.007 https://dblp.uni-trier.de/db/journals/di/di10.html#GisolfGVK13 https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F07cd177c-b0b3-4a3d-8fdf-7dcc5d7bdbf4 https://dare.uva.nl/personal/search?identifier=07cd177c-b0b3-4a3d-8fdf-7dcc5d7bdbf4 http://dblp.uni-trier.de/db/journals/di/di10.html#GisolfGVK13 https://core.ac.uk/display/132739753 https://www.sciencedirect.com/science/article/pii/S174228761300008X,http://dx.doi.org/10.1016/j.diin.2013.01.007,,10.1016/j.diin.2013.01.007,2023044347,,0,000-480-947-961-716; 003-009-062-014-855; 013-766-124-774-712; 045-226-923-439-105; 069-184-474-173-724; 077-828-134-917-257; 083-097-133-928-799; 160-685-922-453-820; 164-717-721-813-673; 179-834-398-565-338; 180-088-494-514-913; 184-897-235-429-285,2,false,,
058-829-172-935-902,A preliminary assessment of latent fingerprint evidence damage on mobile device screens caused by digital forensic extractions,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Graeme Horsman; Helen Page; Peter Beveridge,"Abstract Mobile devices continue to feature heavily in criminal investigations and often bear multiple forms of potentially relevant evidence. In the context of identifying the owner of a device, both latent fingerprints and resident digital data may be crucial to investigations, yet each individual process may have a detrimental impact on the other. Fingerprint development techniques are known to impact device hardware, whilst digital extraction processes can destroy latent prints. This article examines the impact of mobile device extraction procedures on resident screen fingerprints. The impact of bare fingered, cotton gloved, latex gloved and stylus screen press and swipes on latent print destruction are examined. Results indicate that all forms of interaction cause print damage, but to a variable extent. Provisional device handling recommendations are offered.",27,,47,56,Human–computer interaction; Criminal investigation; Stylus; Mobile device; Fingerprint (computing); Context (language use); Latent fingerprint; Multiple forms; Computer science; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/di/di27.html#HorsmanPB18 https://research.tees.ac.uk/ws/files/6504500/FP_Article_V_0.1_HP_comments_and_additions_2_.pdf https://www.sciencedirect.com/science/article/pii/S174228761830166X https://research.tees.ac.uk/en/publications/a-preliminary-assessment-of-latent-fingerprint-evidence-damage-on https://core.ac.uk/download/pdf/196169309.pdf,http://dx.doi.org/10.1016/j.diin.2018.10.002,,10.1016/j.diin.2018.10.002,2896336471,,0,002-589-008-193-992; 003-519-880-943-664; 019-831-293-743-518; 032-451-540-235-796; 047-997-437-748-154; 061-733-902-008-548; 079-273-634-331-435; 086-127-900-681-736; 108-365-031-739-392; 115-605-205-562-974; 120-697-354-224-33X; 163-330-758-807-944; 173-779-991-377-816,1,true,cc-by-nc-nd,green
059-002-926-336-692,Challenges in applying the ACPO principles in cloud forensic investigations,2012-03-31,2012,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Harjinder Singh Lallie,"The numerous advantages offered by cloud computing has fuelled its growth and has made it one of the most significant of current computing trends. The same advantages have created complex issues for those conducting digital forensic investigations. Digital forensic investigators rely on the ACPO guidelines when conducting an investigation, however the guidelines make no reference to some of the issues presented by cloud investigations. This study investigates the impact of cloud computing on ACPO’s core principles and asks whether there is a need for the principles and guidelines to be reviewed to address the issues presented by cloud computing. Empirical research is conducted and data collected from key experts in the field of digital forensics. This research presents several key findings: there is a very real concern for how cloud computing will affect digital forensic investigations; the ACPO principles cannot easily be applied in all cloud investigations but are generally sufficient for cloud computing forensic investigations. However the advent of cloud computing is a significant development in technology and may in the near future warrant a review of the guidelines in particular to incorporate the involvement of third parties in cloud investigations.",7,1,71,86,Empirical research; Key (cryptography); Data science; No reference; Field (computer science); Computer security; Computer science; Cloud computing; Digital forensics,,,,,https://doaj.org/article/5090d506c02945faa7e69e3f3b1b14ea https://doi.org/10.15394/jdfsl.2012.1113,https://doaj.org/article/5090d506c02945faa7e69e3f3b1b14ea,,,1631307534,,0,,6,true,cc-by-nc,gold
059-098-460-373-81X,APAC2022-Print-Ad-Hybrid-Web (3),,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,42,,301424,301424,Computer science; World Wide Web,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00105-6,,10.1016/s2666-2817(22)00105-6,,,0,,0,false,,
059-259-578-782-71X,Digital Forensics through Application Behavior Analysis,2016-06-08,2016,journal article,International Journal of Modern Education and Computer Science,20750161; 2075017x,MECS Publisher,,Shuaibur Rahman; M. A. Khan,"The field of digital forensic analysis has emerged in the past two decades to counter the digital crimes and investigate the modus operandi of the culprits to secure the computer systems. With the advances in technologies and pervasive nature of the computing devices, the digital forensic analysis is becoming a challenging task. Due to ease of digital equipment and popularity of Internet, criminals have been enticed to carry out digital crimes. Digital forensic is aimed to investigate the criminal activity and bring the culprits to justice. Traditionally the static analysis is used to investigate about an incident but due to a lot of issues related the accuracy and authenticity of the static analysis, the live digital forensic analysis shows an investigator a more complete picture of memory dump. In this paper, we introduce a module for profiling behavior of application programs. Profiling of application is helpful in forensic analysis as one can easily analyze the compromised system. Profiling is also helpful to the investigator in conducting malware analysis as well as debugging a system. The concept of our model is to trace the unique process name, loaded services and called modules of the target system and store it in a database for future forensic and malware analysis. We used VMware workstation version 9.0 on Windows 7 platform so that we can get the detailed and clean image of the current state of the system. The profile of the target application includes the process name, modules and services which are specific to an application program.",8,6,50,56,The Internet; Profiling (information science); Debugging; Malware analysis; Computer security; Computer science; State (computer science); Core dump; Digital forensics; Static analysis,,,,,http://www.mecs-press.org/ijmecs/ijmecs-v8-n6/IJMECS-V8-N6-7.pdf http://www.mecs-press.org/ijmecs/ijmecs-v8-n6/v8n6-7.html,http://dx.doi.org/10.5815/ijmecs.2016.06.07,,10.5815/ijmecs.2016.06.07,2475018646,,0,004-901-338-563-34X; 009-662-897-370-073; 009-750-732-270-162; 009-921-402-381-197; 014-068-011-589-367; 015-716-156-761-980; 017-071-408-718-290; 021-154-782-910-440; 021-917-398-361-902; 026-766-854-469-439; 035-269-627-388-435; 037-483-791-552-006; 040-483-292-320-671; 042-251-875-510-426; 042-977-612-584-987; 050-972-167-651-471; 051-503-387-938-284; 053-514-707-122-724; 054-507-171-824-189; 055-276-197-513-371; 058-308-781-214-808; 059-382-595-317-362; 064-915-221-771-392; 067-675-478-830-924; 070-417-028-826-684; 072-331-380-933-265; 073-717-900-354-928; 074-280-954-610-349; 086-491-087-364-017; 087-690-831-820-163; 093-448-702-012-591; 096-993-850-376-090; 100-498-406-037-927; 100-910-933-877-743; 106-832-935-724-238; 120-462-880-448-150; 120-753-186-411-42X; 121-234-261-402-315; 124-236-800-957-968; 147-707-428-925-566; 167-218-963-646-727; 198-979-419-447-995,3,true,,gold
059-294-756-490-060,BitScout: Remote Digital Forensics Toolkit,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Himani Rawat,"Forensic Science has been full of challenges for most of the Law Enforcement Agency (LEA) as we need to physically visit the crime scene, acquire evidence, then preserve it for forensic analysis. The path of collecting evidences from crime site and then bringing it to the Forensic Labs. becomes much cumbersome as the evidence may be corrupted or altered during transit. So why not to adopt a system for readily analysis of a compromised system without going to the crime site and sitting on one’s chair or forensic workstation?; The answer may be yes, we can but will it be easy and ethical to acquire evidence from a system remotely without visiting the crime scene physically. Vitaly Kamluk from Kaspersky Labs made this possible now by launching a new forensic tool called BitScout . To solve this problem, security researchers and Forensic Investigator can now use BitScout to collect remotely, key forensic evidences, to acquire full disk images via the network or locally attached storage devices, or simply to assist in malware incident handling. Evidence data can be viewed and analysed remotely or locally while the source data storage remains intact through reliable container-based isolation. BitScout is an open-source and free tool developed by security researchers for all people interested in digital forensics and cyber crimes investigations.",,,22,23,Computer science; Multimedia; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.03,http://dx.doi.org/10.46293/4n6/2020.02.02.03,,10.46293/4n6/2020.02.02.03,3022406620,,0,,0,false,,
059-316-462-802-051,Smart Digital Forensic Framework for Crime Analysis and Prediction using AutoML,,2021,journal article,International Journal of Advanced Computer Science and Applications,21565570; 2158107x,The Science and Information Organization,,Sajith A Johnson; S Ananthakumaran,"Over the most recent couple of years, the greater part of the information, for example books, recordings, pictures, clinical, forensic, criminal and even the hereditary data of people are being pushed toward digitals and cyber-dataspaces. This problem requires sophisticated techniques to deal with the vast amounts of data. We propose a novel solution to the problem of gaining actionable intelligence from the voluminous existing and potential digital forensic data. We have formulated an Automated Learning Framework ontology for Digital Forensic Applications relating to collaborative crime analysis and prediction. The minimum viable ontology we formulated by studying the existing literature and applications of Machine learning has been used to devise an Automated Machine Learning implementation to be quantitatively and qualitatively studied in its capabilities to aid intelligence practices of Digital Forensic Investigation agencies in representing, reasoning and forming actionable insights from the vast and varied collected real world data. A testing implementation of the framework is made to assess performance of our proposed generalized Smart Forensic Framework for Digital Forensics applications by comparison with existing solutions on quantitative and qualitative metrics and assessments. We will use the insights and performance metrics derived from our research to motivate forensic intelligence agencies to exploit the features and capabilities provided by AutoML Smart Forensic Framework applications.",12,3,,,Exploit; Ontology (information science); Data science; Crime analysis; Automated learning; Forensic intelligence; Digital forensic investigation; Real world data; Computer science; Digital forensics,,,,,https://thesai.org/Publications/ViewPaper?Volume=12&Issue=3&Code=IJACSA&SerialNo=49 https://thesai.org/Downloads/Volume12No3/Paper_49-Smart_Digital_Forensic_Framework.pdf,http://dx.doi.org/10.14569/ijacsa.2021.0120349,,10.14569/ijacsa.2021.0120349,3143085218,,0,,1,true,cc-by,gold
059-397-656-514-952,Quantitative evaluation of the results of digital forensic investigations: a review of progress.,2021-02-08,2021,journal article,Forensic sciences research,24711411; 20961790,Informa UK Limited,England,Richard E. Overill; Jan Collie,"Unlike conventional forensics, digital forensics does not at present generally quantify the results of its investigations. It is suggested that digital forensics should aim to catch up with other f...",6,1,13,18,Data science; Bayesian network; Computer science; Information theory; Digital forensics,Bayesian networks; Forensic sciences; complexity theory; digital forensic metrics; information theory; measures of plausibility; probability theory; statistical theory,,,,http://oro.open.ac.uk/75314/ https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8112825/ https://europepmc.org/article/PMC/PMC8112825 https://doaj.org/article/036a718d1882483896312c0a40ef8b39 https://www.tandfonline.com/doi/full/10.1080/20961790.2020.1837429,http://dx.doi.org/10.1080/20961790.2020.1837429,34007512,10.1080/20961790.2020.1837429,3126160358,PMC8112825,0,000-578-002-989-782; 001-755-455-053-419; 002-657-433-027-989; 005-859-821-142-158; 007-210-880-162-593; 007-832-595-971-443; 008-362-883-971-90X; 009-725-146-094-077; 010-408-812-989-291; 023-051-490-797-571; 030-763-851-934-420; 035-787-138-433-311; 045-439-795-806-132; 048-029-723-086-698; 055-167-931-095-336; 061-269-967-405-492; 063-088-664-524-670; 064-988-327-019-067; 068-045-694-782-701; 072-475-343-868-508; 074-325-698-839-633; 089-477-367-447-018; 101-550-862-215-24X; 106-964-315-836-68X; 110-744-808-081-983; 111-263-791-310-020; 111-471-986-310-852; 129-255-411-519-417; 142-855-067-627-071; 148-306-588-835-497; 151-157-528-819-921; 166-329-182-326-355; 176-279-989-411-85X; 191-131-191-175-686,2,true,"CC BY, CC BY-NC",gold
059-541-479-175-841,An Automatic Digital Audio Authentication/Forensics System,,2017,journal article,IEEE Access,21693536,Institute of Electrical and Electronics Engineers (IEEE),United States,Zulfiqar Ali; Muhammad Imran; Mansour Alsulaiman,"With the continuous rise in ingenious forgery, a wide range of digital audio authentication applications are emerging as a preventive and detective control in real-world circumstances, such as forged evidence, breach of copyright protection, and unauthorized data access. To investigate and verify, this paper presents a novel automatic authentication system that differentiates between the forged and original audio. The design philosophy of the proposed system is primarily based on three psychoacoustic principles of hearing, which are implemented to simulate the human sound perception system. Moreover, the proposed system is able to classify between the audio of different environments recorded with the same microphone. To authenticate the audio and environment classification, the computed features based on the psychoacoustic principles of hearing are dangled to the Gaussian mixture model to make automatic decisions. It is worth mentioning that the proposed system authenticates an unknown speaker irrespective of the audio content i.e., independent of narrator and text. To evaluate the performance of the proposed system, audios in multi-environments are forged in such a way that a human cannot recognize them. Subjective evaluation by three human evaluators is performed to verify the quality of the generated forged audio. The proposed system provides a classification accuracy of 99.2% ± 2.6. Furthermore, the obtained accuracy for the other scenarios, such as text-dependent and text-independent audio authentication, is 100% by using the proposed system.",5,,2994,3007,Authentication; Auditory system; Microphone; Audio forensics; Speech recognition; Sound perception; Computer science; Digital audio; Psychoacoustics,,,,"Deanship of Scientific Research, King Saud University, Riyadh, Saudi Arabia, under the Research Group",https://dblp.uni-trier.de/db/journals/access/access5.html#AliIA17 https://pure.ulster.ac.uk/en/publications/an-automatic-digital-audio-authenticationforensics-system https://doi.org/10.1109/ACCESS.2017.2672681 https://ieeexplore.ieee.org/abstract/document/7864411 http://repository.essex.ac.uk/27231/ https://ulster-staging.pure.elsevier.com/en/publications/an-automatic-digital-audio-authenticationforensics-system https://pure.ulster.ac.uk/ws/files/71153352/audio_authen_IEEE_Access.pdf http://ieeexplore.ieee.org/document/7864411/ https://core.ac.uk/download/287023576.pdf,http://dx.doi.org/10.1109/access.2017.2672681,,10.1109/access.2017.2672681,2591157802,,0,000-780-924-227-038; 002-890-793-739-219; 008-757-979-445-679; 011-451-536-949-292; 011-907-186-505-503; 015-613-308-645-582; 021-712-692-138-702; 023-420-292-710-552; 025-299-900-166-361; 033-225-389-686-623; 035-492-160-906-551; 036-335-162-732-070; 049-209-305-832-496; 057-673-642-771-371; 058-633-974-913-727; 060-643-003-548-166; 061-591-578-204-385; 073-911-854-128-151; 074-017-562-218-104; 074-506-965-829-791; 077-652-355-257-145; 080-872-836-176-779; 087-700-976-402-858; 092-488-100-046-102; 092-522-060-753-940; 114-599-315-973-390; 119-587-371-187-398; 138-031-180-838-106; 151-075-769-432-235; 163-973-756-079-575; 187-902-973-366-522,15,true,"CC BY, CC BY-NC-ND",gold
059-609-113-377-949,Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Noora Al Mutawa; Joanne Bryce; Virginia N. L. Franqueira; Andrew Marrington,"Behavioural Evidence Analysis (BEA) is, in theory, useful in developing an understanding of the offender, the victim, the crime scene, and the dynamics of the crime. It can add meaning to the evidence obtained through digital forensic techniques and assist investigators with reconstruction of a crime. There is, however, little empirical research examining the application of BEA to actual criminal cases, particularly cyberstalking cases. This study addresses this gap by examining the utility of BEA for such cases in terms of understanding the behavioural and motivational dimensions of offending, and the way in which digital evidence can be interpreted. It reports on the forensic analysis of 20 cyberstalking cases investigated by Dubai Police in the last five years. Results showed that BEA helps to focus an investigation, enables better understanding and interpretation of victim and offender behaviour, and assists in inferring traits of the offender from available digital evidence. These benefits can help investigators to build a stronger case, reduce time wasted to mistakes, and to exclude suspects wrongly accused in cyberstalking cases.",16,16,S96,S103,Empirical research; Forensic science; Crime scene; Cyberstalking; Digital evidence; Computer security; Computer science; Interpretation (philosophy); Meaning (linguistics); Criminology; Digital forensics,,,,,https://www.infona.pl/resource/bwmeta1.element.elsevier-796b80b4-b548-3256-90c3-0614e1e6b193 https://www.sciencedirect.com/science/article/pii/S1742287616300068 https://cyberleninka.org/article/n/587101.pdf https://cyberleninka.org/article/n/587101 https://dl.acm.org/doi/10.1016/j.diin.2016.01.012 https://derby.openrepository.com/handle/10545/608462 http://www.sciencedirect.com/science/article/pii/S1742287616300068 https://dl.acm.org/citation.cfm?id=2910145 https://core.ac.uk/display/42138486 http://clok.uclan.ac.uk/14089/ https://core.ac.uk/download/42138486.pdf,http://dx.doi.org/10.1016/j.diin.2016.01.012,,10.1016/j.diin.2016.01.012,2329693662,,0,005-578-292-466-235; 009-625-838-012-548; 011-207-484-659-618; 019-645-930-990-548; 024-890-178-947-591; 036-269-075-303-806; 037-550-015-414-716; 039-097-172-195-326; 049-488-209-182-213; 060-822-607-399-070; 072-811-052-394-365; 073-624-718-302-07X; 090-152-464-314-890; 097-039-638-472-515; 104-401-234-970-738; 106-997-065-291-365; 120-664-015-054-54X; 121-601-580-498-491; 140-730-540-277-926; 145-062-913-009-934; 159-823-071-020-847; 160-976-357-855-420; 164-534-073-076-975; 167-652-916-391-487,15,true,cc-by-nc-nd,hybrid
059-651-348-807-199,Digital media investigators: challenges and opportunities in the use of digital forensics in police investigations in England and Wales,2021-05-07,2021,journal article,Policing: An International Journal,1363951x,Emerald,United Kingdom,Dana Wilson-Kovacs,"In-depth knowledge about specific national approaches to using digital evidence in investigations is scarce. A clearer insight into the organisational barriers and professional challenges experienced, alongside a more detailed picture of how digital evidence can help police investigations are required to empirically substantiate claims about how digital technologies are changing the face of criminal investigations. The paper aims to focus on the introduction of digital media investigators to support investigating officers with the collection and interpretation of digital evidence.,Drawing on ethnographic and interview data collected as part of an Economic and Social Research Council-funded project on the application of digital forensics expertise in policing in England and Wales, this paper examines the changing face of investigations in relation to escalating digital demand.,The analysis presents the national and regional organisational parameters of deploying digital expertise in criminal investigation and examines some of the challenges of being a digital media investigator (DMI). Through testimonies from DMIs, digital forensic practitioners, investigating and senior officers and forensic managers, the analysis explores the organisational tensions in the collection, processing, interpretation and use of information from digital devices for evidential purposes.,The paper offers an empirical basis for the comparative study of how the DMI role has been implemented by law enforcement agencies and its fit within broader institutional considerations and processes.,The development of the DMI role has raised questions about the supply of digital expertise, especially to volume crime investigations, and tensions around occupational divisions between scientific and operational units.,The findings show that while the introduction of the DMI role was much needed, the development of this valuable provision within each force and the resources available require sustained and coordinated support to protect these professionals and retain their skills.,This study contributes to the growing sociological and criminological literature with an ethnographically based perspective into the organisational and occupational tensions in the identification and processing of digital evidence in England and Wales.",44,4,669,682,Criminal investigation; Digital media; Political science; Law enforcement; Digital evidence; Public relations; Social research; Organizational culture; Identification (information); Digital forensics,,,,,https://ore.exeter.ac.uk/repository/bitstream/10871/125904/4/Wilson-Kovacs%20March%202021%20DMI.pdf https://www.emerald.com/insight/content/doi/10.1108/PIJPSM-02-2021-0019/full/html https://ore.exeter.ac.uk/repository/handle/10871/125904,http://dx.doi.org/10.1108/pijpsm-02-2021-0019,,10.1108/pijpsm-02-2021-0019,3159541089,,0,004-200-813-216-207; 007-534-583-347-568; 009-285-002-570-736; 009-331-383-545-394; 009-512-003-529-193; 009-603-892-016-518; 009-737-876-320-900; 030-178-593-043-926; 031-614-539-275-181; 037-550-015-414-716; 059-355-319-008-527; 062-137-637-964-947; 069-830-580-589-946; 073-313-808-035-835; 074-706-219-689-754; 077-493-637-233-955; 083-769-333-117-658; 086-419-575-179-359; 113-225-815-651-029; 137-298-307-797-644; 142-790-196-752-819,4,true,,green
059-667-076-144-681,Libforensics For Developing Digital Forensics Applications,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,James Hebidzi Senanu,"The evolution of computers, increase in cybercrime and the demand by law requirements for the production of admissible forensic reports require the application of digital/computer technologies and require the development of a methodology to systematically search digital devices for significant evidence. Cyber and computer fraud are growing by the passing of the day with less than two percent of the reported cases resulting in confidence leading to securing justice and or convictions. This study explores the digital forensic applications and ease of integration of the existing forensic applications. It was the view of the researcher that there exists a gap of monolithic in forensic applications and the cyber universe. One requires different applications to conduct a forensic investigation into a crime revolving around different digital universes. The study proposed research into the development of a single enterprise digital forensic application capable of examining all aspects of the universe regardless and producing an admissible report in the court of law Keywords: Forensic, Cybercrime, Monolithic, Digital universe, Cyberspace, Cyber ecosystem BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: James Hebidzi Senanu (2022): Libforensics For Developing Digital Forensics Applications. Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 335-338 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P53",1,1,335,338,Digital forensics; Digital evidence; Computer forensics; Cybercrime; Nexus (standard); Cyberspace; Computer science; Computer security; Child pornography; Network forensics; Law enforcement; The Internet; World Wide Web; Law; Political science; Embedded system,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p53,,10.22624/aims/crp-bk3-p53,,,0,,0,true,,bronze
059-898-396-008-601,THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS,2020-05-18,2020,journal article,Criminalistics and Forensics,01302655,Kyiv Scientific Research Institute of Forensic Expertise,,M. Dumchykov,"The article deals with some aspects of digitalization of forensic activity, such as improving the efficiency of search and cognitive activity of an investigator using digital technologies, and effective organization of such activity. Use of computer hardware, software, various computer and digital technologies and scripting to investigate crimes. The definitions of “digital trace” and “virtual trace” demonstrate the complexity of these issues. Certain dynamic movement of criminal activity in the information environment is analyzed. Defines the concept of virtual trace as a specific trace of certain actions in the information space of computer devices and their network systems. In considering the definition of the concept of virtual trace, the views of scientists such as V.A. Meshcheriakov, V.V. Poliakov and Smushkin A.V.; ; The aspects of consideration of forensic digitization are identified, among which the main ones are:; ; – use of digital technologies to increase the effectiveness of search and cognitive activity of the investigator, effective organization of this activity at the present level, optimization of interaction of different bodies, institutions in the investigation of crimes.; ; – the use of information and communication technologies to investigate crimes.; ; – solving didactic tasks in the field of training, retraining, advanced training of investigators, criminal investigators, forensic experts, improvement of their qualification, exchange of experience.; ; The further question of the development of forensic science in the field of information society is investigated. It is determined in what form the information forensics will exist, namely:; ; A new section of classic forensics that focuses on working with digital and virtual footprints.; The new science of “digital or virtual forensics”.; 3. Independent forensic science within the framework of the general theory of forensic science, which integrates the development of virtual traces, the use of new technical means of finding, fixing, research, use in proving forensically relevant information, technologies that ensure the effectiveness of the investigator.",,65,100,108,Engineering; Data science; Digitization; Retrospective analysis,,,,,http://dx.doi.org/10.33994/kndise.2020.65.10,http://dx.doi.org/10.33994/kndise.2020.65.10,,10.33994/kndise.2020.65.10,3037841873,,0,,0,true,,gold
059-942-556-683-418,Digital Forensic Investigation of MongoDB,2014-02-28,2014,journal article,Journal of the Korea Institute of Information Security and Cryptology,15983986,Korea Institute of Information Security and Cryptology,,Jongseong Yoon; Doo-Won Jung; Chul-hoon Kang; Sangjin Lee,"As the data gets bigger recently, the demand for relational database management system (RDBMS) and NoSQL DBMS to process big data has been increased consistently. The digital forensic investigation method for RDBMS has been studied actively, but that for NoSQL DBMS, which is popularly used nowadays, has almost no research. This paper proposes the digital forensic investigation process and method for MongoDB, the most popularly used among NoSQL DBMS.",24,1,123,134,World Wide Web; Relational database management system; Database forensics; NoSQL; Digital forensic investigation; Computer science; Big data; Database; Digital forensics,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2014_v24n1_123,http://dx.doi.org/10.13089/jkiisc.2014.24.1.123,,10.13089/jkiisc.2014.24.1.123,2143602713,,0,001-619-124-305-400; 007-120-713-093-456; 031-612-703-045-160; 055-850-354-942-609; 063-229-337-814-634; 073-858-118-041-517; 125-519-560-533-563; 175-963-446-474-971,3,true,,bronze
060-043-515-260-052,Using Anisotropic Diffusion for Efficient Extraction of Sensor Noise in Camera Identification,2012-02-13,2012,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Wiger van Houten; Zeno Geradts,": Each digital camera has an intrinsic fingerprint that is unique to each camera. This device fingerprint can be extracted from an image and can be compared with a reference device fingerprint to determine the device origin. The complexity of the filters proposed to accomplish this is increasing. In this note, we use a relatively simple algorithm to extract the sensor noise from images. It has the advantages of being easy to implement and parallelize, and working faster than the wavelet filter that is common for this application. In addition, we compare the performance with a simple median filter and assess whether a previously proposed fingerprint enhancement technique improves results. Experiments are performed on approximately 7500 images originating from 69 cameras, and the results are compared with this often used wavelet filter. Despite the simplicity of the proposed method, the performance exceeds the common wavelet filter and reduces the time needed for the extraction.",57,2,521,527,Engineering; Noise; Artificial intelligence; Anisotropic diffusion; Fingerprint (computing); Digital camera; Device fingerprint; Computer vision; Median filter; Digital forensics; SIMPLE algorithm,,,,,https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1556-4029.2012.02057.x https://www.ncbi.nlm.nih.gov/pubmed/22329355 https://forensic.to/JOFS-10-234%20-%20AnisoDiff.pdf http://www.forensic.to/JOFS-10-234%20-%20AnisoDiff.pdf https://europepmc.org/article/MED/22329355,http://dx.doi.org/10.1111/j.1556-4029.2012.02057.x,22329355,10.1111/j.1556-4029.2012.02057.x,1928872245,,0,013-766-124-774-712; 014-079-494-188-077; 017-823-654-117-246; 030-109-545-148-361; 045-168-992-395-537; 046-392-586-979-126; 053-781-637-768-867; 075-086-734-221-525; 080-729-034-453-138; 122-486-087-773-74X; 160-685-922-453-820; 180-088-494-514-913; 184-897-235-429-285,25,true,,green
060-141-830-760-910,Hierarchical Context Network for Airborne Image Segmentation,,2022,journal article,IEEE Transactions on Geoscience and Remote Sensing,01962892; 15580644,Institute of Electrical and Electronics Engineers (IEEE),United States,Feng Zhou; Renlong Hang; Hui Shuai; Qingshan Liu,,60,,1,12,Image segmentation; Context (archaeology); Computer science; Computer vision; Artificial intelligence; Remote sensing; Segmentation; Image processing; Image (mathematics),,,,Natural Science Foundation of China; Natural Science Foundation of China; Natural Science Foundation of China; Postgraduate Research and Practice Innovation Program of Jiangsu Province,,http://dx.doi.org/10.1109/tgrs.2021.3133258,,10.1109/tgrs.2021.3133258,,,0,001-195-517-930-075; 002-649-617-859-886; 004-269-574-716-057; 005-238-000-402-424; 011-121-469-702-828; 011-308-268-259-559; 020-233-013-143-936; 020-467-290-581-389; 021-067-610-643-192; 029-455-747-035-038; 030-540-246-658-722; 032-061-389-376-815; 039-770-461-722-193; 041-314-165-476-904; 044-778-317-766-762; 045-598-685-349-282; 046-997-457-408-273; 048-039-376-300-619; 051-713-174-784-117; 053-094-537-530-97X; 061-150-022-812-525; 065-374-293-809-860; 071-239-631-876-341; 080-131-325-563-306; 086-350-567-454-813; 086-847-621-467-943; 087-020-003-931-56X; 092-180-026-045-134; 102-885-771-338-093; 109-482-146-821-248; 114-804-451-117-599; 130-574-314-495-488; 158-175-491-942-187,2,false,,
060-905-412-608-729,Cloud Computing Architecture and Forensic Investigation Challenges,2015-08-18,2015,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Ghania Al Sadi,"to traditional digital forensic investigations, investigating cloud crimes is considered as more difficult and complex process. The architecture of cloud computing is behind the complexity of conducting forensic investigation on cloud where data are synchronized and accessed using multiple and different devices in different places that reduce the chance to find a real device to seize for forensics investigation. There are a number of challenges in forensic investigation field faced by investigators which may complicate the way of conducting cloud forensic investigations to extract evidences. This research is studying the complexity of cloud architecture and how it affects digital investigations by addressing a number of challenges on conducting cloud forensic investigation.",124,7,20,25,Forensic science; Cloud computing architecture; Field (computer science); Computer security; Computer science; Process (engineering); Cloud computing; Digital forensics,,,,,https://www.ijcaonline.org/archives/volume124/number7/22116-22116-2015905521 http://ui.adsabs.harvard.edu/abs/2015IJCA..124g..20A/abstract https://www.ijcaonline.org/research/volume124/number7/sadi-2015-ijca-905521.pdf,http://dx.doi.org/10.5120/ijca2015905521,,10.5120/ijca2015905521,1782730031,,0,019-503-212-220-967; 024-894-908-869-686; 040-155-905-622-611; 042-603-990-097-418; 054-347-685-047-575; 091-694-208-796-635; 095-691-114-276-825; 167-681-711-973-339; 170-108-067-251-840,2,true,,green
060-971-363-644-947,A Survey of Various Frameworks and Solutions in all Branches of Digital Forensics with a Focus on Cloud Forensics,,2019,journal article,International Journal of Advanced Computer Science and Applications,21565570; 2158107x,The Science and Information Organization,,Mohammed Khanafseh; Mohammad Qatawneh; Wesam Almobaideen,"Digital forensics is a class of forensic science interested with the use of digital information produced, stored and transmitted by various digital devices as source of evidence in investigations and legal proceedings. Digital forensics can be split up to several classes such as computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics. In recent years, cloud computing has emerged as a popular computing model in various areas of human life. However, cloud computing systems lack support for computer forensic investigations. The main goal of digital forensics is to prove the presence of a particular document in a given digital device. This paper presents a comprehensive survey of various frameworks and solutions in all classes of digital forensics with a focus on cloud forensics. We start by discussing different forensics classes, their frameworks, limitations and solutions. Then we focus on the methodological aspect and existing challenges of cloud forensics. Moreover, the detailed comparison discusses drawbacks, differences and similarities of several suggested cloud computing frameworks providing future research directions.",10,8,,,Class (computer programming); Data science; Cloud forensics; Focus (computing); Computer science; Network forensics; Computer forensics; Mobile device forensics; Cloud computing; Digital forensics,,,,,https://thesai.org/Downloads/Volume10No8/Paper_80-A_Survey_of_Various_Frameworks_and_Solutions.pdf https://thesai.org/Publications/ViewPaper?Volume=10&Issue=8&Code=IJACSA&SerialNo=80,http://dx.doi.org/10.14569/ijacsa.2019.0100880,,10.14569/ijacsa.2019.0100880,2972427363,,0,000-451-779-646-297; 003-803-242-209-367; 004-706-447-836-905; 008-308-597-135-954; 009-885-874-541-907; 010-688-518-606-674; 018-552-581-098-658; 019-698-064-288-240; 020-311-734-615-623; 026-774-296-742-022; 032-286-659-568-014; 032-697-093-668-898; 034-916-306-834-918; 039-926-373-052-060; 044-353-273-186-518; 047-125-525-662-686; 047-630-600-014-492; 055-602-900-718-397; 056-205-328-777-528; 057-897-698-974-277; 060-808-935-547-406; 065-322-784-190-818; 066-235-037-082-291; 070-466-273-729-651; 074-014-335-505-388; 083-887-368-633-254; 088-719-274-824-438; 088-909-224-066-322; 091-619-263-117-914; 091-912-350-006-721; 093-778-033-321-400; 095-691-114-276-825; 096-188-680-470-989; 097-595-459-357-957; 097-939-114-561-254; 098-748-261-333-651; 111-090-978-711-139; 112-181-239-331-730; 120-937-322-045-732; 121-737-705-216-690; 124-912-663-881-389; 128-736-420-984-960; 137-563-945-652-129; 143-469-269-658-387; 148-338-977-232-362; 151-117-898-624-762; 153-276-821-446-997; 154-517-106-328-503; 162-110-149-751-921; 167-592-705-831-583; 185-741-441-912-96X; 187-762-907-549-695; 190-065-821-748-92X; 199-745-676-923-766,8,true,cc-by,gold
061-289-036-312-640,Identification of forensic artifacts from the registry of windows 10 device in relation to idrive cloud storage usage,2022-02-01,2022,journal article,Bulletin of Electrical Engineering and Informatics,23029285; 20893191,Institute of Advanced Engineering and Science,,Adesoji A. Adesina; Ayodele Ariyo Adebiyi; Charles K. Ayo,"The accessibility of cloud storage over the internet as a result of cloud computing technology provides the opportunity to store, share and upload data online with the use of digital devices which can be accessed anytime and anywhere. These benefits can also be exploited by the cybercriminals to perform various criminal activities including storing and exchanging of illegal materials on cloud storage platforms. The logs of malicious usages can be obtained from the cloud service providers for forensic investigations but the privacy issue among other factors make it difficult for such logs to be shared. Therefore, there is a need to perform client-side forensics to be able to carry out forensic investigation on digital devices as related to the activities on cloud storage. This study identifies relevant artifacts that can be forensically extracted from the registry of a window 10 device that accessed iDrive cloud storage. The study explores different experimental setups for the forensic analysis and adopted an integrated conceptual digital forensic framework in the investigation process to detect relevant forensic artifacts from the registry of a windows 10 device. This study increases the knowledge of cloud storage forensics and the significance of registry analysis during digital investigations.",11,1,521,529,Cloud computing; Digital forensics; Upload; Computer science; Cloud storage; Identification (biology); Computer security; The Internet; Process (computing); Digital evidence; World Wide Web; Data science,,,,,,http://dx.doi.org/10.11591/eei.v11i1.3489,,10.11591/eei.v11i1.3489,,,0,,0,true,cc-by-sa,gold
061-353-104-200-573,Identifying Digital Forensic Frameworks Based on Processes Models,2021-01-14,2021,journal article,Iraqi Journal of Science,23121637; 00672904,University of Baghdad College of Science,,Talib M. Jawad Abbas; Ahmed Salem Abdulmajeed,Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.,,,249,258,Cryptography; Data science; Digital evidence; Computer science; Process (engineering); Digital forensics; Hash function,,,,,https://ijs.uobaghdad.edu.iq/index.php/eijs/article/view/3919 http://scbaghdad.edu.iq/eijs/index.php/eijs/article/view/3919,http://dx.doi.org/10.24996/ijs.2021.si.1.35,,10.24996/ijs.2021.si.1.35,3124116883,,0,002-183-091-505-394; 004-706-447-836-905; 004-872-169-627-620; 009-940-339-227-472; 014-713-031-827-317; 019-698-064-288-240; 020-944-423-224-895; 038-668-970-194-854; 065-850-676-779-341; 097-723-876-253-714; 109-482-615-363-500; 111-090-978-711-139; 199-745-676-923-766,0,true,,gold
061-395-179-431-451,A forensic examination of four popular cross‐platform file‐sharing apps with Wi‐Fi P2P,2020-09-28,2020,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Szu-Yuan Teng; Che-Yen Wen,"File-sharing apps with Wi-Fi hotspot or Wi-Fi Direct functions become more popular. They can work on multiple platforms and allow users to transfer files in a concealed manner. However, when criminals use these apps in illegal activities, it becomes an important issue for investigators to find digital evidence on multiple platforms. At present, there are few studies on this topic, and most of them are limited to the single platform problem. In this paper, we propose a forensic examination method for four popular cross-platform file-sharing apps with Wi-Fi hotspot and Wi-Fi Direct functions: Zapya, SHAREit, Xender, and Feem. We use 22 static and live forensic tools for 11 platforms to acquire, analyze, and classify the forensic artifacts. In our experiments, we find many useful forensic artifacts and classify them into six categories. The experimental results can support law enforcement investigations of digital evidence and provide information for future studies on other cross-platform file-sharing apps.",66,1,315,322,Data science; Hotspot (Wi-Fi); Law enforcement; Digital evidence; Forensic examination; Future studies; Computer science; File sharing; Cross-platform,Wi-Fi P2P; artifact analysis; cross-platform; digital evidence; file-sharing apps; mobile hotspot,,,,https://www.ncbi.nlm.nih.gov/pubmed/32986853 https://europepmc.org/article/MED/32986853 https://pubmed.ncbi.nlm.nih.gov/32986853/ https://onlinelibrary.wiley.com/doi/epdf/10.1111/1556-4029.14574,http://dx.doi.org/10.1111/1556-4029.14574,32986853,10.1111/1556-4029.14574,3089357476,,0,012-821-491-637-560; 033-052-944-470-280; 036-647-129-742-923; 069-542-265-862-15X; 092-748-508-652-278; 095-577-771-481-790; 128-899-379-292-298,1,false,,
061-539-155-308-504,An Overview of Corporate Cybercrime in India and US,,2017,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Tanya Syngle,,6,2,62,72,Information system; Cybercrime; Computer security; Computer science; Wireless,,,,,http://sdiwc.net/digital-library/an-overview-of-corporate-cybercrime-in-india-and-us.html,http://dx.doi.org/10.17781/p002269,,10.17781/p002269,2743690690,,0,076-819-496-188-388,0,false,,
061-608-339-590-942,Developing digitally enabled interventions for prison and probation settings: a review,2018-01-09,2018,journal article,Journal of Forensic Practice,20508794; 20508808,Emerald,United Kingdom,Jason Morris; Manpreet Kaur Bans,"Purpose; ; ; ; ; The purpose of this paper is to highlight some initial efforts within Her Majesty’s Prison and Probation Service (HMPPS) to develop digitally enabled services supporting the rehabilitation of service users. It is not designed to set out either HMPPS policy on digital rehabilitative services or the position of HMPPS Interventions Services on this subject. Rather, it is a short exposition of the authors’ views on the potential of digitally enabled strategies to enhance interventions in forensic settings. In this context, the authors will also describe the development of the first digitally enabled rehabilitation service accessed via HMPPS in-room computer terminals.; ; ; ; ; Design/methodology/approach; ; ; ; ; The authors have reviewed current literature and outlined how the authors have and are aiming to add to this area of work.; ; ; ; ; Findings; ; ; ; ; This general review outlines the authors’ views on the potential of digitally enabled strategies for improving interventions in forensic settings.; ; ; ; ; Originality/value; ; ; ; ; This paper is a short exposition of the authors’ views on the potential of digitally enabled strategies to enhance interventions in forensic settings. In this context, the authors will also describe the development of the first digitally enabled rehabilitation service accessed via HMPPS in-room computer terminals.",20,2,134,140,Computer terminal; Psychological intervention; Originality; Rehabilitation; Context (language use); Digital learning; Prison; Service (systems architecture); Computer science; Knowledge management,,,,,https://www.emerald.com/insight/content/doi/10.1108/JFP-08-2017-0030/full/html http://www.emeraldinsight.com/doi/abs/10.1108/JFP-08-2017-0030?journalCode=jfp,http://dx.doi.org/10.1108/jfp-08-2017-0030,,10.1108/jfp-08-2017-0030,2782775599,,0,001-621-949-904-54X; 005-026-886-297-736; 009-559-038-720-535; 011-436-140-847-614; 016-167-720-887-742; 020-435-546-216-11X; 020-944-655-420-908; 029-620-549-694-362; 037-122-552-696-076; 037-625-645-213-154; 038-006-477-831-415; 045-393-134-892-925; 061-305-234-402-257; 062-396-909-043-591; 064-056-612-592-663; 065-080-294-801-410; 162-125-358-815-890; 171-191-662-422-735; 191-952-725-734-867,7,false,,
061-658-874-291-210,"Mobile phone forensics - a systematic approach, tools, techniques and challenges",2020-11-03,2020,journal article,International Journal of Electronic Security and Digital Forensics,1751911x,,,Manish Kumar,"Collection and analysis of digital evidence from mobile phones plays vital role to solve many civil and criminal cases. This evidence is a potential source of information which helps the prosecutors win more conviction. Sometime it also helps to crack organised crime and terrorist activities. Digital forensics expert need specialised tools and techniques to extract the evidence from mobile phones for analysis. Extracting the evidence from mobile phones in forensically sound manner is never been an easy task, as the entire process must ensure the integrity of evidence and its admissibility in the court of law. Rapid advancement in technology and frequent release of latest make and models always poses new challenges for the investigator. There are various tools and techniques available for mobile forensics, which are classified based on its complexity and its physical characteristics. Forensics examiner need to assess the complexity of the case and select the tools accordingly. This paper discusses in-detail about the systematic approach, which can be used for mobile forensics. Each approach has its own advantages, disadvantages, cost and complexities which is highlighted in the paper along with the list of standard tools and their key features.",13,,64,87,Data science; Organised crime; Conviction; Mobile phone; Task (project management); Digital evidence; Computer science; Process (engineering); Mobile device forensics; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.111725,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.111725,,,3127140650,,0,,0,false,,
061-759-553-863-671,Research on IoT Forensics System Based on Blockchain Technology,2022-06-15,2022,journal article,Security and Communication Networks,19390122; 19390114,Hindawi Limited,United Kingdom,Guangjun Liang; Jianfang Xin; Qun Wang; Xueli Ni; Xiangmin Guo,"In recent years, mobile edge computing (MEC) has become a research hotspot in academia. The Internet of Things (IoT) is an excellent way to build the infrastructure required for a MEC environment. Its rich digital tracking repository can provide insights into people's daily activities at home and elsewhere. Meanwhile, due to the open connectivity of the Internet of things devices, they can easily become the target of network attacks and be used by criminals as criminal tools. As a result, civil and criminal cases have increased year by year. This article conducts in-depth research on IoT forensics. By comparing its difference with traditional digital forensics (DF), the definition of IoT forensics is given. We have systematically sorted out the research results since the concept of IoT forensics was proposed in 2013 and proposed a generalized IoT forensics model. By studying blockchain technology and introducing it into the IoT forensics framework, a blockchain-based IoT forensics architecture is further proposed. Further, an alliance chain IoT forensics system is proposed. From the perspective of the data provider and the data visitor, the process of evidence storage and forensics of the IoT system is discussed. Finally, taking Unmanned Aerial Vehicle (UAV) forensics as an example, we give an experiment of IoT forensics analysis.",2022,,1,14,Computer science; Network forensics; Digital forensics; Internet of Things; Computer security; Blockchain; Computer forensics; Data science,,,,National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China,,http://dx.doi.org/10.1155/2022/4490757,,10.1155/2022/4490757,,,0,002-323-303-650-553; 006-665-721-928-314; 009-999-190-756-013; 015-065-674-673-626; 019-225-229-781-384; 019-912-316-692-552; 025-366-195-449-207; 029-164-830-214-360; 030-844-372-272-786; 031-108-930-135-139; 034-940-557-037-083; 035-859-793-614-223; 041-049-827-963-011; 047-125-525-662-686; 047-782-671-230-742; 055-811-656-615-740; 060-294-953-084-788; 063-795-557-456-118; 065-322-784-190-818; 079-858-593-881-513; 081-677-124-683-871; 081-746-298-679-238; 083-134-473-348-002; 083-366-430-872-667; 083-636-673-001-628; 085-425-338-426-218; 086-891-420-750-310; 089-419-432-581-673; 090-774-592-907-144; 097-939-114-561-254; 105-961-825-308-748; 108-662-351-368-480; 112-181-239-331-730; 134-072-762-404-610,0,true,cc-by,gold
062-025-688-856-405,Credential Hunting Across Web,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Daaman Lohia; Pranav Miglani; Swapnil Mengi; Aparajita Sinha,,,,,,Internet privacy; Credential; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.05,http://dx.doi.org/10.46293/4n6/2020.02.03.05,,10.46293/4n6/2020.02.03.05,3095144412,,0,,0,false,,
062-137-637-964-947,Can we continue to effectively police digital crime,2017-06-08,2017,journal article,Science & justice : journal of the Forensic Science Society,13550306,Forensic Science Society,United Kingdom,Graeme Horsman,"Abstract Now approximately 30 years old, the field of digital forensics is arguably facing some of its greatest challenges to date. Whilst currently supporting law enforcement in numerous criminal cases annually, questions are beginning to emerge regarding whether it can sustain this contribution, with digital crime remaining prevalent. In his first live interview in September 2015, Head of MI5, Andrew Parker indicated that individuals are now engaging in computing acts which are beyond the control of authorities, confirming earlier remarks made by British Prime Minister David Cameron in the wake of the Charlie Hebdo attacks. Such comments cast doubt on the future effectiveness of the digital forensic discipline and its ability to effectively investigate those who implement the latest forms of technology to carry out illicit acts. This article debates the controversial question, could we be facing an era where digital crime can no longer be effectively policed?",57,6,448,454,Sociology; Law; Law enforcement; Cyber crime; Prime minister; Computer forensics; Digital forensics,Crime; Cyber-crime; Digital forensics; Research; Security,,,,https://europepmc.org/article/MED/29173458 https://research.tees.ac.uk/ws/files/6385420/621796.pdf https://sure.sunderland.ac.uk/7400/ https://core.ac.uk/display/83955750 https://www.sciencedirect.com/science/article/abs/pii/S1355030617300801 https://www.ncbi.nlm.nih.gov/pubmed/29173458 http://www.sciencedirect.com/science/article/pii/S1355030617300801 https://research.tees.ac.uk/en/publications/can-we-continue-to-effectively-police-digital-crime https://core.ac.uk/download/83955750.pdf,http://dx.doi.org/10.1016/j.scijus.2017.06.001,29173458,10.1016/j.scijus.2017.06.001,2622507813,,0,004-305-936-893-970; 004-553-537-193-953; 007-460-815-938-318; 007-738-295-913-523; 016-983-559-523-04X; 019-831-293-743-518; 020-102-901-076-831; 021-635-319-328-35X; 027-023-893-191-352; 029-638-263-419-336; 029-743-976-871-124; 035-381-853-639-810; 046-240-766-487-724; 049-072-992-078-856; 051-554-120-123-211; 055-542-241-433-061; 057-182-959-994-032; 060-883-619-119-004; 064-214-213-364-517; 077-532-025-251-756; 078-327-902-374-330; 078-385-199-956-202; 086-419-575-179-359; 087-932-943-720-094; 090-752-043-508-733; 107-225-992-852-975; 107-864-540-671-760; 111-349-579-792-04X; 111-709-004-594-25X; 114-884-641-066-625; 134-369-102-934-63X; 134-709-778-635-793; 134-927-490-231-285; 137-298-307-797-644; 142-535-519-963-074; 165-354-182-797-278; 196-748-384-573-21X,22,true,cc-by-nc-nd,green
062-168-384-023-533,A novel principle to validate digital forensic models,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Dinesh Mothi; Helge Janicke; Isabel Wagner,"Abstract Digital forensic models (DFMs) form the base for any digital investigation because they guide the investigators with necessary steps and procedures to be taken during the investigation. State-of-the-art DFMs assume that it is safe to proceed from one stage of the investigation to the next without taking into account the anti-forensic techniques that could be used to defeat the investigation process. However, the findings in the literature shows that common phases in the digital forensic process such as acquisition, examination, analysis, and reporting are affected by various anti-forensic (AF) methods. To fill this gap, we propose an abstract digital forensic framework and validate DFMs by factoring in AF techniques affecting various phases in a digital forensic process. This validation principle can be used to enhance state-of-the-art DFMs to enable principled detection and countering of AF techniques before being applied to a real-time investigation case.",33,,200904,,Data mining; Factoring; Digital forensic process; One stage; Computer science; Base (topology); Process (engineering); Digital forensics,,,,,https://dora.dmu.ac.uk/handle/2086/19374 https://dblp.uni-trier.de/db/journals/di/di33.html#MothiJW20 https://www.sciencedirect.com/science/article/abs/pii/S1742287619303469 https://dora.dmu.ac.uk/bitstream/2086/19374/2/mothi2020using-acceptedversion.pdf,http://dx.doi.org/10.1016/j.fsidi.2020.200904,,10.1016/j.fsidi.2020.200904,3012281215,,0,000-018-093-052-18X; 002-295-796-487-823; 004-668-612-287-432; 005-102-962-333-180; 005-392-088-749-603; 005-997-056-658-776; 006-296-899-452-535; 017-444-026-554-998; 019-360-393-097-72X; 026-774-296-742-022; 032-487-265-797-544; 036-093-518-856-770; 036-178-978-714-311; 038-668-970-194-854; 047-630-600-014-492; 064-531-736-566-934; 065-322-784-190-818; 065-654-832-541-493; 066-235-037-082-291; 067-950-012-629-210; 078-730-781-174-18X; 078-817-460-650-140; 081-032-497-600-401; 086-153-084-433-759; 086-425-435-869-316; 103-103-595-689-579; 103-749-645-980-640; 106-041-428-637-948; 106-229-562-693-558; 112-181-239-331-730; 116-344-252-215-864; 132-355-634-397-986; 143-959-640-326-451; 144-614-319-071-141; 190-065-821-748-92X,5,true,,green
062-489-027-144-764,PENGGUNAAN METODE STATIS DAN LIVE FORENSIK PADA UAV UNTUK MENDAPATKAN BUKTI DIGITAL,2019-08-31,2019,journal article,ILKOM Jurnal Ilmiah,25487779; 20871716,Universitas Muslim Indonesia,,Ibnu Fajar Arrochman; Dhomas Hatta Fudholi; Yudi Prayudi,"In recent years, the use of drones by civilians is increasing rapidly by the presentation of total sales continued to increase rapidly every year. With the increasing possibility of Unmanned Aerial Vehicle (UAV) abuse, crime in the use of UAVs to be larger. Through forensic analysis of data using static forensic and live forensic to obtain data that allows it to be used as digital evidence. To dig up information that could be used as digital evidence in the UAV and controllers, as well as to know the characteristics of digital evidence on a UAV. The results showed that digital evidence on a UAV, the smartphone is used as a controller UAV has a very important role in the investigation. The findings in aircraft has a percentage of 50% and a camera memory card with 16.6%. DJI Phantom 3 Advanced GPS coordinates always store data in flight LOG; the data is always stored even when the flight mode is used does not use GPS signals to stability. Due to DJI Phantom 3 Advanced always use GPS on flights, file, image or video captured by the camera has the best GPS location coordinates to the metadata therein.",11,2,152,158,Geographic coordinate system; Controller (computing); GPS signals; Data analysis; Digital evidence; Computer science; Drone; Global Positioning System; Real-time computing; Metadata,,,,,https://dspace.uii.ac.id/handle/123456789/17446 http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/download/444/187 http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/view/444/187 https://core.ac.uk/download/pdf/228866677.pdf,http://dx.doi.org/10.33096/ilkom.v11i2.444.152-158,,10.33096/ilkom.v11i2.444.152-158,2974514758,,0,,0,true,cc-by-sa,gold
062-624-458-576-365,"Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction",,2022,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Abdullah Ayub Khan; Aftab Ahmed Shaikh; Asif Ali Laghari; Mazhar Ali Dootio; M. Malook Rind; Shafique Ahmed Awan,,14,2,124,124,Computer science; Digital forensics; Computer forensics; Computer security; Cybercrime; Digital evidence; Data science; Network forensics; Cyber crime; Open research; Internet privacy,,,,,,http://dx.doi.org/10.1504/ijesdf.2022.121174,,10.1504/ijesdf.2022.121174,,,0,,1,false,,
063-274-848-736-685,A Comprehensive and Harmonized Digital Forensic Investigation Process Model.,2015-08-10,2015,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Aleksandar Valjarevic; Hein S. Venter,"Performing a digital forensic investigation (DFI) requires a standardized and formalized process. There is currently neither an international standard nor does a global, harmonized DFI process (DFIP) exist. The authors studied existing state-of-the-art DFIP models and concluded that there are significant disparities pertaining to the number of processes, the scope, the hierarchical levels, and concepts applied. This paper proposes a comprehensive model that harmonizes existing models. An effort was made to incorporate all types of processes proposed by the existing models, including those aimed at achieving digital forensic readiness. The authors introduce a novel class of processes called concurrent processes. This is a novel contribution that should, together with the rest of the model, enable more efficient and effective DFI, while ensuring admissibility of digital evidence. Ultimately, the proposed model is intended to be used for different types of DFI and should lead to standardization.",60,6,1467,1483,Standardization; Class (computer programming); Data science; International standard; Harmonization; Scope (project management); Digital evidence; Computer science; Process (engineering); Digital forensics,digital evidence; digital forensics; forensic science; harmonization; investigation; model; process; standardization,,,,https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.12823 https://repository.up.ac.za/handle/2263/51445 https://dialnet.unirioja.es/servlet/articulo?codigo=5292849 http://onlinelibrary.wiley.com/doi/10.1111/1556-4029.12823/abstract https://europepmc.org/article/MED/26258644 https://pubmed.ncbi.nlm.nih.gov/26258644/ https://repository.up.ac.za/bitstream/2263/51445/1/Valjarevic_Comprehensive_2015.pdf,http://dx.doi.org/10.1111/1556-4029.12823,26258644,10.1111/1556-4029.12823,2160898275,,0,007-321-225-339-593; 020-944-423-224-895; 041-059-041-666-09X; 104-249-629-797-999,29,true,,green
063-519-359-431-461,An efficient digital forensic model for cybercrimes investigation in cloud computing,2021-01-22,2021,journal article,Multimedia Tools and Applications,13807501; 15737721,Springer Science and Business Media LLC,Netherlands,Ezz El-Din Hemdan; D. H. Manjaiah,"In recent times, cloud computing adopted numerous organizations and enterprises for offering services with securely certifying that cloud providers against illegitimate activities. However, cost-effective forensics design and implementation for support the cloud-based cybercrimes investigation. To build cloud architecture support forensics is a significant and complex issue such as voluminous intricate legal, organizational, and technical defies due to the virtualization, distributing, and dynamic nature of cloud systems. Therefore, this paper presents an efficient Cloud Forensics Investigation Model (CFIM) to investigate cloud crimes in a forensically sound and timely fashion. Besides, the proposed system supports the concept of Forensic as a Service (FaaS) that provide innumerable benefits of conducting digital forensics through using Forensic Server on the cloud side. The investigational results proved that the proposed system can assist the digital investigators in their mission of investigation of cybercrimes in the cloud in a proficient manner.",80,9,14255,14282,Forensic science; Cloud forensics; Service (systems architecture); Computer security; Computer science; Virtualization; Cloud computing; Digital forensics,,,,,https://link.springer.com/article/10.1007/s11042-020-10358-x https://dblp.uni-trier.de/db/journals/mta/mta80.html#HemdanM21 https://doi.org/10.1007/s11042-020-10358-x,http://dx.doi.org/10.1007/s11042-020-10358-x,,10.1007/s11042-020-10358-x,3125692403,,0,004-656-167-784-562; 005-647-704-356-945; 020-935-855-484-274; 021-170-286-847-139; 039-189-453-189-406; 040-238-768-908-245; 041-879-975-858-398; 048-149-094-961-264; 052-337-723-472-520; 056-905-403-377-274; 063-753-562-544-942; 066-785-118-231-304; 067-860-693-051-223; 069-145-107-243-338; 083-857-356-361-530; 088-909-224-066-322; 099-633-821-597-96X; 104-609-359-888-183; 116-056-471-784-278; 124-912-663-881-389; 125-817-456-334-439; 129-642-811-953-052; 136-798-153-498-59X; 144-124-797-675-052; 151-551-319-524-065; 157-779-950-410-958; 160-331-694-886-887; 194-016-717-022-461,9,false,,
063-661-720-912-563,Analisis Media Sosial Facebook Lite dengan tools Forensik menggunakan Metode NIST,2020-11-17,2020,journal article,"Techno (Jurnal Fakultas Teknik, Universitas Muhammadiyah Purwokerto)",25799096; 14108607,Lembaga Publikasi Ilmiah dan Penerbitan Universitas Muhammadiyah Purwokerto,,Rauhulloh Ayatulloh Khomeini Noor Bintang; Rusydi Umar; Anton Yudhana,"Social Media is becoming very popular among the public today, and the increasing number of social media use has of course a good or bad impact on the course of human life, for example the bad impact is doing cyberbully or chating on social media. Digital forensics is one of the sciences for how to catch criminals in digital which will be needed in evidence in court. Social media criminals need Smartphones to commit digital cybercrime. This research will raise evidence of digital crimes on the Facebook Lite application using forensics. In this study, the forensic tool that will be used is the MOBILEedit Forensic Pro forensic tools with the help of using methods NIST National Institute Of Standars Techlogogy. NIST has a good workflow for extracting digital forensic data. The research results will be obtained in the form of accounts Id, audio, conversations, and images",21,2,125,130,Internet privacy; NIST; Commit; Workflow; Cybercrime; Human life; Computer science; Social media; Digital forensics,,,,,http://jurnalnasional.ump.ac.id/index.php/Techno/article/download/8494/3602 http://jurnalnasional.ump.ac.id/index.php/Techno/article/view/8494/3602 https://doaj.org/article/eee14c43ee4f47bf88c4da1a19962cee,http://dx.doi.org/10.30595/techno.v21i2.8494,,10.30595/techno.v21i2.8494,3101211688,,0,,0,true,cc-by,gold
063-682-957-318-485,Trusted forensics scheme based on digital watermark algorithm in intelligent VANET,2019-05-16,2019,journal article,Neural Computing and Applications,09410643; 14333058,Springer Science and Business Media LLC,Germany,Zhaofeng Ma; Ming Jiang; Weihua Huang,"Trusted forensics is one of the most important problems in VANET, and it often needs continuous video monitoring, once break out emergent vehicle accidents, then specific staff members take steps for forensics to obtain facts and define responsibility. Traditional forensics exists problems of inaccurate information, unfair responsibility definition and risk of leakage of user’s privacy. To solve the above problem, in this paper, we proposed a trusted forensics scheme based on digital image watermark in intelligent VANET, in which we proposed technical and fair algorithms for trusted forensics, and the trusted forensics scheme includes basic forensics parameter data obtaining critical forensics data automatic generation and forensics data extraction. Once there vehicle accident occurred, the forensics system first obtains the location, timestamp, forensics device data as basic forensics parameter data, and then, it embeds the forensics parameter as watermark into the real-time vehicle accident photograph by the proposed digital watermark algorithm, and thus, the real-time and undeniable forensics data are automatic generated as evidence; when necessary, the forensics system can extract the evidence data and watermark data from the critical forensics data. The proposed scheme can detect the content integrity of image data and even find out tampering mark when the image data are tampered. Additionally, we used neural network algorithm for vehicle license plate recognition and rapid vehicle information gathering. Finally, experiments evaluations manifest the proposed is forensics scheme is secure, robust, and efficient in vehicle forensics.",32,6,1665,1678,Timestamp; Algorithm; Forensic science; Digital watermarking; Watermark; Vehicular ad hoc network; Scheme (programming language); Data extraction; License; Computer science; Digital image,,,,,https://dblp.uni-trier.de/db/journals/nca/nca32.html#MaJH20 https://link.springer.com/article/10.1007/s00521-019-04246-1 https://doi.org/10.1007/s00521-019-04246-1,http://dx.doi.org/10.1007/s00521-019-04246-1,,10.1007/s00521-019-04246-1,2946822226,,0,003-040-355-096-378; 011-835-617-244-326; 014-130-776-302-166; 021-048-723-685-07X; 037-778-865-415-046; 044-864-601-790-058; 049-329-917-347-084; 050-601-465-823-611; 050-891-066-907-517; 071-253-739-610-933; 077-739-261-737-967; 079-206-727-458-961; 094-159-442-759-925; 094-493-438-801-573; 099-010-410-958-352; 121-426-157-796-410; 155-003-343-079-553; 171-768-894-018-612; 176-947-927-660-253,4,false,,
063-837-705-607-866,Prelim i - Editorial Board,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,33,,300989,300989,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30223-7,,10.1016/s2666-2817(20)30223-7,,,0,,0,true,,bronze
063-964-488-825-120,Forming an investigative opinion in digital forensics,2022-05-09,2022,journal article,WIREs Forensic Science,25739468,Wiley,,Graeme Horsman,,,,,,Digital forensics; Digital evidence; Computer forensics; Computer science; Internet privacy; Data science,,,,,,http://dx.doi.org/10.1002/wfs2.1460,,10.1002/wfs2.1460,,,0,001-691-716-197-657; 003-232-363-219-004; 003-275-658-705-341; 003-982-227-180-136; 010-963-610-208-920; 032-451-540-235-796; 036-189-930-199-369; 047-386-524-667-691; 054-004-313-233-495; 058-717-000-287-105; 064-549-392-650-90X; 071-616-341-516-576; 075-056-106-679-562; 102-243-142-344-71X; 111-488-239-742-003; 173-145-269-859-717; 174-773-910-564-783,0,false,,
064-115-669-679-548,A novel spiral pattern and 2D M4 pooling based environmental sound classification method,,2020,journal article,Applied Acoustics,0003682x; 1872910x,Elsevier BV,United Kingdom,Turker Tuncer; Abdulhamit Subasi; Fatih Ertam; Sengul Dogan,,170,,107508,,Signal processing; Artificial intelligence; Pattern recognition; Cross-validation; Component analysis; Spiral; Computer science; Artificial neural network; Pooling; Digital forensics; Discriminative model,,,,,https://www.sciencedirect.com/science/article/abs/pii/S0003682X20306125#! https://www.sciencedirect.com/science/article/pii/S0003682X20306125,http://dx.doi.org/10.1016/j.apacoust.2020.107508,,10.1016/j.apacoust.2020.107508,3043038561,,0,000-747-924-226-591; 012-192-532-868-746; 015-029-029-238-949; 015-342-890-125-133; 015-450-490-331-294; 018-044-715-644-781; 018-565-254-420-673; 019-662-538-444-512; 023-108-865-530-350; 023-209-286-667-312; 026-307-550-544-417; 027-856-229-665-616; 028-546-645-253-912; 029-867-539-332-231; 030-230-719-506-590; 030-328-769-006-418; 033-497-111-106-603; 035-515-505-781-483; 037-039-073-481-652; 039-195-792-891-583; 040-130-749-810-053; 044-951-809-134-792; 048-530-667-285-56X; 049-866-557-464-052; 050-473-669-334-488; 054-799-635-473-629; 056-919-041-909-25X; 057-554-663-329-652; 058-864-884-652-779; 059-149-073-001-124; 072-085-666-608-424; 075-892-793-716-735; 077-829-983-025-91X; 080-677-997-238-340; 080-755-635-579-843; 085-555-728-097-937; 087-104-631-733-618; 089-146-452-957-657; 092-720-749-568-080; 112-705-069-209-103; 117-390-191-091-354; 118-681-411-201-196; 120-177-417-650-08X; 125-958-094-205-46X; 142-616-392-319-20X; 154-828-479-054-03X; 163-385-907-317-024,7,false,,
064-153-704-547-354,Recommendations for capturing signatures digitally to optimize their suitability for forensic handwriting examination.,2020-11-18,2020,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Barbora Geistová Čakovská; Nikolaos Kalantzis; Tomasz Dziedzic; Carina Fernandes; Jan Zimmer; M.J. Branco; Jonathan Heckeroth; Kristofer Axelsson Spjuth; Erich Kupferschmid; Paolo Vaccarone; Axel Kerkoff,"The use of digitally captured signatures in everyday course of business increases annually and, compared to pen and paper signatures, provides various advantages concerning the administration of documents. These signatures may also become subjects of a forensic handwriting examination and, therefore, in order to optimize their suitability for this purpose, they should satisfy several requirements. This paper presents recommendations drawn up by forensic handwriting examiners associated with ENFHEX (ENFSI) in a project aimed at defining best practices in forensic examination of digitally captured signatures. The paper is dedicated mainly to hardware and software developers, providers, and user institutions of digitally captured signature technologies to improve their practice to a level optimized for forensic handwriting examination. The most important requirements outlined in this paper concern digitally captured signature data, hardware, and software used to acquire these data, as well as optimized signing conditions. Following these requirements ensures the suitability of signature data for forensic handwriting examination and, consequently, increases the reliability of the associated electronic documents. In spite of rapidly evolving technology, they can serve as a solid basis for understanding and consideration of the optimal use of digitally captured signatures for signing electronic documents.",66,2,743,747,Signature (logic); Best practice; Information retrieval; Software; Handwriting; Forensic examination; Computer science; Reliability (statistics); Metadata,capturing hardware and software; digitally captured signature; forensic handwriting examination; metadata; numerical data; signing condition,,,Internal Security Fund of the European Union (Project 779485 - STEFA - ISFP-2016-AG-IBA-ENFS),https://europepmc.org/article/MED/33206397 https://www.ncbi.nlm.nih.gov/pubmed/33206397 https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.14627 https://pubmed.ncbi.nlm.nih.gov/33206397/,http://dx.doi.org/10.1111/1556-4029.14627,33206397,10.1111/1556-4029.14627,3106460388,,0,018-154-248-980-520; 018-960-538-999-613; 022-810-587-732-756; 092-580-969-032-163; 162-563-903-287-393,2,false,,
064-203-195-549-88X,Comparative Study and Analysis on Integrity of Data Files Using Different Tools and Techniques,2021-06-01,2021,journal article,Journal of Information Security and Cybercrimes Research,16587790; 16587782,Naif Arab University for Security Sciences,,Kumarshankar Raychaudhuri; M. George Christopher; Nayeem Abbas Hamdani,"Digital forensic investigation is the scientific process of collection, preservation, examination, analysis, documentation and presentation of digital evidence from digital devices, so that the evidence is in compliance with legal terms and acceptable in a court of law. Integrity of the digital evidence is an indispensable part of the investigation process and should be preserved to maintain the chain of custody. This is done through hashing technique using standardized forensic tools. However, while handling the evidences , lack of knowledge might lead to unintentional alteration of computed hash. This violates the chain of custody and makes the evidence inadmissible in a court of law. In this paper, our objective is to determine the different conditions under which the original hash value of a digital evidence changes. For this, we create different scenarios using sample data files and compute their hash values. A comparative study and analysis are done to determine in which scenario the original hash value of the data file changes. The results of the research will prove useful and essential for Criminal Justice Functionaries in gaining knowledge about various conditions leading to the change in hash value of digital evidence and therefore, avoid its accidental alteration during forensic investigation/examination.",4,1,43,54,Hash function; Computer science; Digital evidence; Documentation; Digital forensics; Computer security; Audit; Process (computing); Data science,,,,,,http://dx.doi.org/10.26735/symq8715,,10.26735/symq8715,,,0,,0,true,cc-by-nc,gold
064-313-388-228-262,A STATE-OF-THE-ART REVIEW OF CLOUD FORENSICS,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Sameera Almulla; Youssef Iraqi; Andrew Jones,"Cloud computing and digital forensics are emerging elds of technology. Unlike traditional digital forensics where the target environment can be almost completely isolated, acquired and can be under the investigators control; in cloud environments, the distribution of computation and storage poses unique and complex challenges to the investigators. Recently, the term \cloud forensics"" has an increasing presence in the eld of digital forensics. In this state-of-the-art review, we included the most recent research eorts that used \cloud forensics"" as a keyword and then classify the literature into three dimensions: (1) survey-based, (2) technology-based and (3) forensics-procedural-based. We discuss widely accepted standard bodies and their eorts to address the current trend of cloud forensics. Our aim is not only to reference related work based on the discussed dimensions, but also to analyse them and generate a mind map that will help in identifying research gaps. Finally, we summarize existing digital forensics tools and the available simulation environments that can be used for evidence acquisition, examination and cloud forensics test purposes.",9,4,7,28,Mind map; Cloud forensics; State of the art review; Computer security; Computer science; Cloud computing; Digital forensics,,,,,https://commons.erau.edu/jdfsl/vol9/iss4/2/ https://core.ac.uk/display/44209296 https://commons.erau.edu/cgi/viewcontent.cgi?article=1190&context=jdfsl https://doaj.org/article/f95b981ea64a450ba0505677d36c4c8b https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#AlmullaIJ14,http://dx.doi.org/10.15394/jdfsl.2014.1190,,10.15394/jdfsl.2014.1190,1757283378,,0,001-100-315-088-620; 001-105-589-691-307; 002-768-711-065-857; 008-308-597-135-954; 016-817-717-158-92X; 017-708-113-657-756; 020-241-721-441-854; 025-319-861-345-580; 026-163-378-046-984; 027-031-165-049-753; 034-773-286-616-44X; 038-845-346-494-188; 039-238-243-413-527; 041-879-975-858-398; 042-603-990-097-418; 042-969-030-470-170; 056-122-492-187-163; 057-421-097-368-120; 061-856-990-083-088; 063-600-821-499-481; 068-823-517-701-518; 091-619-263-117-914; 092-039-178-633-223; 095-691-114-276-825; 099-520-470-483-918; 100-881-789-662-974; 100-892-010-834-933; 101-091-831-428-576; 111-660-907-279-133; 116-317-110-770-148; 121-704-965-852-836; 124-912-663-881-389; 125-817-456-334-439; 144-124-797-675-052; 155-855-942-114-621; 161-201-342-740-519; 167-681-711-973-339; 169-842-425-922-642; 170-108-067-251-840; 173-952-459-161-812; 178-467-155-611-813; 194-016-717-022-461,21,true,cc-by-nc,gold
064-398-322-820-816,Research on Development of Digital Forensics based Digital Records Migration Procedure and Tool,2014-06-30,2014,journal article,Journal of the Korea Institute of Information Security and Cryptology,15983986,Korea Institute of Information Security and Cryptology,,Seokcheol Lee; Hyunguk Yoo; Taeshik Shon,"ABSTRACT Digital Records, which are created, stored, and managed in digi tal form, contains security vulnerability such as data modification, due to the characteristic of digital data. Therefore it is necessary to guarantee the reliability by verification of integrity and authenticity when managing digital records. This paper propose digital forensics based migration process for electronic records by analyzing legacy digital forensics process, and derives the requirements to develop digital forensics based electronic records migration tool through analyzing trends of a broad digital records migration technique and tool. Based on th ese develop digital forensic based digital records migration tool t o guarantee integrity and authenticity of digital records. Keywords: Digital Forensics, Digital Records, Electronic Records, Migration, Transfer접수일(2014년 3월 31일), 수정일(2014년 5월 14일),게재확정일(2014년 6월 2일)* 본 연구는 안전행전부 국가기로구언 재원으로 2013년 기록보존기술 연구개발사업의 지원을 받아 수행된 연구임†주저자, go467913@ajou.ac.kr‡교신저자, tsshon@ajou.ac.kr(Corresponding author)",24,3,571,580,Digital data; Electronic records; Digital records; Computer security; Computer science; Process (engineering); Database; Digital forensics,,,,,http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2014_v24n3_571 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001891629,http://dx.doi.org/10.13089/jkiisc.2014.24.3.571,,10.13089/jkiisc.2014.24.3.571,2067197428,,0,015-428-463-847-139; 078-730-781-174-18X; 122-880-373-616-302,0,true,,bronze
064-409-347-985-677,Forensic Science Research Summary for Forgery Detection of Digital Images,2020-02-28,2020,journal article,International Journal of Engineering and Advanced Technology,22498958,Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP,,null Monika; Mriirs Faridabad degree in Ece; Dipali Bansal; null Director-IQAC,"An important measure of proof collection, storage, and authentication in forensic sciences, which decide the safety and security of any system documents, which can be either portable document formats or scanned images. To gather evidence, or plan a forensic investigation digital images are secured with different modern methodologies. Digital image analysis includes image recovery and surveillance for image information improvement. The goal of forgery detection is to maximize the extraction of information from manipulated images, particularly noisy and post-processed images. Because digital image processing is becoming popular with many advantages in scientific and engineering applications, the forgery techniques are also growing at a rapid rate. Therefore, the main focus is on different types of forgery detection in digital image processing with the help of all transform techniques and comparing their best results for further improvement in order to generate a new approach for a future forensic science investigation.",9,3,1608,1618,Forensic science; Artificial intelligence; Forgery detection; Computer vision; Computer science; Digital image,,,,,https://zenodo.org/record/5575060,http://dx.doi.org/10.35940/ijeat.b2563.029320,,10.35940/ijeat.b2563.029320,3211160506,,0,,1,true,cc-by,gold
064-735-689-763-963,The Impact of SHA-1 File Hash Collisions On Digital Forensic Imaging: A Follow-up Experiment,,2016,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Gary C. Kessler,,11,4,10,,Collision; Forensic imaging; Computer security; Computer science; Computer forensics; SHA-1; Digital forensics,,,,,https://works.bepress.com/gary_kessler/91/ https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#Kessler16a https://doi.org/10.15394/jdfsl.2016.1433 https://commons.erau.edu/jdfsl/vol11/iss4/10/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1433&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2016.1433,,10.15394/jdfsl.2016.1433,2615827584,,0,,2,true,cc-by-nc,gold
064-866-800-584-825,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,39,,301321,301321,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00247-x,,10.1016/s2666-2817(21)00247-x,,,0,,0,true,,bronze
064-938-865-982-891,SpeechToText: An open-source software for automatic detection and transcription of voice recordings in digital forensics,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Miguel Cerdeira Negrão; Patricio Domingues,,38,,301223,,Transcription (linguistics); Full text search; Voice activity detection; Software; Laptop; Jython; Speech recognition; Computer science; Android (operating system); Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S2666281721001311 https://doi.org/10.1016/j.fsidi.2021.301223,http://dx.doi.org/10.1016/j.fsidi.2021.301223,,10.1016/j.fsidi.2021.301223,3181867036,,0,003-305-347-473-509; 009-948-671-026-644; 010-620-450-221-40X; 014-508-812-794-295; 019-601-653-291-874; 023-660-936-691-266; 035-198-069-725-410; 036-353-824-536-853; 044-051-353-134-730; 045-377-982-386-523; 046-936-814-184-732; 046-985-863-475-30X; 047-156-819-206-442; 054-986-472-236-744; 056-113-208-119-717; 057-360-375-607-114; 059-149-073-001-124; 059-494-123-799-435; 063-050-303-219-941; 063-136-871-110-749; 069-287-537-141-255; 071-327-829-062-351; 076-259-993-263-34X; 080-226-855-967-158; 086-223-698-549-183; 087-143-542-784-087; 099-403-637-973-562; 105-351-601-997-478; 111-785-821-519-342; 113-409-470-189-794; 118-309-541-911-814; 118-848-462-810-989; 123-446-532-697-045; 126-890-802-449-210; 138-570-997-166-95X; 141-668-824-215-622; 155-758-692-373-705; 163-330-758-807-944; 166-547-932-138-819; 184-925-556-656-468; 193-052-734-829-39X; 199-172-967-270-034,2,false,,
064-949-110-675-467,India’s Digital Strike on China: Security Prospective,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Omkar Sonawane,,,,,,Economy; Political science; China,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.05,http://dx.doi.org/10.46293/4n6/2021.03.02.05,,10.46293/4n6/2021.03.02.05,3162451055,,0,,0,false,,
065-409-532-451-331,"Forensically ready digital identity management systems, issues of digital identity life cycle and context of usage",,2017,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Mehrdad Tajbakhsh; Elaheh Homayounvala; Sajjad Shokouhyar,,9,1,62,62,Identity management; Identity (music); Computer science; Context (archaeology); Digital identity; World Wide Web; Internet privacy; Data science; Computer security; Authentication (law); Access control; Aesthetics; Paleontology; Philosophy; Biology,,,,,,http://dx.doi.org/10.1504/ijesdf.2017.10002653,,10.1504/ijesdf.2017.10002653,,,0,,0,true,,green
065-517-309-064-222,Avoiding Burnout at the Digital Forensics Coalface: Targeted Strategies for Forensic Agencies in the Management of Job-related Stress,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Sally F. Kelty; Emma J. McQueen; Carly Pymont; Nathan Green,"Abstract Recent evidence shows digital forensics experts are at risk of burnout and job-related stress. This may be related to the increase in digital evidence and/or repetitive exposure to challenging material, either face to face or via digital imagery in real time or post-event. This exposure includes footage and/or sound recording of extreme violence, child exploitation, suicide, and death scenes. This increase in the risk of stress also aligns with the changing nature of policing with rates of serious crime, especially robbery and homicide decreasing, while digital crime in many countries increases. This increase changes workload demands and requires new skillsets in addition to traditional investigation methods. Workplace stress has high financial and personal costs, impacting organisations, teams, family, friends, and the individual. For organisations and teams, occupational stress is associated with increases in workplace accidents, absenteeism, early retirement, higher intention to quit, lower motivation and disillusionment with work, all of which impacts the cohesion of forensic teams. The aim of this paper is to present a set of key evidence-based, targeted strategies that forensic science and policing agencies can roll-out in order to manage workplace stress, thereby managing the risk of higher turnover, absenteeism and lower workplace innovation.",38,,301127,,Burnout; Absenteeism; Occupational stress; Face-to-face; Workload; Digital evidence; Computer science; Homicide; Applied psychology; Digital forensics,,,,Australian Federal Police,https://dfrws.org/presentation/avoiding-burnout-at-the-digital-forensics-coalface-targeted-strategies-for-forensic-agencies-in-the-management-of-job-related-stress/ https://researchprofiles.canberra.edu.au/en/publications/avoiding-burnout-at-the-digital-forensics-coalface-targeted-strat https://dfrws.org/wp-content/uploads/2021/01/2021_APAC_paper-avoiding_burnout_at_the_digital_forensics_coalface.pdf https://www.sciencedirect.com/science/article/pii/S2666281721000251,http://dx.doi.org/10.1016/j.fsidi.2021.301127,,10.1016/j.fsidi.2021.301127,3124493882,,0,003-465-350-737-256; 003-515-309-951-413; 003-839-478-173-887; 004-667-286-603-895; 007-787-000-383-125; 009-627-096-122-615; 015-984-449-641-211; 017-173-570-144-261; 017-805-463-199-729; 021-201-295-792-01X; 021-364-407-964-047; 025-185-383-460-70X; 028-166-854-587-500; 028-666-896-391-785; 030-223-936-109-852; 030-461-878-149-015; 031-614-539-275-181; 031-765-295-875-09X; 033-887-519-970-976; 040-667-269-018-788; 041-988-413-602-967; 042-544-068-549-235; 045-583-164-562-588; 046-608-153-837-157; 050-389-552-568-721; 051-704-112-565-897; 053-661-832-365-258; 056-754-398-867-512; 056-790-021-627-621; 061-152-473-911-898; 061-650-697-120-894; 062-605-298-093-546; 066-824-458-827-082; 068-715-824-881-688; 073-538-637-110-630; 076-978-451-221-437; 079-819-982-015-318; 081-073-384-566-025; 085-851-989-301-541; 086-211-015-805-881; 088-426-769-403-257; 096-218-094-826-721; 097-794-150-708-79X; 102-845-377-786-086; 105-024-117-660-277; 112-083-919-827-335; 112-666-147-939-621; 119-781-528-548-569; 123-344-253-312-598; 125-396-525-564-682; 125-508-990-959-413; 126-995-721-959-658; 134-557-570-320-178; 136-946-132-481-985; 138-435-369-121-724; 144-342-598-085-266; 144-488-546-528-952; 155-144-144-803-210; 157-454-151-474-60X; 161-423-003-024-482; 162-494-674-103-725; 168-037-498-947-236,0,true,cc-by-nc-nd,hybrid
065-671-045-136-370,Leveraging CybOX to standardize representation and exchange of digital forensic information,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Eoghan Casey; Gregory Thomas Back; Sean Barnum,"With the growing number of digital forensic tools and the increasing use of digital forensics in various contexts, including incident response and cyber threat intelligence, there is a pressing need for a widely accepted standard for representing and exchanging digital forensic information. Such a standard representation can support correlation between different data sources, enabling more effective and efficient querying and analysis of digital evidence. This work summarizes the strengths and weaknesses of existing schemas, and proposes the open-source CybOX schema as a foundation for storing and sharing digital forensic information. The suitability of CybOX for representing objects and relationships that are common in forensic investigations is demonstrated with examples involving digital evidence. The capability to represent provenance by leveraging CybOX is also demonstrated, including specifics of the tool used to process digital evidence and the resulting output. An example is provided of an ongoing project that uses CybOX to record the state of a system before and after an event in order to capture cause and effect information that can be useful for digital forensics. An additional open-source schema and associated ontology called Digital Forensic Analysis eXpression (DFAX) is proposed that provides a layer of domain specific information overlaid on CybOX. DFAX extends the capability of CybOX to represent more abstract forensic-relevant actions, including actions performed by subjects and by forensic examiners, which can be useful for sharing knowledge and supporting more advanced forensic analysis. DFAX can be used in combination with other existing schemas for representing identity information (CIQ), and location information (KML). This work also introduces and leverages initial steps of a Unified Cyber Ontology (UCO) effort to abstract and express concepts/constructs that are common across the cyber domain.",12,,S102,S110,World Wide Web; Schema (psychology); Data science; Specific-information; Digital evidence; Cyber threat intelligence; Incident response; Computer science; Strengths and weaknesses; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/di/di12.html#CaseyBB15 https://www.sciencedirect.com/science/article/pii/S1742287615000158 http://www.sciencedirect.com/science/article/pii/S1742287615000158 https://core.ac.uk/display/82037839,http://dx.doi.org/10.1016/j.diin.2015.01.014,,10.1016/j.diin.2015.01.014,2003744325,,0,001-170-920-458-777; 006-008-915-210-060; 011-051-740-313-213; 016-873-099-383-893; 024-735-069-822-749; 033-241-817-699-448; 056-715-378-869-201; 058-052-081-943-595; 060-650-561-577-338; 061-549-181-856-861; 104-758-205-558-797; 105-102-860-204-164; 117-239-595-156-183; 153-474-160-113-956; 154-517-106-328-503,47,true,cc-by-nc-nd,hybrid
065-873-523-989-876,Toward a general ontology for digital forensic disciplines.,2014-06-16,2014,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Nickson M. Karie; Hein S. Venter,"Ontologies are widely used in different disciplines as a technique for representing and reasoning about domain knowledge. However, despite the widespread ontology-related research activities and applications in different disciplines, the development of ontologies and ontology research activities is still wanting in digital forensics. This paper therefore presents the case for establishing an ontology for digital forensic disciplines. Such an ontology would enable better categorization of the digital forensic disciplines, as well as assist in the development of methodologies and specifications that can offer direction in different areas of digital forensics. This includes such areas as professional specialization, certifications, development of digital forensic tools, curricula, and educational materials. In addition, the ontology presented in this paper can be used, for example, to better organize the digital forensic domain knowledge and explicitly describe the discipline's semantics in a common way. Finally, this paper is meant to spark discussions and further research on an internationally agreed ontological distinction of the digital forensic disciplines. Digital forensic disciplines ontology is a novel approach toward organizing the digital forensic domain knowledge and constitutes the main contribution of this paper.",59,5,1231,1241,Semantics; Process ontology; Ontology (information science); Domain knowledge; Data science; Specialization (logic); SPARK (programming language); Poison control; Computer security; Computer science; Digital forensics,digital forensics; digital forensics disciplines; digital forensics subdisciplines; ontological distinction; ontology,,,University of Pretoria,https://repository.up.ac.za/handle/2263/40745 https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.12511 https://repository.up.ac.za/bitstream/2263/40745/1/Karie_Toward_2014.pdf https://pubmed.ncbi.nlm.nih.gov/24931294/ https://www.ncbi.nlm.nih.gov/pubmed/24931294,http://dx.doi.org/10.1111/1556-4029.12511,24931294,10.1111/1556-4029.12511,2128428697,,0,001-255-768-346-633; 007-008-600-837-690; 017-616-094-974-749; 023-284-330-325-900; 023-624-827-239-301; 030-136-936-524-671; 036-132-248-316-123; 040-303-410-401-667; 047-937-309-229-62X; 068-413-789-098-79X; 071-236-231-772-179; 074-796-013-951-077; 074-825-521-033-969; 076-403-310-070-21X; 090-714-244-223-446; 092-522-060-753-940; 110-544-488-755-056; 118-331-363-261-775; 124-877-237-466-309; 130-388-474-945-856; 143-441-767-976-48X; 144-108-190-670-351; 166-999-959-693-14X; 170-400-477-414-567; 176-902-260-050-457; 181-971-209-212-545; 198-131-134-915-873,25,false,,
065-927-829-618-673,"Characteristic evidence, counter evidence and reconstruction problems in forensic computing",2015-12-01,2015,journal article,it - Information Technology,16112776; 21967032,Walter de Gruyter GmbH,,Andreas Dewald,"Historically, forensic computing (as digital forensics) developed pragmatically, driven by specific technical needs. Indeed, in comparison with other forensic sciences the field still is rather immature and has many deficits, such as the unclear terminology used in court. In this paper, we introduce notions of (digital) evidence, characteristic evidence, and (characteristic) counter evidence, as well as the definitions of two fundamental forensic reconstruction problems. We show the relation of the observability of the different types of evidence to the solvability of those problems. By doing this, we wish to exemplify the usefulness of formalization in the establishment of a precise terminology. While this will not replace all terminological shortcomings, it (1) may provide the basis for a better understanding between experts, and (2) helps to understand the significance of different types of digital evidence to answer questions in an investigation.",57,6,339,346,Data science; Relation (database); Digital evidence; Forensic computing; Field (computer science); Observability; Computer security; Computer science; Terminology; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/it/it57.html#Dewald15 https://www.degruyter.com/view/j/itit.2015.57.issue-6/itit-2015-0017/itit-2015-0017.xml,http://dx.doi.org/10.1515/itit-2015-0017,,10.1515/itit-2015-0017,2408235858,,0,,3,false,,
065-939-794-265-406,IMPORTANCE OF FORENSICS OF MOBILE PHONES AS A TYPE OF DIGITAL FORENSICS IN THE PROCESS OF EVIDENCE,2019-01-15,2019,journal article,MEST Journal,23347171; 23347058,MESTE NGO,,Zivanka Miladinovic Bogavac; Djordje Spasojevic,,7,1,48,52,Computer science; Process (engineering); Multimedia; Digital forensics,,,,,http://dx.doi.org/10.12709/mest.07.07.01.07,http://dx.doi.org/10.12709/mest.07.07.01.07,,10.12709/mest.07.07.01.07,2908862144,,0,,0,true,,bronze
066-219-211-495-201,Digital Chain of Custody: State of the Art,2015-03-18,2015,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Yudi Prayudi; Azhari Sn,"Digital forensics starts to show its role and contribution in the society as a solution in disclosure of cybercrime. The essential in digital forensics is chain of custody, which is an attempt to preserve the integrity of digital evidence as well as a procedure for performing documentation chronologically toward evidence. The characteristics of digital evidence have caused the handling chain of custody is becoming more complicated and complex. A number of researchers have contributed to provide solutions for the digital chain custody through a different point of views. This paper gives an overview of the extent to which the problem and challenges are faced in the digital chain of custody issue as well as the scope of researches that can be done to contribute in the issue of the digital chain of custody.",114,5,1,9,Chain of custody; Internet privacy; Point (typography); Cybercrime; Scope (project management); Digital evidence; Computer security; Computer science; State (computer science); Documentation; Digital forensics,,,,,https://www.researchgate.net/profile/Yudi_Prayudi/publication/273694917_Digital_Chain_of_Custody_State_of_The_Art/links/5508eb510cf2d7a2812b6945.pdf https://research.ijcaonline.org/volume114/number5/pxc3901856.pdf https://ui.adsabs.harvard.edu/abs/2015IJCA..114e...1P/abstract https://www.ijcaonline.org/archives/volume114/number5/19971-1856,http://dx.doi.org/10.5120/19971-1856,,10.5120/19971-1856,2000621030,,0,002-534-435-127-422; 004-872-169-627-620; 006-008-915-210-060; 016-123-869-009-118; 016-354-677-353-123; 019-784-116-444-155; 022-798-132-190-701; 026-160-736-120-096; 027-808-425-151-210; 030-266-326-999-894; 031-119-185-862-726; 032-246-414-391-330; 033-241-817-699-448; 033-423-714-085-758; 035-565-993-122-262; 038-283-679-946-304; 038-617-328-415-920; 038-793-093-462-716; 041-017-598-844-767; 045-553-653-288-228; 055-416-156-661-003; 055-474-788-258-576; 060-650-561-577-338; 070-930-241-111-87X; 071-469-254-831-765; 073-582-404-994-103; 079-048-464-716-330; 082-073-790-023-516; 093-778-033-321-400; 094-058-992-093-766; 098-748-261-333-651; 117-121-219-607-16X; 131-543-884-973-431; 132-355-634-397-986; 133-051-121-626-660; 134-927-490-231-285; 163-919-423-925-780; 180-327-460-336-608; 181-091-839-882-521; 186-208-668-595-170; 192-955-966-543-738,27,true,,green
066-235-037-082-291,Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Ben Hitchcock; Nhien-An Le-Khac; Mark Scanlon,"Due to budgetary constraints and the high level of training required, digital forensic analysts are in short supply in police forces the world over. This inevitably leads to a prolonged time taken between an investigator sending the digital evidence for analysis and receiving the analytical report back. In an attempt to expedite this procedure, various process models have been created to place the forensic analyst in the field conducting a triage of the digital evidence. By conducting triage in the field, an investigator is able to act upon pertinent information quicker, while waiting on the full report.The work presented as part of this paper focuses on the training of front-line personnel in the field triage process, without the need of a forensic analyst attending the scene. The premise has been successfully implemented within regular/non-digital forensics, i.e., crime scene investigation. In that field, front-line members have been trained in specific tasks to supplement the trained specialists. The concept of front-line members conducting triage of digital evidence in the field is achieved through the development of a new process model providing guidance to these members. To prove the model's viability, an implementation of this new process model is presented and evaluated. The results outlined demonstrate how a tiered response involving digital evidence specialists and non-specialists can better deal with the increasing number of investigations involving digital evidence.",16,,75,85,Crime scene; Data science; Triage; Premise; Digital evidence; Field (computer science); Computer security; Computer science; Process (engineering); Process modeling; Digital forensics; Forensic science,,,,,https://forensicsandsecurity.com/papers/TieredForensicMethodologyModelForDigitalFieldTriage.pdf https://dl.acm.org/doi/10.1016/j.diin.2016.01.010 https://researchrepository.ucd.ie/handle/10197/9253 https://forensicsandsecurity.com/papers/TieredForensicMethodologyModelForDigitalFieldTriage.php https://www.sciencedirect.com/science/article/abs/pii/S1742287616300044 http://ui.adsabs.harvard.edu/abs/2016arXiv160403844H/abstract https://www.markscanlon.co/papers/TieredForensicMethodologyModelForDigitalFieldTriage.php https://www.sciencedirect.com/science/article/pii/S1742287616300044 https://dblp.uni-trier.de/db/journals/corr/corr1604.html#HitchcockLS16 https://researchrepository.ucd.ie/bitstream/10197/9253/1/TieredForensicMethodologyModelForDigitalFieldTriage.pdf https://markscanlon.co/papers/TieredForensicMethodologyModelForDigitalFieldTriage.pdf https://core.ac.uk/display/82007263 https://core.ac.uk/download/pdf/82007263.pdf,http://dx.doi.org/10.1016/j.diin.2016.01.010,,10.1016/j.diin.2016.01.010,3122457477; 2297444916,,0,003-982-227-180-136; 022-502-903-446-942; 029-268-367-041-280; 047-630-600-014-492; 073-459-830-156-539; 075-529-701-912-32X; 081-447-017-308-327; 082-508-778-448-650; 094-295-279-676-447; 102-736-860-649-556,42,true,cc-by-nc-nd,hybrid
066-249-839-004-372,Variation within physical and digital craniometrics.,2019-11-29,2019,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Matthew Lee; Karina Gerdau-Radonic,,306,,110092,,Statistics; Photogrammetry; Data processing; Multivariate analysis of variance; Rendering (computer graphics); Digital photogrammetry; Reference values; Research environment; Computer science; Digital anthropology,Craniometrics; Digital anthropology; Inter-observer error; Intra-observer error; Laser scanning; Photogrammetry,"Cephalometry/methods; Computer Simulation; Forensic Anthropology; Humans; Imaging, Three-Dimensional; Lasers; Male; Observer Variation; Photogrammetry; Reference Values; Skull/anatomy & histology",,,https://pubmed.ncbi.nlm.nih.gov/31816484/ https://www.sciencedirect.com/science/article/abs/pii/S0379073819305043 https://pubag.nal.usda.gov/catalog/6785455 https://www.ncbi.nlm.nih.gov/pubmed/31816484,http://dx.doi.org/10.1016/j.forsciint.2019.110092,31816484,10.1016/j.forsciint.2019.110092,2989768787,,0,002-214-682-301-085; 006-242-490-013-146; 008-056-012-843-018; 012-809-793-734-217; 016-580-313-404-132; 019-922-207-018-525; 022-388-426-117-073; 026-198-150-050-557; 031-933-665-463-421; 039-684-326-140-341; 041-585-451-530-646; 043-415-200-759-279; 048-399-506-168-441; 049-613-177-920-882; 052-332-973-851-731; 058-742-091-725-979; 066-380-633-522-119; 069-556-330-231-555; 073-933-049-544-280; 084-034-332-190-254; 087-451-816-741-063; 099-372-993-404-324; 102-302-370-093-913; 124-684-494-161-222; 140-675-263-092-798; 171-697-804-734-709; 178-456-110-092-227; 181-622-263-100-135,5,false,,
066-326-667-476-053,Case report: Digital restoration of fragmented non-human skull,,2020,journal article,Forensic Science International: Reports,26659107,Elsevier BV,,Gargi Jani; Abraham Johnson; William R. Belcher,"Abstract Reconstruction of fragmented material remains has been given a considerable attention in the fields of archaeology, forensic anthropology, and palaeoanthropology. Fragmented osseous remains are often found in cases of mass disasters, burning incidents, crash incidents, as well as bodily mutilation through criminal and suicidal activities. In cases where the remains are burnt or fragile, the handling of the remains becomes difficult and improper handling may lead to further destruction of the evidence. In such cases, digital restoration of the remains by means of three-dimensional technology can be done as it is a non-invasive in nature and minimizes physical handling. It has been repeatedly demonstrated that virtual methods facilitate preservation, storage, and conservation of skeletal remains. For this current preliminary study, fragile fragmentary osseous remains were obtained and then digitally reconstructed. The data was acquired using hand-held 3D laser scanners and digitally reconstructed using software. The reconstructed specimen was then printed and could be used for further analysis due to the fragile nature of the original specimen.",2,,100070,,Forensic anthropology; Crash; Skull; Non-human; Digital restoration; Computer science; Forensic engineering,,,,,http://www.sciencedirect.com/science/article/pii/S2665910720300165 https://www.sciencedirect.com/science/article/pii/S2665910720300165,http://dx.doi.org/10.1016/j.fsir.2020.100070,,10.1016/j.fsir.2020.100070,3006093929,,0,000-578-174-768-820; 008-199-912-610-234; 008-223-805-736-429; 008-594-799-452-800; 010-385-539-315-536; 012-821-321-591-571; 013-138-622-173-445; 024-784-179-276-92X; 028-135-903-429-591; 035-799-611-327-441; 044-295-973-878-539; 045-932-907-295-787; 047-504-313-643-90X; 051-402-505-986-98X; 055-273-770-672-76X; 059-572-267-613-848; 089-113-094-597-75X; 112-116-133-628-228; 115-550-078-617-585; 131-666-457-913-08X; 144-373-702-344-62X; 197-422-013-209-01X,4,true,"CC BY, CC BY-NC-ND",gold
066-372-994-493-544,Digital Evidence in Criminal Procedures-A Comparative Approach-,2013-12-01,2013,journal article,Balkan Social Science Review,18578799,,,Gordana Buzarovska Lazetik; Olga Koshevaliska,"Digital evidence can be a litigant's best friend or worst nightmare, depending on the type of evidence, how it is used, and in what court it is presented. Therefore this article aims to provide an overview of computer forensics from general definitions on digital evidence, their potential sources and basic principles regarding the evaluation of phases of ""crime scene investigation"" and seizure of data in order to determinate the ""fingerprints"" of the crime. We illustrated the procedure regarding digital evidence in the USA because of its contemporariness. At last the purpose of this paper is to illustrate the “handling” of digital evidence in Macedonia and to give recommendations for a better compliance with the international instruments regarding this issue.; Key words: digital evidence, digital forensics, digital investigation, criminal procedure.",,2,63,83,Crime scene; Order (exchange); Law; Key (cryptography); Data science; Digital evidence; Compliance (psychology); Computer science; Criminal procedure; Computer forensics; Digital forensics,,,,,http://js.ugd.edu.mk/index.php/BSSR/article/download/756/730 https://www.ceeol.com/search/article-detail?id=78558,http://js.ugd.edu.mk/index.php/BSSR/article/download/756/730,,,2275809413,,0,042-941-502-428-700; 047-310-841-930-720; 050-019-822-464-159; 197-872-262-830-083,1,false,,
066-591-536-952-520,Prelim i - Editorial Board,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,32,,300965,300965,Editorial board; Computer science; Library science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30143-8,,10.1016/s2666-2817(20)30143-8,,,0,,0,true,,bronze
066-777-702-062-597,Recent Advances in Passive Digital Image Security Forensics: A Brief Review,,2018,journal article,Engineering,20958099,Elsevier BV,United Kingdom,Xiang Lin; Jianhua Li; Shilin Wang; Alan-Wee-Chung Liew; Feng Cheng; Xiaosa Huang,"Abstract With the development of sophisticated image editing and manipulation tools, the originality and authenticity of a digital image is usually hard to determine visually. In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade. Compared with active forensics approaches that require embedding additional information, passive forensics approaches are more popular due to their wider application scenario, and have attracted increasing academic and industrial research interests. Generally speaking, passive digital image forensics detects image forgeries based on the fact that there are certain intrinsic patterns in the original image left during image acquisition or storage, or specific patterns in image forgeries left during the image storage or editing. By analyzing the above patterns, the originality of an image can be authenticated. In this paper, a brief review on passive digital image forensic methods is presented in order to provide a comprehensive introduction on recent advances in this rapidly developing research area. These forensics approaches are divided into three categories based on the various kinds of traces they can be used to track—that is, traces left in image acquisition, traces left in image storage, and traces left in image editing. For each category, the forensics scenario, the underlying rationale, and state-of-the-art methodologies are elaborated. Moreover, the major limitations of the current image forensics approaches are discussed in order to point out some possible research directions or focuses in these areas.",4,1,29,39,Image (mathematics); Point (typography); Information retrieval; Image editing; Originality; Digital image forensics; Image forensics; Industrial research; Computer science; Digital image,,,,National Key Research and Development Program of China; National Natural Science Foundation of China,https://www.sciencedirect.com/science/article/abs/pii/S2095809917307890 https://doaj.org/article/dd2687b7552b4ef6a0613888c6233afa https://www.sciencedirect.com/science/article/pii/S2095809917307890 https://engineering.org.cn/EN/10.1016/j.eng.2018.02.008 https://core.ac.uk/display/155265417,http://dx.doi.org/10.1016/j.eng.2018.02.008,,10.1016/j.eng.2018.02.008,2789856658,,0,000-679-477-475-489; 000-830-145-464-213; 000-980-904-065-103; 001-266-582-641-136; 001-413-792-295-769; 001-604-584-964-130; 004-377-809-881-072; 004-690-012-680-59X; 006-715-003-756-565; 009-566-662-446-07X; 015-708-405-109-070; 016-617-865-487-243; 017-522-442-322-636; 017-853-220-883-872; 018-677-312-546-562; 019-016-663-630-510; 022-296-050-330-096; 024-148-241-973-367; 024-806-781-026-020; 025-410-507-609-210; 027-757-905-863-260; 034-121-155-020-714; 034-785-721-591-194; 035-182-747-171-407; 036-155-644-690-629; 036-341-049-220-437; 039-604-410-537-357; 040-499-338-725-508; 041-838-544-052-666; 042-324-311-104-451; 044-144-587-337-904; 045-496-560-764-477; 047-322-910-540-450; 049-241-042-800-133; 054-167-448-698-763; 057-831-748-324-829; 067-303-718-151-959; 067-768-123-984-732; 067-913-828-134-760; 076-346-829-732-533; 076-704-896-134-67X; 077-604-852-329-975; 080-794-266-877-942; 083-495-367-906-30X; 084-016-117-488-972; 085-735-767-631-723; 087-814-787-159-954; 087-895-411-431-312; 099-917-904-062-017; 101-435-060-435-239; 106-688-419-298-857; 106-908-142-273-164; 108-896-114-392-841; 110-050-634-028-069; 112-077-011-771-30X; 122-001-451-301-450; 125-328-926-232-377; 136-713-989-335-402; 141-099-823-545-470; 143-695-756-474-732; 152-785-842-665-362; 155-074-178-700-550; 155-355-077-713-919; 159-132-926-596-284; 162-699-965-110-190; 169-110-142-355-656; 180-552-666-228-97X; 182-017-605-279-245; 184-897-235-429-285,47,true,"CC BY, CC BY-NC-ND",gold
066-786-352-814-166,Smoothing Filtering Detection for Digital Image Forensics: Smoothing Filtering Detection for Digital Image Forensics,2014-02-27,2014,journal article,Journal of Electronics & Information Technology,10095896,China Science Publishing & Media Ltd.,China,Jun-yu Xu; Yu-ting Su,,35,10,2287,2293,Artificial intelligence; Digital image forensics; Computer vision; Smoothing; Computer science,,,,,http://pub.chinasciencejournal.com/article/getArticleRedirect.action?doiCode=10.3724/SP.J.1146.2013.00131,http://dx.doi.org/10.3724/sp.j.1146.2013.00131,,10.3724/sp.j.1146.2013.00131,2323274304,,0,,3,false,,
066-807-833-482-350,Smart TV forensics,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Abdul Boztas; A.R.J. Riethoven; Mark Roeloffs,"The Smart TV is becoming increasingly popular amongst consumers. Many consumers use a Smart TV to gain quick access to the Internet including video on demand, social networking and instant messaging. Most Smart TVs also provide capabilities to connect with external devices such as a USB flash drive, a mobile phone etc. All of these features make a Smart TV a potentially rich source of information for forensic purposes. With increasing utilisation, it is also easier for malicious users to abuse a Smart TV. Therefore a digital forensics study on the field of Smart TV is imperative. This paper proposes new procedures for acquiring, analysing and investigating a Smart TV.",12,,S72,S80,The Internet; Mobile phone; USB flash drive; Instant messaging; Cyber crime; Video on demand; Field (computer science); Computer security; Computer science; Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287615000134 https://doi.org/10.1016/j.diin.2015.01.012 https://www.sciencedirect.com/science/article/pii/S1742287615000134 https://www.researchgate.net/profile/A_Boztas/publication/273261826_Smart_TV_forensics_Digital_traces_on_televisions/links/55acc73e08aea3d08686109b.pdf https://core.ac.uk/display/82823751 https://dblp.uni-trier.de/db/journals/di/di12.html#BoztasRR15 https://dl.acm.org/doi/10.1016/j.diin.2015.01.012,http://dx.doi.org/10.1016/j.diin.2015.01.012,,10.1016/j.diin.2015.01.012,2028651713,,0,002-927-911-483-709; 003-504-554-245-316; 017-815-064-018-299; 024-385-303-080-230; 063-377-383-491-594; 074-933-143-629-826; 085-214-277-668-01X,21,true,cc-by-nc-nd,hybrid
067-310-016-898-527,Forensic Psychology: Profiling Criminal Mindset In Sexual Offenders,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yugal Pathak,,,,,,Profiling (information science); Psychology; Forensic psychology; Mindset; Criminology,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.01,http://dx.doi.org/10.46293/4n6/2021.03.02.01,,10.46293/4n6/2021.03.02.01,3162615181,,0,,0,false,,
067-329-399-496-102,A Two-Stage Model for Social Network Investigations in Digital Forensics,,2020,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Anne David; Sarah Morris; Gareth Appleby-Thomas,,15,2,1,,Stage (hydrology); Digital evidence; Computer security; Computer science; Information security; Digital forensics; Social network,,,,,https://commons.erau.edu/jdfsl/vol15/iss2/1/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1667&context=jdfsl https://dspace.lib.cranfield.ac.uk/handle/1826/15732,http://dx.doi.org/10.15394/jdfsl.2020.1667,,10.15394/jdfsl.2020.1667,3081425919,,0,004-866-932-432-464; 009-386-221-930-423; 010-985-077-415-59X; 017-358-994-049-12X; 018-182-926-340-45X; 018-696-253-395-568; 041-231-462-732-579; 044-838-289-309-637; 083-748-184-402-072; 106-885-306-836-498; 126-171-514-582-85X; 167-109-432-601-404; 197-981-316-485-16X,2,true,cc-by-nc,gold
067-429-157-490-697,The Impact of MD5 File Hash Collisions On Digital Forensic Imaging,,2016,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Gary C. Kessler,,11,4,9,,Collision; World Wide Web; MD5; Forensic imaging; Computer security; Computer science; Computer forensics; Digital forensics,,,,,https://commons.erau.edu/jdfsl/vol11/iss4/9/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1431&context=jdfsl https://works.bepress.com/gary_kessler/90/ https://doi.org/10.15394/jdfsl.2016.1431 https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#Kessler16 https://works.bepress.com/gary_kessler/90/download/,http://dx.doi.org/10.15394/jdfsl.2016.1431,,10.15394/jdfsl.2016.1431,2620422179,,0,094-227-042-630-139; 124-466-422-768-986; 167-398-164-200-13X,3,true,cc-by-nc,gold
067-475-744-304-50X,Educational egaming: the future for geoscience virtual learners?,2014-07-15,2014,journal article,Geology Today,02666979; 13652451,Wiley,United Kingdom,Jamie K. Pringle,"Current students will mostly comprise the so-called ‘Generation Y’, who have grown up with personal computer and egaming technologies. Used to a variety of digital learning environments, it is probable that, for them at least, educational egaming may provide effective learning, complementary to more traditional teaching methods. Current geoscience digital educational methods are briefly reviewed and examined through three case studies of online educational geoscience egames. These are shown to provide a consistent experience, ‘24/7’ accessibility and effective learning.",30,4,147,150,Geology; Variety (cybernetics); Earth science; Digital learning; Personal computer; Educational method; Teaching method,,,,,https://onlinelibrary.wiley.com/doi/10.1111/gto.12058 https://core.ac.uk/display/43759983 https://core.ac.uk/download/43759983.pdf,http://dx.doi.org/10.1111/gto.12058,,10.1111/gto.12058,2079790978,,0,,12,true,,green
067-577-414-064-539,Digital Forensic Science: A Manifesto,2016-12-16,2016,journal article,South African Computer Journal,23137835; 10157999,South African Institute of Computer Scientists and Information Technologists,South Africa,Martin S. Olivier,"Forensic examination of evidence holds the promise of making claims about the truth of certain propositions with the inherent accuracy; and reliability that characterises scientific endeavours. The propositions may relate to the artefacts examined or related artefacts. The; nature of propositions about which claims can be made depend on the extent to which given propositions fall within the ambit of scientific; knowledge and on the extent to which the examined evidence is suitable for the application of established science. A continuing series; of incidents illustrate that in many forensic disciplines that promise is not met — often because some branch of forensic science happen; to not being scientific at all. In fact, serious assessments of forensic science have shown that many (if not most) branches of forensic; science are not scientifically valid.; Digital forensic science is one of the newest members of the family of forensic sciences. A number of reasons for concern exist that; it is following in the footsteps of its more established footsteps and repeating many of the mistakes of those other branches of forensic; science.; This viewpoint is written in the form of a manifesto that is situated in the current discourse about digital forensic science and practice.; If challenges the current developments in digital forensic science by positing a number of demands that digital forensic science have to; meet to be deemed scientific. The demands are posited as necessary, but not sufficient to ensure that digital forensic science uses science; to contribute to justice. Appropriate responses to the manifesto is a change in digital forensic developments or an informed debate about; the issues raised in the manifesto.",28,2,46,49,Situated; Forensic science; Sociology; Sociology of scientific knowledge; Law; Justice (ethics); Manifesto; Forensic examination; Questioned document examination; Engineering ethics; Digital forensics,,,,,https://doaj.org/article/fd3996c6cd6a4b50a4c43cb3dcef8058 https://sacj.cs.uct.ac.za/index.php/sacj/article/view/442 https://core.ac.uk/display/90989195 https://doi.org/10.18489/sacj.v28i2.442 https://dblp.uni-trier.de/db/journals/saj/saj28a.html#Olivier16 https://sacj.cs.uct.ac.za/index.php/sacj/article/download/442/194 https://www.dspace.up.ac.za/handle/2263/60561 https://repository.up.ac.za/handle/2263/60561,http://dx.doi.org/10.18489/sacj.v28i2.442,,10.18489/sacj.v28i2.442,2566075325,,0,,5,true,cc-by-nc,gold
067-618-189-888-272,A practical overview and comparison of certain commercial forensic software tools for processing large-scale digital investigations,2013-05-28,2013,journal article,SPIE Proceedings,0277786x,SPIE,,Knut Kröger; Reiner Creutzburg,"The aim of this paper is to show the usefulness of modern forensic software tools for processing large-scale digital; investigations. In particular, we focus on the new version of Nuix 4.2 and compare it with AccessData FTK 4.2, X-Ways; Forensics 16.9 and Guidance Encase Forensic 7 regarding its performance, functionality, usability and capability. We; will show how these software tools work with large forensic images and how capable they are in examining complex and; big data scenarios.",8755,,875519,,Software engineering; World Wide Web; Forensic science; Usability; Software; Scale (chemistry); Computer science; Computer forensics; Big data,,,,,https://ui.adsabs.harvard.edu/abs/2013SPIE.8755E..19K/abstract https://www.spiedigitallibrary.org/conference-proceedings-of-spie/8755/1/A-practical-overview-and-comparison-of-certain-commercial-forensic-software/10.1117/12.2017906.full https://www.researchgate.net/profile/Knut_Bellin/publication/258332973_A_practical_overview_and_comparison_of_certain_commercial_forensic_software_tools_for_processing_large-scale_digital_investigations/links/00b495293485547b83000000.pdf,http://dx.doi.org/10.1117/12.2017906,,10.1117/12.2017906,2050839987,,0,110-751-128-408-714; 165-770-474-971-736; 176-612-730-669-225,1,false,,
067-840-274-503-047,An ad hoc detailed review of digital forensic investigation process models,,2016,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Reza Montasari,"For the past decade, digital forensics has been the subject of scientific study, and as a result it has become an established research and application field. One of the foundational methods in which the researchers in the field have attempted to comprehend the scientific basis of this discipline has been to develop models which reflect their observations. Various process models have been developed describing the steps and processes to follow during a digital forensic investigation. This paper provides a detailed review of 11 published papers representing digital forensic process models. The aim of this review is to gain background knowledge of the existing research on the digital forensic investigation process models and the problems associated with those models.",8,3,205,223,Data science; Digital forensic process; Subject (documents); Digital forensic investigation; Field (computer science); Computer science; Computer forensics; Scientific study; Process modeling; Digital forensics,,,,,https://pure.hud.ac.uk/en/publications/an-ad-hoc-detailed-review-of-digital-forensic-investigation-proce https://dx.doi.org/10.1504/IJESDF.2016.077444 http://dx.doi.org/10.1504/IJESDF.2016.077444 https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf8.html#Montasari16 https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2016.077444 https://dl.acm.org/citation.cfm?id=2974526 https://dl.acm.org/doi/10.1504/IJESDF.2016.077444 https://www.open-access.bcu.ac.uk/4547/ http://www.inderscience.com/link.php?id=77444 https://cronfa.swan.ac.uk/Record/cronfa54941,http://dx.doi.org/10.1504/ijesdf.2016.077444,,10.1504/ijesdf.2016.077444,2465829845,,0,004-652-388-189-304; 004-872-169-627-620; 005-515-442-506-880; 007-314-571-885-858; 010-086-703-646-194; 019-831-293-743-518; 020-944-423-224-895; 021-486-901-460-202; 021-850-998-857-676; 026-774-296-742-022; 031-234-153-523-379; 032-697-093-668-898; 038-668-970-194-854; 063-274-848-736-685; 067-844-385-207-96X; 074-014-335-505-388; 085-214-277-668-01X; 087-041-369-426-333; 130-733-989-451-876; 132-355-634-397-986; 133-397-275-695-990; 140-821-103-436-654; 143-562-788-834-457; 162-110-149-751-921; 172-965-192-520-527; 179-881-224-143-743; 184-948-841-629-735; 190-065-821-748-92X; 190-872-133-741-434; 192-810-463-153-431; 199-172-967-270-034; 199-745-676-923-766,12,false,,
067-844-385-207-96X,Digital forensics: An Analytical Crime Scene Procedure Model (ACSPM),2013-09-13,2013,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Halil Ibrahim Bulbul; H. Güçlü Yavuzcan; Mesut Ozel,,233,1,244,256,Chain of custody; Crime scene; Data science; Law enforcement; Digital evidence; Computer security; Computer science; Process (engineering); Computer forensics; Process modeling; Digital forensics,Chain of custody (COC); Crime scene; Digital evidence; Digital forensics; Procedure model; Standard operating procedure (SOP),"Documentation; Forensic Sciences/organization & administration; Humans; Information Storage and Retrieval/methods; Microcomputers; Models, Organizational; Quality Control",,,https://europepmc.org/article/MED/24314526 http://www.sciencedirect.com/science/article/pii/S0379073813004155 https://pubmed.ncbi.nlm.nih.gov/24314526/ https://www.sciencedirect.com/science/article/abs/pii/S0379073813004155 https://www.ncbi.nlm.nih.gov/pubmed/24314526,http://dx.doi.org/10.1016/j.forsciint.2013.09.007,24314526,10.1016/j.forsciint.2013.09.007,1965613196,,0,001-009-008-665-240; 002-534-435-127-422; 002-856-570-549-435; 004-872-169-627-620; 005-515-442-506-880; 010-086-703-646-194; 017-815-064-018-299; 019-831-293-743-518; 020-944-423-224-895; 021-486-901-460-202; 021-850-998-857-676; 022-723-185-375-121; 024-381-049-056-789; 032-246-414-391-330; 032-697-093-668-898; 034-497-160-604-138; 035-223-520-491-228; 038-668-970-194-854; 047-630-600-014-492; 060-808-935-547-406; 067-950-012-629-210; 083-366-581-383-158; 090-792-295-657-205; 092-058-232-746-872; 099-717-679-430-808; 101-093-348-378-723; 111-090-978-711-139; 120-697-354-224-33X; 122-880-373-616-302; 125-384-800-661-375; 128-301-609-429-087; 132-355-634-397-986; 133-397-275-695-990; 134-927-490-231-285; 135-717-892-795-412; 138-097-495-143-351; 141-445-106-549-822; 151-378-930-836-964; 161-299-499-071-016; 165-770-474-971-736; 170-299-458-679-224; 173-034-553-635-460; 180-327-460-336-608; 183-000-233-873-221; 183-155-928-447-559; 184-948-841-629-735; 186-502-029-675-526; 190-065-821-748-92X; 199-172-967-270-034; 199-745-676-923-766,32,false,,
068-030-546-112-691,Healthcare Data Breaches: Implications for Digital Forensic Readiness,2018-11-28,2018,journal article,Journal of medical systems,1573689x; 01485598,Springer New York,United States,Maxim Chernyshev; Sherali Zeadally; Zubair A. Baig,"While the healthcare industry is undergoing disruptive digital transformation, data breaches involving health information are not usually the result of integration of new technologies. Based on published industry reports, fundamental security safeguards are still considered to be lacking with many documented data breaches occurring as the result of device and equipment theft, human error, hacking, ransomware attacks and misuse. Health information is considered to be one of the most attractive targets for cybercriminals due to its inherent sensitivity, but digital investigations of incidents involving health information are often constrained by the lack of the necessary infrastructure forensic readiness. Following the analysis of healthcare data breach causes and threats, we describe the associated digital forensic readiness challenges in the context of the most significant incident causes. With specific focus on privilege misuse, we present a conceptual architecture for forensic audit logging to assist with capture of the relevant digital artefacts in support of possible future digital investigations.",43,1,7,,Internet privacy; Digital transformation; Health informatics; Data breach; Human error; Audit; Ransomware; Context (language use); Computer science; Digital forensics,Computer crime; Forensics; Health information management; Security; Threat,Computer Security/standards; Confidentiality/legislation & jurisprudence; Electronic Health Records/organization & administration; Forensic Sciences/organization & administration; Health Information Management/legislation & jurisprudence; Humans,,,https://link.springer.com/article/10.1007/s10916-018-1123-2 https://www.ncbi.nlm.nih.gov/pubmed/30488291 https://ro.ecu.edu.au/ecuworkspost2013/5571/ https://pubmed.ncbi.nlm.nih.gov/30488291/ https://doi.org/10.1007/s10916-018-1123-2 http://dro.deakin.edu.au/view/DU:30121030 https://dblp.uni-trier.de/db/journals/jms/jms43.html#ChernyshevZB19 http://hdl.handle.net/10536/DRO/DU:30121030,http://dx.doi.org/10.1007/s10916-018-1123-2,30488291,10.1007/s10916-018-1123-2,2902689954,,0,002-840-278-571-874; 003-803-242-209-367; 015-646-976-755-729; 022-119-460-083-705; 024-703-308-745-394; 026-774-296-742-022; 032-697-093-668-898; 034-263-766-060-719; 043-979-280-803-957; 046-988-024-816-111; 049-404-833-736-24X; 056-205-328-777-528; 060-294-953-084-788; 060-743-410-850-643; 066-671-350-861-612; 082-305-594-294-343; 089-032-971-972-861; 103-511-904-468-642; 107-829-974-201-674; 115-621-396-169-875; 142-437-368-699-894; 165-966-337-114-740; 172-820-491-934-626; 183-660-639-259-524; 184-948-841-629-735,39,false,,
068-211-549-219-606,“Hello are you available?” Dealing with online frauds and the role of forensic science,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Olivier Ribaux; Thomas R. Souvignet,"Abstract On August 6, 2019, the 119 members of the School of criminal justice, forensic science and criminology at the University of Lausanne were the target of an online scammer. His/her modus operandi consisted of email masquerading as the Director of the School in an attempt to induce the victims to buy digital gift cards and to transmit the card usage code to the perpetrator. The first author of this paper is the Director of the School, and the second is an expert in digital forensic science and a professor of the School. They worked together in real time to deal with the fraud. Because the fraud occurred in a School of forensic science and criminology, it raised many questions on a variety of overlapping dimensions. The objective of this study was, therefore, to draw lessons from this case from several perspectives ranging from forensic science to cybersecurity, and from practical to academic. The response to the incident has been treated in four typical distinguishable phases: (1) fraud detection; (2) crisis management; (3) post-incident analysis; and (4) reporting to different communities. We conclude this paper by taking lessons from the case to express the essential role of forensic knowledge and crime analysis in interpreting the information conveyed by digital traces to develop innovative cross-disciplinary models for preventing, detecting, analysing, investigating and responding to online fraud.",33,,300978,,Criminal justice; Variety (cybernetics); Forensic science; Sociology; Code (semiotics); Crime analysis; Crisis management; Public relations; Digital forensics,,,,University of Lausanne,https://doi.org/10.1016/j.fsidi.2020.300978 https://serval.unil.ch/notice/serval:BIB_7054F13E76E6 https://www.sciencedirect.com/science/article/pii/S2666281720300810 https://dblp.uni-trier.de/db/journals/di/di33.html#RibauxS20 https://www.sciencedirect.com/science/article/pii/S2666281720300810#! https://core.ac.uk/download/pdf/322688129.pdf,http://dx.doi.org/10.1016/j.fsidi.2020.300978,,10.1016/j.fsidi.2020.300978,3016060622,,0,000-283-292-553-62X; 002-436-870-952-778; 004-373-624-183-050; 006-129-047-122-458; 009-512-003-529-193; 010-951-806-548-929; 015-168-306-989-485; 019-698-064-288-240; 022-358-546-399-506; 030-859-592-601-192; 031-234-153-523-379; 033-400-782-766-385; 039-145-979-009-196; 042-289-392-240-47X; 044-051-299-105-401; 047-976-235-338-816; 064-549-392-650-90X; 078-448-713-257-099; 078-601-393-355-906; 084-861-292-090-257; 090-538-331-138-469; 091-081-161-718-514; 091-511-454-565-387; 093-272-440-861-895; 109-079-071-485-920; 112-856-054-215-074; 115-531-623-920-069; 157-049-748-215-425,2,true,cc-by-nc-nd,hybrid
068-386-024-387-716,Prelim i - Editorial Board,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,40,,301366,301366,Editorial board; Business; Computer science; Library science,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00038-5,,10.1016/s2666-2817(22)00038-5,,,0,,0,true,,bronze
068-508-915-657-575,Optimizing search strategies in mass grave location through the combination of digital technologies,2019-06-03,2019,journal article,Forensic science international. Synergy,2589871x,Elsevier BV,Netherlands,D. Abate; C. Sturdy Colls; N. Moyssi; D. Karsili; M. Faka; A. Anilir; S. Manolis,"Abstract Efforts to locate missing persons resulting from conflict often centre of excavation. Although this approach is the only way to definitively confirm the presence of human remains, it can be costly and labour-intensive, particularly when large areas need to be searched. This paper discusses a wide range of emerging non-invasive digital methods implemented with a view to locating burials and mass graves and increase the excavation recovery rate of the Committee on Missing Persons in Cyprus (CMP). Aerial and terrestrial survey and subsequent 3D modelling were combined with geophysical survey in order to record sites, two of which were excavated to ground-truth the findings. The results demonstrated the effectiveness of these techniques in defining the search parameters of potential burial sites and prioritizing features for investigation. The nature of the collaboration between archaeologists, digital technologists, and forensic experts allowed mutual trust to be built between all parties, whilst also testing the effectiveness of the methods employed.",1,,95,107,Photogrammetry; Data science; Geophysical survey (archaeology); Forensic archaeology; Recovery rate; Excavation; Computer science; Ground-penetrating radar,Digital technologies; Forensic archaeology; Geophysics; Ground penetrating radar; Missing persons; Photogrammetry,,,Marie Sklodowska-Curie Action; Digital Forensic Archaeology,http://eprints.staffs.ac.uk/5681/ https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7219194 https://www.sciencedirect.com/science/article/pii/S2589871X19300828 https://core.ac.uk/download/pdf/210991644.pdf,http://dx.doi.org/10.1016/j.fsisyn.2019.05.002,32411961,10.1016/j.fsisyn.2019.05.002,2948978223,PMC7219194,0,000-936-621-181-317; 004-086-552-514-938; 005-676-466-381-741; 007-036-175-939-263; 012-426-089-826-902; 016-225-015-230-107; 019-763-357-518-984; 025-094-429-798-148; 028-141-955-184-339; 028-205-528-233-343; 034-157-734-842-610; 034-811-831-798-66X; 039-425-885-215-040; 039-770-514-496-83X; 041-265-951-641-438; 066-952-151-953-603; 077-583-394-896-234; 079-602-164-850-584; 079-632-479-718-155; 088-475-666-056-708; 090-878-982-570-90X; 096-031-767-202-21X; 104-379-057-063-150; 105-716-388-241-40X; 106-619-341-791-430; 109-238-249-157-146; 116-918-248-369-633; 132-982-288-075-986; 140-362-010-096-283; 141-104-202-460-179; 155-896-090-630-255; 169-285-065-757-76X; 195-623-056-826-585,9,true,"CC BY, CC BY-NC-ND",gold
068-558-695-475-467,Dilemmas in Digital Forensics for Computer Equipment Security and Maintenance in Remote Ships,,2012,journal article,Advanced Materials Research,16628985,"Trans Tech Publications, Ltd.",,Hu Chen,"As remote ships have equipped a large number of computer equipments, the maintenance of such equipments confronts a great challenge. Since some embedded devices among them may be hacked by attackers or disabled by Byzantine failure, to discover the attacking originality and fault source present foremost importance. In this article, we discuss digital investigation and forensics as a general viewpoint. We point out some dilemmas that hinder the development of digital forensics, some of which may be fundamental problems. We propose to expand the concept of digital forensics to a wider scope so as to include digital investigation for information instead of only evidence. We also argue that the fostering of novel contributions should be relied on technical experts instead of law experts as emerging new techniques always result in new digital crimes. We promote the divorce between the technical experts who focus on the contribution of technologies, and legal authorities who are responsible to bridge the gap between technologies and standard/formalization. Digital forensics methods are encouraged to be publicly available, but the contributors should be aware of the possibility of anti-forensics.",490-495,,1382,1386,Forensic science; Bridge (nautical); Point (typography); Originality; Scope (project management); Computer security; Focus (computing); Computer science; Computer forensics; Digital forensics,,,,,https://www.scientific.net/AMR.490-495.1382,http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.1382,,10.4028/www.scientific.net/amr.490-495.1382,2025495556,,0,030-359-893-882-572; 042-230-817-975-353; 045-243-807-828-458; 049-216-276-407-671; 081-933-261-712-915; 134-927-490-231-285,0,false,,
068-565-513-246-053,Physical security design of a digital forensic lab,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Doug Weeks; Bing Zhou,The physical security design of a digital forensic lab is one of the key components to ensure investigators are providing a secure environment to process and store evidence that has been entrusted ...,13,1,418,444,Key (cryptography); Physical security; Computer security; Computer science; Process (engineering); Access control; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.116017,http://dx.doi.org/10.1504/ijesdf.2021.10033951,,10.1504/ijesdf.2021.10033951,3107912113,,0,,0,false,,
068-669-641-930-403,Theory of Information and Computer Support for Forensic Expert Activities as a New Private Theory of Forensic Expertology,2022-05-08,2022,journal article,Courier of Kutafin Moscow State Law University (MSAL)),27826163; 23115998,Kutafin Moscow State Law University,,E. R. Rossinskaya,"From the stand point of global digitalization, the article substantiates the creation of a new private theory of forensic expertology — the theory of information and computer support of forensic expert activity. The author outlines the main stages of the genesis the processes of automation and informatization for forensic research. At the first stage, in the mid-60s, many works related to the use of cybernetics in the automation of certain types of forensic examinations appeared in the forensic literature. The second stage occurred at the end of the 80s — 90s of the XX century, when the integration of new information technologies, mainly of a technological nature, began to develop in five main directions, thanks to the development of computer technology. In the early 2000s, the third stage of informatization and computerization of forensic expertise began. The processes of digitalization in forensic activity gave a new impetus to the development of not only the areas of information and computer support, which continued to improve, but also the emergence of research in many kinds (types) forensic examinations of new objects expert research — digital footprints. The author states that there was no theoretical basis for their forensic expert research in forensic expertology. Therefore, a new private theory (teaching) of forensic expertology has been developed — the theory of digitalization for forensic expert activity. The subject of this theory and its objects, the place of the new theory in forensic expertology are described. It has been proved that the theory of digitalization for forensic activity, due to the increasingly global nature of digitalization, can be attributed to several private theories, the provisions of which equally apply both to the process of expert research as a whole and to expert research of certain types of expertise. The modern theory of digitalization of forensic activities includes two areas: a system of information and computer support for forensic activities and forensic research of digital footprints.",,2,27,40,Informatization; Computer forensics; Forensic science; Digital forensics; Automation; Computer science; Digital evidence; Expert system; Data science; Engineering ethics; Engineering; Artificial intelligence; Computer security; World Wide Web; History; Mechanical engineering; Archaeology,,,,,,http://dx.doi.org/10.17803/2311-5998.2022.90.2.027-040,,10.17803/2311-5998.2022.90.2.027-040,,,0,,0,true,,hybrid
068-931-665-572-533,A Forensic Traceability Index in Digital Forensic Investigation,2013-01-30,2013,journal article,Journal of Information Security,,,,Siti Rahayu Selamat; Shahrin Sahib; Nor Hafeizah; Robiah Yusof; Mohd Faizal Abdollah,"Digital crime inflicts immense damage to users and systems and now it has reached a level of sophistication that makes it difficult to track its sources or origins especially with the advancements in modern computers, networks and the availability of diverse digital devices. Forensic has an important role to facilitate investigations of illegal activities and inappropriate behaviors using scientific methodologies, techniques and investigation frameworks. Digital forensic is developed to investigate any digital devices in the detection of crime. This paper emphasized on the research of traceability aspects in digital forensic investigation process. This includes discovering of complex and huge volume of evidence and connecting meaningful relationships between them. The aim of this paper is to derive a traceability index as a useful indicator in measuring the accuracy and completeness of discovering the evidence. This index is demonstrated through a model (TraceMap) to facilitate the investigator in tracing and mapping the evidence in order to identify the origin of the crime or incident. In this paper, tracing rate, mapping rate and offender identification rate are used to present the level of tracing ability, mapping ability and identifying the offender ability respectively. This research has a high potential of being expanded into other research areas such as in digital evidence presentation.",2013,1,19,32,Tracing; Forensic science; Traceability; Sophistication; Data science; Digital evidence; Digital forensic investigation; Research areas; Computer security; Computer science; Digital forensics,,,,,https://m.scirp.org/papers/27549 https://www.scirp.org/Journal/PaperDownload.aspx?paperID=27549 http://eprints.utem.edu.my/6777/ https://file.scirp.org/Html/4-7800122_27549.htm https://file.scirp.org/pdf/JIS_2013013014233287.pdf https://www.scirp.org/journal/PaperInformation.aspx?paperID=27549,https://m.scirp.org/papers/27549,,,2102916229,,0,006-004-640-148-035; 010-086-703-646-194; 012-779-911-526-394; 017-358-994-049-12X; 018-245-873-246-94X; 019-698-064-288-240; 020-064-435-529-922; 020-944-423-224-895; 024-917-519-955-520; 025-166-987-232-333; 030-809-391-871-561; 032-697-093-668-898; 038-668-970-194-854; 038-704-079-905-560; 040-823-216-153-224; 044-147-389-377-300; 050-513-243-638-138; 056-615-247-058-312; 056-889-959-233-076; 062-202-545-220-180; 069-894-023-646-007; 102-528-798-484-730; 102-602-192-826-532; 114-592-978-453-407; 124-837-341-752-034; 125-384-800-661-375; 132-089-355-719-664; 133-232-608-554-796; 133-397-275-695-990; 134-927-490-231-285; 137-203-237-364-717; 138-253-866-510-07X; 140-821-103-436-654; 170-108-067-251-840; 170-299-458-679-224; 171-886-869-522-486; 177-069-167-035-120; 180-327-460-336-608; 190-065-821-748-92X; 199-172-967-270-034; 199-745-676-923-766,11,false,,
069-051-070-055-052,Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone,2016-03-11,2016,journal article,Jurnal Edukasi dan Penelitian Informatika (JEPIN),25489364; 24600741,Tanjungpura University,,Ruuhwan Ruuhwan; Riadi; Yudi Prayudi,"Perkembangan teknologi yang semakin pesat, dapat menimbulkan permasalahan bagi pengguna teknologi itu sendiri, semakin maju kehidupan masyarakat, maka kejahatan juga ikut semakin maju. Smartphone merupakan salah satu bentuk teknologi yang digunakan untuk melakukan penipuan melalui fasilitas Short Message Service ( SMS). Pada saat smartphone yang digunakan untuk melakukan kejahatan maka smartphone tersebut dapat disita oleh aparat penegak hukum sebagai salah satu barang bukti. Cara pembuktian untuk mendapatkan bukti yang valid adalah dengan melakukan investigasi menggunakan pendekatan penanganan bukti digital yang dikenal dengan istilah Framework. Integrated Digital Forensics Investigation Framework versi 2 (IDFIF v2) merupakan framework terbaru yang telah dikembangkan sehingga dapat digunakan untuk proses investigasi smartphone . Kata kunci — Barang Bukti, Framework, IDFIF v2, Smartphone",2,1,,,,,,,,https://doaj.org/article/454dedfda585445eb288e74b545be9b4 https://core.ac.uk/display/88097479 https://core.ac.uk/download/pdf/294889013.pdf,http://dx.doi.org/10.26418/jp.v2i1.14369,,10.26418/jp.v2i1.14369,2295828917,,0,,3,true,cc-by-nc-sa,gold
069-073-265-694-871,Information assurance in a distributed forensic cluster,,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Nick Pringle; Mikhaila Burgess,"Abstract When digital forensics started in the mid-1980s most of the software used for analysis came from writing and debugging software. Amongst these tools was the UNIX utility ‘dd’ which was used to create an image of an entire storage device. In the next decade the practice of creating and using ‘an image’ became established as a fundamental base of what we call ‘sound forensic practice’. By virtue of its structure, every file within the media was an integrated part of the image and so we were assured that it was wholesome representation of the digital crime scene. In an age of terabyte media ‘the image’ is becoming increasingly cumbersome to process, simply because of its size. One solution to this lies in the use of distributed systems. However, the data assurance inherent in a single media image file is lost when data is stored in separate files distributed across a system. In this paper we assess current assurance practices and provide some solutions to the need to have assurance within a distributed system.",11,,S36,S44,Unix; World Wide Web; Debugging; Crime scene; Terabyte; Software; Information assurance; Computer science; Multimedia; Image file formats; Digital forensics,,,,European Social Fund,http://www.sciencedirect.com/science/article/pii/S1742287614000103 https://doi.org/10.1016/j.diin.2014.03.005 https://core.ac.uk/display/81935556 https://www.sciencedirect.com/science/article/pii/S1742287614000103 https://core.ac.uk/download/pdf/81935556.pdf,http://dx.doi.org/10.1016/j.diin.2014.03.005,,10.1016/j.diin.2014.03.005,2059728478,,0,021-563-550-669-43X; 024-721-343-226-994; 029-632-996-742-459; 033-877-222-136-260; 039-449-793-715-298; 050-513-243-638-138; 055-090-334-937-061; 060-799-847-178-231; 067-938-325-014-282; 079-070-981-899-105; 117-239-595-156-183; 134-927-490-231-285,11,true,cc-by-nc-nd,hybrid
069-164-282-798-000,The Need for Digital Evidence Standardisation,2012-04-01,2012,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Marthie Grobler,"Continuous developments in forensic processes and tools have aided in elevating the positioning of digital forensics within the legal system. The equally continuous developments in technology and electronic advances, however, are making it more difficult to match forensic processes and tools with the advanced technology. Therefore, it is necessary to create and maintain internationally accepted standards to control the use and application of digital forensic processes. This article addresses this need and touches on the motivation for such internationally recognised standards on digital evidence. It also looks at current work in and progress towards the establishment of digital evidence related documents addressing all phases of the digital forensic process.
",4,2,1,12,Data science; Digital evidence; Computer science,,,,,https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf4.html#Grobler12 https://www.igi-global.com/article/need-digital-evidence-standardisation/68406 https://doi.org/10.4018/jdcf.2012040101,http://dx.doi.org/10.4018/jdcf.2012040101,,10.4018/jdcf.2012040101,1975327969,,0,002-383-410-319-043; 033-483-431-452-962; 075-268-039-596-63X; 130-388-474-945-856; 134-927-490-231-285; 135-193-618-945-495; 184-673-927-906-959,3,false,,
069-316-073-411-914,Anti-Forensics of Double Compressed MP3 Audio,2020-07-01,2020,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Tao Biaoli; Rangding Wang; Diqun Yan; Chao Jin,"The widespread availability of audio editing software has made it easy to create acoustically convincing digital audio forgeries. To address this problem, more and more attention has been paid to the field of digital audio forensics. There has been little work, however, in the field of anti-forensics, which seeks to develop a set of techniques designed to fool current forensic methodologies. The compression history of an audio sample can be used to provide evidence of audio forgeries. In this work, we present a simple method for distinguishing the MP3 compression history of an audio sample. We show the proposed anti-forensics method to remove the artifacts of MP3 double compression by destroying the audio frame structure. In addition, effectiveness of the proposed method is verified by three double compression detection methods. The experimental results show that the proposed method can effectively resist detection from three methods.
",12,3,45,57,Computer science; Multimedia,,,,,https://www.igi-global.com/article/anti-forensics-of-double-compressed-mp3-audio/252867 https://doi.org/10.4018/IJDCF.2020070104 https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf12.html#TaoWYJ20,http://dx.doi.org/10.4018/ijdcf.2020070104,,10.4018/ijdcf.2020070104,3015435865,,0,005-325-225-850-477; 022-418-214-623-366; 025-299-900-166-361; 047-785-731-846-383; 070-808-635-437-582; 083-096-013-375-486; 096-717-288-091-686; 096-850-419-858-983; 102-315-136-251-699; 104-863-352-596-739; 111-803-209-621-558; 131-238-245-074-287; 132-041-004-899-154; 136-614-990-140-254; 138-079-231-262-593; 158-255-630-508-816,1,true,,bronze
069-321-740-091-392,An Exploratory Study on Readiness Framework in IoT Forensics,,2021,journal article,Procedia Computer Science,18770509,Elsevier BV,,Nurul Huda Nik Zulkipli; Gary Wills,"Abstract Forensic readiness is important to ensure that the organization is fully prepared and well-equipped to be forensically ready to conduct the digital forensic investigation. Moreover, forensic readiness in IoT forensic investigation is different from the usual computer forensic readiness. This research discovered the importance of having the forensic readiness in place for the organization before conducting the IoT forensic investigation. Therefore, a readiness framework was proposed as a groundwork before further research is carried out. Literature on related this issues was collected, examined and criticized in order to scrutinize the impact factors in IoT forensics investigations. Finally, the proposed framework was validated by thirty experts from digital forensics in Malaysia using triangulation methods. From the results, this framework will be used in developing an instruments to measure readiness factors among digital forensics stakeholders.",179,,966,973,Forensic science; Data science; Digital forensic investigation; Computer science; Internet of Things; Digital forensics; Exploratory research,,,,"Ministry of Higher Education, Malaysia; Universiti Teknologi MARA",https://www.sciencedirect.com/science/article/pii/S1877050921001186,http://dx.doi.org/10.1016/j.procs.2021.01.086,,10.1016/j.procs.2021.01.086,3130874217,,0,002-383-410-319-043; 002-625-978-577-247; 006-435-365-660-88X; 010-791-676-072-730; 018-552-581-098-658; 021-486-901-460-202; 024-462-843-796-80X; 025-697-732-683-864; 044-927-515-004-191; 045-098-715-794-977; 046-143-775-958-052; 054-448-712-045-982; 058-723-704-218-926; 060-294-953-084-788; 065-654-832-541-493; 075-142-959-030-889; 097-675-162-158-578; 098-748-261-333-651; 104-249-629-797-999; 112-181-239-331-730; 125-334-982-415-97X; 173-791-408-962-068; 199-745-676-923-766,4,true,cc-by-nc-nd,gold
069-494-497-864-636,"Computers, Comics and Cult Status: A Forensics of Digital Graphic Novels.",,2014,journal article,Digital Humanities Quarterly,19384122,,,Jaime Lee Kirtz,,8,,,,Art; Visual arts; Cult; Multimedia; Comics,,,,,http://www.digitalhumanities.org/dhq/vol/8/3/000185/000185.html https://dblp.uni-trier.de/db/journals/dhq/dhq8.html#Kirtz14,http://www.digitalhumanities.org/dhq/vol/8/3/000185/000185.html,,,2401259812,,0,,0,true,cc-by-nd,gold
069-498-762-346-193,"File system anti-forensics - types, techniques and tools",,2020,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,Mohamad Ahtisham Wani; Ali Alzahrani; Wasim Ahmad Bhat,"Forensics paved the way for the growth of anti-forensics, and the time has come for anti-forensics to return the favour. For that purpose, it is imperative that forensic investigators and practitioners are armed with the knowledge of contemporary anti-forensics types, techniques and tools. This article aims to provide technical information and a comprehensive understanding of file system anti-forensics types, techniques and tools so as to facilitate investigators' ability to collect technically credible and legally admissible digital evidence from crime scenes. Forensics paved the way for the growth of anti-forensics, which tries to prevent, hinder or corrupt the forensic process of evidence acquisition and analysis. The time has come for anti-forensics to return the favour. Mohamad Ahtisham Wani, Ali AlZahrani and Wasim Ahmad Bhat provide technical information and a comprehensive understanding of file system anti-forensics types, techniques and tools so as to facilitate investigators' ability to collect technically credible and legally admissible digital evidence from crime scenes.",2020,3,14,19,Crime scene; Data science; Thesaurus (information retrieval); File system; Digital evidence; Technical information; Computer science; Process (engineering),,,,,https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002238962924261 https://www.sciencedirect.com/science/article/pii/S1361372320300300,http://dx.doi.org/10.1016/s1361-3723(20)30030-0,,10.1016/s1361-3723(20)30030-0,3011988910,,0,002-545-683-320-858; 003-526-475-150-199; 022-723-601-549-961; 036-835-610-186-319; 046-318-533-334-038; 048-060-373-393-81X; 065-061-509-329-026; 100-552-121-697-280; 102-253-978-450-757; 134-502-810-516-308; 135-260-956-420-429; 163-853-761-819-084,12,false,,
069-546-445-063-10X,An integrated open forensic environment for digital evidence investigation,2012-11-14,2012,journal article,Wuhan University Journal of Natural Sciences,10071202; 19934998,Springer Science and Business Media LLC,China,Jun Zhang; Lina Wang,"Nowadays, the capability of traditional digital forensic tools fails to meet the demand of ever increasing of criminal or civil cases. One of the challenges is that digital devices and applications are multifarious and changing quickly. Here, we propose a new mode for digital forensic tools utilization via integrating open-source single tools into a platform and setting up into Live DVD/USB. The platform, an Integrated Open Forensic Environment (named IOFE), takes full advantage of these tools and, at the same time, elevates its power and interoperability via standardized input/output data. The IOFE features conducting live and dead investigation and covers three consecutive major phases of digital forensics: acquisition, analysis, and presentation. Our experiments prove that IOFE can carry out manifold acquisition, interpretation, analysis, and presentation task of evidentiary data in an efficient and effective manner.",17,6,511,515,World Wide Web; Interoperability; Presentation; Task (project management); Digital evidence; Computer science; Mode (computer interface); Multimedia; USB; Digital forensics,,,,,https://link.springer.com/article/10.1007/s11859-012-0879-3 https://link.springer.com/content/pdf/10.1007%2Fs11859-012-0879-3.pdf,http://dx.doi.org/10.1007/s11859-012-0879-3,,10.1007/s11859-012-0879-3,2405017237,,0,019-456-366-483-584; 040-483-292-320-671; 050-513-243-638-138; 051-165-387-606-715; 072-072-328-028-440; 074-012-101-472-334; 123-477-592-483-85X; 142-855-067-627-071; 162-864-397-044-696,2,false,,
069-553-351-193-961,Anti-Forensic Trace Detection in Digital Forensic Triage Investigations,,2017,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Kyoung Jea Park; Jung Min Park; Eun-jin Kim; Chang Geun Cheon; Joshua I. James,,12,1,8,,Forensic science; Trace (semiology); Triage; Computer security; Computer science; Digital forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1421&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#ParkPKCJ17 https://commons.erau.edu/jdfsl/vol12/iss1/8/ https://paperity.org/p/84036003/anti-forensic-trace-detection-in-digital-forensic-triage-investigations,http://dx.doi.org/10.15394/jdfsl.2017.1421,,10.15394/jdfsl.2017.1421,2625580212,,0,015-995-636-621-324; 135-717-892-795-412,9,true,cc-by-nc,gold
069-884-249-384-899,Digital evidence and the crime scene.,2021-10-06,2021,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Graeme Horsman,"Abstract Many criminal investigations maintain an element of digital evidence, where it is the role of the first responder in many cases to both identify its presence at any crime scene, and assess its worth. Whilst in some instances the existence and role of a digital device at-scene may be obvious, in others, the first responder will be required to evaluate whether any ‘digital opportunities’ exist which could support their inquiry, and if so, where these are. This work discusses the potential presence of digital evidence at crime scenes, approaches to identifying it and the contexts in which it may exist, focusing on the investigative opportunities that devices may offer. The concept of digital devices acting as ‘digital witnesses’ is proposed, followed by an examination of potential ‘digital crime scene’ scenarios and strategies for processing them.",61,6,761,770,Criminal investigation; Crime scene; Work (electrical); Element (criminal law); Data science; First responder; Digital evidence; Digital device; Computer science; Digital forensics,Crime Scene; Digital Evidence; Digital Forensics; First Responder; Investigation,Crime; Humans,,,https://www.sciencedirect.com/science/article/pii/S1355030621001295,http://dx.doi.org/10.1016/j.scijus.2021.10.003,34802650,10.1016/j.scijus.2021.10.003,3205130440,,0,000-385-377-624-228; 007-447-468-912-052; 015-527-658-048-875; 019-831-293-743-518; 022-837-571-402-576; 025-141-025-402-513; 029-164-830-214-360; 044-295-409-596-282; 061-620-309-813-166; 062-137-637-964-947; 066-032-563-680-259; 087-665-408-966-240; 094-142-794-127-63X; 101-898-536-025-026; 143-546-413-886-429; 159-477-048-665-066; 173-145-269-859-717; 184-221-983-536-940; 199-745-676-923-766,0,false,,
070-308-945-671-285,Common source identification of images in large databases.,2014-09-08,2014,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Floris Gisolf; Pelle Barens; Ewald Snel; Anwar Malgoezar; Mark Vos; Arjan Mieremet; Zeno Geradts,,244,,222,230,Image (mathematics); Volume (computing); Data mining; Digital camera; Computer cluster; Computer science; Computation; Database; Identification (information); Digital forensics; Noise (video),Digital camera identification; Digital forensics; Large scale common source identification; Photo-response non-uniformity,,,,https://core.ac.uk/display/132739751 https://www.sciencedirect.com/science/article/pii/S0379073814003612 https://www.ncbi.nlm.nih.gov/pubmed/25279802 https://europepmc.org/abstract/MED/25279802 https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F6c4763b4-21b8-4d87-878d-5d8ab85c132d http://www.sciencedirect.com/science/article/pii/S0379073814003612,http://dx.doi.org/10.1016/j.forsciint.2014.08.034,25279802,10.1016/j.forsciint.2014.08.034,2077889468,,0,018-276-309-945-450; 026-290-088-195-051; 036-277-431-302-085; 045-226-923-439-105; 048-955-603-721-071; 060-043-515-260-052; 069-847-568-544-420; 070-260-337-691-258; 073-556-368-991-677; 077-828-134-917-257; 083-097-133-928-799; 089-547-267-411-182; 106-295-038-562-776; 125-998-770-927-182; 184-897-235-429-285,16,false,,
070-345-535-736-050,Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital,2020-11-07,2020,journal article,Digital Zone: Jurnal Teknologi Informasi dan Komunikasi,24773255; 20864884,Universitas Lancang Kuning,,Desti Mualfah; Rizdqi Akbar Ramadhan,"Kejahatan konvensial yang terekam kamera CCTV (Closed Circuit Televison) semakin banyak ditemukan di masyarakat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Kamera CCTV memiliki peran penting dalam keamanan, banyak diantaranya hasil tangkapan rekaman kamera CCTV dijadikan sebagai alat bukti digital. Tantangannya adalah bagaimana teknik yang diperlukan untuk penanganan khusus investigasi digital forensik dalam mencari bukti ditgital rekaman kamera CCTV menggunakan metode live forensik, yaitu ketika barang bukti dalam keadan aktif berdasarkan pedoman SNI 27037:2014 sesuai acuan kerangka kerja Common Phases of Computer Forensics Investigation Models untuk di implementasikan ke dalam dokumen Chain of Custody. Hasil penelitian ini berupa hasil analisis video rekaman kamera CCTV tentang karakteristik bukti digital dan informasi metadata yang digunakan untuk memberikan penjelasan komprehensif secara terstruktur serta acuan pengelolaan informasi data yang didapat dari hasil investigasi digital forensik yang dapat dipertanggungjawabkan dalam persidangan.
;
; Kata kunci: Bukti Digital, Live Forensik, Metadata, Kamera CCTV, Chain of Custody.
;
; Abstract
; Conventional crimes that are recorded on CCTV (Closed Circuit Television) cameras are increasingly being found in society, every crime that commits certain crimes will be in accordance with statutory regulations. CCTV cameras have an important role in security, many of which are recorded by CCTV cameras used as digital evidence. The challenge is how the techniques required for special handling, digital forensics in searching for digital evidence of CCTV camera footage using the live forensic method, namely when the evidence is in an active state based on the latest SNI 27037: 2014 according to the framework reference Common Phases of Computer Forensics Investigation Models for in implement it into the Chain of Custody document. These results of this research are in the form of analysis of CCTV camera video recordings about the characteristics of digital evidence and metadata information used to provide a structured comprehensive explanation and reference data management information obtained from the results of digital forensic investigations that can be accounted for in court.
; Keywords: Digital Evidence, Live Forensic, Metadata, CCTV Camera, Chain of Custady.",11,2,257,267,,,,,,https://journal.unilak.ac.id/index.php/dz/article/download/5174/2493,http://dx.doi.org/10.31849/digitalzone.v11i2.5174,,10.31849/digitalzone.v11i2.5174,3104630931,,0,,0,true,cc-by-sa,gold
070-378-356-319-383,Rules of professional responsibility in digital forensics: A comparative analysis,,2015,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Filipo Sharevski,"The Committee on Identifying the Needs of Forensic Sciences Community (2009) accentuates the establishment of a uniform code of ethics emphasizing the importance of enforceability in strengthening the role that the forensic science plays within the criminal justice system. Equally pertinent to the domain of digital forensics, this imperative entails a research commitment in comparing and contrasting the respective codes of ethics to illustrate their variety, specificity and enforceability to inform the discussion on the associated regulative aspects. Accordingly, this paper reviews the professional regulation inaugurated in both the US and international digital forensics arena giving a detailed perspective on the consolidation of the practice.",10,2,39,54,Criminal justice; Ethical code; Variety (cybernetics); Political science; Professional responsibility; Consolidation (business); Computer security; Information security; Engineering ethics; Computer forensics; Digital forensics,,,,,https://repository.globethics.net/handle/20.500.12424/871090 https://commons.erau.edu/cgi/viewcontent.cgi?article=1201&context=jdfsl https://commons.erau.edu/jdfsl/vol10/iss2/3/,http://dx.doi.org/10.15394/jdfsl.2015.1201,,10.15394/jdfsl.2015.1201,1647780413,,0,004-280-322-555-290; 024-066-028-851-257; 050-721-573-791-625; 054-336-486-986-971; 062-032-128-092-406; 068-345-833-704-493; 076-551-618-438-88X; 078-327-902-374-330; 101-436-770-235-826; 113-522-568-412-928; 114-090-829-194-843; 116-701-124-968-194; 131-516-331-360-906; 132-016-143-282-432; 136-518-828-547-101; 146-749-886-466-706; 151-902-391-890-088; 170-295-594-314-571,5,true,cc-by-nc,gold
070-387-550-064-219,A Digital Video Tampering Forensics Scheme Based on Forensics Hash: A Digital Video Tampering Forensics Scheme Based on Forensics Hash,2014-02-23,2014,journal article,Journal of Electronics & Information Technology,10095896,China Science Publishing & Media Ltd.,China,Hui Wei; Gao-bo Yang; Ming Xia,,35,12,2934,2941,Scheme (programming language); Digital video; Computer security; Computer science; Network forensics; Hash function,,,,,http://pub.chinasciencejournal.com/article/getArticleRedirect.action?doiCode=10.3724/SP.J.1146.2013.00296,http://dx.doi.org/10.3724/sp.j.1146.2013.00296,,10.3724/sp.j.1146.2013.00296,2322926756,,0,,0,false,,
070-954-300-168-750,A Prototype of Portable Digital Forensics Imaging Tools using Raspberry Device,2021-02-01,2021,journal article,IOP Conference Series: Materials Science and Engineering,17578981; 1757899x,IOP Publishing,,Fietyata Yudha; Erika Ramadhani; R M Komaryan,"One of the digital forensics activities has the goal to prove a cybercrime. There are several stages in digital forensics when doing an investigation. Each stage has its suitable hardware and software that is used while investigating a case. Standalone forensics hardware is a suitable media in the process of investigation. It can do an acquisition and imaging process at the same time as the investigation process. Nowadays, standalone forensics hardware for imaging devices has a very high price. This paper gives a solution to develop low budget portable imaging forensics devices using a raspberry device. The device enables us to do an acquisition to a hard disk or flash drive. The output has a raw format file type i.e.dd. This device includes a logging file consisting of detailed information related to the digital evidence also hashing to provide file integrity. The result of this paper describes how to construct a prototype low budget portable device for digital forensics acquisition using a raspberry device and how to operate it in GUI. The prototype was successfully created and tested in several scenarios. The performance test of this device has a result of that transfer rate of 1,85 MB/s.",1077,1,012064,,Software; Flash drive; Construct (python library); Digital evidence; Computer science; Digital forensics; Computer hardware; File format; Process (computing); Hash function,,,,,https://iopscience.iop.org/article/10.1088/1757-899X/1077/1/012064/pdf https://iopscience.iop.org/article/10.1088/1757-899X/1077/1/012064/meta https://ui.adsabs.harvard.edu/abs/2021MS&E.1077a2064Y/abstract,http://dx.doi.org/10.1088/1757-899x/1077/1/012064,,10.1088/1757-899x/1077/1/012064,3136799502,,0,003-232-363-219-004; 065-861-995-125-023; 076-508-293-079-677,1,true,cc-by,gold
070-967-295-350-189,Leveraging the Windows Amcache.hve File in Forensic Investigations,,2016,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Bhupendra Singh; Upasna Singh,,11,4,7,,Operating system; World Wide Web; Malware analysis; Computer science; Windows Vista; Security and safety features new to Windows Vista,,,,,https://paperity.org/p/84051288/leveraging-the-windows-amcache-hve-file-in-forensic-investigations https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl11.html#SinghS16 https://commons.erau.edu/cgi/viewcontent.cgi?article=1429&context=jdfsl https://commons.erau.edu/jdfsl/vol11/iss4/7/ https://doi.org/10.15394/jdfsl.2016.1429,http://dx.doi.org/10.15394/jdfsl.2016.1429,,10.15394/jdfsl.2016.1429,2615381031,,0,002-710-519-237-792; 051-271-812-303-811; 064-062-472-395-879; 142-226-580-142-17X,2,true,cc-by-nc,gold
071-061-776-249-765,D4I - Digital forensics framework for reviewing and investigating cyber attacks,,2020,journal article,"Array (New York, N.Y.)",25900056,,United States,Athanasios Dimitriadis; Nenad Ivezic; Boonserm Kulvatunyou; Ioannis Mavridis,"Abstract Many companies have cited lack of cyber-security as the main barrier to Industrie 4.0 or digitalization. Security functions include protection, detection, response and investigation. Cyber-attack investigation is important as it can support the mitigation of damages and maturing future prevention approaches. Nowadays, the investigation of cyber-attacks has evolved more than ever leveraging combinations of intelligent tools and digital forensics processes. Intelligent tools (e.g., YARA rules and Indicators of Compromise) are effective only when there is prior knowledge about software and mechanisms used in the cyber-attack, i.e., they are not attack-agnostic. Therefore, the effectiveness of these intelligent tools is inversely proportional to the number of the never-seen-before software and mechanisms utilized. Digital forensic processes, while not suffering from such issue, lack the ability to provide in-depth support to a cyber-attack investigation mainly due to insufficient detailed instructions in the examination and analysis phases. This paper proposes a digital forensics framework for reviewing and investigating cyber-attacks, called D4I, which focuses on enhancing the examination and analysis phases. First, the framework proposes a digital artifacts categorization and mapping to the Cyber-Kill-Chain steps of attacks. Second, it provides detailed instructing steps for the examination and analysis phases. The applicability of D4I is demonstrated with an application example that concerns a typical case of a spear phishing attack.",5,,100015,,Digital artifact; Damages; Software; Spear phishing; Computer security; Computer science; Compromise; Digital forensics; Categorization,Artifacts categorization and mapping; Digital forensics framework; Digital reviewing and investigation; Examination and analysis,,,Intramural NIST DOC (9999-NIST) United States,https://www.sciencedirect.com/science/article/pii/S2590005619300153 https://doi.org/10.1016/j.array.2019.100015 http://www.sciencedirect.com/science/article/pii/S2590005619300153,http://dx.doi.org/10.1016/j.array.2019.100015,35531088,10.1016/j.array.2019.100015,2996791554,PMC9074801,0,000-084-741-857-185; 007-060-730-694-999; 019-698-064-288-240; 020-547-580-632-658; 020-944-423-224-895; 021-850-998-857-676; 026-774-296-742-022; 029-748-683-221-796; 040-711-141-878-573; 047-630-600-014-492; 048-256-115-288-552; 051-071-473-135-406; 062-853-038-393-609; 067-950-012-629-210; 089-638-379-171-949; 091-511-454-565-387; 093-544-098-524-573; 098-333-864-515-548; 099-676-137-335-314; 105-107-197-390-10X; 111-090-978-711-139; 128-391-703-009-515; 132-355-634-397-986; 133-397-275-695-990; 187-019-976-763-782; 195-969-710-102-716,10,true,"CC BY, CC BY-NC-ND",gold
071-182-359-615-008,Technical reporting in digital forensics.,2022-08-15,2022,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Graeme Horsman,"One of the primary roles of a practitioner in the field of digital forensics (DF) is to conduct the examination of any lawfully seized digital device content and report upon any findings that may support an inquiry being conducted. While there are many intricacies to this task, in some cases, an inquiry will commence with a practitioner carrying out the necessary examination work required to report any findings at a ""technical level."" Such technical reports are often used for intelligence gathering purposes in an attempt to establish the potential evidential value of a device or data set and are often a precursor to, and catalyst for, further and often more extensive forensic work being commissioned. Therefore, the ability to report at a technical level should be considered a fundamental skill required of all practitioners in this discipline and any attempts to provide guidance and support for conducting this task effectively should be encouraged. This work explores the role of technical reporting, where a series of reporting examples are presented that explore the intricacies involved with conveying digital forensic findings at a technical level. Procedural and linguistic challenges are investigated and evaluated in order to acknowledge the pitfalls that practitioners may encounter and to identify potential technical reporting best practices.",,,,,Digital forensics; Task (project management); Work (physics); Set (abstract data type); Computer science; Value (mathematics); Computer forensics; Field (mathematics); Best practice; Engineering ethics; Psychology; Data science; Computer security; Engineering; Political science; Law; Mechanical engineering; Mathematics; Systems engineering; Machine learning; Pure mathematics; Programming language,digital evidence; digital forensics; report writing; technical reporting,,,,,http://dx.doi.org/10.1111/1556-4029.15108,35968719,10.1111/1556-4029.15108,,,0,000-490-412-762-138; 010-061-391-662-193; 029-638-263-419-336; 036-597-490-099-438; 041-365-301-128-075; 050-296-813-523-597; 092-765-349-680-750; 099-377-733-522-116; 117-555-147-368-574; 131-696-619-498-120; 168-245-076-589-180,0,true,,hybrid
071-328-509-813-202,A novel ternary and signum kernelled linear hexadecimal pattern and hybrid feature selection based environmental sound classification method,,2020,journal article,Measurement,02632241; 15366359,Elsevier BV,Netherlands,Sengul Dogan; Erhan Akbal; Turker Tuncer,,166,,108151,,k-nearest neighbors algorithm; Support vector machine; Feature selection; Artificial intelligence; Hexadecimal; Pattern recognition; Feature (machine learning); Computer science; Discrete wavelet transform; Feature extraction; Linear discriminant analysis,,,,,https://www.sciencedirect.com/science/article/pii/S0263224120306898 https://ui.adsabs.harvard.edu/abs/2020Meas..16608151D/abstract,http://dx.doi.org/10.1016/j.measurement.2020.108151,,10.1016/j.measurement.2020.108151,3039334369,,0,000-747-924-226-591; 004-892-391-454-378; 005-911-454-032-082; 012-288-749-309-706; 015-450-490-331-294; 016-412-693-230-572; 017-878-265-650-766; 018-044-715-644-781; 018-565-254-420-673; 020-233-013-143-936; 022-368-409-764-115; 023-186-296-335-953; 023-902-250-733-344; 025-563-144-816-540; 025-879-735-079-635; 028-221-850-747-211; 028-550-577-288-356; 029-867-539-332-231; 030-230-719-506-590; 032-110-439-778-889; 037-037-924-922-673; 045-059-570-493-919; 049-860-251-887-83X; 051-070-496-240-589; 057-115-503-939-73X; 057-626-631-859-843; 071-802-725-053-362; 075-133-597-849-71X; 075-866-437-482-494; 077-829-983-025-91X; 079-310-940-223-758; 080-560-302-799-776; 091-009-438-157-013; 092-720-749-568-080; 094-301-064-425-024; 097-506-744-580-51X; 100-040-403-205-935; 104-818-175-368-723; 106-581-211-947-678; 107-053-871-263-543; 115-582-515-756-396; 142-616-392-319-20X; 160-510-635-746-28X; 161-170-912-719-932; 195-091-532-336-938,12,false,,
071-363-969-812-87X,Forensic Significance of Cardiac Implantable Device (Pacemaker),2019-05-20,2019,journal article,"International Journal of Scientific Research in Science, Engineering and Technology",23944099; 23951990,Technoscience Academy,,Anju Bhatt; Vaishali Ajugiya; Deepika Bhandari; Neeta Khobragade,"Pacemakers are automated electric medical devices that are imbibed in the pleural cavity near to heart so as to stimulate the heart with electrical inducement to maintain or restore a normal heartbeat. Pacemakers can be implanted temporarily to treat bradycardia after a heart attack, surgery or overdose of medication. They can also be implanted permanently to correct a slow heartbeat or, in some cases, to help treat heart failure. With increase in pacemaker indications and especially implantable cardioverter-defibrillators, the number of patients with implantable devices has been growing steadily. With the enhancement in the technology the design of pacemakers are being modified till date. Pacemakers being an electronic device also stores data of patient's heartrate, pulse rate and number of time it has paced in a day. Since, technology is killing our opportunity to falsify the information; the data stored in the pacemaker can either support or reject the alibi stated by the victim or assailant. The aim of this research paper is to study the concept and type of digital data stored in implantable cardiac device i.e. pacemaker. This study focuses on awareness about the application of pacemaker in solving forensic cases. Digital data provided by the pacemaker in any ongoing investigation will have a huge evidentiary potential, as it can be made admissible in the court of law under Section 65-B of the Indian Evidence Act, 1872. In this paper, we are recommending that pacemakers can be used as digital evidences since, they track the audit trails of the patient.",6,3,340,345,Digital evidence; Medical emergency; Medicine,,,,,http://ijsrset.com/paper/5932.pdf,http://dx.doi.org/10.32628/ijsrset196369,,10.32628/ijsrset196369,2954883516,,0,020-962-517-216-318; 027-205-313-452-016; 033-286-409-075-846; 033-474-564-010-944; 055-093-089-681-931; 063-661-026-375-024; 067-796-348-175-184; 071-372-918-403-464; 082-533-206-961-250; 099-835-315-381-563; 151-048-250-873-903,0,true,,gold
071-606-104-599-241,KONSEP ATTRIBUTE BASED ACCESS CONTROL (ABAC) PADA LEMARI PENYIMPANAN BUKTI DIGITAL (LPBD),2018-05-04,2018,journal article,JURNAL TEKNIK INFORMATIKA,25497901; 19799160,LP2M Universitas Islam Negeri (UIN) Syarif Hidayatullah Jakarta,,Moh Fadly Panende; Riadi; Yudi Prayudi,"Abstract An important factor of the investigation into cybercrime cases is the case relating to the evidence found. Electronic evidence and digital evidence found in criminal cases should be maintained from the outset, to be held accountable for justice. Sistem digital evidence storage cabinets (LPBD) is one solution to overcome the management of digital evidence is based on digital evidence cabinet (DEC), only the system is not equipped with a good access control model. The LPBD system needs to be built not only on the issue of digital evidence management, but other important components in the digital proof storage cabinet itself, access arrangements, so that the scheme or the design of access control policies on LPBD is very important. The access controls used on previous LPBDs are only done by authentication mechanisms and User authorization mechanisms, no other more complex parameters to support requests made on LPBD systems. In the absence of a good access control model design scheme for LPBD, it is necessary to design an access control policy model using the attribute-based access control approach (ABAC) because ABAC is a more flexible access control model in the application of attributes to users , and the . XACML hierarchy can support control requirements access used in digital evidence storage cabinets (LPBD) . ABSTRAK Faktor penting dalam proses investigasi sebuah kasus cybercrime yaitu hal yang terkait dengan barang bukti yang ditemukan. Bukti elektronik maupun bukti digital yang ditemukan dalam sebuah kasus kejahatan harus tetap terjaga keasliannya, untuk dapat dipertanggung jawabkan dipengadilan. Sistem lemari penyimpanan bukti digital (LPBD) menjadi salah satu solusi untuk permasalahan manajemen bukti digital ini yang berdasar pada digital evidence cabinet (DEC), hanya saja sistem tersebut belum dilengkapi dengan model access control yang baik. Sistem LPBD seharusnya dibuat tidak hanya berdasar pada permasalahan-permasalahan tentang manajemen bukti digital saja, akan tetapi komponen-komponen penting lainnya dalam lemari penyimpanan bukti digital itu sendiri yaitu pengaturan aksesnya, sehingga skema atau desain access control policy terhadap LPBD menjadi sangat penting . Access control yang gunakan terhadap LPBD sebelumnya dibuat hanya dengan mekanisme authefikasi dan authorisasi user saja, tidak adanya parameter lain yang lebih kompleks untuk mendukung sebuah request yang dilakukan pada sistem LPBD. Mengingat belum adanya skema rancangan model access control yang baik pada LPBD ini, maka perlu dilakukan perancangan model access control policy menggunakan pendekatan attribute based access control (ABAC) karena ABAC merupakan model access control yang lebih fleksibel dalam penerapan attribute terhadap user, dan hierarchy XACML yang dapat mendukung kebutuhan-kebutuhan access control yang digunakan pada lemari penyimpanan bukti digital (LPBD). How To Cite : Panende, M.F, Prayudi, Y. Riadi, I. (2018). KONSEP ATTRIBUTE BASED ACCESS CONTROL (ABAC) PADA LEMARI PENYIMPANAN BUKTI DIGITAL (LPBD) . Jurnal Teknik Informatika, 11(1), 85-94. doi 10.15408/jti.v11i1.7220 Permalink/DOI: http://dx.doi.org/10.15408/jti.v11i1.7220",11,1,85,94,Operating system; XACML; Computer science,,,,,http://journal.uinjkt.ac.id/index.php/ti/article/download/7220/pdf http://journal.uinjkt.ac.id/index.php/ti/article/view/7220 https://core.ac.uk/download/pdf/290103868.pdf,http://dx.doi.org/10.15408/jti.v11i1.7220,,10.15408/jti.v11i1.7220,2800370617,,0,,0,true,cc-by-sa,gold
071-788-675-518-847,Adaptive Histogram Equalization Based Image Forensics Using Statistics of DC DCT Coefficients,2018-04-02,2018,journal article,Advances in Electrical and Electronic Engineering,18043119; 13361376,VSB - Technical University of Ostrava,Czech Republic,Neetu Singh; Abhinav Gupta; R C Jain,"The vulnerability of digital images is growing towards manipulation. This motivated an area of research to deal with digital image forgeries. The certifying origin and content of digital images is an open problem in the multimedia world. One of the ways to find the truth of images is finding the presence of any type of contrast enhancement. In this work, novel and simple machine learning tool is proposed to detect the presence of histogram equalization using statistical parameters of DC Discrete Cosine Transform (DCT) coefficients. The statistical parameters of the Gaussian Mixture Model (GMM) fitted to DC DCT coefficients are used as features for classifying original and histogram equalized images. An SVM classifier has been developed to classify original and histogram equalized image which can detect histogram equalized image with accuracy greater than 95% when false rate is less than 5%.",16,1,125,134,Image (mathematics); Histogram equalization; Artificial intelligence; Statistical parameter; Pattern recognition; Discrete cosine transform; Adaptive histogram equalization; Computer science; Digital image; Histogram; Mixture model,,,,,http://advances.utc.sk/index.php/AEEE/article/view/2647 http://advances.vsb.cz/index.php/AEEE/article/view/2647 https://core.ac.uk/display/153610502 https://core.ac.uk/download/161961697.pdf,http://dx.doi.org/10.15598/aeee.v16i1.2647,,10.15598/aeee.v16i1.2647,2795385028,,0,,1,true,cc-by,gold
071-880-034-878-967,"IoT Forensic Frameworks (DFIF, IoTDOTS, FSAIoT): A Comprehensive Study",2022-03-28,2022,journal article,International Journal of Advances in Soft Computing and its Applications,27101274; 20748523,Alzaytoonah University of Jordan,Jordan,Mohammad Hassan; Ghassan Samara; Mohammad Fadda,"Abstract In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, the other concerning aspect is the achievement of privacy and security in this connection, especially given the rapid increase in the number of existing and new IoT devices. Concerns, threats, and assaults related to IoT security have been regarded as a potential and problematic area of research. This necessitates the quick development or creation of suitable technologies with the nature of crimes in the IoT environment. On the other hand, criminal investigation specialists encounter difficulties and hurdles due to various locations, data types, instruments used, and device recognition. This paper provides an in-depth explanation of the criminal content of the Internet of Things. It compares its stages to the detailed stages of traditional digital forensics in terms of similarities and differences, the frameworks used in dealing with electronic crimes, and the techniques used in both types. This paper presents previous discussions of researchers in the field of digital forensics. For the IoT, which brings us to the most important parts of this paper, which is a comprehensive study of the IoT criminal frameworks that are used to protect communication in the field of IoT, such as Digital Forensic Investigation Framework (DFIF), Digital Forensic Framework for Smart Environments (IoTDOTS), Forensic State Acquisition from the Internet of Things (FSAIoT), and discusses the challenges in their general frameworks and provides solutions and strategies. Keywords: digital forensic, FSAIoT, IoT, IoT Challenges, IoT Forensic, IoT Framework, IOTDOTS.",14,1,73,83,Computer science; Field (mathematics); Computer security; Digital forensics; Internet of Things; Aside; The Internet; Digital evidence; Network forensics; Internet privacy; Data science; World Wide Web; Art; Mathematics; Literature; Pure mathematics,,,,,,http://dx.doi.org/10.15849/ijasca.220328.06,,10.15849/ijasca.220328.06,,,0,,1,true,,bronze
071-917-972-399-010,Assess of Forensic Tools on Android Based Facebook Lite with the NIST Method,2021-05-10,2021,journal article,Scientific Journal of Informatics,24600040; 24077658,Universitas Negeri Semarang,,Rauhulloh Noor Bintang; Rusydi Umar; Anton Yudhana,"Purpose: The increase in social media use of Facebook lite by using Android-based smartphones is quite high. Activities when communicating through the social media network Facebook Lite. Facebook lite can send a text message, image, or video. Not a few Facebook users lite social media abusing this app to commit fraud crimes, pornographic acts, or defamation actions from social media users Facebook lite. In such cases, it can be a digital forensic benchmark to get results from digital evidence from the Facebook lite application. Methods: In this investigation, National Institute of Standards and Technology (NIST) research methods with various stages, namely Collection, Examination, Analysis, and Reporting. Result: Comparison and results of data conducted with forensic tools Magnet Axiom Forensic and MOBILedit Forensic Express Pro in the form of parameter data specified. Axiom Forensic Magnet data is 57.14%, while MOBILedit Forensic Express Pro data is 85.71%. Novelty: This data is the data of the performance results of both forensic tool applications in obtaining digital evidence on Facebook lite application.",8,1,1,9,NIST; World Wide Web; Forensic science; Commit; Benchmark (surveying); Digital evidence; Computer science; Social media; Android (operating system); Digital forensics,,,,,https://journal.unnes.ac.id/nju/index.php/sji/article/view/26744 https://journal.unnes.ac.id/nju/index.php/sji/article/download/26744/pdf,http://dx.doi.org/10.15294/sji.v8i1.26744,,10.15294/sji.v8i1.26744,3163962276,,0,,0,true,cc-by,gold
071-968-102-950-243,Digital forensic tool verification: An evaluation of options for establishing trustworthiness,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Angus M. Marshall,,38,,301181,,Risk analysis (engineering); Trustworthiness; Work (electrical); Range (mathematics); Scrutiny; Computer science; Digital forensics,,,,,https://doi.org/10.1016/j.fsidi.2021.301181 https://www.sciencedirect.com/science/article/abs/pii/S2666281721000895,http://dx.doi.org/10.1016/j.fsidi.2021.301181,,10.1016/j.fsidi.2021.301181,3172358839,,0,054-004-313-233-495; 057-151-739-358-411,2,false,,
071-971-352-667-536,An OCL-Based Formal Model for Cloud Forensics,,2014,journal article,Advanced Materials Research,16628985,"Trans Tech Publications, Ltd.",,Jian Wang; Zhen Min Tang; Xian Li Jin,"Cloud Computing is gaining acceptance and increasing in popularity. However, digital forensics within Cloud becomes difficult. This paper proposes an extensible semantic model using OCL (Object Constraint Language) for cloud digital forensics data. We give a brief introduction to Trusted Digital Forensics, and then detail the modeling process using OCL and FODA (Feature Oriented Domain Analysis). Therefore, a feature tree can be built with semantic logical relation in order to get the overall semantic description of features in the forensic domain of digital data.",989-994,,1513,1516,Tree (data structure); Object Constraint Language; Forensic science; Domain (software engineering); Feature-oriented domain analysis; Information retrieval; Relation (database); Computer science; Database; Cloud computing; Digital forensics; Semantic data model,,,,,https://zh.scientific.net/AMR.989-994.1513.pdf https://www.scientific.net/AMR.989-994.1513,http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.1513,,10.4028/www.scientific.net/amr.989-994.1513,2008009364,,0,003-196-924-988-132; 027-829-293-463-29X; 036-427-994-375-326; 044-153-843-280-519; 059-697-278-686-056,0,false,,
072-152-153-447-327,Digital tool marks (DTMs): a forensic analysis of file wiping software,2019-07-29,2019,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Graeme Horsman,"Whilst difficult to ascertain the full extent to which so called anti-forensic software applications are in use by the public, their threat to an investigation of digital content is tangible, where...",53,1,96,111,Software; Digital content; Tool marks; Computer science; Multimedia; Digital forensics,,,,,https://www.tandfonline.com/doi/full/10.1080/00450618.2019.1640793 https://research.tees.ac.uk/en/publications/digital-tool-marks-dtms-a-forensic-analysis-of-file-wiping-softwa https://research.tees.ac.uk/ws/files/8363337/DTMs.pdf,http://dx.doi.org/10.1080/00450618.2019.1640793,,10.1080/00450618.2019.1640793,2966655090,,0,008-507-664-901-527; 016-983-559-523-04X; 046-158-992-585-59X; 048-250-488-210-056; 060-382-239-802-033; 078-598-867-814-365; 081-988-024-229-83X,4,true,cc-by-nc-nd,green
072-424-254-968-179,Mobile Forensics And Its Challenges,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Arjun Chetry; Moutan Sarkar,,,,,,Computer security; Computer science; Mobile device forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.07,http://dx.doi.org/10.46293/4n6/2020.02.03.07,,10.46293/4n6/2020.02.03.07,3096384088,,0,,0,false,,
072-934-978-048-044,An Ontology Based on the Timeline of Log2timeline and Psort Using Abstraction Approach in Digital Forensics,2020-04-17,2020,journal article,Symmetry,20738994,MDPI AG,Switzerland,Sandeepak Bhandari; Vacius Jusas,"Digital forensics practitioners encounter numerous new terminologies during time-intensive digital investigation processes because of the explosive growth of the web, an immense amount of data, and rapid changes in technology. In such a scenario, the time needed to find and interpret the cause of the potential digital incident can be affected by the complexity involved in understanding the meaning of newly encountered terminologies. Although various approaches have been designed to assist digital practitioners in understanding the newly encountered terminologies during the investigation of the accident, none of them is capable of supporting investigators to interpret new terminologies. Our work focuses on reconstructing and analyzing the timeline of events and artifacts backed by the abstraction concept to help practitioners in reasoning about the perceived meaning of different digital forensics terminologies that are encountered during the investigation. This paper introduces an ontological approach based on the abstraction concept to reconstruct the timeline provided by command-based digital forensic tools, i.e., Log2timeline and Psort in the L2TCSV format, and assist in resolving the meaning of new encountered concepts. The performed experiments show that the novel methodology is capable of enhancing the timeline and assisting practitioners in determining the significance of encountered terminologies or concepts.",12,4,642,,Data science; Ontology; Computer science; Timeline; Abstraction (linguistics); Meaning (linguistics); Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/symmetry/symmetry12.html#BhandariJ20a http://ui.adsabs.harvard.edu/abs/2020Symm...12..642B/abstract https://www.mdpi.com/2073-8994/12/4/642,http://dx.doi.org/10.3390/sym12040642,,10.3390/sym12040642,3017203559,,0,005-116-312-278-527; 026-787-086-442-120; 030-136-936-524-671; 047-937-309-229-62X; 054-601-093-496-749; 073-194-524-558-213; 074-814-000-483-733; 081-140-064-081-587; 107-338-245-292-063; 114-454-611-706-935; 181-072-396-769-365,1,true,cc-by,gold
073-052-923-626-654,Unfurl: An Entropy-Based Link Vulnerability Analysis,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yugal Pathak,,,,,,Statistical physics; Vulnerability assessment; Mathematics; Entropy (information theory),,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.09,http://dx.doi.org/10.46293/4n6/2020.02.03.09,,10.46293/4n6/2020.02.03.09,3096858737,,0,,0,false,,
073-175-569-296-743,Drone/UAV and Its Forensics Aspects,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Shivani Rai,,,,,,Engineering; Computer security; Drone,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.02,http://dx.doi.org/10.46293/4n6/2021.03.01.02,,10.46293/4n6/2021.03.01.02,3127452647,,0,,0,false,,
073-771-451-612-879,"Digital Forensics Workflow as A Mapping Model for People, Evidence, and Process in Digital Investigation",,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Subekti Ningsih; Riadi Yudi Prayudi,,7,3,294,304,Workflow; Computer science; Process (engineering); Multimedia; Wireless; Digital forensics,,,,,http://sdiwc.net/digital-library/digital-forensics-workflow-as-a-mapping-model-for-people-evidence-and-process-in-digital-investigation,http://dx.doi.org/10.17781/p002463,,10.17781/p002463,2903984546,,0,008-346-706-954-826; 019-698-064-288-240; 025-257-762-793-993; 026-774-296-742-022; 028-874-299-732-939; 038-287-375-579-320; 046-169-392-846-761; 051-039-889-631-382; 051-161-858-118-526; 138-232-752-906-225; 147-631-422-817-38X; 177-426-892-442-266,0,false,,
073-790-480-897-758,Digital Evidence Certainty Descriptors (DECDs),,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Graeme Horsman,,32,,200896,,Set (psychology); Data science; Digital data; Expression (architecture); Digital evidence; Field (computer science); Computer science; Interpretation (philosophy); Certainty; Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S1742287619303123,http://dx.doi.org/10.1016/j.fsidi.2019.200896,,10.1016/j.fsidi.2019.200896,2990925386,,0,000-281-908-950-22X; 003-359-256-146-450; 006-933-430-647-14X; 008-364-588-981-258; 014-580-488-694-132; 016-033-143-009-953; 017-792-811-186-108; 018-182-926-340-45X; 019-960-035-950-902; 020-867-396-119-347; 021-798-083-032-603; 032-451-540-235-796; 042-788-172-660-874; 044-552-087-341-555; 044-895-263-937-02X; 061-269-967-405-492; 062-923-490-829-764; 067-257-260-685-072; 070-378-356-319-383; 071-940-409-825-573; 101-436-770-235-826; 102-243-142-344-71X; 103-760-328-285-801; 111-488-239-742-003; 149-617-274-050-94X; 182-948-315-861-769,5,false,,
073-997-683-020-831,ANALYSIS AND EVALUATION DIGITAL FORENSIC INVESTIGATION FRAMEWORK USING ISO 27037:2012,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Didik Sudyana; Bambang Sugiantoro Yudi Prayudi,,8,1,1,14,Digital forensic investigation; Computer science; Multimedia; Wireless,,,,,http://sdiwc.net/digital-library/analysis-and-evaluation-digital-forensic-investigation-framework-using-iso-270372012,http://dx.doi.org/10.17781/p002464,,10.17781/p002464,2971675769,,0,,4,false,,
074-136-192-673-661,The Conceivability And Admissibility Of Forensic Evidence from IoT Devices in Digital Forensics,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Tanmayee Tilekar,"This article focuses on the prospects of IoT devices held by the users for their personal usages or in Workspace Mobility or Smart Home Solutions. IoT devices are now burgeoning its capability with the incorporation of Artificial Intelligence, Edge AI, RPA(Robotic Process Automation), AutoML, ARVR and NLP( Natural Language Processing). There are many superfluous IoT Devices and Industry 4.0 based Solutions in the market with great features in use such as Google Home Mini, Google Home Voice Controller, Amazon Echo plus Voice Controller, Kuri Mobile Robot, August Smart Lock than the others. These devices record, store or sometimes transmit the user inputs plus activities and it is unclear to what extent they record and store at each instance. There are countable instances of news and Forensic Use Cases from different parts of the globe which enlighten statements where The Court of Law has demanded the data recorded by the IoT devices as Digital Evidences to complete IOT Crimes Investigations.",,,53,54,Computer security; Computer science; Internet of Things; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.10,http://dx.doi.org/10.46293/4n6/2020.02.02.10,,10.46293/4n6/2020.02.02.10,3021355926,,0,,0,false,,
074-191-841-979-727,AI and IoT: Empowering Things with Intelligence,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Suchitra Das,,,,,,World Wide Web; Computer science; Internet of Things,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.10,http://dx.doi.org/10.46293/4n6/2021.03.01.10,,10.46293/4n6/2021.03.01.10,3162101511,,0,,0,false,,
074-271-546-742-17X,The prevalence of encoded digital trace evidence in the nonfile space of computer media(,2014-07-23,2014,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Simson L. Garfinkel,"Forensically significant digital trace evidence that is frequently present in sectors of digital media not associated with allocated or deleted files. Modern digital forensic tools generally do not decompress such data unless a specific file with a recognized file type is first identified, potentially resulting in missed evidence. Email addresses are encoded differently for different file formats. As a result, trace evidence can be categorized as Plain in File (PF), Encoded in File (EF), Plain Not in File (PNF), or Encoded Not in File (ENF). The tool bulk_extractor finds all of these formats, but other forensic tools do not. A study of 961 storage devices purchased on the secondary market and shows that 474 contained encoded email addresses that were not in files (ENF). Different encoding formats are the result of different application programs that processed different kinds of digital trace evidence. Specific encoding formats explored include BASE64, GZIP, PDF, HIBER, and ZIP.",59,5,1386,1393,Encoding (memory); Data file; Digital media; Trace evidence; Computer science; Base64; Image file formats; Database; Digital forensics; File format,BASE64; GZIP; Microsoft Xpress; PDF; ZIP; bulk_extractor; digital forensics; encoded nonfile; forensic science; optimistic decompression; real data corpus,,,U.S. Department of Defense,https://europepmc.org/article/PMC/PMC4263158 https://core.ac.uk/display/36736445 http://simson.net/clips/academic/2014.JOFS.EncodedData.pdf https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4263158 https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.12528 https://onlinelibrary.wiley.com/doi/pdf/10.1111/1556-4029.12528,http://dx.doi.org/10.1111/1556-4029.12528,25053280,10.1111/1556-4029.12528,1969896394,PMC4263158,0,004-652-388-189-304; 009-832-452-035-773; 010-985-077-415-59X; 025-832-466-975-926; 071-079-281-371-668; 082-363-954-997-25X; 085-214-277-668-01X; 100-925-003-172-052,2,true,cc-by-nc,hybrid
074-388-397-687-048,Magnet Axiom And APFS,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Hoyt Harness,,,,,,Topology; Magnet; Axiom; Mathematics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.14,http://dx.doi.org/10.46293/4n6/2020.02.03.14,,10.46293/4n6/2020.02.03.14,3097401520,,0,,0,false,,
074-665-155-258-112,A Technology-Strategy Integrated Digital Forensic Process Framework Considering Government ICT R&D Strategy and ICT Paradigm Shift,2014-07-31,2014,journal article,Journal of the Korea Institute of Information and Communication Engineering,22344772,The Korean Institute of Information and Communication Sciences,,Jun Woo Shin,"Currently information related service such as internet banking, chatting, social network services are quite well smeared into our daily life. Moreover, a rapid growth of service using smart devices brought an importance of security in internet services and a research activation of digital forensic in a crime investigation. This paper presented a previous digital forensic research trend and based on this, suggested a technology-strategy integrated digital forensic process platform, taking a mid-long term government leading ICT R&D strategy and ICT paradigm shift into account.",18,7,1495,1504,The Internet; Government; Digital forensic process; Service (systems architecture); Computer science; Paradigm shift; Technology strategy; Knowledge management; Information and Communications Technology; Digital forensics,,,,,http://society.kisti.re.kr/sv/SV_svpsbs03V.do?method=download&cn1=JAKO201423261321915 http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=HOJBC0_2014_v18n7_1495 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001897094 http://www.kpubs.org/article/articleMain.kpubs?articleANo=HOJBC0_2014_v18n7_1495,http://dx.doi.org/10.6109/jkiice.2014.18.7.1495,,10.6109/jkiice.2014.18.7.1495,2031294102,,0,095-691-114-276-825,0,true,,bronze
074-706-219-689-754,Effective resource management in digital forensics: An exploratory analysis of triage practices in four English constabularies,2019-12-04,2019,journal article,Policing: An International Journal,1363951x,Emerald,United Kingdom,Dana Wilson-Kovacs,"Building on the findings of a British Academy-funded project on the development of digital forensics (DF) in England and Wales, the purpose of this paper is to explore how triage, a process that helps prioritise digital devices for in-depth forensic analysis, is experienced by DF examiners and police officers in four English police forces. It is argued that while as a strategy triage can address the increasing demand in the examination of digital exhibits, careful consideration needs to be paid to the ways in which its set-up, undertaking and outcomes impact on the ability of law enforcement agencies to solve cases.,The methodological approach adopted here builds on the ethnographic turn in criminology. The analysis draws on 120 h of ethnographic observations and 43 semi-structured interviews. Observational data of the working DF environment at each location and a systematic evaluation of internal documents, organisational settings and police priorities helped refine emergent analysis threads, which were analytically compared between sites and against the testimonies of members of different occupational groups to identify similarities and differences between accounts.,The findings emphasise the challenges in the triage of digital exhibits as they are encountered in everyday practice. The discussion focusses on the tensions between the delivery of timely and accurate investigation results and current gaps in the infrastructural arrangements. It also emphasises the need to provide police officers with a baseline understanding of the role of DF and the importance of clearly defined strategies in the examination of digital devices.,This paper aims to bridge policy and practice through an analysis of the ways in which DF practitioners and police officers in four English constabularies reflect on the uses of triage in DF to address backlogs and investigative demands. Highlighting the importance of digital awareness beyond the technical remit of DF units, it offers new insights into the ways in which police forces seek to improve the evidential trail with limited resources.",43,1,77,90,Baseline (configuration management); Sociology; Bridge (nautical); Observational study; Triage; Law enforcement; Public relations; Process (engineering); Digital forensics; Resource management,,,,,https://ore.exeter.ac.uk/repository/handle/10871/40462?show=full https://www.emerald.com/insight/content/doi/10.1108/PIJPSM-07-2019-0126/full/html https://ore.exeter.ac.uk/repository/bitstream/10871/40462/1/wilson-kovacs%202019%20triage.pdf https://www.emerald.com/insight/content/doi/10.1108/PIJPSM-07-2019-0126/full/pdf?title=effective-resource-management-in-digital-forensics-an-exploratory-analysis-of-triage-practices-in-four-english-constabularies https://core.ac.uk/download/286383577.pdf,http://dx.doi.org/10.1108/pijpsm-07-2019-0126,,10.1108/pijpsm-07-2019-0126,2995681188,,0,003-982-227-180-136; 004-200-813-216-207; 004-658-259-494-553; 005-636-730-595-540; 009-285-002-570-736; 010-963-610-208-920; 010-985-077-415-59X; 013-568-618-083-770; 016-731-888-079-073; 021-495-249-615-203; 029-638-263-419-336; 031-522-316-310-252; 035-672-281-328-899; 036-197-454-252-092; 037-550-015-414-716; 047-630-600-014-492; 057-904-228-091-384; 058-052-081-943-595; 062-137-637-964-947; 065-197-615-960-447; 073-847-291-567-156; 081-447-017-308-327; 090-752-043-508-733; 094-295-279-676-447; 098-616-316-968-255; 102-117-623-922-990; 125-939-677-745-616; 139-186-775-971-355; 189-064-913-996-787,18,true,,green
074-708-645-166-402,The General Digital Forensics Technologies Based on Linux,,2014,journal article,Applied Mechanics and Materials,16627482,"Trans Tech Publications, Ltd.",,Wei Liu; Wen Liang Duan; Zhihong Tian; Dong Lan,Digital forensics technologies based on Linux have been popular issue now. It is very necessary to get a general and effective digital forensics method on Linux for its wide usage. It gives a set of general methods in this paper. It combines the static forensics and dynamic forensics according to the different form of data and verifies the validity of these methods with the help from kinds of open source forensics tools.,644-650,,1992,1997,Rootkit; World Wide Web; Forensic science; Set (abstract data type); Computer science; Network forensics; Digital forensics,,,,,https://www.scientific.net/AMM.644-650.1992,http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1992,,10.4028/www.scientific.net/amm.644-650.1992,2086800292,,0,003-871-070-011-964; 018-638-733-386-577; 066-836-839-980-230; 095-283-847-078-137; 132-606-863-800-090,0,false,,
074-852-255-750-108,Multiform Korean handwriting authentication by forensic document examiners,2015-07-10,2015,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Tae-Yi Kang; Joong Lee,,255,,133,136,Forensic science; Authentication (law); Psychology; Test (assessment); Handwriting; Speech recognition,Forensic science; Handwriting identification; Peer review; Validation,,,National Forensic Service; National Forensic Service,https://www.ncbi.nlm.nih.gov/pubmed/26205671 https://www.sciencedirect.com/science/article/pii/S0379073815002704 https://europepmc.org/article/MED/26205671 https://pubag.nal.usda.gov/catalog/5526185,http://dx.doi.org/10.1016/j.forsciint.2015.07.002,26205671,10.1016/j.forsciint.2015.07.002,2096852840,,0,005-345-603-327-180; 010-573-520-331-761; 056-711-259-538-874; 078-373-114-642-178; 095-017-486-539-644,2,false,,
075-119-005-863-649,Investigating Proactive Digital Forensics Leveraging Adversary Emulation,2022-09-09,2022,journal article,Applied Sciences,20763417,MDPI AG,,Valentine Machaka; Titus Balan,"Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Proactive digital forensic investigations (PDFI) solve the challenges of cloud computing forensics such as evidence identification, collection, preservation, and timelining from heterogeneous cumulative data. Cumulative data heterogeneity poses significant challenges to the sound collection of electronically stored information (ESI) or digital evidence across cloud endpoints and/or networked systems. In addition, the distribution of networked systems and/or cloud environments makes it impossible for forensics investigators to be present at several premises to perform the investigation. Hence, it is important to have PDFI in place to ensure continuous operation in the event of a cyberattack, because it does not require the presence of an investigator at the target location. In this study, researchers put the idea of proactive digital forensics to the test and concluded that it is an indispensable tool for networked systems and cloud computing environments in response to modern-day digital forensics challenges. This research was based on an experimental computer science and engineering approach using a virtualised environment simulating an information communication infrastructure. To generate evidence (digital artefacts), and validate the proof-of-concept, adversary emulation was used by adapting the MITRE ATT&CK framework. Research results have shown that PDFI improves digital forensics activities in terms of speed and accuracy, thereby providing credible and timely comprehensive digital evidence. Enhanced Incident detection capabilities enable an analyst to focus much more on forensic investigation functions and thus perform their tasks effectively. However, the legality of live and/or remote forensics is still of great concern in several jurisdictions, thereby affecting the credibility of digital artefacts obtained in this manner. Nevertheless, where possible, the law component should also be kept up to date with modern-day technologies to solve any inconveniences caused by the ever-growing technology demands.",12,18,9077,9077,Digital forensics; Computer science; Network forensics; Emulation; Cloud computing; Adversary; Digital evidence; Computer security; Identification (biology); Event (particle physics); Computer forensics; Data science; Botany; Physics; Quantum mechanics; Economics; Biology; Economic growth; Operating system,,,,,,http://dx.doi.org/10.3390/app12189077,,10.3390/app12189077,,,0,005-515-442-506-880; 021-289-112-719-629; 025-815-030-235-519; 026-774-296-742-022; 046-143-775-958-052; 050-182-526-714-74X; 053-343-993-293-183; 091-531-552-633-070; 096-743-348-982-819; 113-474-844-200-128; 183-000-233-873-221; 184-069-302-229-82X,0,true,cc-by,gold
075-171-904-217-913,Advancing the Science of Digital Forensics,,2012,journal article,Computer,00189162,Institute of Electrical and Electronics Engineers (IEEE),United States,Gary C. Kessler,"Digital forensics, the branch of forensic science that focuses on the recovery and investigation of digital data, has applications in many contexts outside the courtroom, including research, policy enforcement, and intelligence gathering.",45,12,25,27,The Internet; Forensic science; Information system; Computer security; Computer science; Network forensics; Computer forensics; Digital forensics,,,,,https://www.computer.org/csdl/magazine/co/2012/12/mco2012120025/13rRUxly9hk https://ieeexplore.ieee.org/document/6383155/ https://www.computer.org/csdl/api/v1/periodical/mags/co/2012/12/mco2012120025/13rRUxly9hk/download-article/pdf https://dl.acm.org/doi/abs/10.1109/MC.2012.399 http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000006383155 https://works.bepress.com/gary_kessler/19/ https://dblp.uni-trier.de/db/journals/computer/computer45.html#Kessler12a https://www.infona.pl/resource/bwmeta1.element.ieee-art-000006383155 http://dblp.uni-trier.de/db/journals/computer/computer45.html#Kessler12a,http://dx.doi.org/10.1109/mc.2012.399,,10.1109/mc.2012.399,1969251028,,0,,5,false,,
075-292-269-073-172,Designing robustness and resilience in digital investigation laboratories,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Philipp Amann; Joshua I. James,"This work addresses the definition and identification of key elements of robustness and resilience in the context of sustainable digital investigation capacity. After a review of prior work, we describe the results of a structured questionnaire that was sent to 72 law enforcement agencies and subject-matter experts in both online and oral formats (app. response rate 29%). Based on an in-depth analysis of the feedback received, key elements for robustness and resilience of digital investigation capacity are identified and discussed at the strategic and operational levels, including Digital Forensics Strategy, Forensic Discipline, Standardisation, Continuous Education and Training, Research and Development, Co-operation, and Human Resources.",12,,S111,S120,Human resources; Engineering management; Law enforcement; Laboratory management; Continuous education; Computer science; Management science; Digital forensics; Robustness (computer science),,,,,https://www.sciencedirect.com/science/article/pii/S174228761500016X https://core.ac.uk/display/82404286 https://dblp.uni-trier.de/db/journals/di/di12.html#AmannJ15 https://doi.org/10.1016/j.diin.2015.01.015 https://www.sciencedirect.com/science/article/abs/pii/S174228761500016X,http://dx.doi.org/10.1016/j.diin.2015.01.015,,10.1016/j.diin.2015.01.015,2123221169,,0,007-247-053-082-900; 016-370-576-455-307; 021-560-653-089-020; 021-850-998-857-676; 023-117-693-306-532; 034-117-396-807-727; 035-735-888-090-501; 040-156-142-705-287; 047-392-910-363-822; 065-732-653-055-992; 075-529-701-912-32X; 094-462-783-999-056; 100-458-632-264-11X; 105-815-075-062-738; 119-215-264-177-058; 125-951-372-642-300; 132-355-634-397-986; 154-785-137-669-213; 197-014-457-380-771,15,true,cc-by-nc-nd,hybrid
075-517-412-509-659,Bolstering forensic science through extended knowledge sharing,,2019,journal article,Forensic Science International: Reports,26659107,Elsevier BV,,Georgina Sauzier; Mubarak A. Bidmos; Graeme Horsman,,1,,100010,,Forensic science; Knowledge sharing; Computer science; Knowledge management,,,,,https://research.tees.ac.uk/en/publications/bolstering-forensic-science-through-extended-knowledge-sharing https://research.tees.ac.uk/ws/files/8720491/Bolstering_Forensic_Science_Through_Extended_Knowledge_Sharing.pdf https://core.ac.uk/download/pdf/228323040.pdf,http://dx.doi.org/10.1016/j.fsir.2019.100010,,10.1016/j.fsir.2019.100010,2977328989,,0,,0,true,"CC BY, CC BY-NC-ND",gold
075-529-701-912-32X,A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview,,2013,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Joshua I. James; Pavel Gladyshev,,10,2,148,157,Work (electrical); Data science; Suspect; Law enforcement; Decision process; Digital forensic investigation; Computer science; Operations research; Process (engineering); Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/di/di10.html#JamesG13 http://www.sciencedirect.com/science/article/pii/S1742287613000340 https://www.sciencedirect.com/science/article/pii/S1742287613000340 https://doi.org/10.1016/j.diin.2013.04.005 http://dblp.uni-trier.de/db/journals/di/di10.html#JamesG13,http://dx.doi.org/10.1016/j.diin.2013.04.005,,10.1016/j.diin.2013.04.005,2000577549,,0,019-698-064-288-240; 094-295-279-676-447,25,false,,
075-751-664-637-230,Speculative Animation: Digital Projections of Urban Past and Future:,2017-11-29,2017,journal article,Animation,17468477; 17468485,SAGE Publications,United Kingdom,Joel McKim,"This article explores the growing presence of digital animation within the work of contemporary visual artists, architects and designers concerned with urban geography. While contemporary theorists...",12,3,287,305,Engineering; Visual arts; Work (electrical); Forensic Architecture; Multimedia; Animation; Digital art; Urban geography; Computer animation,,,,,https://core.ac.uk/display/84144569 https://journals.sagepub.com/doi/full/10.1177/1746847717729581 https://core.ac.uk/download/84144569.pdf,http://dx.doi.org/10.1177/1746847717729581,,10.1177/1746847717729581,2730938732,,0,026-434-120-020-199; 027-494-851-169-836; 027-827-932-600-58X; 035-938-923-436-986; 055-129-264-634-190; 056-375-279-147-66X; 059-850-533-612-782; 065-985-411-162-926; 081-430-350-851-71X; 086-798-533-519-960; 099-833-867-457-31X; 110-084-374-606-816; 114-770-748-694-191; 122-288-247-107-379; 160-409-882-075-069; 169-886-537-809-120,3,true,cc-by-nc,hybrid
075-857-959-319-796,Forensic analysis and data recovery from water-submerged hard drives,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,null FrancoisAlicia; null NisbetAlastair,"In many digital forensic investigations, a common location to recover files as evidence of wrongdoing is a computer hard drive. Hard drives have increased greatly in storage capacity since their in...",13,2,219,,Forensic science; Wrongdoing; Computer security; Computer science; Data recovery; Digital forensics,,,,,https://dl.acm.org/doi/10.1504/ijesdf.2021.113374,http://dx.doi.org/10.1504/ijesdf.2021.113374,,10.1504/ijesdf.2021.113374,3196211796,,0,,0,false,,
075-872-921-268-845,Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings,2020-07-01,2020,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Jin Du; Ding Liping; Guangxuan Chen,"As a new object in judicial practice, electronic evidence is of great practical significance. To locate the probative force of electronic evidence, which can be used to prove the facts of the crime, judging the electronic evidence validity, and how to establish scientific rules of electronic evidence, which not only effectively contains crime, but also protects civil rights from illegal infringement of state power becomes very important. This article outlines the definition of electronic evidence and rules and establishes a suitable electronic evidence system of China's criminal procedure system based on the analysis of problems in each link of judicial proof in judicial practice and the four aspects of judicial proof.
",12,3,111,121,Computer science; Engineering ethics,,,,,https://doi.org/10.4018/IJDCF.2020070108 https://www.igi-global.com/article/research-on-the-rules-of-electronic-evidence-in-chinese-criminal-proceedings/252871 https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf12.html#DuDC20,http://dx.doi.org/10.4018/ijdcf.2020070108,,10.4018/ijdcf.2020070108,3015917920,,0,,1,true,,bronze
075-950-021-558-098,"""I couldn't find it your honour, it mustn't be there!"" - Tool errors, tool limitations and user error in digital forensics.",2018-04-17,2018,journal article,Science & justice : journal of the Forensic Science Society,13550306,Forensic Science Society,United Kingdom,Graeme Horsman,"The field of digital forensics maintains significant reliance on the software it uses to acquire and investigate forms of digital evidence. Without these tools, analysis of digital devices would often not be possible. Despite such levels of reliance, techniques for validating digital forensic software are sparse and research is limited in both volume and depth. As practitioners pursue the goal of producing robust evidence, they face the onerous task of both ensuring the accuracy of their tools and, their effective use. Whilst tool errors provide one issue, establishing a tool's limitations also provides an investigatory challenge leading the potential for practitioner user-error and ultimately a grey area of accountability. This article debates the problems surrounding digital forensic tool usage, evidential reliability and validation.",58,6,433,440,Data science; Accountability; Software; Task (project management); Digital evidence; User Error; Field (computer science); Computer science; Reliability (statistics); Digital forensics,Crime; Digital forensics; Errors; Software; Tool testing; Validation,,,,https://www.ncbi.nlm.nih.gov/pubmed/30446072 https://research.tees.ac.uk/ws/files/4187177/621947.pdf https://www.sciencedirect.com/science/article/abs/pii/S1355030617301508 https://core.ac.uk/display/157860311 https://research.tees.ac.uk/en/publications/i-couldnt-find-it-your-honour-it-mustnt-be-there-tool-errors-tool https://pubmed.ncbi.nlm.nih.gov/30446072/ https://core.ac.uk/download/pdf/196165647.pdf,http://dx.doi.org/10.1016/j.scijus.2018.04.001,30446072,10.1016/j.scijus.2018.04.001,2800946632,,0,000-226-390-590-140; 003-982-227-180-136; 008-598-808-594-324; 018-237-240-343-299; 021-039-461-635-181; 030-333-349-393-032; 030-981-431-605-722; 032-451-540-235-796; 059-068-317-738-428; 072-697-564-999-716; 074-299-373-252-299; 075-128-417-091-483; 081-896-209-272-043; 102-223-296-418-971; 122-474-821-859-110; 124-776-641-347-974; 131-807-250-432-699; 142-388-561-082-054; 143-427-291-811-40X; 144-724-915-219-138; 148-698-839-036-557; 182-670-398-460-931; 187-762-907-549-695,17,true,cc-by-nc,green
076-508-293-079-677,KES - SEAKER: A mobile digital forensics triage device,,2019,journal article,Procedia Computer Science,18770509,Elsevier BV,,Eric Gentry; Michael Soltys,"Abstract As our world of digital devices continues to expand, the amount of digital evidence encountered by law enforcement during case investigation is ever increasing. Faced with a preponderance of high capacity digital media devices, forensic investigators must be able to review them quickly, and establish which devices merit further attention. Utilizing a small single-board computer called Raspberry Pi, this mobile digital forensics triage device provides fast, targeted feedback for immediate evidence assessment. A digital forensic device is presented in this paper. It is named SEAKER (Storage Evaluator and Knowledge Extraction Reader)[1] and it enables forensic investigators to perform triage on many digital devices very quickly. Developed for on-scene, time-sensitive investigations, its utility extends to preventing over-collection and large backlogs at digital forensics labs worldwide.",159,,1652,1661,Knowledge extraction; Forensic science; Digital media; Triage; Law enforcement; Digital evidence; Computer science; Multimedia; Digital forensics,,,,,https://doi.org/10.1016/j.procs.2019.09.335 https://dblp.uni-trier.de/db/conf/kes/kes2019.html#GentryS19 https://www.sciencedirect.com/science/article/abs/pii/S1877050919315364 https://www.sciencedirect.com/science/article/pii/S1877050919315364,http://dx.doi.org/10.1016/j.procs.2019.09.335,,10.1016/j.procs.2019.09.335,2980390299,,0,066-235-037-082-291; 090-752-043-508-733; 184-069-302-229-82X,4,true,cc-by-nc-nd,gold
076-526-517-597-73X,Web-based expert system to determine digital forensics tool using rule-based reasoning approach,2021-06-01,2021,journal article,Journal of Physics: Conference Series,17426588; 17426596,IOP Publishing,United Kingdom,Erika Ramadhani; H R Pratama; Elyza Gustri Wahyuni,"Digital forensics is a method to trace the digital evidence using knowledge of science. There are several stages in the method of digital forensics. Each stage has their own way to use the method collaborate with the tool of digital forensics. Nowadays, there are tools that we can use in digital forensics. Therefore, not all the tool coming with the help document on how to use the tool. This situation makes the investigator have to check the feature of the tool one by one in order to suit which one is the best tool to use in some stage. To overcome this problem, we made a system to determine the right tool in digital forensics using rule-based reasoning approach. The result of this paper is web-based system to determine the right tool in digital forensics. The system shows that only 40% in suitability to help the investigator to determine the right tool. This cause by lacking of the rule consists in the reasoning approach.",1918,4,042003,,Software engineering; Rule-based system; Digital evidence; Help document; Web based expert system; Computer science; Feature (computer vision); TRACE (psycholinguistics); Digital forensics,,,,,https://iopscience.iop.org/article/10.1088/1742-6596/1918/4/042003 https://iopscience.iop.org/article/10.1088/1742-6596/1918/4/042003/pdf https://ui.adsabs.harvard.edu/abs/2021JPhCS1918d2003R/abstract,http://dx.doi.org/10.1088/1742-6596/1918/4/042003,,10.1088/1742-6596/1918/4/042003,3168746969,,0,006-547-691-138-217; 007-790-059-029-953; 069-862-548-231-596; 084-296-717-156-065; 104-787-005-142-28X,1,true,,gold
076-689-787-688-443,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,38,,301293,301293,Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00211-0,,10.1016/s2666-2817(21)00211-0,,,0,,0,true,,bronze
076-736-545-734-215,A Framework for Digital Forensics and Investigations: The Goal-Driven Approach,2013-04-01,2013,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Shareeful Islam; Benjamin Aziz; Clive Blackwell,"Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the requirements of digital investigations. In addition, anti-forensics situations make the forensic investigation process challenging by contaminating any stage of the investigation process, its requirements, or by destroying the evidence. Therefore, successful forensic investigations require understanding the possible anti-forensic issues during the investigation. In this paper, the authors present a new method for guiding digital forensics investigations considering the anti-forensics based on goal-driven requirements engineering methodologies, in particular KAOS. Methodologies like KAOS facilitate modeling and reasoning about goals, requirements and obstacles, as well as their operationalization and responsibility assignments. The authors believe that this new method will lead in the future to better management and organization of the various steps of forensics investigations in cyberspace as well as provide more robust grounds for reasoning about forensic evidence.",5,2,1,22,Evidence-based practice; Data science; KAOS; Task (project management); Cyberspace; Computer security; Computer science; Process (engineering); Requirements engineering; Digital forensics; Operationalization,,,,,https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf5.html#AzizBI13 https://researchportal.port.ac.uk/portal/en/publications/a-framework-for-digital-forensics-and-investigations-the-goaldriven-approach(922b64de-7919-4f1a-8313-3455bd3edb36)/export.html https://dl.acm.org/doi/10.4018/jdcf.2013040101 https://www.igi-global.com/article/a-framework-for-digital-forensics-and-investigations/83486,http://dx.doi.org/10.4018/jdcf.2013040101,,10.4018/jdcf.2013040101,1965414993,,0,000-546-270-897-052; 014-062-831-760-337; 019-831-293-743-518; 020-944-423-224-895; 025-166-987-232-333; 029-666-156-007-406; 030-359-893-882-572; 033-570-813-399-728; 035-448-415-847-226; 038-668-970-194-854; 062-032-128-092-406; 063-026-323-866-388; 071-269-562-942-065; 076-736-545-734-215; 078-598-867-814-365; 078-817-460-650-140; 081-032-497-600-401; 118-722-872-870-470; 122-880-373-616-302; 128-788-768-099-342; 137-854-345-065-123; 144-786-887-819-307; 160-421-312-635-281; 184-948-841-629-735; 190-065-821-748-92X; 199-901-259-164-000,4,false,,
076-753-080-882-502,Smartphone Forensics Analysis: A Case Study,,2013,journal article,International Journal of Computer and Electrical Engineering,17938163,IACSIT Press,,Mubarak Al-Hadadi; Ali AlShidhani,"Abstract—Smartphone forensics is a sub-set of digital forensics, and refers to the investigation and acquisition of artefacts in mobile phones. New threats to mobile phones made forensic science a challenging endeavour in the last couple of years. Number of mobile users is increasing worldwide and createstremendous problems and challenges. The literature relevant to Smartphone forensics, as explored in this paper, focuses on the architecture of Smartphone operating systems and anti-forensics techniques. It also addresses the digital evidence of Smartphone applications. In this paper, through a consideration of types of crimes involving Smartphone’s, a real case study from the Sultanate of Oman is presented. This case study undertakes practical experiments to identified sources for evidence that can later be used in the judiciary system.",,,576,580,Architecture; Digital evidence; Smartphone application; Computer security; Computer science; Computer forensics; Digital forensics,,,,,http://www.ijcee.org/index.php?m=content&c=index&a=show&catid=55&id=860 http://ijcee.org/papers/776-S0005.pdf,http://dx.doi.org/10.7763/ijcee.2013.v5.776,,10.7763/ijcee.2013.v5.776,2323481372,,0,003-504-554-245-316; 026-201-331-634-716; 062-788-502-964-113; 199-172-967-270-034,18,true,,bronze
076-771-386-025-262,Behavioural Evidence Analysis: A Paradigm Shift in Digital Forensics,,2021,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Barkha Shree; Parneeta Dhaliwal,"Recent developments in digital forensics (DF) have emphasized that along with inspection of digital evidence, the study of behavioural clues based on behavioural evidence analysis (BEA) is vital for accurate and complete criminal investigation. This paper reviews the existing BEA approaches and process models and concludes the lack of standardisation in the BEA process. The research comprehends that existing BEA methodologies are restricted to specific characteristics of the forensic domain in question. To address these limitations, the paper proposes a standardised approach detailing the step-by-step implementation of BEA in the DF process. The proposed model presents a homogenous technique that can be practically applied to real-life cases. This standard BEA framework classifies digital evidence into categories to decipher associated offender characteristics. Unlike existing models, this new approach collects evidence from diverse sources and leaves no aspect unattended while probing criminal behavioural cues, thus facilitating its applicability across varied forensic domains.",13,5,20,42,Data science; Evidence analysis; Computer science; Paradigm shift; Digital forensics,,,,,https://www.igi-global.com/article/behavioural-evidence-analysis/283125,http://dx.doi.org/10.4018/ijdcf.20210901.oa2,,10.4018/ijdcf.20210901.oa2,3181479678,,0,000-712-448-585-138; 001-710-107-055-603; 001-888-175-704-116; 003-692-278-633-267; 004-866-932-432-464; 004-872-169-627-620; 006-352-188-170-383; 006-382-928-763-481; 007-314-571-885-858; 007-489-161-042-780; 009-559-103-724-357; 010-963-610-208-920; 011-235-649-827-930; 013-568-618-083-770; 014-592-593-375-086; 020-944-423-224-895; 021-602-056-743-808; 025-770-745-916-602; 026-774-296-742-022; 029-509-980-283-055; 030-648-224-908-422; 030-725-210-334-09X; 037-194-651-631-81X; 046-806-348-582-163; 049-407-078-832-062; 050-751-725-872-625; 051-738-543-964-887; 053-204-120-030-157; 054-669-308-553-175; 059-259-578-782-71X; 059-851-945-677-333; 066-982-929-881-426; 067-410-380-403-816; 080-843-774-169-836; 082-055-672-791-486; 084-482-560-050-594; 085-858-788-409-152; 090-256-483-119-640; 098-276-664-978-304; 098-443-818-109-247; 099-528-795-169-106; 101-147-258-831-898; 104-258-481-168-508; 104-543-353-812-920; 117-151-034-673-328; 118-838-969-146-870; 118-968-004-680-589; 123-298-398-659-061; 130-131-335-093-872; 145-062-913-009-934,1,true,,gold
076-989-753-469-554,The Presumption of Innocence as a Source for Universal Rules on Digital Evidence — The guiding principle for digital forensics in producing digital evidence for criminal investigations,2021-06-01,2021,journal article,Computer Law Review International,21944164,Verlag Dr. Otto Schmidt,,Radina Stoykova,,22,3,74,82,,,,,,,http://dx.doi.org/10.9785/cri-2021-220303,,10.9785/cri-2021-220303,,,0,,0,false,,
077-218-051-852-509,Cell Forensics on Smart Phone Installed Windows Phone 7 System,,2014,journal article,Chinese Journal of Forensic Sciences,16712072,,,Yao We,"As a new emerging system on smart-phones, Windows Phone maintains a stable development. This paper studies on how to collect forensic evidence on smart-phones installed Windows Phone 7 system. After describing the system architecture and security model of Windows Phone 7, the methodology of Windows Phone 7 forensics was introduced in details. With the help of the native method and Windows Phone SDK, the Windows Phone kernel and other information could be approached.Other tools to acquire and analyze the file from the smart-phone were also used. The experiments showed that the present forensics approach could effectively extract and discover useful evidence such as SMSs, Emails and social network activities.",,,,,Operating system; Engineering; Windows Rally; Embedded system; Microsoft Cordless Phone System; GSM services; Microsoft Windows; Windows CE; Windows Vista; Security and safety features new to Windows Vista; Wallpaper,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201404012.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201404012.htm,,,2373847314,,0,,0,false,,
077-240-805-787-039,The Rise of Bots And Their Security And Privacy Challenges and Best Practices,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Sailaja Vadlamudi,,,,,,Internet privacy; Business; Best practice,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.13,http://dx.doi.org/10.46293/4n6/2020.02.04.13,,10.46293/4n6/2020.02.04.13,3095357954,,0,,0,false,,
077-271-947-547-85X,Exploring the Intersection between Databases and Digital Forensics,2022-09-21,2022,journal article,Journal of Information and Data Management,21787107,Sociedade Brasileira de Computacao - SB,,Danilo B. Seufitelli; Michele A. Brandão; Mirella M. Moro,"Digital forensics has attracted attention from assorted researchers, who primarily work on predicting and solving digital hacks and crimes. In turn, the number and types of digital crimes have increased considerably, mainly due to the growing use of digital media to perform daily personal and professional tasks. Like most computer-related activities, data is at the center of such hacks and crimes. Hence, this work presents a systematic literature review of publications at the intersection between Digital Forensics and Databases. We discuss problems and trends of two main categories: Data Building and Database Management Systems. Overall, this research opens the doors for the communication between databases and an area with several exciting and concrete challenges, with great potential for social, economic, and technical-scientific contributions.",13,3,,,,,,,,,http://dx.doi.org/10.5753/jidm.2022.2524,,10.5753/jidm.2022.2524,,,0,,0,false,,
077-416-113-129-031,Sharia Law and Digital Forensics in Saudi Arabia,,2018,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Fahad Alanazi; Andrew Jones; Catherine Menon,"© 2018 ADFSLThese days, digital crime is one of the main challenges for law enforcement and the judicial system. Many of the laws which are used to protect the users of current technologies were derived from legislation and laws that are utilized in the control of crimes that are based in the physical realm. This applies not only in Western countries, but in countries that adopt Sharia law. There is a need to establish specific legislation and accepted best practice to deal with digital crimes that is compatible with Sharia law, which affects more than one billion Muslims. This paper presents a view of the approach to digital crime in Saudi Arabia under Sharia Law, demonstrating how this is founded on principles from the Qur'an and the Sunnah, which are the sayings and deeds of the Prophet Muhammad. We describe how Sharia law differs from Western law, and how evidence for digital forensics procedures can be obtained for use under Sharia law.Peer reviewe",13,3,5,20,Sharia; Political science; Law; Digital forensics,,,,,http://uhra.herts.ac.uk/bitstream/2299/21197/1/Sharia_Law_and_Digital_Forensics_in_Saudi_Arabia.pdf https://uhra.herts.ac.uk/handle/2299/21197 https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl13.html#0002AM18 https://commons.erau.edu/jdfsl/vol13/iss3/5/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1568&context=jdfsl https://doi.org/10.15394/jdfsl.2018.1568 https://core.ac.uk/download/287581583.pdf,http://dx.doi.org/10.15394/jdfsl.2018.1568,,10.15394/jdfsl.2018.1568,2914225100,,0,,1,true,cc-by-nc,gold
077-590-082-657-678,MULTI-STAKEHOLDER CASE PRIORITIZATION IN DIGITAL INVESTIGATIONS,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Joshua I. James,"This work examines the problem of case prioritization in digital investigations for better utilization of limited criminal investigation resources. Current methods of case prioritization, as well as observed prioritization methods used in digital forensic investigation laboratories are examined. After, a multi-stakeholder approach to case prioritization is given that may help reduce reputational risk to digital forensic laboratories while improving resource allocation. A survey is given that shows diering opinions of investigation priority between Law Enforcement and the public that is used in the development of a prioritization model. Finally, an example case is given to demonstrate the practicality of the proposed method.",9,2,59,72,Risk analysis (engineering); Criminal investigation; Work (electrical); Workflow; Prioritization; Reputational risk; Law enforcement; Resource allocation; Computer science; Management science; Digital forensics,,,,,https://core.ac.uk/display/91657098 https://commons.erau.edu/jdfsl/vol9/iss2/6/ https://paperity.org/p/84095326/multi-stakeholder-case-prioritization-in-digital-investigations https://doi.org/10.15394/jdfsl.2014.1171 https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#James14 https://commons.erau.edu/cgi/viewcontent.cgi?article=1171&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2014.1171,,10.15394/jdfsl.2014.1171,1606724700,,0,002-425-923-429-013; 047-630-600-014-492; 073-847-291-567-156; 090-752-043-508-733; 092-237-744-940-330; 094-295-279-676-447; 113-035-706-203-182; 157-804-190-614-318,5,true,cc-by-nc,gold
077-603-385-952-05X,Proposed Proactive Digital Forensic Approach for Cloud Computing Environment,2018-10-07,2018,journal article,International Journal of Engineering & Technology,2227524x,Science Publishing Corporation,,Ganthan Narayana Samy; Nurazean Maarop; Doris Hooi-Ten Wong; Fiza Abdul Rahim; Noor Hafizah Hassan; Sundresan Perumal; Pritheega Magalingam; Sameer Hasan Albakri,"There are many challenges for the digital forensic process in the cloud computing due to the distinguished features of the cloud computing environment. Many of well-known digital forensic methods and tools are not suitable for cloud computing environment. The multi-tenancy, multi-stakeholder, Internet-based, dynamics expendability, and massive data, logs and datasets are examples of the cloud computing environment features that make conducting digital forensics in the cloud computing environment a very difficult task. Therefore, there is a need to develop an appropriate digital forensic approach for cloud computing environment. Thus, this paper proposed a proactive digital forensic approach for cloud computing environment. ",7,4,12,15,Computer security; Computer science; Cloud computing; Digital forensics,,,,,https://pure.uniten.edu.my/en/publications/proposed-proactive-digital-forensic-approach-for-cloud-computing- https://www.sciencepubco.com/index.php/ijet/article/viewFile/21362/10122,http://dx.doi.org/10.14419/ijet.v7i4.15.21362,,10.14419/ijet.v7i4.15.21362,2941543733,,0,,2,true,,bronze
077-604-181-180-814,The Diplomatic and Digital Forensic Science in Born-Digital Records: The Quest for Authenticity,2018-07-01,2018,journal article,Journal of Integrated OMICS,21820287,Proteomass Scientific Society,,Juan Bernardo Montoya-Mogollón; Sonia Maria Troitiño Rodriguez,"This paper aims at the application of Digital Diplomatic and Digital Forensics Science in digital-born records, in order to guarantee its authenticity in institutional routines and processes, but also as a source of proof in possible legal and juridical scenarios. In view of the vast and fruitful discussions focused on the complexity of the digital records in Archival Science and Information Science (I.S.), there is a gap to manage and preserve the digital records, keeping them reliable, accurate and authentic in systems that have the same conditions. This gap makes it impossible to preserve records in the long term due, firstly, to the fragility of the systems where they are stored and, secondly, to the constant risks of obsolescence of hardware and software that occur on a day by day. Digital Diplomatic Science assists this process by determining the form and content of the record to evidence its legal-diplomatic authenticity and establish its historical value. Digital Forensic Science, in turn, provides support for the chain of custody to remain intact, regardless of the medium on which the digital record is fixed. The following questions is raised: Is it possible to apply the practice of law and the Digital Forensics in the area of the Archival Science and information science, guaranteeing the authenticity of the born-digital record. In addition, in which way does the junction between Digital Diplomatic Science and Digital Forensic Science guarantee the preservation and preservation of the born-digital records. To answer such questions, this research proposes to link five areas of knowledge following the scientific experiences conducted at the University of British Columbia in Canada by the InterPares (International Research on Permanent Authentic Records) group. Areas of knowledge that are offering interesting results for the preservation not only of the record, but also of the social memory: 1.Digital Forensics: discipline that joint Forensics Science with Computer Science to analyze the digital evidence. 2. Diplomatics Science: Science to analyze the form and structure to the records. 3. Archival Science: Science to involves the whole of the principles, policies, strategies, and activities designed to ensure the physical and technological stabilization of records for the purpose of extending indefinitely their life and protecting the accuracy and authenticity of and maintaining the accessibility to their intellectually content [1] . 4. Information Science: Science to analyze the information in different contexts. The research will carried out in a theoretical and qualitative way, taking into account the literature shared in the site Digital Records Forensics Project, coordinated by the author Luciana Duranti of the InterPares group, and the bibliography produced in the country of the areas of knowledge already referenced. The results obtained will contribute to the realization of alternative researches in document conservation within the Archival Science and the Information Science.",8,1,74,76,Chain of custody; Data science; Practice of law; Born-digital; Digital evidence; Obsolescence; Computer science; Archival science; Digital forensics; Information science,,,,,http://www.jiomics.com/index.php/jio/article/view/219 http://dx.doi.org/10.5584/jiomics.v8i1.219,http://dx.doi.org/10.5584/jiomics.v8i1.219,,10.5584/jiomics.v8i1.219,2847700262,,0,,0,false,,
077-923-684-553-780,ForTrace - A holistic forensic data set synthesis framework,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Thomas Göbel; Stephan Maltan; Jan Türr; Harald Baier; Florian Mann,"Digital forensic experts are confronted with a wide variety of investigation objectives, e.g., to deal with an infected IT system. The same holds for digital forensic tools. Mostly different sources of digital traces have to be inspected including persistent storage devices (e.g., SSDs, SD cards, USB drives), volatile main memory snapshots, and network captures, respectively. In order to train experts and tools and keep their knowledge and capabilities up-to-date, a capacious amount of realistic, timely training data is necessary. However, due to different reasons like privacy, secrecy, or intellectual property rights there is a large gap in digital forensic training data. In recent years different synthesis frameworks to generate realistic digital forensic data sets have been proposed. However, none of these frameworks provides a holistic approach to generate realistic digital forensic relevant traces of different sources. In this paper we introduce ForTrace , a holistic framework for the simultaneous generation of persistent, volatile and network traces. Our approach is based on the data synthesis framework hystck . We explain our extension of hystck by defining properties of a holistic data set synthesis framework and by discussing different forensically relevant scenarios and their implementation in ForTrace . We then successfully evaluate ForTrace with respect to diverse realistic and complex scenarios. ForTrace is open source and may be adapted or extended with respect to individual needs.",40,,301344,301344,Computer science; Digital forensics; Set (abstract data type); Variety (cybernetics); Data science; Secrecy; Intellectual property; Computer security,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301344,,10.1016/j.fsidi.2022.301344,,,0,001-134-660-509-890; 013-982-587-242-698; 021-003-216-544-791; 036-112-898-081-145; 047-997-437-748-154; 104-153-499-789-950,1,true,,hybrid
077-963-490-848-763,A comprehensive digital forensic investigation process model,,2016,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Reza Montasari,"A formal process model is needed to enable digital forensic practitioners in following a uniform approach and to enable courts of law in determining the reliability of digital evidence presented to them. Such a model also needs to be generic in that it can be applicable in the different fields of digital forensics including law enforcement, corporates and incident response. There does not currently exist such a comprehensive process model that is both formal and generic. To address these shortcomings, this paper proposes a model that is formal in that it can enable the digital forensic practitioners in following a uniform approach when carrying out investigations and that is generic in that it can be applied in the different environments of digital forensics.",8,4,285,302,Data science; Law enforcement; Digital evidence; Incident response; Computer security; Computer science; Process (engineering); Reliability (statistics); Computer forensics; Process modeling; Digital forensics,,,,,https://pure.hud.ac.uk/en/publications/a-comprehensive-digital-forensic-investigation-process-model https://www.open-access.bcu.ac.uk/4549/ https://cronfa.swan.ac.uk/Record/cronfa54939 https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2016.079430 https://dl.acm.org/doi/10.1504/IJESDF.2016.079430 https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf8.html#Montasari16a https://dl.acm.org/citation.cfm?id=3004918,http://dx.doi.org/10.1504/ijesdf.2016.079430,,10.1504/ijesdf.2016.079430,2523853946,,0,004-652-388-189-304; 004-872-169-627-620; 005-515-442-506-880; 007-314-571-885-858; 011-787-351-244-594; 019-831-293-743-518; 020-944-423-224-895; 021-486-901-460-202; 021-850-998-857-676; 022-502-903-446-942; 026-774-296-742-022; 030-359-893-882-572; 034-153-736-380-589; 038-668-970-194-854; 044-377-145-020-27X; 047-859-979-695-194; 052-052-141-922-342; 063-274-848-736-685; 067-726-260-424-525; 067-844-385-207-96X; 083-748-184-402-072; 087-041-369-426-333; 092-058-232-746-872; 120-697-354-224-33X; 132-355-634-397-986; 133-397-275-695-990; 140-821-103-436-654; 143-562-788-834-457; 151-378-930-836-964; 160-160-097-559-323; 162-110-149-751-921; 171-803-389-787-120; 173-034-553-635-460; 180-327-460-336-608; 182-691-566-109-191; 190-065-821-748-92X; 190-872-133-741-434; 192-810-463-153-431; 199-745-676-923-766,14,false,,
078-095-922-471-787,Onto-Engineering: A Conceptual framework for Integrating Requirement Engineering Process with scientifically tuned Digital Forensics Ontologies,,2017,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Victor R. Kebande; Nickson M. Karie Lindiwe M. Maake,,6,2,73,83,Software engineering; Digital transformation; Conceptual framework; Computer science; Process (engineering); Wireless; Knowledge management; Requirements engineering; Digital forensics,,,,,http://sdiwc.net/digital-library/ontoengineering-a-conceptual-framework-for-integrating-requirement-engineering-process-with-scientifically-tuned-digital-forensics-ontologies,http://dx.doi.org/10.17781/p002271,,10.17781/p002271,2746919277,,0,,2,false,,
078-187-982-222-182,Book Review: Digital Forensics Trial Graphics: Teaching the Jury through Effective Use of Visuals:,2017-09-01,2017,journal article,Academic Forensic Pathology,19253621,SAGE Publications,,Rand Swartz,,7,3,xii,xiii,Engineering; Graphics; Jury; Multimedia; Digital forensics,,,,,https://journals.sagepub.com/doi/abs/10.1177/192536211700700304,http://dx.doi.org/10.1177/192536211700700304,,10.1177/192536211700700304,2810038464,,0,,0,true,,green
078-327-902-374-330,Developing a new digital forensics curriculum,,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Anthony Lang; Masooda Bashir; Roy H. Campbell; Lizanne DeStefano,"We are developing a new undergraduate certificate program in digital forensics at the University of Illinois at Urbana-Champaign. To create a curriculum consistent with the fundamentally multidisciplinary nature of the field of digital forensics, we assembled a curriculum development team that includes domain experts from the fields of computer science, law, social science, psychology, and accounting. To lower the entry barrier preventing institutions from adopting digital forensics programs, we are designing the curriculum with the express intent of distributing it as a self-contained curriculum package with everything needed to teach the course. When complete, our program will consist of an introductory and an advanced course in digital forensics, with accompanying hands-on labs. At the time of writing, we have developed the curriculum for our introductory course and taught a pilot class, and we are in the process of revising the curriculum for distribution to other institutions. This paper describes our program's goals, methodology, and rationale; our experience developing and teaching our new curriculum; and the revisions we are making based on this experience and feedback from our students.",11,,S76,S84,Curriculum mapping; Emergent curriculum; Class (computer programming); Curriculum development; Computer science; Curriculum; Multimedia; Network forensics; Engineering ethics; Computer forensics; Digital forensics,,,,National Science Foundation,https://www.sciencedirect.com/science/article/pii/S1742287614000516 https://www.sciencedirect.com/science/article/abs/pii/S1742287614000516 https://experts.illinois.edu/en/publications/developing-a-new-digital-forensics-curriculum http://www.sciencedirect.com/science/article/pii/S1742287614000516,http://dx.doi.org/10.1016/j.diin.2014.05.008,,10.1016/j.diin.2014.05.008,2012713286,,0,004-916-146-042-728; 012-314-515-683-048; 023-366-664-256-123; 036-733-117-655-399; 058-216-067-155-646; 063-579-080-753-513; 088-699-775-204-397; 102-679-985-151-761; 106-215-046-097-04X,29,true,cc-by-nc-nd,hybrid
078-451-188-373-346,Research onTort Forensics Method Based on Asymmetric Watermarking,,2012,journal article,Computer Simulation,10069348,,,HE Yi-hui,"In the study of digital image tort forensics optimization,the encryption method of digital image encryption pretreatment is directly related to the success rate of follow-up tort forensics.Symmetric watermarking mechanism needs to expose the key and vulnerable,the traditional method of the symmetric watermarking tort forensics is vulnerable,and so the success rate of tort forensics is not high.In order to solve this problem,a method of the tort forensics based on asymmetric watermark was presented.It made use of asymmetric watermarking embedding for digital image copyright protection in image encryption pretreatment,because of keys without exposed in the extraction of watermark.It can effectively resist the attacks to protect evidence of infringement and to avoid the insufficient of the traditional method vulnerable effects,by integrally extracting the digital watermark characteristic information in tort images and making use the clustering algorithm of LSH.Finally,it completed the tort evidence extraction to ensure the success rate of infringement evidence.The simulation results show that the improved method can effectively extract the evidence of infringement with high success rate of forensics and satisfactory results.",,,,,Image (mathematics); Engineering; Encryption; Digital watermarking; Watermark; Tort; Improved method; Computer security; Digital image; Cluster analysis,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJZ201210042.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJZ201210042.htm,,,2374583683,,0,,0,false,,
078-481-282-973-45X,TOWARDS ACHIEVING RELIABLE DIGITAL FORENSICS IN IAAS AND STAAS CLOUDS USING THE OPEN CLOUD FORENSICS MODEL,,2016,journal article,Services Transactions on Cloud Computing,23267542; 23267550,Services Society,,,,4,3,,,Digital forensics; Cloud computing; Computer science; Computer security; Network forensics; Operating system,,,,,,http://dx.doi.org/10.29268/stcc.2016.4.3.2,,10.29268/stcc.2016.4.3.2,,,0,,1,true,,gold
078-527-708-630-261,Digital Forensics on Screen Locked Android Smart Phone,,2015,journal article,Chinese Journal of Forensic Sciences,16712072,,,Wei Ron,"Objective To study the effective method to acquire or recover the data from screen-locked mobile phones with no password and USB debugging enabled. Methods The booting principles of Android smart phone were analyzed. A method based on Android debug bridge protocol was presented in order to clear the screen lock password. Then the USB debugging was opened and forensics tools could be connected. Result Testing on ZTE n760 intelligent mobile phone, the method of mobile phone forensics was proved to be successful, without losing user data. Conclusion In the recovery mode, by connecting the mobile phone to a computer through the ADB protocol and removing the password file, the USB debug port could be opened and the digital forensics could be performed without losing user data.",,,,,Password; Engineering; Embedded system; GSM services; Mobile phone; Lock screen; USB; Android (operating system); Mobile device forensics; Digital forensics,,,,,http://en.cnki.com.cn/Article_en/CJFDTotal-SFJD201501015.htm,http://en.cnki.com.cn/Article_en/CJFDTotal-SFJD201501015.htm,,,2370844477,,0,,0,false,,
078-908-560-808-973,Role and Impact of Digital Forensics in Cyber Crime Investigations,,2019,journal article,INROADS- An International Journal of Jaipur National University,22774904; 22774912,Diva Enterprises Private Limited,,S. Krishnan,"Cybercrime is a growing problem, but the ability of law enforcement agencies to investigate and successfully prosecute criminals for these crimes is unclear. While law enforcement agencies have been conducting these investigations for many years, the previously published needs assessments all indicated that there is lack the training, tools or staff to effectively conduct investigations with the volume or complexity included in many of these cases. This study discussed on Cybercrime and Global Economic Growth, Reasons for Conducting a Digital Forensic Investigation, Various Branches of Digital Forensics in details, Potential Source of Digital Evidence, standard operating procedure for digital evidence, Legal Aspects and What the Future Holds in the field of digital forensics.",8,1and2,64,75,Internet privacy; Standard operating procedure; Cybercrime; Law enforcement; Digital evidence; Needs assessment; Cyber crime; Potential source; Computer science; Digital forensics,,,,,https://www.indianjournals.com/ijor.aspx?target=ijor:inroads&volume=8&issue=1and2&article=012,http://dx.doi.org/10.5958/2277-4912.2019.00012.2,,10.5958/2277-4912.2019.00012.2,2999986322,,0,173-034-553-635-460,0,false,,
079-365-341-407-369,METHODS FOR FORGERY DETECTION IN DIGITAL FORENSICS,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Sanjeevani K. Shah; Punam Raskar,,1,1,1,,,,,,,,http://dx.doi.org/10.1504/ijesdf.2021.10035056,,10.1504/ijesdf.2021.10035056,,,0,,0,false,,
079-483-836-523-473,Phase-Oriented Advice and Review Structure (PARS) for Digital Forensic Investigations,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Aliloulaye Tchaou,"The PARS is the first documented peer review methodology for the digital forensics field, a six staged approach designed to formally support organizations and their staff in their goal of facilitating effective peer review of digital forensic work, from investigative tasks to forensic activities and forensic analysis processes (Pollitt et al., 2018). This assignment discusses how the PARS methodology can be implemented, and the available options and mechanisms available to ease the interpretation of this model into existing practices. Both the early ‘Advisor’ and later ‘Reviewer’ roles in PARS are discussed and their requirements and expectations are defined. Keywords: Digital forensics, Peer review, Digital evidence, Quality assurance, Forensic science Multi-staged Rview, Multi-person Review BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Aliloulaye Tchaou (2022): Phase-Oriented Advice and Review Structure (PARS) for Digital Forensic Investigations Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 173-180 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P28",1,1,173,180,Digital forensics; Digital evidence; Computer forensics; Nexus (standard); Computer science; Forensic science; Advice (programming),,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p28,,10.22624/aims/crp-bk3-p28,,,0,,0,true,,bronze
079-499-568-978-91X,Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist,2018-08-30,2018,journal article,IT JOURNAL RESEARCH AND DEVELOPMENT,25284053; 25284061,UIR Press,,Anton Yudhana; Riadi; Ikhwan Anshori,"Facebook Messenger menjadi media sosial yang populer kedua setelah Whatsapp di tahun 2017. Meningkatnya jumlah pengguna Facebook Messenger tentu membawa dampak positif dan negatif, salah satu efek negatifnya adalah beberapa orang yang menggunakan Facebook Messenger melakukan kejahatan digital. Jika sebuah smartphone android menjadi bukti dalam kasus pidana dan Facebook Messenger terinstall di smartphone tersebut, maka pada aplikasi ini bukti digital dapat diidentifikasi dan dapat diharapkan menjadi pilihan untuk membantu penegakan hukum dalam mengungkap kejahatan digital. Proses identifikasi berdasarkan proses forensic mobile yang berdasarkan metode NIST (National Institute of Standards Technology). NIST memiliki panduan kerja baik itu kebijakan dan standar untuk menjamin setiap examiner mengikuti alur kerja yang sama sehingga pekerjaan mereka terdokumentasikan dan hasilnya dapat di ulang (repeatable) dan dapat dipertahankan (defendable). Penelitian ini menjelaskan gambaran umum bagaimana teknik-teknik yang dapat digunakan untuk mengembalikan bukti digital berupa text,gambar, dan audio pada Facebook Mesenger yang ada di Smartphone Android.",3,1,13,21,,,,,,http://journal.uir.ac.id/index.php/ITJRD/article/download/1658/1225 https://core.ac.uk/download/pdf/322502217.pdf,http://dx.doi.org/10.25299/itjrd.2018.vol3(1).1658,,10.25299/itjrd.2018.vol3(1).1658,2898508302,,0,,7,true,cc-by-sa,gold
079-532-400-549-646,MEMORY FORENSIC DEVELOPMENT AND CHALLENGES IN IDENTIFYING DIGITAL CRIME : A REVIEW,2022-03-02,2022,journal article,TEKNOKOM,26863219; 26218070,Universitas Wiralodra,,Yasep Azzery; Nur Dwi Mulyanto; Taufik Hidayat,"Digital forensic technology is currently advancing along with the demands to uncover various crimes using technology. Memory Forensic is one of the investigative fields in digital forensics. We use the Systematic Literature Review method to identify the developments and challenges of Forensic Memory in identifying digital crimes, analyzed from various reference papers according to the Include and Exclude Criteria and based on the specified Research Question. Authors chose from 30 reference journals from 3 online journal databases namely IEEE Explore, Sciencedirect, and Springer with themes related to forensic memory based on certain criteria for further review to determine the development of digital crime. The results of the SLR that we convey are the result of a study related to the use of Memory Forensic in identifying various digital attacks and challenges faced in the future.",5,1,96,102,Digital forensics; Computer science; Forensic science; Digital evidence; Computer forensics; Data science; Crime scene; Computer security,,,,,,http://dx.doi.org/10.31943/teknokom.v5i1.73,,10.31943/teknokom.v5i1.73,,,0,,0,true,,hybrid
079-624-398-794-48X,A UML-Based Approach for Analysing Potential Digital Forensic Evidence,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Victor R. Kebande; Nickson M. Karie,,7,4,354,362,Software engineering; Unified Modeling Language; Computer science; Wireless; Digital forensics,,,,,http://sdiwc.net/digital-library/a-umlbased-approach-for-analysing-potential-digital-forensic-evidence,http://sdiwc.net/digital-library/a-umlbased-approach-for-analysing-potential-digital-forensic-evidence,,,2892001513,,0,,0,false,,
079-726-245-728-809,A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics,,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Asanka Sayakkara; Nhien-An Le-Khac; Mark Scanlon,"Abstract The increasing prevalence of Internet of Things (IoT) devices has made it inevitable that their pertinence to digital forensic investigations will increase into the foreseeable future. These devices produced by various vendors often posses limited standard interfaces for communication, such as USB ports or WiFi/Bluetooth wireless interfaces. Meanwhile, with an increasing mainstream focus on the security and privacy of user data, built-in encryption is becoming commonplace in consumer-level computing devices, and IoT devices are no exception. Under these circumstances, a significant challenge is presented to digital forensic investigations where data from IoT devices needs to be analysed. This work explores the electromagnetic (EM) side-channel analysis literature for the purpose of assisting digital forensic investigations on IoT devices. EM side-channel analysis is a technique where unintentional electromagnetic emissions are used for eavesdropping on the operations and data handling of computing devices. The non-intrusive nature of EM side-channel approaches makes it a viable option to assist digital forensic investigations as these attacks require, and must result in, no modification to the target device. The literature on various EM side-channel analysis attack techniques are discussed – selected on the basis of their applicability in IoT device investigation scenarios. The insight gained from the background study is used to identify promising future applications of the technique for digital forensic analysis on IoT devices – potentially progressing a wide variety of currently hindered digital investigations.",29,1,43,54,Group method of data handling; Encryption; Eavesdropping; Computer security; Computer science; Side channel attack; USB; Bluetooth; Wireless; Digital forensics,,,,EM; EM,https://www.markscanlon.co/papers/SurveyEMSideChannelsForensics.php https://www.sciencedirect.com/science/article/abs/pii/S1742287618303840 https://ui.adsabs.harvard.edu/abs/2019arXiv190307703S/abstract https://markscanlon.co/papers/SurveyEMSideChannelsForensics.pdf http://arxiv.org/pdf/1903.07703.pdf https://doi.org/10.1016/j.diin.2019.03.002 https://forensicsandsecurity.com/papers/SurveyEMSideChannelsForensics.php http://dblp.uni-trier.de/db/journals/corr/corr1903.html#abs-1903-07703 https://forensicsandsecurity.com/papers/SurveyEMSideChannelsForensics.pdf https://arxiv.org/abs/1903.07703 https://dblp.uni-trier.de/db/journals/corr/corr1903.html#abs-1903-07703 http://arxiv.org/abs/1903.07703,http://dx.doi.org/10.1016/j.diin.2019.03.002,,10.1016/j.diin.2019.03.002,3105177289; 2921035272,,0,004-935-670-222-50X; 006-204-392-444-738; 009-745-160-749-680; 009-935-696-637-959; 011-792-058-837-127; 012-673-816-043-057; 012-867-377-866-486; 014-137-537-326-066; 014-995-077-316-676; 015-315-804-193-751; 015-704-870-742-148; 016-139-631-313-175; 016-661-251-213-668; 016-820-759-114-076; 017-328-201-360-86X; 017-335-677-993-203; 017-916-684-775-525; 018-728-219-873-777; 021-998-933-410-065; 022-391-080-797-645; 023-170-919-695-853; 024-831-771-938-864; 024-993-702-381-603; 025-837-173-916-001; 026-591-248-665-825; 027-163-958-987-808; 027-265-141-482-204; 027-933-119-794-851; 029-159-400-662-132; 029-748-683-221-796; 030-644-948-433-321; 030-879-422-716-26X; 032-501-427-040-287; 033-089-942-594-860; 034-306-162-114-437; 035-008-147-148-461; 036-198-835-759-991; 036-315-839-495-866; 037-304-752-152-900; 038-294-110-895-85X; 038-334-854-136-016; 039-627-889-157-293; 040-565-525-219-769; 040-595-011-464-174; 042-636-923-996-676; 043-588-566-141-540; 044-367-276-167-133; 045-216-191-719-769; 045-470-586-870-387; 046-267-876-132-772; 047-818-759-270-572; 050-834-445-581-19X; 051-174-262-378-725; 051-544-952-658-711; 051-870-124-075-370; 057-662-229-017-371; 058-638-649-158-740; 059-527-744-465-444; 060-369-813-003-88X; 060-517-968-088-162; 063-818-522-978-273; 063-878-126-628-743; 064-092-804-942-240; 064-446-276-797-689; 064-832-676-494-842; 065-472-112-492-569; 066-529-103-339-301; 066-759-931-116-967; 067-682-730-995-831; 068-491-843-060-017; 069-007-833-693-813; 069-607-942-284-68X; 071-311-399-697-624; 074-614-672-576-143; 075-492-908-245-230; 081-034-805-666-007; 081-519-923-581-499; 082-042-701-545-24X; 082-746-024-018-906; 083-139-412-854-983; 084-979-800-495-589; 085-868-644-488-858; 088-023-546-650-123; 089-885-926-905-621; 091-352-470-901-517; 093-795-930-617-994; 095-736-127-631-909; 099-985-373-806-439; 104-773-981-185-87X; 107-999-389-297-283; 108-005-459-485-988; 110-311-156-990-220; 111-386-363-549-545; 111-442-189-014-994; 116-516-196-774-036; 117-795-652-474-055; 118-286-558-259-165; 118-783-365-990-346; 120-462-880-448-150; 122-118-487-000-106; 122-494-525-238-756; 126-201-670-860-991; 127-616-531-697-881; 133-753-731-718-112; 137-755-137-054-864; 144-493-153-671-981; 150-470-771-960-137; 160-370-472-488-703; 160-630-210-597-764; 163-360-724-847-54X; 165-994-624-449-955; 166-252-929-809-812; 170-972-427-798-244; 177-636-893-655-197; 183-574-974-997-451,42,true,,green
080-282-279-211-788,Network Forensics for Detecting SQL Injection Attacks Using NIST Method,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Arif Roid Caesarano; Riadi,,7,4,436,443,NIST; Operating system; SQL injection; Computer science; Network forensics; Wireless,,,,,http://www.sdiwc.net/digital-library/network-forensics-for-detecting-sql-injection-attacks-using-nist-method.html,http://www.sdiwc.net/digital-library/network-forensics-for-detecting-sql-injection-attacks-using-nist-method.html,,,2895448980,,0,124-129-640-160-197,5,false,,
080-720-916-061-995,The Digital Forensic Tools Accuracy and Specifications,2022-03-05,2022,journal article,Academic Journal of Research and Scientific Publishing,27066495,Sciegate,,Jasir Adel Altheyabi,"The research aims to provide an overview of computer forensics, the history of computer forensics tools, and the accuracy and specifications of these tools. With the great and accelerating technological development, the reliance on the Internet has become greater and stronger than before. The world has become dependent on technology in all production and economic operations. And we talked in the second axis of the search for The Computer Forensic Legal Requirement, and Presentation of the tools used in the criminal investigation and an explanation of each tool. The digital forensic investigation tools that we will explain in this research are FTK. Forensic Toolkit, Prodiscovery, Autopsy, p2commander, OSForensics. We conclude that digital investigation tools have outstanding performance on different mediums. It has high accuracy and efficiency in digital investigation, and no single tool is superior to some other tools in all media. With more than one tool on a range of devices, it improves the investigation and testimony capabilities of examinees during exploration.",3,35,58,65,Business; Risk analysis (engineering); Transport engineering; Operations management; Finance,,,,,,http://dx.doi.org/10.52132/ajrsp.e.2022.35.3,,10.52132/ajrsp.e.2022.35.3,,,0,,0,true,,bronze
080-731-392-562-484,Development of Windows forensic tool for verifying a set of data,2015-12-31,2015,journal article,Journal of the Korea Institute of Information Security and Cryptology,15983986,Korea Institute of Information Security and Cryptology,,Minseo Kim; Sang-jin Lee,"For an accurate analysis through the forensic of digital devices and computer, it is a very important validation of the reliability of digital forensic tools. To verify the reliability of the tool, it is necessary to research and development of the data set to be input to the tool. In many-used Windows operating system of the computer, there is a Window forensic artifacts associated with time and system behavior. In this paper, we developed a set of data in the Windows operating system to be able to analyze all of the two Windows artifacts and we conducted a test with published digital forensic tools. Therefore, the developed data set presents the use of the following method. First, artefacts education for growing ability can be analyzed acts standards. Secondly, the purpose of tool tests for verifying the reliability of digital forensics. Lastly, recyclability for new artifact analysis.",25,6,1421,1433,Data mining; Set (abstract data type); Development (topology); Window (computing); Artifact (software development); Computer science; Reliability (statistics); Microsoft Windows; Data set; Digital forensics,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2015_v25n6_1421,http://dx.doi.org/10.13089/jkiisc.2015.25.6.1421,,10.13089/jkiisc.2015.25.6.1421,2318429789,,0,001-960-134-177-077; 004-190-067-200-599; 004-652-388-189-304; 040-393-580-637-973; 043-409-832-398-87X; 058-631-300-195-90X; 064-062-472-395-879; 099-347-849-544-731; 104-220-579-021-738; 108-086-708-688-274; 130-516-859-801-769; 133-752-203-150-119; 135-717-892-795-412; 142-226-580-142-17X; 142-729-737-144-734; 184-948-841-629-735; 185-343-535-827-64X,0,true,,bronze
080-788-467-889-236,The Definition of Digital Criminalistics as the Origin of a Misleading Direction in Science. Part 2,2021-03-25,2021,journal article,Legal education and science,18131190,The Publishing Group Jurist,,Oleg S. Kuchin; Yaroslava O. Kuchina,"Purpose. To compare and analyze the trend of appearance of the pseudo-term ‘digital criminology’ in the science of criminology and prove that this is incorrect. Methodology: induction, deduction, synthesis, analysis, formal legal method, comparative legal method, logical method. Conclusions. The evolution of methods of committing crimes and instruments of crime does not always require the evolution of the science of criminology and the emergence of its varieties. You just have to assess the prospects of extrapolative ways and methods of proving the circumstances of the crimes in the era of digitalization of social relations, in terms of the provisions of modern criminal law and only criminal-legal research unit. The definition of ‘digital criminalistics’, which has recently appeared in science, actually misleads the scientific community with its novelty and originality, since such criminalistics in nature does not exist a priori. It is necessary to speak only about forensic or expert research of carriers of digital (electronic or computer) information. In criminalistics, it is logical to develop a new direction-the forensic study of electronic media of digital information and the use of computer expertise in establishing all the circumstances of the crime committed. And this is just a new section of forensic technology, studying a new subject of research for this naki. Here, the traditional forensic methodology should be applied, which will be aimed ‘atlinking’ the electronic carrier of digital information and the digital information itself to a specific crime and to a specific person. Scientific and practical significance. The research is aimed at orienting forensic theory and practice towards the study of specific objects and contributes to the fact that all these studies are further applicable to the practice of crime investigation, and not only for theoretical purposes.",3,,25,33,Epistemology; Philosophy,,,,,http://dx.doi.org/10.18572/1813-1190-2021-3-25-33,http://dx.doi.org/10.18572/1813-1190-2021-3-25-33,,10.18572/1813-1190-2021-3-25-33,3215654066,,0,,0,true,,bronze
081-140-064-081-587,Building Ontologies for Digital Forensic Terminologies,,2016,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Nickson M. Karie; Victor R. Kebande,"Digital forensics (DF) is a relatively new discipline with a lot of technical and non-technical terminologies that can be hard to comprehend. During a timeintensive digital forensic investigation process, for example, investigators may at times encounter several new terminologies. In such a scenario, the time required to unearth and analyse the root cause of a potential security incident might be influenced by the complexity involved in resolving the meaning of new terminologies encountered. The difficulty lies in the lack of an approach in DF that can help investigators in resolving the meaning of terminologies or even how these terminologies are perceived by individuals especially when used in their domain of expertise. If existing digital forensic tools, for example, were to be designed in such a way as to allow investigators to automatically resolve or incorporate the meaning of new terminologies used or encountered during investigations, then the time required to unearth and analyse the root cause of a security incident might be reduced extensively. The main problem addressed in this paper therefore, is that, there exists no approaches in DF that have the ability to help investigators in reasoning with regard to the perceived meaning of different digital forensic terminologies encountered during a digital forensics investigation process. Existing tools thus needs to incorporate new approaches that can help in resolving or clarifying the meaning of new terminologies used during investigation processes. For this reason, this paper examines the concept of building ontologies for digital forensic terminologies and proposes an ontological approach to resolve the meaning of different digital forensic terminologies. Besides, ontologies are known to provide a form of knowledge in a given discipline of interest. In the authors’ opinion, thus, building ontologies for digital forensic terminologies can support the development of future investigative tools as well as new techniques to a degree of certainty.",5,2,75,82,Existential quantification; Domain (software engineering); Information retrieval; Data science; Meaning (existential); Degree of certainty; Digital forensic investigation; Computer science; Process (engineering); Digital forensics; Root cause,,,,,http://www.sdiwc.net/digital-library/building-ontologies-for-digital-forensic-terminologies.html,http://dx.doi.org/10.17781/p002032,,10.17781/p002032,2339452396,,0,024-496-616-601-772; 026-712-844-452-082; 026-787-086-442-120; 027-803-437-597-006; 030-136-936-524-671; 036-132-248-316-123; 065-873-523-989-876; 089-373-543-566-272; 102-527-262-841-07X; 118-214-545-268-860,16,false,,
081-152-890-798-991,Digital forensic standards and digital evidence in Polish criminal proceedings. An updated definition of digital evidence in forensic science,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Piotr Lewulis,Digital evidence is increasingly popular in criminal proceedings - not only to those commonly referred to as 'cybercrimes'. The credibility criteria of such evidence are in theory governed by a set...,13,1,403,417,Forensic science; Set (abstract data type); Data science; Credibility; Digital evidence; Computer science; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2021.116024,http://dx.doi.org/10.1504/ijesdf.2021.10034988,,10.1504/ijesdf.2021.10034988,3122539278,,0,,0,false,,
081-274-353-682-729,Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging & Tagging of Digital Devices in Immersive Virtual Reality,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Courtney Hassenfeldt; Jillian Jacques; Ibrahim Baggili,"Abstract This work presents the first account of evaluating learning inside a VR experience created to teach Digital Forensics (DF) concepts, and a hands-on laboratory exercise in Bagging & Tagging a crime scene with digital devices. First, we designed and developed an immersive VR experience which included a lecture and a lab. Next, we tested it with (n = 57) participants in a controlled experiment where they were randomly assigned to a VR group or a physical group. Both groups were subjected to the same lecture and lab, but one was in VR and the other was in the real world. We collected pre- and post-test results to assess the participants’ knowledge in DF concepts learned. Our experimental results indicated no significant differences in scores between the immersive VR group and the physical group. However, our results showed faster completion times in VR by the participants, which hints at VR being more time efficient, as virtual environments can be spun programmatically with little downtime.",33,,301011,,Crime scene; Virtual reality; Controlled experiment; Time efficient; Computer science; Multimedia; Digital forensics,,,,National Science Foundation,https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1102&context=electricalcomputerengineering-facpubs https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/101/ https://dfrws.org/wp-content/uploads/2020/10/2020_USA_paper-exploring_the_learning_efficacy_of_digital_forensics_concepts.pdf https://www.sciencedirect.com/science/article/pii/S2666281720302602 https://doi.org/10.1016/j.fsidi.2020.301011 https://dfrws.org/presentation/is-my-digital-forensics-professor-better-in-virtual-reality-vr-exploring-learning-in-vr-versus-the-physical-world/,http://dx.doi.org/10.1016/j.fsidi.2020.301011,,10.1016/j.fsidi.2020.301011,3080767672,,0,000-490-412-762-138; 002-413-691-537-198; 002-569-181-368-890; 003-103-703-899-739; 004-916-146-042-728; 005-733-361-126-371; 007-790-059-029-953; 011-006-176-487-462; 014-425-849-204-654; 017-429-170-321-915; 020-449-343-773-669; 022-041-246-309-040; 046-408-723-602-346; 049-223-763-769-747; 066-264-702-071-211; 074-169-238-052-790; 078-327-902-374-330; 100-595-188-241-720; 109-149-174-428-014; 115-048-509-763-725; 118-244-930-021-861; 129-632-250-604-450; 147-117-297-573-555; 149-617-274-050-94X; 151-378-930-836-964; 151-419-635-835-131; 172-573-079-472-196; 193-779-398-308-524; 194-308-670-883-17X,5,true,cc-by-nc-nd,hybrid
081-833-857-658-915,Digital forensics : the missing piece of the internet of things promise,,2016,journal article,Computer Fraud & Security,13613723,Mark Allen Group,United Kingdom,Steve Watson; Ali Dehghantanha,"As technology advances at a blinding pace, the promise of new gadgets to enhance every facet of our lives tempts every consumer and organisation. From the ease of automation, control and monitoring of the most mundane aspects of our lives to advanced lifesaving and monitoring capabilities, our world is changing daily. ; No reliable forensics application or digital forensics guidance exists to retrieve the data from IoT devices in the event of an attack, an active investigation or a litigation request. ; The digital forensics of Internet of things (IoT) technologies is the missing conversation in our headlong rush to the promise of connecting every device on the planet. Steve Watson of VTO Labs and Ali Dehghantanha of the University of Salford discuss the issues and the importance of further development in this field. And they elaborate on how forensics practitioners, device manufacturers and legal authorities could share their efforts and minimise this gap.",2016,6,5,8,Internet privacy; Automation; Watson; Conversation; Pace; Computer security; Computer science; Event (computing); Internet of Things; Digital forensics,,,,,http://www.sciencedirect.com/science/article/pii/S1361372315300452 https://www.sciencedirect.com/science/article/abs/pii/S1361372315300452 https://usir.salford.ac.uk/id/eprint/39539/,http://dx.doi.org/10.1016/s1361-3723(15)30045-2,,10.1016/s1361-3723(15)30045-2,2462696620,,0,002-678-878-129-227; 074-815-704-684-263; 078-431-972-023-034; 112-181-239-331-730,82,true,,green
082-140-450-245-734,IDENTIFICATION OF DIGITAL EVIDENCE FACEBOOK MESSENGER ON MOBILE PHONE WITH NATIONAL INSTITUTE OF STANDARDS TECHNOLOGY (NIST) METHOD,2019-01-15,2019,journal article,Kursor,23016914; 02160544,University of Trunojoyo Madura,,Anton Yudhana; Riadi; Ikhwan Anshori,"Facebook Messenger is a popular social media. The increasing number of Facebook Messenger users certainly has a positive and negative impact, one of the negative effects is being used for digital crime. One of the sciences to get digital evidence is to do Digital forensics. Digital forensics can be done on a smartphone used by criminals. This research will carry out as much evidence of digital crime as possible from Facebook Messenger. In this study the forensic devices, Magnet AXIOM and Oxygen Forensics Suite 2014 were used using the National Institute of Standards Technology (NIST) method. NIST has work guidelines for both policies and standards to ensure that each examiner follows the same workflow so that their work is documented and the results can be repeated and maintained. The results of the research in the Magnet AXIOM and Oxygen Forensics Suite 2014 get digital evidence in the form of accounts, conversation texts, and images. This study successfully demonstrated the results of an analysis of forensic devices and digital evidence on Facebook Messenger. The results of the performance evaluation of forensic tools in the acquisition process using AXIOM Magnets are considered the best compared to Oxygen Forensics Suite 2014.",9,3,,,NIST; World Wide Web; Mobile phone; Digital evidence; Computer science; Identification (information),,,,,http://kursorjournal.org/index.php/kursor/article/view/152 https://kursorjournal.org/index.php/kursor/article/download/152/95,http://dx.doi.org/10.28961/kursor.v9i3.152,,10.28961/kursor.v9i3.152,2915261871,,0,000-225-165-729-99X; 070-740-822-724-693; 087-863-544-029-830,0,true,cc-by,gold
082-306-008-484-107,Review of: Practical Digital Imaging—Applications and Techniques,2012-04-19,2012,journal article,Journal of Forensic Sciences,00221198,Wiley,United States,B S Rod Englert,,57,3,849,849,Digital imaging; Computer science; Computer hardware,,,,,http://onlinelibrary.wiley.com/doi/10.1111/j.1556-4029.2012.02061.x/abstract http://onlinelibrary.wiley.com/doi/10.1111/j.1556-4029.2012.02061.x/full,http://dx.doi.org/10.1111/j.1556-4029.2012.02061.x,,10.1111/j.1556-4029.2012.02061.x,2170251726,,0,,0,false,,
082-417-796-624-941,A near-miss management system architecture for the forensic investigation of software failures.,2015-10-28,2015,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,M.A. Bihina Bella; Jan H. P. Eloff,"Abstract Digital forensics has been proposed as a methodology for doing root-cause analysis of major software failures for quite a while. Despite this, similar software failures still occur repeatedly. A reason for this is the difficulty of obtaining detailed evidence of software failures. Acquiring such evidence can be challenging, as the relevant data may be lost or corrupt following a software system's crash. This paper proposes the use of near-miss analysis to improve on the collection of evidence for software failures. Near-miss analysis is an incident investigation technique that detects and subsequently analyses indicators of failures. The results of a near-miss analysis investigation are then used to detect an upcoming failure before the failure unfolds. The detection of these indicators – known as near misses – therefore provides an opportunity to proactively collect relevant data that can be used as digital evidence, pertaining to software failures. A Near Miss Management System (NMS) architecture for the forensic investigation of software failures is proposed. The viability of the proposed architecture is demonstrated through a prototype.",259,,234,245,Architecture; Software system; Crash; Management system; Near miss; Software; Digital evidence; Computer security; Computer science; Digital forensics,Digital evidence; Digital forensics; Near miss; Near-miss management system (NMS); Software failure,,,,https://www.sciencedirect.com/science/article/pii/S0379073815004314 https://www.ncbi.nlm.nih.gov/pubmed/26727616 https://europepmc.org/abstract/MED/26727616 https://repository.up.ac.za/handle/2263/56011 https://repository.up.ac.za/bitstream/2263/56011/1/Bella_NearMiss_2016.pdf,http://dx.doi.org/10.1016/j.forsciint.2015.10.007,26727616,10.1016/j.forsciint.2015.10.007,2193388524,,0,001-808-197-846-489; 002-366-662-229-867; 005-867-919-846-09X; 005-902-773-372-039; 009-662-282-544-479; 011-905-511-601-111; 013-081-766-379-747; 013-887-768-477-01X; 021-448-156-714-737; 031-611-368-763-776; 042-185-248-691-579; 045-920-797-897-761; 045-930-609-986-652; 056-639-947-708-941; 058-507-647-155-191; 064-314-255-895-12X; 079-314-174-384-71X; 079-406-212-807-655; 109-985-341-960-184; 110-398-250-080-48X; 114-542-186-088-354; 114-839-605-739-519; 147-557-846-895-696; 153-054-383-154-973; 166-411-911-305-152; 168-678-724-053-274; 191-707-142-292-682,0,true,,green
082-558-751-788-933,Analisis Forensik Rekayasa Dokumen Digital dengan Metode NIST,2022-08-31,2022,journal article,INFORMAL: Informatics Journal,2503250x,UPT Penerbitan Universitas Jember,,Arizona Firdonsyah; Danur Wijayanto,"Digital Forensics is one of the technological fields contained many sub-fields that can assist technically in collecting digital evidence to be presented in a trial in accordance with applicable law. The example of digital forensics sub-field is Image Forensics, which aims to digitally collect and look for evidentiary facts in determining the authenticity of an image or document that contained images. Various criminal and pornographic cases involving image files are still happening nowadays, therefore forensics on images as evidence is an important key to assist the court in making decisions. This research examines the authenticity of documents in the form of digital letters using National Institute of Standard and Technology (NIST) method by applying the forensic ELA (Error Level Analysis). Several previous researches have proven that the forensic ELA is able to detect modifications that have been made to images. Differences with previous researches and this research are the authors also checked the metadata of the images before performing the ELA examination using Fotoforensics. The results of the analysis shows a high level of consistency in the images and writings due to the accumulation of white dots in several places such as in headers, logos, header’s writings, text contents, footnotes, and signatures.",7,2,121,121,Digital forensics; Header; Computer science; Consistency (knowledge bases); NIST; Metadata; Field (mathematics); Forensic examination; Digital image; Key (lock); Digital evidence; Information retrieval; Data science; World Wide Web; Image (mathematics); Computer security; Artificial intelligence; Engineering; Image processing; Natural language processing; Computer network; Mathematics; Forensic engineering; Pure mathematics,,,,,,http://dx.doi.org/10.19184/isj.v7i2.31198,,10.19184/isj.v7i2.31198,,,0,,0,true,,gold
082-660-953-020-851,Feature: Challenges ahead on the digital forensics and audit trails,,2014,journal article,Network Security,13534858,Mark Allen Group,Netherlands,Steve Gold,"Digital forensics is a relatively new science in the increasing complex field of IT security, data governance and auditing. This was why the Forensic Science Society recently held its inaugural conference in York on the topic - at which a range of speakers drawn from the rapidly-emerging industry gave a series of presentations - along with a discussion of some of the key issues that affecting IT security professionals at the sharp end. Digital forensics is a relatively new science in the increasingly complex field of IT security, data governance and auditing. This was why the Forensic Science Society recently held its inaugural conference in York. A range of speakers drawn from this rapidly-emerging industry revealed a lot about the challenges that face even senior and well-experienced IT security professionals, largely as a result of the rapid pace of evolution in the security ecosphere. Steve Gold on the issues raised at the event",2014,6,12,17,Data governance; Audit; Pace; Face (sociological concept); Ecosphere; Computer security; Public relations; Computer science; Event (computing); Audit trail; Digital forensics,,,,,https://doi.org/10.1016/S1353-4858(14)70060-1 https://www.sciencedirect.com/science/article/abs/pii/S1353485814700601 http://www.sciencedirect.com/science/article/pii/S1353485814700601 https://www.sciencedirect.com/science/article/abs/pii/S1353485814700601#! https://dblp.uni-trier.de/db/journals/ns/ns2014.html#Gold14a https://www.infona.pl/resource/bwmeta1.element.elsevier-57a1405b-e0ff-39df-97db-9bb4da6d536f,http://dx.doi.org/10.1016/s1353-4858(14)70060-1,,10.1016/s1353-4858(14)70060-1,2478359822,,0,090-966-234-339-091,1,false,,
082-793-334-095-933,Scenario-Based Digital Forensics Challenges in Cloud Computing,2016-10-20,2016,journal article,Symmetry,20738994,MDPI AG,Switzerland,Erik Miranda Lopez; Seo Yeon Moon; Jong Hyuk Park,"The aim of digital forensics is to extract information to answer the 5Ws (Why, When, Where, What, and Who) from the data extracted from the evidence. In order to achieve this, most digital forensic processes assume absolute control of digital evidence. However, in a cloud environment forensic investigation, this is not always possible. Additionally, the unique characteristics of cloud computing create new technical, legal and architectural challenges when conducting a forensic investigation. We propose a hypothetical scenario to uncover and explain the challenges forensic practitioners face during cloud investigations. Additionally, we also provide solutions to address the challenges. Our hypothetical case scenario has shown that, in the long run, better live forensic tools, development of new methods tailored for cloud investigations and new procedures and standards are indeed needed. Furthermore, we have come to the conclusion that forensic investigations biggest challenge is not technical but legal.",8,10,107,,Digital evidence; Cloud forensics; Scenario based; Computer security; Computer science; Cloud computing; Digital forensics,,,,Ministry of Science ICT and Future Planning,https://www.mdpi.com/2073-8994/8/10/107/pdf https://dblp.uni-trier.de/db/journals/symmetry/symmetry8.html#LopezMP16 https://doaj.org/article/16744493008a4c63a18fc76483706aef https://ui.adsabs.harvard.edu/abs/2016Symm....8..107M/abstract https://core.ac.uk/display/90726715 https://www.mdpi.com/2073-8994/8/10/107,http://dx.doi.org/10.3390/sym8100107,,10.3390/sym8100107,2538056117,,0,000-360-120-513-679; 001-148-044-584-317; 011-972-444-921-827; 017-708-113-657-756; 019-119-495-482-994; 023-338-081-058-709; 025-319-861-345-580; 027-031-165-049-753; 028-180-038-189-484; 028-290-062-141-840; 029-934-518-651-564; 035-448-415-847-226; 042-767-661-429-064; 047-221-550-114-462; 048-001-521-822-787; 049-977-511-720-26X; 050-032-081-738-330; 052-152-063-024-042; 058-122-722-153-464; 058-631-300-195-90X; 061-960-915-134-527; 074-503-636-433-987; 083-322-626-930-350; 086-091-202-010-191; 086-365-780-774-340; 091-619-263-117-914; 092-655-509-442-333; 100-459-328-094-990; 115-547-184-477-216; 116-798-667-947-625; 121-704-965-852-836; 124-912-663-881-389; 125-371-043-627-395; 144-124-797-675-052; 148-434-515-794-491; 148-732-709-522-772; 156-313-798-378-998; 166-183-210-534-575; 170-108-067-251-840; 171-483-137-477-150; 179-568-985-512-784,10,true,cc-by,gold
082-851-209-039-37X,Towards reliable digital forensics investigations through measurement science,2020-01-03,2020,journal article,WIREs Forensic Science,25739468,Wiley,,Nicolas Hughes; Umit Karabiyik,,2,4,,,Data science; Measurement science; Computer science; Digital forensics,,,,,https://wires.onlinelibrary.wiley.com/doi/10.1002/wfs2.1367 https://onlinelibrary.wiley.com/doi/full/10.1002/wfs2.1367,http://dx.doi.org/10.1002/wfs2.1367,,10.1002/wfs2.1367,2998225505,,0,000-084-741-857-185; 000-225-165-729-99X; 004-652-388-189-304; 010-963-610-208-920; 011-340-105-227-149; 015-084-347-434-584; 020-885-011-437-897; 021-039-461-635-181; 023-418-828-545-549; 030-178-593-043-926; 036-112-898-081-145; 038-509-596-583-914; 043-093-846-816-675; 047-386-524-667-691; 054-004-313-233-495; 064-549-392-650-90X; 104-153-499-789-950; 104-787-005-142-28X; 106-964-315-836-68X; 114-315-827-345-69X; 131-807-250-432-699; 131-948-799-258-180,5,false,,
082-858-847-767-875,The Role of Social Media Forensics in Digital Forensics,,2022,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Vivekananth. P,,,,,,,,,,,,http://dx.doi.org/10.2139/ssrn.4202753,,10.2139/ssrn.4202753,,,0,,0,false,,
082-965-731-295-793,Towards green frameworks for digital forensics investigation,2013-01-31,2013,journal article,Journal of Convergence Information Technology,19759320; 22339299,AICIT,South Korea,Ali Dehghantanha; Ramlan Mahmod; Nur Izura Udzir,"Despite the fact that digital forensics involves strict procedures and complies with fixed regulations and principles, but as this paper presents, there are plenty of opportunities that can be practically employed in digital forensics to make this science greener. Virtualization can cost effectively reduce the number of workstations running forensic tools in the lab. Cloud computing and consolidating; servers and storage devices in green data centers not only facilitate managing and securing services but also decline the number of required network and cooling facilities. Forensic labs can also be optimized with regard to environmental preservation. Using remote protocols and digitalizing paperwork procedures are environmentally helpful practices to accelerate investigation progress as; well. Improving electrical power needs of labs and forensic devices is another issue that should be taken into consideration. Employing storage devices with optimal energy usage in digital forensics may highly reduce energy consumption. This paper study established green technologies particularly in information technology field and suggests a framework for implementing compatible techniques in digital forensics in order to reduce greenhouse gas pollutants, limit carbon emissions, and preserve the environment.",8,2,669,678,Risk analysis (engineering); Information technology; Energy consumption; Field (computer science); Computer security; Computer science; Virtualization; Workstation; Cloud computing; Digital forensics; Server,,,,,http://psasir.upm.edu.my/id/eprint/30595/ https://core.ac.uk/display/153811845 https://core.ac.uk/download/153811845.pdf,http://dx.doi.org/10.4156/jcit.vol8.issue2.80,,10.4156/jcit.vol8.issue2.80,2078143495,,0,,4,true,,green
082-979-454-097-058,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,37,,301203,301203,Computer science; Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00111-6,,10.1016/s2666-2817(21)00111-6,,,0,,0,true,,bronze
083-400-942-048-619,Comparative Analysis of Forensic Software on Android-based Blackberry Messenger using NIJ Framework,2018-11-01,2018,journal article,Proceeding of the Electrical Engineering Computer Science and Informatics,2407439x,Institute of Advanced Engineering and Science,," Riadi; Sunardi Sunardi; Arizona Firdonsyah","Instant Messaging application is the most widely used application all over the world. Blackberry Messenger is a multiplatform instant messaging with lots of features that can be a magnet for many people to use Blackberry Messenger for commiting digital crimes. In the process of investigating digital crime cases, digital evidences are required. To obtain digital evidence, a set of forensic tools are needed to conduct forensic process on physical evidences. The topic of this research is to describe the forensic process and to compare the current forensic tools used based on acquired digital evidences by using method that refers to mobile device forensic guidelines made by the National Institute of Justice (NIJ). The forensic tools used in this research are Magnet AXIOM, Belkasoft Evidence Center, and MOBILedit Forensic Express. The outcome shows that Magnet AXIOM has the highest capability to obtain digital evidences, Belkasoft Evidence Center has superiority in terms of data text acquisition, and MOBILedit Forensic Express has superiority in physical evidence preserving and cloning.",5,1,472,477,Forensic science; Mobile device; Data science; Software; Digital evidence; Instant messaging; Computer science; Android (operating system); Digital forensics,,,,,http://journal.portalgaruda.org/index.php/EECSI/article/view/1615 http://journal.portalgaruda.org/index.php/EECSI/article/download/1615/1128 https://core.ac.uk/download/pdf/296976143.pdf,http://dx.doi.org/10.11591/eecsi.v5.1615,,10.11591/eecsi.v5.1615,2981464727,,0,002-633-335-300-244; 006-700-167-776-341; 055-473-899-043-485; 185-798-265-234-254,0,true,,
083-440-224-273-957,Book Review: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Stephen Larson,"Sammons, John. (2012). The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Waltham, MA: Syngress, 208 pages, Print Book ISBN: 9781597496612. eBook ISBN : 9781597496629. Print: US $29.95. eBook: US$20.97. Includes exercises, case studies, references, and index. Reviewed by Stephen Larson, PhD. Assistant Professor, Slippery Rock University of PA The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics is well-named–it really is very basic. And it should be, as the book’s intended audience includes entry-level digital forensics professionals and complimentary fields such as law enforcement, legal, and general information security. Though the copyright is 2012, some of the data is from 2009, and there is mention of estimates for 2010. (see PDF for full review)",9,1,83,85,Engineering; World Wide Web; Assistant professor; Index (publishing); Law enforcement; Information security; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#Larson14 https://www.mendeley.com/catalogue/053135be-1606-3571-9356-cb16e93b5830/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1165&context=jdfsl https://commons.erau.edu/jdfsl/vol9/iss1/6/,http://dx.doi.org/10.15394/jdfsl.2014.1165,,10.15394/jdfsl.2014.1165,1566879384,,0,,2,true,cc-by-nc,gold
083-529-261-546-580,Design of expert system for tool selection in digital forensics investigation,2020-07-01,2020,journal article,IOP Conference Series: Materials Science and Engineering,17578981; 1757899x,IOP Publishing,,Erika Ramadhani; Elyza Gustri Wahyuni; Hanif R. Pratama,"Along with the diverse types of electronic goods and digital evidence, techniques have also developed in conducting digital forensic investigations. Another effect is the increase in types and types of tools for conducting digital forensic investigations. The problem is the increasing number of digital forensic tools is not always developed in conjunction with the manual book. So this is what makes the investigator to check the tool to make it suitable for investigations. Choosing the right tool is very important in the investigation process, because each stage of the forensic investigation process has a different treatment for each of its staging. Seeing these conditions, then in this paper we make a system design to facilitate investigators in choosing the right digital forensic tool and in accordance with using an expert system. The design system shows that it's still needed to confirm to an expert to get a match output if there is a new rule. Later this system will be implemented with website technology.",852,1,012137,,Software engineering; Selection (linguistics); Digital evidence; Design systems; Systems design; Computer science; Process (engineering); Expert system; Digital forensics,,,,,http://ui.adsabs.harvard.edu/abs/2020MS&E..852a2137R/abstract https://iopscience.iop.org/article/10.1088/1757-899X/852/1/012137,http://dx.doi.org/10.1088/1757-899x/852/1/012137,,10.1088/1757-899x/852/1/012137,3044515827,,0,004-349-162-988-304; 012-857-477-749-00X; 055-856-741-899-572; 070-450-084-258-436; 110-850-368-587-487; 139-527-080-444-375,1,true,,gold
084-021-092-390-691,"Control systems/SCADA forensics, what's the difference?",,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,R.M. van der Knijff,,11,3,160,174,SCADA; Information technology; Network security; Crash; Business continuity; USable; Field (computer science); Computer security; Computer science; Process safety,,,,Dutch National Coordinator for Security and Counterterrorism,https://doi.org/10.1016/j.diin.2014.06.007 https://www.sciencedirect.com/science/article/pii/S1742287614000814 https://dl.acm.org/citation.cfm?id=2724492 https://dl.acm.org/doi/10.1016/j.diin.2014.06.007 http://www.sciencedirect.com/science/article/pii/S1742287614000814,http://dx.doi.org/10.1016/j.diin.2014.06.007,,10.1016/j.diin.2014.06.007,2009166708,,0,007-472-112-945-149; 011-691-926-649-618; 013-330-516-271-455; 017-815-064-018-299; 024-806-994-188-875; 037-321-675-678-849; 050-572-314-303-635; 056-715-378-869-201; 065-760-418-407-837; 074-933-143-629-826; 117-132-049-546-221; 121-437-625-840-931; 127-188-165-826-250; 128-790-975-772-352; 149-984-104-390-727; 177-696-123-391-61X; 182-848-793-036-01X; 189-104-249-595-291,37,false,,
084-161-464-980-559,Method of Digital Content Tort Distribute and Forensics,,2013,journal article,Video Engineering,,,,Tang Shiju,"By combining with characteristics of social network open widely and asymmetric digital watermarking technology leakage keys difficultly, a method of the digital content tort distribute and forensics is presented. It uses asymmetric digital watermarking algorithm loading the inseparable of copyright information to meet the requirements of difficult to be forged and quite good attack- resisting capability. Watermarks are extracted from the digital contents which have been attacked in the process of network transmission. Watermarks are transformed into frequency domain, then extracted tort information through the clustering algorithm. Finally, this method is simulated and analyzed. Results show that it has higher security and forensics integrity and can prevent illegal copy and proliferation, so that it protects intellectual copyright rights.",,,,,Digital watermarking; Frequency domain; Tort; Digital content; Computer security; Computer science; Cluster analysis,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-DSSS201316022.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-DSSS201316022.htm,,,2361225265,,0,,0,false,,
084-240-004-733-026,Cybercrimes Solutions using Digital Forensic Tools,2015-11-08,2015,journal article,International Journal of Wireless and Microwave Technologies,20761449; 20769539,MECS Publisher,,Dhwaniket Ramesh Kamble; Nilakshi Jain; Swati Deshpande,"The crimes using computers is growing with rapid speed. As computer crimes have hit up to a high mark, the tools used to fight such crimes is budding faster. In today's world the use of Digital Forensics have also become vital. Digital Forensics is a step-by-step process of scientific methods and techniques to investigate crime obtained from digital evidences. For investigating the digital evidence there are many Digital Forensic tools which are used to investigate digital crimes by identifying the digital evidences. The study results in giving the solutions for Digital Forensic tools for investigators looking to spread out their serviceability in using Digital Forensic tools.",5,6,11,18,Engineering; Digital evidence; Serviceability (computer); Computer security; Process (engineering); Computer forensics; Digital forensics,,,,,http://www.mecs-press.org/ijwmt/ijwmt-v5-n6/v5n6-2.html http://www.mecs-press.org/ijwmt/ijwmt-v5-n6/IJWMT-V5-N6-2.pdf,http://dx.doi.org/10.5815/ijwmt.2015.06.02,,10.5815/ijwmt.2015.06.02,2198066681,,0,092-733-362-703-818,2,true,,bronze
084-366-417-503-417,The State of Art in Digital Audio Forensic Authentication,,2014,journal article,Chinese Journal of Forensic Sciences,16712072,,,Zeng Jin-hu,"With the popularity of digital recorders, and the popular trend of audio tampering methods, the traditional techniques have met great challenges in the current practice of digital audio forensic authentication. The latest progress in the field of the pattern recognition and artificial intelligence offers a feasible way for digital audio forensic authentication. In this paper,the latest achievements of digital audio forensic authentication in the fields of the machine learning and pattern recognition were reviewed and the current main methods in the practice of digital audio forensic authentication were analyzed. Then, problems, challenges, and future trends of digital audio forensic authentication were discussed. It was concluded that the collaborative coexistence of traditional methods based on expert experience and statistical quantitative computation techniques would be an inevitable trend and an efficient solution for digital audio forensic authentication.",,,,,Authentication (law); Pattern recognition (psychology); Digital recording; Popularity; State of art; Current practice; Field (computer science); Computer science; Multimedia; Digital audio,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201404013.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SFJD201404013.htm,,,2368419307,,0,,0,false,,
084-473-799-141-231,Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies,,2017,journal article,International Journal of Information Security and Privacy,19301650; 19301669,IGI Global,United Kingdom,Regner Sabillon; Jordi Serra-Ruiz; Víctor Cavaller; Jeimy J. Cano,"This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing prevention knowledge and lessons learned. The authors also introduce a compact cyber forensics model for diverse technological ecosystems called Cyber Forensics Model in Digital Ecosystems CFMDE. Transferring the knowledge, international collaboration, best practices and adopting new digital forensic tools, methodologies and techniques will be hereinafter paramount to obtain digital evidence, enforce organizational cybersecurity policies, mitigate security threats, fight anti-forensics practices and indict cybercriminals. The global Digital Forensics community ought to constantly update current practices to deal with cybercriminality and foreseeing how to prepare to new technological environments where change is always constant.",11,2,25,37,Chain of custody; Best practice; Cybercrime; Digital evidence; Computer security; Computer science; Computer forensics; Digital forensics,,,,,https://doi.org/10.4018/IJISP.2017040103 https://dl.acm.org/doi/10.4018/IJISP.2017040103 https://www.ideas.repec.org/a/igg/jisp00/v11y2017i2p25-37.html https://dl.acm.org/citation.cfm?id=3077898 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.2017040103 https://dblp.uni-trier.de/db/journals/ijisp/ijisp11.html#SabillonSCC17 https://www.igi-global.com/article/digital-forensic-analysis-of-cybercrimes/178643,http://dx.doi.org/10.4018/ijisp.2017040103,,10.4018/ijisp.2017040103,2594254612,,0,012-459-130-312-50X; 020-944-423-224-895; 021-850-998-857-676; 024-381-049-056-789; 028-180-038-189-484; 028-828-573-289-865; 028-874-299-732-939; 030-634-360-648-226; 032-697-093-668-898; 038-668-970-194-854; 041-026-099-291-867; 045-645-917-018-028; 047-630-600-014-492; 050-612-532-454-179; 057-705-375-581-007; 067-950-012-629-210; 092-506-898-894-624; 101-914-860-452-14X; 111-090-978-711-139; 127-948-386-055-225; 132-355-634-397-986; 133-397-275-695-990; 138-421-957-980-413; 140-821-103-436-654; 143-562-788-834-457; 170-299-458-679-224; 177-696-123-391-61X; 190-065-821-748-92X; 199-172-967-270-034,8,false,,
084-624-696-297-925,Let the robots do it! – Taking a look at Robotic Process Automation and its potential application in digital forensics,,2019,journal article,Forensic Science International: Reports,26659107,Elsevier BV,,Alisha Asquith; Graeme Horsman,"Abstract The challenges of tackling increasing caseloads, large volumes of digital data and maintaining examination efficiency in order to adhere to tight criminal justice system deadlines persist. As the field looks towards techniques for improving efficiency, forms of automation are both simultaneously touted as a potential solution, whilst also attracting criticism. The potential for techniques which mechanise parts of the digital forensic examination process, and do it reliably, is great, however developing the capability to do this remains a challenge. This work provides an introductory discussion to Robotic Process Automation, a form of service task automation. Its potential application is debated and two case studies are offered demonstrating potential areas of applicability. An objective evaluation is offered, debating whether technology has a place in improving efficiency in this field.",1,,100007,,Risk analysis (engineering); Automation; Process automation system; Task (project management); Field (computer science); Service (systems architecture); Computer science; Process (engineering); Digital forensics; Robot,,,,"School of Science, Engineering & Design, Teesside University, Middlesbrough, United Kingdom",https://research.tees.ac.uk/ws/files/8028012/Let_the_robots_do_it.pdf https://research.tees.ac.uk/en/publications/let-the-robots-do-it-taking-a-look-at-robotic-process-automation- https://www.sciencedirect.com/science/article/pii/S2665910719300076 https://core.ac.uk/download/pdf/225624897.pdf,http://dx.doi.org/10.1016/j.fsir.2019.100007,,10.1016/j.fsir.2019.100007,2956049776,,0,005-859-821-142-158; 014-713-031-827-317; 014-767-056-602-687; 023-858-572-607-02X; 025-319-861-345-580; 031-522-316-310-252; 042-134-300-645-458; 050-366-537-900-675; 050-513-243-638-138; 059-220-411-265-931; 061-549-181-856-861; 065-520-849-771-46X; 080-196-042-005-758; 090-138-553-295-037; 100-136-470-500-690; 131-068-965-289-412; 144-724-915-219-138; 150-249-549-372-358; 154-517-106-328-503,25,true,"CC BY, CC BY-NC-ND",gold
084-939-441-327-367,"Media Watermarking, Security, and Forensics - StegoAppDB: a Steganography Apps Forensics Image Database",2019-01-13,2019,journal article,electronic imaging,,,,Jennifer Newman; Li Lin; Wenhao Chen; Stephanie Reinders; Yangxiao Wang; Min Wu; Yong Guan,"In this paper, we present a new reference dataset simulating digital evidence for image steganography. Steganography detection is a digital image forensic topic that is relatively unknown in practical forensics, although stego app use in the wild is on the rise. This paper introduces the first database consisting of mobile phone photographs and stego images produced from mobile stego apps, including a rich set of side information, offering simulated digital evidence. StegoAppDB, a steganography apps forensics image database, contains over 810,000 innocent and stego images using a minimum of 10 different phone models from 24 distinct devices, with detailed provenanced data comprising a wide range of ISO and exposure settings, EXIF data, message information, embedding rates, etc. We develop a camera app, Cameraw, specifically for data acquisition, with multiple images per scene, saving simultaneously in both DNG and high-quality JPEG formats. Stego images are created from these original images using selected mobile stego apps through a careful process of reverse engineering. StegoAppDB contains cover-stego image pairs including for apps that resize the stego dimensions. We retainthe original devices and continue to enlarge the database, and encourage the image forensics community to use StegoAppDB. While designed for steganography, we discuss uses of this publicly available database to other digital image forensic topics.",2019,5,536-1,536-12,Steganalysis; Steganography; Set (abstract data type); JPEG; Reverse engineering; Information retrieval; Mobile phone; Digital evidence; Computer science; Digital image,,,,,https://www.ingentaconnect.com/content/ist/ei/2019/00002019/00000005/art00011 https://dblp.uni-trier.de/db/journals/corr/corr1904.html#abs-1904-09360 https://lib.dr.iastate.edu/cgi/viewcontent.cgi?article=1005&context=csafe_conf https://lib.dr.iastate.edu/csafe_pubs/61/ https://doi.org/10.2352/ISSN.2470-1173.2019.5.MWSF-536,https://www.ingentaconnect.com/content/ist/ei/2019/00002019/00000005/art00011,,,2975621618,,0,,4,false,,
085-204-724-336-334,Computer Forensic Methodology and Tools,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Hriday Raval,"The Computer Forensic has long played a vital role across the domains - Cyber Crimes Investigations, Incident Response, Cyber Threat Intelligence and Corporate Cybersecurity. In the past Digital Evidence lost their validity in the Courtrooms. Prior, similar to some other Physical Evidence, courts used to consider evidence procured from computer systems as genuine. In any case, as time passed, we figured out the fact that it is so natural to corrupt, destroy, or alter computer data, all three stages - storage, network and computation. In the least complex model, if an individual basically opens a computer file, it's absolutely impossible to demonstrate the last date that the document was refreshed aka updated. Computers are intended to record the time and date of an accessed file on its own by default features of an operating system. Examiners later understood that they have to build up the essential devices and procedures to separate the necessary data from computers without influencing the data all the while. With time, specialists concocted systems to securely recover data, preserve and analyze to derive the insights useful in Computer related Crimes. This part of forensic science is currently well known as Computer Forensics.",,,15,20,Forensic science; Data science; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.02,http://dx.doi.org/10.46293/4n6/2020.02.02.02,,10.46293/4n6/2020.02.02.02,3022560827,,0,,0,false,,
085-666-602-084-614,KES - Semantic Representation and Integration of Digital Evidence,,2013,journal article,Procedia Computer Science,18770509,Elsevier BV,,Spyridon Dosis; Irvin Homem; Oliver Popov,"The ever-increasing complexity and sophistication of computer and network attacks challenge society's dependability on digital infrastructure. Digital investigations recover and reconstruct the digital trails of such events and may employ practices from various subfields (computer, network forensics), each with its own set of techniques and tools. Integration of evidence from heterogeneous sources of data (e.g. disk images, network packet captures, logs) is often a manual and time- consuming process relying significantly on the investigator's expertise. In this paper, we propose and develop an approach, based on the Semantic Web framework, for ontologically representing and integrating digital evidence. The presented approach enhances existing forensic analysis techniques by providing partial and eventually full automation of the investigative process.",22,,1266,1275,Forensic science; Network packet; Knowledge representation and reasoning; Information system; Semantic Web; Data science; Digital evidence; Computer science; Process (engineering); Network forensics; Dependability,,,,,https://doi.org/10.1016/j.procs.2013.09.214 https://dblp.uni-trier.de/db/conf/kes/kes2013.html#DosisHP13 https://core.ac.uk/display/82030201 http://su.diva-portal.org/smash/record.jsf?pid=diva2%3A676278 http://www.sciencedirect.com/science/article/pii/S1877050913010077 http://www.diva-portal.org/smash/record.jsf?pid=diva2:676278 https://www.sciencedirect.com/science/article/pii/S1877050913010077 https://core.ac.uk/download/pdf/82030201.pdf,http://dx.doi.org/10.1016/j.procs.2013.09.214,,10.1016/j.procs.2013.09.214,1985620065,,0,006-008-915-210-060; 011-051-740-313-213; 014-012-834-363-307; 019-831-293-743-518; 024-559-797-435-528; 024-735-069-822-749; 030-758-631-051-726; 033-877-222-136-260; 038-793-093-462-716; 061-549-181-856-861; 085-958-650-852-408; 104-758-205-558-797; 132-081-686-366-385; 134-927-490-231-285; 178-883-713-153-793; 180-327-460-336-608; 184-948-841-629-735,18,true,,gold
085-816-961-933-906,Temporal Forensics and Anti-Forensics for Motion Compensated Video,,2012,journal article,IEEE Transactions on Information Forensics and Security,15566013; 15566021,Institute of Electrical and Electronics Engineers (IEEE),United States,Matthew C. Stamm; W. S. Lin; K.J.R. Liu,"Due to the ease with which digital information can be altered, many digital forensic techniques have been developed to authenticate multimedia content. Similarly, a number of anti-forensic operations have recently been designed to make digital forgeries undetectable by forensic techniques. However, like the digital manipulations they are designed to hide, many anti-forensic operations leave behind their own forensically detectable traces. As a result, a digital forger must balance the trade-off between completely erasing evidence of their forgery and introducing new evidence of anti-forensic manipulation. Because a forensic investigator is typically bound by a constraint on their probability of false alarm (P_fa), they must also balance a trade-off between the accuracy with which they detect forgeries and the accuracy with which they detect the use of anti-forensics. In this paper, we analyze the interaction between a forger and a forensic investigator by examining the problem of authenticating digital videos. Specifically, we study the problem of adding or deleting a sequence of frames from a digital video. We begin by developing a theoretical model of the forensically detectable fingerprints that frame deletion or addition leaves behind, then use this model to improve upon the video frame deletion or addition detection technique proposed by Wang and Farid. Next, we propose an anti-forensic technique designed to fool video forensic techniques and develop a method for detecting the use of anti-forensics. We introduce a new set of techniques for evaluating the performance of anti-forensic operations and develop a game theoretic framework for analyzing the interplay between a forensic investigator and a forger. We use these new techniques to evaluate the performance of each of our proposed forensic and anti-forensic techniques, and identify the optimal actions of both the forger and forensic investigator.",7,4,1315,1329,Frame (networking); Forensic science; Message authentication code; Set (psychology); Information retrieval; False alarm; Computer security; Computer science; Computer forensics; Data compression; Digital forensics,,,,,http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000006222325 https://dblp.uni-trier.de/db/journals/tifs/tifs7.html#StammLL12 http://dx.doi.org/10.1109/TIFS.2012.2205568 https://ieeexplore.ieee.org/document/6222325/ https://dl.acm.org/doi/10.1109/TIFS.2012.2205568 https://www.infona.pl/resource/bwmeta1.element.ieee-art-000006222325 https://dx.doi.org/10.1109/TIFS.2012.2205568 http://ieeexplore.ieee.org/document/6222325/ http://sig.umd.edu/publications/Stamm_TIFS_201208.pdf,http://dx.doi.org/10.1109/tifs.2012.2205568,,10.1109/tifs.2012.2205568,2016828421,,0,006-715-003-756-565; 012-624-635-540-803; 015-717-506-603-742; 018-172-332-749-013; 023-624-827-239-301; 024-242-565-906-946; 024-793-013-451-77X; 031-876-583-652-183; 040-639-509-253-00X; 041-796-476-831-023; 045-294-718-031-754; 051-035-217-903-949; 055-256-082-961-475; 056-148-934-103-963; 068-413-789-098-79X; 077-218-726-181-521; 079-709-089-662-769; 083-097-133-928-799; 092-522-060-753-940; 106-688-419-298-857; 120-453-234-664-794; 122-164-403-164-304; 135-262-782-091-897; 140-408-113-219-371; 166-999-959-693-14X,162,true,,green
086-018-338-372-932,Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email,2017-03-30,2017,journal article,JISKA (Jurnal Informatika Sunan Kalijaga),25280074; 25275836,Al-Jamiah Research Centre,,Muhammad Nur Faiz; Rusydi Umar; Anton Yudhana,"Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.",1,3,108,114,The Internet; Engineering; World Wide Web; Browser security; Sales operations; Software; Digital data; Computer security; Network forensics; Computer forensics; Digital forensics,,,,,https://conference.uin-suka.ac.id/saintek/JISKA/article/view/1113 http://ejournal.uin-suka.ac.id/saintek/JISKA/article/download/13-02/1025 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/13-02 http://202.0.92.5/saintek/JISKA/article/view/13-02 https://core.ac.uk/download/267117312.pdf,http://dx.doi.org/10.14421/jiska.2017.13-02,,10.14421/jiska.2017.13-02,2763218909,,0,008-441-081-714-181; 028-043-751-937-264; 039-774-603-243-832; 043-658-180-859-745; 065-870-242-356-219; 071-290-587-503-241; 085-138-340-371-322; 104-590-685-835-768; 150-705-862-708-66X,3,true,cc-by-nc,gold
086-248-055-124-414,Sample Preparation For Pesticide Analysis in A Forensic Toxicology Laboratory: A Review,2018-05-07,2018,journal article,Journal of Forensic Sciences and Digital Investigation,26377136,Northern California Open Access Publications,,,,,,27,45,Forensic toxicology; Toxicology; Computational biology; Biology; Chemistry; Chromatography,,,,,,http://dx.doi.org/10.29199/2637-7136/fsdi-101016,,10.29199/2637-7136/fsdi-101016,,,0,,0,true,cc-by,gold
086-653-920-850-621,Dataset construction challenges for digital forensics,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Graeme Horsman; James R. Lyle,,38,,301264,,Work (electrical); Order (exchange); Best practice; Data science; Test (assessment); Task (project management); Field (computer science); Computer science; Reliability (statistics); Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S2666281721001815,http://dx.doi.org/10.1016/j.fsidi.2021.301264,,10.1016/j.fsidi.2021.301264,3193013883,,0,000-084-741-857-185; 004-652-388-189-304; 005-116-312-278-527; 006-933-430-647-14X; 009-512-003-529-193; 029-537-963-034-821; 030-178-593-043-926; 032-451-540-235-796; 032-994-506-285-854; 036-112-898-081-145; 043-542-316-129-203; 044-914-554-944-765; 047-386-524-667-691; 054-004-313-233-495; 068-278-591-200-390; 075-950-021-558-098; 077-287-216-746-675; 079-608-144-438-784; 082-851-209-039-37X; 089-925-000-216-519; 104-153-499-789-950; 132-772-069-558-472; 134-927-490-231-285; 152-714-058-023-050; 159-513-941-346-557,5,false,,
086-705-619-249-214,Preparing for the age of the digital palimpsest,2012-08-31,2012,journal article,Library Hi Tech,07378831,Emerald,United Kingdom,Jason Bengtson,"Purpose – The purpose of this paper is to define and stimulate interest in a potential new specialty within the information science field.Design/methodology/approach – Sources on digital forensics and digital archeology are discussed, and the topic is examined critically from a librarian perspective. The author examines the possibility of an information science specialty pursuing the reconstruction of “digital palimpsests”, where data that later becomes historically significant has been deleted or partially overwritten on digital media.Findings – The author identifies at least one key incident (the NASA moon landing tapes) where this potential field has already started to be defined. Examination of the literature indicates that emphasis in data recovery to this point has centered on the needs of law enforcement and disaster recovery rather than on the considerations of manuscript preservation, recovery, and curation. The author emphasizes the need for librarians to bring together the skills of multiple fi...",30,3,513,522,Information technology; Disaster recovery; Data management; Data science; Law enforcement; Computer science; Digital library; Engineering ethics; Digital forensics; Data curation; Information science,,,,,https://dblp.uni-trier.de/db/journals/lht/lht30.html#Bengtson12 https://www.emerald.com/insight/content/doi/10.1108/07378831211266636/full/html https://core.ac.uk/display/33381889 https://www.emeraldinsight.com/doi/abs/10.1108/07378831211266636 https://core.ac.uk/download/33381889.pdf,http://dx.doi.org/10.1108/07378831211266636,,10.1108/07378831211266636,2042602410,,0,016-983-559-523-04X; 040-576-453-232-211; 044-834-247-088-997; 074-933-143-629-826; 081-056-635-953-384; 113-785-550-473-284; 149-881-992-194-908,2,true,,green
086-772-265-875-364,Evidence Based Reconstruction for Digital Forensics,2022-07-15,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Ellen Akongwin Abanga,"Evidence based reconstruction may often be even more illuminating than other traditional evidence gathering strategies, but it is also extremely delicate and unpredictable due to the fact that evidence may not always be conclusive. The integrity of digital evidence is therefore extremely important, particularly when it comes from allegedly unlawful, illegitimate, or harmful activity. Regardless of the good or bad consequences of the acts and activities that created the evidence, the capture and reconstruction of events are critical to the operation of the digital world. Owing to the lack of skill and knowledge of digital forensics in Ghana, it creates a susceptible environment for criminals to continue their operations while avoiding prosecution due to a lack of evidence to prosecute them. The reconstruction of occurrences based on evidence is considered an eminent need for Africa and for that matter Ghana. Hence, the need for well-defined and advanced knowledge in evidence based reconstruction in digital forensics investigation to bridge the gap currently existing. This paper reviews literature on the concept of evidence based reconstruction as a means to advance knowledge on its relevance to the Africa region and Ghana for that matter. This would help forensics investigators to better understand the need for focus on using digital tools for reconstruction and focusing on evidence driven activities in case of crime and investigations. Finally, this paper presents an elaborated view from a literature point of view over the evidence based reconstruction and also helps other fellow colleagues in their quest to further understand the concept. Keywords: Evidence, Reconstruction, Digital evidence, Digital forensics, Investigation.",1,1,185,190,Digital evidence; Digital forensics; Relevance (law); Empirical evidence; Crime scene; Computer science; Data science; Best evidence; Internet privacy; Computer security; Psychology; Political science; Criminology; Epistemology; Law; Medicine; Philosophy; Family medicine,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p30,,10.22624/aims/crp-bk3-p30,,,0,,0,true,,bronze
086-941-914-029-374,Prelim iii - Contents List,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,33,,300991,300991,Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30225-0,,10.1016/s2666-2817(20)30225-0,,,0,,0,true,,bronze
087-342-951-350-054,The Kodak Syndrome: Risks and Opportunities Created by Decentralization of Forensic Capabilities.,2018-07-05,2018,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Eoghan Casey; Olivier Ribaux; Claude Roux,"Forensic science laboratories are being challenged by the expanding decentralization of forensic capabilities, particularly for digital traces. This study recommends laboratories undertake digital transformations to capitalize on the decentralization movement, develop a more comprehensive understanding of crime and security-relevant problems, and play a more central role in problem-solving collaboratively with law enforcement organizations and other stakeholders. A framework for the bilateral transfer of information and knowledge is proposed to magnify the impact of forensic science laboratories on abating crime, strengthening security, and reinforcing the criminal justice system. To accomplish digital transformations, laboratories require personnel with different expertise, including investigative reasoning, knowledge codification, data analytics, and forensic intelligence. Ultimately, this study encourages managers, educators, researchers, and policymakers to look beyond the usefulness of forensic results for solving individual investigations, and to realize the value of combined forensic knowledge and intelligence for developing broader strategies to deal with crime in digitalized society.",64,1,127,136,Criminal justice; Decentralization; Forensic science; Business; Value (ethics); Law enforcement; Forensic intelligence; Engineering ethics; Big data; Problem-oriented policing,Kodak syndrome; big data analysis; forensic intelligence; forensic science; intelligence-led strategies; knowledge management; problem-oriented policing; systematic knowledge reuse,,,,https://europepmc.org/abstract/MED/29975983 https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.13849 https://dialnet.unirioja.es/servlet/articulo?codigo=6794302 https://serval.unil.ch/notice/serval:BIB_9B5E17694E54 https://www.ncbi.nlm.nih.gov/pubmed/29975983 https://pubmed.ncbi.nlm.nih.gov/29975983/,http://dx.doi.org/10.1111/1556-4029.13849,29975983,10.1111/1556-4029.13849,2821019258,,0,010-639-953-090-261; 010-951-806-548-929; 011-524-509-576-368; 014-466-907-950-761; 015-168-306-989-485; 016-609-780-602-820; 017-176-620-267-416; 019-791-004-497-741; 022-358-546-399-506; 031-872-123-976-197; 035-031-257-128-045; 042-944-602-727-47X; 053-522-882-246-521; 056-524-463-164-028; 058-052-081-943-595; 063-257-284-816-393; 067-307-278-774-180; 094-295-279-676-447; 094-768-593-308-084; 106-728-147-372-737; 117-605-535-046-57X; 121-670-778-513-502; 125-939-677-745-616; 142-790-196-752-819,38,false,,
087-597-848-929-337,Awareness and Understanding of Computer Forensics in the Ghana Legal System,2014-03-26,2014,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Michael AdjeiFrempong; Kamal Kant Hiran,"era of Technological age also called digital age, most transactions are conducted electronically. This modern-day paradigm makes way for the possibility of harmful unanticipated information security breaches of both civil and criminal nature. However, there is a tremendous knowledge gap in the legal system concerning computer/digital forensics with respect to digital evidence. Courtroom and Legal issues relevant to computer/digital forensics are extensive and differs with respect to procedural evidence rules that ensure reliability of the evidence so produced in the court of law for fair adjudication. Electronic evidence is very fundamental to the successful handling of cases related to such information security breaches. This paper on the impact of awareness and understanding of computer/digital forensics in the Ghana Legal System especially Judges, with regards to the electronic evidence, laws and jurisprudence covered twenty (20) superior Judges. The findings revealed a gap between the Judges and issues on computer forensics which if not looked at may create problems in relation to the influx of computer related crimes.",89,20,54,59,Internet privacy; Civil law (legal system); Adjudication; Relation (database); Digital evidence; Computer security; Computer science; Information security; Computer forensics; Jurisprudence; Digital forensics,,,,,http://ui.adsabs.harvard.edu/abs/2014IJCA...89t..54A/abstract https://research.ijcaonline.org/volume89/number20/pxc3894640.pdf https://www.ijcaonline.org/archives/volume89/number20/15752-4640,http://dx.doi.org/10.5120/15752-4640,,10.5120/15752-4640,2165564806,,0,048-645-419-219-088; 052-320-348-197-350; 086-103-316-225-727; 087-348-393-776-727; 098-323-575-091-372; 119-385-247-230-234; 124-038-348-278-602; 140-402-089-386-286; 199-172-967-270-034,3,true,,bronze
087-687-602-305-742,Making it Work! Adding a Digital Forensics Unit to Your Laboratory,,2022,journal article,Forensic Science International: Synergy,2589871x,Elsevier BV,,Tracy Walraven,,4,,100256,100256,Digital forensics; Unit (ring theory); Computer science; Computer forensics; Work (physics); Digital evidence; Data science,,,,,,http://dx.doi.org/10.1016/j.fsisyn.2022.100256,,10.1016/j.fsisyn.2022.100256,,,0,,0,true,"CC BY, CC BY-NC-ND",gold
087-788-401-737-824,A STUDY OF FORENSIC IMAGING IN THE ABSENCE OF WRITE-BLOCKERS,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Gary C. Kessler; Gregory H. Carlton,"Best practices in digital forensics demand the use of write-blockers when creating forensic images of digital media, and this has been a core tenet of computer forensics training for decades. The practice is so ingrained that the integrity of images created without a write-blocker are immediately suspect. This paper describes a research framework that compares forensic images acquired with and without utilizing write-blockers in order to understand the extent of the differences, if any, in the resultant forensic copies. We specifically address whether differences are superficial or evidentiary, and we discuss the impact of admitting evidence acquired without write blocking. The experiments compare the changes made to a hard drive and flash drive when imaged and examined with a Windows-based forensics workstation.",9,3,51,58,Digital media; Best practice; Suspect; Flash drive; Forensic imaging; Computer security; Computer science; Multimedia; Computer forensics; Workstation; Digital forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1187&context=jdfsl https://core.ac.uk/display/108502354 https://works.bepress.com/gary_kessler/22/ https://commons.erau.edu/db-security-studies/28/,http://dx.doi.org/10.15394/jdfsl.2014.1187,,10.15394/jdfsl.2014.1187,764792898,,0,157-481-301-540-451,4,true,cc-by-nc,gold
088-597-318-557-237,Towards the Development of a Test Corpus of Digital Objects for the Evaluation of File Format Identification Tools and Signatures,2012-03-09,2012,journal article,International Journal of Digital Curation,17468256,Edinburgh University Library,,Andrew Fetherston; Tim Gollins,"The digital preservation community currently utilises a number of tools and automated processes to identify and validate digital objects. The identification of digital objects is a vital first step in their long-term preservation, but the results returned by tools used for this purpose are lacking in transparency, and are not easily tested or verified. This paper suggests that a test corpus of digital objects is one way of providing this verification and validation, ultimately improving trust in the tools, and providing further stimulus to their development. Issues to be considered are outlined, and attention is drawn to particular examples of existing digital corpora which could conceivably provide a useable framework or starting point for our own communities needs. This paper does not seek to answer all questions in this area, but merely attempts to set out areas for consideration in any next step that is taken.",7,1,16,26,World Wide Web; Information retrieval; Digital preservation; Computer science; File format,,,,,http://www.ijdc.net/index.php/ijdc/article/download/201/270 http://www.ijdc.net/index.php/ijdc/article/view/201 https://core.ac.uk/display/91041797 https://dblp.uni-trier.de/db/journals/ijdc/ijdc7.html#FetherstonG12 https://dx.doi.org/10.2218/ijdc.v7i1.211 http://dx.doi.org/10.2218/ijdc.v7i1.211 https://core.ac.uk/download/pdf/162675717.pdf,http://dx.doi.org/10.2218/ijdc.v7i1.211,,10.2218/ijdc.v7i1.211,2132913549,,0,004-652-388-189-304; 084-728-993-518-663; 120-072-322-429-12X,2,true,cc-by,gold
088-648-039-264-770,SBBox: A Tamper-Resistant Digital Archiving System,,2016,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Monjur Alam,,5,3,122,131,Digital media; Information system; Tamper resistance; Computer science; Multimedia; Wireless,,,,,http://sdiwc.net/digital-library/sbbox-a-tamperresistant-digital-archiving-system.html https://gnosis.library.ucy.ac.cy/handle/7/42727,http://dx.doi.org/10.17781/p002085,,10.17781/p002085,2521489234,,0,004-022-528-441-49X; 008-143-910-329-438; 008-295-920-051-532; 016-004-319-477-572; 017-890-768-257-247; 018-029-184-282-56X; 018-708-952-477-373; 029-648-389-747-342; 030-826-959-775-017; 032-761-363-352-02X; 033-720-241-809-648; 038-735-525-163-045; 041-023-425-576-515; 041-719-597-940-972; 062-002-531-320-264; 063-128-918-481-572; 088-965-465-936-241; 114-270-567-109-909; 116-136-129-754-823; 150-753-220-962-769; 154-025-503-611-66X; 159-459-723-637-730; 159-985-286-834-671; 170-326-522-228-585; 173-831-291-795-414; 175-791-313-672-423,2,false,,
089-380-540-556-832,Forensic Inspection of Sensitive User Data and Artifacts from Smartwatch Wearable Devices,2019-06-10,2019,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Nicole R. Odom; Jesse M. Lindmar; John Hirt; Josh Brunty,"Wearable devices allow users the ability to leave mobile phones behind while remaining connected to the digital world; however, this creates challenges in the examination, acquisition, identification, and analysis of probative data. This preliminary research aims to provide an enhanced understanding of where sensitive user data and forensic artifacts are stored on smartwatch wearable devices, both through utilization as a connected and standalone device. It also provides a methodology for the forensically sound acquisition of data from a standalone smartwatch wearable device. The results identify significant amounts of data on the SamsungTM Gear S3 Frontier, greater than that stored on the companion mobile phone. An Apple Watch Series 3 manual examination method which produces native screenshots was identified; however, the companion mobile phone was found to store the greatest amount of data. As a result of this research, a data extraction tool for the SamsungTM Gear S3 Frontier was created.",64,6,1673,1686,Human–computer interaction; Wearable computer; Mobile phone; Data extraction; Smartwatch; Computer science; Data recovery; Wearable technology; Mobile device forensics; Digital forensics,data recovery; digital forensics; forensic artifacts; forensic science; internet of things; mobile forensics; smartwatch wearable devices,Artifacts; Computer Security; Forensic Sciences; Humans; Information Storage and Retrieval; Smartphone; Wearable Electronic Devices,,,https://dialnet.unirioja.es/servlet/articulo?codigo=7121547 https://www.ncbi.nlm.nih.gov/pubmed/31674672 https://onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.14109,http://dx.doi.org/10.1111/1556-4029.14109,31674672,10.1111/1556-4029.14109,2952607946,,0,000-281-222-726-856; 019-698-064-288-240; 024-225-776-970-302; 025-549-978-484-457; 051-558-525-539-694; 084-452-444-628-355,15,false,,
089-419-432-581-673,A Survey on Digital Forensics in Internet of Things,,2020,journal article,IEEE Internet of Things Journal,23274662; 23722541,Institute of Electrical and Electronics Engineers (IEEE),United States,Jianwei Hou; Yuewei Li; Jingyang Yu; Wenchang Shi,"Internet of Things (IoT) is increasingly permeating peoples’ lives, gradually revolutionizing our way of life. Due to the tight connection between people and IoT, now civil and criminal investigations or internal probes must take IoT into account. From the forensic perspective, the IoT environment contains a rich set of artifacts that could benefit investigations, while the forensic investigation in IoT paradigm may have to alter to accommodate characteristics of IoT. Therefore, in this article, we analyze the impact of IoT on digital forensics and systematize the research efforts made by previous researchers from 2010 to 2018. We sketch the landscape of IoT forensics and examine the state of IoT forensics under a 3-D framework. The 3-D framework consists of a temporal dimension, a spatial dimension, and a technical dimension. The temporal dimension walks through the standard digital forensic process while the spatial dimension explores where to identify sources of evidence in IoT environment. These two dimensions attempt to provide principles and guidelines for standardizing digital investigations in the context of IoT. The technical dimension guides a way to the exploration of tools and techniques to ensure the enforcement of digital forensics in the ever-evolving IoT environment. Put together, we present a holistic overview of digital forensics in IoT. We also highlight open issues and outline promising suggestions to inspire future study.",7,1,1,15,Criminal investigation; Forensic science; Data science; Digital forensic process; Dimension (data warehouse); Enforcement; Context (language use); Computer science; Cloud computing; Digital forensics,,,,National Natural Science Foundation of China; Natural Science Foundation of Beijing Municipality; National High-tech Research and Development Program,https://doi.org/10.1109/JIOT.2019.2940713 https://ieeexplore.ieee.org/document/8831387 https://dblp.uni-trier.de/db/journals/iotj/iotj7.html#HouLYS20,http://dx.doi.org/10.1109/jiot.2019.2940713,,10.1109/jiot.2019.2940713,2972531726,,0,000-725-081-314-034; 001-507-239-208-313; 002-927-911-483-709; 003-029-378-692-335; 004-611-464-291-773; 004-750-320-878-25X; 005-630-640-664-939; 006-138-917-123-177; 009-747-804-607-928; 010-084-169-561-57X; 011-630-171-346-715; 013-013-001-967-18X; 015-239-387-608-474; 016-526-859-340-786; 018-362-897-068-538; 018-552-581-098-658; 019-360-393-097-72X; 019-698-064-288-240; 019-912-316-692-552; 020-957-111-490-556; 024-462-843-796-80X; 024-846-790-183-200; 026-764-618-898-849; 027-267-966-628-617; 029-164-830-214-360; 029-934-518-651-564; 030-433-196-114-204; 035-417-616-880-24X; 035-859-793-614-223; 039-999-270-718-277; 042-767-661-429-064; 046-143-775-958-052; 046-357-391-782-442; 047-125-525-662-686; 047-492-292-707-760; 047-782-671-230-742; 049-871-818-826-194; 050-834-040-747-382; 053-242-584-326-535; 054-888-023-799-702; 055-811-656-615-740; 055-996-756-667-066; 056-205-328-777-528; 057-980-219-952-36X; 058-156-586-882-704; 060-294-953-084-788; 064-733-456-850-063; 065-322-784-190-818; 065-654-832-541-493; 066-807-833-482-350; 067-749-619-156-62X; 068-520-918-599-405; 072-070-835-286-795; 080-792-696-174-439; 081-067-855-263-493; 081-833-857-658-915; 083-134-473-348-002; 083-232-193-192-073; 084-021-092-390-691; 084-312-028-371-525; 084-452-444-628-355; 091-339-033-909-469; 091-540-399-535-662; 092-827-935-965-207; 093-117-308-515-186; 103-681-534-784-390; 106-885-306-836-498; 107-942-544-689-539; 112-181-239-331-730; 118-008-780-783-558; 125-166-157-303-425; 125-682-509-275-554; 128-603-018-655-844; 134-072-762-404-610; 134-300-841-995-57X; 138-518-998-385-929; 144-184-475-249-995; 156-972-666-676-888; 167-751-222-897-487; 170-516-749-420-456; 172-334-035-729-772; 175-905-531-284-640,41,false,,
089-695-854-791-989,A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Shahzad Saleem; Oliver Popov; Ibrahim Baggili,"The omnipresence of mobile devices (or small scale digital devices - SSDD) and more importantly the utility of their associated applications for our daily activities, which range from financial transactions to learning, and from entertainment to distributed social presence, create an abundance of digital evidence for each individual. Some of the evidence may be a result of illegal activities that need to be identified, understood and eventually prevented in the future. There are numerous tools for acquiring and analyzing digital evidence extracted from mobile devices. The diversity of SSDDs, types of evidence generated and the number of tools used to uncover them posit a rather complex and challenging problem of selecting the best available tool for the extraction and the subsequent analysis of the evidence gathered from a specific digital device. Failing to select the best tool may easily lead to incomplete and or improper extraction, which eventually may violate the integrity of the digital evidence and diminish its probative value. Moreover, the compromised evidence may result in erroneous analysis, incorrect interpretation, and wrong conclusions which may eventually compromise the right of a fair trial. Hence, a digital forensics investigator has to deal with the complex decision problem from the very start of the investigative process called preparatory phase. The problem could be addressed and possibly solved by using multi criteria decision analysis. The performance of the tool for extracting a specific type of digital evidence, and the relevance of that type of digital evidence to the investigative problem are the two central factors for selecting the best available tool, which we advocate in our work. In this paper we explain the method used and showcase a case study by evaluating two tools using two mobile devices to demonstrate the utility of our proposed approach. The results indicated that XRY (Alt1) dominates UFED (Alt2) for most of the cases after balancing the requirements for both performance and relevance.",16,,S55,S64,Multiple-criteria decision analysis; Decision problem; Data mining; Relevance (law); Decision analysis; Mobile device; Data science; Digital evidence; Computer science; Mobile device forensics; Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287616300020 https://core.ac.uk/display/82434076 https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/52/ https://doi.org/10.1016/j.diin.2016.01.008 https://dl.acm.org/doi/10.1016/j.diin.2016.01.008 https://www.sciencedirect.com/science/article/pii/S1742287616300020 http://www.diva-portal.org/smash/record.jsf?pid=diva2:806835 http://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1052&context=electricalcomputerengineering-facpubs https://core.ac.uk/download/pdf/82434076.pdf,http://dx.doi.org/10.1016/j.diin.2016.01.008,,10.1016/j.diin.2016.01.008,638340418,,0,002-633-335-300-244; 013-428-450-747-670; 021-274-925-963-096; 024-696-473-476-447; 050-956-099-345-084; 067-545-085-582-063; 088-133-805-930-451; 092-879-045-056-401; 094-587-727-381-031; 098-955-499-112-850; 114-090-829-194-843; 132-942-022-718-554; 153-061-100-745-489; 154-092-845-528-110; 159-094-605-033-945; 192-810-463-153-431,12,true,cc-by-nc-nd,hybrid
090-632-465-818-866,IoT network traffic analysis: Opportunities and challenges for forensic investigators?,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Tina Wu; Frank Breitinger; Stephen Niemann,,38,,301123,,Data science; Traffic analysis; Computer science; Internet of Things,,,,,https://dfrws.org/presentation/iot-network-traffic-analysis-opportunities-and-challenges-for-forensic-investigators/ https://dfrws.org/wp-content/uploads/2021/01/2021_APAC_paper-iot_network_traffic_analysis_opportunities_and_challenges_for_forensic_investigators.pdf,http://dx.doi.org/10.1016/j.fsidi.2021.301123,,10.1016/j.fsidi.2021.301123,3121924025,,0,012-448-745-874-660; 039-999-270-718-277; 086-481-092-658-846; 088-553-642-323-93X; 097-939-114-561-254,0,true,cc-by-nc-nd,hybrid
090-980-715-883-62X,Trustworthy Digital Forensics in the Cloud,,2016,journal article,Computer,00189162,Institute of Electrical and Electronics Engineers (IEEE),United States,Shams Zawoad; Ragib Hasan,"Digital forensics is used to help investigate cybercrime. Because of its characteristics and rapid adoption, the cloud requires its own form of forensics, which must be reliable. The authors have developed the Open Cloud Forensics (OCF) model and FECloud architecture, which would enable effective cloud forensics.",49,3,78,81,Forensic science; Trustworthiness; Cloud computing security; Cybercrime; Cloud forensics; Computer security; Computer science; Cloud computing; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/computer/computer49.html#ZawoadH16 http://ieeexplore.ieee.org/document/7433340/ https://ieeexplore.ieee.org/document/7433340/ https://www.computer.org/csdl/magazine/co/2016/03/mco2016030078/13rRUwwslxu https://doi.org/10.1109/MC.2016.89,http://dx.doi.org/10.1109/mc.2016.89,,10.1109/mc.2016.89,2303474472,,0,042-458-608-620-40X; 059-655-726-130-137; 088-909-224-066-322; 118-008-780-783-558; 125-817-456-334-439; 132-342-259-584-364,14,false,,
091-023-567-376-838,Image super-resolution for outdoor digital forensics. Usability and legal aspects,,2018,journal article,Computers in Industry,01663615,Elsevier BV,Netherlands,Salvador Villena; Miguel Vega; Javier Mateos; Duska Rosenberg; Fionn Murtagh; Rafael Molina; Aggelos K. Katsaggelos,"Abstract Digital Forensics encompasses the recovery and investigation of data, images, and recordings found in digital devices in order to provide evidence in the court of law. This paper is devoted to the assessment of digital evidence which requires not only an understanding of the scientific technique that leads to improved quality of surveillance video recordings, but also of the legal principles behind it. Emphasis is given on the special treatment of image processing in terms of its handling and explanation that would be acceptable in a court of law. In this context, we propose a variational Bayesian approach to multiple-image super-resolution based on Super-Gaussian prior models that automatically enhances the quality of outdoor video recordings and estimates all the model parameters while preserving the authenticity, credibility and reliability of video data as digital evidence. The proposed methodology is validated both quantitatively and visually on synthetic videos generated from single images and real-life videos and applied to a real-life case of damages and stealing in a private property.",98,,34,47,Scientific technique; Usability; Information retrieval; Context (language use); Credibility; Digital evidence; Computer science; Reliability (statistics); Digital forensics; Image processing,,,,Spanish Ministry of Economy and Competitiveness; Spanish Ministry of Economy and Competitiveness; Department of Energy; ONR; NSF IDEAS; DARPA ReImagine,https://pure.hud.ac.uk/ws/files/12535345/Villena_et_al_Image_super_resolution_for_outdoor_digital_forensics_ComputersInIndustry_Feb2018.pdf https://pure.hud.ac.uk/en/publications/image-super-resolution-for-outdoor-digital-forensics-usability-an https://doi.org/10.1016/j.compind.2018.02.004 https://www.scholars.northwestern.edu/en/publications/image-super-resolution-for-outdoor-digital-forensics-usability-an https://www.sciencedirect.com/science/article/pii/S0166361517306358 https://core.ac.uk/download/237460172.pdf,http://dx.doi.org/10.1016/j.compind.2018.02.004,,10.1016/j.compind.2018.02.004,2793898592,,0,000-324-540-227-902; 001-178-621-720-858; 001-608-908-883-352; 004-117-785-181-23X; 004-723-592-537-121; 004-958-229-709-669; 008-215-658-916-277; 010-037-102-410-599; 011-306-628-371-474; 012-016-836-079-639; 013-491-140-953-577; 014-062-160-299-737; 014-862-525-960-731; 016-134-735-893-511; 016-915-586-462-874; 017-815-064-018-299; 019-831-293-743-518; 019-894-616-057-466; 021-496-988-088-093; 023-644-847-408-449; 025-384-948-751-89X; 035-262-200-703-668; 038-668-970-194-854; 038-985-210-009-934; 041-012-928-243-751; 043-730-176-138-623; 044-400-889-251-073; 046-053-037-634-196; 057-967-268-379-508; 062-196-740-572-626; 063-532-297-436-449; 064-280-057-388-079; 065-589-633-902-745; 066-173-954-451-110; 069-544-521-452-109; 071-908-933-643-362; 072-245-054-212-971; 074-006-536-890-200; 075-555-480-212-889; 079-806-321-227-601; 081-015-835-254-704; 082-218-851-096-466; 082-850-619-602-511; 084-009-578-367-756; 084-031-713-999-539; 085-379-403-609-164; 089-769-185-795-841; 091-048-622-639-68X; 091-107-184-025-131; 092-098-207-359-420; 095-563-603-963-814; 095-907-092-910-396; 101-330-403-204-926; 111-710-523-428-585; 114-599-315-973-390; 114-651-231-792-299; 114-791-371-428-899; 116-398-928-717-260; 128-199-263-914-537; 134-927-490-231-285; 142-043-074-549-848; 165-101-260-380-991; 173-034-553-635-460,4,true,cc-by-nc-nd,green
091-095-676-173-055,From Fingers to Faces: Visual Semiotics and Digital Forensics.,2020-09-08,2020,journal article,International journal for the semiotics of law = Revue internationale de semiotique juridique,15728722; 09528059,Springer Netherlands,Netherlands,Massimo Leone,"Identification is a primary need of societies. It is even more central in law enforcement. In the history of crime, a dialectics takes place between felonious attempts at concealing, disguising, or forging identities and societal efforts at unmasking the impostures. Semiotics offers specialistic skills at studying the signs of societal detection and identification, including those of forensics and criminology. In human history, no sign more than the face is attached a value of personal identity. Yet, modern forensics realizes that the face can mislead and, inspired by eastern models (China, Japan, India), adopts fingerprinting. In the digital era, however, fingerprinting first goes digital, then it is increasingly replaced by facial recognition. The face is back in digital AI forensics, together with a tangle of sociocultural biases. Semiotics can play a key role in studying their surreptitious influence.",34,2,579,599,Aesthetics; Semiotics; Sign (semiotics); Sociology; Sociocultural evolution; Value (semiotics); Face (sociological concept); Visual semiotics; Personal identity; Digital forensics,Artificial intelligence; Face; Fingerprinting; Forensics; Semiotics,,,European Research Council; Università degli Studi di Torino,https://link.springer.com/article/10.1007/s11196-020-09766-x https://europepmc.org/article/PMC/PMC7902585 http://www.ncbi.nlm.nih.gov/pubmed/33679005 https://link.springer.com/content/pdf/10.1007/s11196-020-09766-x.pdf https://philpapers.org/rec/LEOFFT-2,http://dx.doi.org/10.1007/s11196-020-09766-x,33679005,10.1007/s11196-020-09766-x,3084149874,PMC7902585,0,000-934-790-240-526; 001-332-269-937-371; 002-084-436-260-502; 005-729-296-889-409; 006-417-336-632-864; 008-173-570-185-809; 010-251-348-460-059; 010-822-692-733-104; 011-668-961-276-997; 012-382-347-302-254; 013-579-914-066-098; 017-455-116-009-882; 017-967-261-379-707; 020-213-858-033-669; 021-726-600-370-887; 024-433-338-455-825; 024-777-112-208-695; 025-424-433-390-443; 027-827-932-600-58X; 028-857-636-801-145; 029-580-051-056-298; 029-673-724-933-551; 033-449-436-713-237; 035-958-327-139-940; 041-019-520-513-633; 043-609-043-621-318; 047-292-046-377-51X; 048-729-913-877-842; 049-549-868-383-189; 055-411-169-871-218; 056-767-070-367-090; 057-434-160-435-756; 059-265-958-504-886; 060-030-811-269-921; 067-920-037-838-601; 068-172-061-909-591; 070-593-541-528-461; 073-081-075-865-136; 076-038-316-235-449; 078-529-917-631-833; 084-830-546-655-042; 092-855-559-924-441; 094-616-297-781-624; 096-313-948-754-561; 096-436-652-379-168; 099-962-872-474-828; 100-556-632-686-864; 100-785-496-496-001; 107-303-483-407-487; 108-370-654-349-434; 111-501-646-961-821; 121-967-461-356-227; 125-059-895-701-114; 126-924-630-123-064; 130-480-128-021-492; 137-814-597-737-479; 140-867-568-470-741; 147-551-616-698-411; 155-359-366-196-733; 159-387-115-519-589; 170-217-466-363-084; 170-377-669-705-729; 170-491-082-666-264; 174-914-215-838-312; 177-129-736-095-679; 184-808-381-426-771; 187-112-407-792-766; 190-987-239-151-571; 191-158-565-957-915,7,true,cc-by,hybrid
091-282-514-263-879,Book Review: The X-Ways Forensics Practitioner's Guide,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Linda K. Lau,"Shavers, B., and Zimmerman, E. (2013). The X-Ways Forensics Practitioner's Guide. Waltham, MA: Syngress, 242 pages. ISBN: 978-0-12-411605-4. Print: US $50.90. Includes exercises, case studies, references, and index. Reviewed by Linda K. Lau, Longwood University Brett Shavers is a former law enforcement officer, a digital forensics examiner, an adjunct instructor, and a frequent speaker at many conferences. After writing his first book, titled Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, he co-wrote his 2nd book with Eric Zimmerman and Jimmy Weg, who is a knowledgeable technical editor. Both Brett and Eric are experts in cyber forensics, with many years of law enforcement experience at both the state and federal levels.",9,3,59,61,Law; Suspect; Cybercrime; Law enforcement; Law enforcement officer; Investigative Techniques; Computer security; Computer science; Digital forensics,,,,,https://core.ac.uk/display/92098202 https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#Lau14 https://commons.erau.edu/jdfsl/vol9/iss3/5/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1188&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2014.1188,,10.15394/jdfsl.2014.1188,1541752380,,0,,0,true,cc-by-nc,gold
091-341-449-257-890,Digging Up the Narrative: Forensic Practices between Objectivity and Interpretation,,2016,journal article,Membrana Journal of Photography,27124894; 24638501,Membrana Institute,,Lisa Andergassen,"Photography traditionally generates a truth-claim, while at the same time undermining it by holding the potential of being altered or staged. Since the rise of digital techniques, we are facing different (and easier) ways to manipulate pictures, leading to the notion of the digital photograph as generally mutable and therefore not trustworthy. But as there have been more and easier ways to “manipulate” photographs, so has there been an increase in the ways to detect them. Which today puts digital forensics in the position of re-establishing “reality” as a referential point by tracing every step of the process of alteration, turning the dubitative image into one that is doubt-free once its metadata has been analysed. But is this the whole story? By addressing digital forensic practices that have been used within the investigation of the Abu Ghraib torture scandal, I am showing that the hidden narrative of photographic production can be dug up by using forensic methods, but not without creating a new narrative.",,"Vol. 1, no. 1",48,51,Epistemology; Art; Narrative; Objectivity (philosophy); Digging,,,,,http://dx.doi.org/10.47659/m1.048.art,http://dx.doi.org/10.47659/m1.048.art,,10.47659/m1.048.art,3094339227,,0,033-543-032-954-465; 040-610-972-230-628,0,false,,
091-454-341-452-919,A Study of Minimization of Cybercrimes by the Implementation of Cyber Forensics Tool Kit,2022-03-31,2022,journal article,International Journal for Research in Applied Science and Engineering Technology,23219653,International Journal for Research in Applied Science and Engineering Technology (IJRASET),,Danish Rehman; Er. Jasdeep Singh,"Abstract: To identify whether the victim has committed a crime, both criminal and forensic investigators need the help of digital forensics. As a result, an investigator must use an adequate, accurate, affordable, and trustworthy cyber forensic tool for forensics investigations related to crimes. Digital forensics, also known as computer forensic analysis, computer analysis, and computer inspection, is the practise of painstakingly evaluating computer media (hard discs, diskettes, cassettes, and so on) for evidence. A comprehensive inspection by a qualified examiner may result in the reorganisation of a computer's operations. It's a step-by-step technique for investigating crimes utilising digital evidence employing scientific methodologies and processes. While many amazing solutions have been developed to protect our information communication networks, these devices require much more frequent updating. Individuals with both research abilities and a professional grasp of how the internet works, as well as those who know how to examine PC network security problems, are in great demand. This gives an attack-resistant investigative framework, as well as understanding of how the internet operates and the skills to assess cybercrime apparatus to discover who, what, when, why, and how. The study's findings led to the development of Digital Forensic tool solutions for investigators looking to expand their capabilities in using these tools. Keywords: Forensic, Cybercrime, investigation, toolkit",10,3,1335,1345,Computer forensics; Cybercrime; Digital forensics; Computer science; Digital evidence; Network forensics; The Internet; Computer security; GRASP; Trustworthiness; Criminal investigation; Data science; Internet privacy; World Wide Web; Software engineering; Criminology; Psychology,,,,,,http://dx.doi.org/10.22214/ijraset.2022.40867,,10.22214/ijraset.2022.40867,,,0,,0,true,,gold
091-619-263-117-914,Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics,2012-04-01,2012,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,George Grispos; Tim Storer; William Bradley Glisson,"Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments (among others). Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment. Several new research challenges addressing this changing context are also identified and discussed.",4,2,28,48,Information technology; Information technology management; Audit; Key (cryptography); Context (language use); Law enforcement; Computer security; Computer science; Cloud computing; Digital forensics; Context (archaeology); Key (lock); Data science,,,,,https://arxiv.org/pdf/1410.2123 https://dblp.uni-trier.de/db/journals/corr/corr1410.html#GrisposSG14 http://eprints.gla.ac.uk/68013/1/ID68013.pdf http://eprints.gla.ac.uk/68013/ https://digitalcommons.unomaha.edu/cgi/viewcontent.cgi?article=1043&context=interdiscipinformaticsfacpub https://ui.adsabs.harvard.edu/abs/2014arXiv1410.2123G/abstract https://shsu-ir.tdl.org/handle/20.500.11875/3196 https://experts.nebraska.edu/en/publications/calm-before-the-storm-the-challenges-of-cloud-computing-in-digita-2 https://dx.doi.org/10.4018/jdcf.2012040103 http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf https://www.igi-global.com/article/calm-before-storm/68408 https://arxiv.org/abs/1410.2123 https://works.bepress.com/george-grispos/2/ https://digitalcommons.unomaha.edu/interdiscipinformaticsfacpub/44/ https://core.ac.uk/download/pdf/296143974.pdf,http://dx.doi.org/10.4018/jdcf.2012040103,,10.4018/jdcf.2012040103,3102095724; 1971580317,,0,002-288-358-355-198; 002-506-228-487-750; 005-221-029-321-635; 006-994-826-441-382; 012-295-616-254-09X; 015-264-924-343-905; 021-039-461-635-181; 021-850-998-857-676; 024-695-810-060-22X; 030-341-862-818-724; 032-609-573-479-049; 032-697-093-668-898; 038-668-970-194-854; 042-653-566-399-199; 047-630-600-014-492; 049-446-135-635-21X; 050-618-920-212-97X; 051-278-209-038-859; 051-368-118-380-383; 052-152-063-024-042; 052-320-348-197-350; 053-666-953-083-583; 056-122-492-187-163; 056-294-265-787-418; 059-697-278-686-056; 062-712-470-776-220; 064-707-477-630-693; 075-976-616-114-109; 086-185-263-136-078; 086-365-780-774-340; 096-416-027-558-541; 097-567-011-227-46X; 110-010-690-717-911; 113-264-745-950-390; 119-385-247-230-234; 123-304-888-889-490; 155-855-942-114-621; 158-468-997-833-921; 168-819-441-615-181; 181-755-184-835-108; 184-948-841-629-735; 199-745-676-923-766,125,true,,green
091-696-315-070-855,Explainable digital forensics AI: Towards mitigating distrust in AI-based digital forensics analysis using interpretable models,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Abiodun A. Solanke,"The present level of skepticism expressed by courts, legal practitioners, and the general public over Artificial Intelligence (AI) based digital evidence extraction techniques has been observed, and understandably so. Concerns have been raised about closed-box AI models’ transparency and their suitability for use in digital evidence mining. While AI models are firmly rooted in mathematical, statistical, and computational theories, the argument has centered on their explainability and understandability, particularly in terms of how they arrive at certain conclusions. This paper examines the issues with closed-box models; the goals; and methods of explainability/interpretability. Most importantly, recommendations for interpretable AI-based digital forensics (DF) investigation are proposed.",42,,301403,301403,Interpretability; Skepticism; Distrust; Transparency (behavior); Computer science; Digital forensics; Argument (complex analysis); Digital evidence; Artificial intelligence; Data science; Computer security; Psychology; Epistemology; Psychotherapist; Philosophy; Biochemistry; Chemistry,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301403,,10.1016/j.fsidi.2022.301403,,,0,000-360-120-513-679; 000-449-131-016-986; 003-015-137-620-130; 003-026-991-770-318; 003-360-732-233-044; 007-392-723-533-629; 018-822-581-363-834; 023-063-388-078-229; 025-060-592-657-50X; 025-415-725-538-599; 033-344-357-648-800; 036-563-037-799-705; 044-638-092-768-171; 052-696-669-041-854; 053-071-743-643-578; 054-547-096-894-887; 054-819-045-052-125; 055-502-988-908-057; 055-807-088-113-125; 059-149-073-001-124; 059-786-079-109-47X; 065-001-388-509-041; 066-042-439-542-747; 070-717-463-864-129; 071-860-959-402-137; 083-839-515-156-421; 086-574-303-424-904; 087-323-490-534-091; 094-581-471-765-72X; 102-225-149-387-887; 109-466-069-133-838; 123-498-859-171-509; 124-191-464-465-991; 125-939-677-745-616; 139-924-660-355-079; 153-221-094-384-217; 189-305-371-273-262,0,true,,hybrid
091-892-724-900-950,"Amino acid profiling from fingerprints, a novel methodology using UPLC-MS",,2017,journal article,Analytical Methods,17599660; 17599679,Royal Society of Chemistry (RSC),United Kingdom,Ward van Helmond; Chris Jan Kuijpers; Elise Van Diejen; Jincey Spiering; Brent Maagdelijn; Marcel de Puit,"Fingermark evidence is extensively used in criminal investigations. Hence, there have been many investigations into the chemical compounds present in fingerprint deposits. In this technical note we describe the analysis of non-derivatised amino acid profiles obtained from fingerprints. We used UPLC with an amide stationary phase and subsequent detection using a triple quadrupole MS/MS and TOF-MS detector. The linearity (R2) was satisfactory for both MS detectors (>0.98 for all amino acids in the case of the triple quadrupole MS/MS and >0.96 in the case of the TOF-MS). Although the triple quadrupole had a higher sensitivity for most amino acids, both mass spectrometers were able to retrieve the amino acid profiles of fingerprints from 19 donors. Between these profiles, only minor differences were observed between the separate analyses on the different mass analyzers, mainly in L-proline, L-lysine and L-phenylalanine abundances. Surprisingly, the mean RSD in amino acid profiles from duplicate fingerprints turned out to be lower for the TOF-MS (18.6% ± 6.6% vs. 13.2% ± 3.8%), as did the mean RSD of the intraday reproducibility (8.22% ± 1.94% vs. 9.54% ± 3.07%).",9,38,5697,5702,Analytical chemistry; Mass spectrometry; Triple quadrupole mass spectrometer; High-performance liquid chromatography; Chemistry; Amide; Stationary phase; Uplc ms ms; Chromatography; Amino acid; Reproducibility,,,,Nederlandse Organisatie voor Wetenschappelijk Onderzoek,https://hbo-kennisbank.nl/resolve/hogeschoolamsterdam/eyJoIjogImRmN2Q4MTFlZTJlMTFiMmE5MzI3Y2FmYzI5MzVhNGI1OThhZGYzYzA5MGY4NWI3OWY5NzRhNzA1MjI0YWM0OTciLCAidSI6ICJodHRwczovL3B1cmUuaHZhLm5sL3dzL2ZpbGVzLzQzNzU1NDgvYzdheTAxNjAzZC5wZGYifQ== https://repository.tudelft.nl/islandora/object/uuid%3A07404946-1ecd-4d88-927b-a644e2c8b7b1/datastream/OBJ/download http://pubs.rsc.org/en/content/articlelanding/2017/ay/c7ay01603d https://pure.hva.nl/ws/files/4375548/c7ay01603d.pdf http://pubs.rsc.org/en/content/articlehtml/2017/ay/c7ay01603d?page=search https://repository.tudelft.nl/islandora/object/uuid%3A07404946-1ecd-4d88-927b-a644e2c8b7b1 http://xlink.rsc.org/?DOI=C7AY01603D https://research.tudelft.nl/en/publications/amino-acid-profiling-from-fingerprints-a-novel-methodology-using- https://www.narcis.nl/publication/RecordID/oai%3Atudelft.nl%3Auuid%3A07404946-1ecd-4d88-927b-a644e2c8b7b1 https://pubs.rsc.org/en/content/articlepdf/2017/ay/c7ay01603d https://pubs.rsc.org/en/content/articlelanding/2017/ay/c7ay01603d,http://dx.doi.org/10.1039/c7ay01603d,,10.1039/c7ay01603d,2743386892,,0,017-475-159-795-447; 019-313-265-814-008; 022-926-871-843-546; 027-173-519-900-466; 031-577-843-822-493; 033-835-248-545-913; 041-608-181-694-032; 045-830-532-366-077; 053-551-505-531-143; 067-030-451-906-169; 067-255-920-027-544; 092-849-252-226-832; 094-496-234-007-777,17,true,cc-by-nc,hybrid
091-934-600-025-114,Likelihood ratio method for the interpretation of iPhone health app data in digital forensics,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,M. (Marouschka) Vink; M.J. (Marjan) Sjerps; A. (Abdul) Boztas; J.P. (Jan Peter) van Zandwijk,,41,,301389,301389,Computer science; Digital forensics; Field (mathematics); Sensitivity (control systems); Interpretation (philosophy); Data mining; Calibration; Statistics; Computer security; Mathematics; Engineering; Electronic engineering; Pure mathematics; Programming language,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301389,,10.1016/j.fsidi.2022.301389,,,0,005-715-450-998-72X; 007-199-278-427-478; 008-733-402-517-23X; 009-678-795-915-075; 011-085-215-003-810; 012-693-115-841-628; 014-961-689-075-177; 016-886-829-561-085; 022-896-866-582-746; 023-766-437-138-867; 025-010-654-468-777; 034-180-335-918-441; 036-237-056-429-781; 039-158-280-114-980; 046-919-141-111-859; 048-011-673-789-33X; 054-126-844-371-315; 056-029-289-343-419; 058-506-041-812-981; 059-216-039-945-794; 066-193-937-643-661; 074-695-197-880-37X; 084-264-375-349-935; 091-016-585-939-256; 096-986-617-825-552; 103-760-328-285-801; 109-526-829-068-859; 116-473-356-479-419; 119-261-946-266-987; 120-388-714-246-243; 121-368-250-344-993; 138-332-223-612-203,0,false,,
091-946-490-975-722,Deteksi Pemalsuan Foto Digital Menggunakan Image Forensics,2019-09-26,2019,journal article,Mobile and Forensics,26566257,Universitas Ahmad Dahlan,," Riadi; Anton Yudhana; Wicaksono Yuli Sulistyo","Perkembangan foto yang semakin maju membuatnya memiliki banyak keunggulan dan kekurangan, salah satunya adalah mudahnya dimanipulasi dengan software editing . Perubahan foto dapat dibuat atau diedit dengan mudah, sehingga dapat merubah informasi yang disampaikan menjadi berbeda dan membuatnya rawan digunakan untuk tindak kejahatan. Forensics citra digital merupakan salah satu metode ilmiah pada bidang penelitian yang bertujuan untuk mendapatkan fakta-fakta pembuktian dalam menentukan keaslian image. Hal ini menjadi dasar penelitian ini untuk mendeteksi pemalsuan foto digital. Penelitian ini menggunakan analisa dengan 3 tools forensics yaitu FotoForensics, ForensicallyBeta dan Opanda IExif. Hasil yang didapat dari penelitian ini adalah terdeteksinya perbedaan metadata dan perbedaan kontras antara foto asli dan foto manipulasi yang menunjukan adanya perubahan pada foto tersebut.",1,1,13,21,,,,,,http://journal2.uad.ac.id/index.php/mf/article/download/703/pdf http://journal2.uad.ac.id/index.php/mf/article/view/703 https://core.ac.uk/download/pdf/267886815.pdf,http://dx.doi.org/10.12928/mf.v1i1.703,,10.12928/mf.v1i1.703,2982277947,,0,,0,true,cc-by-sa,gold
091-995-132-929-145,New Era of Cloud Forensics-Challenges and Opportunities,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Sailaja Vadlamudi,,,,,,Data science; Cloud forensics; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.08,http://dx.doi.org/10.46293/4n6/2021.03.01.08,,10.46293/4n6/2021.03.01.08,3161080518,,0,,0,false,,
092-046-002-157-986,Digital Forensic Logistics: The Basics of Scientific Theory,,2021,journal article,International Journal of Law and Society,26401894,Science Publishing Group,,Sergey Zuev; Dmitry Bakhteev,"Investigations of complex crimes with digital evidence increasingly require the use of modern digital devices and computer programs. Working with big data involves the accumulation, processing, and analysis of forensic information for further algorithmization and modeling of investigative actions, as well as the automation of the organizational activities of investigators. The article substantiates the need for the use of digital forensic logistics to optimize information flows and build the most effective analytical human and computer processing, not excluding the use of artificial intelligence systems. Digital forensic logistics is a sub-branch of digital forensics in the collection, identification, storage, verification, and analysis of data, as well as the generation of electronic evidence for evidence in court. The article provides the main directions of digital forensic logistics, including the logistics of evidence in criminal cases; logistics of the general organization of crime investigation; logistics planning (selection of tools and methods of investigation); logistics of putting forward versions of events; logistics of decisions in criminal matters. It is argued that the efficiency of the entire system will largely depend on the establishment of information flows and the prioritization of tasks. Quality work requires the improvement of applied digital technologies capable of providing the necessary algorithms of the evidentiary process. The use of special software, including the use of artificial intelligence systems, is becoming increasingly relevant. The logistics of making decisions in criminal cases ideally represents an electronic assistant, endowed with artificial intelligence or in the form of a special computer program, capable, based on the determination of the forensic significance of the obtained digital information (electronic evidence), to offer the investigator solutions that can change the course of the investigation and transfer the entire information system in a new state.",4,2,83,,Automation; Information system; Data science; Digital evidence; Computer science; Process (engineering); State (computer science); Big data; Identification (information); Digital forensics,,,,,https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijls.20210402.14.pdf https://membership.sciencepublishinggroup.com/journal/paperinfo?journalid=306&doi=10.11648/j.ijls.20210402.14 http://www.sciencepublishinggroup.com/journal/paperinfo?journalid=306&doi=10.11648/j.ijls.20210402.14,http://dx.doi.org/10.11648/j.ijls.20210402.14,,10.11648/j.ijls.20210402.14,3163211431,,0,,0,true,cc-by,gold
092-223-657-810-83X,THE INTEGRATION OF DIGITAL FORENSICS SCIENCE AND ISLAMIC EVIDENCE LAWS,2019-12-15,2019,journal article,"International Journal of Law, Government and Communication",01281763,Global Academic Excellence (M) Sdn Bhd,,Mohamad Khairudin Kallil; Ahmad Che Yaacob,"Evidence is anything that tends to prove or disprove a fact at issue in legal action. It involves the offering of alleged proof through testimony or objects at court proceedings to persuade the trier of fact about an issue in dispute. Islamic Evidence Law is a body of rules that helps to govern conduct and determines what will admissible in certain legal proceedings and trials. In the proceeding that involves digital evidence, the court will consider whether the digital evidence is admissible or inadmissible depends on the requirements of admissibility stated in law statutes in force and the existence of any Standard Operating Procedure (SOP). Under section 33 of the Syariah Court (Federal Territories) Evidence Act or other Syariah Evidence Enactments, digital evidence is subjected to be authenticated by the digital forensics experts. In digital forensics, the process of identification, preservation, collection, analysis, and presentation is the main procedures contained in any Standard Operating Procedure (SOP) of any digital forensics services. The court will ensure that this procedure can maintain the authenticity and the originality of the evidence especially on the issue of expert qualification, a chain of custody and analysis part. Thus, digital forensics is integrated with the Islamic law of evidence to maintain justice in delivering judgment. Therefore, this article examines the standard requirement of the admissibility of digital evidence by digital forensic methodology by using the qualitative approach on the analysis of articles, books, law statutes documents and law cases. The results show that the need for amendment of Syariah Court Evidence and Procedure statutes and the necessity of the existence of Standard Operating Procedure (SOP) on digital evidence in the Syariah courts as a guideline for judges, lawyers and parties involved.",4,17,61,70,Law; Computer science; Islam; Digital forensics,,,,,http://dx.doi.org/10.35631/ijlgc.417006,http://dx.doi.org/10.35631/ijlgc.417006,,10.35631/ijlgc.417006,2999286939,,0,,1,true,,gold
092-461-654-973-880,Studying the Documentation Process in Digital Forensic Investigation Frameworks/ Models,,2015,journal article,Journal of Al-Nahrain University-Science,18145922; 25190881,Al-Nahrain Journal of Science,,Talib M. Jawad Abbas,"With the proliferation of the digital crime around the world, there are numerous and diverse digital forensic investigation models for driving digital investigation processes. Now more than ever, it must be a criminal investigation to obtain digital evidence which wouldn't be admissible in court. Therefore, digital forensic investigation should be implemented successfully, and there are a number of significant steps that should be taken into account. Each step and phase produces documents that are essential in understanding how the investigation process is built.The aim of this paper is to study models/ frameworks for the digital forensic investigation over a time period of ten years and find out the degree and level of attention to the process of documentation. This paper also includes definitions and descriptions of the basic and core concepts that the frameworks/ models use.",18,4,153,162,Criminal investigation; Systems engineering; Data science; Digital evidence; Digital forensic investigation; Computer science; Process (engineering); Documentation; Digital forensics,,,,,https://anjs.edu.iq/index.php/anjs/article/download/299/1699 https://anjs.edu.iq/index.php/anjs/article/view/299 https://www.iasj.net/iasj?func=fulltext&aId=107014,http://dx.doi.org/10.22401/jnus.18.4.21,,10.22401/jnus.18.4.21,2588900731,,0,006-708-208-065-949; 010-086-703-646-194; 019-698-064-288-240; 032-697-093-668-898; 109-482-615-363-500; 170-299-458-679-224; 170-346-482-774-626; 190-065-821-748-92X; 199-172-967-270-034; 199-745-676-923-766,1,false,,
092-506-898-894-624,Towards a Comprehensive Ontology Based-Investigation for Digital Forensics Cybercrime,2015-10-31,2015,journal article,International Journal on Communications Antenna and Propagation (IRECAP),25332929; 20395086,Praise Worthy Prize,Italy,Amir Mohamed Talib; Fahad Omar Alomary,"Cyber physical attacks against information and computer systems are a tangible and dangerous threat that requires an effective response. In this paper, digital forensics cybercrime ontology is proposed to collect, examine, analyze, prepare, acquire and preserve evidence of computer crimes of digital forensics in cyberspace. The power of the proposed ontology is to determine the difficulties of association of the digital crime types and their collection evidences in digital forensics cases. Ontology development has consists three main steps, 1) domain, purpose and scope setting, 2) important terms acquisition, classes and class hierarchy conceptualization and 3) instances creation. Digital forensics and ontology are two normally unrelated topics. Ontology congruent to this paper is method that will help to better understanding and defining terms of digital forensics. Our proposed digital forensics cybercrime ontology resulting from the Protege has a total of 180 classes, 179 subclasses and 84 instances regarding digital forensics crime cases.",5,5,263,268,World Wide Web; Ontology (information science); Protégé; Cybercrime; Cyberspace; Class hierarchy; Computer science; Computer forensics; Digital forensics; Conceptualization,,,,,https://www.praiseworthyprize.org/jsm/index.php?journal=irecap&page=article&op=view&path%5B%5D=17418,http://dx.doi.org/10.15866/irecap.v5i5.6112,,10.15866/irecap.v5i5.6112,2283915427,,0,014-384-963-565-48X; 095-437-078-101-003; 105-646-650-348-579; 160-810-323-281-473; 181-072-396-769-365; 187-367-973-147-176,8,false,,
092-704-658-903-701,Digital Forensic Readiness of Information Systems: A cost-benefit variable analysis,2022-02-04,2022,journal article,International Journal on Cyber Situational Awareness,20572182; 2633495x,"Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC)",,Antonis Mouhtaropoulos,"Despite the increasing amount of research on the pre-incident side within a digital forensic investigation, little steps have been taken towards assessing the effectiveness of such a plan in terms of cost effectiveness. This research paper lays the foundations of a cost-benefit variable analysis within a digital forensic readiness context by defining a cost-benefit relationship effect model. We collect novel, primary data from organisations and institutions that implement a digital forensic readiness plan to identify cost variables of each measure and threat, and benefit variables of each measure to be taken. We conduct data analysis to portray that specific cost variables have a significant effect on specific benefit variables and present the results of the data collection process amongst organisations and institutions applying a digital forensic readiness plan. Lastly, we produce hypotheses testing results and determine the validity between each cost-benefit relationship.",6,1,,,Plan (archaeology); Variable (mathematics); Context (archaeology); Digital forensics; Computer science; Measure (data warehouse); Data collection; Process (computing); Data science; Forensic science; Variables; Risk analysis (engineering); Process management; Knowledge management,,,,,,http://dx.doi.org/10.22619/ijcsa.2021.100136,,10.22619/ijcsa.2021.100136,,,0,,0,true,,bronze
092-765-349-680-750,The different types of reports produced in digital forensic investigations.,2021-06-27,2021,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Graeme Horsman,"Abstract The importance of ensuring the results of any digital forensic (DF) examination are effectively communicated cannot be understated. In most cases, this communication will be done via written report, yet despite this there is arguably limited best practice guidance available which is specific for this field in regards to report construction. Poor reporting practices in DF are likely to undermine the reliability of evidence provided across this field, where there is a need for formalised guidance regarding the requirements for effective DF report construction; this should not be a task left solely to each individual practitioner to determine without instruction. For this, the field of DF should look to the wider forensic community and the existing work in this area for support. In line with many other ‘traditional’ forensic science types, a DF practitioner can be commissioned to report in one of three ways - ‘technical’, ‘investigative’ or ‘evaluative’, where each reporting type maintains a specific purpose and interpretative-context, determined by the examination workflow undertaken by a practitioner following client instruction. This work draws upon guidance set out in fundamental forensic science reporting literature in order to describe each reporting type in turn, outlining their scope, content and construction requirements in an attempt to provide support for the DF field.",61,5,627,634,Set (psychology); Work (electrical); Workflow; Best practice; Task (project management); Scope (project management); Field (computer science); Computer science; Engineering ethics; Digital forensics,Digital forensics; Evaluation; Investigation; Report,Forensic Medicine; Forensic Sciences/methods; Humans; Reproducibility of Results,,,https://www.sciencedirect.com/science/article/abs/pii/S1355030621000927,http://dx.doi.org/10.1016/j.scijus.2021.06.009,34482943,10.1016/j.scijus.2021.06.009,3176874416,,0,001-691-716-197-657; 002-062-018-830-835; 004-934-589-759-348; 005-715-450-998-72X; 007-702-479-851-182; 009-512-003-529-193; 010-061-391-662-193; 036-597-490-099-438; 038-668-970-194-854; 040-450-549-766-994; 041-365-301-128-075; 061-560-419-292-70X; 064-376-774-486-022; 067-505-834-517-458; 071-616-341-516-576; 101-549-415-202-81X; 102-243-142-344-71X; 121-830-022-805-361; 133-397-275-695-990; 142-790-196-752-819; 143-959-640-326-451; 173-145-269-859-717,6,false,,
092-878-184-623-918,Digital video forensics: a comprehensive survey,,2019,journal article,International Journal of Advanced Intelligence Paradigms,17550386; 17550394,Inderscience Enterprises Ltd,United Kingdom,Mohammad A. Alsmirat; Ruba A. Al-Hussien; Walaa Al-Sarayrah; Yaser Jararweh; Morad Etier,"The wide spread of digital devices and tools causes the simplification of the manipulation of any digital multimedia content. As a result, digital videos and photos are not trusted to be used as evidence in courts. This fact raises the need for finding techniques to ensure the authenticity of digital multimedia contents. Experts in digital-signal processing conducted a huge number of researches to find new strategies, using digital forensics, to verify digital evidences and trace its origins. The aim of this paper is to collect and provide the definitions of the main concepts related to media forensics. Also, this paper gives an overview of the different techniques used in media forensics concentrating on video forensics. Furthermore, it classifies the work done in the field according to the main technique used in the proposed solution approach.",15,3,437,456,Double compression; Digital multimedia; Image forensics; Digital video; Field (computer science); Computer science; Multimedia; TRACE (psycholinguistics); Data compression; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJAIP.2020.106040 https://dblp.uni-trier.de/db/journals/ijaip/ijaip15.html#AlsmiratAAJE20 http://dblp.uni-trier.de/db/journals/ijaip/ijaip15.html#AlsmiratAAJE20 https://doi.org/10.1504/IJAIP.2020.106040,https://www.inderscienceonline.com/doi/abs/10.1504/IJAIP.2020.106040,,,2810653893,,0,,3,false,,
093-098-656-285-339,Paytm Digital Wallet And Online Transactions Security Measures,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Rahul Pandey,,,,58,62,,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.12,http://dx.doi.org/10.46293/4n6/2020.02.02.12,,10.46293/4n6/2020.02.02.12,3021597832,,0,,0,false,,
093-327-100-232-043,Application of Static Forensics Method for Extracting Steganographic Files on Digital Evidence Using the DFRWS Framework,2020-06-20,2020,journal article,Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi),25800760,Ikatan Ahli Informatika Indonesia (IAII),,null Sunardi; Riadi; Muh. Hajar Akbar,"Steganography is one of the anti-forensic techniques that allow criminals to hide information in other messages so that during the investigation, the investigator will experience problems and difficulty in getting evidence of original information on the crime. Therefore an investigator is required to have the ability to be able to find and extract (decoding) using the right tools when opening messages that have been inserted by steganography techniques. The purpose of this study is to analyze digital evidence using the static forensics method by applying the six stages to the Digital Forensics Research Workshop (DFRWS) framework and extracting steganography on files that have been compromised based on case scenarios involving digital crime. The tools used are FTK Imager, Autopsy, WinHex, Hiderman, and StegSpy. The results of extraction of 9 out of 10 files that were scanned by steganography files had 90% success and 10% of steganography files were not found, so it can be concluded that the extraction files in steganographic messages can be used as legal digital proofs according to law.",4,3,576,583,Mathematical proof; Steganography; Information retrieval; Digital evidence; Computer science; Decoding methods; Digital forensics,,,,,http://jurnal.iaii.or.id/index.php/RESTI/article/view/1906 http://jurnal.iaii.or.id/index.php/RESTI/article/download/1906/265,http://dx.doi.org/10.29207/resti.v4i3.1906,,10.29207/resti.v4i3.1906,3036917890,,0,,0,true,cc-by,gold
093-431-358-523-075,Enhancing Digital Forensic Analysis throughDocument Clustering,,2014,journal article,International Journal of Innovative Research in Computer and Communication Engineering,23209798,,,null B.Vidhya; R. Priya Vaijayanthi,"Digital forensic is the process of uncovering and interpreting process of uncovering and interpreting electronic data for use in a court of law. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting identifying and validating the digital information for the purpose of reconstructing past events. Digital forensics deals with the analysis of artifacts on all types of digital devices. The role of digital forensics is to facilitate the investigation of criminal activities that involve digital devices, to preserve, gather, analyze and provide scientific and technical evidence, and to prepare the documentation for law enforcement authorities. Clustering methods can be used to automatically group the retrieved documents into a list of meaningful categories. Document clustering involves descriptors and descriptor extraction. Descriptors are sets of words that describe the contents within the cluster. Document cluster is generally considered to be a centralized process. Example of document clustering is web document clustering. Application of document clustering can be categorized to two types that are online and offline. Seized digital devices can provide precious information and evidence about facts. Large amount of data analyzed. Digital tools supported. In this paper do the work of extracting document and get a brief knowledge.",2,1,2496,2501,Document clustering; k-means clustering; Information retrieval; Online and offline; Law enforcement; Computer science; Process (engineering); Documentation; Cluster analysis; Digital forensics,,,,,http://www.rroij.com/open-access/enhancing-digital-forensic-analysis-throughdocument-clustering.pdf https://www.rroij.com/open-access/enhancing-digital-forensic-analysis-throughdocument-clustering.pdf,http://www.rroij.com/open-access/enhancing-digital-forensic-analysis-throughdocument-clustering.pdf,,,2611297783,,0,,0,false,,
093-441-380-401-516,PENERAPAN COMPOSITE LOGIC DALAM MENGKOLABORASIKAN FRAMEWORK TERKAIT MULTIMEDIA FORENSIK,2017-08-29,2017,journal article,JISKA (Jurnal Informatika Sunan Kalijaga),25280074; 25275836,Al-Jamiah Research Centre,,Nora Lizarti; Bambang Sugiantoro; Yudi Prayudi,"Like the digital forensics in general, multimedia forensics requires an integrated and flexible framework that can guide the process of proof is procedurally in order to maintain the validity of a digital evidence so that it can be justified in court. But this time, the digital forensics investigation framework that develops more emphasis on computer forensic investigations in general and did not give a specific stage of multimedia forensics. Often in investigating multimedia forensics investigator uses a framework that vary depending on the type of multimedia content to be analyzed, of course it becomes inflexible and inefficient, whereas multimedia content share characteristics that allow it to be integrated into a single unit. This study develops a forensic multimedia framework by implementing the Composite Logic to collaborate on several multimedia framework and related documents. Logic Composite method is a method of modeling the distribution of structured logical modularization techniques with explicit interface in which a model consists of a set of components that are interconnected with the principle of decomposition. In other words, the application of this method will allow researchers to extract and merge several frameworks into a single unit does not eliminate the function and the basic structure of the frameworks.",2,1,26,33,Structure (mathematical logic); Interface (Java); Multimedia framework; Digital evidence; Computer science; Process (engineering); Multimedia; Function (engineering); Digital forensics; Modular programming,,,,,http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/21-04 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/download/21-04/1061 https://core.ac.uk/download/267117302.pdf,http://dx.doi.org/10.14421/jiska.2017.21-04,,10.14421/jiska.2017.21-04,2759058413,,0,,0,true,cc-by-nc,gold
093-622-612-071-02X,"Maintaining Continuity of Evidence Within Forensic Labs Through Training, Accreditation, and Developing Better Digital Communication with Investigators and Prosecutors",,2019,journal article,Forensic Science International: Synergy,2589871x,Elsevier BV,,Stephen Campbell,,1,,S4,,Forensic science; Psychology; Training (civil); Medical education; Accreditation,,,,,https://api.elsevier.com/content/article/PII:S2589871X19300075?httpAccept=text/xml,http://dx.doi.org/10.1016/j.fsisyn.2019.02.006,,10.1016/j.fsisyn.2019.02.006,2933984024,,0,,0,true,"CC BY, CC BY-NC-ND",gold
093-958-345-280-896,Welcome to the 9th annual DFRWS Europe conference!,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,40,,301356,301356,Political science; History,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301356,,10.1016/j.fsidi.2022.301356,,,0,,0,true,,bronze
094-142-794-127-63X,The COLLECTORS ranking scale for 'at-scene' digital device triage.,2020-10-09,2020,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Graeme Horsman,"As digital evidence now features prominently in many criminal investigations, such large volumes of requests for the forensic examination of devices has led to well publicized backlogs and delays. In an effort to cope, triage policies are frequently implemented in order to reduce the number of digital devices which are seized unnecessarily. Often first responders are tasked with performing triage at scene in order to decide whether any identified devices should be seized and submitted for forensic examination. In some cases, this is done with the assistance of software which allows device content to be ""previewed""; however, in some cases, a first responder will triage devices using their judgment and experience alone, absent of knowledge of the devices content, referred to as ""decision-based device triage"" (DBDT). This work provides a discussion of the challenges first responders face when carrying out DBDT at scene. In response, the COLLECTORS ranking scale is proposed to help first responders carry out DBDT and to formalize this process in an effort to support quality control of this practice. The COLLECTORS ranking scale consists of 10 categories which first responders should rank a given device against. Each devices cumulative score should be queried against the defined ""seizure thresholds"" which offer support to first responders in assessing when to seize a device. To offer clarify, an example use-case involving the COLLECTORS ranking scale is included, highlighting its application when faced with multiple digital devices at scene.",66,1,179,189,Rank (computer programming); Criminal investigation; Data science; First responder; Triage; Quality (business); Digital evidence; Computer science; Process (engineering); Digital forensics,crime scence; digital evidence; digital forensics; investigation; triage,,,,https://www.ncbi.nlm.nih.gov/pubmed/33034896 https://onlinelibrary.wiley.com/doi/epdf/10.1111/1556-4029.14582 https://research.tees.ac.uk/en/publications/the-collectors-ranking-scale-for-atscene-digital-device-triage,http://dx.doi.org/10.1111/1556-4029.14582,33034896,10.1111/1556-4029.14582,3092108380,,0,003-982-227-180-136; 009-512-003-529-193; 025-290-159-757-335; 032-451-540-235-796; 039-999-270-718-277; 044-601-892-223-509; 062-137-637-964-947; 066-032-563-680-259; 066-235-037-082-291; 074-706-219-689-754; 081-447-017-308-327; 090-752-043-508-733; 131-516-331-360-906; 184-069-302-229-82X,8,true,cc-by-nc-nd,green
094-631-307-774-31X,Digital Forensics Specialist Group,2014-01-28,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Miranda Moore; Simon Iveson,Miranda Moore QC and Simon Iveson give a personal impression on the work of the Digital Forensics Specialist Group and the difficulties in identifying appropriately qualified digital evidence specialists in the UK Index words: Digital Forensics Specialist Group; Forensic Science Regulator; Forensic Science Advisory Council; accreditation; digital forensic methods; validation,9,0,,,Psychology; Index (publishing); Digital evidence; Computer security; Medical education; Computer forensics; Accreditation; Digital forensics,,,,,https://journals.sas.ac.uk/deeslr/article/view/1995 https://sas-space.sas.ac.uk/5418/,http://dx.doi.org/10.14296/deeslr.v9i0.1995,,10.14296/deeslr.v9i0.1995,2150343373,,0,,0,true,cc-by-nc-nd,hybrid
094-926-047-905-405,BIMI - Brand Indicators for Message Identification,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Venkata Satish Guttula,,,,,,Identification (biology); Information retrieval; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.04,http://dx.doi.org/10.46293/4n6/2020.02.04.04,,10.46293/4n6/2020.02.04.04,3097920458,,0,,0,false,,
095-686-500-915-641,Application of Adobe® Photoshop® CC 2018 for Identifying the Source of HP® Color Laser Printouts,2019-06-15,2019,journal article,Arab Journal of Forensic Sciences & Forensic Medicine,16586786; 16586794,Naif Arab University for Security Sciences,,Ahmad S. Salim; Asmaa A. Abdall,"Abstract In today’s digital world, printer forensics is one of the most important disciplines to reveal the authenticity of printed documents and track criminals. Digital steganography is an advanced approach to secure color laser printing processes, but it cannot be applied to monochrome laser printers. Therefore, the identity of the machine used to print color questioned documents provides a valuable means for detecting forgery crimes in digital forensic labs and law enforcement agencies. Based on this, we introduced a new forensic method that unveils the steganography (hidden information) embedded in color laser printouts via an adopted preset in Adobe® Photoshop® CC 2018. This forensic tool can be applied as a nondestructive and indirect tool for image processing. In the present work, printing, scanning, extraction, and measurements for the embedded tracking dots of candidate color laser printouts were conducted. Thirty-five HP® color laser printers were selected with different and same models with different serial numbers and used to print a hundred color laser printouts. The defined coded dots matrix patterns that characterized the color laser machines of the HP® brand could clearly be determined. Therefore, this procedure could successfully be applied to distinguish between various color laser printouts printed by HP® printers with a variant serial number in digital forensic labs with a conclusive accuracy ratio attained to one hundred percent.",1,9,1164,1164,Steganography; Computer graphics (images); Monochrome; Laser printing; Adobe photoshop; Computer science; Laser; Digital forensics; Image processing,,,,,https://repository.nauss.edu.sa/handle/123456789/66175,http://dx.doi.org/10.26735/16586794.2019.002,,10.26735/16586794.2019.002,2944947099,,0,,0,true,cc-by-nc,gold
095-691-114-276-825,An integrated conceptual digital forensic framework for cloud computing,,2012,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Ben Martini; Kim-Kwang Raymond Choo,"Increasing interest in and use of cloud computing services presents both opportunities for criminal exploitation and challenges for law enforcement agencies (LEAs). For example, it is becoming easier for criminals to store incriminating files in the cloud computing environment but it may be extremely difficult for LEAs to seize these files as the latter could potentially be stored overseas. Two of the most widely used and accepted forensic frameworks – McKemmish (1999) and NIST (Kent et al., 2006) – are then reviewed to identify the required changes to current forensic practices needed to successfully conduct cloud computing investigations. We propose an integrated (iterative) conceptual digital forensic framework (based on McKemmish and NIST), which emphasises the differences in the preservation of forensic data and the collection of cloud computing data for forensic purposes. Cloud computing digital forensic issues are discussed within the context of this framework. Finally suggestions for future research are made to further examine this field and provide a library of digital forensic methodologies for the various cloud platforms and deployment models.",9,2,71,80,Software deployment; NIST; World Wide Web; Context (language use); Law enforcement; Digital evidence; Computer science; Computer forensics; Cloud computing; Digital forensics,,,,,http://www.sciencedirect.com/science/article/pii/S174228761200059X http://dx.doi.org/10.1016/j.diin.2012.07.001 https://www.sciencedirect.com/science/article/abs/pii/S174228761200059X https://www.infona.pl/resource/bwmeta1.element.elsevier-f6af9062-2002-39d9-b1f2-0f2f2e2559b0 https://doi.org/10.1016/j.diin.2012.07.001 https://fenix.tecnico.ulisboa.pt/downloadFile/563568428736506/Martini2012.pdf https://dblp.uni-trier.de/db/journals/di/di9.html#MartiniC12 https://dx.doi.org/10.1016/j.diin.2012.07.001,http://dx.doi.org/10.1016/j.diin.2012.07.001,,10.1016/j.diin.2012.07.001,2122122011,,1,004-753-336-309-960; 009-832-452-035-773; 014-851-281-685-88X; 019-698-064-288-240; 028-325-831-077-28X; 034-773-286-616-44X; 035-448-415-847-226; 043-386-830-253-686; 045-051-768-618-936; 052-152-063-024-042; 066-521-283-222-779; 073-545-912-961-452; 075-976-616-114-109; 093-158-141-304-133; 124-837-341-752-034; 134-927-490-231-285; 135-567-652-645-895; 155-855-942-114-621; 162-255-141-911-414; 167-109-432-601-404; 170-108-067-251-840,210,true,,green
095-847-865-864-079,Forensic Importance of SIM Cards as a Digital Evidence,,2016,journal article,Journal of Forensic Research,21577145,OMICS Publishing Group,,Ankit Srivastava; Pratik Vatsal,"Digital Forensics is a branch of Forensic Science pertaining to evidential articles of digital and electronic nature, of which mobile forensics is a major stream. A proliferation of handheld cellular devices and crimes involving mobile phones in the previous years has led to an enormous demand for specialists in the field of mobile forensics. The interesting part is that any mobile phone is incomplete without a SIM card. Therefore, SIM cards are the most common type of forensic evidence to be found in cases where handheld devices are involved, a SIM card is imperative, no matter the phone belongs to the normal mobile phones category or the satellitephones that contain an iDEN (Integrated Digital Enhanced Network) SIM. These cards are all around us and are now being integrated in driving licenses, debit cards, credit cards, ATM cards, Identity cards, etc. Digital Forensic Science is the skill of a forensic expert to apply the knowledge of computer sciences and the investigative measures for a legal cause requiring the analysis of digital evidences. It is the process of identifying, preserving, analyzing, and presenting digital evidence in a manner that is legally acceptable. The motive of the process is to preserve any digital evidence in its most original form while performing a planned analysis by identifying, collecting and validating the digital information for the purpose of reconstructing past events.",7,2,1,4,ATM card; Mobile device; Mobile phone; Digital evidence; Computer security; Subscriber identity module; Computer science; Computer forensics; Mobile device forensics; Digital forensics,,,,,https://www.hilarispublisher.com/open-access/forensic-importance-of-sim-cards-as-a-digital-evidence-2157-7145-1000322.pdf https://www.hilarispublisher.com/abstract/forensic-importance-of-sim-cards-as-a-digital-evidence-36355.html https://www.omicsonline.org/open-access/forensic-importance-of-sim-cards-as-a-digital-evidence-2157-7145-1000322.pdf https://www.mendeley.com/catalogue/e95a0629-9d1f-3e8a-9e81-8ab38be513b3/,http://dx.doi.org/10.4172/2157-7145.1000322,,10.4172/2157-7145.1000322,2516654580,,0,084-620-225-862-010; 132-234-095-047-23X; 155-784-834-321-193; 159-516-414-584-397,2,true,cc-by,hybrid
095-972-507-485-24X,Research of Blind Forensics Algorithm on Digital Image Tampering,2014-07-01,2014,journal article,Indonesian Journal of Electrical Engineering and Computer Science,25024752,,,Hongying Jin,"With rapid development of the internet and the multimedia technology, the digital images tampering with blind forensics technology become a new research direction in the study of information security. The technology is based on the digital image, and it is only to realize image integrity and authenticity of the certification, so it is widely used in the civil fields such as news reports, judicial proof and military fields such as military intelligence analysis. So the research of it has great significance and broad application prospect. In the paper, the exploration and research on the paste tampering and splicing tampering with blind forensics algorithm are made. The blind forensics algorithm based on radial Krawtchouk copy-and-paste invariant moment is proposed. As the current copy-and-paste blind forensics algorithm has low localization accuracy, and poor robustness of the post-processing in solving the problem. Based on sliding window block matching method and the radial Krawtchouk invariant moment, it proposes a copy-and-paste tampering with blind forensics algorithm. The experimental results show that the algorithm can effectively locate the tampered area, and it has very strong robustness of the rotating operation, JPEG compression, Gaussian noise, etc.",12,7,5399,5407,The Internet; Algorithm; Forensic science; Computer science; Gaussian noise; Digital image; Invariant (mathematics); Information security; Robustness (computer science),,,,,http://ijeecs.iaescore.com/index.php/IJEECS/article/download/3643/1923 http://ijeecs.iaescore.com/index.php/IJEECS/article/view/3643 http://iaesjournal.com/online/index.php/TELKOMNIKA/article/view/5373,http://ijeecs.iaescore.com/index.php/IJEECS/article/view/3643,,,2003143664,,0,,2,false,,
096-483-556-640-313,Editorial: The epic story of scientific interpretation in digital investigations,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Eoghan Casey,,34,,301063,,EPIC; Literature; Interpretation (philosophy); History,,,,,https://doi.org/10.1016/j.fsidi.2020.301063,http://dx.doi.org/10.1016/j.fsidi.2020.301063,,10.1016/j.fsidi.2020.301063,3091008978,,0,,0,false,,
096-655-404-701-429,Forensic analysis of newer TomTom devices,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Jens Elstner; Mark Roeloffs,,16,16,29,37,Embedded system; Data acquisition; Flash memory; Navigation system; Task (project management); First generation; Computer science; Process (engineering); Global Positioning System; Core dump,,,,,https://dblp.uni-trier.de/db/journals/di/di16.html#ElstnerR16 https://dl.acm.org/doi/10.1016/j.diin.2016.01.016 https://www.sciencedirect.com/science/article/pii/S174228761630010X#! https://www.infona.pl/resource/bwmeta1.element.elsevier-256ee770-72a8-3a3e-add9-0e0e37f2b710 https://www.sciencedirect.com/science/article/abs/pii/S174228761630010X https://dl.acm.org/citation.cfm?id=2906705,http://dx.doi.org/10.1016/j.diin.2016.01.016,,10.1016/j.diin.2016.01.016,2278766910,,0,010-127-508-296-844; 016-046-803-187-724; 017-815-064-018-299; 055-967-961-527-254; 066-807-833-482-350; 074-933-143-629-826; 084-021-092-390-691; 094-777-730-460-109,3,false,,
096-725-651-767-207,Empirical Evaluation of the Reliability of Photogrammetry Software in the Recovery of Three‐Dimensional Footwear Impressions,2020-05-14,2020,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Hannah J Larsen; Matthew R. Bennett,"This paper examines the reliability of Structure from Motion (SfM) photogrammetry as a tool in the capture of forensic footwear marks. This is applicable to photogrammetry freeware DigTrace but is equally relevant to other SfM solutions. SfM simply requires a digital camera, a scale bar, and a selection of oblique photographs of the trace in question taken at the scene. The output is a digital three-dimensional point cloud of the surface and any plastic trace thereon. The first section of this paper examines the reliability of photogrammetry to capture the same data when repeatedly used on one impression, while the second part assesses the impact of varying cameras. Using cloud to cloud comparisons that measure the distance between two-point clouds, we assess the variability between models. The results highlight how little variability is evident and therefore speak to the accuracy and consistency of such techniques in the capture of three-dimensional traces. Using this method, 3D footwear impressions can, in many substrates, be collected with a repeatability of 97% with any variation between models less than ~0.5 mm.",65,5,1722,1729,Photogrammetry; Point cloud; Structure from motion; Artificial intelligence; Software; Digital camera; Computer vision; Computer science; Reliability (statistics); Scale (map); Cloud computing,3D; digital evidence; evidence recovery; footwear impression; reliability testing; three-dimensional; validity,,,U.K. Natural Environment Research Council (NE/M021459/1),https://pubmed.ncbi.nlm.nih.gov/32407555/ https://www.onlinelibrary.wiley.com/doi/pdf/10.1111/1556-4029.14455 https://www.ncbi.nlm.nih.gov/pubmed/32407555 https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.14455 http://eprints.bournemouth.ac.uk/34012/ https://europepmc.org/article/MED/32407555 https://core.ac.uk/download/323108559.pdf,http://dx.doi.org/10.1111/1556-4029.14455,32407555,10.1111/1556-4029.14455,3025651539,,0,013-821-112-405-687; 015-123-182-480-038; 039-684-326-140-341; 041-423-699-652-143; 047-348-590-414-767; 047-375-324-891-038; 052-010-126-807-228; 121-847-862-251-147; 134-425-675-466-849; 136-371-932-328-861; 170-502-821-118-095; 178-564-771-899-288,3,true,cc-by,hybrid
096-899-831-703-200,Using a standard approach to the design of next generation e-Supply Chain Digital Forensic Readiness systems,,2016,journal article,SAIEE Africa Research Journal,19911696,Institute of Electrical and Electronics Engineers (IEEE),,D.J.E. Masvosvere; Hein S. Venter,"The internet has had a major impact on how information is shared within supply chains, and in commerce in general. This has resulted in the establishment of information systems such as e-supply chains (eSCs) amongst others which integrate the internet and other information and communications technology (ICT) with traditional business processes for the swift transmission of information between trading partners. Many organisations have reaped the benefits that come from adopting the eSC model, but have also faced the challenges with which it comes. One such major challenge is information security. With the current state of cybercrime, system developers are challenged with the task of developing cutting edge digital forensic readiness (DFR) systems that can keep up with current technological advancements, such as (eSCs). Hence, the problem addressed in this paper is the lack of a well-formulated DFR approach that can assist system developers in the development of e-supply chain digital forensic readiness systems. The main objective of such a system being that it must be able to provide law enforcement/digital forensic investigators (DFI) with forensically sound and readily available potential digital evidence that can expedite and support digital forensics incident response processes. This approach, if implemented can also prepare trading partners for security incidents that might take place, if not prevent them from occurring. Therefore, the work presented in this paper is aimed at providing a procedural approach that is based on digital forensics principles. This paper discusses the limitations of current system monitoring tools in relation to the kind of specialised DFR systems that are needed in the eSC environment and proposes an eSC-DFR process model and architectural design model that can lead to the development of next-generation eSC DFR systems. It is the view of the authors that the conclusions drawn from this paper can spearhead the development of cutting-edge next-generation digital forensic readiness systems, and bring attention to some of the shortcomings of current system monitoring tools.",107,2,104,120,Supply chain; The Internet; Risk analysis (engineering); Information system; System monitoring; Digital evidence; Computer science; Information security; Information and Communications Technology; Digital forensics,,,,,https://ieeexplore.ieee.org/document/8531546,http://dx.doi.org/10.23919/saiee.2016.8531546,,10.23919/saiee.2016.8531546,2903793168,,0,006-435-365-660-88X; 015-568-093-985-132; 019-831-293-743-518; 030-252-857-464-20X; 031-119-185-862-726; 036-436-057-429-275; 106-885-306-836-498; 160-562-609-354-05X; 172-491-030-512-776,5,true,"CC BY, CC BY-NC-ND",gold
096-993-850-376-090,Triage in Live Digital Forensic Analysis,2013-07-02,2013,journal article,The International Journal of Forensic Computer Science,18099807; 19807333,ABEAT - Associacao Brasileira de Especialistas em Alta Tecnologia,,Muhammad Shamraiz Bashir; M. A. Khan; Shaheed Zulfikar; Ali Bhutto,"Due to frequent use of Internet and with technological advancements, cyber and malware attacks over the digital devices have increased manifold. Activities performed electronically can be investigated by means of digital forensic analysis methodologies. Live digital forensic tools are used for digital evidence collection and investigations of malicious activities that occurred on a standalone system or networks. Since compromised system remains active while using these tools, some serious issues relating to malicious functionalities and policy violations could lead to serious damages like data theft or data loss. In this paper, we present a critical review of the triage in live forensic. This paper discusses several techniques being used for performing live forensic analysis and critically evaluate their efficacy in terms of their applicability and reliability. A brief anecdote about the pros and cons of these techniques are also discussed. We present the findings of our study in the critical section.",8,1,35,44,The Internet; Engineering; Data loss; Triage; Damages; Data theft; Digital evidence; Computer security; Malware; Digital forensics,,,,,http://www.ijofcs.org/V08N1-PP05-TRIAGE-IN-LIVE-DIGITAL.pdf http://www.ijofcs.org/abstract-v08n1-pp05.html,http://dx.doi.org/10.5769/j201301005,,10.5769/j201301005,2314982172,,0,003-871-070-011-964; 020-626-957-505-364; 026-024-733-636-162; 030-351-009-711-953; 035-269-627-388-435; 037-483-791-552-006; 040-105-187-457-272; 040-483-292-320-671; 051-645-938-939-51X; 052-209-716-598-874; 062-325-585-829-185; 093-448-702-012-591; 105-002-898-852-695; 127-286-301-080-684; 132-606-863-800-090; 147-707-428-925-566,27,false,,
097-034-132-251-966,A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution,,2017,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Ilane Cunha; Ahmed Patel; Jefferson Cavalcante,,9,3,209,209,Cybercrime; Digital forensics; Computer science; Computer forensics; Curriculum; Training (meteorology); Computer security; Digital evidence; Medical education; Criminology; World Wide Web; The Internet; Psychology; Law; Political science; Medicine; Physics; Meteorology,,,,,,http://dx.doi.org/10.1504/ijesdf.2017.10005633,,10.1504/ijesdf.2017.10005633,,,0,,0,false,,
097-610-747-427-14X,The PRNU Algorithm of Video Forensics,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Shreya Pai; Madhavi Bhilegaonkar; Vipul Borhade; Shweta Tripathi,"The A video sequence provides more proof of an occurring event than a photo or a group of photos. Hence it is important to identify the source of the video. In this paper, we explore how the Photo Response Non-Uniformity (PRNU) noise is useful for the detection of source cameras- Metadata of a Camera. With this method, we aim to determine whether the video originated from the given camera or not.",,,72,78,Artificial intelligence; Computer vision; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.15,http://dx.doi.org/10.46293/4n6/2020.02.02.15,,10.46293/4n6/2020.02.02.15,3023758872,,0,,0,false,,
097-729-559-656-234,Cyber Forensic – A Literature Review,,2019,journal article,"Trinity Journal of Management, IT & Media",23206470,ACS Publisher,,Aparna Chaturvedi; Ashish Awasthi,"Cyber Forensics is a branch of forensic science that is aimed to restore, collect and examine the digital evidence of materials found in digital devices, in relation to cybercrimes. With the advancement in cyber area, frequent use of internet and technologies leads to cyber-attacks. Cyber forensic is opted for acquiring electronic information and investigation of malicious evidence found in system or on network in such a manner that makes it admissible in court. It is also used to recover lost information in a system. The retrived information is used to prosecute a criminal. Number of crimes committed against an internet and malware attacks over the digital devices have increased. This paper contains a brief review of the literature aimed to identify the relevant pieces of knowledge in the digital forensics field.",10,1,24,29,Digital forensics; Digital evidence; Computer forensics; Computer security; Cyber crime; The Internet; Malware; Computer science; Network forensics; Relation (database); Field (mathematics); Internet privacy; Forensic examination; Cybercrime; Data science; World Wide Web; Engineering; Data mining; Forensic engineering; Mathematics; Pure mathematics,,,,,,http://dx.doi.org/10.48165/tjmitm.2019.1002,,10.48165/tjmitm.2019.1002,,,0,,1,false,,
097-817-585-854-322,Internet Epoch Intelligence-Evolution of Open-Source Intelligence,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),," Hanji",,,,,,The Internet; Astronomy; Open-source intelligence; Epoch (reference date); History,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.03,http://dx.doi.org/10.46293/4n6/2021.03.01.03,,10.46293/4n6/2021.03.01.03,3161575146,,0,,0,false,,
097-848-147-291-445,Proceduralization in Cybersecurity: A Socio-Technical Systems Perspective,,2020,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,John W. Coffey,,9,3,126,138,Sociotechnical system; Perspective (graphical); Computer science; Engineering ethics,,,,,http://sdiwc.net/digital-library/proceduralization-in-cybersecurity-a-sociotechnical-systems-perspective,http://dx.doi.org/10.17781/p002660,,10.17781/p002660,3126709873,,0,007-507-736-887-722; 026-774-296-742-022; 067-950-012-629-210; 073-997-683-020-831; 094-719-521-419-139; 099-989-901-692-411; 103-358-174-303-812; 106-458-055-177-080; 170-185-475-008-11X; 187-495-955-466-903,1,false,,
097-939-114-561-254,IoT forensic challenges and opportunities for digital traces,,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Francesco Servida; Eoghan Casey,"Abstract The increasing number of IoT devices in personal environments such as smarthomes presents opportunities and risks from a forensic perspective. These devices generate traces that can be useful for investigative and forensic purposes in any type of offense. At the same time, newer IoT devices are not supported by existing digital forensic tools and methods, making it difficult for practitioners to extract data from them without the support of a forensic advisor with specialized knowledge in this area. In addition, these traces can present evaluation challenges for forensic scientists, and can contain vulnerabilities that pose privacy risks. Security vulnerabilities of IoT devices create opportunities for extracting traces but might also be used by criminals to undermine a device. The aim of this work is to increase familiarity with traces from various IoT devices in a smarthome, and demonstrate how traces from IoT devices in a smarthome can be useful for investigative and forensic purposes. This work presents a study of IoT devices and associated smartphone applications, providing approaches to extracting and analyzing digital traces. This research led to the discovery of vulnerabilities in multiple devices, and a scenario for the DFRWS IoT forensic challenge was developed.",28,,S22,S29,Data science; Specialized knowledge; Smartphone application; Computer science; Internet of Things; Digital forensics,,,,,https://www.mendeley.com/catalogue/e3cf9d1d-4196-3739-9172-1f7e473d2f3e/ https://www.sciencedirect.com/science/article/pii/S1742287619300222 https://dfrws.org/wp-content/uploads/2021/05/2019_EU_paper-iot_forensic_challenges_and_opportunities_for_digital_traces.pdf https://dfrws.org/presentation/iot-forensic-challenges-and-opportunities-for-digital-traces/ https://doi.org/10.1016/j.diin.2019.01.012 https://core.ac.uk/download/226982753.pdf,http://dx.doi.org/10.1016/j.diin.2019.01.012,,10.1016/j.diin.2019.01.012,2942103749,,0,005-630-640-664-939; 009-747-804-607-928; 014-184-535-135-778; 014-466-907-950-761; 018-552-581-098-658; 019-831-293-743-518; 029-200-392-412-396; 029-434-105-390-369; 039-999-270-718-277; 060-294-953-084-788; 061-269-967-405-492; 130-633-255-506-737,60,true,cc-by-nc-nd,hybrid
098-259-555-485-151,From IT forensics to forensic computing,2015-12-01,2015,journal article,it - Information Technology,16112776; 21967032,Walter de Gruyter GmbH,,Felix C. Freiling,"With the proliferation of digital computers and information systems into all fields of our society the amount of crime involving such systems (cybercrime) is steadily increasing. This involves both more traditional crimes in which digital systems are merely used as tools (e. g., different types of fraud, blackmailing, hidden communication) as well as new forms of crime in which digital systems are the target (e. g., computer abuses, malicious software, malicious remote control networks like botnets). For many years now, computer professionals have attempted to help in fighting cybercrime not only by devising preventive techniques to detect or prevent cyberattacks, but also by supporting the juridical system to investigate cybercrime and (in the long run) to identify, arrest and prosecute cybercriminals. In this feat, computer professionals play various roles: Not only do they support in identifying, preserving and analyzing evidence connected with digital systems, they also have to adapt investigative techniques and tools to the elusive behavior of cybercriminals. This broad field has become known as the field of digital forensics, computer forensics or IT forensics. The emergence of this field was mainly driven by practitioners trying to satisfy immediateneedswithin concretedigital investigations andRogers and Seigfried [3] identified “a disproportional focus on the applied aspects of computer forensics, at the expense of the development of fundamental theories”. Despite the scientific immaturity of the field, many universities (especially in the UK and the US) have started to establish academic degree programs and research labs in this area because of the need of scientific credibility in a court of law, but also partly driven by the enormous popularity of television series like “CSI”. After performing research in this area for almost 10 years, it appears to me as if the field is in many cases pretending to be scientific while it actually is executing best practices. Garfinkel [2] observed a “crisis” of digital forensics, and Casey [1, p. 1],",57,6,337,338,Forensic science; Information system; Botnet; Cybercrime; Credibility; Field (computer science); Computer security; Computer science; Malware; Computer forensics; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/it/it57.html#Freiling15,http://dx.doi.org/10.1515/itit-2015-0039,,10.1515/itit-2015-0039,2220589576,,0,007-790-059-029-953; 134-927-490-231-285; 199-172-967-270-034,1,false,,
098-397-152-347-251,Digital Forensic Report,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Santosh Khadsare,,,,,,Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.01,http://dx.doi.org/10.46293/4n6/2020.02.04.01,,10.46293/4n6/2020.02.04.01,3096495016,,0,,0,false,,
098-711-946-154-008,Legal Regulation thе Forensic Activities in Digitalization,2022-05-09,2022,journal article,Courier of Kutafin Moscow State Law University (MSAL)),27826163; 23115998,Kutafin Moscow State Law University,,A. A. Sarkisian,"The article is devoted to the analysis some features of legal regulation of digitalization of forensic science. Some aspects of development of professional standards were also considered. The author examines in detail the main purposes of accreditation of testing and calibration laboratories. From a practical point of view, the shortcomings of some approaches to the legal regulation of digital traces research in forensic science.",,2,157,160,Accreditation; Digital forensics; Engineering ethics; Forensic science; Point (geometry); Political science; Computer science,,,,,,http://dx.doi.org/10.17803/2311-5998.2022.90.2.157-160,,10.17803/2311-5998.2022.90.2.157-160,,,0,,0,true,,hybrid
098-748-261-333-651,Digital forensic research: current state of the art,2012-11-13,2012,journal article,CSI Transactions on ICT,22779078; 22779086,Springer Science and Business Media LLC,,Sriram Raghavan,"Digital forensics is the process of employing scientific principles and processes to analyze electronically stored information and determine the sequence of events which led to a particular incident. In this digital age, it is important for researchers to become aware of the recent developments in this dynamic field and understand scope for the future. The past decade has witnessed significant technological advancements to aid during a digital investigation. Many methodologies, tools and techniques have found their way into the field designed on forensic principles. Digital forensics has also witnessed many innovative approaches that have been explored to acquire and analyze digital evidence from diverse sources. In this paper, we review the research literature since 2000 and categorize developments in the field into four major categories. In recent years the exponential growth of technological has also brought with it some serious challenges for digital forensic research which is elucidated. Within each category, research is sub-classified into conceptual and practical advancements. We highlight the observations made by previous researchers and summarize the research directions for the future.",1,1,91,114,Electronically stored information; Data science; Scope (project management); Digital evidence; Research literature; Field (computer science); Computer science; Process (engineering); State (computer science); Digital forensics,,,,,https://link.springer.com/content/pdf/10.1007%2Fs40012-012-0008-7.pdf https://link.springer.com/article/10.1007/s40012-012-0008-7/fulltext.html https://paperity.org/p/33082795/digital-forensic-research-current-state-of-the-art https://securecyberspace.org/yahoo_site_admin/assets/docs/df-survey.334154504.pdf https://link.springer.com/article/10.1007/s40012-012-0008-7 http://securecyberspace.org/yahoo_site_admin/assets/docs/df-survey.334154504.pdf,http://dx.doi.org/10.1007/s40012-012-0008-7,,10.1007/s40012-012-0008-7,1996767106,,1,000-004-275-385-957; 001-170-920-458-777; 001-255-768-346-633; 002-495-833-326-831; 002-534-435-127-422; 003-126-053-087-131; 003-182-041-034-40X; 003-412-732-826-511; 004-441-167-148-170; 004-652-388-189-304; 004-723-592-537-121; 007-455-522-527-690; 007-579-380-265-043; 007-832-595-971-443; 008-202-966-214-573; 008-769-224-564-600; 009-692-861-529-254; 010-388-991-543-520; 011-569-292-128-546; 012-495-836-083-305; 013-518-815-622-627; 013-610-410-193-416; 014-595-195-942-667; 014-761-788-507-645; 015-056-577-655-683; 015-123-573-514-32X; 016-046-803-187-724; 017-840-378-634-021; 017-890-768-257-247; 018-625-482-431-173; 019-166-656-621-783; 019-831-293-743-518; 020-944-423-224-895; 021-850-998-857-676; 022-530-184-398-582; 024-216-399-693-64X; 024-547-287-369-649; 024-735-069-822-749; 025-166-987-232-333; 025-492-951-217-100; 025-811-569-298-195; 026-810-683-474-561; 027-678-595-672-200; 028-149-820-987-827; 028-863-422-831-18X; 029-830-915-206-759; 030-121-862-351-330; 030-359-893-882-572; 031-542-664-705-080; 031-977-004-268-359; 032-192-641-675-455; 032-512-289-321-120; 033-241-817-699-448; 035-223-520-491-228; 035-381-853-639-810; 035-748-805-312-328; 036-412-863-725-881; 038-668-970-194-854; 039-280-558-160-949; 040-092-459-357-823; 041-327-075-056-562; 042-450-851-467-680; 043-093-846-816-675; 043-386-830-253-686; 043-570-313-872-171; 046-505-599-865-150; 046-527-367-793-765; 047-937-309-229-62X; 047-955-569-661-805; 050-000-944-827-798; 051-165-387-606-715; 052-308-687-231-910; 053-376-195-646-045; 054-432-750-459-549; 055-090-334-937-061; 055-574-774-155-611; 056-689-263-355-386; 056-766-410-127-532; 057-329-251-106-443; 057-339-420-567-97X; 058-409-370-512-563; 058-448-820-778-759; 060-650-561-577-338; 060-688-922-446-557; 061-326-248-978-030; 061-549-181-856-861; 062-026-157-734-278; 063-257-284-816-393; 068-247-722-587-280; 071-079-281-371-668; 071-303-820-692-940; 072-072-328-028-440; 073-524-789-009-542; 074-503-617-334-537; 075-597-189-600-363; 079-111-468-801-62X; 080-018-383-947-573; 080-288-823-874-989; 080-351-281-760-491; 081-437-161-307-223; 081-933-261-712-915; 082-897-694-197-796; 083-257-751-016-80X; 085-214-277-668-01X; 085-343-554-667-033; 085-669-579-012-375; 085-945-868-640-464; 087-690-831-820-163; 087-814-787-159-954; 088-568-925-253-101; 093-378-923-246-489; 093-668-583-258-461; 093-924-528-715-586; 095-219-247-465-217; 095-701-116-223-192; 096-169-714-378-299; 097-070-578-392-34X; 097-567-011-227-46X; 098-037-265-553-060; 102-602-192-826-532; 102-697-093-502-764; 105-427-271-392-801; 108-086-708-688-274; 109-426-377-800-755; 109-598-947-309-943; 111-471-986-310-852; 112-642-164-834-390; 117-211-438-018-858; 117-239-595-156-183; 118-095-530-189-407; 118-151-141-280-905; 120-697-354-224-33X; 121-127-640-488-995; 123-830-244-984-847; 125-082-012-062-802; 125-430-871-426-81X; 126-548-323-218-403; 127-444-480-388-473; 128-450-652-988-596; 129-842-013-619-240; 133-752-203-150-119; 134-927-490-231-285; 135-262-782-091-897; 135-717-892-795-412; 139-495-561-188-858; 142-226-580-142-17X; 142-729-737-144-734; 142-816-347-811-541; 142-870-885-548-418; 142-884-607-464-932; 147-855-964-291-004; 149-010-267-691-537; 150-249-549-372-358; 150-280-000-852-253; 152-771-716-159-330; 153-558-290-301-726; 155-310-759-030-139; 156-571-272-274-491; 156-991-897-001-400; 157-954-859-648-506; 161-171-671-691-645; 162-485-003-594-995; 162-864-397-044-696; 166-298-834-407-97X; 166-842-256-824-283; 169-067-821-124-904; 172-965-192-520-527; 178-883-713-153-793; 183-320-282-603-781; 184-948-841-629-735; 185-786-886-555-378; 190-065-821-748-92X; 191-232-053-606-145; 191-787-431-475-170; 195-393-139-218-445; 196-123-893-303-752; 196-559-417-455-648; 199-745-676-923-766,100,true,,bronze
098-758-324-126-430,Assessment of uniformity of byte distribution in a file based on the wavelet transform as an approach to search encrypted data,2015-05-01,2015,journal article,International Journal of Electronic Security and Digital Forensics,1751911x,,,null MatveevaVesta,"This article is focused on the search of the encrypted data in the file system, which is an important step in digital forensics. Encryption is widely used today, among others by malefactors to conc...",,,,,Data mining; Encryption; Wavelet transform; Distribution (number theory); File system; Computer science; Byte; Digital forensics,,,,,https://dl.acm.org/doi/10.5555/2787057.2787060,https://dl.acm.org/doi/10.5555/2787057.2787060,,,3014751323,,0,,0,false,,
098-789-704-370-365,An Analysis of Zinc-Toxicological Profiling from Forensic Biological Evidence-Urine,2019-04-25,2019,journal article,Journal of Forensic Sciences and Digital Investigation,,Northern California Open Access Publications,,,,,,55,59,Forensic science; Profiling (computer programming); Urine; DNA profiling; Biology; Computational biology; Computer science; Genetics; Biochemistry; DNA; Operating system,,,,,,http://dx.doi.org/10.29199/2637-7136/fsdi-201023,,10.29199/2637-7136/fsdi-201023,,,0,,0,true,cc-by,hybrid
098-818-169-461-619,Secure and reliable electronic record management system using digital forensic technologies,2014-03-08,2014,journal article,The Journal of Supercomputing,09208542; 15730484,Springer Science and Business Media LLC,Netherlands,Sekie Amanuel Majore; Hyunguk Yoo; Taeshik Shon,"Currently, most records are produced and stored digitally using various types of media storage and computer systems. Unlike physical records such as paper-based records, identifying, collecting, and analyzing digital records require technical knowledge and tools that are not found in archival institutions. As a result, archival institutions face challenges in their attempt to collect digital archives. One approach to overcome this problem is for archival institutions to use digital forensic knowledge and technologies. In this paper, we propose the Digital Archive Management System that integrates digital forensic technologies and archival information management systems to acquire, identify, analyze, and manage digital records in archival intuitions.",70,1,149,165,World Wide Web; Management system; Digital Archives; Management information systems; Electronic records; Computer science; Computer forensics; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/tjs/tjs70.html#MajoreYS14 http://dblp.uni-trier.de/db/journals/tjs/tjs70.html#MajoreYS14 https://link.springer.com/article/10.1007/s11227-014-1137-6 https://rd.springer.com/article/10.1007/s11227-014-1137-6 https://doi.org/10.1007/s11227-014-1137-6,http://dx.doi.org/10.1007/s11227-014-1137-6,,10.1007/s11227-014-1137-6,2133826811,,0,033-216-422-514-467; 042-638-724-786-181; 054-928-581-262-030; 058-736-328-857-558; 067-629-806-155-212; 107-745-435-451-959; 113-801-918-269-079; 142-884-607-464-932; 193-402-288-501-243,6,false,,
098-869-712-584-566,A Comparative Study of Analysis and Extraction of Digital Forensic Evidences from exhibits using Disk Forensic Tools,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Kumarshankar Raychaudhuri,,8,3,194,205,Forensic science; Information retrieval; Computer science; Extraction (chemistry); Wireless; Digital forensics,,,,,http://sdiwc.net/digital-library/a-comparative-study-of-analysis-and-extraction-of-digital-forensic-evidences-from-exhibits-using-disk-forensic-tools,http://dx.doi.org/10.17781/p002608,,10.17781/p002608,3039935325,,0,025-832-466-975-926; 052-417-651-826-763; 054-471-285-379-894; 099-582-340-445-44X; 151-798-189-363-682,0,false,,
098-880-940-361-257,The use of Artificial Intelligence in digital forensics: An introduction,2014-01-27,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,F. Mitchell,"Dr Faye Mitchell argues that the use of Artificial Intelligence, which is a well-established area of modern computer science that is capable of dealing with computationally large or complex problems, could be useful for digital forensics. Digital forensics is becoming increasingly important, and often requires the intelligent analysis of large amounts of complex data. Artificial Intelligence could help to bridge the gap.",7,0,35,41,Artificial intelligence; Bridge (interpersonal); Complex problems; Computer science; Digital forensics,,,,,https://pureportal.coventry.ac.uk/en/publications/the-use-of-artificial-intelligence-in-digital-forensics-an-introd https://sas-space.sas.ac.uk/5533/ https://journals.sas.ac.uk/deeslr/article/view/1922/1859 https://core.ac.uk/download/228154935.pdf,http://dx.doi.org/10.14296/deeslr.v7i0.1922,,10.14296/deeslr.v7i0.1922,2026744384,,0,,15,true,cc-by-nc-nd,hybrid
098-901-576-786-493,Forensic Investigation on Whatsapp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2.,2018-10-01,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Bery Actoriano; Riadi,,7,4,410,419,Forensic science; Digital forensic investigation; Computer science; Multimedia; Wireless; Computer forensics,,,,,http://sdiwc.net/digital-library/forensic-investigation-on-whatsapp-web-using-framework-integrated-digital-forensic-investigation-framework-version-2,http://sdiwc.net/digital-library/forensic-investigation-on-whatsapp-web-using-framework-integrated-digital-forensic-investigation-framework-version-2,,,2890864488,,0,004-379-948-536-390; 185-798-265-234-254,3,false,,
099-085-540-086-878,A Novel Android Memory Forensics for Discovering Remnant Data,2020-06-13,2020,journal article,"International Journal on Advanced Science, Engineering and Information Technology",24606952; 20885334,Insight Society,Indonesia,Gandeva Bayu Satrya; Febrian Kurniawan,"As recently updated on the vulnerability statistics shown in 2019, Android-driven smartphones, tablet PCs, and other Android devices are vulnerable, whether from internal or external threats. Most users store sensitive data like emails, photos, cloud storage access, and contact lists on Android smartphones. This information holds a growing-importance for the digital investigation process of mobile devices, e.g., internal memory or random-access memory (RAM) forensics, or external memory or read-only memory (ROM) forensics on Android smartphones. Internal memory retrieval is considered flawed and difficult by some researchers as it alters the digital evidence in an intrusive way. On the other hand, external memory retrieval also called logical acquisition that implies the image of logical storage items (e.g., files, database, directories, etc.) that locate on logical storage. This research provides a novel methodology that focuses only on internal memory forensic in a forensically sound manner. This research also contributes two algorithms, e.g., collect raw information (CRI) for parsing the raw data, and investigate raw information (IRI) for extracting the digital evidence to be more readable. This research conducted with fourteenth events to be analyzed, and each event was captured by SHA-1 as digital evidence. By using GDrive as the case study, the authors concluded that the proposed methodology could be used as guidance by forensics analyst(s), cyberlaw practitioner(s), and expert witness(es) in the court.",10,3,1008,1015,Raw data; Parsing; Mobile device; Information retrieval; Memory forensics; Cloud storage; Digital evidence; Computer science; Android (operating system); Auxiliary memory,,,,,https://dx.doi.org/10.18517/ijaseit.10.3.9363 http://dx.doi.org/10.18517/ijaseit.10.3.9363 http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=9363 https://core.ac.uk/download/pdf/325990748.pdf,http://dx.doi.org/10.18517/ijaseit.10.3.9363,,10.18517/ijaseit.10.3.9363,3039367688,,0,007-429-717-105-19X; 032-742-818-342-992; 046-708-956-042-655; 080-161-175-307-872; 092-015-325-499-970; 092-198-110-549-592; 096-319-685-631-822; 099-208-939-924-674; 111-484-206-251-752; 135-711-521-588-783,3,true,,
099-331-890-581-992,Predictive biometrics: a review and analysis of predicting personal characteristics from biometric data,2017-07-13,2017,journal article,IET Biometrics,20474938; 20474946,Institution of Engineering and Technology (IET),United Kingdom,Michael Fairhurst; Cheng Li; Marjory Da Costa-Abreu,"Interest in the exploitation of soft biometrics information has continued to develop over the last decade or so. In comparison with traditional biometrics, which focuses principally on person identification, the idea of soft biometrics processing is to study the utilisation of more general information regarding a system user, which is not necessarily unique. There are increasing indications that this type of data will have great value in providing complementary information for user authentication. However, the authors have also seen a growing interest in broadening the predictive capabilities of biometric data, encompassing both easily definable characteristics such as subject age and, most recently, `higher level' characteristics such as emotional or mental states. This study will present a selective review of the predictive capabilities, in the widest sense, of biometric data processing, providing an analysis of the key issues still adequately to be addressed if this concept of predictive biometrics is to be fully exploited in the future.",6,6,369,378,Biometrics; Data science; Value (ethics); Soft biometrics; Subject Age; Biometric data; User authentication; Key issues; Computer science; Identification (information),,,,,https://dblp.uni-trier.de/db/journals/iet-bmt/iet-bmt6.html#FairhurstLA17 https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/iet-bmt.2016.0169 http://dblp.uni-trier.de/db/journals/iet-bmt/iet-bmt6.html#FairhurstLA17 https://digital-library.theiet.org/content/journals/10.1049/iet-bmt.2016.0169 https://shura.shu.ac.uk/25394/ https://doi.org/10.1049/iet-bmt.2016.0169 https://core.ac.uk/download/pdf/286269435.pdf,http://dx.doi.org/10.1049/iet-bmt.2016.0169,,10.1049/iet-bmt.2016.0169,2616635204,,0,000-495-030-849-599; 000-746-373-924-806; 001-010-322-376-074; 001-484-119-723-59X; 001-907-971-520-271; 002-344-199-218-623; 003-031-749-286-970; 003-033-121-743-418; 003-548-910-140-356; 003-641-697-102-92X; 004-723-938-044-763; 005-459-810-351-031; 006-427-825-461-815; 006-760-526-041-692; 007-100-823-708-492; 008-188-893-072-907; 009-066-602-059-958; 010-227-657-608-600; 011-151-305-999-693; 012-181-382-721-12X; 012-504-971-764-367; 012-643-619-236-805; 013-677-053-829-426; 013-704-051-644-840; 013-838-705-695-115; 015-961-782-385-854; 016-835-314-422-465; 017-262-487-652-93X; 017-793-641-645-475; 017-847-868-796-228; 018-910-390-388-449; 019-154-145-141-325; 020-036-181-980-941; 020-624-508-002-842; 020-727-368-133-841; 021-527-106-531-575; 021-807-700-515-734; 021-959-493-763-681; 022-839-283-468-895; 023-017-331-962-42X; 023-538-314-994-597; 023-778-640-730-469; 024-088-484-940-63X; 024-216-051-039-399; 024-795-316-240-135; 025-276-801-412-350; 026-633-694-999-772; 027-875-481-123-521; 028-349-074-103-810; 028-478-300-568-343; 028-520-885-658-673; 028-824-054-650-235; 029-645-660-588-825; 029-938-967-057-120; 030-538-317-807-80X; 030-812-652-406-607; 031-532-168-814-617; 032-946-891-794-316; 033-032-929-692-020; 033-332-999-768-03X; 033-356-927-630-951; 034-853-926-249-511; 036-412-249-509-556; 037-721-152-321-35X; 037-904-745-634-88X; 038-384-238-543-06X; 038-571-326-529-755; 038-649-453-181-074; 038-794-896-895-050; 039-315-888-655-968; 040-866-982-104-587; 041-319-285-288-206; 042-895-918-727-988; 043-013-098-062-077; 043-418-208-001-589; 044-462-242-330-823; 045-342-795-433-46X; 046-414-167-925-013; 046-834-350-267-363; 048-859-009-491-04X; 049-137-662-281-055; 049-195-163-313-61X; 051-397-275-696-392; 052-024-428-963-557; 052-824-545-912-826; 053-007-822-713-240; 053-336-565-463-902; 054-646-663-208-462; 054-919-519-112-934; 055-551-279-025-869; 058-141-299-788-182; 058-218-998-404-769; 059-869-375-152-177; 060-410-854-317-756; 060-686-420-539-64X; 061-499-152-919-306; 061-660-550-350-061; 061-689-414-022-556; 062-616-633-569-585; 063-229-014-956-486; 064-390-177-610-751; 066-235-384-977-938; 066-972-121-109-653; 067-486-078-072-834; 068-820-114-654-303; 069-167-407-938-075; 070-737-038-070-916; 071-320-638-709-376; 071-939-440-373-976; 071-951-812-805-824; 073-401-706-589-562; 073-713-371-955-585; 073-869-773-072-946; 075-774-031-084-500; 075-789-850-907-189; 076-181-418-919-632; 077-325-194-576-314; 078-215-336-717-40X; 078-673-954-153-435; 081-595-819-464-385; 082-604-389-470-619; 082-900-937-559-785; 082-915-259-924-748; 084-660-815-932-302; 084-706-226-493-824; 084-868-010-850-409; 086-086-777-079-177; 086-358-870-532-032; 087-309-622-816-840; 089-884-786-817-130; 090-593-669-588-91X; 093-265-742-190-497; 093-592-445-238-763; 096-055-671-298-858; 098-239-621-203-004; 098-405-524-809-689; 099-145-643-633-020; 099-823-087-160-727; 102-741-541-121-785; 102-902-258-065-030; 104-102-177-890-52X; 104-456-304-650-675; 104-579-905-493-951; 105-363-698-214-481; 105-703-978-819-336; 108-507-532-818-241; 108-871-455-511-529; 108-893-833-008-910; 108-935-646-853-556; 108-964-854-965-221; 114-588-926-712-022; 116-694-301-651-76X; 117-220-039-057-555; 117-754-012-070-57X; 118-979-286-489-320; 119-304-465-254-384; 119-357-456-853-122; 121-323-080-592-599; 124-876-877-298-476; 128-612-912-986-474; 131-758-743-712-682; 132-543-217-323-319; 132-772-252-591-844; 136-508-315-164-990; 137-449-122-952-551; 140-700-018-507-12X; 143-403-997-441-264; 144-926-736-997-036; 146-352-624-378-946; 151-328-547-068-354; 154-447-691-752-805; 155-935-171-761-272; 160-118-618-371-117; 160-278-643-092-729; 164-196-946-362-331; 165-916-185-452-680; 168-390-706-505-027; 169-468-497-334-877; 170-421-611-210-235; 172-572-166-912-802; 176-609-378-874-651; 177-671-454-985-606; 179-746-591-701-936; 184-725-242-927-206; 195-866-068-401-88X,10,true,"CC BY, CC BY-ND, CC BY-NC, CC BY-NC-ND",gold
099-377-733-522-116,Part 1: The need for peer review in digital forensics,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Graeme Horsman; Nina Sunde,"Abstract The importance of peer review in the field of digital forensics cannot be underestimated as it often forms the primary, and sometimes only form of quality assurance process an organisation will apply to their practitioners' casework. Whilst there is clear value in the peer review process, it remains an area which is arguably undervalued and under-researched, where little academic and industrial commentary can be found describing best practice approaches. This work forms the first of a two part series discussing why the digital forensics discipline and its organisations should conduct peer review in their laboratories, what it should review as part of this process, and how this should be undertaken. Here in part one, a critical review of the need to peer review is offered along with a discussion of the limitations of existing peer review mechanisms. Finally, the ‘Peer Review Hierarchy’ is offered, outlining the seven levels of peer review available for reviewing practitioner findings.",35,,301062,,Peer review; Sociology; Work (electrical); Best practice; Value (ethics); Hierarchy; Process (engineering); Engineering ethics; Digital forensics,,,,Norwegian Police University College,https://dblp.uni-trier.de/db/journals/di/di35.html#HorsmanS20 https://www.sciencedirect.com/science/article/pii/S2666281720303590 https://research.tees.ac.uk/en/publications/part-1-the-need-for-peer-review-in-digital-forensics https://core.ac.uk/download/362894515.pdf,http://dx.doi.org/10.1016/j.fsidi.2020.301062,,10.1016/j.fsidi.2020.301062,3087768853,,0,003-168-641-529-165; 005-232-046-693-557; 005-392-088-749-603; 005-542-560-321-688; 007-337-082-788-602; 007-582-851-613-954; 012-189-717-454-526; 012-410-670-929-028; 018-607-295-495-260; 019-831-293-743-518; 030-178-593-043-926; 034-021-215-110-765; 035-519-584-610-671; 036-963-912-777-09X; 042-230-817-975-353; 047-386-524-667-691; 047-859-979-695-194; 049-404-833-736-24X; 050-994-414-657-166; 075-950-021-558-098; 080-545-688-531-696; 083-828-164-442-528; 091-872-704-948-238; 093-309-498-241-337; 094-498-765-194-523; 102-599-064-891-853; 103-294-378-905-305; 109-098-876-649-367; 149-467-515-040-638; 167-366-167-352-677; 171-256-463-941-932; 181-545-693-146-583; 197-872-262-830-083,9,true,cc-by-nc-nd,hybrid
099-446-510-492-905,Digital investigations: relevance and confidence in disclosure,2021-09-21,2021,journal article,ERA Forum,16123093; 18639038,Springer Science and Business Media LLC,Germany,Philip Anderson; Dave Sampson; Seanpaul Gilroy,"AbstractThe field of digital forensics has grown exponentially to include a variety of digital devices on which digitally stored information can be processed and used for different types of crimes. As a result, as this growth continues, new challenges for those conducting digital forensic examinations emerge. Digital forensics has become mainstream and grown in importance in situations where digital devices used in the commission of a crime need examining. This article reviews existing literature and highlights the challenges while exploring the lifecycle of a mobile phone examination and how the disclosure and admissibility of digital evidence develops.",22,4,587,599,,,,,,,http://dx.doi.org/10.1007/s12027-021-00687-1,,10.1007/s12027-021-00687-1,,,0,009-284-801-057-774; 050-618-920-212-97X; 088-938-096-763-07X; 094-468-232-325-36X; 167-751-222-897-487,0,true,cc-by,hybrid
099-681-525-938-447,Artificial Intelligence: An Expedition from Archaic to Advanced Technologies,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Tanmayee Tilekar; Avinash Kumar,,,,,,Engineering; Cognitive science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.08,http://dx.doi.org/10.46293/4n6/2020.02.04.08,,10.46293/4n6/2020.02.04.08,3095508078,,0,,0,false,,
099-820-647-132-182,A Detailed Study to Examine Digital Forensics and Cyber Security: Trends and Pattern in India,,2020,journal article,International Journal of Forensic Sciences,25731734,Medwin Publishers,,Zlatko Jakjovski,,5,2,,,Digital forensics; Computer security; Cyber crime; Computer forensics; Internet privacy; Computer science,,,,,,http://dx.doi.org/10.23880/ijfsc-16000184,,10.23880/ijfsc-16000184,,,0,,0,false,,
099-824-336-659-348,Cloud Forensics Investigation in Cloud Storage Using IDFIF V2 Method,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Ahmad Muhammad Ridho; Nuril Anwar,,8,3,232,240,Operating system; Cloud storage; Cloud forensics; Computer science; Wireless,,,,,http://sdiwc.net/digital-library/cloud-forensics-investigation-in-cloud-storage-using-idfif-v2-method,http://dx.doi.org/10.17781/p002621,,10.17781/p002621,3039532573,,0,026-641-935-890-517; 055-086-544-213-027; 060-949-600-123-897,0,false,,
100-154-746-639-394,A Proactive Approach in Network Forensic Investigation Process,2016-05-23,2016,journal article,International Journal of Computer Applications Technology and Research,23198656,Association of Technology and Science,,Joseph MbuguaChahira; Jane KinanuKiruki; Peter KipronoKemei,"Information Assurance and Security (IAS) is a crucial component in the corporate environment to ensure that the secrecy of sensitive data is protected, the integrity of important data is not violated, and the availability of critical systems is guaranteed. The advancement of Information communication and technology into a new era and domain such as mobility and Internet of Things, its ever growing user’s base and sophisticated cyber-attacks forces the organizations to deploy automated and robust defense mechanism to manage resultant digital security incidences in real time. Digital forensic is a scientific process that facilitates detection of illegal activities and in-appropriate behaviors using scientific tools, techniques and investigation frameworks. This research aims at identifying processes that facilitate and improves digital forensic investigation process. Existing digital forensic framework will be reviewed and the analysis will be compiled toderive a network forensic investigation framework that include evidence collection, preservation and analysis at a sensor level and in real time. It is aimed to discover complete relationship with optimal performance among known and unseen/new alerts generated by multiple network sensors in order to improve the quality of alert and recognize attack strategy",5,5,304,311,Scientific instrument; Data science; Secrecy; Quality (business); Digital security; Information assurance; Computer science; Process (engineering); Component (UML); Digital forensics,,,,,http://ijcat.com/archives/volume5/issue5/ijcatr05051012.pdf,http://dx.doi.org/10.7753/ijcatr0505.1012,,10.7753/ijcatr0505.1012,2395405024,,0,004-706-447-836-905; 005-102-962-333-180; 005-515-442-506-880; 010-086-703-646-194; 014-147-422-032-729; 016-661-251-213-668; 020-944-423-224-895; 021-850-998-857-676; 031-604-145-879-389; 032-697-093-668-898; 038-668-970-194-854; 042-744-922-949-227; 047-630-600-014-492; 051-380-288-368-274; 099-306-422-758-350; 109-482-615-363-500; 111-090-978-711-139; 118-859-184-492-143; 133-397-275-695-990; 143-562-788-834-457; 183-000-233-873-221; 187-515-487-119-788; 190-065-821-748-92X; 199-745-676-923-766,0,true,,bronze
100-166-340-709-899,Digital Autopsy: Moving From Fiction to Reality,,2014,journal article,Journal of Indian Academy of Forensic Medicine,09710973,,,Navpreet Kaur; R.K Chaudhary; Pankaj Gupta; Baljeet Singh,"With the technology ruling over each sphere of our modern lives it is no wonder that it is also proving to be a source of great help to the forensic experts who with their work make the dead talk. Technology is fast replacing the manual and mental traditional methods and with the launching of igene and autopsy suites virtual autopsy/digital autopsy/autopsy imaging is indeed moving from fiction to becoming a factual reality. Though forensic radiology has been in use since the discovery of X-rays but the technique which was used to visualize and analyze the mummified remains of people who died thousands of years ago sowed the seed of digital visualization being promoted commercially as digital autopsy. In the setting of Forensic evaluation, 3D surface scanning using multislice CT technology provides excellent visualization of the body and allows re-examination of digital images of the deceased long after the actual time of death.",36,2,195,198,Engineering; Visual arts; Digital autopsy; Wonder; Forensic radiology; Time of death; Multislice ct; Surface scanning; Visualization; Forensic engineering,,,,,http://www.indianjournals.com/ijor.aspx?target=ijor:jiafm&volume=36&issue=2&article=017&type=pdf,http://www.indianjournals.com/ijor.aspx?target=ijor:jiafm&volume=36&issue=2&article=017&type=pdf,,,2245387430,,0,,0,false,,
100-289-225-534-501,Challenges and Requirements of Digital Forensics Investigation in Wireless Ad-hoc Networks,,2012,journal article,International Journal of Advanced Research in Computer Science,09765697,,,Muhammad Sufyian Mohd Azmi; Labeeb Mohsin Abdullah Abdulrahman H. Altalhi; Zailani Mohamed Sidek,"Digital forensics involves the acquisition and investigation of materials that are collected from digital devices involved in digital crimes. Currently, the term ―digital forensics ― is used to cover the investigation of all devices used to store digital data .There are some technologies that have the ability of expanding, and wireless ad-hoc network technology is one of them. Due to the nature of wireless ad-hoc networks, difficulties commonly arise, and as a result, investigating such networks, create large challenges. Thus, the goals of this paper are to understand the concepts of wireless ad-hoc networks and the challenges of collecting live evidence on such networks, to highlight the research requirements, and to propose solutions to some of these challenges. Keywords: Digital forensics, Wireless Ad-hoc networks, Digital crimes, Digital investigation.",3,1,26,30,Digital data; Cover (telecommunications); Computer science; Multimedia; Wireless; Term (time); Digital forensics; Wireless ad hoc network,,,,,https://www.ijarcs.info/index.php/Ijarcs/article/view/980,https://www.ijarcs.info/index.php/Ijarcs/article/view/980,,,2948414786,,0,,0,false,,
100-812-050-439-994,Prelim iii - Contents List,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,34,,301068,301068,Information retrieval; Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30365-6,,10.1016/s2666-2817(20)30365-6,,,0,,0,true,,bronze
100-852-334-797-730,Value and prospects of constructing digital slides data of forensic medicine,2013-01-20,2013,journal article,Chinese Journal of Medical Education Research,20951485,,,Jun Su; Liang Liu; Shaohua Zhu; Hongmei Dong; Man Liang; Qian Liu,"As a rising histological specimen carrier,digital slide has advantages of easy search and fast browse.By digital scanning and stitching of traditional slides and uploading traditional slides as well as pathological information to network servers,the construction of digital slides data can take its own superiority to assist forensic medicine teaching.Combined with our research and teaching experience,this article discussed the application prospects of digital slide technology and digital slides data so as to provide references for the improvement and reformation of forensic medicine education.; ; Key words: ; Medical education; Forensic medicine; Digital slide; Practice",12,01,39,41,Key (cryptography); Value (mathematics); Image stitching; Digital slide; Computer science; Multimedia; Upload; Server,,,,,http://rs.yiigle.com/CN116021201301/216148.htm,http://rs.yiigle.com/CN116021201301/216148.htm,,,3032519862,,0,,0,false,,
101-083-734-725-35X,The complexity of internet of things forensics: A state-of-the-art review,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Pantaleon Lutta; Mohamed Sedky; Mohamed Hassan; Uchitha Jayawickrama; Benhur Bakhtiari Bastaki,,38,,301210,,The Internet; Systematic review; Key (cryptography); Data science; Cybercrime; State of the art review; Computer science; Home automation; Internet of Things; Digital forensics,,,,,http://eprints.staffs.ac.uk/6934/ https://www.sciencedirect.com/science/article/abs/pii/S2666281721001189 https://repository.lboro.ac.uk/articles/journal_contribution/The_complexity_of_internet_of_things_forensics_A_state-of-the-art_review/14884137/1,http://dx.doi.org/10.1016/j.fsidi.2021.301210,,10.1016/j.fsidi.2021.301210,3171151628,,0,000-490-412-762-138; 000-781-175-000-905; 003-029-378-692-335; 004-611-464-291-773; 004-750-320-878-25X; 005-630-640-664-939; 010-196-658-878-056; 014-144-528-890-509; 015-239-387-608-474; 016-526-859-340-786; 018-552-581-098-658; 019-360-393-097-72X; 019-912-316-692-552; 025-484-846-284-184; 026-764-618-898-849; 026-885-005-782-449; 030-433-196-114-204; 034-581-158-056-04X; 035-859-793-614-223; 047-125-525-662-686; 047-782-671-230-742; 051-330-401-796-575; 055-811-656-615-740; 056-161-895-385-676; 058-156-586-882-704; 060-294-953-084-788; 061-461-493-341-860; 065-322-784-190-818; 065-654-832-541-493; 067-746-157-973-903; 074-204-121-502-453; 075-366-793-103-250; 075-623-366-558-183; 084-452-444-628-355; 085-425-338-426-218; 088-553-642-323-93X; 090-774-592-907-144; 092-827-935-965-207; 093-117-308-515-186; 104-098-703-521-179; 111-753-203-548-051; 112-181-239-331-730; 122-568-647-193-751; 125-682-509-275-554; 128-603-018-655-844; 137-153-736-677-264; 145-501-944-463-55X; 167-751-222-897-487; 170-108-067-251-840; 170-516-749-420-456,5,false,,
101-313-419-021-994,Understanding Computer Forensics Requirements in China via the “Panda Burning Incense” Virus Case,,2014,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Kam-Pui Chow; Frank Y. W. Law; Y. H. Mai,"In March 2012, Mainland China has amended its Criminal Procedure Law, which includes the introduction of a new type of evidence, i.e., digital evidence, to the court of law. To better understand the development of computer forensics and digital evidence in Mainland China, this paper discusses the Chinese legal system in relation to digital investigation and how the current legal requirements affect the existing legal and technical usage of digital evidence at legal proceedings. Through studying the famous ""Panda Burning Incense (Worm.WhBoy.cw)"" virus case that happened in 2007, this paper aims to provide a better understanding of how to properly conduct computer forensics examination and present digital evidence at court of law in Mainland China.",9,2,51,58,Mainland China; Political science; China; Law; Digital evidence; Computer security; Criminal procedure; Incense; Computer forensics,,,,,https://core.ac.uk/display/91667418 https://doaj.org/article/d8d352362129465b89a2631dfcac16ab https://commons.erau.edu/jdfsl/vol9/iss2/5/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1170&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl9.html#ChowLM14 https://www.mendeley.com/catalogue/5cc31364-f57d-3fb0-8321-cb4f4a8f7c35/,http://dx.doi.org/10.15394/jdfsl.2014.1170,,10.15394/jdfsl.2014.1170,2130476451,,0,001-139-787-841-711; 021-850-998-857-676; 029-611-752-396-235; 110-079-538-894-548; 140-967-697-100-606; 199-172-967-270-034,0,true,cc-by-nc,gold
101-417-271-073-240,A comparative study on data protection legislations and government standards to implement Digital Forensic Readiness as mandatory requirement,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Sungmi Park; Nikolay Akatyev; Yunsik Jake Jang; Jisoo Hwang; Dong-Hyun Kim; Woonseon Yu; Hyun Woo Shin; Changhee Han; Jonghyun Kim,"Abstract Many data breaches happened due to poor implementation or complete absence of security controls in private companies as well as in government organizations. Many countries work on improvement of security requirements and implementing them in their legislation. However, most of the security frameworks are reactive and do not address relevant threats. The existing research suggests Digital Forensic Readiness as proactive measures, but there is only one example of its implementation as a policy. Our work surveys the current state of data protection legislation in the selected countries and their initiatives for the implementation of Digital Forensic Readiness. Then we discuss if Digital Forensic Readiness as a mandatory requirement can improve data protection state in both public and private sectors, evaluating possible challenges. We contribute suggestions for the adoption of Digital Forensic Readiness as a mandatory requirement for private companies and government organizations.",24,,S93,S100,Private sector; Government; Data breach; Work (electrical); Security controls; Legislation; Public relations; Computer science; Data Protection Act 1998; Digital forensics,,,,KITRI (Korea IT Research Institute),https://dblp.uni-trier.de/db/journals/di/di24.html#ParkAJHKYSHK18 https://www.sciencedirect.com/science/article/pii/S1742287618300446 https://www.sciencedirect.com/science/article/abs/pii/S1742287618300446,http://dx.doi.org/10.1016/j.diin.2018.01.012,,10.1016/j.diin.2018.01.012,2790971054,,0,000-123-040-686-642; 008-751-783-762-210; 019-698-064-288-240; 021-486-901-460-202; 035-565-993-122-262; 054-331-725-373-265; 062-160-327-683-926; 097-675-162-158-578; 130-919-597-852-457; 136-618-607-762-754; 144-924-692-716-271; 183-365-568-336-243,11,true,cc-by-nc-nd,hybrid
101-448-987-380-635,Customized blockchain-based architecture for secure smart home for lightweight IoT,,2021,journal article,Information Processing & Management,03064573; 18735371,Elsevier BV,United Kingdom,Meryem Ammi; Shatha Alarabi; Elhadj Benkhelifa,,58,3,102482,,The Internet; Information system; Interoperability; Cloud storage; Service (systems architecture); Computer security; Computer science; Home automation; Server; Transparency (human–computer interaction),,,,,https://dblp.uni-trier.de/db/journals/ipm/ipm58.html#AmmiAB21 https://www.sciencedirect.com/science/article/abs/pii/S0306457320309717,http://dx.doi.org/10.1016/j.ipm.2020.102482,,10.1016/j.ipm.2020.102482,3125425014,,0,002-602-949-519-361; 004-232-346-311-155; 006-129-714-228-417; 009-225-827-148-391; 009-733-726-448-062; 014-448-058-704-128; 018-541-770-775-407; 021-886-834-162-282; 022-281-420-650-598; 026-037-120-558-475; 039-049-374-311-077; 039-503-976-801-29X; 054-079-583-763-10X; 055-520-745-133-145; 055-694-149-090-820; 058-729-147-158-648; 068-201-598-480-086; 077-864-008-508-362; 081-138-471-843-208; 095-059-171-903-312; 096-091-715-269-337; 118-813-006-449-763; 121-097-801-793-903; 130-057-547-194-322; 131-338-927-190-080; 142-528-666-471-197; 161-688-509-157-403; 170-656-000-611-976,27,false,,
101-549-415-202-81X,Standardization of forming and expressing preliminary evaluative opinions on digital evidence,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Eoghan Casey,,32,,200888,,Standardization; Data science; Standardized approach; Interim; International community; Digital evidence; Computer science; Reliability (statistics); Interpretation (philosophy); Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287619303147 https://doi.org/10.1016/j.fsidi.2019.200888,http://dx.doi.org/10.1016/j.fsidi.2019.200888,,10.1016/j.fsidi.2019.200888,3003603895,,0,009-512-003-529-193; 010-963-610-208-920; 014-966-931-773-938; 015-238-949-406-002; 018-182-926-340-45X; 021-798-083-032-603; 028-472-372-312-622; 040-376-945-320-975; 041-724-921-575-089; 048-250-488-210-056; 050-296-813-523-597; 058-717-000-287-105; 061-269-967-405-492; 064-549-392-650-90X; 066-351-117-066-660; 085-315-744-117-237; 085-370-444-410-812; 087-342-951-350-054; 106-010-372-725-049; 117-555-147-368-574; 123-006-126-477-128; 131-696-619-498-120; 141-366-693-391-357; 148-223-435-969-407; 173-145-269-859-717,15,false,,
101-711-086-084-623,Application of quality in use model to assess the user experience of open source digital forensics tools,,2020,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Manar Abu Talib; Reem Alnanih; Adel Khelifi,,12,1,43,43,Computer science; Open source; Digital forensics; Quality (philosophy); Digital evidence; Data science; Computer forensics; World Wide Web,,,,,,http://dx.doi.org/10.1504/ijesdf.2020.103870,,10.1504/ijesdf.2020.103870,,,0,,0,true,,bronze
101-819-655-568-965,Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web,2017-06-30,2017,journal article,Jurnal Ilmiah Teknik Elektro Komputer dan Informatika,23383062; 23383070,"Universitas Ahmad Dahlan, Kampus 3",,Nuril Anwar; Riadi,"Perkembangan telekomunikasi meningkat sangat pesat semenjak layanan pesan instan berbasis internet merambat cepat ke Indonesia. WhatsApp adalah aplikasi pesan instan paling populer dibanding layanan pesan instan lain, menurut situs website statista pengguna per Januari 2017 sebanyak 1,2 miliar orang secara aktif menggunakan aplikasi ini. Seiring pembaruan WhatsApp berbagai fitur disematkan dalam aplikasi ini diantaranya Whatsapp Berbasis Web untuk Komputer, fitur ini mempermudah pengguna dalam berbagi file tertentu serta dapat tersinkronisasi terhadap smartphone maupun komputer penggunanya. Disamping sisi positif yang didapati aplikasi, WhatsApp juga memberikan celah keamanan akan privasi penggunanya salah satunya yaitu penyadapan percakapan yang melibatkan kedua devices ; smartphone dan komputer. Penanganan tindak kejahatan yang melibatkan piranti digital perlu ditekankan sehingga dapat membantu proses peradilan akan efek yang ditimbulkannya. Investigasi Forensika Digital turut berperan serta terhadap penindakan penyalahgunaan fitur layanan pesan instan WhatsApp diantaranya langkah investigasi penanganan kasus penyadapan percakapan WhatsApp melalui serangkaian tahapan baku sesuai prosedur forensika digital. Eksplorasi barang bukti (digital evidence) percakapan WhatsApp akan menjadi acuan akan tindak kejahatan penyadapan telekomunikasi yang selanjutnya akan dilakukan report investigation forensics yang melibatkan barang bukti smartphone dan komputer korban.",3,1,1,10,,,,,,http://dx.doi.org/10.26555/jiteki.v3i1.6643 http://journal.uad.ac.id/index.php/JITEKI/article/download/6643/3530 https://dx.doi.org/10.26555/jiteki.v3i1.6643 http://journal.uad.ac.id/index.php/JITEKI/article/view/6643/3530 https://core.ac.uk/download/pdf/295348216.pdf,http://dx.doi.org/10.26555/jiteki.v3i1.6643,,10.26555/jiteki.v3i1.6643,2748440010,,0,,7,true,cc-by-sa,gold
101-875-322-318-577,Mobile Digital Forensic Procedure for Crime Investigation in Social Network Service,2013-06-30,2013,journal article,The Journal of Korea Navigation Institute,12269026,The Korea Navigation Institute,,Yu Jong Jang; Jin Kwak,"Social network services(SNS) has been used as a means of communication for user or express themselves user. Therefore, SNS has a variety of information. This information is useful to help the investigation can be used as evidence. In this paper, A study of mobile digital forensic procedure for crime investigation in social network service. Analysis of database file taken from the smartphone at social network service application for mobile digital forensic procedure. Therefore, we propose a procedure for the efficient investigation of social network service mobile digital forensic.",17,3,325,331,Engineering; Variety (cybernetics); World Wide Web; Crime investigation; Social network service; Database file; Digital forensics; Social network,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=HHHHBI_2013_v17n3_325,http://dx.doi.org/10.12673/jkoni.2013.17.3.325,,10.12673/jkoni.2013.17.3.325,2041159558,,0,105-128-303-857-483; 159-397-815-304-211; 199-745-676-923-766,4,false,,
101-894-461-425-579,A New Digital Evidence Retrieval Model for Gambling Machine Forensic Investigation,2012-01-20,2012,journal article,Jurnal Teknologi,21803722; 01279696,Penerbit UTM Press,Malaysia,Pritheega Magalingam; Azizah Abdul Manaf; Zuraimi Yahya; Rabiah Ahmad,"Analisis forensik perkakasan melibatkan proses menganalisa data yang di perolehi secara elektronik untuk menunjukkan bukti sama ada peralatan elektronik adalah digunakan untuk melakukan jenayah, mengandungi bukti jenayah atau ia adalah satu sasaran jenayah. Penyalahgunaan mesin permainan merupakan sumber utama permainan haram dijalankan. Kerja penyelidikan ini memperkenalkan kaedah mendapatkan maklumat dari satu mesin permainan yang telah dirampas oleh PDRM dan menganalisis data yang diterjemahkan untuk membuktikan bahawa mesin permainan tersebut digunakan secara haram. Prosedur mendapatkan bukti digital ini dibina untuk membantu pihak polis atau penyiasat dalam penganalisaan maklumat digital dan ia boleh dijadikan sebagai satu garis panduan untuk mengenalpasti bukti yang relevan untuk menunjukan aktiviti perjudian haram dijalankan.; Kata kunci: Forensik digital, analisis forensik, mesin judi, kaedah pengambilan informasi, penterjemahan, pencarian kata; Hardware forensic analysis involves the process of analyzing digital evidence derived from digital sources. The analysis is done to facilitate and prove either the device is used to commit crime, whether it contains evidence of a crime or is the target of a crime. Gambling machines serve as the main source by which illegal games are conducted. This paper presents a method for retrieving information from a seized gaming machine, along with an analysis of the interpreted information to prove that the gaming machine was used illegally. The proposed procedures for the gambling machine forensic process will be important for forensic investigators (e.g., the police or private investigators), as they will assist these individuals in the digital forensic evidence analysis necessary to produce evidence relevant to illegal gambling.; Key words: digital forensic, forensic analysis, gambling machine, information retrieval method, interpretation, string search",54,1,55,69,Forensic science; Psychology; Information retrieval; Digital evidence; Computer security; Digital forensics,,,,,http://jurnalteknologi.utm.my/index.php/jurnalteknologi/article/view/91 https://www.researchgate.net/profile/Pritheega_Magalingam/publication/269758697_A_New_Digital_Evidence_Retrieval_Model_For_Gambling_Machine_Forensic_Investigation/links/557a3f2108ae75363756ffdf.pdf https://core.ac.uk/display/42912128 https://journals.utm.my/jurnalteknologi/article/view/91 http://www.ijofcs.org/V04N1-PP05%20-%20A%20New%20Digital%20Evidence%20Retrieval%20Model%20for%20Gambling%20Machine.pdf http://eprints.utm.my/id/eprint/44692/,http://dx.doi.org/10.11113/jt.v54.91,,10.11113/jt.v54.91,2039523489,,0,026-810-683-474-561; 074-933-143-629-826; 087-705-894-476-40X; 105-427-271-392-801; 107-096-001-312-874; 126-338-081-626-731,0,false,,
102-117-623-922-990,ISSE - Digital Forensics as a Big Data Challenge,,2013,journal article,ISSE 2013 Securing Electronic Business Processes,,Springer Fachmedien Wiesbaden,,Alessandro Guarino,"Digital Forensics, as a science and part of the forensic sciences, is facing new challenges that may well render established models and practices obsolete. The dimensions of potential digital evidence supports has grown exponentially, be it hard disks in desktop and laptops or solid state memories in mobile devices like smartphones and tablets, even while latency times lag behind. Cloud services are now sources of potential evidence in a vast range of investigations and network traffic also follows a growing trend and in cyber security the necessity of sifting through vast amount of data quickly is now paramount. On a higher level investigations - and intelligence analysis - can profit from sophisticated analysis of such datasets as social network structures, corpora of text to be analysed for authorship and attribution. All of the above highlights the convergence between so-called data science and digital forensics, to tack the fundamental challenge of analyse vast amount of data (""big data"") in actionable time while at the same time preserving forensic principles in order for the results to be presented in a court of law. The paper, after introducing digital forensics and data science, explores the challenges above and proceed to propose how techniques and algorithms used in big data analysis can be adapted to the unique context of digital forensics, ranging from the managing of evidence via Map-Reduce to machine learning techniques for triage and analysis of big forensic disk images and network traffic dumps. In the conclusion the paper proposes a model to integrate this new paradigm into established forensic standards and best practices and tries to foresee future trends.",,,197,203,Solid-state; Internet privacy; Best practice; Mobile device; Data science; Digital evidence; Computer science; Intelligence analysis; Big data; Cloud computing; Digital forensics,,,,,https://doi.org/10.1007/978-3-658-03371-2_17 https://rd.springer.com/chapter/10.1007/978-3-658-03371-2_17 http://www.studioag.pro/wp-content/uploads/2013/10/DigitalForensicsBigData.pdf https://link.springer.com/chapter/10.1007/978-3-658-03371-2_17 https://dblp.uni-trier.de/db/conf/isse/isse2013.html#Guarino13,http://dx.doi.org/10.1007/978-3-658-03371-2_17,,10.1007/978-3-658-03371-2_17,138782056,,0,001-741-032-719-461; 087-690-831-820-163,54,false,,
102-169-873-723-040,Reconstructing streamed video content: A case study on YouTube and Facebook Live stream content in the Chrome web browser cache,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Graeme Horsman,"Abstract With the increased popularity of online video streaming comes the risk of this technology's subsequent abuse. With a number of cases noted in 2017 where individuals have engaged with illegal or policy breaching video content, digital forensics practitioners are often tasked with investigating the subsequent ‘fingerprint’ of such acts. This is often to determine both the content of a stream in question, and, how it has been interacted with, typically from an analysis of data residing on a suspect's local device. This article provides an examination of the forensic procedures required to identify and reconstruct cached video stream data using both YouTube and Facebook Live as example case studies. Stream reconstruction methodologies are offered where results show that where a YouTube and Facebook Live video have been played, buffered video stream data can be reassembled to produce a viewable video clip of content.",26,,S30,S37,Cache; World Wide Web; Suspect; Content (Freudian dream analysis); Popularity; Stream data; Web browser; Live video; Computer science; Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287618301932 https://dblp.uni-trier.de/db/journals/di/di26.html#Horsman18a https://research.tees.ac.uk/en/publications/reconstructing-streamed-video-content-a-case-study-on-youtube-and https://doi.org/10.1016/j.diin.2018.04.017 https://research.tees.ac.uk/ws/files/6554397/621817.pdf https://www.sciencedirect.com/science/article/pii/S1742287618301932 https://core.ac.uk/download/322331504.pdf,http://dx.doi.org/10.1016/j.diin.2018.04.017,,10.1016/j.diin.2018.04.017,2795378978,,0,,16,true,cc-by-nc-nd,hybrid
102-243-142-344-71X,Formalising investigative decision making in digital forensics: Proposing the Digital Evidence Reporting and Decision Support (DERDS) framework,,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Graeme Horsman,"Abstract In the field of digital forensics it is crucial for any practitioner to possess the ability to make reliable investigative decisions which result in the reporting of credible evidence. This competency should be considered a core attribute of a practitioner’s skill set and it is often taken for granted that all practitioners possess this ability; in reality this is not the case. A lack of dedicated research and formalisation of investigative decision making models to support digital forensics practitioner’s is an issue given the complexity of many digital investigations. Often, the ability to make forensically sound decisions regarding the reliability of any findings is arguably an assumed trait of the practitioner, rather than a formally taught competency. As a result, the digital forensic discipline is facing increasing recent scrutiny with regards to the quality and validity of evidence it’s practitioners are producing. This work offers the Digital Evidence Reporting and Decision Support (DERDS) framework, designed to help the practitioner assess the reliability of their ‘inferences, assumptions of conclusions’ in relation to any potentially evidential findings. The structure and application of the DERDS framework is discussed, demonstrating the stages of decision making a practitioner must undergo when evaluating the accuracy of their findings, whilst also recognising when content may be deemed unsafe to report.",28,,146,151,Decision support system; Set (psychology); Relation (database); Scrutiny; Quality (business); Digital evidence; Decision-making models; Computer science; Knowledge management; Digital forensics,,,,,https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902227595710700 https://research.tees.ac.uk/en/publications/formalising-investigative-decision-making-in-digital-forensics-pr https://dblp.uni-trier.de/db/journals/di/di28.html#Horsman19 https://www.sciencedirect.com/science/article/pii/S1742287618302731,http://dx.doi.org/10.1016/j.diin.2019.01.007,,10.1016/j.diin.2019.01.007,2911386828,,0,000-659-280-122-390; 004-200-813-216-207; 008-598-808-594-324; 012-410-670-929-028; 026-774-296-742-022; 034-773-286-616-44X; 042-230-817-975-353; 050-513-243-638-138; 061-269-967-405-492; 064-549-392-650-90X; 066-235-037-082-291; 075-529-701-912-32X; 078-730-781-174-18X; 080-196-042-005-758; 111-488-239-742-003; 120-454-127-510-479; 137-755-137-054-864; 142-790-196-752-819; 182-670-398-460-931,24,true,cc-by-nc-nd,green
102-385-975-365-674,Forensic analysis of a Sony PlayStation 4,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Matthew Davies; Huw Read; Konstantinos Xynos; Iain Sutherland,"The primary function of a games console is that of an entertainment system. However the latest iteration of these consoles has added a number of new interactive features that may prove of value to the digital investigator. This paper highlights the value of these consoles, in particular Sony's latest version of their PlayStation. This console provides a number of features including web browsing, downloading of material and chat functionality; all communication features that will be of interest to forensic investigators. In this paper we undertake an initial investigation of the PlayStation 4 games console. This paper identifies potential information sources of forensic value with the PlayStation 4 and provides a method for acquiring information in a forensically sound manner. In particular issues with the online and offline investigative process are also identified.",12,,S81,S89,World Wide Web; Online and offline; Computer science; Process (engineering); Video game packaging; Multimedia; Entertainment; Web navigation; Upload; Function (engineering),,,,,https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1939&context=ecuworkspost2013 https://core.ac.uk/display/82136117 https://www.sciencedirect.com/science/article/pii/S1742287615000146 https://www.sciencedirect.com/science/article/abs/pii/S1742287615000146 https://www.mendeley.com/catalogue/09696697-6a81-3f40-ae11-bde85b2dac7f/ https://dl.acm.org/doi/10.1016/j.diin.2015.01.013 https://doi.org/10.1016/j.diin.2015.01.013 https://dblp.uni-trier.de/db/journals/di/di12.html#DaviesRXS15 https://ro.ecu.edu.au/ecuworkspost2013/938/ https://core.ac.uk/download/pdf/82136117.pdf,http://dx.doi.org/10.1016/j.diin.2015.01.013,,10.1016/j.diin.2015.01.013,2090057777,,0,027-835-655-333-208; 045-793-574-611-616; 052-783-938-076-074; 081-216-246-651-622; 087-705-894-476-40X; 109-496-095-188-012; 160-818-318-297-75X,11,true,cc-by-nc-nd,hybrid
102-410-389-190-13X,Prelim iii - Contents List,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,32,,300967,300967,Information retrieval; Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30145-1,,10.1016/s2666-2817(20)30145-1,,,0,,0,false,,
102-562-783-311-06X,A Comprehensive Collection and Analysis Model for the Drone Forensics Field.,2022-08-29,2022,journal article,"Sensors (Basel, Switzerland)",14248220; 14243210,Multidisciplinary Digital Publishing Institute (MDPI),Switzerland,Fahad Mazaed Alotaibi; Arafat Al-Dhaqm; Yasser D Al-Otaibi; Abdulrahman A Alsewari,"Unmanned aerial vehicles (UAVs) are adaptable and rapid mobile boards that can be applied to several purposes, especially in smart cities. These involve traffic observation, environmental monitoring, and public safety. The need to realize effective drone forensic processes has mainly been reinforced by drone-based evidence. Drone-based evidence collection and preservation entails accumulating and collecting digital evidence from the drone of the victim for subsequent analysis and presentation. Digital evidence must, however, be collected and analyzed in a forensically sound manner using the appropriate collection and analysis methodologies and tools to preserve the integrity of the evidence. For this purpose, various collection and analysis models have been proposed for drone forensics based on the existing literature; several models are inclined towards specific scenarios and drone systems. As a result, the literature lacks a suitable and standardized drone-based collection and analysis model devoid of commonalities, which can solve future problems that may arise in the drone forensics field. Therefore, this paper has three contributions: (a) studies the machine learning existing in the literature in the context of handling drone data to discover criminal actions, (b) highlights the existing forensic models proposed for drone forensics, and (c) proposes a novel comprehensive collection and analysis forensic model (CCAFM) applicable to the drone forensics field using the design science research approach. The proposed CCAFM consists of three main processes: (1) acquisition and preservation, (2) reconstruction and analysis, and (3) post-investigation process. CCAFM contextually leverages the initially proposed models herein incorporated in this study. CCAFM allows digital forensic investigators to collect, protect, rebuild, and examine volatile and nonvolatile items from the suspected drone based on scientific forensic techniques. Therefore, it enables sharing of knowledge on drone forensic investigation among practitioners working in the forensics domain.",22,17,6486,6486,Drone; Context (archaeology); Digital forensics; Field (mathematics); Computer science; Network forensics; Process (computing); Crime scene; Computer security; Data science; Data collection; Geography; Statistics; Genetics; Mathematics; Pure mathematics; Biology; Operating system; Archaeology,UAV; design science research; drone forensics; smart cities,Forensic Medicine; Unmanned Aerial Devices,,King Abdulaziz University (IFPRC-062-611-2020),,http://dx.doi.org/10.3390/s22176486,36080945,10.3390/s22176486,,PMC9460793,0,003-098-343-640-278; 003-905-226-015-068; 004-829-487-366-119; 008-667-688-301-190; 010-084-169-561-57X; 010-206-941-178-65X; 010-992-143-070-67X; 013-086-940-357-037; 013-467-951-735-805; 013-718-596-619-888; 017-000-288-040-682; 017-401-436-617-234; 018-648-349-943-059; 020-810-000-409-691; 024-725-750-359-063; 029-239-733-639-707; 035-361-375-885-946; 038-444-083-130-202; 042-354-079-994-804; 042-467-831-044-091; 045-273-252-346-857; 047-976-152-994-121; 048-014-163-114-221; 049-482-656-997-863; 051-970-323-275-12X; 053-991-905-768-763; 056-748-337-856-317; 058-258-776-859-131; 059-025-029-154-030; 063-660-644-964-526; 063-920-550-419-453; 064-421-137-320-740; 070-697-536-773-450; 072-085-485-974-257; 072-183-867-595-593; 082-349-614-760-490; 082-411-807-694-99X; 087-277-393-686-275; 088-125-215-873-987; 089-691-112-427-434; 090-055-896-921-710; 091-777-010-917-052; 094-653-770-630-278; 101-999-935-205-318; 102-058-634-554-487; 105-606-711-193-894; 106-493-355-516-535; 106-498-187-784-620; 110-126-104-344-257; 110-286-232-290-188; 113-763-888-485-306; 114-264-712-796-928; 118-967-097-205-079; 119-090-938-429-332; 122-505-249-443-681; 123-270-078-215-31X; 123-623-736-184-422; 140-930-491-847-027; 145-157-030-537-719; 154-999-855-381-883; 158-752-499-155-521; 159-105-758-152-663; 162-557-179-336-48X; 169-354-069-570-392; 176-972-878-781-87X; 182-533-951-303-229; 184-428-240-098-87X; 193-314-328-330-910; 197-747-601-577-121,0,true,cc-by,gold
102-664-242-084-236,Forensic analysis of BiP Messenger on android smartphones,2019-05-06,2019,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Erhan Akbal; Ibrahim Baloglu; Turker Tuncer; Sengul Dogan,"Nowadays, social media applications and communication tools are utilized as communication platforms and the vast majority of communication is performed using these tools. The instant messaging appl...",52,5,590,609,Instant messaging; Computer science; Multimedia; Social media; Android (operating system); Mobile device forensics; Digital forensics,,,,,https://www.tandfonline.com/doi/full/10.1080/00450618.2019.1610064,http://dx.doi.org/10.1080/00450618.2019.1610064,,10.1080/00450618.2019.1610064,2944445773,,0,004-379-948-536-390; 017-815-064-018-299; 029-159-400-662-132; 029-819-338-371-65X; 036-213-488-430-19X; 038-208-479-675-255; 049-131-797-799-081; 053-516-207-442-042; 058-248-784-098-150; 077-859-446-810-741; 085-214-277-668-01X; 088-938-096-763-07X; 098-880-940-361-257; 113-193-064-453-131; 119-637-551-813-328; 123-393-129-372-391; 152-061-431-586-535; 155-758-692-373-705; 166-183-210-534-575,7,false,,
102-814-076-156-265,Establishing the Validity of Md5 and Sha-1 Hashing in Digital Forensic Practice in Light of Recent Research Demonstrating Cryptographic Weaknesses in these Algorithms,2013-04-18,2013,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Veronica Schmitt; Jason Jordaan,"and SHA-1 cryptographic hash algorithms are a standard practice in digital forensics that is used in the preservation of digital evidence and ensuring the integrity of the digital evidence. Recent studies have shown that both MD5 and SHA-1 have vulnerabilities and collisions. Based on this, the use of MD5 and SHA-1 hash algorithms in the practice of digital forensics to preserve and ensure the integrity of digital evidence has been questioned in certain instances. Using experimentation, the researcher proves the validity of using either MD5 or SHA-1 hashing algorithms to ensure the integrity of seized digital evidence, from the moment of seizure of the evidence, through to eventual presentation and use of the evidence in court; thus demonstrating that the use of hashing remains a valid forensic methodology to ensure the integrity of digital evidence. Keywordsforensics, integrity of digital evidence, hash collisions,",68,23,40,43,Algorithm; Forensic science; MD5; Cryptography; Digital evidence; Computer security; Computer science; Cryptographic hash function; SHA-1; Digital forensics; Hash function,,,,,http://www.lex-informatica.org/2%20Ensuring%20the%20Legality%20of%20the%20Digital%20Forensics%20Process%20in%20South%20Africa.pdf https://www.ijcaonline.org/archives/volume68/number23/11723-7433 https://research.ijcaonline.org/volume68/number23/pxc3887433.pdf https://www.ijcaonline.org/archives/volume68/number23/11723-7433?format=pdf,http://dx.doi.org/10.5120/11723-7433,,10.5120/11723-7433,2106303773,,0,017-167-454-912-226; 033-361-255-406-653; 085-214-277-668-01X; 095-080-443-019-181; 124-466-422-768-986; 142-108-488-120-966; 154-255-264-599-600; 159-970-925-091-033,9,true,,bronze
103-294-378-905-305,Part 1:- quality assurance mechanisms for digital forensic investigations: Introducing the Verification of Digital Evidence (VODE) framework,,2020,journal article,Forensic Science International: Reports,26659107,Elsevier BV,,Horsman Graeme,"Abstract Quality assurance measures in the field of digital forensics play a vital role for upholding and developing investigatory standards. Coupled with the fast pace of technology, practitioners in this discipline are often faced with the challenge of interpreting previously unseen or undocmented forms of potentially evidential digital data, content which may be crucial to a current case under investigation. Mechanisms to support this interpretative process offer support for the practitioner, helping to guide them through this task and the steps involved in ensuring any reported information is accurate. This work presents the Verification of Digital Evidence (VODE) framework, designed to support digital forensic practitioners when testing and verifying their interpretation of digital data. The stages of VODE are discussed and its application placed in context.",2,,100038,,Quality assurance; Data science; Pace; Digital data; Context (language use); Task (project management); Digital evidence; Computer science; Process (engineering); Digital forensics,,,,,https://www.sciencedirect.com/science/article/pii/S2665910719300386 https://research.tees.ac.uk/en/publications/part-1-quality-assurance-mechanisms-for-digital-forensic-investig https://core.ac.uk/download/pdf/232941017.pdf,http://dx.doi.org/10.1016/j.fsir.2019.100038,,10.1016/j.fsir.2019.100038,2981002495,,0,006-933-430-647-14X; 010-963-610-208-920; 017-792-811-186-108; 018-552-581-098-658; 026-810-683-474-561; 028-413-064-651-69X; 030-178-593-043-926; 038-803-786-854-954; 039-999-270-718-277; 047-386-524-667-691; 061-269-967-405-492; 063-579-080-753-513; 064-549-392-650-90X; 066-840-680-591-488; 078-730-781-174-18X; 089-048-294-489-077; 095-691-114-276-825; 102-243-142-344-71X; 105-904-512-640-36X; 111-488-239-742-003; 137-755-137-054-864; 142-790-196-752-819; 184-948-841-629-735,2,true,"CC BY, CC BY-NC-ND",gold
103-309-873-918-823,Bureau of Justice Assistance Student Computer and Digital Forensics Educational Opportunities Program,2022-03-02,2022,journal article,International Conference on Cyber Warfare and Security,20489889; 20489870,Academic Conferences International Ltd,,Kyung-Shick Choi; Lou Chitkushev; Kyung-Seok Choo; Claire Lee,"The current capabilities of many law enforcement agencies are tightly constrained despite the heightened level of awareness and concern for the role recent technology has in facilitating cybercrime and instances of online victimization. More specialized computer forensics and digital evidence training programs are necessary to meet the needs of local and state law enforcement agencies. Based on the context, this paper discusses an interdisciplinary approach to addressing this dilemma while providing in-depth computer forensics and cybercrime investigation training that is both informative andpragmatic to future law enforcement officers. Using pre- and post-test results, this study assesses students’ technical background levels, reflecting comprehensive course learning objectives and pre-training levels of applied digital forensic investigation knowledge. Results suggest that students’ technical abilities and knowledge of different investigative tools significantly improved after the program. In particular, the program not only strengthened students’ knowledge of digital forensic investigation, but also helped students achieve higher t-test scores. We expect our study results to provide recommendations for cyber programs in other higher education institutions. The findings will serve as a guide for enhancing the current capacities of other higher education institutions to better serve their students in areas of computer forensics and digital evidence. In the long term, these efforts will lead to more effective cybercrime investigation and successful prosecutions, ultimately reducing cybercrime victimization.",17,1,36,44,Cybercrime; Digital forensics; Law enforcement; Digital evidence; Computer forensics; Context (archaeology); Dilemma; Test (biology); Economic Justice; Computer science; Computer security; Internet privacy; Public relations; Medical education,,,,,,http://dx.doi.org/10.34190/iccws.17.1.30,,10.34190/iccws.17.1.30,,,0,,0,true,cc-by-nc-nd,hybrid
104-464-081-213-100,Cyber Forensic Challenges: Escaping Holes for Cyber Attackers Series 01: Extracting Forensic Evidences from Non- Functional Computer Devices,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Amrit Chhetri,"According to Forensic Terminology, Cyber Forensic Challenge is a state, a competitive situation, unavailability of reliable evidences and bottleneck constraint in Computer Forensic Investigation and its Procedures. A Forensic Challenge can either be Technical, Admistrative or Legislative/Legal and Anti-Forensic is an example of Technical Challenge, it adds complexity in acquiring and accessing an evidence or sets of evidences during Forensic Investigation. In real-world scenarios, it hurdles Forensic Examiners from acquiring an image of evidences to continue with Forensic Examinations and makes the Attackers or Adversaries ""Scape Goats"" during Criminal Prosecution or in a Corporate Forensic Investigation, as where it arises. In Public Computer Forensic domains, one of the Challenges is unavailability of Public Repositories of MACs, Bluetooth, IMEI and NFC Addresses -of Mobile Phones, WiFi Routers, Printers, Biometric Scanners and other IOT Devices(such as Amazon Alexa, Smart Watch and FitBit). Globally, not adequate, but there are reasonable numbers of such Repositories to overcome the challenges in the concerned fields and countable numbers of systems dedicated to such collections and innovative ones to name are CEIR(Central Equipment Identity Repository) for IMEI Databases(India), WIGLE for WiFi SSID(Global) but there is still shortfalls of ethical Repositories of Bluetooth Addresses (Private and Public) and Identifiers associated with NFC and RFID !",,,50,52,Series (mathematics); Non functional; Computer security; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.09,http://dx.doi.org/10.46293/4n6/2020.02.02.09,,10.46293/4n6/2020.02.02.09,3022354455,,0,,0,false,,
104-787-005-142-28X,ARTIFICIAL INTELLIGENCE BASED DIGITAL FORENSICS FRAMEWORK,2017-10-20,2017,journal article,International Journal of Advanced Research in Computer Science,09765697,IJARCS International Journal of Advanced Research in Computer Science,,Parag H. Rughani,"With increase in number of Internet and smartphone users, cyber crimes are equally increased. Current resources including man power are not sufficient to investigate and solve cyber crimes with the pace they are committed. Present tools and technology require human interaction at large scale, which slows down the process. There is acute need to optimize speed and performance of Digital Forensic Tools to keep pace with the reported cyber crimes. An Artificial Intelligence Based Digital Forensics Framework is proposed in this paper to overcome above issues. The framework proposed in this paper require minimum user interaction and does majority of routine operations by intelligence acquired from training. Outcome of the work is mentioned in the form of proposed framework to optimize digital forensics process.",8,8,10,14,The Internet; Artificial architecture; Artificial intelligence; Pace; Scale (chemistry); Human interaction; Cyber crime; Computer science; Process (engineering); Digital forensics,,,,,http://www.ijarcs.info/index.php/Ijarcs/article/download/4571/4116 http://ijarcs.info/index.php/Ijarcs/article/view/4571,http://dx.doi.org/10.26483/ijarcs.v8i8.4571,,10.26483/ijarcs.v8i8.4571,2765088361,,0,016-661-251-213-668; 038-668-970-194-854; 095-691-114-276-825; 119-234-785-721-155; 134-927-490-231-285,12,true,cc-by,hybrid
105-095-237-899-969,Pertimbangan Hakim Atas Penghadiran Bukti Digital Forensik dalam Perkara Kejahatan Fraud,2021-10-15,2021,journal article,Wajah Hukum,2598604x,Universitas Batanghari Jambi,,Wahdah Prasetya; Puti Priyana,"The problems in this research are regulate digital forensic law in proving crime in Indonesia, judges consider the presence of digital forensic evidence in fraud crime. This research uses normative juridical approach, by examining and interpreting matters relating theoretical principles, conceptions, doctrines and legal norms relating to the presence of forensic digital evidence. The result showed that digital Forensic Arrangements in analyzing digital evidence in terms of proving criminal acts are not specifically regulated in the Criminal Procedure Code (KUHAP) because exceptions to electronic / digital evidence are regulated in the Information and Electronic Transaction (ITE) Act so that can be a legal basis for digital forensics. Law No. 11 of 2008 on Information and Electronic Transactions on Article 5 has been clearly stated that electronic information is a valid legal evidence in the form of electronic information and / or electronic documents and / or printout. The rise of data fraud requires a legal arrangement that is expected to be able to prevent and reduce these crimes. For this reason, it is important to elaborate legal arrangements for both implementation and criminal sanctions related to data fraud in Indonesia.",5,2,448,459,Law; Sanctions; Digital evidence; Legal evidence; Electronic information; Electronic transaction; Normative; Criminal procedure; Medicine; Digital forensics,,,,,http://wajahhukum.unbari.ac.id/index.php/wjhkm/article/view/472 https://wajahhukum.unbari.ac.id/index.php/wjhkm/article/download/472/172,http://dx.doi.org/10.33087/wjh.v5i2.472,,10.33087/wjh.v5i2.472,3210705332,,0,,0,true,cc-by-sa,gold
105-101-095-930-34X,Digital Forensics,2020-12-30,2020,journal article,Advanced Computing and Communications,,Advanced Computing and Communications Society - ACCS,,Sanjay Sahay,"Digital forensics is the science of recovery and investigation of material found on digital devices. It started in correlation to computer / cybercrimes. In reality, digital forensics use is not limited to criminal investigation in the strict sense of the term, it can proactively encompass the investigative element of every facet of our digital life. The very nature of technology by way of strict and infallible documentation allows for its all pervasiveness. It has the potential to provide an intelligence of the functional type, which generally seems to be missing besides adding a new dimension to criminal investigation.",,,,,Digital forensics; Computer forensics; Digital evidence; Computer science; Documentation; Facet (psychology); Dimension (graph theory); Computer security; Crime scene; Criminal investigation; Term (time); Data science; World Wide Web,,,,,,http://dx.doi.org/10.34048/2020.4.f2,,10.34048/2020.4.f2,,,0,,0,true,,bronze
105-295-175-724-974,Acquisition and Interpretation of Digital Information in Forensic Assessments.,2021-03-04,2021,journal article,Harvard review of psychiatry,14657309; 10673229,Informa Healthcare,United States,Barbara Burton; Eric Y. Drogin,"ABSTRACT Despite the now ubiquitous presence of technology in everyday life, there is little written on the subject of personal digital data as it pertains to forensic mental health evaluations. Ethical concerns and limited consensus guidance on this issue have previously made it challenging to use this information in a responsible way. This Perspectives article elaborates on the different types of personal data that exist and the practical aspects of acquiring such information, including data location and legal considerations. Incorporation of personal digital information into the forensic assessment as a form of collateral information is discussed, along with the current state of the literature on technology use and its relationship to psychopathology and risk. Given the important role of technology in the life of the modern individual, deeper research into this topic will be necessary in the immediate future to establish practice standards for the safe and ethical use of digital information in both forensic and non-forensic mental health assessments.",29,3,234,239,Mental health; Psychology; Subject (documents); Collateral; Digital data; Everyday life; MEDLINE; State (computer science); Interpretation (philosophy); Engineering ethics,,Humans; Mental Health,,,https://www.ncbi.nlm.nih.gov/pubmed/33660624 https://europepmc.org/article/MED/33660624 https://pubmed.ncbi.nlm.nih.gov/33660624/,http://dx.doi.org/10.1097/hrp.0000000000000291,33660624,10.1097/hrp.0000000000000291,3134853268,,0,002-582-923-538-155; 004-091-227-804-161; 004-444-718-123-214; 005-602-986-752-276; 011-641-833-566-340; 013-371-173-953-139; 013-756-236-178-14X; 017-477-667-536-395; 020-992-030-664-212; 032-907-790-670-072; 048-505-063-178-873; 049-173-683-237-641; 053-260-904-334-18X; 075-149-751-974-356; 078-221-917-889-593; 079-868-145-940-152; 101-381-521-172-400; 108-506-392-569-073; 124-004-144-226-792,0,false,,
106-021-721-854-935,The Art and Science of Digital Visual Media Forensics,2018-12-26,2018,journal article,"Forensic, Legal & Investigative Sciences",2473733x,Herald Scholarly Open Access,,Raahat Devender Singh,,4,,1,6,Visual media; Computer science; Multimedia,,,,,http://dx.doi.org/10.24966/flis-733x/100021 https://dx.doi.org/10.24966/flis-733x/100021,http://dx.doi.org/10.24966/flis-733x/100021,,10.24966/flis-733x/100021,2911759662,,0,,0,true,cc-by,gold
106-169-386-186-36X,P2DF: A Privacy-Preserving Digital Forensics Framework,2021-11-01,2021,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Muhammad Abulaish; Nur Al Hasan Haldar; Jahiruddin Jahiruddin,"The extensive use of digital devices by individuals generates a significant amount of private data which creates challenges for investigation agencies to protect suspects' privacy. Existing digital forensics models illustrate the steps and actions to be followed during an investigation, but most of them are inadequate to investigate a crime with all the processes in an integrated manner and do not protect suspect's privacy. In this paper, we propose the development of a privacy-preserving digital forensics (P2DF) framework, which facilitates investigation through maintaining confidentiality of the suspects through various privacy standards and policies. It includes an access control mechanism which allows only authorized investigators to access private data and identified digital evidences. It is also equipped with a digital evidence preservation mechanism which could be helpful for the court of law to ensure the authenticity, confidentiality, and reliability of the evidences, and to verify whether privacy of the suspect was preserved during the investigation process.
",13,6,1,15,Privacy preserving; Computer security; Computer science; Digital forensics,,,,,https://www.igi-global.com/viewtitle.aspx?TitleId=288547,http://dx.doi.org/10.4018/ijdcf.288547,,10.4018/ijdcf.288547,3206525595,,0,001-381-793-304-07X; 012-608-868-939-962; 020-944-423-224-895; 021-850-998-857-676; 026-774-296-742-022; 028-656-707-596-927; 031-400-709-717-795; 035-129-008-760-918; 039-365-534-871-351; 041-018-610-330-094; 045-581-544-307-619; 062-325-585-829-185; 087-665-408-966-240; 089-048-294-489-077; 098-748-261-333-651; 105-972-775-368-649; 109-652-769-766-539; 121-830-022-805-361; 125-833-554-920-626; 127-948-386-055-225; 134-927-490-231-285; 142-388-561-082-054; 159-477-048-665-066,0,true,,gold
106-181-462-850-018,Anti-Forensics: A Practitioner Perspective,,2015,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Jean-Paul Van Belle,,4,2,390,403,,,,,,,http://dx.doi.org/10.17781/p001593,,10.17781/p001593,,,0,,3,false,,
106-326-322-500-176,Digital forensics in a post-truth age.,2018-06-06,2018,journal article,Forensic science international,18726283; 03790738,Elsevier Ireland Ltd,Netherlands,Hany Farid,,289,,268,269,Internet privacy; Social responsibility; Deception; MEDLINE; Post truth; Computer science; Digital forensics,,Deception; Forensic Sciences; Humans; Social Media/legislation & jurisprudence; Social Responsibility,,,https://pubmed.ncbi.nlm.nih.gov/29909299/ https://www.ncbi.nlm.nih.gov/pubmed/29909299,http://dx.doi.org/10.1016/j.forsciint.2018.05.047,29909299,10.1016/j.forsciint.2018.05.047,2805243269,,0,,12,false,,
106-327-211-472-998,The Presumption of Innocence as a Source for Universal Rules on Digital Evidence: The guiding principle for digital forensics in producing digital evidence for criminal investigations,2021-08-11,2021,journal article,Computer law review international,16107608,,,Radina Stoykova,"This paper proposes a conceptual framework for the development of digital evidence rules in technology-assisted investigations based on the presumption of innocence. The presumption of innocence (PI) is examined as a general principle of criminal procedure to delineate its scope and application on pre-trial and clarify its role for the development and harmonization of practical and enforceable rules for digital evidence. It is demonstrated that PI provides a theoretical background for digital evidence regulation, digital forensics standards, and harmonized rules on the use of technology for investigative purposes irrespective of jurisdictional differences. The derived PI-based evidence rules reveal missing techno-legal policy for their implementation in digital evidence systems and processes. After introducing the wide-spread use of digital evidence by law enforcement in the course of criminal investigations and proceedings (I.), this article reviews the schools of thought regarding the impact of PI on evidence procedures focussing on the question whether PI’s protection against wrongful conviction could support measures against arbitrary and intrusive investigations (II.). The reviewing analysis strives to balance contradictory opinions about the scope and application of the PI, before examining digital forensics specifics in the context of the derived PI-based evidence rules to identify techno-legal policy tailored for the digital investigations and its effective implementation in digital evidence systems (III.).",22,3,74,82,Criminal investigation; Conceptual framework; Law and economics; Presumption of innocence; Context (language use); Law enforcement; Digital evidence; Computer science; Criminal procedure; Digital forensics,,,,,https://research.rug.nl/en/publications/the-presumption-of-innocence-as-a-source-for-universal-rules-on-d https://www.narcis.nl/publication/RecordID/oai%3Apure.rug.nl%3Apublications%2F4164567c-4dc7-4e5e-a050-6b3ca0f42833,https://research.rug.nl/en/publications/the-presumption-of-innocence-as-a-source-for-universal-rules-on-d,,,3192800931,,0,,0,false,,
106-335-104-403-831,A novel neural network based image descriptor for texture classification,,2019,journal article,Physica A: Statistical Mechanics and its Applications,03784371,Elsevier BV,Netherlands,Turker Tuncer; Sengul Dogan; Fatih Ertam,,526,,120955,,Curse of dimensionality; Normalization (statistics); Artificial intelligence; Pixel; Pattern recognition; Normalization (image processing); Principal component analysis; Activation function; Computer science; Feedforward neural network; Artificial neural network; Feature extraction; Histogram; Linear discriminant analysis; Image processing,,,,,https://www.sciencedirect.com/science/article/pii/S0378437119305497 http://ui.adsabs.harvard.edu/abs/2019PhyA..52620955T/abstract,http://dx.doi.org/10.1016/j.physa.2019.04.191,,10.1016/j.physa.2019.04.191,2937800999,,0,004-026-543-079-124; 004-121-464-006-66X; 006-041-665-465-558; 006-312-114-062-439; 006-560-711-367-567; 007-588-121-886-421; 007-635-002-062-509; 007-662-807-884-01X; 008-271-327-871-824; 010-154-758-590-433; 014-166-020-318-269; 015-979-793-981-921; 016-705-527-926-469; 017-956-524-305-731; 018-399-977-529-129; 022-664-789-919-348; 025-920-255-032-987; 028-233-520-332-337; 032-133-843-134-075; 034-701-541-555-865; 038-370-364-156-231; 038-375-110-657-557; 038-805-774-629-96X; 039-342-945-114-214; 041-075-015-117-257; 045-174-924-381-900; 048-550-840-448-915; 049-405-868-114-613; 050-804-418-665-825; 054-060-415-607-853; 057-006-530-509-951; 057-090-151-217-726; 062-511-150-382-504; 069-515-826-457-944; 070-373-210-747-745; 071-024-485-421-403; 075-924-822-451-240; 076-475-741-171-461; 077-300-584-938-439; 077-522-575-038-061; 079-391-240-847-25X; 081-772-752-266-812; 082-314-034-414-110; 083-432-356-782-50X; 084-186-869-573-477; 089-334-721-643-401; 092-365-367-138-903; 097-666-601-855-240; 115-882-536-250-954; 120-588-671-187-744; 140-292-380-000-09X; 141-961-077-487-036; 143-478-140-082-211; 155-424-773-165-625; 156-893-709-983-402; 199-027-964-379-551,9,false,,
106-438-149-842-522,“Scaffolding” responses to digital forensic inquiries,2021-11-27,2021,journal article,WIREs Forensic Science,25739468,Wiley,,Graeme Horsman,,4,4,,,Engineering; Multimedia; Digital forensics; Scaffold,,,,,https://wires.onlinelibrary.wiley.com/doi/pdf/10.1002/wfs2.1451,http://dx.doi.org/10.1002/wfs2.1451,,10.1002/wfs2.1451,3215802464,,0,000-084-741-857-185; 002-288-892-034-343; 005-715-450-998-72X; 006-933-430-647-14X; 009-512-003-529-193; 010-061-391-662-193; 010-963-610-208-920; 012-564-492-558-122; 021-850-998-857-676; 024-350-847-240-124; 024-445-108-979-867; 036-189-930-199-369; 075-128-417-091-483; 077-287-216-746-675; 079-858-593-881-513; 086-653-920-850-621; 092-765-349-680-750; 099-377-733-522-116; 102-243-142-344-71X; 110-700-351-633-754; 111-488-239-742-003; 113-520-825-550-67X; 118-838-969-146-870; 142-790-196-752-819; 173-145-269-859-717; 179-703-555-795-891,0,false,,
106-997-247-556-643,A review on impacts of cloud computing and digital forensics,,2014,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Farid Daryabar; Ali Dehghantanha,"Nowadays, digital storage of computer data is moving toward cloud computing which is a set of infrastructure provides data storage for organizations and individuals. Due to this large scale, in case an attack occurs in the network of a cloud it would be a big challenge to investigate the cloud. Therefore, digital forensics in cloud computing is a new discipline related to the increasing use of computers, networks and digital storage devices in numerous criminal activities in both traditional and Hi-Tech. This study reviews the literature on some challenges in cloud computing forensic investigation, and it is followed by evaluation and analysis of all types of information on cloud computing and its impacts on computer forensic investigations in publishing alliances with the survey was carried out in the field.",2,2,77,94,Digital transformation; World Wide Web; Data; Cloud computing security; Computer data storage; Data science; Field (computer science); Computer science; Wireless; Cloud computing; Digital forensics,,,,,http://sdiwc.net/digital-library/a-review-on-impacts-of-cloud-computing-on-digital-forensics.html https://usir.salford.ac.uk/34013/,http://sdiwc.net/digital-library/a-review-on-impacts-of-cloud-computing-on-digital-forensics.html,,,1592371139,,0,,24,false,,
107-291-552-186-572,"Drone GPS data analysis for flight path reconstruction: A study on DJI, Parrot & Yuneec make drones",,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Ravin Kumar; Animesh Kumar Agrawal,,38,,301182,,Personalization; restrict; Gps data; Field (computer science); Computer security; Computer science; Drone,,,,,https://www.sciencedirect.com/science/article/pii/S2666281721000901 https://doi.org/10.1016/j.fsidi.2021.301182,http://dx.doi.org/10.1016/j.fsidi.2021.301182,,10.1016/j.fsidi.2021.301182,3167698676,,0,008-667-688-301-190; 011-755-498-862-139; 016-443-729-291-767; 028-151-765-287-993; 029-563-465-806-154; 046-314-745-466-915; 122-122-879-514-001; 170-162-481-967-059,4,false,,
107-338-245-292-063,THE USE OF ONTOLOGIES IN FORENSIC ANALYSIS OF SMARTPHONE CONTENT,,2015,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Mohammed Alzaabi; Thomas Martin; Kamal Taha; Andrew Jones,"Digital forensics investigators face a constant challenge in keeping track with evolving technologies such as smartphones. Analyzing the contents of these devices to infer useful information is becoming more time consuming as the volume and complexity of data are increasing. Typically, such analysis is undertaken by a human, which makes it dependent on the experience of the investigator. To overcome such impediments, an automated technique can be utilized in order to aid the investigator to quickly and eciently analyze the data. In this paper, we propose F-DOS; a set of ontologies that models the smartphone content for the purpose of forensic analysis. F-DOS can form a knowledge management component in a forensic analysis system. Its importance lies in its ability to encode the semantics of the smartphone content using concepts and their relationships that are modeled by F-DOS.",10,4,105,114,Semantics; World Wide Web; Set (psychology); Ontology (information science); Data science; Computer science; Component (UML); Network forensics; ENCODE; Mobile device forensics; Digital forensics,,,,,https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=3507&context=ecuworkspost2013 https://commons.erau.edu/jdfsl/vol10/iss4/9/ https://core.ac.uk/display/81695325 https://commons.erau.edu/cgi/viewcontent.cgi?article=1215&context=jdfsl https://ro.ecu.edu.au/ecuworkspost2013/2496/ https://core.ac.uk/download/81695325.pdf,http://dx.doi.org/10.15394/jdfsl.2015.1215,,10.15394/jdfsl.2015.1215,2277703527,,0,016-123-869-009-118; 019-963-643-739-67X; 036-673-313-594-640; 071-645-975-039-209; 085-666-602-084-614; 095-437-078-101-003; 104-788-654-788-51X; 181-072-396-769-365,3,true,cc-by-nc,gold
107-814-078-721-776,Record File Carving Technique for Efficient File Recovery in Digital Forensic Investigation,2013-02-28,2013,journal article,KIPS Transactions on Computer and Communication Systems,22875891,Korea Information Processing Society,,Min Su Park; Jung Heum Park; Sang Jin Lee,"These days digital data have become essential for digital investigation because most of the crime was occurred by using the digital devices. However, digital data is very easier to falsify or delete. If digital data was deleted, it is necessary to recover the deleted data for obtain digital evidence. Even though file carving is the most important thing to gather. digital evidence in digital forensic investigation, most of popular carving tools don`t contemplate methods of selection or restoration for digital forensic investigation. The goal of this research is suggested files which can obtain useful information for digital forensic investigation and proposed new record file carving technique to be able to recover data effectively than before it.",2,2,93,102,Selection (linguistics); World Wide Web; File carving; Carving; Digital data; Digital evidence; Digital forensic investigation; Computer science; Multimedia,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBCRIN_2013_v2n2_93 http://www.ndsl.kr/soc_img/society/kips/JBCRIN/2013/v2n2/JBCRIN_2013_v2n2_93.pdf http://koreascience.or.kr/journal/view.jsp?kj=JBCRIN&py=2013&vnc=v2n2&sp=93 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001743148 http://ktccs.kips.or.kr/digital-library/4660,http://dx.doi.org/10.3745/ktccs.2013.2.2.093,,10.3745/ktccs.2013.2.2.093,2067157203,,0,002-449-146-256-491; 009-832-452-035-773; 077-066-116-235-027; 082-272-471-651-277; 085-214-277-668-01X; 091-812-839-578-217; 121-786-737-888-521,1,true,,bronze
107-992-128-750-519,Implementation of ACPO Framework for Digital Evidence Acquisition in Smartphones,2022-02-07,2022,journal article,CCIT Journal,26554275; 19788282,iLearning Journal Center,,Muhammad Saleh Jafri; Suwanto Raharjo; M. Rudiyanto Arief,"A forensic investigator or analyst should implement an appropriate digital forensic framework to acquire valid digital evidence to be presented at court. Choosing an unsuitable digital forensic framework with the investigation process may lead to failure at acquiring or maintaining complete digital evidence. Missing a step or turning a certain step into another irrelevant step may lead to unclear results and invalid conclusions. Digital evidence extracted from risky electronic evidence cannot be accepted by the court. Accordingly, a forensic investigator or forensic analyst should refer to a structuralized standard structure to perform well.Several internal digital forensic frameworks are available, one of which is the Good Practice Guide for Computer-based Electronic Evidence [1], an English issuance by ACPO (Association of Chief Police Officers) in cooperation with 7Safe. The digital forensic framework is commonly called the digital forensic framework from ACPO or the ACPO Framework. This research brings into focus the analysis of the percentage of success rate for using the ACPO digital forensic framework or the ACPO Framework in comparison with another digital forensic framework, i.e., NIST Framework. This research is also aimed at examining the performance of a mobile forensic tool, i.e., Cellebrite’s UFED Touch2 in comparison with another mobile forensic tool for digital evidence acquisition in smartphones.The research objects were smartphones containing deleted WhatsApp messages. This research successfully implemented the ACPO Framework for digital evidence acquisition in smartphones using Cellebrite’s UFED Touch2 as the mobile forensic tool.",15,1,82,105,Digital evidence; Digital forensics; Computer science; Mobile device; Computer forensics; Data science; Process (computing); Forensic science; Computer security; World Wide Web; Geography; Archaeology; Operating system,,,,,,http://dx.doi.org/10.33050/ccit.v15i1.1586,,10.33050/ccit.v15i1.1586,,,0,,0,true,,bronze
108-070-913-448-812,From time theft to time stamps: mapping the development of digital forensics from law enforcement to archival authority,2019-03-04,2019,journal article,International Journal of Digital Humanities,25247832; 25247840,Springer Science and Business Media LLC,,Corinne Rogers,"The field of digital forensics seems at first glance quite separate from archival work and digital preservation. However, professionals in both fields are trusted to attest to the identity and integrity of digital documents and traces – they are regarded as experts in the acquisition, interpretation, description and presentation of that material. Archival science and digital forensics evolved out of practice and grew into established professional disciplines by developing theoretical foundations, which then returned to inform and standardize that practice. They have their roots in legal requirements and law enforcement. A significant challenge to both fields, therefore, is the identification of records (archival focus) and evidence (digital forensics focus) in digital systems, establishing their contexts, provenance, relationships, and meaning. This paper traces the development of digital forensics from practice to theory and presents the parallels with archival science.",1,1,13,28,Data science; Parallels; Presentation; Digital preservation; Law enforcement; Archival science; Interpretation (philosophy); Identification (information); Digital forensics; History,,,,,https://link.springer.com/article/10.1007/s42803-019-00002-y,http://dx.doi.org/10.1007/s42803-019-00002-y,,10.1007/s42803-019-00002-y,2920267616,,0,002-214-848-360-115; 002-328-258-595-526; 004-441-167-148-170; 005-573-416-928-102; 013-133-468-228-985; 016-004-336-259-323; 017-840-378-634-021; 020-944-423-224-895; 021-850-998-857-676; 025-421-213-608-128; 031-234-153-523-379; 032-960-619-192-843; 037-647-066-964-858; 038-113-177-930-482; 038-668-970-194-854; 043-589-904-668-295; 055-740-268-775-122; 066-537-795-300-925; 067-629-806-155-212; 069-713-118-371-629; 088-309-759-208-842; 091-484-846-148-688; 098-120-541-214-151; 111-741-773-111-021; 127-086-844-715-002; 127-948-386-055-225; 133-397-275-695-990; 134-927-490-231-285; 149-080-386-855-18X; 151-378-930-836-964; 157-954-859-648-506; 167-906-378-249-754; 178-883-713-153-793; 190-065-821-748-92X; 199-745-676-923-766,2,false,,
108-082-937-872-755,Practical Digital Forensics at Accession for Born-Digital Institutional Records,2016-01-28,2016,journal article,Code4Lib Journal,19405758,,,Gregory Wiedeman,,,31,,,Internet privacy; Born-digital; Accession; Computer security; Computer science; Digital forensics,,,,,https://journal.code4lib.org/articles/11239,https://journal.code4lib.org/articles/11239,,,2605861898,,0,,1,true,cc-by,gold
108-429-571-486-082,The application of forensics examination in crime-related prosecution,2020-11-02,2020,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Davidson C. Onwubiko; Felix E. Eboibi,"The increased use of the internet and information technology in Nigeria has led to the need to utilize technologies to identify and prosecute perpetrators of crimes. In today’s world, the application of forensics in the investigation and prosecution of crimes is essential. This paper critically examines the effect of the absence of a coordinated standard for the execution and presentation of forensic investigations utilizing electronic evidence in Nigeria. It examines the nature and scope of the various forensic models proposed, while questioning the appropriateness or otherwise of their usefulness in criminal prosecutions. The paper suggests the need for the regulation of forensics practices, the provision of standards, and a universal model for the successful prosecution of crimes in Nigeria.
; Index words: Nigeria; forensic examination; digital crime; standardization",,,83,93,Political science; Criminology,,,,,https://journals.sas.ac.uk/deeslr/article/download/5228/5075,http://dx.doi.org/10.14296/deeslr.v17i0.5228,,10.14296/deeslr.v17i0.5228,3112413245,,0,,0,true,cc-by-nc-nd,gold
108-433-759-883-41X,A Recovery Technique against File Wiping for Digital Forensic on NAND Flash Memory,,2012,journal article,Journal of KIISE:Databases,12297739,,,Yoon-Bin Lim; Myung-Sub Shin; Dong-Joo Park,"Recently, flash memory is used as storage system of digital devices. Anti-forensic techniques like file wiping is being tried to completely delete the stored files on flash memory, since they are clues in a criminal investigation. Therefore, it is necessary to develop digital forensic techniques for the analysis of digital evidence on flash memory to win anti-forensic techniques. Recently, data recovery approaches on flash memory have been proposed, which are heavily dependent of metadata stored on flash memory. This paper suggests a new technique to be able to recover data on flash memory deleted by file wiping. Differently from the previous techniques, our scheme can recovery deleted files without metadata on flash memory. Through diverse experiments, we show that our approach is a higher level of the data recovery technique compared with the existing techniques.",39,2,100,108,Operating system; Memory management; Computer data storage; Universal memory; Flash file system; Flash memory; Computer science; Memory map; Computer memory; Flash memory emulator,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBGHEH_2012_v39n2_100 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001652284,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBGHEH_2012_v39n2_100,,,2403417595,,0,,0,false,,
108-757-813-890-372,ABHED - Artificial Intelligence Based Human Efface Detection,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Himani Rawat,,,,,,Artificial intelligence; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.13,http://dx.doi.org/10.46293/4n6/2020.02.03.13,,10.46293/4n6/2020.02.03.13,3096367383,,0,,0,false,,
109-348-478-867-966,Assessing the Psychological Well-being and Coping Mechanisms of Law Enforcement Investigators vs. Digital Forensic Examiners of Child Pornography Investigations,2017-12-04,2017,journal article,Journal of Police and Criminal Psychology,08820783; 19366469,Springer Science and Business Media LLC,Germany,Kathryn C. Seigfried-Spellar,"Previous research indicates law enforcement investigators and digital forensic examiners working child exploitation cases are at an increased risk for experiencing psychological distress; however, the roles of digital forensic examiners and investigators often overlap substantially when working child pornography cases. Thus, the current study was the first to compare the psychological well-being, job satisfaction, coping mechanisms, and attitudes toward mental health services for individuals working as either digital forensic examiners and/or investigators of child pornography cases. Law enforcement officers were solicited from the Internet Crimes Against Children task force listserv, and based on their current self-reported duties, 20 were classified as digital forensic examiners-only, 71 as investigators-only, and 38 as both digital forensic examiners and investigators of cases involving Internet child pornography. Results showed significant differences between groups; individuals performing both duties scored significantly higher on secondary traumatic stress, higher on feelings of worthlessness, and lower on concentration compared to digital forensic examiners-only. Individuals performing both duties also reported significantly lower scores on job satisfaction compared to investigators-only. Finally, individuals working both duties were significantly more likely to know someone who sought counseling as a result of work-related stress. The study’s mental health implications and future research suggestions are discussed.",33,3,215,226,Compassion fatigue; Feeling; Mental health; Legal psychology; Psychology; Psychological well-being; Job satisfaction; Child pornography; Law enforcement; Clinical psychology,,,,University of Alabama,https://link.springer.com/article/10.1007%2Fs11896-017-9248-7 https://link.springer.com/content/pdf/10.1007%2Fs11896-017-9248-7.pdf,http://dx.doi.org/10.1007/s11896-017-9248-7,,10.1007/s11896-017-9248-7,2772137463,,0,000-490-412-762-138; 007-790-059-029-953; 013-176-763-001-388; 013-568-618-083-770; 013-717-900-010-205; 016-714-762-385-310; 018-005-352-608-818; 021-201-295-792-01X; 023-205-079-263-974; 026-595-897-410-847; 026-918-579-601-799; 029-442-923-036-644; 041-010-815-625-113; 045-583-164-562-588; 047-353-646-775-446; 053-339-196-107-235; 055-046-286-108-710; 055-212-525-283-817; 059-562-542-068-452; 059-982-120-158-213; 060-169-748-750-953; 062-222-443-665-400; 067-144-932-123-187; 073-313-808-035-835; 077-205-567-824-784; 078-107-853-109-113; 078-385-199-956-202; 079-819-982-015-318; 080-161-175-307-872; 088-958-937-400-993; 100-436-172-024-424; 104-298-972-263-215; 111-901-632-410-562; 119-029-461-264-24X; 143-811-701-631-820; 157-454-151-474-60X; 165-774-156-145-795; 167-446-807-052-825; 197-860-668-008-411; 199-372-341-017-471,18,false,,
109-597-940-114-831,Prelim i - Editorial Board,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,40,,301382,301382,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00063-4,,10.1016/s2666-2817(22)00063-4,,,0,,0,true,,bronze
109-629-313-549-75X,FALI: Time Memory Information of Windows Computer Systems,2013-12-01,2013,journal article,International Journal of Intelligent Computing Research,20424655,Infonomics Society,,Funminiyi Olajide; Richard Trafford,"In today digital investigation, forensic application level information (FALI) has become an important part of digital forensic research. In this research, information stored on Windows computer systems was analysed. The user input gathered from the volatile memory (RAM) of Windows applications has been described as the most important aspect of digital forensic investigation. User input is made at set interval when the application is still opened. This research will report the quantitative assessment of forensically relevant information on Windows application.",4,4,354,357,Set (abstract data type); Quantitative assessment; Digital forensic investigation; User input; Relevant information; Computer security; Computer science; Multimedia; Volatile memory; Digital forensics,,,,,http://infonomics-society.org/wp-content/uploads/ijicr/published-papers/volume-4-2013/FALI-Time-Memory-Information-of-Windows-Computer-Systems.pdf,http://dx.doi.org/10.20533/ijicr.2042.4655.2013.0046,,10.20533/ijicr.2042.4655.2013.0046,2508066546,,0,055-259-800-283-255; 068-404-690-853-48X; 076-095-910-918-008; 141-182-449-198-823; 146-991-652-523-750; 161-183-838-006-143,0,true,,bronze
109-904-428-698-679,The forensic imagination: interdisciplinary approaches to tracing creativity in writers' born-digital archives,2019-08-11,2019,journal article,Archives and Manuscripts,01576895; 21646058,Australian Society of Archivists,United Kingdom,Paul Gooding; Jos Smith; Justine Mann,"In 2013, Matthew Kirschenbaum advocated for increased collaboration between digital archivists and digital humanities specialists to make the most out of born-digital archives. Since then, researchers and archivists have experimented with innovative interfaces for access to writer’s archives that emerge from individual research cultures and practices. Simultaneously, archives such as the British Archive for Contemporary Writing (BACW) at the University of East Anglia (UEA) are beginning to collect the work of authors who work in inventive digital ways. This article will therefore explore the following question: how might archivists, authors and researchers profitably collaborate to explore the nature of creativity in the born-digital archive, so that both digital preservation and digital scholarship take place? In doing so, the authors look to the complementary fields of genetic criticism and digital humanities to inform the development of archival tools as ‘hermeneutical instruments’. They will explore how such instruments might allow us to read horizontally across archival strata, building on an ‘esthetic of the possible’ to develop a ‘jouer avec les fonds’, supported through collaboration between researchers, archivists and writers. Finally, the authors consider how this approach challenges archival practices, and propose forms of collaboration that might address both archival practice and emerging forms of scholarship.",47,3,374,390,Creativity; Sociology; Visual arts; Work (electrical); Digital humanities; Born-digital; Scholarship; Digital preservation; Digital scholarship; Criticism,,,,,http://eprints.gla.ac.uk/184018/ https://www.tandfonline.com/doi/full/10.1080/01576895.2019.1608837 https://ueaeprints.uea.ac.uk/70967/ https://research-portal.uea.ac.uk/en/publications/the-forensic-imagination-interdisciplinary-approaches-to-tracing- https://core.ac.uk/download/200201245.pdf,http://dx.doi.org/10.1080/01576895.2019.1608837,,10.1080/01576895.2019.1608837,2954062211,,0,,5,true,cc0,green
110-131-476-217-052,Data Mining Technique to Data Collection and Analysis for Cyber Forensic,2020-01-30,2020,journal article,International Journal of Recent Technology and Engineering (IJRTE),22773878,Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP,,Prashant Khobragade*; Pranay Saraf; Preeti Thakre; Priya maidamwar,"In the world of Digital forensic the uncovered digital may contain vital information for digital data investigation for investigator. Digital data collected from the crime scene leads to find out the clue after performing analysis by the examiner. This process of data examination data collection and analysis plays important role in cyber world for the forensic investigator. The cybercrime is a part of computer forensics where the digital evidences are analyze by the investigator and to perform analysis special measurements and techniques are required in order to use this details that has to be accepted in court of law for law enforcement. The data collection of evidence is a key aspect for the investigator, such kind of digital data has to be collected from different sources at the crime scene and this process involves to collect each and every evidence of digital crime scene and later this gather data will be analyze by the experts to reach to the conclusion. In this paper the proposed method collected the data from the crime scene efficiently which includes log data, transactional data, physical drive data, and network data; later this collected data analyzed to find out the theft node in the network. In this paper FTK 4.0 digital forensic tool used to reduce plenty of time for data processing and later report will be produce that will be accepted tin the court of law. This paper also focuses the data collection method with in the network and reach to the faulty node and later this faulty node analyzed with all collected data for forensic analysis. For this standard algorithm used to analyze the performance of distinct features used for network attacks. Kmeans clustering methodology is used to create cluster of victim node and represent victim data in systematic manner for the ease of law enforcement.",8,5,2786,2789,Digital evidence; Digital forensics; Law enforcement; Computer science; Data collection; Crime scene; Digital data; Network forensics; Node (physics); Cybercrime; Process (computing); Data science; Computer security,,,,,,http://dx.doi.org/10.35940/ijrte.d8543.018520,,10.35940/ijrte.d8543.018520,,,0,,0,true,,gold
110-142-835-904-035,Digital Evidence Object Model for Situation Awareness and Decision Making in Digital Forensics Investigation,2021-09-01,2021,journal article,IEEE Intelligent Systems,15411672; 19411294,Institute of Electrical and Electronics Engineers (IEEE),United States,Sarunas Grigaliunas; Jevgenijus Toldinas; Algimantas Venčkauskas; Nerijus Morkevicius; Robertas Damasevicius,"The aim of a forensic investigation is to provide situation awareness in terms of identification and preservation of digital evidence, extraction of information, and analysis of extracted information to facilitate time-critical decision making. Digital forensic investigation is a process of collecting, examining, and analyzing digital data from various places such as digital devices, networks, and big data in the cloud. Here we propose a novel digital evidence object (DEO) model for the reduction of forensics data in digital forensic investigation and describe its application. The proposed DEO model is based on the synergy of category theory and integration of 5Ws (Who, What, When, Where, and Why) of digital investigation analysis techniques for digital evidence acquisition. We present a real-life case study to demonstrate its suitability for assisting computer forensics experts in the digital evidence investigation. Our results demonstrate that the application of the DEO model can noticeably decrease the number of false positive evidence objects submitted to a forensics expert, thus reducing his/her workload and improving decision making performance in a time-critical setting.",36,05,39,48,Situation awareness; Data science; Digital data; Digital evidence; Computer science; Computer forensics; Intelligent decision support system; Big data; Identification (information); Digital forensics,,,,,https://www.computer.org/csdl/magazine/ex/2021/05/09178959/1mDpBvAEzn2 https://ieeexplore.ieee.org/abstract/document/9178959/ https://dblp.uni-trier.de/db/journals/expert/expert36.html#GrigaliunasTVMD21,http://dx.doi.org/10.1109/mis.2020.3020008,,10.1109/mis.2020.3020008,3082246520,,0,031-733-321-509-944; 033-826-748-864-027; 046-568-990-053-305; 057-744-964-946-459; 062-032-128-092-406; 067-752-747-116-312; 088-553-642-323-93X; 112-910-981-584-836; 122-299-786-698-239; 133-508-126-407-763; 146-021-806-272-345; 167-751-222-897-487,5,false,,
110-377-139-748-215,The case for Zero Trust Digital Forensics,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Christopher Neale; Ian Kennedy; Blaine Price; Yijun Yu; Bashar Nuseibeh,"It is imperative for all stakeholders that digital forensics investigations produce reliable results to ensure the field delivers a positive contribution to the pursuit of justice across the globe. Some aspects of these investigations are inevitably contingent on trust, however this is not always explicitly considered or critically evaluated. Erroneously treating features of the investigation as trusted can be enormously damaging to the overall reliability of an investigation's findings as well as the confidence that external stakeholders can have in it. As an example, digital crime scenes can be manipulated by tampering with the digital artefacts left on devices, yet recent studies have shown that efforts to detect occurrences of this are rare and argue that this leaves digital forensics investigations vulnerable to accusations of inaccuracy. In this paper a new approach to digital forensics is considered based on the concept of Zero Trust, an increasingly popular design in network security. Zero Trust describes the practitioner mindset and principles upon which the reliance on trust in network components is eliminated in favour of dynamic verification of network interactions. An initial Definition of Zero Trust Digital Forensics will be proposed and then a specific example considered showing how this strategy can be applied to digital forensic investigations to mitigate against the specific risk of evidence tampering. A definition of Zero Trust Digital Forensics is proposed, specifically that it is ‘a strategy adopted by investigators whereby each aspect of an investigation is assumed to be unreliable until verified’. A new principle will be introduced, namely the ‘multifaceted verification of digital artefacts’ that can be used by practitioners who wish to adopt a Zero Trust Digital Forensics strategy during their investigations. A qualitative review of existing artefact verification techniques is also conducted in order to briefly evaluate the viability of this approach based on current research efforts. • Trust influences the reliability of forensic investigations yet is rarely explicitly considered. • A new strategy for investigations is proposed influenced by Zero Trust principles. • A motivating example illustrates the need for such a strategy.",40,,301352,301352,Digital forensics; Mindset; Computer security; Computer science; Globe; Network forensics; Computer forensics; Digital evidence; Zero (linguistics); Field (mathematics); Internet privacy; Data science,,,,UK Research and Innovation; Engineering and Physical Sciences Research Council; Science Foundation Ireland,,http://dx.doi.org/10.1016/j.fsidi.2022.301352,,10.1016/j.fsidi.2022.301352,,,0,003-232-363-219-004; 007-832-595-971-443; 009-344-895-342-85X; 009-512-003-529-193; 016-145-301-135-450; 022-626-519-506-300; 045-783-901-971-215; 047-386-524-667-691; 048-250-488-210-056; 062-168-384-023-533; 078-598-867-814-365; 081-032-497-600-401; 131-807-250-432-699; 134-927-490-231-285; 166-999-959-693-14X,0,true,cc-by,hybrid
111-488-239-742-003,Framework for Reliable Experimental Design (FRED):: A research framework to ensure the dependable interpretation of digital data for digital forensics,,2018,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Graeme Horsman,"Abstract The establishment of fact forms the cornerstone of any forensic discipline, with digital analysis being no exception. Practitioners are under an obligation as expert witnesses to provide factual accounts of digital scenarios, which must be underpinned by robust knowledge and evidential findings. To achieve this level of reliability, investigatory research must be suitably planned, implemented and analysed in a way which instills confidence in the accuracy of any findings. This is particularly important as digital forensic organisations are now facing the impending requirement to have acquired ISO/IEC 17025 accreditation. This article proposes the Framework for Reliable Experimental Design (FRED) to support those engaged in the field of digital forensics research to contribute reliable, robust findings. FRED focuses on the underpinning procedures involved within undertaking the reverse engineering of digital data structures and the process of extracting and interpreting digital content in a reliable way. The proposed framework is designed to be a resource for those operating within the digital forensic field, both in industry and academia, to support and develop research best practice within the discipline.",73,,294,306,Forensic science; Conceptual framework; Data science; Digital data; Digital content; Digital evidence; Computer security; Computer science; Process (engineering); Resource (project management); Digital forensics,,,,,https://doi.org/10.1016/j.cose.2017.11.009 https://research.tees.ac.uk/en/publications/framework-for-reliable-experimental-design-fred-a-research-framew https://research.tees.ac.uk/ws/files/4355231/621551.pdf https://dblp.uni-trier.de/db/journals/compsec/compsec73.html#Horsman18 https://www.sciencedirect.com/science/article/pii/S0167404817302468 https://core.ac.uk/download/pdf/196166325.pdf,http://dx.doi.org/10.1016/j.cose.2017.11.009,,10.1016/j.cose.2017.11.009,2769542598,,0,002-625-978-577-247; 004-706-447-836-905; 007-790-059-029-953; 009-386-221-930-423; 011-946-587-391-596; 012-410-670-929-028; 019-620-931-459-002; 021-039-461-635-181; 032-697-093-668-898; 033-877-222-136-260; 035-672-281-328-899; 037-886-407-309-770; 038-668-970-194-854; 043-947-795-550-171; 045-243-807-828-458; 050-171-086-268-964; 050-513-243-638-138; 066-235-037-082-291; 066-403-963-486-412; 067-577-414-064-539; 067-844-385-207-96X; 074-014-335-505-388; 074-299-373-252-299; 075-128-417-091-483; 078-275-236-083-731; 081-896-209-272-043; 086-419-575-179-359; 090-894-834-543-459; 093-650-425-263-585; 095-691-114-276-825; 098-748-261-333-651; 101-436-770-235-826; 111-090-978-711-139; 118-838-969-146-870; 125-384-800-661-375; 127-053-349-240-432; 129-080-110-367-50X; 133-397-275-695-990; 133-828-777-357-301; 134-927-490-231-285; 137-755-137-054-864; 172-364-607-042-640; 174-414-868-068-131; 184-948-841-629-735,29,true,cc-by-nc-nd,green
112-744-755-472-229,Forensic Analysis using Text Clustering in the Age of Large Volume Data: A Review,,2019,journal article,International Journal of Advanced Computer Science and Applications,21565570; 2158107x,The Science and Information Organization,,Bandar Saleh Mouhammed ِAlmaslukh,"Exploring digital devices in order to generate digital evidence related to an incident being investigated is essential in modern digital investigation. The emergence of text clustering methods plays an important role in developing effective digital forensics techniques. However, the issue of increasing the number of text sources and the volume of digital devices seized for analysis has been raised significantly over the years. Many studies indicated that this issue should be resolved urgently. In this paper, a comprehensive review of digital forensic analysis using text-clustering methods is presented, investigating the challenges of large volume data on digital forensic techniques. Moreover, a meaningful classification and comparison of the text clustering methods that have been frequently used for forensic analysis are provided. The major challenges with solutions and future research directions are also highlighted to open the door for researchers in the area of digital forensics in the age of large volume data.",10,6,,,Volume (computing); Forensic science; Document clustering; Data science; Digital evidence; Computer science; Digital forensics,,,,,https://thesai.org/Publications/ViewPaper?Volume=10&Issue=6&Code=IJACSA&SerialNo=10 https://thesai.org/Downloads/Volume10No6/Paper_10-Forensic_Analysis_using_Text_Clustering.pdf https://repository.psau.edu.sa/xmlui/handle/123456789/92614,http://dx.doi.org/10.14569/ijacsa.2019.0100610,,10.14569/ijacsa.2019.0100610,2955593819,,0,,8,true,cc-by,gold
112-917-373-753-714,Editorial,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Bruce Nikkel,,40,,301388,301388,Psychology,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301388,,10.1016/j.fsidi.2022.301388,,,0,,0,true,,bronze
112-972-498-965-560,A Study on Digital Forensics in Hadoop,2016-11-01,2016,journal article,Indonesian Journal of Electrical Engineering and Computer Science,25024760; 25024752,Institute of Advanced Engineering and Science,,Sachin Arun Thanekar; K. Subrahmanyam; A. B. Bagwan,"Nowadays we all are surrounded by Big data. The term ‘Big Data’ itself indicates huge volume, high velocity, variety and veracity i.e. uncertainty of data which gave rise to new difficulties and challenges. Hadoop is a framework which can be used for tremendous data storage and faster processing. It is freely available, easy to use and implement. Big data forensic is one of the challenges of big data. For this it is very important to know the internal details of the Hadoop. Different files are generated by Hadoop during its process. Same can be used for forensics. In our paper our focus is on digital forensics and different files generated during different processes. We have given the short description on different files generated in Hadoop. With the help of an open source tool ‘Autopsy’ we demonstrated that how we can perform digital forensics using automated tool and thus big data forensics can be done efficiently.",4,2,473,478,Volume (computing); Variety (cybernetics); Forensic science; Computer data storage; Focus (computing); Computer science; Process (engineering); Big data; Database; Digital forensics,,,,,http://ijeecs.iaescore.com/index.php/IJEECS/article/view/5989 http://ijeecs.iaescore.com/index.php/IJEECS/article/download/5989/5324 https://www.iaescore.com/journals/index.php/IJEECS/article/view/5989/5324,http://dx.doi.org/10.11591/ijeecs.v4.i2.pp473-478,,10.11591/ijeecs.v4.i2.pp473-478,2528158907,,0,051-375-511-393-776; 053-351-390-495-712; 058-248-784-098-150; 061-033-869-892-660; 079-911-249-105-531; 099-006-406-150-578,5,false,,
112-973-164-071-334,PENERAPAN METODE COMPOSITE LOGIC UNTUK PERANCANGAN FRAMEWORK PENGUMPULAN BUKTI DIGITAL PADA MEDIA SOSIAL,2019-08-31,2019,journal article,ILKOM Jurnal Ilmiah,25487779; 20871716,Universitas Muslim Indonesia,,Muhammad Naim Al Jumah; Bambang Sugiantoro; Yudi Prayudi,"Social media has become a major part of society. But most of the time social media is used as a way people commit the crime. Due to numerous crimes that use social media, it is essential to design a framework to gather digital evidence on social media. This study develops the design of Framework by implementing Composite Logic Model. A logic Composite model can be used to determine the role model of any variable or pattern that need to collaborate. Composite Logic Model will produce a role model that has a role to produce patterns so that it can produce the same goal. A method of Composite Logic will collaborate with the Digital Forensics Investigation framework to produce a Digital Evidence Collection Framework on Social Media. Based on data and facts, this study has been producing a new framework of gathering digital evidence on social media. The framework has four main stages in the process of collecting digital evidence on social media including pre-process, collection, analysis, and report.",11,2,135,142,Commit; Variable (computer science); Data science; Logic model; Digital evidence; Computer science; Process (engineering); Role model; Social media; Digital forensics,,,,,http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/download/442/185 http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/view/442 https://doaj.org/article/efcb636576584f61b976088a5506c006 https://core.ac.uk/download/pdf/228866360.pdf,http://dx.doi.org/10.33096/ilkom.v11i2.442.135-142,,10.33096/ilkom.v11i2.442.135-142,2974808412,,0,,0,true,cc-by-sa,gold
113-231-146-599-024,A new anti-forensic scheme--hiding the single JPEG compression trace for digital image.,2014-12-01,2014,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Yanjun Cao; Tiegang Gao; Guorui Sheng; Li Fan; Lin Gao,"To prevent image forgeries, a number of forensic techniques for digital image have been developed that can detect an image's origin, trace its processing history, and can also locate the position of tampering. Especially, the statistical footprint left by JPEG compression operation can be a valuable source of information for the forensic analyst, and some image forensic algorithm have been raised based on the image statistics in the DCT domain. Recently, it has been shown that footprints can be removed by adding a suitable anti-forensic dithering signal to the image in the DCT domain, this results in invalid for some image forensic algorithms. In this paper, a novel anti-forensic algorithm is proposed, which is capable of concealing the quantization artifacts that left in the single JPEG compressed image. In the scheme, a chaos-based dither is added to an image's DCT coefficients to remove such artifacts. Effectiveness of both the scheme and the loss of image quality are evaluated through the experiments. The simulation results show that the proposed anti-forensic scheme can verify the reliability of the JPEG forensic tools.",60,1,197,205,Digital image processing; Artificial intelligence; JPEG; Quantization (image processing); Computer vision; Computer science; Digital image; Image quality; JPEG 2000; Lossless JPEG; Image processing,anti-forensic; chaotic signal; digital fingerprint; digital image forgery; forensic science; single JPEG compression,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=5215319 https://www.onlinelibrary.wiley.com/doi/abs/10.1111/1556-4029.12618 https://www.ncbi.nlm.nih.gov/pubmed/25442510,http://dx.doi.org/10.1111/1556-4029.12618,25442510,10.1111/1556-4029.12618,2038618066,,0,001-689-344-329-133; 004-530-492-547-92X; 007-414-852-040-315; 031-876-583-652-183; 041-796-476-831-023; 051-035-217-903-949; 055-846-173-386-410; 074-602-449-941-680; 079-164-168-107-23X; 101-218-430-388-564; 108-082-852-052-555; 122-164-403-164-304; 135-262-782-091-897; 136-713-989-335-402; 147-457-693-761-284,7,false,,
114-090-829-194-843,KES - Extended abstract digital forensics model with preservation and protection as umbrella principles,,2014,journal article,Procedia Computer Science,18770509,Elsevier BV,,Shahzad Saleem; Oliver Popov; Ibrahim Bagilli,"Abstract In this research, a literature review was conducted where twenty (n=20) frameworks and models highlighting preservation of the integrity of digital evidence and protection of basic human rights during digital forensic investigations were studied. The models not discussing the process at an abstract level were excluded. Therefore, thirteen (n=13) of the studied models were included in our analysis. The results indicated that published abstract models lack preserving the integrity of digital evidence and protecting the basic human rights as explicit overarching umbrella principles. To overcome this problem, we proposed an extension to Reith's abstract digital forensics model explicating preservation of integrity and protection of human rights as the two necessary umbrella principles.",35,,812,821,Human rights; Information system; Digital evidence; Computer security; Computer science; Process (engineering); Engineering ethics; Digital forensics,,,,,https://dblp.uni-trier.de/db/conf/kes/kes2014.html#SaleemPB14 https://core.ac.uk/display/82554968 http://www.diva-portal.org/smash/record.jsf?pid=diva2:773761 https://www.researchgate.net/profile/Ibrahim_Baggili/publication/265848150_Extended_abstract_digital_forensics_model_with_preservation_and_protection_as_umbrella_principles/links/541e2d720cf2218008d1dd10.pdf https://www.sciencedirect.com/science/article/abs/pii/S1877050914012113 https://www.sciencedirect.com/science/article/pii/S1877050914012113 https://core.ac.uk/download/pdf/82554968.pdf,http://dx.doi.org/10.1016/j.procs.2014.08.246,,10.1016/j.procs.2014.08.246,2080628430,,0,001-009-008-665-240; 001-135-038-170-705; 002-633-335-300-244; 009-701-742-236-493; 011-972-444-921-827; 017-840-378-634-021; 019-505-819-376-748; 019-698-064-288-240; 019-831-293-743-518; 020-944-423-224-895; 021-274-925-963-096; 021-850-998-857-676; 032-697-093-668-898; 035-223-520-491-228; 035-877-258-121-493; 038-668-970-194-854; 041-227-773-004-745; 043-557-221-344-121; 045-581-544-307-619; 062-325-585-829-185; 065-452-675-566-99X; 067-545-085-582-063; 076-578-517-786-850; 078-072-950-053-679; 080-145-245-150-605; 094-587-727-381-031; 097-723-876-253-714; 110-079-538-894-548; 111-741-773-111-021; 124-912-663-881-389; 132-355-634-397-986; 138-304-979-688-517; 145-002-823-706-838; 154-446-346-619-232; 159-094-605-033-945; 160-240-603-104-314; 178-883-713-153-793; 181-095-475-426-346; 184-948-841-629-735; 199-745-676-923-766,15,true,,gold
114-239-357-516-674,A Study of Mobile Forensic Tools Evaluation on Android-Based LINE Messenger,,2018,journal article,International Journal of Advanced Computer Science and Applications,21565570; 2158107x,The Science and Information Organization,," Riadi; Abdul Fadlil; Ammar Fauzan","The limitation of forensic tool and the mobile device’s operating system are two problems for researchers in mobile forensics field. Nevertheless, some kinds of forensic tools testing in several devices might be helpful in an investigation. Therefore, the evaluation of forensic tool is one gate to reach the goal of a digital forensics study. Mobile forensics as one of the digital forensics branch that focusing on data recovery process on mobile devices has some problems in the analytical ability because of the different features of forensic tools. In this research, the researchers present studies and techniques on tools ability and evaluated them based on digital evidence of LINE analysis. The experiment was combined VV methods and NIST standard forensic methods to produce a model of forensic tool evaluation steps. As the result of the experiment, Oxygen Forensic has 61.90% of index number and MOBILedit Forensic has the highest index number at 76.19% in messenger application analysis. This research has successfully assessed the performance of forensic tools.",9,10,,,Forensic science; Mobile device; Data science; Digital evidence; Computer science; Android (operating system); Mobile device forensics; Digital forensics,,,,,https://thesai.org/Publications/ViewPaper?Volume=9&Issue=10&Code=IJACSA&SerialNo=24 https://thesai.org/Downloads/Volume9No10/Paper_24-A_Study_of_Mobile_Forensic_Tools.pdf,http://dx.doi.org/10.14569/ijacsa.2018.091024,,10.14569/ijacsa.2018.091024,2900096525,,0,000-225-165-729-99X; 008-717-383-265-216; 021-039-461-635-181; 055-473-899-043-485; 075-128-417-091-483; 087-287-435-836-200; 089-695-854-791-989; 185-798-265-234-254,7,true,cc-by,gold
114-473-027-477-559,Distributed Network Forensics Framework: A Systematic Review,2015-06-18,2015,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Gurpal Singh Chhabra; Prashant Kumar Singh,"Network forensics is a branch of digital forensics, which applies to network security. It is used to relate monitoring and analysis of the computer network traffic, that helps us in collecting information and digital evidence, for the protection of network that can use as firewall and IDS. Firewalls and IDS can’t always prevent and find out the unauthorized access within a network. This paper presents an extensive survey of several forensic frameworks. There is a demand of a system which not only detects the complex attack, but also it should be able to understand what had happened. Here it talks about the concept of the distributed network forensics. The concept of the Distributed network forensics is based on the distributed techniques, which are useful for providing an integrated platform for the automatic forensic evidence gathering and important data storage, valuable support and an attack attribution graph generation mechanism to depict hacking events.",119,19,31,35,Forensic science; Network security; Firewall (construction); Computer data storage; Data science; Digital evidence; Computer science; Network forensics; Digital forensics; Hacker,,,,,https://www.ijcaonline.org/archives/volume119/number19/21178-4201 https://research.ijcaonline.org/volume119/number19/pxc3904201.pdf http://ui.adsabs.harvard.edu/abs/2015IJCA..119s..31S/abstract,http://dx.doi.org/10.5120/21178-4201,,10.5120/21178-4201,2335966069,,0,004-706-447-836-905; 015-503-477-862-142; 018-352-322-450-825; 027-099-591-941-569; 027-265-141-482-204; 032-244-297-444-421; 035-829-068-594-103; 038-668-970-194-854; 042-268-262-351-304; 044-353-273-186-518; 073-744-995-689-459; 089-048-294-489-077; 128-489-282-993-184; 142-226-580-142-17X; 161-527-786-273-341,7,true,,green
114-642-612-579-69X,PERANAN ILMU DIGITAL FORENSIK TERHADAP PENYIDIKAN KASUS PERETASAN WEBSITE,2020-07-14,2020,journal article,Vol. 21 No 1 April 2020,24422274,Universitas Pasundan,,Synthiana Rachmie,"Digital forensic is part of forensic science being used for investigation and cases inquiry in terms of digital datafinding. This research focusedon understandingthe application of investigator’s expertise on digital forensic to support identification process of a case to obtain evidence in a relatively fast and precise time and to reveal the motive and mens rea behind the act of the offender. Conceptual approach was used in this research alongsidethe case approach. The findings showed that digital forensic science has been applied by investigators however it cannot be maximal for it also depends on what case the investigator is working on. In the case of website hacking, investigator used internet/network forensic through surveillance and collecting evidence as leads. It is suggested that every investigator should learn and master digital forensic science to support their expertise and other non-legal knowledge and it is vital to provide sufficientfacilities and infrastructures to obtain a comprehensive investigation.",,21,104,127,,,,,,http://dx.doi.org/10.23969/litigasi.v21i1.2388,http://dx.doi.org/10.23969/litigasi.v21i1.2388,,10.23969/litigasi.v21i1.2388,3049232542,,0,022-036-544-197-474; 052-054-657-975-487; 055-086-544-213-027; 075-591-424-638-445; 076-463-766-205-148; 086-018-338-372-932; 086-586-745-336-678; 104-993-530-236-37X; 113-002-819-576-830; 118-397-112-434-709; 119-753-128-756-504,0,true,cc-by,gold
114-976-379-033-024,Review of the accreditation of digital forensics in China,2018-07-03,2018,journal article,Forensic sciences research,24711411; 20961790,Informa UK Limited,England,Hong Guo; Junlei Hou,"As a result of the many developments in information technology, digital evidence plays an increasingly important role in criminal and civil litigation. Because digital evidence is necessary for litigation, the judicial system must be assured of its accuracy, reliability, and verifiability, which can be assured by accreditation. This paper focuses on a comparison of the evolution of the accreditation of digital forensics internationally and domestically, discusses the existing problems that such accreditation encounters, and proposes the corresponding solutions. Moreover, this paper discusses the future of digital forensic laboratory accreditation and its implementation.",3,3,194,201,Engineering management; Information technology; Engineering; China; Digital evidence; Civil litigation; Reliability (statistics); Accreditation; Digital forensics,Accreditation; digital forensics; forensic science; methodology; personnel training,,,National Key Research and Development Program of China; Shanghai Forensic Service Platform; Shanghai Key Laboratory of Forensic Medicine,https://pubmed.ncbi.nlm.nih.gov/30483669/ https://doaj.org/article/8f9b08b437904df595539a131ea9c9a5 https://www.tandfonline.com/doi/full/10.1080/20961790.2018.1503526 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6201810 https://europepmc.org/article/MED/30483669,http://dx.doi.org/10.1080/20961790.2018.1503526,30483669,10.1080/20961790.2018.1503526,2895746766,PMC6201810,0,085-669-579-012-375,4,true,"CC BY, CC BY-NC",gold
115-332-981-445-059,Forensic analysis in Mobile Cloud Computing architecture,2020-05-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yugal Pathak,"Data has become a bigger challenge to handle in mobile networks, today. In case of mobile devices data needs to be processed in large amounts so insufficient space issues may occur in case of low hardware configurations. For this, cloud platform provides ease of migrating apps to various places without giving platform dependency, space issues and also giving better data processing on low hardware costs. But is highly susceptible to malware attacks and data loss due to various factors and in case of digital data forensics becomes a greater challenge. In this paper, we present an overview of MCC and digital forensics, focusing on its key aspects and significant forensic challenges faced by digital investigators in MCC. The purpose of this paper is to provide a comprehensive understanding about forensic research challenges and re-direct researchers towards new research areas.",,,25,30,Computer architecture; Architecture; Mobile cloud computing; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2020.02.02.04,http://dx.doi.org/10.46293/4n6/2020.02.02.04,,10.46293/4n6/2020.02.02.04,3021049698,,0,,0,false,,
115-364-165-954-740,Design of Image Copy-Paste Forensics System Based on Moment Invariants,2021-11-01,2021,journal article,International Journal for Innovation Education and Research,24112933; 24113123,International Journal for Innovation Education and Research,,Jingyi Shen; Yun Yao; Hao Mei,"Copy-paste tampering is a common type of digital image tampering, which refers to copying a part of the image area in the same image, and then pasting it into another area of the image to generate a forged image, so as to carry out malicious operations such as fraud and framing. This kind of malicious forgery leads to the security problem of digital image. The research of digital image copy paste forensics has important theoretical significance and practical value. For digital image copy-paste tampering, this paper is based on moment invariant image copy paste tampering detection algorithm, and use Matlab software to design the corresponding tampering forensics system.",9,11,552,555,Image (mathematics); Artificial intelligence; Copy paste; Computer vision; Computer science; Moment (mathematics),,,,,https://ijier.net/ijier/article/download/3547/2387,http://dx.doi.org/10.31686/ijier.vol9.iss11.3547,,10.31686/ijier.vol9.iss11.3547,3216156770,,0,013-129-292-733-467; 040-331-306-755-615; 055-501-435-466-928,0,true,cc-by-nd,gold
115-729-001-970-735,Video steganalysis to obstruct criminal activities for digital forensics: a survey,,2018,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Mukesh Dalal; Mamta Juneja,,10,4,338,338,Steganalysis; Digital forensics; Computer science; Digital evidence; Computer security; Computer forensics; Steganography; Criminal investigation; Internet privacy; Artificial intelligence; Criminology; Image (mathematics); Psychology,,,,,,http://dx.doi.org/10.1504/ijesdf.2018.095122,,10.1504/ijesdf.2018.095122,,,0,,8,false,,
116-473-356-479-419,"The phone reveals your motion: Digital traces of walking, driving and other movements on iPhones",,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Jan Peter van Zandwijk; Abdul Boztas,,37,,301170,,Motion (physics); Human–computer interaction; Cache; Reliability (computer networking); Phone; Everyday life; Movement (music); Differential analysis; Drop tests; Computer science,,,,,https://www.sciencedirect.com/science/article/abs/pii/S2666281721000780 https://doi.org/10.1016/j.fsidi.2021.301170 https://dblp.uni-trier.de/db/journals/di/di37.html#ZandwijkB21,http://dx.doi.org/10.1016/j.fsidi.2021.301170,,10.1016/j.fsidi.2021.301170,3163998125,,0,039-158-280-114-980,1,false,,
116-690-629-016-841,X-Ways Forensics Platform For Digital Forensics Examiners,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Seth Adjei Gyimah,"Digital Forensics & Cyber Security Graduate Programme Department Of Information Systems & Innovations Ghana Institute of Management & Public Administration Greenhill, Accra, Ghana E-mails: sethadjeigyimah@gmail.com/ seth-adjei.gyimah@st.gimpa.edu.gh Phone: +233244475540 ABSTRACT Crime has evolved over the years from its traditional form to digital crimes. Those who commit such crimes use advanced and sophisticated tools, equipment and techniques to perpetuate such crimes. In order to effectively and efficiently investigate, examine and gather evidence from such complex crimes, digital examiners have to employ various tools and techniques to analyze, extract and recover data as evidence to assist in prosecution of the perpetrators of the crime. This paper analyzes X-Ways Forensics platform which is an application software for forensic examiners as a forensic tool for data extraction, analysis and recovery. Dr. Larry Leibrock, Founder and CTO of eForensics revealed his admiration for X-Ways Forensics application when he said “As a professional forensics examiner, I have used X-Ways Forensics as a forensics instrument in recovering and analyzing digital information. I have tested and validated the professional version and it has proved to be accurate and trustworthy in its reporting. I have the highest level of confidence in X-Ways Forensics efficacy in digital forensics cases. I am confident that the tool and my use of this instrument would stand legal review and opposing challenge.” Keywords: X_ways, Cybersecurity, Forensics, Detection, Cyber space, Examiners BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Seth Adjei Gyimah (2022): X-Ways Forensics Platform For Digital Forensics Examiners Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 353-356 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P56",1,1,353,356,Digital forensics; Digital evidence; Computer forensics; Computer science; Computer security; Commit; Internet privacy; Database,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p56,,10.22624/aims/crp-bk3-p56,,,0,,0,true,,bronze
117-070-059-884-741,Mobile Forensics: Repeatable and Non-Repeatable Technical Assessments.,2022-09-19,2022,journal article,"Sensors (Basel, Switzerland)",14248220; 14243210,Multidisciplinary Digital Publishing Institute (MDPI),Switzerland,Raffaele Cuomo; Davide D'Agostino; Mario Ianulardo,"This paper presents several scenarios where digital evidence can be collected from mobile devices, their legal value keeping untouched. The paper describes a robust methodology for mobile forensics developed through on-field experiences directly gained by the authors over the last 10 years and many real court cases. The results show that mobile forensics, digital analysis of smartphone Android or iOS can be obtained in two ways: on the one hand, data extraction must follow the best practice of the repeatability procedure; on the other hand, the extraction of the data must follow the best practice of the non-repeatability procedure. The laboratory study of the two methods for extracting digital data from mobile phones, for use as evidence in court trials, has shown that the same evidence can be obtained even when the procedure of unavailability of file mining activities has been adopted. Indeed, thanks to laboratory tests, the existence of multiple files frequently and continuously subjected to changes generated by the presence of several hashes found at forensic extractions conducted in very short moments of time (sometimes not exceeding 15 min) has been proven. If, on the other hand, the examination of a device is entrusted to a judicial police officer in order to conduct a forensic analysis to acquire data produced and managed by the user (such as images, audio, video, documents, SMS, MMS, chat conversations, address book content, etc.) we have sufficient grounds to believe that such examination can be organized according to the system of repeatable technical assessments.",22,18,7096,7096,Unavailability; Computer science; Digital forensics; Android (operating system); Mobile device; Digital evidence; Computer security; Multimedia; World Wide Web; Engineering; Reliability engineering; Operating system,computer forensics; cybercrime; digital analysis; digital evidence; forensic extraction; mobile forensics; repeatability; unrepeatability,"Cell Phone; Computers, Handheld; Forensic Medicine; Forensic Sciences; Smartphone",,,,http://dx.doi.org/10.3390/s22187096,36146443,10.3390/s22187096,,PMC9505885,0,,0,true,cc-by,gold
117-095-420-741-153,On Integrating Mobile Applications into the Digital Forensic Investigative Process,,2013,journal article,International Journal of Advanced Computer Science and Applications,2158107x; 21565570,The Science and Information Organization,,April Tanner; Soniael Duncan,"What if a tool existed that allowed digital forensic investigators to create their own apps that would assist them with the evidence identification and collection process at crime scenes? First responders are responsible for ensuring that digital evidence is examined in such a way that the integrity of the evidence is not jeopardized. Furthermore, they play a pivotal part in preserving evidence during the collection of evidence at the crime scene and transport to the laboratory. This paper proposes the development of a mobile application that can be developed for or created by a first responder to assist in the identification, acquisition, and preservation of digital evidence at a crime scene. Keywords—mobile device forensics; digital forensics; forensic process, forensic models; MIT App Inventor I. INTRODUCTION Digital Forensics involves the identification, preservation, collection, examination, and analysis of digital devices. These devices include, but are not limited to, digital cameras, flash drives, computers, internal and external memory drives, mobile devices, etc. Some mobile devices that can be examined include graphic tablets, cell phones, smart phones, CDs, DVDs, and MP3s. Digital evidence has to be collected under certain parameters as to maintain the integrity of the investigation. This process is referred to as a forensic process. While there is not a concrete set of rules for the forensic process there are models that have been proposed to aid in trying to eliminate damage and contamination that can occur at crime scenes. This paper identifies the types of damage and contamination that can occur at crime scenes when inexperienced first responders arrive at the scene; in addition, we discuss the models that address the preservation and acquisition of evidence at crime scenes, and also explore possible solutions to aid first responders in utilizing techniques to preserve digital evidence at the scene of the crime. In this paper, we propose the development and implementation of a mobile application that first responders can create and use as a guide when identifying, preserving, collecting, and securing evidence. As a result, this application would be useful in assisting first responders during the acquisition process of a digital forensics investigation.",4,8,,,Forensic science; Crime scene; Mobile device; Data science; Digital evidence; Computer security; Computer science; Network forensics; Computer forensics; Mobile device forensics; Identification (information); Digital forensics,,,,,https://thesai.org/Downloads/Volume4No8/Paper_9-On_Integrating_Mobile_Applications_into_the_Digital_Forensic.pdf https://thesai.org/Publications/ViewPaper?Volume=4&Issue=8&Code=IJACSA&SerialNo=9,http://dx.doi.org/10.14569/ijacsa.2013.040809,,10.14569/ijacsa.2013.040809,2145109049,,0,100-246-306-965-821; 171-464-767-472-377,1,true,cc-by,hybrid
117-319-780-113-791,Teaching computer forensics course: challenges and opportunities,2017-06-01,2017,journal article,Journal of Computing Sciences in Colleges,19374763,,,Yana Kortsarts,"Computer forensics, still a relatively new discipline in computer security, focuses on finding digital evidence after a computer security incident has occurred. Computer forensics is the scientific examination and analysis of data held on, or retrieved from, computer storage media in such a way that the information can be used as evidence in a court of law. Computer evidence is often transparently created by the operating system without the knowledge of the computer user. The information may be hidden from view. To find it, special forensic software tools and techniques are required. Technology is expanding at a fast rate, and along with the increased use of computers, the Internet, and digital devices comes an increase in digital crime. With the increased use of computers to commit crimes, a need has rapidly developed for forensic experts to extract useful information from computer evidence. Computer forensics is a fast-growing field with high long-term projected demand for trained professionals.",32,6,208,209,The Internet; World Wide Web; Forensic science; Computer literacy; Data science; Digital evidence; Computer science; Network forensics; Information and Computer Science; Computer forensics; Digital forensics,,,,,https://dl.acm.org/citation.cfm?id=3069693,https://dl.acm.org/citation.cfm?id=3069693,,,2727309882,,0,074-246-041-325-050; 085-214-277-668-01X,0,false,,
117-509-642-665-78X,A Study on Development of Digital Forensic Capability Evaluation Indices,2015-10-31,2015,journal article,Journal of the Korea Institute of Information Security and Cryptology,15983986,Korea Institute of Information Security and Cryptology,,Hee-il Park; Jongseong Yoon; Sangjin Lee,"ABSTRACT With the acceleration of information digitization caused by fas t growth of Information Technology, the application of digital forensics has increased but it is underestimated becaus e digital evidence is easy to forge. Especially, the evaluation of the reliability of digital forensics organization is judged onl y by judges domestically because there is no objective verification system or evaluation method of the capability of d igital forensics organization. Therefore, the evaluation model and indices of the capability of digital forensics concentrated on the digital forensics organization, personnel, technology, facilities and the procedure in domestic justice system was pre sented in this research after reviewing the domestic and foreign evaluation method and the standard of the capability of digital forensics and informati on security. The standard for judicial evaluation of digital evidence and composition, manage ment, evaluation of digital forensics organization would be presented based on this research.Keywords: Digital Forensics, Digital Forensic Capability Evaluation, Cap ability Evaluation Indices",25,5,1153,1166,Information technology; Digitization; Digital evidence; Verification system; Evaluation methods; Computer security; Computer science; Reliability (statistics); Digital forensics,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002042112 http://koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2015_v25n5_1153,http://dx.doi.org/10.13089/jkiisc.2015.25.5.1153,,10.13089/jkiisc.2015.25.5.1153,2343682835,,0,029-632-996-742-459; 035-200-969-642-039; 067-938-325-014-282; 083-578-059-674-117,1,true,,bronze
117-594-679-776-482,A Proposed Model of Digital Forensic on Cloud Computing Security Infrastructure,2018-07-30,2018,journal article,International Journal of Innovation in Enterprise System,25803050,Telkom University,,Mohammad Hafiz Hersyah,"Over the past decades, practitioners and researchers have made remarkable achievements in digital forensic. The abilities to conquer major technical obstacles are bestowing practitioners greater access to digital evidence. Sophisticated forensic techniques and tools are being developed to assist forensic acquisition and extraction of volatile data, inspection of remote repositories system and analysis of network traffic. Computer forensic is a comprehensive work that based on several attributes that are : objectivity, relevance and legitimacy to compose a system model that projected to be an electronic evidence forensic system. Latest studies show that the rapid growing of cloud computing facilities usage that has enable various improvements as part of the innovation process at organisations. Information systems are in frequently exposed to various types of threats which able to trigger different types of bad consequences as more and more information stored, problems arise especially about security information technology risk aspects.; Keywords—computer forensic, cloud computing, electronic evidence forensic system, security, information technology risk, information system",2,02,18,23,System model; Information system; Cloud computing security; IT risk; Data science; Digital evidence; Computer science; Cloud computing; Digital forensics; Relevance (information retrieval),,,,,https://www.neliti.com/publications/349400/a-proposed-model-of-digital-forensic-on-cloud-computing-security-infrastructure https://ijies.sie.telkomuniversity.ac.id/index.php/IJIES/article/download/21/19 https://core.ac.uk/download/pdf/295356391.pdf,http://dx.doi.org/10.25124/ijies.v2i02.21,,10.25124/ijies.v2i02.21,2912999517,,0,035-448-415-847-226; 190-025-622-260-327,0,true,,gold
117-843-664-085-149,A Forensic Email Analysis Tool Using Dynamic Visualization,,2017,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Johannes Stadlinger; Andreas Dewald,,12,1,6,,World Wide Web; Dynamic visualization; Visualization; Computer science; Network forensics; Computer forensics,,,,,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#StadlingerD17 https://commons.erau.edu/cgi/viewcontent.cgi?article=1413&context=jdfsl https://commons.erau.edu/jdfsl/vol12/iss1/6/ https://doi.org/10.15394/jdfsl.2017.1413,http://dx.doi.org/10.15394/jdfsl.2017.1413,,10.15394/jdfsl.2017.1413,2624808154,,0,038-368-734-159-243; 044-641-967-355-570; 052-049-593-503-686; 103-309-933-900-466; 134-927-490-231-285; 158-363-867-842-044,4,true,cc-by-nc,gold
118-103-890-724-159,Pypette: A Platform for the Evaluation of Live Digital Forensics,2012-10-01,2012,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Brett Lempereur; Madjid Merabti; Qi Shi,"Live digital forensics presents unique challenges with respect to maintaining forensic soundness, but also offers the ability to examine information that is unavailable to quiescent analysis. Any perturbation of a live operating system by a forensic examiner will have far-reaching effects on the state of the system being analysed. Numerous approaches to live digital forensic evidence acquisition have been proposed in the literature, but relatively little attention has been paid to the problem of identifying how the effects of these approaches, and their improvements over other techniques, can be evaluated and quantified. In this paper, the authors present Pypette, a novel platform enabling the automated, repeatable analysis of live digital forensic acquisition techniques.",4,4,31,46,Computer security; Soundness; Computer science; Computer forensics; Digital forensics,,,,,https://www.igi-global.com/article/pypette-platform-evaluation-live-digital/74804 https://doi.org/10.4018/jdcf.2012100103 http://doi.org/10.4018/jdcf.2012100103 https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf4.html#LempereurMS12,http://dx.doi.org/10.4018/jdcf.2012100103,,10.4018/jdcf.2012100103,2009967747,,0,002-495-833-326-831; 004-441-167-148-170; 005-296-771-590-748; 010-240-301-659-307; 035-448-415-847-226; 035-467-233-982-594; 040-911-574-660-701; 042-880-741-738-793; 050-513-243-638-138; 054-507-171-824-189; 089-048-294-489-077; 093-448-702-012-591; 097-567-011-227-46X; 099-520-470-483-918; 106-885-306-836-498; 120-462-880-448-150; 142-816-347-811-541,2,false,,
118-444-471-106-597,KOMPARATIVNA ANALIZA OPEN-SOURCE ALATA ZA DIGITALNU FORENZIKU MOBILNIH UREĐAJA,2021-11-07,2021,journal article,Zbornik radova Fakulteta tehničkih nauka u Novom Sadu,25605925; 0350428x,Faculty of Technical Sciences,,Bojan Trifković,"The paper deals with the presentation of open-source tools for digital forensics of mobile devices, with a part dedicated to digital forensics itself as a technological discipline. The paper describes how to use certain tools, as well as their advantages and disadvantages.",36,11,1910,1913,Mobile device; Presentation; Computer science; Multimedia; Digital forensics,,,,,http://ftn.uns.ac.rs/ojs/index.php/zbornik/article/view/1831,http://dx.doi.org/10.24867/15be14trifkovic,,10.24867/15be14trifkovic,3217518061,,0,,0,true,,bronze
118-504-831-882-891,DIGITAL FORENSIC READINESS FRAMEWORK BASED ON HONEYPOT AND HONEYNET FOR BYOD,2021-09-07,2021,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Audrey Asante; Vincent Amankona,,16,2,2,,Honeypot; Computer security; Computer science; Digital forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1706&context=jdfsl https://commons.erau.edu/jdfsl/vol16/iss2/2/,https://commons.erau.edu/jdfsl/vol16/iss2/2/,,,3202317257,,0,046-163-300-072-846; 062-305-572-479-624; 109-180-764-457-953; 113-529-751-754-389,0,true,cc-by-nc,gold
118-589-466-619-969,Signature File Analysis Using The National Institute Standard Technology Method Base on Digital Forensic Concepts,2020-09-30,2020,journal article,Jurnal Informatika Universitas Pamulang,26224615; 25411004,Universitas Pamulang,,Randi Rizal; Ruuhwan Ruuhwan; Septian Chandra,"The number of crimes committed by utilizing advances in information technology such as information leakage, embezzlement of money in banks, credit card fraud, pornography, terrorism, drug trafficking and many more are definitely related to the name digital data. File signatures or magic numbers are one of the forensic science techniques that assist in processing this digital data. The method used in this research is the National Institute Standards Technology method to analyze the authenticity of digital data and the method of proof to obtain valid evidence during the identification process of data or file content. This research is presented in the form of an analysis of the use of signature files in investigations to determine the type of file in the case of leaking company information xyz, the research stage uses evidence handling procedures in the laboratory. Contributions made after conducting a series of case investigations using signature files have been successfully carried out using the Access Data FTK Imager application version 4.2.0 and WinHex version 18.6. Signature files can be used for case investigations in identifying and verifying file types so that files that have been modified can be restored and can be read by the operating system by checking file types through hexadecimal values in the header file (file prefix) that show the characteristics of each type file so that the file type can be found and the file can be read by the operating system.",5,3,364,370,Hexadecimal; Digital data; Information leakage; Digital evidence; Computer science; Header; Database; Identification (information); Digital forensics; File format,,,,,http://openjournal.unpam.ac.id/index.php/informatika/article/download/6073/pdf http://openjournal.unpam.ac.id/index.php/informatika/article/view/6073 https://core.ac.uk/download/337610059.pdf,http://dx.doi.org/10.32493/informatika.v5i3.6073,,10.32493/informatika.v5i3.6073,3094746511,,0,005-383-648-053-571; 013-731-482-888-787; 029-748-683-221-796; 058-734-389-352-474; 079-499-568-978-91X; 138-109-881-604-975,0,true,cc-by-nc,gold
118-838-969-146-870,Taxonomy of Challenges for Digital Forensics.,2015-07-14,2015,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Nickson M. Karie; Hein S. Venter,"Since its inception, over a decade ago, the field of digital forensics has faced numerous challenges. Despite different researchers and digital forensic practitioners having studied and analysed various known digital forensic challenges, as of 2013, there still exists a need for a formal classification of these challenges. This article therefore reviews existing research literature and highlights the various challenges that digital forensics has faced for the last 10 years. In conducting this research study, however, it was difficult for the authors to review all the existing research literature in the digital forensic domain; hence, sampling and randomization techniques were employed to facilitate the review of the gathered literature. Taxonomy of the various challenges is subsequently proposed in this paper based on our review of the literature. The taxonomy classifies the large number of digital forensic challenges into four well-defined and easily understood categories. The proposed taxonomy can be useful, for example, in future developments of automated digital forensic tools by explicitly describing processes and procedures that focus on addressing specific challenges identified in this paper. However, it should also be noted that the purpose of this paper was not to propose any solutions to the individual challenges that digital forensics face, but to serve as a survey of the state of the art of the research area.",60,4,885,893,Engineering; Domain (software engineering); Data science; Randomization techniques; Poison control; Research literature; Field (computer science); Computer security; State (computer science); Digital forensics; Taxonomy (general),digital forensic challenges; digital forensics; forensic sciences; formal classification of challenges; taxonomy,,,,https://repository.up.ac.za/bitstream/2263/51104/1/Karie_Taxonomy_2015.pdf https://repository.up.ac.za/handle/2263/51104 https://dialnet.unirioja.es/servlet/articulo?codigo=5312745 https://www.ncbi.nlm.nih.gov/pubmed/26175261 https://onlinelibrary.wiley.com/doi/10.1111/1556-4029.12809 https://europepmc.org/article/MED/26175261 https://pubmed.ncbi.nlm.nih.gov/26175261/,http://dx.doi.org/10.1111/1556-4029.12809,26175261,10.1111/1556-4029.12809,2097392047,,0,004-110-423-124-981; 005-069-037-045-980; 005-102-962-333-180; 009-671-935-335-418; 016-363-794-426-365; 021-495-249-615-203; 021-850-998-857-676; 033-877-222-136-260; 036-132-248-316-123; 040-524-943-701-266; 044-026-347-309-827; 051-288-268-472-187; 058-723-704-218-926; 063-195-309-093-275; 067-927-462-113-654; 074-543-232-543-385; 076-870-357-267-514; 077-532-025-251-756; 084-559-361-318-175; 089-048-294-489-077; 098-748-261-333-651; 115-531-623-920-069; 130-217-725-914-477; 134-927-490-231-285; 179-703-555-795-891,38,true,,green
118-968-004-680-589,The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics,,2020,journal article,International Journal of Digital Crime and Forensics,19416210; 19416229,IGI Global,United States,Aine MacDermott; Thar Baker; Paul Buck; Farkhund Iqbal; Qi Shi,"The Internet of Things (IoT) represents the seamless merging of the real and digital world, with new devices created that store and pass around data. Processing large quantities of IoT data will proportionately increase workloads of data centres, leaving providers facing new security, capacity and analytics challenges. Handling this data conveniently is a critical challenge, as the overall application performance is highly dependent on the properties of the data management service. This paper explores the challenges posed by cybercrime investigations and digital forensics concerning the shifting landscape of crime – the IoT and the evident investigative complexity – moving to the Internet of Anything (IoA)/Internet of Everything (IoE) era. IoT forensics requires a multi-faceted approach where evidence may be collected from a variety of sources such as sensor devices, communication devices, fridges, cars and drones, to smart swarms and intelligent buildings.",12,1,1,13,The Internet; Variety (cybernetics); Data management; Cybercrime; Service (systems architecture); Computer security; Computer science; Drone; Analytics; Digital forensics,,,,,https://researchonline.ljmu.ac.uk/id/eprint/9496/ https://dblp.uni-trier.de/db/journals/ijdcf/ijdcf12.html#MacDermottBBIS20 https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902221890881455 https://www.igi-global.com/article/the-internet-of-things-challenges-and-considerations-for-cybercrime-investigations-and-digital-forensics/240648 https://core.ac.uk/download/pdf/237431131.pdf,http://dx.doi.org/10.4018/ijdcf.2020010101,,10.4018/ijdcf.2020010101,2981336747,,0,004-916-495-289-390; 005-630-640-664-939; 010-196-658-878-056; 015-264-924-343-905; 017-325-802-595-724; 017-840-378-634-021; 023-858-572-607-02X; 025-319-861-345-580; 027-265-141-482-204; 029-748-683-221-796; 038-668-970-194-854; 039-999-270-718-277; 040-132-585-260-276; 041-350-452-684-86X; 046-357-391-782-442; 047-125-525-662-686; 047-492-292-707-760; 051-738-543-964-887; 063-101-076-395-60X; 083-312-117-071-763; 111-488-239-742-003; 112-181-239-331-730; 131-373-334-471-817; 133-397-275-695-990; 134-927-490-231-285; 145-062-913-009-934; 162-110-149-751-921,6,true,,green
118-998-556-606-739,The Impact of Digital Evidence in Forensic Laboratories,,2021,journal article,Forensic Science International: Synergy,2589871x,Elsevier BV,,Tracy Walraven,,3,,100178,,Engineering; Forensic science; Data science; Digital evidence,,,,,https://api.elsevier.com/content/article/PII:S2589871X21000486?httpAccept=text/xml,http://dx.doi.org/10.1016/j.fsisyn.2021.100178,,10.1016/j.fsisyn.2021.100178,3208116366,,0,,0,true,"CC BY, CC BY-NC-ND",gold
119-046-468-612-395,Forensic Examination Of Android Mobile Devices,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Aswathi Balachandran; Ribu Hassini,,,,,,Mobile device; Forensic examination; Computer science; Multimedia; Android (operating system),,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.14,http://dx.doi.org/10.46293/4n6/2020.02.04.14,,10.46293/4n6/2020.02.04.14,3097389684,,0,,0,false,,
119-423-654-801-14X,Performance measurement for mobile forensic data acquisition in Firefox OS,,2014,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Mohd Najwadi Yusoof; Ramlan Mahmod; Ali Dehghantanha,"Mozilla Corporation has recently released a Linux-based open source operating system, namely Firefox OS. The arrival of this Firefox OS has created new challenges, concentrations and opportunities for digital investigators. Currently, Firefox OS is still not fully supported by most of the existing mobile forensic tools. Even when the phone is detected as Android, only pictures from removable memory was able to be captured. Furthermore, the internal data acquisition is still not working. Therefore, there are very huge opportunities to explore the Firefox OS on every stages of mobile forensic procedures. This paper will present an approach for mobile forensic data acquisition in a forensically sound manner from a Firefox OS running device. This approach will largely use the UNIX dd command to create a forensic image from the Firefox OS running device. Apart from that, performance measurement will be made to find the best block size for acquisition process in Firefox OS.",3,3,130,140,Operating system; Unix; World Wide Web; Performance measurement; Data acquisition; Information system; Phone; Open source; Computer science; Android (operating system),,,,,http://sdiwc.net/digital-library/performance-measurement-for-mobile-forensic-data-acquisition-in-firefox-os http://psasir.upm.edu.my/id/eprint/34877/ https://core.ac.uk/download/153815451.pdf,http://dx.doi.org/10.17781/p001333,,10.17781/p001333,2039394463,,0,000-116-031-001-044; 005-899-402-239-840; 008-271-908-703-378; 013-930-958-675-421; 014-510-444-730-433; 019-960-255-195-267; 023-767-546-806-478; 026-641-935-890-517; 030-351-009-711-953; 030-674-871-669-121; 031-259-255-251-803; 031-982-129-275-33X; 043-817-597-356-962; 048-141-687-795-752; 049-979-701-385-094; 065-459-442-784-779; 068-192-150-986-714; 079-699-370-692-859; 082-520-594-872-109; 084-615-004-577-981; 085-503-013-586-695; 088-938-096-763-07X; 097-103-869-237-065; 102-182-774-566-752; 117-614-574-133-806; 142-657-351-097-509; 154-808-033-424-405; 159-516-414-584-397; 177-615-975-039-432; 181-008-425-506-841,11,true,,
119-712-669-804-088,Public Security & Digital Forensics in the United States: The Continued Need for Expanded Digital Systems for Security,,2017,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Deborah G. Keeling; Michael Losavio,,12,3,47,60,Business; Law enforcement; Public security; Computer security; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#KeelingL17 https://commons.erau.edu/jdfsl/vol12/iss3/6/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1452&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2017.1452,,10.15394/jdfsl.2017.1452,2788085562,,0,007-790-059-029-953; 012-661-000-867-434; 027-552-429-711-055; 031-234-153-523-379; 098-323-575-091-372; 132-355-634-397-986,2,true,cc-by-nc,gold
119-855-179-161-858,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,38,,301279,301279,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00197-9,,10.1016/s2666-2817(21)00197-9,,,0,,0,true,,bronze
120-503-453-870-160,Strengthening trust: Integration of digital investigation and forensic science,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Eoghan Casey,,33,,301000,,Engineering; Forensic science; Engineering ethics,,,,,https://dblp.uni-trier.de/db/journals/di/di33.html#Casey20b https://www.sciencedirect.com/science/article/pii/S2666281720302481,http://dx.doi.org/10.1016/j.fsidi.2020.301000,,10.1016/j.fsidi.2020.301000,3038126843,,0,,0,false,,
120-936-178-540-100,Digital forensics investigation jurisprudence: issues of admissibility of digital evidence,2020-07-31,2020,journal article,"Journal of Forensic, Legal & Investigative Sciences",2473733x,Herald Scholarly Open Access,,Abel Yeboah-Ofori; Akoto Derick Brown,"Digital Forensics investigations represent the science and legal process of investigating cybercrimes and digital media or objects to gather evidence. The digital evidence must prove that it has been used to commit a crime or used to gain unauthorized access. Digital Forensics investigations jurisprudence is the theory and philosophy of the study of law and the principles upon which a law is based. For digital evidence to appear at court and be legally admissible, the evidence must be authentic, accurate, complete, and convincing to the jury. Presenting digital forensic evidence at court has proved to be challenging, due to factors such as inadequate chain of custody, not maintaining legal procedures and inadequate evidential integrity. Following legal procedures in evidence gathering at a digital crime scene is critical for admissibility and prosecution. However, inadequate evidence gathering and maintaining accuracy, authenticity, completeness has prevented many cases to be inadmissible at court. This paper aims to discuss digital forensics investigations jurisprudence and the issues of authentic, accurate, complete, and convincing evidence leading to inadmissibility at court. To achieve the applicability of the study, we highlight the legal and technical factors required to harmonize these issues and how it could be addressed. This paper does not follow any forensic investigations process. Rather, it discusses how digital evidence could be admissible irrespective of the process implemented. The observations and outcomes of these legal criteria will contribute to the improvement of the evolving nature of digital evidence gathering phases.",6,1,1,8,Chain of custody; Internet privacy; Crime scene; Digital media; Jury; Legal process; Digital evidence; Computer science; Jurisprudence; Digital forensics,,,,,https://www.scilit.net/article/e17394e85b9e94a3191647c7d867a22e https://repository.uwl.ac.uk/id/eprint/8012/,http://dx.doi.org/10.24966/flis-733x/100045,,10.24966/flis-733x/100045,3080215576,,0,,3,true,cc-by,gold
121-036-341-441-560,A novel octopus based Parkinson’s disease and gender recognition method using vowels,,2019,journal article,Applied Acoustics,0003682x; 1872910x,Elsevier BV,United Kingdom,Turker Tuncer; Sengul Dogan,,155,,75,83,k-nearest neighbors algorithm; Euclidean distance; Support vector machine; Feature selection; Artificial intelligence; Pattern recognition; octopus (software); Feature (machine learning); Computer science; Feature extraction; Pooling,,,,,https://www.sciencedirect.com/science/article/pii/S0003682X19304219,http://dx.doi.org/10.1016/j.apacoust.2019.05.019,,10.1016/j.apacoust.2019.05.019,2947796043,,0,001-965-280-842-39X; 006-169-257-799-439; 007-945-370-599-370; 011-446-103-861-950; 013-912-515-846-763; 015-979-793-981-921; 016-697-858-461-312; 017-956-524-305-731; 024-785-384-743-077; 028-694-305-175-430; 034-701-541-555-865; 037-261-517-317-245; 037-902-883-847-606; 042-563-657-632-399; 044-258-346-677-110; 045-405-761-386-55X; 048-003-882-416-089; 048-406-213-582-617; 048-639-473-094-756; 049-860-251-887-83X; 053-294-748-194-626; 054-676-655-830-312; 057-314-695-164-183; 061-392-301-489-195; 063-352-645-381-15X; 065-179-703-899-640; 066-414-992-554-967; 075-597-189-600-363; 079-404-930-011-126; 081-275-399-657-531; 084-984-040-217-266; 086-598-934-713-75X; 086-736-670-575-770; 088-611-830-138-400; 091-106-410-640-235; 091-135-784-365-402; 092-759-914-505-912; 094-631-836-853-021; 096-349-210-087-058; 098-628-415-652-65X; 102-590-685-204-250; 103-752-355-885-562; 119-532-248-066-410; 143-478-140-082-211; 147-727-426-085-098; 149-363-172-624-204; 159-343-458-647-078; 160-016-424-942-017,32,false,,
121-207-616-071-874,Identifying artefact on Microsoft OneDrive client to support Android forensics,,2017,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Gandeva Bayu Satrya; A. Ahmad Nasrullah; Soo Young Shin,"Microsoft software is perhaps the most widely used around the world. As computing technology has evolved they have been at the cutting edge and have developed a number of groundbreaking and useful applications. Microsoft OneDrive is one such application. OneDrive is a cloud storage service offering 7 GB free storage to users. This technology can be misused and through it laws governing the cyber world violated. Current solutions to this are to perform digital forensics when cybercrime has occurred. This research used two different vendors of Android smartphones as experimentation objects. A model has been developed in this research, which provides instructions for digital mobile forensics analysis in finding artefacts related to the client's activities on OneDrive cloud storage application. These artefacts can be used as digital evidence by digital forensics investigators and the research increases the knowledge of cyber law practitioners.",9,3,269,291,World Wide Web; Cloud storage; Software; Cybercrime; Digital evidence; Computer science; Network forensics; Android (operating system); Mobile device forensics; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2017.085192,http://dx.doi.org/10.1504/ijesdf.2017.085192,,10.1504/ijesdf.2017.085192,2734893936,,0,,3,false,,
121-668-843-429-348,Problem Based Learning in Digital Forensics,2014-07-28,2014,journal article,Innovation in Teaching and Learning in Information and Computer Sciences,14737507,Informa UK Limited,United Kingdom,Alastair Irons; Paula Thomas,AbstractThe purpose of this paper is to compare and contrast the efforts of two universities to address the issue of providing computer forensics students with the opportunity to get involved in the practical aspects of forensic search and seizure procedures. The paper discusses the approaches undertaken by the University of Sunderland and the University of South Wales (Glamorgan) to give the students the opportunity to process a case from the crime scene through to the court room. In order to do this both institutions adopted a problem based learning (PBL) approach – to reflect real-world solutions and encourage students to work in groups to seek further knowledge and understanding of the various processes and procedures – in particular the steps around search and seizure of digital evidence from a crime scene. The PBL activities at Sunderland and Glamorgan were designed in order to help the students understand the processes of digital crime scene analysis and search and seizure procedures and to give th...,,,1,10,Mathematics education; Crime scene; Pedagogy; Order (business); Problem-based learning; Digital evidence; Computer science; Process (engineering); Computer forensics; Search and seizure; Digital forensics,,,,,https://www.tandfonline.com/doi/full/10.11120/ital.2014.00013 https://core.ac.uk/display/74367909 https://core.ac.uk/download/74367909.pdf,http://dx.doi.org/10.11120/ital.2014.00013,,10.11120/ital.2014.00013,2542008930,,0,005-733-361-126-371; 007-790-059-029-953; 014-261-775-435-338; 042-429-973-776-901; 046-474-638-122-984; 052-361-056-422-596; 066-198-497-514-876; 070-048-250-044-834,1,true,cc-by-nc-nd,green
121-931-608-998-802,Identification of User Ownership in Digital Forensic using Data Mining Technique,2012-07-28,2012,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,KM Kumar; Sanjeev Sofat; Naveen Aggarwal; Shreyans K. Jain,"As existing technology used by criminal rapidly changes and growing, digital forensics is also growing and important fields of research for current intelligence, law enforcement and military organizations today. As huge information is stored in digital form, the need and ability to analyze and process this information for relevant evidence has grown in complexity. During criminal activities crime committed use digital devices, forensic examiners have to adopt practical frameworks and methods to recover data for analysis which can comprise as evidence. Data Preparation/ Generation, Data warehousing and Data Mining, are the three essential features involved in the investigation process. The purpose of data mining technique is to find the valuable relationships between data items. This paper proposes an approach for preparation, generation, storing and analyzing of data, retrieved from digital devices which pose as evidence in forensic analysis. Attribute classification model has been presented to categorized user files. The data mining tools has been used to identify user ownership and validating the reliability of the pre-processed data. This work proposes a practical framework for digital forensics on hard drives.",50,4,1,5,Data mining; Data warehouse; Forensic science; Reliability (computer networking); Work (electrical); Data preparation; Law enforcement; Computer science; Process (engineering); Identification (information); Digital forensics,,,,,https://ui.adsabs.harvard.edu/abs/2012IJCA...50d...1K/abstract https://www.ijcaonline.org/archives/volume50/number4/7756-0818 https://research.ijcaonline.org/volume50/number4/pxc3880818.pdf,http://dx.doi.org/10.5120/7756-0818,,10.5120/7756-0818,2099922782,,0,003-448-142-212-67X; 003-868-023-351-977; 009-101-513-978-03X; 037-927-986-476-095; 062-202-545-220-180; 083-366-581-383-158; 094-999-990-049-790; 096-459-953-942-294; 115-547-184-477-216; 125-658-973-713-722; 128-983-879-520-615; 132-355-634-397-986; 136-606-982-080-327,5,true,,green
122-368-421-118-373,Cloud Computing and Digital Forensics Challenges,2016-08-22,2016,journal article,GSTF Journal on computing,,,,Samah Mansour,"Abstract—Nowadays, the storage of computer data is moving rapidly toward cloud computing as an evolving information technology phenomenon. Instead of building, maintaining, and managing a physical Information technology infrastructure, the organizations start to replace the physical infrastructure with remote and virtual environments that are managed by third parties. This shift has a significant impact on forensics investigators, hardware and software vendors, IT experts, law enforcements and corporate audit departments since more crimes are committed with the involvement of computers. Digital forensics helps courts and law enforcement agencies to collect valuable evidence for investigations. This paper presents a general overview of cloud computing and digital forensics. Also, it discusses the major benefits and challenges of using cloud computing on digital forensics.",5,1,,,Information technology; Data; Audit; Law enforcement; Computer security; Computer science; Network forensics; Computer forensics; Cloud computing; Digital forensics,,,,,,,,,2541046143,,0,,1,false,,
123-067-775-038-87X,Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology,,2013,journal article,International Journal of Advanced Computer Science and Applications,2158107x; 21565570,The Science and Information Organization,,Adedayo M. Balogun; Shao Ying Zhu,"Owing to a number of reasons, the deployment of encryption solutions are beginning to be ubiquitous at both organizational and individual levels. The most emphasized reason is the necessity to ensure confidentiality of privileged information. Unfortunately, it is also popular as cyber-criminals' escape route from the grasp of digital forensic investigations. The direct encryption of data or indirect encryption of storage devices, more often than not, prevents access to such information contained therein. This consequently leaves the forensics investigation team, and subsequently the prosecution, little or no evidence to work with, in sixty percent of such cases. However, it is unthinkable to jeopardize the successes brought by encryption technology to information security, in favour of digital forensics technology. This paper examines what data encryption contributes to information security, and then highlights its contributions to digital forensics of disk drives. The paper also discusses the available ways and tools, in digital forensics, to get around the problems constituted by encryption. A particular attention is paid to the Truecrypt encryption solution to illustrate ideas being discussed. It then compares encryption's contributions in both realms, to justify the need for introduction of new technologies to forensically defeat data encryption as the only solution, whilst maintaining the privacy goal of users.",4,5,,,Software deployment; Forensic science; Encryption; Work (electrical); Cryptography; Computer security; Computer science; Information security; Confidentiality; Digital forensics,,,,,https://thesai.org/Publications/ViewPaper?Volume=4&Issue=5&Code=IJACSA&SerialNo=6 https://dblp.uni-trier.de/db/journals/corr/corr1312.html#BalogunZ13 https://thesai.org/Downloads/Volume4No5/Paper_6-Privacy_Impacts_of_Data_Encryption_on_the_Efficiency_of_Digital_Forensics_Technology.pdf http://ui.adsabs.harvard.edu/abs/2013arXiv1312.3183B/abstract,http://dx.doi.org/10.14569/ijacsa.2013.040506,,10.14569/ijacsa.2013.040506,2962922800,,0,002-144-887-718-545; 005-102-962-333-180; 010-882-535-434-404; 017-335-677-993-203; 025-743-892-862-313; 025-832-466-975-926; 039-253-046-125-791; 048-314-987-416-85X; 050-513-243-638-138; 058-205-117-706-853; 060-808-935-547-406; 080-117-008-231-77X; 133-839-073-755-612; 134-927-490-231-285; 145-616-913-856-289; 186-019-966-947-987,8,true,cc-by,hybrid
123-275-701-676-787,Are mobile device examinations practiced like ‘forensics’?,2015-11-16,2015,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Gary C. Kessler,"Gary C. Kessler considers the issue of mobile device forensics and the relationship between digital forensics and other forensic sciences, and compares mobile device forensics to the broader field of digital forensics. Index words: Cell phone forensics, computer forensics, digital forensics, mobile device forensics",12,0,3,9,Mobile device; Computer security; Computer science; Network forensics; Computer forensics; Mobile device forensics; Digital forensics,,,,,https://journals.sas.ac.uk/deeslr/article/download/2237/2170 https://commons.erau.edu/cgi/viewcontent.cgi?article=1127&context=publication https://journals.sas.ac.uk/deeslr/article/view/2237 https://commons.erau.edu/publication/119/ https://works.bepress.com/gary_kessler/50/,http://dx.doi.org/10.14296/deeslr.v12i0.2237,,10.14296/deeslr.v12i0.2237,2206488084,,0,,6,true,cc-by-nc-nd,gold
123-315-590-178-091,Survey on Techniques of Composite Image Passive Forensics,,2013,journal article,Journal of Nantong University,,,,Wang We,"Composite image forensics is a vital research area of digital image forensics. The research on techniques of composite image passive forensics is important to ensure the originality and authenticity of digital image. According to different research areas, the techniques of composite image passive forensics fall into three categories: techniques based on traditional characteristics, techniques based on blind source separation, and techniques based on sparse representation. The basic characteristics, typical methods, as well as comparison and analysis of various algorithms are summarized in detail for each category. The main problems in the current research are pointed out and the future directions are presented.",,,,,Blind signal separation; Sparse approximation; Data mining; Originality; Digital image forensics; Research areas; Computer science; Digital image; Multimedia; Composite image filter,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-NGZK201303001.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-NGZK201303001.htm,,,2372330419,,0,,0,false,,
123-591-979-675-820,OpenForensics: a digital forensics GPU pattern matching approach for the 21st century,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Ethan Bayne; Robert Ian Ferguson; Adam T. Sampson,"Abstract Pattern matching is a crucial component employed in many digital forensic (DF) analysis techniques, such as file-carving. The capacity of storage available on modern consumer devices has increased substantially in the past century, making pattern matching approaches of current generation DF tools increasingly ineffective in performing timely analyses on data seized in a DF investigation. As pattern matching is a trivally parallelisable problem, general purpose programming on graphic processing units (GPGPU) is a natural fit for this problem. This paper presents a pattern matching framework – OpenForensics – that demonstrates substantial performance improvements from the use of modern parallelisable algorithms and graphic processing units (GPUs) to search for patterns within forensic images and local storage devices.",24,,S29,S37,Data mining; General purpose; Current generation; Computer science; Component (UML); General-purpose computing on graphics processing units; Pattern matching; Digital forensics,,,,NVIDIA Corporation,https://doi.org/10.1016/j.diin.2018.01.005 https://www.sciencedirect.com/science/article/pii/S1742287618300379 https://core.ac.uk/display/153400622 https://dblp.uni-trier.de/db/journals/di/di24.html#BayneFS18 https://rke.abertay.ac.uk/en/publications/openforensics-a-digital-forensics-gpu-pattern-matching-approach-f https://core.ac.uk/download/153400622.pdf,http://dx.doi.org/10.1016/j.diin.2018.01.005,,10.1016/j.diin.2018.01.005,2789491237,,0,008-653-605-343-591; 012-089-942-653-099; 023-341-419-324-638; 023-539-140-993-037; 033-877-222-136-260; 042-423-526-530-806; 043-093-846-816-675; 047-756-135-201-412; 050-513-243-638-138; 067-108-699-595-293; 072-072-328-028-440; 079-731-827-037-297; 098-748-261-333-651; 126-916-335-288-384; 134-927-490-231-285,5,true,cc-by-nc-nd,hybrid
123-822-670-262-791,Emerging Role of Digital Forensics in the Investigation of Online Child Pornography,,2019,journal article,Indian Journal of Forensic Medicine & Toxicology,09739122; 09739130,Diva Enterprises Private Limited,India,Nirmal Rallan; Komal Vig,"Information Technology has been of immense use to the mankind. It has heralded a new age of faster and easier communication and access to information. But it has also provided a new platform for criminal activities such as child pornography. Online Child pornography is a global crime whose investigation may require the joint support of several countries. Detection and investigation of online child pornography involves the role of digital forensics to ensure admissibility of digital evidence in a court of law. In this paper, the authors have presented an overview of online child pornography, its impact and the role of digital forensics in the investigation of online child pornography.",13,3,199,202,Internet privacy; Information technology; Sociology; Child pornography; Pornography; Digital evidence; Access to information; Digital forensics,,,,,https://www.indianjournals.com/ijor.aspx?target=ijor:ijfmt&volume=13&issue=3&article=042,http://dx.doi.org/10.5958/0973-9130.2019.00195.6,,10.5958/0973-9130.2019.00195.6,2961286481,,0,,0,false,,
124-255-859-306-442,An investigation into Unmanned Aerial System (UAS) forensics: Data extraction & analysis,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Greg Thornton; Pooneh Bagheri Zadeh,"Recent developments of drone technologies have shown a surge of commercial sales of drone devices, which have found use in many industries. However, the technology has been misused to commit crimes such as drug trafficking, robberies, and terror attacks. The digital forensics industry must match the speed of development with forensic tools and techniques. However, it has been identified that there is a lack of an agreed framework for the extraction and analysis of drone devices and a lack of support in commercial digital forensics tools available. In this research, an investigation into the extraction tools available for drone devices and analysis techniques has been performed to identify best practices for handling drone devices in a forensically sound manner. A new framework to perform a full forensic analysis of small to medium sized commercial drone devices and their controllers has been proposed to give investigators a plan of action to perform forensic analysis on these devices. The proposed framework overcomes some limitations of other drone forensics investigation frameworks presented in the literature. • Digital Forensics investigation Framework. • Drone Forensics Investigation. • Drone Data Analysis.",41,,301379,301379,Drone; Digital forensics; Computer science; Commit; Computer security,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301379,,10.1016/j.fsidi.2022.301379,,,0,003-504-554-245-316; 008-667-688-301-190; 010-084-169-561-57X; 011-755-498-862-139; 013-832-431-848-470; 028-638-405-790-741; 042-467-831-044-091; 046-314-745-466-915; 072-183-867-595-593; 083-401-248-269-053; 089-695-854-791-989,0,true,,hybrid
124-358-741-540-008,Developing Past and Beyond: 3D Mapping of Crime Scenes in India,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Himani Rawat,,,,,,Crime scene; 3d mapping; Cartography; History,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.11,http://dx.doi.org/10.46293/4n6/2021.03.01.11,,10.46293/4n6/2021.03.01.11,3161105141,,0,,0,false,,
125-020-771-045-081,Application of quality in use model to assess the user experience of open source digital forensics tools,,2020,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Manar Abu Talib; Reem Alnanih; Adel Khelifi,"Open source digital forensics tools are playing an important role for forensics investigations. So, there is a need to assess these tools to ensure they meet users' needs. The existing literature does not satisfy the requirements of assessing their quality-in-use. This paper assesses three most used digital forensics tools, namely autopsy, DFF, and DART using five quality-in use characteristics, namely, effectiveness, productivity, efficiency, error safety, and cognitive load. The results demonstrated that Autopsy, DFF, and DART performances are similar in terms of efficiency and productivity. DDF outperformed the other two in effectiveness. Autopsy was the best in terms of error safety, and DART had the highest cognitive load. The relevant community may consider these findings in selecting solutions to perform its duties. The future researches can involve more studies to encompass additional aspects of software quality, to compare open and closed source digital forensics programs and to enhance testing efforts",12,1,43,76,Software quality; User experience design; Data science; Quality (business); Open source software; Open source; Computer science; Cognitive load; Digital forensics,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2020.103870 https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf12.html#TalibAK20,http://dx.doi.org/10.1504/ijesdf.2020.10025165,,10.1504/ijesdf.2020.10025165,2989154068,,0,,0,true,,bronze
125-274-621-659-002,Learning Maliciousness in Cybersecurity Graphs,,2017,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Liz Maida,,6,3,121,125,,,,,,,http://dx.doi.org/10.17781/p002277,,10.17781/p002277,,,0,,0,false,,
125-429-401-452-724,A survey of machine learning applications in digital forensics,2021-04-08,2021,journal article,Trends in Computer Science and Information Technology,26413086,Peertechz Publications Private Limited,,Hilmand Khan; Sarmad Hanif; Bakht Muhammad,"We address the role of machine learning in digital forensics in this paper, in order to have a better understanding of where machine learning stand in today’s cyber security domain when it comes to collecting digital evidence. We started by talking about Digital Forensics and its past. Then, to illustrate the fields of digital forensics where machine learning methods have been used to date, we recommend a brief literature review. The aim of this paper is to promote machine learning applications in digital forensics. We went through different applications of machine learning in different areas and analysed how machine learning can potentially be used in other areas by considering its current applications and we believe that the ideas presented here will provide promising directions in the pursuit of more powerful and successful digital forensics tools.",6,1,020,024,Machine learning; Artificial intelligence; Domain (software engineering); Digital evidence; Computer science; Digital forensics,,,,,https://www.peertechzpublications.com/articles/TCSIT-6-134.php https://www.peertechzpublications.com/articles/TCSIT-6-134.pdf,http://dx.doi.org/10.17352/tcsit.000034,,10.17352/tcsit.000034,3157681744,,0,006-296-899-452-535; 012-446-212-270-670; 015-084-347-434-584; 015-434-377-944-478; 029-539-345-954-419; 032-810-296-055-161; 034-183-561-604-364; 036-720-465-389-565; 041-561-245-686-942; 059-151-526-215-807; 062-421-316-909-478; 089-932-159-207-310; 093-668-583-258-461; 115-547-184-477-216; 131-948-799-258-180; 139-610-896-512-796; 153-826-237-509-69X; 170-516-749-420-456; 184-428-240-098-87X,0,true,cc-by-nc,hybrid
125-551-429-663-864,ON THE USE OF DIGITAL LOGISTICS IN CRIMINAL PROCEEDINGS AND CRIMINALISTICS,2020-09-28,2020,journal article,Juridical Journal of Samara University,2542047x,Samara State National Research University,,Е В Христинина; E. V. Christinina,"The scientific article explores the concept and content of digital forensic logistics. The author substantiates the close relationship of digital forensic logistics with the process of organizing criminal investigations, building forensic versions, planning investigative actions and operational search activities. The author presents several areas of forensic logistics: logistics of evidence in criminal cases; logistics of the overall organization of the investigation of crimes; logistics of planning (selection of means and methods of investigation); logistics of putting forward versions; logistics of decisions made in criminal cases. The article makes a logical conclusion that the entire process of criminal investigation is carried out using a single digital logistics platform that includes algorithmization of actions and decisions in a criminal case. The author has established that the digital platform is based on various information flows, which are: digital forensic records; digital traces; electronic requests and instructions; digital video library, audio recording and photography; electronic assistant to the investigator; digital expertise; electronic forensic recommendations for the investigation of criminal cases. In conclusion, it is concluded that it is necessary to use digital logistics in criminal proceedings and criminalistics to improve the efficiency of investigative bodies in the investigation of criminal crimes.",6,3,128,132,Engineering management; Criminal investigation; Photography; Logical consequence; Forensic science; Criminal case; Close relationship; Computer science; Process (engineering); Digital forensics,,,,,https://journals.ssau.ru/jjsu/article/view/8122 https://journals.ssau.ru/jjsu/article/download/8122/7845,http://dx.doi.org/10.18287/2542-047x-2020-6-3-128-132,,10.18287/2542-047x-2020-6-3-128-132,3111382255,,0,,0,true,,gold
125-647-772-745-687,"Internet Forensics-Tools, Procedure And Framework",2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Tanmayee P. Tilekar,,,,,,The Internet; World Wide Web; Computer science,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.09,http://dx.doi.org/10.46293/4n6/2021.03.02.09,,10.46293/4n6/2021.03.02.09,3162126447,,0,,0,false,,
125-682-509-275-554,IoT Device Forensics and Data Reduction,,2018,journal article,IEEE Access,21693536,Institute of Electrical and Electronics Engineers (IEEE),United States,Darren Quick; Kim-Kwang Raymond Choo,"The growth in the prevalence of the plethora of digital devices has resulted in growing volumes of disparate data, with potential relevance to criminal and civil investigations. With the increase in data volume, there is an opportunity to build greater case-related knowledge and discover evidence, with implications at all stages of the digital forensic analysis process. The growth in digital devices will potentially further contribute to the growth in big digital forensic data, with a need for practitioners to consider a wider range of data and devices that may be relevant to an investigation. A process of data reduction by selective imaging and quick analysis, coupled with automated data extraction, gives potential to undertake the analysis of the growing volume of data in a timely manner. In this paper, we outline a process of bulk digital forensic data analysis including disparate device data. We research the process with a research data corpus and apply our process to real-world data. The challenges of the growing volume of devices and data will require forensic practitioners to expand their ability to undertake research into newly developed data structures, and be able to explain this to the court, judge, jury, and investigators.",6,,47566,47574,The Internet; Forensic science; Data structure; Disparate system; Data science; Jury; Electronic mail; Computer science; Process (engineering); Digital forensics; Relevance (information retrieval),,,,Cloud Technology Endowed Professorship,https://doi.org/10.1109/ACCESS.2018.2867466 https://ieeexplore.ieee.org/document/8449277/ https://dblp.uni-trier.de/db/journals/access/access6.html#QuickC18,http://dx.doi.org/10.1109/access.2018.2867466,,10.1109/access.2018.2867466,2889226801,,0,003-135-959-594-644; 009-040-429-083-368; 010-388-991-543-520; 010-985-077-415-59X; 011-211-518-312-834; 042-767-661-429-064; 054-888-023-799-702; 083-322-626-930-350; 137-574-018-964-352; 163-330-758-807-944; 198-820-820-012-184,33,true,"CC BY, CC BY-NC-ND",gold
125-934-140-322-856,Forensic document examination of electronically captured signatures,2014-01-28,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Heidi H. Harralson,"Heidi H. Harralson considers the use of biodynamic electronic signatures by which a person provides a signature in electronic format that is reproduced on the screen as a representation of their manuscript signature, and analyzes the procedures used in the forensic analysis of such system, indicating that not all systems produce reliable information to support forensic opinions, and that examiners are failing to understand the need to analyze the digital data. Index words:electronic signature; biometric signature; biodynamic signature; digital signature; forensic document examination; forensic handwriting examination",9,0,,,Digital signature; World Wide Web; Forensic science; Signature (logic); Biometrics; Electronic signature; Information retrieval; Index (publishing); Digital data; Handwriting; Computer science,,,,,https://sas-space.sas.ac.uk/5587/ https://journals.sas.ac.uk/deeslr/article/view/1991,http://dx.doi.org/10.14296/deeslr.v9i0.1991,,10.14296/deeslr.v9i0.1991,2020370348,,0,,2,true,cc-by-nc-nd,hybrid
125-939-677-745-616,Digital forensics as a service,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,H.M.A. van Beek; E.J. van Eijk; R.B. van Baar; M. Ugen; J.N.C. Bodde; A.J. Siemelink,"The big data era has a high impact on forensic data analysis. Work is done in speeding up the processing of large amounts of data and enriching this processing with new techniques. Doing forensics calls for specific design considerations, since the processed data is incredibly sensitive. In this paper we explore the impact of forensic drivers and major design principles like security, privacy and transparency on the design and implementation of a centralized digital forensics service.",15,,20,38,Work (electrical); Transparency (behavior); Design elements and principles; Service (systems architecture); Computer security; Computer science; Network forensics; Computer forensics; Big data; Digital forensics,,,,,https://doi.org/10.1016/j.diin.2015.07.004 https://dl.acm.org/doi/10.1016/j.diin.2015.07.004 https://core.ac.uk/display/81195448 https://www.sciencedirect.com/science/article/abs/pii/S1742287615000857 https://www.sciencedirect.com/science/article/pii/S1742287615000857 https://core.ac.uk/download/pdf/81195448.pdf,http://dx.doi.org/10.1016/j.diin.2015.07.004,,10.1016/j.diin.2015.07.004,1446195290,,0,000-360-120-513-679; 003-926-917-446-708; 007-598-060-754-474; 007-648-632-822-878; 010-985-077-415-59X; 013-193-256-548-818; 015-868-814-003-691; 020-936-498-613-334; 024-735-069-822-749; 026-774-296-742-022; 033-241-817-699-448; 033-877-222-136-260; 039-490-429-585-065; 045-702-359-549-884; 050-044-034-502-956; 051-645-938-939-51X; 056-715-378-869-201; 061-033-869-892-660; 062-325-585-829-185; 063-278-462-775-305; 064-380-336-432-376; 076-536-068-980-117; 079-070-981-899-105; 086-091-202-010-191; 087-535-177-904-679; 092-655-509-442-333; 097-567-011-227-46X; 098-892-902-051-803; 131-516-331-360-906; 134-927-490-231-285; 137-292-579-653-532; 150-165-602-099-023; 150-821-707-731-403; 158-369-352-218-573; 160-737-306-581-249; 163-330-758-807-944; 166-178-398-716-39X; 181-095-475-426-346; 199-172-967-270-034; 199-745-676-923-766,51,true,cc-by-nc-nd,hybrid
126-996-381-341-302,Analysis of Steganographic on Digital Evidence using General Computer Forensic Investigation Model Framework,,2020,journal article,International Journal of Advanced Computer Science and Applications,21565570; 2158107x,The Science and Information Organization,,Muh. Hajar Akbar; null Sunardi; Riadi,"Steganography is one of the anti-forensic techniques used by criminals to hide information in other messages which can cause problems in the investigation process and difficulties in obtaining original information evidence on the digital crime. Digital forensic analysts are required ability to find and extract the messages that have been inserted by using proper tools. The purpose of this research is to analyze the hidden digital evidence using steganography techniques. This research uses the static forensics method by applying five stages in the Generic Forensics Investigation Model framework, namely pre-process, acquisition & preservation, analysis, presentation, and post-process as well as extracting files that have been infiltrated based on case scenarios involving digital crime. The tools used are FTK Imager, Autopsy, WinHex, Hiderman, and StegSpy. The results on the steganographic file insertion experiment of 20 files indicate that StegSpy and Hiderman are effective on the steganographic analysis of digital evidence. StegSpy can detect the presence of secret messages with 85% success rate. The extraction process using Hiderman for 18 files with containing steganographic messages had 100% successful.",11,11,,,Steganography; Forensic science; Information retrieval; Digital evidence; Computer science; Process (engineering); Digital forensics,,,,,https://thesai.org/Downloads/Volume11No11/Paper_41-Analysis_of_Steganographic_on_Digital_Evidence.pdf https://thesai.org/Publications/ViewPaper?Volume=11&Issue=11&Code=IJACSA&SerialNo=41,http://dx.doi.org/10.14569/ijacsa.2020.0111141,,10.14569/ijacsa.2020.0111141,3113162624,,0,,0,true,cc-by,gold
127-027-322-002-654,HGA: Hierarchical Feature Extraction With Graph and Attention Mechanism for Linguistic Steganalysis,,2022,journal article,IEEE Signal Processing Letters,10709908; 15582361,Institute of Electrical and Electronics Engineers (IEEE),United States,Zhangjie Fu; Qi Yu; Fan Wang; Changhao Ding,"Linguistic steganalysis is an important topic in the field of information security and signal processing. In recent years, linguistic steganalysis have mainly utilized deep learning techniques and make great success. But suffer from the following major disadvantages. From the perspective of model structure, current methods only extract coarse features of the text, without focusing on the fine-grained representations. In terms of application, most of the studies only focus on single hidden scene and ignore the more realistic mixed hidden scenes which are more complex and realistic. These weaknesses limit the performance and the application of linguistic steganalysis in reality. In this paper, we propose a novel linguistic steganalysis method to overcome these weaknesses. This proposed method can extract distinguished text representation which fuses hierarchical features and perform excellently in sophisticated conditions. Firstly, we adapt gated graph neural networks as the coarse graph updater to update node representations on the graph level. Then we design a fine graph updater composed of the graph attention mechanism to focus on the highlighted nodes on the node-level. Moreover, we extract the most notable feature on the dimension-level of node by the graph channel attention module. Finally, the readout function is designed to fuse the hierarchical features and make the classification. The experimental results show that our method achieves the best results compared with the previous methods in both single hidden scene and mixed hidden scenes, which prove the effectiveness of the proposed method.",29,,1734,1738,Steganalysis; Computer science; Graph; Artificial intelligence; Feature extraction; Focus (optics); Pattern recognition (psychology); Node (physics); Natural language processing; Data mining,,,,National Key R&D Program of China; National Natural Science Foundation of China; National Natural Science Foundation of China; Jiangsu Basic Research Programs–Natural Science Foundation; Collaborative Innovation Center of Atmospheric Environment and Equipment Technology,,http://dx.doi.org/10.1109/lsp.2022.3194844,,10.1109/lsp.2022.3194844,,,0,006-226-063-672-219; 010-881-186-573-195; 011-331-216-034-599; 013-982-697-944-340; 018-193-483-515-989; 019-865-688-107-968; 024-556-976-517-808; 046-157-441-978-317; 059-783-343-108-940; 061-065-523-494-469; 061-656-453-317-540; 066-810-084-927-507; 067-480-120-151-011; 067-980-880-214-610; 068-984-373-113-043; 069-585-566-320-733; 072-122-833-427-306; 077-933-671-553-828; 081-427-001-573-355; 084-260-386-043-570; 086-823-378-252-910; 093-229-793-148-784; 128-667-751-863-307; 143-678-006-810-130,0,false,,
127-207-908-207-727,Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020,,2022,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Martin Novak,"This study is a follow-up to Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration – 2010 to 2015. The current study examines appeals of criminal cases before the United States Courts of Appeal from January 2016 through August 2020, where one or more appeal claims were related to digital evidence. The purpose of this research was to determine if the legal landscape has changed since 2015; examine the most relevant legal issues related to digital evidence; and analyze how precedential cases may have affected digital forensics as evidence.",,,,,Appeal; Law; Political science; Digital evidence; Digital forensics; Criminal procedure; Criminology,,,,,,http://dx.doi.org/10.15394/jdfsl.2022.1734,,10.15394/jdfsl.2022.1734,,,0,,0,true,cc-by-nc,gold
127-364-049-570-112,Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment,2018-04-16,2018,journal article,Sustainability,20711050,MDPI AG,Switzerland,Sangho Park; Yanghoon Kim; Gwangmin Park; Onechul Na; Hangbae Chang,"Recently, the work environments of organizations have been in the process of transitioning into smart work environments by applying cloud computing technology in the existing work environment. The smart work environment has the characteristic of being able to access information assets inside the company from outside the company through cloud computing technology, share information without restrictions on location by using mobile terminals, and provide a work environment where work can be conducted effectively in various locations and mobile environments. Thus, in the cloud computing-based smart work environment, changes are occurring in terms of security risks, such as an increase in the leakage risk of an organization’s information assets through mobile terminals which have a high risk of loss and theft and increase the hacking risk of wireless networks in mobile environments. According to these changes in security risk, the reactive digital forensic method, which investigates digital evidence after the occurrence of security incidents, appears to have a limit which has led to a rise in the necessity of proactive digital forensic approaches wherein security incidents can be addressed preemptively. Accordingly, in this research, we design a digital forensic readiness model at the level of preemptive prevention by considering changes in the cloud computing-based smart work environment. Firstly, we investigate previous research related to the cloud computing-based smart work environment and digital forensic readiness and analyze a total of 50 components of digital forensic readiness. In addition, through the analysis of the corresponding preceding research, we design seven detailed areas, namely, outside the organization environment, within the organization guideline, system information, terminal information, user information, usage information, and additional function. Then, we design a draft of the digital forensic readiness model in the cloud computing-based smart work environment by mapping the components of digital forensic readiness to each area. To verify the draft of the designed model, we create a survey targeting digital forensic field-related professionals, analyze their validity, and deduce a digital forensic readiness model of the cloud computing-based smart work environment consisting of seven detailed areas and 44 components. Finally, through an analytic hierarchy process analysis, we deduce the areas that should be emphasized compared to the existing work environment to heighten the forensic readiness in the cloud computing-based smart work environment. As a result, the weightings of the terminal information Universal Subscriber Identity Module(USIM) card, collect/gain virtual machine image, etc.), user information (user account information analysis, analysis of user’s used service, etc.), and usage information (mobile OS artifact timeline analysis, action analysis through timeline, etc.) appear to be higher than those of the existing work environment. This is analyzed for each organization to preemptively prepare for the components of digital forensic readiness in the corresponding areas.",10,4,1203,,Forensic science; Virtual machine; User information; Digital evidence; Computer security; Computer science; Asset (computer security); Cloud computing; Digital forensics; Hacker; Analytic hierarchy process,,,,,https://www.mdpi.com/2071-1050/10/4/1203 https://core.ac.uk/display/155255554 https://www.mdpi.com/2071-1050/10/4/1203/pdf,http://dx.doi.org/10.3390/su10041203,,10.3390/su10041203,2799919344,,0,002-625-978-577-247; 002-768-711-065-857; 006-435-365-660-88X; 009-510-455-727-116; 015-029-723-578-919; 018-948-094-812-86X; 024-462-843-796-80X; 024-894-908-869-686; 026-774-296-742-022; 045-701-748-075-614; 045-912-944-128-365; 046-143-775-958-052; 053-344-396-276-136; 063-274-848-736-685; 064-313-388-228-262; 096-993-850-376-090; 098-748-261-333-651; 102-692-471-615-799; 109-763-344-484-044; 124-912-663-881-389; 125-939-677-745-616; 162-922-011-677-486; 163-330-758-807-944,17,true,cc-by,gold
127-735-596-370-849,Ensuring Online Safety Of Women Through Indian Penal Code,2021-02-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Nagarathna A,,,,,,Indian Penal Code; Political science; Law,,,,,http://dx.doi.org/10.46293/4n6/2021.03.01.01,http://dx.doi.org/10.46293/4n6/2021.03.01.01,,10.46293/4n6/2021.03.01.01,3126216580,,0,,0,false,,
128-257-405-271-69X,Forensic Cell Site Analysis: Mobile Network Operator Evidence Integrity Maintenance Research,,2019,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,John B. Minor,,14,2,59,85,Mobile network operator; Computer network; Computer science; Site analysis,,,,,https://commons.erau.edu/jdfsl/vol14/iss2/5/ https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl14.html#Minor19 https://commons.erau.edu/cgi/viewcontent.cgi?article=1608&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2019.1608,,10.15394/jdfsl.2019.1608,2979873562,,0,,0,true,cc-by-nc,gold
128-306-516-043-751,Prelim i - Editorial Board,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,41,,301410,301410,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00091-9,,10.1016/s2666-2817(22)00091-9,,,0,,0,true,,bronze
128-315-885-884-18X,ASIST - Integrating digital forensics into born-digital workflows: The BitCurator project,,2012,journal article,Proceedings of the American Society for Information Science and Technology,00447870,Wiley,,Martin Gengenbach; Alexandra Chassanoff; Porter Olsen,"There is a growing body of work investigating the needs and desires of collecting institutions as they adapt to the acquisition of born-digital materials. The incorporation of digital forensics tools and techniques into digital curation workflows offers great promise for addressing the complexities bound up in ingesting and preserving digital objects at multiple levels of representation. This poster presents preliminary results from ongoing research conducted as part of the BitCurator project, a two-year grant funded initiative to build, test, and analyze systems and software for incorporating digital forensics methods into collecting institutions' workflows. The project arose out of a perceived need in the library, archives, and museum (LAM) communities for better documentation, interfaces, and functionality in processing born-digital archival materials.",49,1,1,4,Engineering; World Wide Web; Work (electrical); Workflow; Digital curation; Born-digital; Software; Documentation; Digital forensics,,,,,https://dblp.uni-trier.de/db/conf/asist/asist2012.html#GengenbachCO12 https://asistdl.onlinelibrary.wiley.com/doi/pdf/10.1002/meet.14504901343 https://asistdl.onlinelibrary.wiley.com/doi/abs/10.1002/meet.14504901343 http://onlinelibrary.wiley.com/doi/10.1002/meet.14504901343/abstract https://onlinelibrary.wiley.com/doi/abs/10.1002/meet.14504901343,http://dx.doi.org/10.1002/meet.14504901343,,10.1002/meet.14504901343,2114988520,,0,022-250-300-795-993; 037-647-066-964-858; 067-629-806-155-212; 074-028-601-448-433; 081-235-060-337-938,0,true,,bronze
128-473-609-330-555,Preprocessing and Edge Detection of Natural Images and Computer Generated Images,2013-05-31,2013,journal article,"International Journal of Signal Processing, Image Processing and Pattern Recognition",20054254,NADIA,Australia,Yan Wang; Xiao Wang; Henan Xinxiang,"Digital image tamper detection by analyzing the statistical properties of the image content of the authenticity of the digital image, the scene authenticity and integrity of authentication methods, namely determine whether the image is the original image, whether the image is real and whether it contains other secret information image, these techniques is the digital image forensics. Digital image forensics technology is dependent on the basis of the original carrier may be divided into active and passive two technologies forensics evidence. This paper generated image detection research for digital image forensics scene authenticity certification in natural images and computer. Combining the results of recent research, based on systematic analysis of the differences between two types of image generation, high-end features for wavelet conducted a detailed study of the effectiveness, from the validity of the characteristic data, proposed several general-purpose computer generating an image detection algorithm. Compared with the previous detection algorithm, strong stability of the proposed algorithm, computational complexity is low, and has easy implementation.",9,5,281,290,Digital image processing; Feature detection (computer vision); Artificial intelligence; Standard test image; Binary image; Automatic image annotation; Computer vision; Computer science; Digital image; Image texture; Image processing,,,,,http://www.sersc.org/journals/IJSIP/vol9_no5/25.pdf,http://dx.doi.org/10.14257/ijsip.2016.9.5.25,,10.14257/ijsip.2016.9.5.25,2437213383,,0,018-036-210-381-349; 021-370-624-920-711; 023-438-345-162-875; 044-882-969-009-943; 066-598-818-406-482; 069-742-474-278-095; 090-456-276-093-907; 108-205-292-416-249; 120-521-136-445-08X; 123-071-011-725-815; 129-912-833-395-159; 130-755-022-110-85X; 139-040-911-677-344,1,false,,
128-840-927-006-269,The Digital Forensics and Security Challenge of QR Codes,2013-06-30,2013,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Nik Thompson; Kevin Lee,"The disciplines of digital forensics and IT security must adapt to new technologies and methods of interaction with those technologies. New technologies present both challenges and opportunities for providing evidence for digital forensics investigations. These may be in the form of new devices such as smartphones or new methods of sharing information, such as social networks. One such rapidly emerging interaction technology is the use of Quick Response (QR) codes. These offer a physical mechanism for quick access to web sites for advertising and social interaction. This paper argues that the common implementation of QR codes potentially presents security issues which must be considered. It analyzes potential privacy problems with QR codes and studies a range of devices as they may have implications for the process of evidence collection and analysis.",8,2,41,72,Emerging technologies; Interaction technology; Evidence collection; Computer security; Computer science; Process (engineering); Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#ThompsonL13,https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#ThompsonL13,,,2991927012,,0,,0,true,cc-by-nc,gold
129-060-946-634-518,An extended digital forensic readiness and maturity model,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Felix Bankole; Ayankunle Taiwo; Ivan Claims,"Digital forensics readiness (DFR) is an important part of the growing forensic domain. Research on DFR has been given little attention, while available DFR models have focused on theoretical investigations with inadequate input from practicing information security experts in the industry. Using feedback from practicing forensic experts in the industry and academia, this research investigates the structure required to implement and manage digital forensic readiness (DFR) within an enterprise. The research extended the DFR Commonalities framework (DFRCF) and utilised the structure to design a digital forensic maturity assessment model (DFMM) that will enable organisations to assess their forensic readiness and security incident responses. A combination of qualitative and research design approaches was utilised to perform a comparative analysis of various DFR frameworks. A top-down design approach was utilised in developing the DFMM model which was validated with forensic practitioners and academics through semi-structured interviews. The structure extracted from DFR frameworks was practical since most participants agreed with the structure of the extended DFRCF and the matrix of the maturity model. Overall, key changes were introduced to enhance both the extended DFRCF and the DFMM. The study was limited to participants who have a forensic footprint and are knowledgeable about DFR. This paper thereby provides practitioners, academics and organisations with access to a non-propriety DFMM maturity model. • Extending the digital forensics readiness commonalities framework. • Proposing digital forensics maturity model. • Extended digital forensic readiness and maturity model for COVID19 pandemic and beyond.",40,,301348,301348,Digital forensics; Capability Maturity Model; Maturity (psychological); Computer science; Data science; Knowledge management; Engineering; Process management; Computer security; Psychology; Software; Developmental psychology; Programming language,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301348,,10.1016/j.fsidi.2022.301348,,,0,001-261-260-701-260; 003-803-598-122-748; 004-706-447-836-905; 014-359-308-542-324; 016-533-769-215-821; 032-460-061-944-952; 033-128-301-658-595; 040-277-700-312-914; 041-266-949-737-670; 041-805-592-234-965; 057-247-653-161-438; 079-042-778-256-448; 079-924-320-756-189; 088-273-808-364-904; 091-664-230-499-576; 095-691-114-276-825; 102-734-676-905-303; 106-108-913-089-037; 114-796-071-425-023; 127-364-049-570-112; 145-627-679-536-968; 166-895-487-744-941; 167-751-222-897-487,0,true,,bronze
129-356-514-852-901,Digital Forensic Issues in Civil Proceedings,,2014,journal article,Journal of Civil & Legal Sciences,21690170,OMICS Publishing Group,,Greg Gogolin; James H. Jones,"Digital Forensics is an emerging field that has quickly become a key source of evidence in criminal and civil cases. While digital forensics has been challenging to incorporate into both criminal and civil cases, the environment of civil cases does not have the structure of the law enforcement processes to serve as a framework from which to conduct digital forensic examinations. Further, there is often a lack of understanding of digital forensic capabilities and evidence, which has the potential to influence legal judgments and misconstrue outcomes.",3,1,1,3,Sociology; Law; Criminal law; Forensic nursing; Law enforcement; Intellectual property; Computer forensics; Conflict of laws; Jurisprudence; Digital forensics,,,,,https://www.omicsonline.org/peer-reviewed/digital-forensic-issues-in-civil-proceedingsp-23638.html https://www.omicsonline.org/open-access/digital-forensic-issues-in-civil-proceedings-2169-0170.1000110.php?aid=23638,http://dx.doi.org/10.4172/2169-0170.1000110,,10.4172/2169-0170.1000110,2106572033,,0,005-646-077-565-566; 009-358-080-914-72X; 050-721-573-791-625; 073-847-291-567-156; 076-470-845-108-034; 082-061-692-717-698; 085-858-927-316-897; 094-549-705-844-333; 110-291-798-326-65X; 140-906-156-416-318; 192-869-837-381-364,2,false,,
129-508-826-592-168,Visual Object Tracking Based on Adaptive Background-Awareness and Spatial Constraint,2022-06-29,2022,journal article,Mathematical Problems in Engineering,15635147; 1024123x; 10267077,Hindawi Limited,Egypt,Keqi Fan; Qianqian Yu; Yiyang Wang; Deng Chen; Yuhui Zheng,"The correlation filter method is effective in visual tracking tasks, whereas it suffers from the boundary effect and filter degradation in complex situations, which can result in suboptimal performance. Aiming at the solving above problem, this study proposes an object tracking method with a discriminant correlation filter, which combines an adaptive background perception and a spatial dynamic constraint. In this method, an adaptive background-awareness strategy is used to filter the background information trained by the interference filter to improve the discriminability between the object and the background. In addition, the spatial regularization term is introduced, and the dynamic change of the real filter and the predefined spatial constraint template is used to optimize filter learning to enhance the spatial information capture ability of the filter model. Experiments on the OTB100, VOT2018, and TrackingNet standard datasets demonstrate that our method achieves favorable accuracy and success rates. Compared with the current popular correlation filter methods, the proposed method can still maintain stable tracking performance with a scene scale variation, complex background, motion blur, and fast motion.",2022,,1,11,Artificial intelligence; Computer vision; Computer science; Filter (signal processing); Adaptive filter; Kernel adaptive filter; Video tracking; Constraint (computer-aided design); Eye tracking; Spatial filter; Tracking (education); Object (grammar); Pattern recognition (psychology),,,,Zhejiang Provincial Science and Technology Program in China; Zhejiang Provincial Science and Technology Program in China; Zhejiang Provincial Science and Technology Program in China; Zhejiang Provincial Science and Technology Program in China; Zhejiang Provincial Science and Technology Program in China; Zhejiang Provincial Science and Technology Program in China; Zhejiang Provincial Science and Technology Program in China,,http://dx.doi.org/10.1155/2022/6062283,,10.1155/2022/6062283,,,0,000-568-694-378-624; 000-941-819-103-222; 002-140-227-338-020; 003-532-678-017-874; 004-075-446-271-043; 008-898-717-380-560; 012-225-431-707-546; 012-231-098-593-063; 020-270-503-155-959; 025-112-431-982-303; 026-876-078-323-433; 030-160-171-033-909; 031-363-970-453-113; 035-263-145-036-771; 037-171-857-000-659; 044-882-969-009-943; 055-006-112-952-253; 057-646-093-503-708; 066-810-719-172-735; 073-376-574-462-030; 077-739-003-456-580; 079-599-023-979-777; 082-940-914-821-96X; 083-724-630-996-266; 090-292-539-525-938; 109-752-500-472-675; 124-411-545-803-229; 131-546-469-964-566; 175-774-870-500-953,0,true,cc-by,gold
129-777-443-651-197,Deriving Priorities of Competences Required for Digital Forensic Experts using AHP,2017-02-28,2017,journal article,The Journal of Society for e-Business Studies,22883908,Society for e-Business Studies,,Haejung Yun; Seung Yong Lee; Choong C. Lee Lee,"Nowadays, digital forensic experts are not only computer experts who restore and find deleted files, but also general experts who posses various capabilities including knowledge about processes/laws, communication skills, and ethics. However, there have been few studies about qualifications or competencies required for digital forensic experts comparing with their importance. Therefore, in this study, AHP questionnaires were distributed to digital forensic experts and analyzed to derive priorities of competencies; the first-tier questions which consisted of knowledge, technology, and attitude, and the second-tier ones which have 20 items. Research findings showed that the most important competency was knowledge, followed by technology and attitude but no significant difference was found. Among 20 items of the second-tier competencies, the most important competency was “digital forensics equipment/tool program utilization skill” and it was followed by “data extraction and imaging skill from storage devices.” Attitude such as “judgment,” “morality,” “communication skill,” “concentration” were subsequently followed. The least critical one was “substantial law related to actual cases.” Previous studies on training/education for digital forensics experts focused on law, IT knowledge, and usage of analytic tools while attitude-related competencies have not given proper attention. We hope this study can provide helpful implications to design curriculum and qualifying exam to foster digital forensic experts.",22,1,107,122,Morality; Data extraction; Communication skills; Significant difference; Research findings; Computer science; Curriculum; Knowledge management; Digital forensics; Analytic hierarchy process,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002200518 http://calsec.or.kr/jsebs/index.php/jsebs/article/download/258/245 http://calsec.or.kr/jsebs/index.php/jsebs/article/view/258,http://dx.doi.org/10.7838/jsebs.2017.22.1.107,,10.7838/jsebs.2017.22.1.107,2609049478,,0,,2,true,,gold
130-080-242-566-434,"Digital Forensic Investigation of Social Media, Acquisition and Analysis of Digital Evidence",,2019,journal article,International Journal of Strategic Engineering,25724959; 25724967,IGI Global,,Reza Montasari; Richard Hill; Victoria Carpenter; Farshad Montaseri,"Various social networking sites (SNSs), widely referred to as social media, provide services such as email, blogging, instant messaging and photo sharing for social and commercial interactions. SNSs are facilitating new forms of social interaction, dialogue, exchange and collaboration. They allow millions of users and organisations worldwide to exchange ideas, post updates and comments or participate in activities and events, while sharing their wider interests. At the same time, such a phenomenon has led to an upsurge in significant criminal activities by perpetrators who are becoming increasingly sophisticated in their attempts to deploy technology to circumvent detection. Digital forensic Examiners (DFEs) often face serious challenges in relation to data acquisition. Therefore, this article aims to analyse the significance of SNSs in DFIs and challenges that DFEs often encounter when acquiring evidence from SNSs. Furthermore, this article describes the steps of the digital forensic investigation process that must be taken to acquire digital evidence that is both authentic and forensically sound.",2,1,52,60,Psychology; Digital evidence; Digital forensic investigation; Multimedia; Social media; Computer forensics; Digital forensics,,,,,https://cronfa.swan.ac.uk/Record/cronfa54932 https://www.igi-global.com/article/digital-forensic-investigation-of-social-media-acquisition-and-analysis-of-digital-evidence/219324 https://pure.hud.ac.uk/en/publications/digital-forensic-investigation-of-social-media-acquisition-and-an,http://dx.doi.org/10.4018/ijose.2019010105,,10.4018/ijose.2019010105,2902802592,,0,000-294-596-965-264; 004-668-612-287-432; 020-774-682-563-067; 024-711-735-736-003; 034-008-964-356-002; 034-190-709-015-829; 035-718-168-907-750; 049-404-833-736-24X; 052-052-141-922-342; 065-482-476-781-264; 067-840-274-503-047; 077-963-490-848-763; 120-697-354-224-33X; 127-948-386-055-225; 134-115-618-621-757; 134-132-593-731-945; 150-729-802-745-094; 173-034-553-635-460; 178-493-652-351-054; 179-881-224-143-743; 180-327-460-336-608; 190-065-821-748-92X,8,false,,
130-433-366-389-733,File Type Identification - Computational Intelligence for Digital Forensics,,2017,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Konstantinos Karampidis; Giorgos Papadourakis,,12,2,6,,Data mining; Computational intelligence; Data integrity; Computer science; Artificial neural network; Identification (information); Digital forensics; Genetic algorithm; File format,,,,,https://doi.org/10.15394/jdfsl.2017.1472 https://commons.erau.edu/cgi/viewcontent.cgi?article=1472&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl12.html#KarampidisP17 https://commons.erau.edu/jdfsl/vol12/iss2/6/,http://dx.doi.org/10.15394/jdfsl.2017.1472,,10.15394/jdfsl.2017.1472,2788571554,,0,,8,true,cc-by-nc,gold
130-533-255-442-114,A Digital Forensic Analysis for Directory in Windows File System,2015-06-30,2015,journal article,Journal of the Korea Society of Digital Industry and Information Management,17386667,Korea Society of Digital Industry and Information Management,,Gyusang Cho,,11,2,73,90,Timestamp; Symbolic link; World Wide Web; Directory; File system; Transactional NTFS; Computer science; Windows Vista; Database; B-tree; Digital forensics,,,,,http://koreascience.or.kr/article/JAKO201520448048465.page,http://dx.doi.org/10.17662/ksdim.2015.11.2.073,,10.17662/ksdim.2015.11.2.073,2486447642,,0,043-409-832-398-87X; 049-198-020-808-467; 079-331-405-716-414; 100-032-278-433-356,0,true,,bronze
131-000-976-357-571,Digital Forensics Investigation for Attacks on Artificial Intelligence,2022-04-24,2022,journal article,ECS Transactions,19385862; 19386737; 21512051,The Electrochemical Society,United States,Sanyasi Manasa; Kukatlapalli Pradeep Kumar,"The new research approaches are needed to be adopted to deal with security threats in Artificial Intelligence (AI)-based systems. This research is aimed at investigating the AI attacks that are “malicious by design.” It also deals with conceptualization of the problem and strategies for attacks on AI using digital forensic tools. A specific class of problems in adversarial attacks are tampering of images for computational processing in applications of digital photography, computer vision, pattern recognition (facial capping algorithms). State-of-the-art developments in forensics, such as 1. Application of end-to-end Neural Network training pipeline for image rendering and provenance analysis. 2. Deep fake image analysis using frequency methods, wavelet analysis, and tools like Amped Authenticate. 3. Capsule networks for detecting forged images. 4. Information transformation for feature extraction via image forensic tools, such as EXIF-SC, Splice Radar, and Noiseprint. 5. Application of generative adversarial networks (GAN) based models as anti-image forensics [8], will be studied in great detail and a new research approach will be designed incorporating these advancements for utility of digital forensics.",107,1,19639,19645,Computer science; Artificial intelligence; Digital forensics; Rendering (computer graphics); Computer security; Machine learning,,,,,,http://dx.doi.org/10.1149/10701.19639ecst,,10.1149/10701.19639ecst,,,0,,0,false,,
131-030-713-249-824,A Comparative Study of Digital Forensic Tools for Data Extraction From Electronic Devices,,2021,journal article,Journal of Punjab Academy of Forensic Medicine & Toxicology,09725687; 0974083x,Diva Enterprises Private Limited,India,Harshita Tara; Amarnath Mishra,,21,1,97,104,Electronics; Data extraction; Computer science; Database; Digital forensics,,,,,http://dx.doi.org/10.5958/0974-083x.2021.00016.9,http://dx.doi.org/10.5958/0974-083x.2021.00016.9,,10.5958/0974-083x.2021.00016.9,3202691716,,0,,0,false,,
131-118-636-696-570,Review,2018-11-30,2018,journal article,International Journal of Engineering & Technology,2227524x,Science Publishing Corporation,,Gopinath Muruti; Siti Hawa Mokhtar; Fiza Abdul Rahim; Zul-Azri Ibrahim; Abbas M. Al-Ghaili,"Forensics is a vital point for law enforcement, civil litigators, and different experts who manage complex advanced examinations. Digital forensics has assumed a noteworthy part in a portion of the biggest criminal and civil investigations. However, the ascent in the prevalence of big data as a better approach for unraveling the challenges exhibited by huge, complex data due to the progression of innovations such as the Internet, Internet of Things (IoT), and Cloud Computing. These challenges have contributed to data deluge and forensics tool limitations in the digital forensics investigation. In this paper, a number of challenges faced by the digital forensics investigator in a big data environment are discussed. The identified challenges could significantly contribute to a more efficient digital forensics process in the big data environment. ",7,4.35,866,866,Big data; Digital forensics; Law enforcement; Computer science; Cloud computing; Digital evidence; Internet of Things; Data science; Process (computing); The Internet; Computer security; Point (geometry); Internet privacy; World Wide Web; Political science; Data mining; Law; Geometry; Mathematics; Operating system,,,,,,http://dx.doi.org/10.14419/ijet.v7i4.35.26271,,10.14419/ijet.v7i4.35.26271,,,0,,0,true,cc-by,green
131-654-072-552-211,Improvising the input process of traceability model for digital forensic investigation,,2014,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Iman Ahmeid Mohamed; Azizah Abdul Manaf,"In this paper, we present an enhancement input in the traceability model of digital forensic investigation. Plus, we present a literature review about existing traceability models. Furthermore, the outcome of this model expected to help and improvise the traceability model with theoretically proven justifications.",3,2,106,110,Improvisation; Outcome (game theory); Traceability; Digital forensic investigation; Computer science; Process (engineering); Multimedia; Wireless,,,,,http://sdiwc.net/digital-library/improvising-the-input-process-of-traceability-model-for-digital-forensic-investigation http://eprints.utm.my/id/eprint/59791/,http://dx.doi.org/10.17781/p001300,,10.17781/p001300,2018811932,,0,012-779-911-526-394; 013-560-904-249-085; 044-204-570-951-600; 054-807-178-292-239; 068-107-373-977-621; 068-931-665-572-533; 079-337-699-435-921; 081-101-710-547-862; 084-491-190-473-067; 089-963-839-663-899; 126-391-076-222-970; 134-836-932-890-840; 140-862-146-798-760; 141-208-107-719-601; 180-176-605-708-973,0,false,,
131-789-340-932-05X,Trusted computing and the digital crime scene,2014-01-28,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Yianna Danidou; Burkhard Schafer,"Yianna Danidou and Burkhard Schafer provide an analysis of the future of digital forensics in an environment where control is increasingly taken away from PC users and remotely managed by trusted third parties, typically to improve internet security by considering Trusted Computing to illustrate some of the possible legal issues that arise.",8,0,,,Internet privacy; Direct Anonymous Attestation; Crime scene; Trusted Network Connect; Internet security; Control (management); Trusted Computing; Computer security; Computer science; Digital forensics,,,,,https://sas-space.sas.ac.uk/5412/ https://journals.sas.ac.uk/deeslr/article/view/1960 http://www.research.ed.ac.uk/portal/files/13519397/Schafer_Trusted_Computing.pdf https://www.research.ed.ac.uk/portal/files/13519397/Schafer_Trusted_Computing.pdf https://core.ac.uk/download/28968734.pdf,http://dx.doi.org/10.14296/deeslr.v8i0.1960,,10.14296/deeslr.v8i0.1960,2066768986,,0,,0,true,cc-by-nc-nd,hybrid
131-796-930-292-035,A triage framework for digital forensics,,2015,journal article,Computer Fraud & Security,13613723,Mark Allen Group,United Kingdom,Muhammad Shamraiz Bashir; Muhammad Naeem Ahmed Khan,"A sharp increase in malware and cyber-attacks has been observed in recent years. Analysing cyber-attacks on the affected digital devices falls under the purview of digital forensics. The Internet is the main source of cyber and malware attacks, which sometimes result in serious damage to the digital assets. The motive behind digital crimes varies – such as online banking fraud, information stealing, denial of services, security breaches, deceptive output of running programs and data distortion. Digital forensics analysts use a variety of tools for data acquisition, evidence analysis and presentation of malicious activities. This leads to device diversity posing serious challenges for investigators. For this reason, some attack scenarios have to be examined repeatedly, which entails tremendous effort on the part of the examiners when analysing the evidence. To counter this problem, Muhammad Shamraiz Bashir and Muhammad Naeem Ahmed Khan at the Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Islamabad, Pakistan propose a novel triage framework for digital forensics.",2015,3,8,18,Internet privacy; The Internet; Variety (cybernetics); Bhutto; Triage; Denial; Computer security; Computer science; Malware; Computer forensics; Digital forensics,,,,,https://www.sciencedirect.com/science/article/abs/pii/S136137231530018X,http://dx.doi.org/10.1016/s1361-3723(15)30018-x,,10.1016/s1361-3723(15)30018-x,2030555322,,0,002-633-789-384-681; 003-871-070-011-964; 017-071-408-718-290; 020-626-957-505-364; 026-024-733-636-162; 030-351-009-711-953; 032-372-560-487-047; 035-269-627-388-435; 037-483-791-552-006; 040-105-187-457-272; 040-483-292-320-671; 042-251-875-510-426; 052-209-716-598-874; 062-325-585-829-185; 087-690-831-820-163; 093-448-702-012-591; 105-002-898-852-695; 127-286-301-080-684; 132-606-863-800-090,6,false,,
131-874-028-513-738,Network Forensics for Detecting Flooding Attack on Internet of Things (IoT) Device,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Randi Rizal; Yudi Prayudi Imam Riadi,,7,4,382,390,Flooding attack; Computer security; Computer science; Network forensics; Wireless; Internet of Things,,,,,http://sdiwc.net/digital-library/network-forensics-for-detecting-flooding-attack-on-internet-of-things-iot-device,http://sdiwc.net/digital-library/network-forensics-for-detecting-flooding-attack-on-internet-of-things-iot-device,,,2890450137,,0,000-459-858-701-166; 005-235-444-045-604; 024-381-049-056-789; 039-017-118-332-745; 052-439-768-589-13X; 060-294-953-084-788; 087-287-435-836-200; 093-117-308-515-186; 108-830-956-418-92X; 117-577-672-405-801; 147-631-422-817-38X,6,false,,
131-877-210-773-759,Development of Evidence Analysis Tool based on Active Data for Digital Forensics,,2012,journal article,Journal of Digital Convergence,17381916,,,Lee Jun Yeon,"The digital forensics are new kinds of security that investigate and verificate fact relation about activities based on digital data. In this paper, we implemented digital forensic tool that can be used in collecting, analyzing, and reporting evidences. This tool support intuitional GUI that everybody can analyze easily. And a simple operation can collect and analyze active data. Also, we can decrease much time and endeavor by using this forensic tool that support reliable data.",10,3,99,104,Engineering; World Wide Web; Data science; Relation (database); SIMPLE (military communications protocol); Digital data; Active data; Evidence analysis; Network forensics; Digital forensics,,,,,http://www.koreascience.or.kr:80/article/JAKO201219565295897.pdf https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001660385 http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=DJTJBT_2012_v10n3_99,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=DJTJBT_2012_v10n3_99,,,2398398601,,0,,0,false,,
132-698-173-062-570,Problem based learning in digital forensics,2016-03-21,2016,journal article,Higher Education Pedagogies,23752696,Informa UK Limited,United Kingdom,Alastair Irons; Paula Thomas,AbstractThe purpose of this paper is to compare and contrast the efforts of two universities to address the issue of providing computer forensics students with the opportunity to get involved in the practical aspects of forensic search and seizure procedures. The paper discusses the approaches undertaken by the University of Sunderland and the University of South Wales (Glamorgan) to give the students the opportunity to process a case from the crime scene through to the court room. In order to do this both institutions adopted a problem-based learning (PBL) approach – to reflect real-world solutions and encourage students to work in groups to seek further knowledge and understanding of the various processes and procedures – in particular the steps around search and seizure of digital evidence from a crime scene. The PBL activities at Sunderland and Glamorgan were designed in order to help the students understand the processes of digital crime scene analysis and search and seizure procedures and to give th...,1,1,95,105,Likert scale; Engineering; Mathematics education; Crime scene; Information system; Problem-based learning; Digital evidence; Computer security; Computer forensics; Search and seizure; Digital forensics,,,,,https://sure.sunderland.ac.uk/5059/1/04082014a.pdf https://tandfonline.com/doi/pdf/10.1080/23752696.2015.1134200 http://eprints.glos.ac.uk/4289/ https://eric.ed.gov/?id=EJ1147563 https://www.tandfonline.com/doi/full/10.1080/23752696.2015.1134200 https://sure.sunderland.ac.uk/6133/ https://www.tandfonline.com/doi/ref/10.1080/23752696.2015.1134200 https://core.ac.uk/display/76979856 https://core.ac.uk/download/74368705.pdf,http://dx.doi.org/10.1080/23752696.2015.1134200,,10.1080/23752696.2015.1134200,2157169106,,0,005-733-361-126-371; 007-790-059-029-953; 014-261-775-435-338; 046-474-638-122-984; 052-361-056-422-596; 066-198-497-514-876; 070-048-250-044-834; 087-300-425-406-630,5,true,"CC BY, CC BY-NC",gold
133-052-309-017-335,Automated Book Location and Classification Method using RFID Tags for Smart Libraries,,2021,journal article,Microprocessors and Microsystems,01419331,Elsevier BV,Netherlands,Orhan Yaman; Turker Tuncer; Fatih Ertam,,87,,104388,,Data mining; Position (vector); Redundancy (engineering); Signal strength; Principal component analysis; Classifier (linguistics); Classification methods; Computer science; Decision tree; Relevance (information retrieval),,,,,https://www.sciencedirect.com/science/article/pii/S0141933121005354,http://dx.doi.org/10.1016/j.micpro.2021.104388,,10.1016/j.micpro.2021.104388,3216545150,,0,003-859-818-993-151; 006-169-782-834-503; 006-198-158-868-85X; 006-752-222-865-553; 008-900-327-777-570; 010-955-615-069-982; 012-143-222-613-106; 013-493-258-558-395; 013-727-243-326-283; 022-458-508-323-568; 023-345-836-616-138; 030-509-298-236-366; 030-693-220-298-527; 031-349-318-263-879; 034-504-524-749-913; 039-223-288-474-436; 040-885-254-494-234; 041-765-116-830-316; 043-911-498-033-173; 047-338-340-336-787; 047-360-327-948-595; 049-315-062-956-636; 049-761-358-942-321; 051-240-950-492-794; 054-489-653-005-315; 059-114-170-788-520; 060-808-708-563-027; 063-006-382-575-515; 066-969-809-562-168; 071-179-499-285-269; 075-349-906-700-824; 076-366-409-637-140; 083-367-207-363-899; 085-779-613-440-873; 094-296-959-678-635; 096-935-361-056-680; 097-257-267-733-127; 099-687-236-719-229; 103-577-386-694-974; 103-984-276-286-601; 105-886-517-704-848; 109-911-722-460-245; 110-906-032-359-19X; 113-465-879-866-670; 124-689-704-994-381; 124-703-084-235-031; 125-145-367-055-543; 126-396-237-183-697; 128-960-538-861-612; 132-907-402-882-731; 142-425-323-419-037; 153-262-626-890-817; 163-418-505-282-55X; 166-697-315-119-659,0,false,,
133-401-132-549-688,Prelim iii - Contents List,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,33,,301047,301047,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30336-x,,10.1016/s2666-2817(20)30336-x,,,0,,0,false,,
133-532-326-238-319,CURRENT EVIDENCE ON BIOINFORMATICS ROLE AND DIGITAL FORENSICS THAT CONTRIBUTE TO FORENSIC SCIENCE: UPCOMING THREAT,2022-04-22,2022,journal article,JURNAL RISET RUMPUN MATEMATIKA DAN ILMU PENGETAHUAN ALAM,28289390; 28289382,Politeknik Pratama Purwokerto,,Rosyid Al Hakim; Esa Putri; Hexa Hidayah; Agung Pangestu; Sri Riani,"Forensics has become an essential part of the disclosure of criminal evidence. A bioinformatics approach in the form of DNA forensics and digital forensics can be a good combination in disclosing digital-based criminal evidence. This study explains how the role of bioinformatics through the digital approach can be a means of forming new approaches in integration with digital forensics, called cyber-bioinformatics. Despite many hopes and challenges ahead, it does not rule out the possibility of criminal cases related to the privacy of human genomic data, so it proposes a new hypothesis, “cyber-bioinformatics.” The role of cyber-bioinformatics is very central in this regard.",1,1,25,32,,,,,,,http://dx.doi.org/10.55606/jurrimipa.v1i1.157,,10.55606/jurrimipa.v1i1.157,,,0,,0,false,,
133-793-757-735-03X,Digital forensic investigation challenges based on cloud computing characteristics,2018-10-07,2018,journal article,International Journal of Engineering & Technology,2227524x,Science Publishing Corporation,,Ganthan Narayana Samy; Nurazean Maarop; Mohd Shahidan Abdullah; Sundresan Perum; Sameer Hasan Albakri; Bharanidharan Shanmugam; Premylla Jeremiah,"One of the most popular computing technologies is cloud computing. There are many benefits in adopting cloud computing such as high-performance, flexibility and availability ondemand, more focused on the business objective and low-cost. However, the characteristics of the cloud computing environment have created many difficulties and challenges for digital forensic investigation processes. Therefore, this paper focuses on the digital forensic investigation challenges based on cloud computing characteristics.",7,4.15,7,,Data science; Flexibility (engineering); Digital forensic investigation; Computer science; Cloud computing,,,,,http://eprints.utm.my/id/eprint/86633/ https://core.ac.uk/download/334606705.pdf,http://dx.doi.org/10.14419/ijet.v7i4.15.21361,,10.14419/ijet.v7i4.15.21361,2941775230,,0,,1,true,,bronze
134-032-265-239-814,Internet of things devices: digital forensic process and data reduction,,2020,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Reza Montasari; Richard Hill; Farshad Montaseri; Hamid Jahankhani; Amin Hosseinian Far,,12,4,424,424,Computer science; Digital forensics; Process (computing); Digital evidence; Computer security; Internet of Things; The Internet; Reduction (mathematics); Data science; Internet privacy; World Wide Web,,,,,,http://dx.doi.org/10.1504/ijesdf.2020.110676,,10.1504/ijesdf.2020.110676,,,0,,3,true,,green
134-264-047-754-183,The Role of “Digital Forensic Photography”- In the Indian Criminal Justice System,2021-05-01,2021,journal article,Journal of emerging technologies and innovative research,23495162,,,Rakesh Mia; Vijay R. Panchal; Yukta Guglot,"Photography is one of the most critical factors in any crime scene solving cases. Crime Scene photography or forensic photography is an important role depending on the crime scene as well as its a photo in the criminal justice system as a scene of crime evidence. In the 21st century all over the world, all respective forensic science authorities used high-resolution camera, lens and modern instrumentation technology to capture crime scene occur photos. Evidence collection and preservation using digital forensic photography is a crucial aspect of a future legal proceeding. In this paper, we summarize the modern aspects of digital forensic photography in the Indian criminal justice system",8,5,,,Criminal justice; Photography; Visual arts; Crime scene; Forensic photography; Legal proceeding; Critical factors; Evidence collection; Digital forensics; History,,,,,https://www.jetir.org/view?paper=JETIR2105285 https://www.jetir.org/papers/JETIR2105285.pdf,https://www.jetir.org/view?paper=JETIR2105285,,,3160362477,,0,,1,false,,
134-271-291-397-152,Digital Forensic Technology of Solaris,,2012,journal article,Advanced Materials Research,16628985,"Trans Tech Publications, Ltd.",,Fei Zhao; Jing Sheng Zhang; Zhong Xia Wang,"The UFS file system of Solaris is not supported undelete operation, so it is a difficult thing to digital forensic. This paper based on the UFS documents of 10 Solaris’ the log file system and the physical structure of UFS file system’s storage, putting forward the method of digital forensic for it. In cases of actual digital forensic for Solaris 10, it can restore the required documents, so this method has good effect",601,,342,346,Unix file types; File system; Physical structure; Computer science; Database; Digital forensics,,,,,https://www.scientific.net/AMR.601.342,http://dx.doi.org/10.4028/www.scientific.net/amr.601.342,,10.4028/www.scientific.net/amr.601.342,2019721255,,0,,0,false,,
134-478-091-171-675,О теоретических аспектах использования в криминалистике понятия электронно-цифрового следа,,2020,journal article,Юридические исследования,24097136,"Aurora Group, s.r.o",,Иванов Владислав Юрьевич,"; This article examines the theoretical problem of formulating a definition for new type of traced manifested in computer space. The subject of this research is concept of digital footprint. Special attention is paid to different approaches of forensic specialists towards interpretation of trace pattern formed as a result of a crime committed with the use of technical devices, including the Internet. Analysis is conducted on various opinions of forensic specialists dealing with this problem. The author provides and substantiates the original opinion on introduction of the term “digital footprint”. The conclusion is formulated on the need to accept digital footprint as most appropriate term for describing any type of trace manifested in computer space, including the Internet. The article also presents an original definition of such type of trace intelligible to general audience. The author indicates the trends and prospects in formation and further development of the new branch of forensic technology – “forensic examination of digital footprint"". The proposed conclusions may be valuable in scientific and educational activity.; ",,7,75,80,,,,,,https://www.nbpublish.com/library_read_article.php?id=33682 https://www.nbpublish.com/library_get_pdf.php?id=33682 https://e-notabene.ru/lr/article_33682.html,http://dx.doi.org/10.25136/2409-7136.2020.7.33682,,10.25136/2409-7136.2020.7.33682,3088951709,,0,085-976-961-234-411,1,true,cc-by-nc,gold
134-957-252-728-269,A Practical Approach for Digital Forensic Triage,,2015,journal article,Applied Mechanics and Materials,16627482,"Trans Tech Publications, Ltd.",,Jianguo Jiang; Bo Yang; Sen Lin; Ming Xing Zhang; Kun Ying Liu,"In order to uncover truths to serve justice, case-related data collected from a digital investigation requires substantial resources to analyze, especially in time-critical situations. At present, however, digital forensics has not evolved to meet this ever-increasing demand. Digital forensic triage is a promising solution, as it is designed to maximize the use of resources according to a system of priorities, and hence the efficiency and effectiveness of forensic examinations can be increased. Nevertheless, the lack of concrete methods limits efforts to implement triage. This paper presents a practical approach that is designed to build a prioritizing solution. In this work a new process model is derived based on the presented approach, and it is particularly suited to scenarios where forensic examiners do not have enough time and resources to conduct a full examination and analysis. An example is described to demonstrate how this approach can be used to meet the requirements of network forensic investigations.",742,,437,444,Risk analysis (engineering); Engineering; Work (electrical); Justice (ethics); Triage; Computer security; Process (engineering); Digital forensics,,,,,https://www.scientific.net/AMM.742.437 https://zh.scientific.net/AMM.742.437.pdf,http://dx.doi.org/10.4028/www.scientific.net/amm.742.437,,10.4028/www.scientific.net/amm.742.437,2075057275,,0,000-750-047-594-348; 003-982-227-180-136; 019-698-064-288-240; 029-025-221-262-260; 029-938-776-068-353; 032-697-093-668-898; 038-668-970-194-854; 047-630-600-014-492; 065-452-675-566-99X; 087-262-232-954-302; 090-752-043-508-733; 091-619-263-117-914; 122-880-373-616-302; 125-384-800-661-375; 131-516-331-360-906; 132-355-634-397-986; 184-948-841-629-735; 199-745-676-923-766,2,false,,
135-024-140-709-532,Darknet Intelligence in Digital Forensics,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Amartya Mohan Tagore,,,,,,Darknet; Computer security; Computer science; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.04,http://dx.doi.org/10.46293/4n6/2021.03.02.04,,10.46293/4n6/2021.03.02.04,3162995776,,0,,0,false,,
135-172-175-862-937,Forensic Analysis of Android-based WhatsApp Messenger Against Fraud CrimeUsing The National Institute of Standard and Technology Framework,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Helmy Trisnasenjaya; Riadi,,8,1,89,97,World Wide Web; Computer science; Wireless; Android (operating system),,,,,http://sdiwc.net/digital-library/forensic-analysis-of-androidbased-whatsapp-messenger-against-fraud-crimernusing-the-national-institute-of-standard-and-technology-framework,http://dx.doi.org/10.17781/p002567,,10.17781/p002567,2974462574,,0,,0,false,,
135-404-754-742-569,US2022-Print-Ad,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,42,,301426,301426,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00107-x,,10.1016/s2666-2817(22)00107-x,,,0,,0,false,,
135-644-852-278-088,Effectiveness of OSForensic in Digital Forensic Investigation to Curb cybercrime,2021-05-12,2021,journal article,Indian Journal of Forensic Medicine & Toxicology,09739122; 09739130,Institute of Medico-legal Publications Private Limited,India,Bandr Siraj Fakiha,"With the rapid development and higher level of dependence on new information and technology by various organizations across the world, cybercrime issues are increasing, and there are no technologies that seem flawless in combatting the issue. The use of concepts relating to digital forensic investigation of criminal activities and digital forensics will, therefore, tackle the problem with finding digital evidence in cybercrimes. OSForensics is one of the various digital forensic investigation tools that allows the use of Hash Sets for identifying known safe files in program and operating system files. The tool is essential for identifying suspected files like Trojans, viruses, and hacker scripts. The problem presented in this paper, therefore, entails utilizing combinations of digital forensic investigation of criminal activities and investigation concepts. The paper seeks to establish the effectiveness of OSForensic in Digital Forensic Investigation to curb cybercrime. That is, the capabilities of OSForensics and the accuracy of OSForensics with regards to retrieving and analyzing data from a hard drive in order to investigate and curb cybercrime at the workplace. The researcher investigated a case in which a company security had been threatened by an employee whose contract had recently been terminated. The company suspected that this employee had some serious pictures, locations, and employee details belong to company. The image of the employee’s personal flash was sent to the researcher to help initiate the investigation using OSForensicssoftware so as to establish any evidence that the employee still had pictures, locations, and employee details belong to company. In overall, OSForensic was able to identify company details that the employee was having. The research was able to identify sensitive information about the company that the suspect was having, including the names of the employees, images, company system structure and what seemed to be their respective identification numbers.",15,3,2149,2153,Internet privacy; Information sensitivity; Suspect; Cybercrime; Digital evidence; Computer science; Scripting language; Identification (information); Digital forensics; Hacker,,,,,https://medicopublication.com/index.php/ijfmt/article/view/15633,http://dx.doi.org/10.37506/ijfmt.v15i3.15633,,10.37506/ijfmt.v15i3.15633,3195510639,,0,,0,false,,
135-646-933-254-458,HANDWRITING EXPERTISE IN THE FORENSIC SCIENCE CENTRE OF LITHUANIA: PRESENT ACTIONS AND FUTURE VISION,2022-08-09,2022,journal article,Criminalistics and Forensics,01302655,Kyiv Scientific Research Institute of Forensic Expertise,,Rasa Tamošiūnaitė,"Recently, the number of expert investi gations in handwriting evidence at the Lithuanian Forensic Examination Centre (LTEC) has significantly decreased. The decrease has been observed for several years already.; ; The present article analyses possible reasons for the decrease in the number of expert investigations in handwriting in LT EC and the importance of such investigation in the context of judicial research, court proceeding, and criminal investigations.; ; Also, the article deals with the use of electronic signatures and associated security problems in the digital environment.; ; Key words: handwriting examination, signature, digital signature, digitized sig-; nature, informativeness of signatures.",,67,365,371,Handwriting; Lithuanian; Context (archaeology); Forensic examination; Forensic science; Digital signature; Signature (topology); Computer science; Criminal investigation; Computer security; Data science; Psychology; Artificial intelligence; Engineering; Criminology; History; Linguistics; Forensic engineering; Mathematics; Hash function; Philosophy; Geometry; Archaeology,,,,,,http://dx.doi.org/10.33994/kndise.2022.67.37,,10.33994/kndise.2022.67.37,,,0,,0,true,,gold
136-400-281-116-450,Blockchain in Big Data Security for Intelligent Transportation With 6G,,2022,journal article,IEEE Transactions on Intelligent Transportation Systems,15249050; 15580016,Institute of Electrical and Electronics Engineers (IEEE),United States,Zhili Zhou; Meimin Wang; Jingwang Huang; Shengliang Lin; Zhihan Lv,,23,7,9736,9746,,,,,"National Key Research and Development Program of China; National Natural Science Foundation of China; Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) Fund; Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) Fund, China; National Natural Science Foundation of China; Key Research and Development Plan-Major Scientific and Technological Innovation Projects of Shan Dong Province",,http://dx.doi.org/10.1109/tits.2021.3107011,,10.1109/tits.2021.3107011,,,0,000-011-491-611-440; 000-485-788-343-744; 016-570-710-853-004; 017-545-329-534-639; 018-100-712-291-478; 021-356-321-827-56X; 021-366-140-005-38X; 023-628-555-025-470; 024-157-397-156-077; 027-096-043-528-331; 029-398-614-412-735; 032-681-151-128-894; 033-626-869-265-446; 033-806-179-572-332; 042-007-790-969-735; 042-062-310-431-592; 044-505-693-910-904; 045-311-173-303-183; 045-968-687-151-048; 048-020-457-650-67X; 050-225-205-577-083; 061-439-638-833-25X; 061-909-337-739-060; 063-248-380-987-446; 065-380-115-215-243; 066-311-471-847-244; 071-176-890-544-418; 078-153-154-866-171; 085-379-313-234-901; 086-959-383-959-374; 089-073-066-008-897; 089-683-685-882-012; 092-596-905-671-376; 101-105-320-099-082; 111-893-720-044-323; 112-913-230-973-033; 114-889-854-098-295; 120-418-036-914-955; 121-225-796-399-648; 122-682-468-170-924; 124-555-210-006-28X; 138-423-145-544-850; 152-934-938-742-066,1,false,,
136-582-664-371-301,Role of Windows Registry Forensics in Digital Forensics Investigation,2018-06-07,2018,journal article,International Journal for Electronic Crime Investigation,26166003; 25223429,Lahore Garrison University,,Mohsin Ali Mohsin Ali,"The research paper covers one of the most important aspect of the digital forensics investigation “Registry Forensics” as there are several components that are necessary for carrying out digital forensics investigation, one cannot overall the windows registry. The research paper is basically divided into two segments, where the first segment fully explains what registry is, how it works, and what important information stored in it. Moreover, the research paper covers the aspect of anti-forensics elements that are incorporated by different cyber criminals in order to wipe the traces of fraudulent activities, and finally the author has concluded the research paper by highlighting the importance of windows registry in digital forensics investigation.",2,3,9,,,,,,,,http://dx.doi.org/10.54692/ijeci.2018.020318,,10.54692/ijeci.2018.020318,,,0,,0,false,,
136-652-465-419-22X,CONCEPT AND SIGNS OF DIGITAL TRACES THAT FORM DURING CYBERCRIMES,2020-05-18,2020,journal article,Criminalistics and Forensics,01302655,Kyiv Scientific Research Institute of Forensic Expertise,,O. Omelian,"The article considers scientific views on terminology in the field of forensics and forensic examination for the investigation of cybercrime, as well as taking into account the specific use of information and telecommunication technologies in forensics, the validity of the term’s use “digital traces” is substantiated.; ; The author’s definition of the concept of digital traces that are formed during the commission of cybercrimes is proposed. Its specific signs and properties are presented and analyzed as well. The necessity of using special knowledge and appropriate expert equipment to search for, detect and record digital tracks has been noted. It is emphasized the importance of the speed of detection and investigation of digital traces in the process of investigating cybercrimes. The necessity of developing the concept of digital tracks, research of new, different from traditional methods, methods and means of their detection, fixation, analysis and preservation is substantiated.",,65,457,466,,,,,,http://dx.doi.org/10.33994/kndise.2020.65.45,http://dx.doi.org/10.33994/kndise.2020.65.45,,10.33994/kndise.2020.65.45,3037683530,,0,,0,true,,gold
136-921-865-701-702,A review study on blockchain-based IoT security and forensics,2021-09-01,2021,journal article,Multimedia Tools and Applications,13807501; 15737721,Springer Netherlands,Netherlands,Randa Kamal; Ezz El-Din Hemdan; Nawal El-Fishway,"The term Internet of Things (IoT) represents all communicating countless heterogeneous devices to share data and resources via the internet. The speedy advance of IoT devices proposes limitless benefits, but it also brings new challenges regarding security and forensics. Likewise, IoT devices can generate a massive amount of data that desires integrity and security during its handling and processing in an efficient way. IoT devices and data can be vulnerable to various types of cyber-crimes at each IoT layer. For combating these cyber-crimes in IoT infrastructure, IoT forensic term has shown up. The IoT forensic is the process of performing digital forensic investigation in the IoT environment in a forensically sound and timely fashion manner. Sundry challenges face the IoT forensics that requires urgent solutions and mitigation methods; digital evidence needs to be collected, preserved, analyzed, processed, and reported in a trusted manner to be acceptable for presenting in the court of law. Preserving the evidence unchanged or tampered with is the most critical challenge in digital forensics. Authentication is another challenge facing digital forensics; who is allowed to deal with the evidence? One of the most recent solutions for supporting IoT forensics is the use of Blockchain. Using Blockchain in digital forensics guarantees data integrity, immutability, scalability, and security. Therefore, this paper presents a comprehensive review of IoT security and forensics with the integration with Blockchain technology. It begins by providing an inclusive discussion of IoT security, as well as the need for IoT forensics, and the concepts of Blockchain. Then, a review of Blockchain-based IoT security and forensics issues is presented. Finally, a discussion of open research directions is provided.",,,1,32,The Internet; Authentication; Open research; Digital evidence; Data integrity; Computer security; Computer science; Process (engineering); Scalability; Digital forensics,,,,,https://link.springer.com/article/10.1007%2Fs11042-021-11350-9,https://link.springer.com/article/10.1007%2Fs11042-021-11350-9,,,3197657744,,0,001-255-393-025-47X; 002-020-246-447-998; 002-833-179-413-429; 004-137-132-720-257; 004-615-796-313-121; 005-012-690-926-011; 005-224-642-777-474; 006-307-345-966-439; 006-318-177-787-16X; 007-320-554-486-362; 007-633-216-828-494; 008-807-158-661-924; 010-978-011-367-884; 011-965-831-977-868; 012-418-911-164-537; 014-448-058-704-128; 015-973-222-946-009; 017-562-642-083-445; 017-843-938-494-981; 020-587-089-761-077; 020-898-202-535-134; 021-134-599-167-021; 021-703-134-019-886; 022-048-109-808-996; 022-763-404-461-908; 023-465-371-433-193; 024-910-782-556-015; 025-259-885-861-617; 026-334-089-671-023; 026-698-451-512-277; 029-489-501-199-089; 029-610-096-288-863; 029-892-989-646-160; 030-824-319-524-202; 030-997-038-769-92X; 031-012-491-963-576; 031-398-229-671-548; 031-941-891-090-264; 032-191-634-122-495; 032-480-663-490-749; 033-434-879-329-689; 034-177-354-328-802; 034-940-557-037-083; 035-731-194-139-501; 038-002-080-319-757; 039-420-403-957-058; 040-143-785-791-905; 041-694-566-692-090; 042-935-076-531-009; 043-396-872-320-567; 043-990-897-373-907; 045-545-290-957-356; 047-193-826-883-209; 048-759-356-661-308; 050-241-071-432-208; 050-391-026-832-281; 051-662-461-185-849; 051-785-078-933-787; 053-142-074-890-154; 053-173-166-061-419; 054-079-583-763-10X; 054-147-266-467-026; 055-498-537-115-235; 055-811-656-615-740; 056-948-667-641-374; 058-028-339-076-776; 058-183-025-760-225; 058-216-449-390-342; 059-257-554-844-104; 060-577-614-625-105; 062-239-752-997-805; 062-600-341-536-072; 063-350-974-331-285; 063-365-805-979-031; 064-065-630-353-572; 065-654-832-541-493; 066-129-449-973-964; 066-976-962-367-399; 068-502-312-271-078; 069-808-303-777-278; 072-541-155-917-90X; 074-407-533-215-290; 076-688-332-542-46X; 077-858-823-212-989; 078-076-784-684-405; 081-677-124-683-871; 082-403-932-515-639; 082-655-762-381-068; 083-366-430-872-667; 083-888-956-568-609; 087-864-339-137-909; 088-553-642-323-93X; 088-815-757-467-332; 089-419-984-563-123; 090-277-922-829-920; 090-746-449-797-220; 092-827-935-965-207; 093-586-085-641-725; 094-132-495-303-526; 097-939-114-561-254; 098-495-821-664-529; 098-955-808-363-478; 099-532-580-533-443; 102-224-315-391-490; 102-673-073-835-039; 104-120-419-034-347; 105-453-220-486-612; 106-443-463-834-498; 108-114-708-601-04X; 109-244-833-901-828; 111-834-007-975-130; 118-734-946-098-646; 118-985-625-047-182; 131-447-324-046-074; 131-581-925-248-197; 134-170-516-223-565; 135-366-444-347-040; 147-906-708-243-924; 153-430-890-325-227; 159-237-651-629-403; 160-518-804-288-395; 163-498-042-271-565; 165-911-959-289-387; 166-294-209-773-802; 167-729-551-082-27X; 173-254-366-740-139; 183-678-779-320-097; 184-229-080-509-446,1,false,,
137-320-816-794-079,A Forensic Audit of the Tor Browser Bundle,,2019,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Matt Muir; Petra Leimich; William J Buchanan,"Abstract The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protocol, as its main focus is to protect the privacy of the user, in both its local footprint within a host and over a network connection. The Tor browser, though, can leave behind digital artefacts which can be used by an investigator. This paper outlines an experimental methodology and provides results for evidence trails which can be used within real-life investigations.",29,,118,128,Footprint; Encryption; Host (network); Audit; Bundle; Network connection; Computer security; Focus (computing); Computer science; Protocol (object-oriented programming),,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287619300829 https://doi.org/10.1016/j.diin.2019.03.009 https://dblp.uni-trier.de/db/journals/corr/corr1907.html#abs-1907-10279 https://arxiv.org/pdf/1907.10279.pdf https://arxiv.org/abs/1907.10279 https://core.ac.uk/download/195354109.pdf,http://dx.doi.org/10.1016/j.diin.2019.03.009,,10.1016/j.diin.2019.03.009,2935234850,,0,020-774-682-563-067; 025-319-861-345-580; 062-433-321-011-994; 098-833-276-904-716; 127-411-064-172-146; 133-479-985-342-849; 140-202-585-278-528; 183-699-905-653-662,12,true,,green
137-402-861-825-929,Professionalism in digital forensics,2014-01-21,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Alistair Irons; Anastasia Konstadopoulou,Alastair Irons and Anastasia Konstadopoulou explore some of the issues that affect the emergence of a new breed of expert: the digital forensic specialist.,4,0,,,Computer science; Multimedia; Computer forensics; Digital forensics,,,,,https://journals.sas.ac.uk/deeslr/article/view/1798 https://sas-space.sas.ac.uk/5584/ https://sure.sunderland.ac.uk/id/eprint/1661/,http://dx.doi.org/10.14296/deeslr.v4i0.1798,,10.14296/deeslr.v4i0.1798,2074474473,,0,,0,true,cc-by-nc-nd,hybrid
137-471-096-969-114,Prelim iii - Contents List,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,35,,301100,301100,Information retrieval; Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30402-9,,10.1016/s2666-2817(20)30402-9,,,0,,0,true,,bronze
137-692-081-537-430,eDiscovery With Belkasoft,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Yuri Gubanov,,,,,,,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.02,http://dx.doi.org/10.46293/4n6/2020.02.04.02,,10.46293/4n6/2020.02.04.02,3095181402,,0,,0,false,,
138-173-404-908-550,"Digital Forensics, A Need for Credentials and Standards",,2019,journal article,"The Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Nima Zahadat,,14,1,3,,Quality assurance; Engineering; Credentialing; Certification; Curriculum; Engineering ethics; Computer forensics; Accreditation; Digital forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1560&context=jdfsl https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl14.html#Zahadat19 https://mdsoar.org/handle/11603/18740 https://commons.erau.edu/jdfsl/vol14/iss1/3/,http://dx.doi.org/10.15394/jdfsl.2019.1560,,10.15394/jdfsl.2019.1560,2992114667,,0,004-652-388-189-304; 007-790-059-029-953; 011-212-632-773-778; 017-815-064-018-299; 019-831-293-743-518; 032-286-659-568-014; 038-668-970-194-854; 042-230-817-975-353; 078-327-902-374-330; 119-234-785-721-155; 134-927-490-231-285; 161-212-502-492-31X; 172-906-636-987-575,1,true,cc-by-nc,gold
139-924-660-355-079,"Digital Forensics AI: Evaluating, Standardizing and Optimizing Digital Evidence Mining Techniques",2022-05-12,2022,journal article,KI - Künstliche Intelligenz,09331875; 16101987,Springer Science and Business Media LLC,,Abiodun A. Solanke; Maria Angela Biasiotti,"AbstractThe impact of AI on numerous sectors of our society and its successes over the years indicate that it can assist in resolving a variety of complex digital forensics investigative problems. Forensics analysis can make use of machine learning models’ pattern detection and recognition capabilities to uncover hidden evidence in digital artifacts that would have been missed if conducted manually. Numerous works have proposed ways for applying AI to digital forensics; nevertheless, scepticism regarding the opacity of AI has impeded the domain’s adequate formalization and standardization. We present three critical instruments necessary for the development of sound machine-driven digital forensics methodologies in this paper. We cover various methods for evaluating, standardizing, and optimizing techniques applicable to artificial intelligence models used in digital forensics. Additionally, we describe several applications of these instruments in digital forensics, emphasizing their strengths and weaknesses that may be critical to the methods’ admissibility in a judicial process.",,,,,Digital forensics; Computer science; Standardization; Process (computing); Computer forensics; Digital evidence; Strengths and weaknesses; Data science; Domain (mathematical analysis); Variety (cybernetics); Artificial intelligence,,,,Alma Mater Studiorum - Università di Bologna,,http://dx.doi.org/10.1007/s13218-022-00763-9,,10.1007/s13218-022-00763-9,,,0,000-452-908-115-500; 003-137-879-936-770; 003-360-732-233-044; 005-465-138-684-882; 006-110-132-701-331; 006-915-702-173-584; 007-017-884-126-763; 007-123-902-810-016; 007-514-616-400-882; 008-758-179-867-86X; 009-803-691-567-926; 010-591-271-586-999; 010-963-610-208-920; 011-869-845-196-579; 011-973-615-168-206; 013-193-200-485-010; 017-866-764-672-013; 018-339-128-070-611; 021-122-712-929-959; 021-152-929-670-076; 021-495-249-615-203; 021-709-633-408-146; 021-716-208-836-655; 022-001-306-594-001; 022-890-782-823-074; 023-113-470-652-173; 024-470-739-770-394; 025-218-336-182-063; 025-949-648-968-582; 026-637-070-870-880; 026-706-598-228-85X; 026-716-755-237-573; 027-879-891-266-259; 029-011-000-053-812; 030-025-798-038-613; 030-244-355-954-065; 033-225-943-167-901; 036-112-898-081-145; 036-384-272-299-395; 038-851-975-868-307; 040-024-171-977-455; 041-131-516-156-274; 041-351-456-338-328; 042-975-716-732-789; 045-287-244-826-938; 045-591-020-022-945; 048-011-673-789-33X; 048-689-227-588-57X; 048-802-610-388-273; 054-208-541-333-61X; 055-284-632-827-86X; 056-966-379-476-801; 058-717-000-287-105; 059-149-073-001-124; 059-878-189-173-964; 063-034-594-210-284; 064-549-392-650-90X; 065-574-846-834-06X; 067-253-447-599-854; 069-812-790-278-688; 071-925-887-884-193; 072-231-013-731-09X; 072-900-763-568-602; 073-427-478-125-189; 074-182-263-979-316; 075-431-891-877-59X; 075-859-615-742-549; 076-668-645-822-018; 077-902-632-083-884; 080-245-103-101-902; 083-012-787-425-351; 085-332-269-532-11X; 086-653-920-850-621; 088-142-137-151-413; 094-159-592-916-885; 095-263-442-186-414; 096-185-757-909-037; 096-838-446-149-582; 098-340-878-853-594; 098-669-156-394-924; 099-538-623-020-689; 101-549-415-202-81X; 102-940-527-584-734; 103-760-328-285-801; 106-604-221-665-323; 106-820-019-891-26X; 107-362-112-311-662; 108-877-455-100-938; 110-366-692-800-871; 112-744-755-472-229; 113-460-781-457-18X; 113-743-452-135-075; 117-555-147-368-574; 119-357-929-624-478; 120-806-014-141-917; 129-758-715-381-618; 131-559-179-609-745; 137-320-213-389-496; 139-320-230-645-968; 142-790-196-752-819; 143-176-456-443-067; 146-785-925-828-561; 154-735-209-819-28X; 156-905-641-435-682; 162-183-378-458-523; 168-213-788-701-998; 172-928-027-348-61X; 176-679-069-400-341; 176-882-505-758-504; 182-614-300-667-701,1,true,,hybrid
140-176-426-122-829,Prelim iii - Contents List,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,40,,301368,301368,World Wide Web; Geography; Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00040-3,,10.1016/s2666-2817(22)00040-3,,,0,,0,true,,bronze
141-400-075-412-153,Introducing digitalization in forensic and economic expertise,,2022,journal article,Obshchestvo i ekonomika,02073676,The Russian Academy of Sciences,,Arina Belyaeva,"The purpose of the study is to identify factors that affect the quality of forensic economic examination and to consider the ways to neutralize those using digital technologies. The subject of the study is the application of digital technologies to the work of an expert economist. The research methods were the analysis of scientific literature and judicial practice of Russian and foreign researchers, analysis of websites of expert institutions, comparison of expert activities, data aggregation, classification of types and methods of forensic economic examination, description of the expert's activities. The article presents the types and objects of forensic economic examinations in accordance with current regulatory legal acts.; The developments in forensic economic examinations are considered. The potential for introducing modern end-to-end digital technologies into the work of expert economists is analyzed and seven components of technological progress in the field identified. The factors influencing the quality of the forensic economic examination are identified. The measures to minimize and neutralize the threats to expert activity in the context of digitalization are proposed.",,9,115,115,,,,,,,http://dx.doi.org/10.31857/s020736760021867-2,,10.31857/s020736760021867-2,,,0,,0,false,,
141-923-050-043-761,A Method to Encrypt Information with DNA-Based Cryptography,,2015,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Mohammadreza Najaftorkaman,,4,3,417,426,,,,,,,http://dx.doi.org/10.17781/p001648,,10.17781/p001648,,,1,,13,false,,
142-007-449-034-886,Digital Forensics In Multimedia,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Frey John Wisdom,"Digital forensics and multimedia forensics are rapidly growing disciplines where electronic information is extracted and interpreted using scientifically accepted and validated processes, to be used in and outside of a court of law. As personal computing and the internet becomes more widespread, these two fields are becoming increasingly important in law enforcement and cybercrime investigation.Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics which focuses on extracting and analyzing contents such as images, videos, and audio to produce forensic evidence from both regular computer systems and special multimedia devices, such as digital cameras, voice recorders etc. This paper seeks to shed some light on digital forensics in multimedia, methods of authentication and challenges. Keywords: Forensics, Multimedia, Scrutiny, Analysis, Video, Voice, Data, Camera, Authentication BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Frey John Wisdom (2022): Digital Forensics In Multimedia Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 239-250 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P39",1,1,239,250,Computer forensics; Computer science; Digital forensics; Digital evidence; Law enforcement; Multimedia; Authentication (law); Cybercrime; The Internet; Nexus (standard); Computer security; World Wide Web,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p39,,10.22624/aims/crp-bk3-p39,,,0,,0,false,,
142-482-498-545-140,Prelim i - Editorial Board,,2022,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,,,42,,301433,,,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00114-7,,10.1016/s2666-2817(22)00114-7,,,0,,0,false,,
142-682-709-033-759,Stitcher: Correlating digital forensic evidence on internet-of-things devices,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Yee Ching Tok; Chundong Wang; Sudipta Chattopadhyay,"Abstract The increasing adoption of Internet-of-Things (IoT) devices present new challenges to digital forensic investigators and law enforcement agencies when investigation into cybercrime on these new platforms are required. However, there has been no formal study to document actual challenges faced by investigators and whether existing tools help them in their work. Prior issues such as the correlation and consistency problem in digital forensic evidence have also become a pressing concern in light of numerous evidence sources from IoT devices. Motivated by these observations, we conduct a user study with 39 digital forensic investigators from both public and private sectors to document the challenges they faced in traditional and IoT digital forensics. We also created a tool, Stitcher , that addresses the technical challenges faced by investigators when handling IoT digital forensics investigation. We simulated an IoT crime that mimics sophisticated cybercriminals and invited our user study participants to utilize Stitcher to investigate the crime. The efficacy of Stitcher is confirmed by our study results where 96.2% of users indicated that Stitcher assisted them in handling the crime, and 61.5% of users who used Stitcher with its full features solved the crime completely.",35,,301071,,Internet privacy; Private sector; Work (electrical); Cybercrime; Law enforcement; Consistency problem; Computer science; Internet of Things; Digital forensics,,,,Ministry of Education - Singapore,https://www.sciencedirect.com/science/article/abs/pii/S2666281720303681 http://dblp.uni-trier.de/db/journals/corr/corr2003.html#abs-2003-07242 http://www.sciencedirect.com/science/article/pii/S2666281720303681 https://doi.org/10.1016/j.fsidi.2020.301071 https://dblp.uni-trier.de/db/journals/corr/corr2003.html#abs-2003-07242,http://dx.doi.org/10.1016/j.fsidi.2020.301071,,10.1016/j.fsidi.2020.301071,3093759093,,0,001-507-239-208-313; 019-360-393-097-72X; 019-831-293-743-518; 022-056-178-362-107; 035-031-257-128-045; 037-435-312-083-42X; 044-046-807-728-773; 073-194-524-558-213; 097-939-114-561-254; 098-748-261-333-651; 142-388-561-082-054; 150-249-549-372-358; 162-374-469-230-059; 173-034-553-635-460; 177-638-047-045-946,2,true,,green
142-790-196-752-819,Accrediting digital forensics: what are the choices?,,2018,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Peter Sommer,"Abstract There are three apparent competing routes to providing re-assurance about the quality of digital forensics work: accredit the individual expert, accredit the laboratory and its processes, let the courts test via its procedures. The strengths and weaknesses of each are discussed against the variety of activities within “forensic science”. The particular problems of digital forensics, including its complexity and rate of change, are reviewed. It is argued that formal standards may not always be practical or value for money compared with advisory good practice guides.",25,,116,120,Variety (cybernetics); Work (electrical); Test (assessment); Quality (business); Value for money; Good practice; Computer science; Engineering ethics; Strengths and weaknesses; Digital forensics,,,,,https://core.ac.uk/display/158373139 https://www.open-access.bcu.ac.uk/6008/ https://dblp.uni-trier.de/db/journals/di/di25.html#Sommer18 https://www.sciencedirect.com/science/article/pii/S1742287618301701 https://core.ac.uk/download/158373139.pdf,http://dx.doi.org/10.1016/j.diin.2018.04.004,,10.1016/j.diin.2018.04.004,2800365291,,0,,24,true,,green
143-347-787-372-092,"Forensics Analysis of Skype, Viber and WhatsApp Messenger on Android Platform",,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Peter E. Onovakpuri,,7,2,119,131,Computer science; Multimedia; Wireless; Android (operating system),,,,,http://www.sdiwc.net/digital-library/forensics-analysis-of-skype-viber-and-whatsapp-messenger-on-android-platform.html,http://dx.doi.org/10.17781/p002369,,10.17781/p002369,2794262205,,0,014-299-240-901-551; 014-510-444-730-433; 026-641-935-890-517; 033-059-274-408-956; 049-979-701-385-094; 060-647-372-531-456; 086-355-175-274-285; 098-520-592-151-771; 106-759-637-118-717; 131-924-951-958-91X; 163-227-995-393-241,5,false,,
143-408-563-865-265,What does a digital forensics opinion look like? A comparative study of digital forensics and forensic science reporting practices.,2021-07-01,2021,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Nina Sunde,"Abstract This study explores digital forensics (DF) reporting practices and compares the results with other forensic science disciplines. Forty reports were obtained from a quasi-experiment involving DF examiners, and a quantitative content analysis was performed to determine which conclusion types they applied and which content they included with relevance to the credibility of the reported results. A qualitative analysis was performed to examine the certainty expressions used in the conclusions. The results were compared to a study of eight forensic science disciplines performed by Bali et al. [24,26]. The results show that the DF examiners tend to present their conclusions either as Categorical conclusion or Strength of support (SoS) conclusion types and that they address source, activity, and offence level issues in their conclusions. The content analysis indicates deficiencies in DF reporting practices, and several of the challenges seem to be shared with other FS disciplines. The analysis of certainty expressions showed that a plethora of expressions was used, and that they lacked reference to an established framework. The results indicate that more research on DF evaluation and reporting practices is necessary and justifies a need for enhanced focus on quality control and peer review within the DF discipline.",61,5,586,596,Psychology; Relevance (law); Content analysis; Opinion evidence; Quality (business); Credibility; Categorical variable; Certainty; Applied psychology; Digital forensics,Certainty expressions; Conclusion types; Digital Forensics; Forensic Science; Opinion evidence; Reporting practices,Forensic Medicine; Forensic Sciences/methods; Humans; Peer Review; Quality Control,,,https://www.sciencedirect.com/science/article/pii/S1355030621000939 https://www.ncbi.nlm.nih.gov/pubmed/34482939,http://dx.doi.org/10.1016/j.scijus.2021.06.010,34482939,10.1016/j.scijus.2021.06.010,3174820259,,0,002-288-892-034-343; 003-168-641-529-165; 004-652-388-189-304; 005-715-450-998-72X; 010-963-610-208-920; 018-182-926-340-45X; 019-407-699-112-721; 023-848-663-068-771; 024-303-555-608-167; 030-178-593-043-926; 058-717-000-287-105; 060-255-062-097-751; 064-549-392-650-90X; 064-814-734-852-283; 067-505-834-517-458; 071-616-341-516-576; 073-790-480-897-758; 079-233-866-287-529; 083-486-398-213-608; 091-694-294-283-771; 092-283-444-951-14X; 099-377-733-522-116; 101-549-415-202-81X; 103-636-086-365-041; 129-505-938-088-958; 136-503-503-059-765; 138-369-427-159-841; 141-366-693-391-357; 142-790-196-752-819; 153-185-768-708-340; 173-145-269-859-717; 182-670-398-460-931; 189-064-913-996-787,3,true,cc-by-nc-nd,hybrid
143-427-291-811-40X,Ten years of computer forensic tool testing,2014-01-28,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Barbara Guttman; James R. Lyle; Richard P. Ayers,"Barbara Guttman, James R. Lyle and Richard Ayers give an overview of the Computer Forensic Tool Testing project at the National Institute of Standards and Technology, setting out the test procedures, criteria and test data sets for computer forensic software tools, together with a brief illustration of some of the failures that they encounter that can affect digital evidence.",8,0,,,Forensic science; Test data; Data science; Software; Digital evidence; Test procedures; Computer science; Guttman scale,,,,,http://journals.sas.ac.uk/deeslr/article/view/1963/1900 https://journals.sas.ac.uk/deeslr/article/view/1963 https://sas-space.sas.ac.uk/5550/,http://dx.doi.org/10.14296/deeslr.v8i0.1963,,10.14296/deeslr.v8i0.1963,1976187906,,0,,5,true,cc-by-nc-nd,hybrid
143-467-824-641-527,Windows registry harnesser for incident response and digital forensic analysis,2018-12-18,2018,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Avinash Singh; Hein S. Venter; Adeyemi Richard Ikuesan,"The extraction of digital evidence from storage media is a growing concern in digital forensics, due to the time and space complexity in acquiring, preserving and analysing digital evidence. Micros...",52,3,337,353,Information retrieval; Windows Registry; Digital evidence; Incident response; Digital forensic investigation; Computer science; Digital forensics,,,,,https://repository.up.ac.za/handle/2263/68290 https://www.tandfonline.com/doi/full/10.1080/00450618.2018.1551421,http://dx.doi.org/10.1080/00450618.2018.1551421,,10.1080/00450618.2018.1551421,2904398394,,0,001-960-134-177-077; 010-400-879-519-423; 040-393-580-637-973; 043-112-794-493-421; 046-527-367-793-765; 052-859-404-222-610; 055-416-156-661-003; 059-176-636-138-196; 071-953-659-705-163; 074-030-202-389-635; 080-585-092-668-778; 091-011-436-489-252; 118-347-856-286-336; 139-495-561-188-858,10,false,,
143-664-346-231-12X,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,38,,301291,301291,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00209-2,,10.1016/s2666-2817(21)00209-2,,,0,,0,true,,bronze
144-763-618-319-855,Digital evidence experts in the law enforcement community: understanding the use of forensics examiners by police agencies,2021-01-07,2021,journal article,Security Journal,09551662; 17434645,Palgrave Macmillan Ltd.,United States,Scott H. Belshaw; Brooke Nodeland,"Mobile phones are often used in criminal enterprises as well as by individual offenders. In criminal cases, almost 80–90% of the cases criminal computer forensic examiners work on are related to child pornography (Nodeland et al. J Crim Justice Educ 30:71–90, 2018). In an effort to fight electronic crime and to collect digital evidence for criminal acts, law enforcement agencies are incorporating the collection of tools for analysis of digital evidence, also known as computer forensics, into their law enforcement infrastructure. Police agencies are challenged with the need to train officers to collect digital evidence and keep up with large and evolving technologies such as computer operating systems and cell phone technologies. Digital evidence is now being used to prosecute all types of crimes. Skilled officers and examiners are needed to examine this critical need in the criminal justice system. This research surveyed 59 (N = 59) Texas police agencies in their use of digital forensic examiners. The findings reflect that numerous agencies often use a part-time police officer/examiner to investigate the digital evidence that comes into the agency that can limit the expertise in the agency. Implications for this research are discussed.",,,1,15,Criminal justice; Agency (sociology); Political science; Justice (ethics); Child pornography; Law enforcement; Digital evidence; Public relations; Computer forensics; Digital forensics,,,,,https://link.springer.com/article/10.1057/s41284-020-00276-w,https://link.springer.com/article/10.1057/s41284-020-00276-w,,,3120397426,,0,004-260-804-798-107; 006-638-571-383-289; 012-314-515-683-048; 013-568-618-083-770; 015-875-327-892-861; 026-918-579-601-799; 036-754-354-530-672; 037-793-667-167-120; 044-274-107-809-614; 049-223-763-769-747; 064-150-889-060-337; 067-844-385-207-96X; 073-313-808-035-835; 074-971-049-279-863; 078-327-902-374-330; 085-222-802-372-082; 096-867-891-629-069; 106-215-046-097-04X; 108-837-763-480-251; 112-518-746-315-963; 114-955-439-966-393; 119-531-502-608-218; 164-392-011-156-848; 165-956-283-954-04X,0,false,,
145-706-153-221-342,COMPUTER FORENSIC PROJECTS FOR ACCOUNTANTS,,2015,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Grover S. Kearns,"Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers a set of exercises to provide an introduction to obtaining and analyzing data with forensics software that are available free online. In most cases, figures of important steps are provided. Educators will benefit when developing the course learning goals and curriculum.",10,3,7,34,Data security; World Wide Web; Analytical skill; Element (criminal law); Software; Forensic accounting; Computer science; Curriculum; Engineering ethics; Computer forensics; Digital forensics,,,,,https://doi.org/10.15394/jdfsl.2015.1203 https://commons.erau.edu/jdfsl/vol10/iss3/1/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1203&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2015.1203,,10.15394/jdfsl.2015.1203,2165428869,,0,008-598-808-594-324; 013-528-274-906-318; 019-831-293-743-518; 023-038-026-507-343; 037-935-317-887-33X; 042-419-321-697-627; 051-051-291-274-255; 070-101-051-160-111; 159-099-378-533-087; 165-770-474-971-736; 199-172-967-270-034,0,true,cc-by-nc,gold
146-021-806-272-345,A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics,,2019,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Reza Montasari; Victoria Carpenter; Richard Hill,"Compared to other well-established scientific fields computer forensics (CF) is still evolving as a new scientific field. CF lacks standardisation in various aspects including process models, datasets, procedures, techniques, and formal research methodologies. Consequently, progress in the establishment of CF as a scientific field has been hindered. Therefore, this paper aims to address one of such issues concerning the lack of standardisation, namely the absence of formal research methods in CF. Our study adds to the body of knowledge by filling the gap that there does not currently exist a well-established research methodology in CF. To this end, we borrow a well-established research methodology from the domain of IS, namely Peffers et al.'s (2006), adapt and extend it and make it relevant to research studies in CF. Our study sets a precedent for other researchers to identify, adapt, extend and apply other well-established research methods to studies in CF.",11,2,194,224,Domain (software engineering); Information system; Body of knowledge; Road map; Data science; Design science research; Computer science; Process (engineering); Computer forensics; Digital forensics,,,,,http://cronfa.swan.ac.uk/Record/cronfa54931 https://doi.org/10.1504/IJESDF.2019.098784 https://pure.hud.ac.uk/en/publications/a-road-map-for-digital-forensics-research-a-novel-approach-for-es https://www.inderscienceonline.com/doi/abs/10.1504/IJESDF.2019.098784 https://ray.yorksj.ac.uk/id/eprint/3051/ https://cronfa.swan.ac.uk/Record/cronfa54931 https://dblp.uni-trier.de/db/journals/ijesdf/ijesdf11.html#MontasariCH19 https://core.ac.uk/download/237461123.pdf,http://dx.doi.org/10.1504/ijesdf.2019.098784,,10.1504/ijesdf.2019.098784,2886461126,,0,,3,true,,green
146-159-881-844-536,Prelim iii - Contents List,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,41,,301412,301412,Computer science; Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00093-2,,10.1016/s2666-2817(22)00093-2,,,0,,0,true,,bronze
146-240-425-087-023,Column: The Science of Digital Forensics: Analysis of Digital Traces,2012-09-30,2012,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Fred Cohen,"In part 1 of this series (Cohen, 2011a), Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces. “Input sequences to digital systems produce outputs and state changes as a function of the previous state. To the extent that the state or outputs produce stored and/or captured bit sequences, these form traces of the event sequences that caused them. Thus the definition of a trace may be stated as: ""A set of bit sequences produced from the execution of a finite state machine."" (see PDF for full column)",7,3,5,12,Column (database); Finite-state machine; Set (abstract data type); Programming language; Trace (semiology); Computer science; State (computer science); Event (computing); Theoretical computer science; Digital forensics; Process (computing),,,,,https://doaj.org/article/690f42ad727049e29923116d47600484,https://doaj.org/article/690f42ad727049e29923116d47600484,,,2103182465,,0,,0,true,cc-by-nc,gold
146-351-183-180-613,Analysis of Digital Forensic Evidence on Email Delivery Crime,2017-02-25,2017,journal article,Applied Science and Technology,25794086,,,Evans Fuad; null Hasanuddin; Ardi Nugraha,"Digital forensics is the application of science and computer technology to carry out the examination and analysis of electronic evidence and digital evidence in its association with crime. Technically, tech crimes can be divided into off-line crime, semi on-line crime, and cyber crime. Each has its own characteristics, but the main difference between them is the connectedness of public information network (internet). One of the example is defamation via e-mail, to solve these cases the need for an information that can give clues and needed some software for acquisitions or analysis of the evidence in order to get a trace or information that can be used as evidence and accountable in the court. software used is FTK (forensic toolkit), Autopsy, USBwrite Blocker, Hashcalc.",1,1,53,58,Internet privacy; The Internet; Engineering; Social connectedness; Trace (semiology); Software; Digital evidence; Computer technology; Computer forensics; Digital forensics,,,,,https://www.estech.org/index.php/IJSAT/article/view/10 http://www.estech.org/index.php/IJSAT/article/download/10/pdf_1,https://www.estech.org/index.php/IJSAT/article/view/10,,,2625026711,,0,,0,false,,
146-445-364-945-053,Cryptocurrency and the Blockchain: A Discussion of Forensic Needs,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Douglas A. Orr; Drew M. Lancaster,,7,4,420,435,Cryptocurrency; Blockchain; Computer security; Computer science,,,,,http://sdiwc.net/digital-library/cryptocurrency-and-the-blockchain-a-discussion-of-forensic-needs,http://sdiwc.net/digital-library/cryptocurrency-and-the-blockchain-a-discussion-of-forensic-needs,,,2957736131,,0,,0,false,,
146-449-968-597-756,.Txtual Forensics,2015-12-04,2015,journal article,Textual Cultures,19337418; 15592936,IUScholarWorks,,Matthew Kirschenbaum,"This appreciative essay explores David Greetham’s notions of “textual forensics” in light of new forms of textual analytics practiced upon born-digital materials. It argues that computers and computational environments ask us to rethink basic evidentiary categories, i.e. “internal” vs. “external,” as well as such concepts as normality, agency, and intentionality in relation to textual criticism. In the process—through a forensic examination of one specific piece of digital media—we also learn something about David’s own personal computing habits.",9,1,55,64,Agency (philosophy); Relation (database); Intentionality; Criticism; Epistemology; Normality; Computer forensics; Computer science; Sociology; Digital forensics; Psychology; Literature; Art; Philosophy; Social psychology; Computer security; Database,,,,,,http://dx.doi.org/10.14434/tc.v9i1.20115,,10.14434/tc.v9i1.20115,,,0,,0,false,,
146-651-722-674-271,Digital Forensic and Distributed Evidence,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Emmanuel Kpakpo Brown,"Digital Forensics investigation is the science and legal process of investigating computer/cybercrimes and digital media or objects to gather evidence. This new and fast evolving field encompasses computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics; and for this reason have digital evidence distributed widely when the need arises for crime prosecution. Digital evidence must be authentic, accurate, complete, and convincing to the jury for legal admissibility at the court of law. In many instances due to the distributed nature of digital forensic evidence and the legal procedures to be adhered to in evidence gathering at a digital crime scene, presenting at the law courts have proven to be challenging and in some instances inadmissible. Following legal procedures in evidence gathering at a digital crime scene is critical for admissibility and prosecution. This paper aims to discuss digital forensics investigations jurisprudence in relation to distributed digital evidence. For the study to be relevant to policy and practice, forensic tools and frameworks, legal and ethical obligations, and digital evidence handling and admissibility are highlighted. This paper does not follow any forensic investigations process; but rather discusses the need for development and implementation of unique frameworks that could be utilised to gather distributed digital evidence required for admissibility in court. Keywords - Digital forensics investigations; Digital evidence; Jurisprudence BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Emmanuel Kpakpo Brown (2022): Digital Forensic and Distributed Evidence Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 357-362 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P57",1,1,357,362,Digital evidence; Digital forensics; Computer forensics; Nexus (standard); Computer science; Computer security; Network forensics; Process (computing); Jurisprudence; Data science; Law; Internet privacy; Political science; Embedded system; Operating system,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p57,,10.22624/aims/crp-bk3-p57,,,0,,0,true,,bronze
146-950-696-881-567,High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks,2022-03-01,2022,journal article,IEEE Transactions on Network Science and Engineering,23274697; 2334329x,Institute of Electrical and Electronics Engineers (IEEE),United States,Ruohan Meng; Qi Cui; Zhili Zhou; Zhetao Li; Q. M. Jonathan Wu; Xingming Sun,,9,2,848,862,,,,,National Key Research and Development Program of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; Jiangsu Basic Research Programs Natural Science Foundation; Jiangsu Basic Research Programs Natural Science Foundation; Priority Academic Program Development of Jiangsu Higher Education Institutions; Collaborative Innovation Center of Atmospheric Environment and Equipment Technology; Postgraduate Research & Practice Innovation Program of Jiangsu Province; Research Startup Foundation of NUIST,,http://dx.doi.org/10.1109/tnse.2021.3137829,,10.1109/tnse.2021.3137829,,,0,,0,false,,
147-434-307-975-304,Mobile Digital Forensics Framework for Smartphone User Analysis,2022-01-20,2022,journal article,Webology,1735188x,NeuroQuantology Journal,"Iran, Islamic Republic of",Sang Young Lee,"Blockchain-based digital forensics technology is an efficient way to prevent forgery/modulation of evidence including collecting and analyzing evidential data using the technology in compliance with smartphone forensics procedures after a smartphone is seized. Moreover, the use of large-capacity storage devices and various digital devices have become a realistic solution for its development of IT in situations where the existing digital forensics analysis methods are regarded as limitations. This paper analyzed user’s status on smartphone application and implemented a smartphone user analysis framework that may extract significant digital evidence in a digital forensic way based on a blockchain perspective. In this paper researched a system that may provide important information to digital forensic analysts through these frameworks. It is expected that the proposed system will be expanded by much more structured data and online unstructured data such as SNS reports.",19,1,4335,4351,Digital forensics; Computer science; Digital evidence; Perspective (graphical); Network forensics; Computer security; Mobile device; Computer forensics; Smartphone application; World Wide Web; Multimedia; Data science,,,,,,http://dx.doi.org/10.14704/web/v19i1/web19285,,10.14704/web/v19i1/web19285,,,0,,0,true,cc-by-nc-nd,gold
147-546-528-129-204,SIFT Multi-Purpose Forensic Operating System For Digital Forensic Process.,2022-07-23,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Francis Wodugah,"The number of cyber incidents in which computer system or device is currently increasing every day. This requiring the opening up of forensic investigations in to multi-purpose forensic operating system for digital forensic process, a research that can shed light on what has occurred, In order to be able to provide investigators with proper solutions. for performing complete and efficient examinations in this new environment, operating systems platform and devices are being studied from a forensic perspective so that tools and procedures can be designed accordingly Keywords: Forensic Investigations, Cyber Forensic, Multi-Purpose Forensic Operating.",1,1,55,58,Forensic science; Digital forensics; Computer science; Process (computing); Computer forensics; Computer security,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p9,,10.22624/aims/crp-bk3-p9,,,0,,0,true,,bronze
147-988-605-182-606,Basic aspects concerning the evidence aquisition in digital forensic analysis,2015-07-10,2015,journal article,Forum Criminalistic / Forensic Science Forum,18442641,European Association of Scientific Research,,Cezara Craciunescu,,8,17 (1/2015),,,Digital evidence; Digital forensics; Forensic science; Computer science; Psychology; Data science; Computer security; History; Archaeology,,,,,,http://dx.doi.org/10.18283/forum.viii.17.12015.315,,10.18283/forum.viii.17.12015.315,,,0,,0,false,,
148-456-164-437-392,Analyzing Cyber Trends in Online Financial Frauds using digital Forensics Techniques,2020-07-30,2020,journal article,International Journal of Innovative Technology and Exploring Engineering,22783075,Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP,,Simran Koul*; Yash Raj; Simriti Koul,"Online financial frauds are one of the leading issues in the fields of digital forensics and cyber-security today. Various online firms have been employing several methodologies for the prevention of finance-related malpractices. This domain of criminal activity is becoming increasingly common in the present cyberspace. In this paper, we will try to implement an online financial fraud investigation using the digital forensics tool: Autopsy. A few existing cyber-security techniques for the investigation of such crimes, namely the Formal Concept Analysis and Confirmatory Factor Analysis; have been analyzed and reviewed. These techniques are primarily based on mathematical cyber-security concepts. Henceforth, it has been tried to find out whether the investigation of similar crimes can be done satisfactorily using the readily-accessible digital forensics tool: Autopsy. Also, it has been explored whether the aforementioned cyber-security techniques can be embedded along with the digital forensics tool to achieve the best results, through training a bot to automatically perform accurate investigations of such crimes. Thus, it has been tried to automate the process of online financial fraud investigation.",9,9,446,451,Cyberspace; Digital forensics; Computer forensics; Computer science; Cyber crime; Computer security; Process (computing); Domain (mathematical analysis); Cybercrime; Data science,,,,,,http://dx.doi.org/10.35940/ijitee.i7185.079920,,10.35940/ijitee.i7185.079920,,,0,,0,true,,gold
148-500-781-775-122,PeekaTorrent: Leveraging P2P hash values for digital forensics,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Sebastian Neuner; Martin Schmiedecker; Edgar Weippl,"Abstract Sub-file hashing and hash-based carving are increasingly popular methods in digital forensics to detect files on hard drives that are incomplete or have been partially overwritten/modified. While these techniques have been shown to be usable in practice and can be implemented efficiently, they face the problem that a-priori specific “target files” need to be available and at hand. While it is always feasible and, in fact, trivial to create case-specific sub-file hash collections, we propose the creation of case-independent sub-file hash databases. For facilitating hash databases which can be publicly shared among investigators, we propose the usage of data from peer-to-peer file sharing networks such as BitTorrent. Most of the file sharing networks in use today rely on large quantities of hash values for integrity checking and chunk identification, and can be leveraged for digital forensics. In this paper we show how these hash values can be of use for identifying possibly vast amounts of data and thus present a feasible solution to cope with the ever-increasing case sizes in digital forensics today. While the methodology used is independent of the used file sharing protocol, we harvested information from the BitTorrent network. In total we collected and analyzed more than 3.2 billion hash values from 2.3 million torrent files, and discuss to what extent they can be used to identify otherwise unknown file fragments and data remnants. Using open-source tools like bulk_extractor and hashdb, these hash values can be directly used to enhance the effectiveness of sub-file hashing at scale.",18,,S149,S156,Hash chain; Double hashing; Hash list; SHA-2; Merkle tree; Hash tree; Torrent file; Computer science; Database; Hash function,,,,Austrian Research Promotion Agency (FFG),https://cyberleninka.org/article/n/865439 https://cyberleninka.org/article/n/865439.pdf https://www.sciencedirect.com/science/article/pii/S1742287616300445 https://doi.org/10.1016/j.diin.2016.04.011 https://core.ac.uk/display/82223047 https://core.ac.uk/download/pdf/82223047.pdf,http://dx.doi.org/10.1016/j.diin.2016.04.011,,10.1016/j.diin.2016.04.011,2525607610,,0,007-455-522-527-690; 010-985-077-415-59X; 017-790-269-405-50X; 018-304-870-600-752; 019-175-479-295-992; 020-102-151-624-738; 026-564-773-645-052; 029-159-400-662-132; 036-884-542-282-034; 047-630-600-014-492; 054-182-695-649-382; 061-317-181-338-930; 066-764-363-673-55X; 085-138-340-371-322; 085-214-277-668-01X; 099-309-660-717-953; 102-692-377-462-124; 122-880-373-616-302; 128-940-875-499-986; 130-750-724-951-650; 131-516-331-360-906; 134-927-490-231-285; 167-681-711-973-339; 168-211-791-741-422; 177-654-940-586-315,2,true,cc-by-nc-nd,hybrid
148-617-284-942-187,Decision-theoretic file carving,,2017,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Pavel Gladyshev; Joshua I. James,,22,,46,61,Decision problem; World Wide Web; Completeness (order theory); JPEG; Information retrieval; File carving; Carving; Resource constraints; Computer science; Digital forensics; Reduction (complexity),,,,,https://doi.org/10.1016/j.diin.2017.08.001 https://dblp.uni-trier.de/db/journals/di/di22.html#GladyshevJ17 http://www.sciencedirect.com/science/article/pii/S1742287617301329 https://www.sciencedirect.com/science/article/abs/pii/S1742287617301329,http://dx.doi.org/10.1016/j.diin.2017.08.001,,10.1016/j.diin.2017.08.001,2746531026,,0,003-982-227-180-136; 004-652-388-189-304; 005-831-171-574-471; 015-537-933-151-383; 018-304-870-600-752; 023-341-419-324-638; 041-055-817-137-745; 043-093-846-816-675; 082-440-435-702-102; 087-950-081-760-226; 090-752-043-508-733; 092-237-744-940-330; 094-295-279-676-447; 114-862-246-585-217; 122-474-821-859-110; 126-591-597-706-715; 145-062-913-009-934; 162-485-003-594-995,11,false,,
148-968-873-601-051,IMPORTANCE OF NETWORK DEVICES AND THEIR SECURE CONFIGURATIONS AT DIGITAL FORENSICS,2013-07-30,2013,journal article,Engineering Sciences,1308 7231,,,Fatih Ertam; Turker Tuncer; Engin Avci,"Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. Network forensics is a sub-branch of digital forensics. Network device forensics is also a sub-branch of network digital forensics. Forensic IT applications and examination of suspicious users` personal computers to be copied to all of the data alone is not sufficient for the determination of guilt or innocence. Users before the event and during the event is logged on the network traffic to be carried out is important. These records are necessary to preserve the security measures on the network devices, the devices required by the user on the network can not use, the internet user`s IP address and MAC address of the output to be significant, the user attempts to disrupt the functioning of the network is very important in minimizing. Users, network devices must not interfere with the records. In this study, as well as to facilitate network forensics investigations on network devices to improve network security configuration settings to be discussed.",8,3,171,181,The Internet; Engineering; Network Access Control; Networking hardware; Network security; MAC address; Computer security; Network forensics; Event (computing); Digital forensics,,,,,http://www.newwsa.com/makale_detay_ozet_bilgiler.asp?d=1&makale_detay_id=3273&makale_upload_id=11563&islem_turu=0 http://dergipark.ulakbim.gov.tr/nwsaeng/article/view/5000066813/5000062187,http://www.newwsa.com/makale_detay_ozet_bilgiler.asp?d=1&makale_detay_id=3273&makale_upload_id=11563&islem_turu=0,,,2333416154,,0,,0,false,,
149-337-279-544-141,An Overview of Data Extraction Techniques of Mobile Device,2020-08-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Ashish Suthar,,,,,,Mobile device; Data extraction; Computer science; Computer hardware,,,,,http://dx.doi.org/10.46293/4n6/2020.02.03.16,http://dx.doi.org/10.46293/4n6/2020.02.03.16,,10.46293/4n6/2020.02.03.16,3096130804,,0,,0,false,,
149-440-914-154-448,Prelim i - Editorial Board,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,33,,301045,301045,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30334-6,,10.1016/s2666-2817(20)30334-6,,,0,,0,false,,
149-758-552-549-038,Cloud-Based Framework for Performing Digital Forensic Investigations,2022-07-04,2022,journal article,International Journal of Wireless Information Networks,10689605; 15728129,Springer Science and Business Media LLC,United States,Vijay Prakash; Alex Williams; Lalit Garg; Pradip Barik; Rajesh Kumar Dhanaraj,"Cloud computing has created paradigm transitions from traditional computing. Acquisition rates increase with benefits such as lower costs and better utilization of resources. However, these benefits are accompanied by some of the challenges of computer forensics practice. The complexity of the Cloud computing, its key features, and its implementation all present several challenges for computer forensic researchers. In this paper, two surveys have been conducted to collect Cloud computing/forensic recommendations. The impact assessment (survey 1) has been conducted to determine the nature and extent of the impact of Cloud computing on computer forensics. A total of 104 Cloud Computing-based or computer forensics-based responses have been collected. Based on the impact assessment results, a Cloud-based framework has been proposed to assist in the fight against global digital crime, especially those committed within the cloud environment, bringing it with the challenges of law enforcement and digital forensic professionals. The proposed framework contains a set of guidelines and a cloud-based forensics model. In addition, the proposed framework will assist in the investigation. It is thought that criminals use the complexity of the cloud to hide strong and obvious evidence away from investigators and thus avoid prosecution and sentencing. In addition, this study identifies limitations and research gaps in existing solutions. The framework has been then validated with an online survey (survey 2) focused on 20 cloud computing or computer forensics experts. The result of study 1 confirms the impact of cloud computing on computer forensics. Further, it indicates that environmental factors and structures such as distributed storage, high recruitment, and virtualization have posed various challenges to the digital forensics process. In addition, the result concludes that the proposed framework addresses many of the issues and challenges discussed at a particular level of efficiency and effectiveness.",,,,,Cloud computing; Digital forensics; Computer science; Digital evidence; Computer forensics; Law enforcement; Computer security; Data science; Network forensics; Cybercrime; Cloud computing security,,,,,,http://dx.doi.org/10.1007/s10776-022-00560-z,,10.1007/s10776-022-00560-z,,,0,000-566-000-503-971; 001-582-154-824-328; 001-893-584-671-77X; 002-288-358-355-198; 003-642-671-730-64X; 004-942-595-617-530; 008-308-597-135-954; 008-589-433-282-265; 009-945-925-742-082; 011-367-436-492-537; 011-972-444-921-827; 013-568-618-083-770; 014-127-277-237-390; 015-654-094-120-991; 016-550-890-218-383; 018-176-630-610-077; 018-948-094-812-86X; 019-698-064-288-240; 021-014-524-429-705; 023-858-572-607-02X; 024-462-843-796-80X; 025-019-480-061-555; 026-926-997-253-117; 028-290-062-141-840; 029-200-392-412-396; 032-176-657-149-732; 034-872-896-955-434; 037-320-586-379-973; 047-386-524-667-691; 047-748-955-171-36X; 053-731-227-547-943; 060-971-363-644-947; 061-414-916-530-216; 062-486-998-356-491; 071-644-146-903-042; 075-895-669-363-649; 076-889-170-335-628; 077-532-025-251-756; 091-381-973-315-491; 091-420-789-124-328; 091-540-399-535-662; 095-691-114-276-825; 095-804-279-876-042; 098-748-261-333-651; 116-288-436-546-314; 118-838-969-146-870; 131-923-136-263-017; 134-927-490-231-285; 136-798-153-498-59X; 139-894-097-165-561; 144-124-797-675-052; 147-175-496-906-928; 148-732-709-522-772; 154-014-516-026-896,0,false,,
149-934-631-443-119,A mathematical approach to NAND flash-memory descrambling and decoding,,2015,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Jan Peter van Zandwijk,,12,,41,52,Error detection and correction; NAND gate; Code (cryptography); Parallel computing; Scrambling; Cyclic code; Flash (photography); Computer science; BCH code; Decoding methods; Computer hardware,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287615000043 http://www.sciencedirect.com/science/article/pii/S1742287615000043 https://dblp.uni-trier.de/db/journals/di/di12.html#Zandwijk15,http://dx.doi.org/10.1016/j.diin.2015.01.003,,10.1016/j.diin.2015.01.003,2078023065,,0,007-918-160-435-809; 023-114-150-053-694; 033-027-137-279-186; 074-933-143-629-826; 075-638-759-979-271; 086-288-023-774-224; 117-022-631-068-897; 140-792-335-288-478,11,false,,
150-042-119-479-43X,Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,2018-11-29,2018,journal article,Scientific Journal of Informatics,24600040; 24077658,Universitas Negeri Semarang,," Riadi; Anton Yudhana; Muhamad Caesar Febriansyah Putra","The growth of Android-based smartphone users to access media in communicating using Instagram social media is very fast. Activities are carried out when using Instagram social media in communicating to share information such as sending chat texts and pictures. A large number of Instagram users make this application vulnerable to abuse of Instagram such as pornography crimes from Instagram users. This case can be forensic to get digital evidence in the form of chat text and pictures from Instagram messenger is a feature of Instagram. The investigation in this study uses the National Institute of Standards and Technology (NIST) method which provides several stages of collecting, examining, analyzing, reporting while forensic tools use forensic oxygen and axiom magnets. The results of the recovery and comparison of data result using Oxygen forensics and Axiom Magnets obtained digital evidence in the form of data in the form of images and chat. The data obtained by Magnet Axiom is 100% while forensic oxygen is 84%. These data are the results of the performance of both forensic applications in obtaining digital evidence that has been deleted from the Instagram messenger.",5,2,235,247,NIST; World Wide Web; Pornography; Digital evidence; Computer science; Social media; Android (operating system),,,,,https://journal.unnes.ac.id/nju/index.php/sji/article/view/16545 https://journal.unnes.ac.id/nju/index.php/sji/article/download/16545/pdf,http://dx.doi.org/10.15294/sji.v5i2.16545,,10.15294/sji.v5i2.16545,2907516871,,0,006-700-167-776-341; 016-039-721-963-229; 039-626-669-719-288; 055-473-899-043-485; 070-740-822-724-693; 087-287-435-836-200; 131-874-028-513-738; 162-814-268-960-713; 177-580-843-965-429; 187-108-280-798-543; 188-509-533-602-208,8,true,cc-by,gold
150-681-841-306-967,Digital forensics: you can run but you can't hide: conference tutorial,2015-04-01,2015,journal article,Journal of Computing Sciences in Colleges,19374763,,,Bilal Shebaro,"Digital crimes, such as identity theft, child pornography, denial of service attacks, insider threats, phishing, and other cyber-crimes are now a fact of life. As computers and digital devices are becoming a valuable resource of evidence in many physical and digital crimes, proper handling of forensic investigations become a key in fighting back against such crimes. Therefore, understanding digital forensics and how digital forensic investigations should be carried out is an essential process to learn by IT and other law enforcement personnel in every organization, as they will eventually deal with cyber-crimes. Such learning essentials are necessary for detection and prevention of crime and in any dispute where evidence is stored digitally. This tutorial will explain and discuss the major phases of digital investigation; the practice of gathering digital evidence (Acquisition), examining data and extracting evidence (Analysis), and documenting evidence and key information (Reporting). In addition, it will include a hands-on and practical exercise on how digital investigation is carried; mainly focusing on the practice of memory forensics, as it is the most fruitful and interesting part of digital forensics. By learning how to capture computer memory and profile its contents, the audience will gain an invaluable resource on how to examine data and extract evidence from tested machines, and in our case, machines infected with malware. Tools used in digital investigations need to be forensically sound so they can obtain reliable data as evidence. This tutorial will explain how a tool can qualify to be forensically sound and will discuss some of the forensic tools offered in BackTrack and CAINE as an example of forensics-based operating systems. In addition, we will apply our digital investigation and memory forensics on the SANS Investigative Forensic Toolkit (SIFT), mainly using the Volatility framework. SIFT, written by an international team of forensics experts, is a free toolkit that matches any modern forensic tool suite with cutting-edge open-source tools. All of our tool examinations and experiments will be performed on virtual machines. This tutorial will provide an overview of digital forensics and give the audience a taste of how digital investigations run. Therefore, the intended audience for this tutorial is people curious to know about the digital forensics process. Even though this tutorial serves as an overview of the digital forensics science, it can also serve as a good start for faculty interested in integrating such topic in their Computer Security classes or as its own Digital Forensics course.",30,4,46,46,Forensic science; Data science; Memory forensics; Law enforcement; Digital evidence; Computer science; Identity theft; Malware; Resource (project management); Phishing; Digital forensics,,,,,http://dl.acm.org/citation.cfm?id=2752628.2752637,http://dl.acm.org/citation.cfm?id=2752628.2752637,,,2992792080,,0,,0,false,,
150-957-964-090-611,Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving,2012-10-23,2012,journal article,International Journal of Digital Curation,17468256,Edinburgh University Library,,Yunhyong Kim; Seamus Ross,"In this paper we discuss archival storage container formats from the point of view of digital curation and preservation, an aspect of preservation overlooked by most other studies. Considering established approaches to data management as our jumping off point, we selected seven container format attributes that are core to the long term accessibility of digital materials. We have labeled these core preservation attributes. These attributes are then used as evaluation criteria to compare storage container formats belonging to five common categories: formats for archiving selected content (e.g. tar, WARC), disk image formats that capture data for recovery or installation (partimage, dd raw image), these two types combined with a selected compression algorithm (e.g. tar+gzip), formats that combine packing and compression (e.g. 7-zip), and forensic file formats for data analysis in criminal investigations (e.g. aff – Advanced Forensic File format). We present a general discussion of the storage container format landscape in terms of the attributes we discuss, and make a direct comparison between the three most promising archival formats: tar, WARC, and aff. We conclude by suggesting the next steps to take the research forward and to validate the observations we have made.",7,2,21,39,Container (abstract data type); Digital curation; Web archiving; Digital preservation; Computer science; Image file formats; Database; Data compression; Digital forensics; File format,,,,,http://www.ijdc.net/index.php/ijdc/article/download/217/286 https://dblp.uni-trier.de/db/journals/ijdc/ijdc7.html#KimR12 http://eprints.gla.ac.uk/79800/ http://www.ijdc.net/index.php/ijdc/article/view/217 http://eprints.gla.ac.uk/79800/1/79800.pdf https://doaj.org/article/dc9449a8a7b6440785206318421de124 https://core.ac.uk/display/16458809 https://core.ac.uk/download/pdf/296152550.pdf,http://dx.doi.org/10.2218/ijdc.v7i2.227,,10.2218/ijdc.v7i2.227,2062133553,,0,017-215-239-686-426; 024-216-399-693-64X; 024-775-073-655-919; 025-421-213-608-128; 051-457-536-845-758; 056-211-020-434-992; 126-176-453-947-183; 133-053-709-996-16X; 152-008-550-136-841; 168-394-204-709-730,3,true,cc-by,gold
151-680-718-283-212,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,37,,301259,301259,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00173-6,,10.1016/s2666-2817(21)00173-6,,,0,,0,true,,bronze
152-581-982-148-813,Privacy challenges in cyber security against cybercrime in digital forensic. A systematic literature review in Pakistan.,2021-09-15,2021,journal article,Journal of Computing & Biomedical Informatics,27101614; 27101606,Research Center of Computing and Biomedical Informatics,,null Omer Aziz; null M. Abdullah Siraj; null Abdul Rehman,"Cybercrime is a criminal activity that either target or uses a computer network or a network device. IOT become the biggest domain in these days.it is difficult to adopt digital forensics tools in IoT but somehow digital forensics play an important role in cyber security of IoT. Privacy and security challenges are increased day by day in digital forensics. Cybercrime in cyber security is increased day by day in digital forensics. Privacy and security are relate with each other but difference is that privacy relate to any right you have to control your personal information and how it’s used. Lots of work has been done in security issue but less focus on privacy. In the recent year, privacy in cyber security is the biggest challenge against cybercrime in digital forensics. To overcome these challenges of privacy in cyber security we must have deep knowledge which threats and attacks are harmful of our network.in this article we discuss the current privacy threats and attack for cybercrime in digital forensics with the deep knowledge and proposed classification matrix and also define proposed system which control threats and attacks. To the best of our knowledge there is no survey on privacy challenges in cyber security against cybercrime in digital forensics.",2,2,158,164,Cybercrime; Digital forensics; Computer security; Computer forensics; Internet privacy; Computer science; Digital evidence; Network forensics; Cyber crime; Information security,,,,,,http://dx.doi.org/10.56979/202/2021/31,,10.56979/202/2021/31,,,0,,0,true,,bronze
152-695-541-254-683,Study on the trend and characteristics of digital forensics,,2014,journal article,Automation and Instrumentation,,,,Jia Zhi-chen,"This paper will study the results from digital forensics definition, development, characteristics,summarized, in order to make the reader for digital forensics research methods, research characteristic and the direction of development, can have a more comprehensive understanding, providing reference for the related research.",,,,,Engineering; World Wide Web; Order (business); Digital evidence; Related research; Digital forensics,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZDYY201407006.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZDYY201407006.htm,,,2363132563,,0,,0,false,,
153-185-768-708-340,Structuring the Evaluation of Location-Related Mobile Device Evidence,,2020,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Eoghan Casey; David-Olivier Jaquet-Chiffelle; Hannes Spichiger; Elénore Ryser; Thomas Souvignet,"Abstract Location-related mobile device evidence is increasingly used to address forensic questions in criminal investigations. Evaluating this form of evidence, and expressing evaluative conclusions in this forensic discipline, are challenging because of the broad range of technological subtleties that can interact with circumstantial features of cases in complex ways. These challenges make this type of digital evidence prone to misinterpretations by both forensic practitioners and legal decision-makers. To mitigate the risk of misleading digital forensic findings, it is crucial to follow a structured approach to evaluation of location-related mobile device evidence. This work presents an evaluation framework widely used in forensic science that employs scientific reasoning within a logical Bayesian framework to clearly distinguish between, on the one hand, what has been observed (i.e., what data are available) and, on the other hand, how those data shed light on uncertain target propositions. This paper provides case examples to illustrate the advantages and difficulties of applying this approach to location-based mobile device evidence. This work helps digital forensic practitioners follow the principles of balanced evaluation and convey location-related mobile device evidence in a way that allows decision-makers to properly understand the relative strength of, and limitations in, digital forensic results.",32,,300928,,Criminal investigation; Mobile device; Data science; Structuring; Digital evidence; Scientific reasoning; Bayesian framework; Computer science; Circumstantial evidence; Digital forensics,,,,,https://serval.unil.ch/en/notice/serval:BIB_99D09A242835 https://www.sciencedirect.com/science/article/pii/S2666281720300238,http://dx.doi.org/10.1016/j.fsidi.2020.300928,,10.1016/j.fsidi.2020.300928,3029496844,,0,001-872-507-889-182; 006-106-790-585-940; 008-321-492-596-021; 009-512-003-529-193; 015-238-949-406-002; 019-831-293-743-518; 020-932-340-092-358; 024-131-573-638-521; 024-793-920-484-727; 025-273-020-668-018; 026-943-588-349-358; 027-669-021-337-265; 035-457-870-364-976; 036-017-937-159-609; 040-997-734-554-028; 050-296-813-523-597; 068-721-919-773-533; 069-906-125-551-995; 070-427-732-319-159; 075-518-198-327-92X; 082-676-890-491-344; 085-370-444-410-812; 099-407-105-258-080; 113-310-395-905-331; 123-400-070-960-457; 170-831-892-006-047; 172-357-540-521-552; 175-578-826-231-866; 181-826-022-794-521,3,true,cc-by-nc-nd,hybrid
154-076-720-609-283,Analysis of Digital Forensic Tools,2020-06-01,2020,journal article,Journal of Computational and Theoretical Nanoscience,15461955; 15461963,American Scientific Publishers,United States,Shaweta Sachdeva; B. L. Raina; Avinash Sharma,"This paper aims to analyze different tools for Forensic Data Analysis comes under the branch of Digital Forensics. Forensic data analysis is done with digital techniques. Digital forensics becomes more important in law enforcement, due to the large use of computers and mobile devices.; The pattern recognition system most appropriately fits into the Analysis Phase of the Digital Forensics. Pattern Recognition involves two processes. One Process is an analysis and the second process is recognition. The result of the analysis is taken out of the attributes from the patterns; to be recognized i.e., a pattern of different faces and fingerprints. These attributes are then utilized for the further process in the analysis phase which provides attention on various techniques of pattern recognition that are applied to digital forensic examinations and is proposed to; develop different forensic tools to collect evidence that would be helpful to solve specific types of crimes. This evidence further helps the examiner in the analysis phase of the digital forensic process by identifying the applicable data.",17,6,2459,2467,Data science; Digital forensics,,,,,https://www.ingentaconnect.com/content/asp/jctn/2020/00000017/00000006/art00007 https://ui.adsabs.harvard.edu/abs/2020JCTN...17.2459S/abstract,http://dx.doi.org/10.1166/jctn.2020.8916,,10.1166/jctn.2020.8916,3094127989,,0,005-974-814-807-485; 037-105-622-240-257; 064-531-736-566-934; 091-619-263-117-914,2,false,,
154-517-106-328-503,An automated timeline reconstruction approach for digital forensic investigations,,2012,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Christopher Hargreaves; Jonathan Patterson,"Existing work on digital forensics timeline generation focuses on extracting times from a disk image into a timeline. Such an approach can produce several million ‘low-level’ events (e.g. a file modification or a Registry key update) for a single disk. This paper proposes a technique that can automatically reconstruct high-level events (e.g. connection of a USB stick) from this set of low-level events. The paper describes a framework that extracts low-level events to a SQLite backing store which is automatically analysed for patterns. The provenance of any high-level events is also preserved, meaning that from a high-level event it is possible to determine the low-level events that caused its inference, and from those, the raw data that caused the low-level event to be initially created can also be viewed. The paper also shows how such high-level events can be visualised using existing tools.",9,,S69,S79,Timestamp; Automation; Data mining; Set (abstract data type); Event reconstruction; Visualization; Computer science; Timeline; Event (computing); Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/di/di9.html#HargreavesP12 http://dspace.lib.cranfield.ac.uk/bitstream/1826/8103/1/DFRWS_2012_RC5c.pdf https://www.sciencedirect.com/science/article/pii/S174228761200031X https://www.sciencedirect.com/science/article/abs/pii/S174228761200031X https://dspace.lib.cranfield.ac.uk/handle/1826/8103 https://core.ac.uk/display/19542424 https://dspace.lib.cranfield.ac.uk/bitstream/1826/8103/1/DFRWS_2012_RC5c.pdf,http://dx.doi.org/10.1016/j.diin.2012.05.006,,10.1016/j.diin.2012.05.006,2009229022,,0,000-537-535-465-34X; 012-649-691-693-493; 024-503-401-931-849; 054-507-171-824-189; 060-650-561-577-338; 064-170-716-528-26X; 087-690-831-820-163; 162-201-727-094-331; 177-965-894-694-179,95,true,cc-by-nc-nd,hybrid
154-718-497-162-213,Forensics Analysis of Router On Computer Networks Using Live Forensics Method,,2019,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Nita Hildayanti; Riadi,,8,1,74,81,Router; Live forensics; Computer network; Computer science; Wireless,,,,,http://sdiwc.net/digital-library/forensics-analysis-of-router-on-computer-networks-using-live-forensics-method,http://dx.doi.org/10.17781/p002559,,10.17781/p002559,2946054145,,0,008-073-276-328-495; 016-039-721-963-229; 047-558-436-316-283; 065-339-011-233-469; 092-171-631-621-799; 123-484-869-375-145; 147-586-557-677-337,3,false,,
154-729-674-764-578,Integrating Digital Forensics Techniques into Curatorial Tasks: A Case Study,2014-09-09,2014,journal article,International Journal of Digital Curation,17468256,Edinburgh University Library,,Sam Meister; Alexandra Chassanoff,"In this paper, we investigate how digital forensics tools can support digital curation tasks around the acquisition, processing, management and analysis of born-digital materials. Using a real world born-digital collection as our use case, we describe how BitCurator, a digital forensics open source software environment, supports fundamental curatorial activities such as secure data transfer, assurance of authenticity and integrity, and the identification and elimination of private and/or sensitive information. We also introduce a workflow diagram that articulates the processing steps for institutions processing born-digital materials. Finally, we review possibilities for further integration, development and use of digital forensic tools.",9,2,6,16,World Wide Web; Information sensitivity; Workflow; Data science; Digital curation; Open source software; Computer science; Data transmission; Identification (information); Digital forensics,,,,,https://www.mendeley.com/catalogue/32be5481-980d-35c2-b198-fca72f89ff55/ http://www.ijdc.net/index.php/ijdc/article/download/9.2.6/364 https://doaj.org/article/a444a368c1f54b6085aa5e20b1e23253 https://core.ac.uk/display/91790644 https://dx.doi.org/10.2218/ijdc.v9i2.325 http://www.ijdc.net/index.php/ijdc/article/view/9.2.6 https://core.ac.uk/download/pdf/162675816.pdf,http://dx.doi.org/10.2218/ijdc.v9i2.325,,10.2218/ijdc.v9i2.325,2058634680,,0,,2,true,cc-by,gold
155-250-068-040-504,Evaluation and Use the Forensic Financial and Economic Expertise's Results of Operations with Digital Assets,2022-05-09,2022,journal article,Courier of Kutafin Moscow State Law University (MSAL)),27826163; 23115998,Kutafin Moscow State Law University,,S. M. Kolotov,"The article considers the problem of assessment and use of the results of forensic financial and economic examination of transactions with digital assets, including those created using blockchain technology. The problems of assessing the competence of the forensic expert, as well as the peculiarities of assessing the expert opinion of the forensic financial and economic examination of transactions with digital assets created using blockchain technology were determined. The issue of suitability of objects used by the forensic expert in the course of these examinations is considered.",,2,143,149,Forensic accounting; Competence (human resources); Expert opinion; Forensic science; Digital forensics; Forensic examination; Blockchain; Computer science; Computer security; Finance; Business; Risk analysis (engineering),,,,,,http://dx.doi.org/10.17803/2311-5998.2022.90.2.143-149,,10.17803/2311-5998.2022.90.2.143-149,,,0,,0,true,,hybrid
155-282-926-860-477,Automated brain disease classification using exemplar deep features,,2022,journal article,Biomedical Signal Processing and Control,17468094; 17468108,Elsevier BV,Netherlands,Ahmet Kursad Poyraz; Sengul Dogan; Erhan Akbal; Turker Tuncer,,73,,103448,103448,Artificial intelligence; Computer science; Support vector machine; Preprocessor; Pattern recognition (psychology); Feature extraction; Feature (linguistics); Deep learning; Feature selection; Classifier (UML); Feature vector; Extractor; Philosophy; Linguistics; Process engineering; Engineering,,,,,,http://dx.doi.org/10.1016/j.bspc.2021.103448,,10.1016/j.bspc.2021.103448,,,0,002-387-036-562-112; 010-205-475-989-839; 012-006-273-954-516; 014-550-284-832-807; 018-479-140-242-871; 019-949-603-887-319; 021-003-243-940-183; 022-368-409-764-115; 025-986-195-101-697; 026-319-886-695-823; 027-027-458-821-602; 027-791-721-408-932; 030-600-759-246-610; 030-840-181-864-297; 032-574-671-060-973; 033-481-004-872-998; 042-222-040-967-193; 045-462-496-191-807; 049-310-240-219-856; 053-686-448-806-005; 055-613-739-931-602; 063-557-684-054-986; 070-837-480-766-076; 077-501-098-239-705; 078-487-322-397-854; 079-172-440-035-168; 115-593-892-742-778; 120-943-050-057-81X; 127-087-851-515-871; 141-436-270-134-130; 179-109-552-553-094,3,false,,
155-298-486-497-278,Survey : video forensic tools,2013-01-10,2013,journal article,Journal of theoretical and applied information technology,18173195,,,Ahmad Salehi Shahraki; Hamed Sayyadi; Mohamad Hussein Amri; Mehrnaz Nikmaram,"Due to extension of using CCTVs and the other video security systems in all areas, these sorts of devices have been introduced as the most important digital evidences to search and seizure crimes. Video forensics tools are developed as a part of digital forensics tools to analyze digital evidences and clear vague points of them for presenting in the courts Existing video forensics tools have been facilitated the investigation process by providing different features based on various video editing techniques. In this paper, some of the most popular video forensics tools are discussed and the strengths and shortages of them are compared and consequently, an alternative framework which includes the strengths of existing popular tools is introduced.",,,,,Economic shortage; Video editing; Analysis tools; Computer science; Process (engineering); Multimedia; Computer forensics; Digital forensics,,,,,https://eprints.qut.edu.au/74465/,https://eprints.qut.edu.au/74465/,,,758581677,,0,,3,false,,
155-382-013-507-319,Energy deviation measure: a technique for digital image forensics,,2018,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Surbhi Gupta; Neeraj Mohan; Parvinder Singh Sandhu,,10,4,401,401,Computer science; Measure (data warehouse); Digital forensics; Computer forensics; Cybercrime; Image (mathematics); Computer security; Digital image; Data science; Data mining; Artificial intelligence; Computer vision; Image processing; The Internet; World Wide Web,,,,,,http://dx.doi.org/10.1504/ijesdf.2018.095141,,10.1504/ijesdf.2018.095141,,,0,,2,false,,
155-772-239-137-393,A Survey of Artificial Intelligence Techniques for Cybersecurity Improvement,,2020,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Athari M. Alrajhi,,9,1,34,41,Computer security; Computer science; Wireless,,,,,http://sdiwc.net/digital-library/a-survey-of-artificial-intelligence-techniques-for-cybersecurity-improvement,http://dx.doi.org/10.17781/p002650,,10.17781/p002650,3124764632,,0,006-330-528-386-088; 012-758-652-403-628; 045-198-984-947-001; 046-896-690-273-536; 047-513-057-385-511; 051-296-320-381-072; 061-195-572-606-821; 063-344-541-540-03X; 066-824-705-306-330; 099-140-363-540-265; 101-588-174-999-89X; 107-193-036-786-53X; 141-303-670-171-361; 153-442-264-211-634; 159-847-650-871-909; 184-287-782-343-597,3,false,,
155-874-936-366-797,Analysis of Time Records on Digital forensics,2015-04-01,2015,journal article,Indian Journal of Science and Technology,09745645; 09746846,Indian Society for Education and Environment,India,Sungjin Lee; Sunghyuck Hong,"Time analysis is important for digital forensic area, and Windows 7/8 are common to be used. However, there is not much research on time analysis for Windows 7 and 8. Time analysis is a critical proof for accusing criminal. There are various time zones, and time records on Windows operating system are not clear to understand which means RTC time or local time. Therefore, time analysis on Windows operating system must be firmed and documented for investigating forensic crime. We contribute to analysis time records whenever files are generated or modified by users, so we expect that our research will be able to make ambiguous time records clear for investigating digital forensics.",8,S7,365,372,Computer security; Computer science; Component (UML); Microsoft Windows; Digital forensics,,,,,https://www.indjst.org/index.php/indjst/article/view/70420/55111 https://indjst.org/articles/analysis-of-time-records-on-digital-forensics,http://dx.doi.org/10.17485/ijst/2015/v8is7/70420,,10.17485/ijst/2015/v8is7/70420,1833896173,,0,007-790-059-029-953; 013-331-920-213-649; 015-660-699-824-554; 040-533-091-712-76X; 046-505-599-865-150; 053-376-195-646-045; 073-353-835-723-47X; 085-214-277-668-01X; 125-473-815-302-935; 144-838-089-175-246; 167-592-705-831-583; 172-966-955-729-869; 185-583-187-622-076,2,true,,gold
156-374-578-445-529,THE ROLE OF DIGITAL FORENSIC IN REVEALING CRIMINAL ACTS OF ONLINE PROSTITUTION AT KEPOLISIAN DAERAH JAWA TIMUR,2020-07-31,2020,journal article,LIGAHUKUM,2085577x,University of Pembangunan Nasional Veteran Jawa Timur,,Valdha Regytha Gana Atthoriq,"This thesis talks about the role of digital forensic in revealing criminal acts of online prostitution. Digital forensic itself is not specifically regulated in the Indonesian Criminal Code Act, but digital forensic is very important in its role in the process of analyzing an item of evidence obtained from a criminal offence. The subject matter that the author discusses is, how the digital forensic role in exposing the criminal acts of online prostitution and whether the barriers in the application of digital forensic in exposing the criminal acts of online prostitution. The research methods that the author uses are juridical empirical. The author also conducted an analysis on the role of digital forensic in exposing the criminal acts of online prostitution associated with the Information and Electronic Transaction Law which is then presented by the author's thought. The results of this study can be seen through several digital forensic roles at the level of investigation, prosecution and also the courts, in addition, there are also some obstacles that faced by the experts of Digital Forensic Examiner and the efforts that can be done in overcoming those obstacles.
;
; Keyword : Digital Forensic, Online Prostitution, Information and Electronic Transaction Law",1,1,,,,,,,,,http://dx.doi.org/10.33005/ligahukum.v1i1.21,,10.33005/ligahukum.v1i1.21,,,0,,0,false,,
156-753-375-839-827,Review of: Forensic Mental Health Evaluations in the Digital Age: A Practitioner’s Guide to Using Internet‐Based Data,2020-07-21,2020,journal article,Journal of Forensic Sciences,00221198; 15564029,Wiley,United States,Scott A. Bresler,,65,5,1799,1799,Mental health; Forensic science; Psychology; Internet based; Medical education,,,,,https://onlinelibrary.wiley.com/doi/10.1111/1556-4029.14509,http://dx.doi.org/10.1111/1556-4029.14509,,10.1111/1556-4029.14509,3043985155,,0,,1,false,,
156-792-567-405-806,Digital Forensic Challenges in Internet of Things (IoT),2022-07-23,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Albert Quist,"With emerging technology and the connection of electronic devices to the internet, Internet of Things (IoT) has become part of human life. From the development of smartphones to smartwatches and smart-homes, electronic devices now have the capability of performing human activities or aiding humans in performing activities such as turning hall lights on or off with their voice. Although a large number of people use these devices for the greater good, a few individuals or group of people hide behind these devices to perform malicious activities. In order to apprehend and prosecute perpetuators who hide behind smart devices for evil gains, forensic examinations or investigations must be conducted. This review aims to identify digital forensic challenges in IoT. The inclusion criteria for this paper were international journals, articles, conference papers and case studies published from 2019 to 2022. Thematic analysis was used to analyze and synthesis the literature. Three themes emerged from the analysis; automated compromised smart-home tracer; data volatility and reconstruction; IoT forensic investigation framework. This integrative review combines evidence of digital forensic challenges in diverse IoT devices. Keyword IoT forensics, IoT challenges, Digital forensics, Smart-home forensics.",1,1,119,124,Internet of Things; Digital evidence; Digital forensics; Computer science; Smartwatch; Computer security; Internet privacy; Thematic analysis; The Internet; World Wide Web; Data science,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p20,,10.22624/aims/crp-bk3-p20,,,0,,0,true,,bronze
158-226-982-585-038,Innovative Techniques of Digital Crime Investigation,2016-12-01,2016,journal article,Journal of Engineering Education Transformations,09715843,,,Shrinivas D. Desai; Prashant Narayankar,"Computer forensics is a new and fast growing form of investigative technique in which forensic specialist use modern forensic software tools, to solve digital crime cases. Choosing appropriate forensic tool for solving real-time digital crime cases is most expected graduate attribute, for those who have opted ""Computer forensic"" as an elective course. In this paper we present pedagogy for developing skill of choosing most appropriate software tool for analyzing and investigating digital crime cases. Assignment activities are designed to develop competencies such as i) Ability to identify, select and apply forensic tool to solve image, audio and video doctored cases. ii) Ability to evaluate the suitability and limitations of the tool used to solve problem. To solve image forensic cases, a tool having feature of error level analysis and meta data analysis is found to be more appropriate, while for solving audio doctored cases, tool having feature of frequency response analysis as well as difference calculator is found to be most appropriate. In case of video doctored crimes, tools having feature of noise analysis, level sweep, clone detection, and magnification is found to be most appropriate. Assessment of outcome is carried out by recording attainment of Graduate Attribute (GA), Competency (CA) and Performance Indicators (PI). Skill of identifying, choosing and applying appropriate forensic tool to solve digital crime cases is observed among student.",30,,,,Machine learning; Performance indicator; Artificial intelligence; Calculator; Software; Digital evidence; Computer security; Computer science; Computer forensics; Feature (computer vision); Metadata; Noise (video),,,,,http://ischolar.info/index.php/JEETRIT/article/view/139929 http://www.journaleet.org/index.php/jeet/article/download/111605/78225,http://ischolar.info/index.php/JEETRIT/article/view/139929,,,2730592809,,0,,0,false,,
158-859-761-919-911,The architecture of a digital forensic readiness management system,2013-02-01,2013,journal article,Computers & Security,01674048,,,null ReddyK.,"A coordinated approach to digital forensic readiness (DFR) in a large organisation requires the management and monitoring of a wide variety of resources, both human and technical. The resources inv...",,,,,Engineering management; Architecture; Variety (cybernetics); Management system; Computer science; Digital forensics,,,,,https://dl.acm.org/doi/10.5555/2748150.2748582,https://dl.acm.org/doi/10.5555/2748150.2748582,,,3145715434,,0,,0,false,,
159-399-684-784-145,Audio enhancement and application of digital filters for speech intelligibility in forensic digital analysis expert work (Computer Forensics),2020-09-25,2020,journal article,International Journal of Emerging Trends in Engineering Research,23473983,The World Academy of Research in Science and Engineering,,,,8,9,6045,6050,Digital forensics; Computer science; Intelligibility (philosophy); Computer forensics; Digital filter; Speech recognition; Digital audio; Forensic science; Multimedia,,,,,,http://dx.doi.org/10.30534/ijeter/2020/186892020,,10.30534/ijeter/2020/186892020,,,0,,0,true,,bronze
160-624-462-765-065,The survey on cross-border collection of digital evidence by representatives from Polish prosecutors’ offices and judicial authorities,2021-09-30,2021,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Paweł Olber,,16,2,3,,Business; Law; Jurisdiction; Cybercrime; Digital evidence; Computer forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1700&context=jdfsl https://commons.erau.edu/jdfsl/vol16/iss2/3/,https://commons.erau.edu/jdfsl/vol16/iss2/3/,,,3212570151,,0,000-566-000-503-971; 012-155-430-901-071; 016-545-450-234-850; 020-233-315-826-687; 029-638-263-419-336; 056-254-180-340-08X; 063-572-994-319-332; 094-800-645-372-553; 098-194-155-526-060; 130-080-242-566-434; 196-758-971-020-221,0,true,cc-by-nc,gold
161-135-504-333-527,Design and Implementation of a Digital Evidence Management Model Based on Hyperledger Fabric,2020-08-01,2020,journal article,Journal of Information Processing Systems,1976913x,,,Junho Jeong; Donghyo Kim; Byungdo Lee; Yunsik Son,"When a crime occurs, the information necessary for solving the case, and various pieces of the evidence needed to prove the crime are collected from the crime scene. The tangible residues collected through scientific methods at the crime scene become evidence at trial and a clue to prove the facts directly against the offense of the suspect. Therefore, the scientific investigation and forensic handling for securing objective forensic in crime investigation is increasingly important. Today, digital systems, such as smartphones, CCTVs, black boxes, etc. are increasingly used as criminal information investigation clues, and digital forensic is becoming a decisive factor in investigation and trial. However, the systems have the risk that digital forensic may be damaged or manipulated by malicious insiders in the existing centralized management systems based on client/server structure. In this paper, we design and implement a blockchain based digital forensic management model using Hyperledger Fabric and Docker to guarantee the reliability and integrity of digital forensic. The proposed digital evidence management model allows only authorized participants in a distributed environment without a central management agency access the network to share and manage potential crime data. Therefore, it could be relatively safe from malicious internal attackers compared to the existing client/server model.",16,4,760,773,Agency (sociology); Crime scene; Structure (mathematical logic); Suspect; Smart contract; Digital evidence; Distributed Computing Environment; Computer security; Computer science; Digital forensics,,,,,http://jips-k.org/digital-library/2020/16/4/760,http://jips-k.org/digital-library/2020/16/4/760,,,3084378120,,0,,3,false,,
161-425-249-830-942,An Enhanced Digital Forensic Model for Internet of Things Forensic,2018-01-22,2018,journal article,"World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering",,,,Tina Wu; Andrew Martin,,5,1,,,World Wide Web; Forensic science; Computer science; Internet of Things; Digital forensics,,,,,https://waset.org/abstracts/76982,https://waset.org/abstracts/76982,,,2797483384,,0,,0,false,,
161-682-090-897-914,A Conceptual Framework to Improve Cyber Forensic Administration in Industry 5.0: Qualitative Study Approach,2022-02-03,2022,journal article,Forensic Sciences,26736756,MDPI AG,,Amr Adel,"As organizations strive to be compliant in a digitally evolving world, they need to ensure that they are forensically ready. Digital forensic readiness ensures compliance in legal, regulatory, functional, and operational structures. A literature review revealed a gap in detailed and comprehensive guidance on how such readiness ought to be accomplished. This is as a result of unfamiliar concepts and terms that revolve around digital forensic readiness. This research paper highlights and elaborates on a framework that can be achieved from research within focus groups. The insights drawn from the focus groups are used to critically assess the issues affecting practitioners in achieving complete digital forensic readiness.",2,1,111,129,Digital forensics; Conceptual framework; Focus (optics); Focus group; Engineering ethics; Knowledge management; Qualitative research; Computer science; Digital evidence; Process management; Data science; Engineering; Computer security; Business; Sociology; Social science; Physics; Marketing; Optics,,,,,,http://dx.doi.org/10.3390/forensicsci2010009,,10.3390/forensicsci2010009,,,0,002-449-146-256-491; 002-625-978-577-247; 006-435-365-660-88X; 006-912-721-410-174; 011-850-758-874-52X; 014-494-420-328-995; 014-700-420-212-76X; 015-264-924-343-905; 024-894-908-869-686; 028-249-665-354-840; 033-394-274-571-989; 055-036-284-492-537; 064-138-810-036-202; 077-598-249-628-673; 077-958-224-288-437; 096-777-977-622-731; 098-748-261-333-651; 106-108-913-089-037; 107-469-336-935-773; 111-488-239-742-003; 163-530-964-806-770; 194-646-821-795-161,1,true,cc-by,gold
161-786-953-020-998,Android forensics,,2014,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,M. Kaart; S. Laraghy,,11,3,234,248,Timestamp; Time zone; Android forensics; Android device; Computer science; Daylight saving time; Android (operating system); Clock skew; Mobile device forensics; Real-time computing,,,,,https://www.sciencedirect.com/science/article/abs/pii/S1742287614000449 https://doi.org/10.1016/j.diin.2014.05.001,http://dx.doi.org/10.1016/j.diin.2014.05.001,,10.1016/j.diin.2014.05.001,2060998013,,0,003-504-554-245-316; 007-066-403-548-609; 010-088-513-928-018; 023-767-546-806-478; 029-159-400-662-132; 030-674-871-669-121; 046-505-599-865-150; 058-631-300-195-90X; 062-185-276-692-750; 065-459-442-784-779; 066-214-056-369-914; 085-214-277-668-01X; 088-938-096-763-07X; 092-043-845-339-506; 095-409-130-263-862; 098-520-592-151-771; 160-001-504-152-793,14,false,,
161-921-610-463-171,Secure and Trusted Environment as a Strategy to Maintain the Integrity and Authenticity of Digital Evidence,2015-06-30,2015,journal article,International Journal of Security and Its Applications,17389976,NADIA,South Korea,Yudi Prayudi; Tri Kuntoro Priyambodo,"The authenticity and the integrity of digital evidence are critical issues in digital forensics activities. Both aspects are directly related to the application of The Locard Exchange Principle (LEP), which is a basic principle of the existence of evidence in an event. This principle, not only applies before and at the time the event occurs, but also applies to the investigation process. In the handling of digital evidence, all activities to access the digital evidence are not likely to occur without the mediation of a set of instruments or applications, whereas every application is made possible for the existence of bugs. In addition, the presence of illegal access to the system, malicious software as well as vulnerabilities of a computer system are a number of potential problems that can have an impact on the change in the authenticity and the integrity of digital evidence. If this is the case, secure and trust characteristics that should appear in the activity of digital forensics may be reduced. This paper tries to discuss how the concept of a secure and trusted environment can be applied to maintain the authenticity and integrity of digital evidence. The proposed concept includes the unity of five components, namely standard and forensics policy, security policy, model and trusted management system, trusted computing, secure channel communication, and human factor. The ultimate purpose of this paper is to provide an overview of how the recommendation can be applied to meet the requirements of a secure and trusted environment in digital forensics for keeping the authenticity and the integrity of digital evidence. In general, this paper tends to explain a high-level concept and does not discuss low-level implementation of a secure and trusted environment.",9,6,299,314,Internet privacy; Locard's exchange principle; Engineering; Security policy; Secure channel; Trusted Computing; Digital evidence; Computer security; Event (computing); Malware; Digital forensics,,,,,https://www.earticle.net/Article/A251453,http://dx.doi.org/10.14257/ijsia.2015.9.6.28,,10.14257/ijsia.2015.9.6.28,2556333987,,0,001-576-026-446-552; 002-383-410-319-043; 014-886-222-930-515; 017-793-641-645-475; 025-697-732-683-864; 026-144-692-799-50X; 028-359-027-680-438; 030-266-326-999-894; 031-234-153-523-379; 032-246-414-391-330; 033-075-569-155-300; 040-173-986-975-775; 041-017-598-844-767; 043-589-904-668-295; 044-424-086-644-152; 045-553-653-288-228; 047-491-706-271-238; 049-570-763-365-976; 055-416-156-661-003; 060-139-253-208-292; 066-219-211-495-201; 073-582-404-994-103; 081-366-851-480-757; 082-188-923-827-797; 091-580-195-401-036; 098-748-261-333-651; 099-610-658-392-435; 100-952-909-965-132; 118-181-746-710-581; 124-066-378-359-073; 132-355-634-397-986; 133-508-126-407-763; 134-927-490-231-285; 138-735-529-589-081; 143-114-367-163-473; 151-883-793-490-174; 183-471-286-339-242; 191-920-670-388-656; 192-243-367-271-931; 192-955-966-543-738; 199-172-967-270-034,4,true,,bronze
162-110-149-751-921,The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice,,2013,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Richard Adams; Valerie Hobbs; Graham Mann,"As with other types of evidence, the courts make no presumption that digital evidence is reliable without some evidence of empirical testing in relation to the theories and techniques associated with its production. The issue of reliability means that courts pay close attention to the manner in which electronic evidence has been obtained and in particular the process in which the data is captured and stored. Previous process models have tended to focus on one particular area of digital forensic practice, such as law enforcement, and have not incorporated a formal description. We contend that this approach has prevented the establishment of generally accepted standards and processes that are urgently needed in the domain of digital forensics. This paper presents a generic process model as a step towards developing such a generally-accepted standard for a fundamental digital forensic activity-the acquisition of digital evidence.",8,4,25,48,Empirical research; Data science; Presumption; Law enforcement; Digital evidence; Computer security; Computer science; Process (engineering); Computer forensics; Process modeling; Digital forensics,,,,,https://doaj.org/article/7abfdd6ed4c4408987cce9d292cb156d https://researchrepository.murdoch.edu.au/id/eprint/26688/ https://oaji.net/articles/2014/1095-1408891264.pdf https://research-repository.uwa.edu.au/en/publications/the-advanced-data-acquisition-model-adam-a-process-model-for-digi https://researchrepository.murdoch.edu.au/26688/1/advanced_data_acquisition.pdf https://research-repository.uwa.edu.au/en/publications/the-advanced-data-acquisition-model-adam-a-process-model-for-digital-forensic-practice(11eb6e68-4886-4b1b-a4a9-013e44274c3f)/export.html https://dblp.uni-trier.de/db/journals/jdfsl/jdfsl8.html#AdamsHM13 https://commons.erau.edu/jdfsl/vol8/iss4/2/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1154&context=jdfsl https://doi.org/10.15394/jdfsl.2013.1154 https://core.ac.uk/display/77134060,http://dx.doi.org/10.15394/jdfsl.2013.1154,,10.15394/jdfsl.2013.1154,1525847438,,0,000-557-324-827-169; 010-086-703-646-194; 019-698-064-288-240; 020-944-423-224-895; 021-850-998-857-676; 022-502-903-446-942; 030-634-360-648-226; 032-697-093-668-898; 038-668-970-194-854; 067-726-260-424-525; 132-355-634-397-986; 133-397-275-695-990; 142-244-092-034-937; 143-562-788-834-457; 190-065-821-748-92X; 199-745-676-923-766,28,true,cc-by-nc,gold
162-226-718-103-313,Visualizing Digital Forensic Datasets: A Proof of Concept,2017-02-01,2017,journal article,Journal of forensic sciences,15564029; 00221198,Wiley-Blackwell,United States,Christopher Tassone; Ben Martini; Kim-Kwang Raymond Choo,"Digital forensic visualization is an understudied area despite its potential to achieve significant improvements in the efficiency of an investigation, criminal or civil. In this study, a three-stage forensic data storage and visualization life cycle is presented. The first stage is the decoding of data, which involves preparing both structured and unstructured data for storage. In the storage stage, data are stored within our proposed database schema designed for ensuring data integrity and speed of storage and retrieval. The final stage is the visualization of stored data in a manner that facilitates user interaction. These functionalities are implemented in a proof of concept to demonstrate the utility of the proposed life cycle. The proof of concept demonstrates the utility of the proposed approach for the storage and visualization of digital forensic data.",62,5,1197,1204,Proof of concept; World Wide Web; Computer data storage; Information retrieval; Unstructured data; Database schema; Data integrity; Visualization; Computer science; Mobile device forensics; Digital forensics,"MSAB XRY
; digital forensics; forensic science; forensic visualization; geographic map plots; mobile device forensics; treemap; word cloud",,,,https://onlinelibrary.wiley.com/doi/full/10.1111/1556-4029.13431 https://www.ncbi.nlm.nih.gov/pubmed/28144943 http://europepmc.org/abstract/MED/28144943 http://onlinelibrary.wiley.com/doi/10.1111/1556-4029.13431/full https://dialnet.unirioja.es/servlet/articulo?codigo=6108040,http://dx.doi.org/10.1111/1556-4029.13431,28144943,10.1111/1556-4029.13431,2586033114,,0,000-360-120-513-679; 005-594-976-962-141; 009-885-874-541-907; 011-051-740-313-213; 018-447-058-666-847; 024-735-069-822-749; 033-877-222-136-260; 042-767-661-429-064; 047-221-550-114-462; 056-715-378-869-201; 065-671-045-136-370; 077-537-743-482-973; 079-070-981-899-105; 084-871-301-547-140; 096-289-210-165-616; 106-885-306-836-498; 113-462-435-754-981; 123-707-719-752-131; 149-749-567-387-540; 163-330-758-807-944,18,false,,
162-814-268-960-713,Examination of Digital Evidence on Android-based LINE Messenger,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),," Riadi; Ammar Fauzan Sunardi",,7,3,336,343,Operating system; Digital evidence; Computer science; Wireless; Android (operating system),,,,,https://sdiwc.net/digital-library/examination-of-digital-evidence-on-androidbased-line-messenger.html,http://dx.doi.org/10.17781/p002472,,10.17781/p002472,2891077758,,0,000-225-165-729-99X; 006-700-167-776-341; 053-394-227-052-76X; 152-458-317-042-249; 185-798-265-234-254,3,false,,
162-831-197-622-390,"Condición .txtual, crítica .txtual y edición .txtual hispánicas",2018-12-03,2018,journal article,Revista de Humanidades Digitales,25311786,UNED - Universidad Nacional de Educacion a Distancia,,Bénédicte Vauthier,"El impacto de las nuevas tecnologias sobre el proceso de escritura no es nada nuevo. Esta revolucion digital se tradujo primero por la aparicion de nuevos formatos de textos y el desarrollo de una teoria literaria ad hoc. En el ambito angloamericano, esta revolucion llevo a los filologos y a las instituciones patrimoniales a reflexionar sobre la necesidad de desarrollar formatos de estudio, de edicion y de conservacion perenne de estos nuevos formatos de textos digitales. ?A que se debe el atraso que en estas mismas areas se observa en Europa? ?Por que se puede afirmar que la digital forensicsy la media archaeology(Kirschenbaum) no son disciplinas trasnacionales? En esta contribucion, se hace balance del impacto de la .Txtual Conditionen Europa y en el area angloamericana, y se contrasta estas conclusiones con las respuestas que tres escritores emblematicos de la ‘nueva narrativa espanola’ han dado a una encuesta sobre las ‘formas de gestionar y de conservar archivos digitales’.",2,2,77,97,,,,,,http://revistas.uned.es/index.php/RHD/article/download/22198/18514 http://revistas.uned.es/index.php/RHD/article/view/22198 https://dialnet.unirioja.es/servlet/articulo?codigo=6700082 https://core.ac.uk/download/222976460.pdf,http://dx.doi.org/10.5944/rhd.vol.2.2018.22198,,10.5944/rhd.vol.2.2018.22198,2903406945,,0,,0,true,cc-by-nc,gold
162-922-011-677-486,Digital Forensics Framework for Cloud Computing,2013-02-28,2013,journal article,The Journal of Korea Navigation Institute,12269026,The Korea Navigation Institute,,Changhoon Lee,"Recently, companies seek a way to overcome their financial crisis by reducing costs in the field of IT. In such a circumstance, cloud computing is rapidly emerging as an optimal solution to the crisis. Even in a digital forensic investigation, whether users of an investigated system have used a cloud service is a very important factor in selecting additional investigated subjects. When a user has used cloud services, such as Daum Cloud and Google Docs, it is possible to connect to the could service from a remote place by acquiring the user`s log-in information. In such a case, evidence data should be collected from the remote place for an efficient digital forensic investigation, and it is needed to conduct research on the collection and analysis of data from various kinds of cloud services. Thus, this study suggested a digital forensic framework considering cloud environments by investigating collection and analysis techniques for each cloud service.",17,1,63,68,Cloud testing; Engineering; Data analysis; Cloud computing security; Digital evidence; Field (computer science); Service (systems architecture); Computer security; Cloud computing; Digital forensics,,,,,https://www.koreascience.kr:443/article/JAKO201310635656332.pdf https://www.koreascience.kr/article/JAKO201310635656332.page http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=HHHHBI_2013_v17n1_63 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001749418 http://koreascience.or.kr/journal/view.jsp?kj=HHHHBI&py=2013&vnc=v17n1&sp=63,http://dx.doi.org/10.12673/jkoni.2013.17.01.063,,10.12673/jkoni.2013.17.01.063,2087909567,,0,,1,true,,bronze
163-055-558-077-509,A Secure Non-Repudiable General Proxy Signature,,2015,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Samaneh Mashhadi,,4,2,380,389,,,,,,,http://dx.doi.org/10.17781/p001556,,10.17781/p001556,,,0,,1,false,,
163-308-959-548-845,"Forensic and Digital Evidence be used as Substantial Evidence in Criminal Cases, an Effective Alternative of Ocular Account: Evaluation in the Light of New Amendments. What are the Requirements of Admissibility and Reliability of Digital and Forensic Evidence?",2022-01-01,2022,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Dr. Muhammad Ramzan,,,,,,Digital evidence; Admissible evidence; Criminology; Psychology; Law; Computer science; Political science; Computer security; Digital forensics,,,,,,http://dx.doi.org/10.2139/ssrn.4021315,,10.2139/ssrn.4021315,,,0,,0,false,,
163-853-761-819-084,Anti-forensics,,2016,journal article,Digital Investigation,17422876,Elsevier BV,Netherlands,Kevin J. Conlan; Ibrahim Baggili; Frank Breitinger,"Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital forensic community. Thus, new research initiatives and strategies must be formulated to address this growing problem. In this work we first collect and categorize 308 anti-digital forensic tools to survey the field. We then devise an extended anti-forensic taxonomy to the one proposed by Rogers (2006) in order to create a more comprehensive taxonomy and facilitate linguistic standardization. Our work also takes into consideration anti-forensic activity which utilizes tools that were not originally designed for anti-forensic purposes, but can still be used with malicious intent. This category was labeled as Possible indications of anti-forensic activity, as certain software, scenarios, and digital artifacts could indicate anti-forensic activity on a system. We also publicly share our data sets, which includes categorical data on 308 collected anti-forensic tools, as well as 2780 unique hash values related to the installation files of 191 publicly available anti-forensic tools. As part of our analysis, the collected hash set was ran against the National Institute of Standards and Technology's 2016 National Software Reference Library, and only 423 matches were found out of the 2780 hashes. Our findings indicate a need for future endeavors in creating and maintaining exhaustive anti-forensic hash data sets.",18,,S66,S75,Digital artifact; World Wide Web; Set (abstract data type); Standardization; Data science; National Software Reference Library; Field (computer science); Computer science; Computer forensics; Digital forensics; Hash function,,,,,https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1054&context=electricalcomputerengineering-facpubs https://www.sciencedirect.com/science/article/pii/S1742287616300378 https://core.ac.uk/display/82295331 https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/54/ https://www.sciencedirect.com/science/article/abs/pii/S1742287616300378 https://dl.acm.org/citation.cfm?id=2988605 https://core.ac.uk/download/pdf/82295331.pdf,http://dx.doi.org/10.1016/j.diin.2016.04.006,,10.1016/j.diin.2016.04.006,2508545160,,0,005-102-962-333-180; 014-403-336-708-18X; 018-483-378-650-703; 021-850-208-884-128; 026-201-331-634-716; 035-853-217-426-112; 045-294-718-031-754; 045-935-396-341-342; 049-693-826-680-544; 058-559-419-151-003; 060-051-915-220-236; 064-665-774-871-511; 067-508-826-235-446; 078-598-867-814-365; 081-032-497-600-401; 103-103-595-689-579; 135-717-892-795-412; 144-786-887-819-307; 173-147-024-044-113,43,true,cc-by-nc-nd,hybrid
163-940-179-223-192,Appointment of comprehensive forensic examinations in case of the study of digital traces in the investigation of economic crimes,,2022,journal article,Полицейская деятельность,24540692,"Aurora Group, s.r.o",,Dmitrii Olegovich Buinov,"; Due to the ongoing digitalization of the economy, the study of digital traces in the framework of forensic examinations in criminal cases in the field of economic activity is one of the most relevant topics in forensic expert science. The purpose of this study is to identify and analyze the features of the production of complex forensic economic and computer–technical expertise in the study of digital traces, to determine the limits of competence of an expert economist in the expert study of digital traces. Within the framework of the study, the author set the following tasks: to analyze the types of crimes in the field of economics and the ways of their commission for the possibility of the formation of digital traces during the implementation of these offenses, to determine the types of digital traces characteristic of crimes in the field of economic activity, to determine the appropriateness of the appointment of comprehensive examinations, to analyze an example of expert practice for the use of special economic knowledge and special knowledge in the field of forensic computer-technical expertise.The author came to the conclusion that the appointment of a comprehensive forensic computer-technical and economic expertise is unnecessary in most cases, since the simultaneous joint participation of an expert economist and an expert in the field of IT technologies in writing an opinion and formulating a general conclusion is not necessary in most cases when investigating crimes in the field of economic activity. As a rule, the participation of a specialist in the field of IT technologies is sufficient to withdraw computer information from the carrier and then provide this information to an expert economist for research. At the same time, an expert economist is able to work independently with software products and computer files, for the study of which there is enough well-known knowledge.; ",,4,20,28,Digital forensics; Field (mathematics); Forensic science; Competence (human resources); Commission; Expert opinion; Computer forensics; Set (abstract data type); Forensic examination; Expert system; Computer science; Economic crime; Data science; Engineering; Law; Computer security; Psychology; Political science; Artificial intelligence; Forensic engineering; Medicine; Social psychology; Mathematics; Intensive care medicine; Veterinary medicine; Pure mathematics; Programming language,,,,,,http://dx.doi.org/10.7256/2454-0692.2022.4.38601,,10.7256/2454-0692.2022.4.38601,,,0,,0,true,,gold
164-385-694-618-291,Digital forensics in Malaysia,2014-01-23,2014,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Aswami Ariffin; Izwan Iskandar Ishak,"Conference paper on Digital forensics in Malaysia by Aswami Fadillah Mohd Ariffin and Izwan Iskandar Ishak. Aswami Fadillah Mohd Ariffin is the Head of Digital Forensic, CyberSecurity Malaysia and Izwan Iskandar Ishak is a Senior Executive, Strategic Policy & Legal Research of CyberSecurity (Malaysia).",5,0,,,Engineering; Strategic policy; Computer security; Public relations; Legal research; Digital forensics,,,,,https://journals.sas.ac.uk/deeslr/article/view/1849 https://sas-space.sas.ac.uk/5441/,http://dx.doi.org/10.14296/deeslr.v5i0.1849,,10.14296/deeslr.v5i0.1849,2053558031,,0,,2,true,cc-by-nc-nd,hybrid
164-392-011-156-848,On the Development of a Digital Forensics Curriculum,,2012,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Manghui Tu; Dianxiang Xu; Samsuddin Wira; Cristian Balan; Kyle Cronin,"Computer Crime and computer related incidents continue their prevalence and frequency, resulting in losses approaching billions of dollars. To fight against these crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce that can effectively investigate computer crimes and incidents. There is presently no standard to guide the design of digital forensics curriculum for an academic program. In this research, previous work on digital forensics curriculum design and existing education programs are thoroughly investigated. Both digital forensics educators and practitioners were surveyed and results were analyzed to determine the industry and law enforcement need for skills and knowledge for their digital forensic examiners. Based on the survey results and the topics that make up certificate programs in digital forensics, topics that are desired in digital forensics courses are identified. Finally, based on the research findings, six digital forensics courses and required 1 Corresponding author. Tel: +1 219 989 3253, Email: manghui.tu@purduecal.edu Journal of Digital Forensics, Security and Law, Vol. 7(3) 14 topics are proposed to be offered in both undergraduate and graduate digital forensics programs.",7,3,2,,Engineering; Work (electrical); Workforce; Law enforcement; Academic program; Survey result; Curriculum; Engineering ethics; Digital forensics; Certificate,,,,,https://commons.erau.edu/jdfsl/vol7/iss3/2/ https://commons.erau.edu/cgi/viewcontent.cgi?article=1126&context=jdfsl,http://dx.doi.org/10.15394/jdfsl.2012.1126,,10.15394/jdfsl.2012.1126,2463041832,,0,002-569-181-368-890; 005-733-361-126-371; 007-790-059-029-953; 012-314-515-683-048; 012-806-731-619-471; 014-425-849-204-654; 021-618-983-657-405; 025-216-090-579-394; 028-161-558-897-878; 030-244-803-361-520; 036-733-117-655-399; 046-177-920-187-772; 054-389-084-057-423; 057-991-197-390-530; 066-701-921-148-891; 115-434-273-826-886; 125-416-939-855-653; 130-239-147-323-022; 167-592-705-831-583,8,true,cc-by-nc,gold
164-788-241-444-459,When is a line of inquiry 'reasonable'? - a focus on digital devices,2022-03-18,2022,journal article,Australian Journal of Forensic Sciences,00450618; 1834562x,Informa UK Limited,United Kingdom,Graeme Horsman,,,,1,12,Focus (optics); Line (geometry); Computer science; Digital forensics; Data science; Psychology,,,,,,http://dx.doi.org/10.1080/00450618.2022.2048691,,10.1080/00450618.2022.2048691,,,0,,0,false,,
164-838-567-614-73X,Performance Measures for Evaluating the Dynamic Authentication Techniques,,2016,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Jing-Chiou Liou,,5,2,83,93,Authentication (law); Information system; Computer science; Multimedia; Wireless,,,,,http://sdiwc.net/digital-library/performance-measures-for-evaluating-the-dynamic-authentication-techniques,http://dx.doi.org/10.17781/p002052,,10.17781/p002052,2359350347,,0,,1,false,,
164-989-739-953-649,A Comprehensive Study of Passive Digital Image Forensics Techniques based on Intrinsic Fingerprints,2015-04-22,2015,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Ajit Singh; Jyoti Malik,"Over the past decade digital images has become a very popular way to communicate, store and process information. With the rapid advancement and easy availability of technology, there is a flood of devices that are able to capture, store and create digital images. Over the past years image processing techniques have been developed that makes it really easy to tamper images. From journalism to social media edited images are appearing everywhere with increasing frequency. Authentication of images is very necessary as visual data effects what people perceive and believe. Digital image Forensics is an emerging field that uses intrinsic and extrinsic methods to authenticate digital images. Passive techniques extract and analyze inherent patterns introduced by various image processing steps and use these artifacts to associate the image with source device as well as to detect tampering of the digital images. This paper gives an overview of passive techniques of Digital Image Forensics which are based on intrinsic fingerprints inherent in digital images.",116,19,16,21,Image (mathematics); Artificial intelligence; Digital image forensics; Computer vision; Field (computer science); Computer science; Digital image; Multimedia; Image processing,,,,,https://www.ijcaonline.org/archives/volume116/number19/20444-2794 https://research.ijcaonline.org/volume116/number19/pxc3902794.pdf https://ui.adsabs.harvard.edu/abs/2015IJCA..116s..16S/abstract,http://dx.doi.org/10.5120/20444-2794,,10.5120/20444-2794,2331300927,,0,004-023-060-478-098; 005-663-388-424-669; 006-715-003-756-565; 008-944-622-967-339; 014-079-494-188-077; 016-167-894-033-755; 028-250-456-206-030; 029-093-526-590-26X; 032-763-540-112-828; 040-425-146-348-064; 060-409-308-040-210; 076-704-896-134-67X; 086-832-985-542-578; 087-814-787-159-954; 098-449-049-825-579; 114-599-315-973-390; 140-241-199-301-269; 162-318-120-415-302; 179-834-398-565-338; 180-088-494-514-913,4,true,,bronze
165-408-203-311-152,Proposal for a digital forensic investigation model in accordance with the legislation in Mexico,2019-12-31,2019,journal article,ECORFAN Journal Spain,24443204,ECORFAN,,Carlos Ortega-Laurel; Jacobo Sandoval-Gutierrez; Juan López-Sauceda; Adan Fernando Serrano-Orozco,"In this paper we collect and observes the existing digital forensic investigation models, which are essentially the application of information systems and communications engineering for forensic purposes. In addition, a review of the federal criminal situation in Mexico is presented (through the revision of the regulations in the Federal Criminal Code), because the Code indirectly describes the reality of what can be prosecuted and admitted as evidence, criminally speaking, with the application of digital forensic investigation models in Mexico. This is due to the significant deficiency in the proposal of digital forensic investigation models, in which there is not enough emphasis on the potential admissibility of the evidence gathered through the models, to give attention to the need to provide “evidence” to Institutions responsible for the impartation of justice, as if doing digital forensic investigation to be a technological issue and not as it really is: a socio-legal-technological issue. Therefore, considering the criminal reality in Mexico, locating the practices of existing models that make sense in accordance with the norm, an abbreviated model is proposed that really helps successful prosecutions.",,,1,9,Law; Legislation; Digital forensic investigation; Computer science,,,,,http://dx.doi.org/10.35429/ejs.2019.11.6.1.9,http://dx.doi.org/10.35429/ejs.2019.11.6.1.9,,10.35429/ejs.2019.11.6.1.9,3144221687,,0,004-706-447-836-905; 004-872-169-627-620; 010-086-703-646-194; 020-944-423-224-895; 022-502-201-281-354; 032-697-093-668-898; 038-668-970-194-854; 047-630-600-014-492; 055-628-715-083-217; 067-950-012-629-210; 072-603-853-459-193; 087-665-408-966-240; 132-355-634-397-986; 133-397-275-695-990; 140-821-103-436-654; 159-477-048-665-066; 170-299-458-679-224; 190-065-821-748-92X; 199-745-676-923-766,0,false,,
165-638-803-131-183,Unboxing the digital forensic investigation process.,2022-01-20,2022,journal article,Science & justice : journal of the Forensic Science Society,18764452; 13550306,Forensic Science Society,United Kingdom,Graeme Horsman; Nina Sunde,"As digital forensics continues to play an important role in criminal investigations, its investigative work must be underpinned with well-defined and robust methodologies. Over the last 20 years, a substantial body of research has been produced to define and codify the digital forensic investigation process and the stages/sub-processes involved. Whilst current digital forensic investigation process models provide a solid foundation, it is argued that existing attempts often only focus on those physical tasks, which a practitioner must carry out at any given stage of an examination, omitting to identify those core thought processes, decisions and behaviours that form part of effective investigative practices. This work presents the Digital Forensic Workflow Model (DFWM), a novel approach to the structuring and definition of the procedures and tasks involved in the digital forensic investigation process starting from the initial 'Review of Client Requirements & Planning' stage, right through to the 'Evaluation of Deployed Workflow' stage. The DFWM contributes to the digital forensic management toolbox, where it enables the identification and management of risk and supports error mitigation at each stage of the workflow. The paper demonstrates how the DFWM functions as a framework for unboxing the digital forensic investigation process based on the investigative strategy of the particular case, providing a detailed structure and depiction of the physical and investigative tasks and decisions. From a research perspective, DFWM is a descriptive starting point, and future empirical studies may expand and provide further detail to the various physical and cognitive tasks and associated risks during the DF workflow.",62,2,171,180,Workflow; Digital forensics; Computer science; Toolbox; Process (computing); Structuring; Computer forensics; Digital evidence; Identification (biology); Data science,Digital forensics process; Investigative decision-making; Risk; Task analysis,Forensic Medicine; Humans; Workflow,,,,http://dx.doi.org/10.1016/j.scijus.2022.01.002,35277231,10.1016/j.scijus.2022.01.002,,,0,001-334-079-265-518; 003-232-363-219-004; 004-934-589-759-348; 005-232-046-693-557; 005-997-056-658-776; 006-435-365-660-88X; 010-061-391-662-193; 010-963-610-208-920; 020-944-423-224-895; 021-862-840-020-92X; 022-013-057-077-326; 026-774-296-742-022; 035-233-982-194-067; 046-143-775-958-052; 049-347-540-283-189; 058-052-081-943-595; 062-168-384-023-533; 065-332-103-727-835; 074-706-219-689-754; 075-529-701-912-32X; 092-765-349-680-750; 094-142-794-127-63X; 124-114-990-459-947; 143-408-563-865-265; 149-526-118-910-836; 162-110-149-751-921; 163-376-020-626-884; 190-343-104-111-19X,1,true,cc-by-nc-nd,hybrid
165-956-283-954-04X,Digital evidence and digital forensic education,2016-11-05,2016,journal article,Digital Evidence and Electronic Signature Law Review,20548508; 17564611,School of Advanced Study,Spain,Goran Oparnica,"Introduction by editor: I invited Goran to write about the need for education in digital evidence from his perspective: that is, somebody that moved into digital forensics in Croatia some years ago because of a need by his then employers. Goran is well aware of some of the excellent books on digital forensics, as well as the books written by lawyers on the topic. This is a polemic and a personal view from a person providing a digital forensics service in a country that does not have the luxury of resources that other, better off, countries have. This article has been written in an attempt to convince the people responsible for the curricula that it is not possible to respond against organized crime without a substantial shift in approach towards digital evidence. Index words: digital evidence; digital forensics; education; lawyers; judges; legal academics",13,0,143,147,Political science; Digital native; Law; Organised crime; Index (publishing); Digital evidence; Göran; Media studies; Curriculum; Computer forensics; Digital forensics,,,,,https://journals.sas.ac.uk/deeslr/article/view/2305,http://dx.doi.org/10.14296/deeslr.v13i0.2305,,10.14296/deeslr.v13i0.2305,2555146856,,0,,6,true,cc-by-nc-nd,gold
166-314-098-559-795,MACHINE LEARNING FORENSICS:A NEW BRANCH OF DIGITAL FORENSICS,2017-08-30,2017,journal article,International Journal of Advanced Research in Computer Science,09765697,IJARCS International Journal of Advanced Research in Computer Science,,Parag H. Rughani; Prerak Bhatt,"The objective of this research is to understand how machine learning can be used in digital crime and its forensic importance, setting up an environment to train artificial neural networks and investigate as well as analyze them to find artefacts that can be helpful in forensic investigation.",8,8,217,222,Machine learning; Artificial intelligence; Computer science; Artificial neural network; Computer forensics; Digital forensics,,,,,http://www.ijarcs.info/index.php/Ijarcs/article/download/4613/4155 http://ijarcs.info/index.php/Ijarcs/article/view/4613,http://dx.doi.org/10.26483/ijarcs.v8i8.4613,,10.26483/ijarcs.v8i8.4613,2765947859,,0,,10,true,cc-by,hybrid
166-800-654-194-357,Contents List,,2016,journal article,Digital Investigation,17422876; 1873202x,Elsevier BV,Netherlands,,,18,,iii,iii,Computer science; World Wide Web; Computer security,,,,,https://core.ac.uk/download/pdf/82035161.pdf,http://dx.doi.org/10.1016/s1742-2876(16)30067-6,,10.1016/s1742-2876(16)30067-6,,,0,,0,true,cc-by-nc-nd,hybrid
167-000-265-524-448,Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes,2013-03-07,2013,journal article,SPIE Proceedings,0277786x,SPIE,,Mario Hildebrandt; Stefan Kiltz; Jana Dittmann,"The digitization of physical traces from crime scenes in forensic investigations in effect creates a digital chain-of-custody and entrains the challenge of creating a link between the two or more representations of the same; trace. In order to be forensically sound, especially the two security aspects of integrity and authenticity need; to be maintained at all times. Especially the adherence to the authenticity using technical means proves to; be a challenge at the boundary between the physical object and its digital representations. In this article we; propose a new method of linking physical objects with its digital counterparts using two-dimensional bar codes; and additional meta-data accompanying the acquired data for integration in the conventional documentation; of collection of items of evidence (bagging and tagging process). Using the exemplary chosen QR-code as; particular implementation of a bar code and a model of the forensic process, we also supply a means to integrate; our suggested approach into forensically sound proceedings as described by Holder et al.1 We use the example of; the digital dactyloscopy as a forensic discipline, where currently progress is being made by digitizing some of the; processing steps. We show an exemplary demonstrator of the suggested approach using a smartphone as a mobile; device for the verification of the physical trace to extend the chain-of-custody from the physical to the digital; domain. Our evaluation of the demonstrator is performed towards the readability and the verification of its; contents. We can read the bar code despite its limited size of 42 x 42 mm and rather large amount of embedded; data using various devices. Furthermore, the QR-code's error correction features help to recover contents of; damaged codes. Subsequently, our appended digital signature allows for detecting malicious manipulations of; the embedded data.",8667,,213,223,Digital signature; Forensic science; Crime scene; Mobile device; Information retrieval; Digitization; Computer science; Multimedia; Computer forensics; TRACE (psycholinguistics); Process (computing),,,,,https://www.spiedigitallibrary.org/conference-proceedings-of-spie/8667/1/Digitized-forensics--retaining-a-link-between-physical-and-digital/10.1117/12.2004548.full https://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=1662470 https://ui.adsabs.harvard.edu/abs/2013SPIE.8667E..0SH/abstract,http://dx.doi.org/10.1117/12.2004548,,10.1117/12.2004548,1981711882,,0,,1,false,,
168-059-072-881-871,An Approach for Estimating Forensic Data Provenance of an Object in the Cloud Environment using One Dimensional Successive Bisection Method,2016-04-15,2016,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Victor R. Kebande; Nickson M. Karie,"The decline in traditional forensics and the emergence of cloud forensics has made it hard for digital forensic investigators to conduct digital investigations due to inadaptability of the cloud to digital forensic processes. Additionally, data that resides in the cloud is normally scattered across constantly changing data centers, hosts and virtual instances are easily destroyed as they are created. On the same note it is not easy to seize physical devices where a particular crime has occurred and locating the origin of an object in the cloud can be a challenge when we do not know where the actual data resides. Data provenance provides a solution whereby one can trace data based on the tag as it keeps changing directions in the cloud. However, if the distance between two particular tagged data is taken into account then the source and destination of an object can be located easily which can then enable digital forensic investigators to locate the physical devices. The problem that this paper is addressing is that, there is no easy way of locating data provenance in the cloud environment without estimating the distance between tagged data that moves in the cloud. Based on this, the authors have proposed a mechanism for locating the provenance of an object using successive bisection method. Similar test have been carried using different intervals in an experiment and the results are very promising. General Terms Digital Forensics, provenance, cloud.",140,1,34,39,Forensic science; Bisection method; Information retrieval; Data science; Provenance; Cloud forensics; Computer science; Object (computer science); TRACE (psycholinguistics); Cloud computing; Digital forensics,,,,,https://www.ijcaonline.org/archives/volume140/number1/24562-2016909211 https://www.ijcaonline.org/research/volume140/number1/kebande-2016-ijca-909211.pdf,http://dx.doi.org/10.5120/ijca2016909211,,10.5120/ijca2016909211,2340968873,,0,007-355-906-471-544; 011-024-396-292-56X; 012-447-467-503-151; 023-709-114-205-69X; 032-182-801-166-90X; 044-373-289-676-771; 052-152-063-024-042; 056-150-947-987-596; 070-124-235-657-650; 071-184-460-604-724; 093-335-524-097-076; 111-987-302-074-551; 136-798-153-498-59X; 174-186-817-525-708,0,true,,bronze
168-245-076-589-180,Contemporaneous notes for digital forensic examinations,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Graeme Horsman,,37,,301173,,Work (electrical); Data science; Process (engineering); Digital forensics; History,,,,,https://www.sciencedirect.com/science/article/pii/S2666281721000810 https://dblp.uni-trier.de/db/journals/di/di37.html#Horsman21,http://dx.doi.org/10.1016/j.fsidi.2021.301173,,10.1016/j.fsidi.2021.301173,3162273119,,0,004-026-832-392-918; 005-232-046-693-557; 007-067-502-103-925; 007-868-297-443-532; 010-061-391-662-193; 010-963-610-208-920; 031-499-165-456-98X; 038-668-970-194-854; 071-908-933-643-362; 082-589-789-111-858; 099-377-733-522-116; 102-243-142-344-71X; 111-488-239-742-003; 135-251-586-815-292; 173-034-553-635-460,1,false,,
169-019-682-180-36X,Prelim iii - Contents List,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,39,,301323,301323,Information retrieval; Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00249-3,,10.1016/s2666-2817(21)00249-3,,,0,,0,true,,bronze
169-037-688-817-615,Prelim iii - Contents List,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,43,,301468,301468,Computer science; Information retrieval,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00149-4,,10.1016/s2666-2817(22)00149-4,,,0,,0,false,,
169-163-572-570-013,Physical security design of a digital forensic lab,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Doug Weeks; Bing Zhou,,13,4,418,418,Computer science; Digital forensics; Digital evidence; Computer forensics; Forensic science; Computer security; Data science; Physical security,,,,,,http://dx.doi.org/10.1504/ijesdf.2021.116017,,10.1504/ijesdf.2021.116017,,,0,,0,false,,
169-416-347-273-381,Detection of Metasploit Attacks Using RAM Forensic on Proprietary Operating Systems,2020-05-22,2020,journal article,"Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control",25032267; 25032259,Universitas Muhammadiyah Malang,,Danar Cahyo Prakoso; Riadi; Yudi Prayudi,"Information technology has become an essential thing in the digital era as it is today. With the support of computer networks, information technology is used as a medium for exchanging data and information. Much information is confidential. Therefore, security is also essential. Metasploit is one of the frameworks commonly used by penetration testers to audit or test the security of a computer system legally, but it does not rule out the possibility that Metasploit can also be used for crime. For this reason, it is necessary to carry out a digital forensic process to uncover these crimes. In this study, a simulation of attacks on Windows 10 will be carried out with Metasploit. Then the digital forensics process uses live forensics techniques on computer RAM, where the computer RAM contains information about the processes running on the computer. The live forensic technique is important because information on RAM will be lost if the computer is off. This research will use FTK Imager, Dumpit, and Magnet RAM Capture as the RAM acquisition tool and Volatility as the analysis tool. The results of the research have successfully shown that the live forensics technique in RAM is able to obtain digital evidence in the form of an attacker's IP, evidence of exploits/Trojans, processes running on RAM, operating system profiles used and the location of the exploits/Trojan when executed by the victim.",5,2,155,160,Operating system; Information technology; Exploit; Trojan; Digital forensic process; Digital evidence; Computer science; Confidentiality; Digital forensics; Process (computing),,,,,https://kinetik.umm.ac.id/index.php/kinetik/article/view/1037 https://kinetik.umm.ac.id/index.php/kinetik/article/download/1037/pdf https://core.ac.uk/download/pdf/326780305.pdf,http://dx.doi.org/10.22219/kinetik.v5i2.1037,,10.22219/kinetik.v5i2.1037,3027882824,,0,007-204-348-441-229; 008-441-081-714-181; 008-656-244-710-010; 017-662-176-550-891; 033-624-790-871-700; 036-409-985-618-198; 039-398-086-365-500; 043-703-546-622-938; 049-150-093-915-025; 055-473-899-043-485; 058-884-035-549-345; 101-819-655-568-965; 120-177-024-117-719; 121-266-887-418-366; 123-693-711-254-942; 131-861-074-437-518; 150-042-119-479-43X,0,true,cc-by-nc-sa,gold
170-481-935-489-564,Digital Autopsy (Virtopsy) in India: Steps taken and journey ahead,,2022,journal article,Journal of Indian Academy of Forensic Medicine,09710973; 09740848,Diva Enterprises Private Limited,,Adarsh Kumar,,44,suppl,43,46,,,,,,,http://dx.doi.org/10.5958/0974-0848.2022.00011.2,,10.5958/0974-0848.2022.00011.2,,,0,,0,false,,
170-961-216-449-905,10-13-DFRWS-Baltimore-2023 (2),,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,42,,301422,301422,Environmental science; Gerontology; Medicine,,,,,,http://dx.doi.org/10.1016/s2666-2817(22)00103-2,,10.1016/s2666-2817(22)00103-2,,,0,,0,false,,
171-177-825-236-988,Computer forensics on Android devices,2016-06-01,2016,journal article,Revista Ingenio,2389864x; 2011642x,Universidad Francisco de Paula Santander,,Dewar Rico Bautista; Johan Smith Rueda Rueda,"
; En este artículo se estudian los principales conceptos de la informática forense. Qué es la informática forense, cuáles son sus objetivos y sus principios. También se mencionan algunas técnicas anti-forenses, el manejo de la evidencia digital, los modelos forenses y la legislación colombiana relacionada con la evidencia digital. Se hace énfasis en las buenas prácticas para la realización de un análisis forense.
; ",9,1,21,34,Operating system; Computer science; Computer forensics; Android (operating system),,,,,https://doaj.org/article/31e4dee6b9fa403fa7a45bd05de4562c https://core.ac.uk/download/322563884.pdf,http://dx.doi.org/10.22463/2011642x.2063,,10.22463/2011642x.2063,3195445183,,0,013-331-920-213-649; 019-698-064-288-240; 030-674-871-669-121; 042-653-566-399-199; 061-733-902-008-548; 087-868-527-983-406; 109-279-350-025-229; 118-722-872-870-470; 179-503-171-644-756; 186-737-030-900-301,0,true,cc-by-nc,gold
171-959-362-512-494,Development of National Digital Evidence Metadata,2019-09-06,2019,journal article,Jurnal Online Informatika,25279165; 25281682,Sunan Gunung Djati State Islamic University of Bandung,,Bambang Sugiantoro,"The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line. The description process will return EXIF decryption results in the header image. This can secure EXIF Metadata information without changing the image quality",4,1,24,27,Encryption; Information retrieval; Digital evidence; Computer science; Digital image; Header; Line (text file); Information and Communications Technology; Metadata; File format,,,,,http://join.if.uinsgd.ac.id/index.php/join/article/download/292/118 http://join.if.uinsgd.ac.id/index.php/join/article/view/292 https://core.ac.uk/download/pdf/295600543.pdf,http://dx.doi.org/10.15575/join.v4i1.292,,10.15575/join.v4i1.292,2970970599,,0,,0,true,cc-by-nc-nd,gold
172-288-045-781-65X,A Survey on digital forensic investigation and its challenges in cloud using VM snapshots,,2018,journal article,International Journal of Advance Research and Innovative Ideas in Education,23954396,,,M Sirisha,Cloud computing is becoming most promising technology in recent days. It offers the scalable elastic services to many users at a time and it helps to access the resources quickly from cloud service provider. Digital forensics is part of computer forensics. Various challenges of cloud hinder the process of cloud forensics so that no standard framework for cloud forensics can be designed. This paper gathers the challenges and possible solutions. As new technologies develop criminals find ways to apply these technologies to commit crimes. With the explosion of web technologies almost all major businesses in the world have web presence thus exposing their data to legitimate and illegitimate users. All forensic work should be done with care including documenting clear chain of custody in order for the evidence to be admissive in a court of law.There is need of dedicated digital forensic framework for cloud environment. System proposes an efficient approach to forensic investigation in cloud using Virtual Machine (VM) snapshots.,4,3,1509,1514,Chain of custody; Commit; Emerging technologies; Data science; Virtual machine; Web presence; Computer science; Computer forensics; Cloud computing; Digital forensics,,,,,http://ijariie.com/FormDetails.aspx?MenuScriptId=107511,http://ijariie.com/FormDetails.aspx?MenuScriptId=107511,,,2806803373,,0,,0,false,,
172-453-362-846-118,A Proposed Model of Digital Forensic on Cloud Computing Security Infrastructure,2018-07-31,2018,journal article,International Journal of Innovation in Enterprise System,25803050,Telkom University,,Mohammad Hafiz Hersyah,"Over the past decades, practitioners and researchers have made remarkable achievements in digital forensic. The abilities to conquer major technical obstacles are bestowing practitioners greater access to digital evidence. Sophisticated forensic techniques and tools are being developed to assist forensic acquisition and extraction of volatile data, inspection of remote repositories system and analysis of network traffic. Computer forensic is a comprehensive work that based on several attributes that are : objectivity, relevance and legitimacy to compose a system model that projected to be an electronic evidence forensic system. Latest studies show that the rapid growing of cloud computing facilities usage that has enable various improvements as part of the innovation process at organisations. Information systems are in frequently exposed to various types of threats which able to trigger different types of bad consequences as more and more information stored, problems arise especially about security information technology risk aspects.",2,1,,,Digital forensics; Cloud computing; Computer science; Digital evidence; Computer security; Data science; Process (computing); Relevance (law); Objectivity (philosophy); Information security,,,,,,http://dx.doi.org/10.25124/ijies.v2i01.49,,10.25124/ijies.v2i01.49,,,0,,0,true,,gold
173-080-183-794-495,Ontology based model of digital forensic virtual lab and curriculum design,,2014,journal article,International Journal of Engineering Education,0949149x,,,Igor Franc; Ivan Stanković; Irina Branovic; Ranko Popovic,"Digital forensics (DF) is a discipline that uses investigative methods to find digital evidence and prepare it for legal proceedings incomputer crime cases. Since this is a relatively new teaching subject in higher education institutions, syllabi and curricula are notyet standardized. In this paper we present an ontological approach to DF curriculum design, and discuss its implementation in avirtual digital forensic laboratory. The virtual educational environment is designed for the generic study of digital forensics, and isbased on ontology and a composite-component approach. Basic components of our virtual DF are objects to be related, put intonew compositions and placed in a library; relationships between all of the components are defined in ontology. Based on gatheredexperience, we designed and described DF curricula for undergraduate, graduate and Ph.D. studies that are tailored to our needs,but at the same time can be used as the starting point for introducing digital forensics courses at universities.",30,4,964,976,Higher education; Point (typography); Ontology; Subject (documents); Digital evidence; Computer science; Syllabus; Curriculum; Multimedia; Digital forensics,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=7360948,https://dialnet.unirioja.es/servlet/articulo?codigo=7360948,,,3027993264,,0,,1,false,,
173-242-189-728-551,Sample Preparation For Pesticide Analysis in A Forensic Toxicology Laboratory: A Review,2018-05-07,2018,journal article,Journal of Forensic Sciences and Digital Investigation,,Northern California Open Access Publications,,,,,,27,45,Toxicology; Forensic science; Forensic toxicology; Pesticide; Sample (material); Laboratory safety; Environmental science; Biology; Medicine; Veterinary medicine; Ecology; Chemistry; Chromatography; Nuclear medicine,,,,,,http://dx.doi.org/10.29199/fsdi.101016,,10.29199/fsdi.101016,,,0,,1,true,cc-by,hybrid
174-410-429-997-045,Cyber Crime Intervention- Attacks Analysis for Digital Forensics,2021-05-01,2021,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Gp. Capt P Aanand Naidu,,,,,,Intervention (counseling); Cyber crime; Computer security; Computer science; Digital forensics,,,,,http://dx.doi.org/10.46293/4n6/2021.03.02.02,http://dx.doi.org/10.46293/4n6/2021.03.02.02,,10.46293/4n6/2021.03.02.02,3161248771,,0,,1,false,,
174-412-922-343-845,Robotic Process Automation - An Overview,2020-11-01,2020,journal article,Digital Forensics (4n6) Journal,25821172,Digital Forensics (4N6),,Mohith Yadav,,,,,,Engineering; Systems engineering; Process automation system,,,,,http://dx.doi.org/10.46293/4n6/2020.02.04.06,http://dx.doi.org/10.46293/4n6/2020.02.04.06,,10.46293/4n6/2020.02.04.06,3095528212,,0,,1,false,,
175-273-946-966-114,Twenty Second Annual DFRWS Conference,,2022,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,,,42,,301430,,,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301430,,10.1016/j.fsidi.2022.301430,,,0,,0,false,,
175-630-039-571-779,Digital Forensic Signal Instant Messages Services in Case of Cyberbullying using Digital Forensic Research Workshop Method,2022-10-20,2022,journal article,International Journal of Computer Applications,09758887,Foundation of Computer Science,,Aji Gelar Prayogo; Imam Riadi,,184,32,21,29,,,,,,,http://dx.doi.org/10.5120/ijca2022922393,,10.5120/ijca2022922393,,,0,,0,false,,
175-631-077-425-11X,Viability of Consumer Grade Hardware for Learning Computer Forensics Principles,2021-04-19,2021,journal article,"The Journal of Digital Forensics, Security and Law",15587215,,,Lazaro A Herrera,,16,1,3,,Computer science; Multimedia; Computer forensics,,,,,https://commons.erau.edu/cgi/viewcontent.cgi?article=1683&context=jdfsl https://commons.erau.edu/jdfsl/vol16/iss1/3/,https://commons.erau.edu/jdfsl/vol16/iss1/3/,,,3164729417,,0,,0,true,cc-by-nc,gold
176-304-954-831-493,Application of multiple criteria decision making in the selection of digital forensics software,,2016,journal article,Vojnotehnicki glasnik,00428469,Centre for Evaluation in Education and Science (CEON/CEES),,Dejan Stanivukovic; Dragan Randjelovic,"Nowadays there is almost no criminal offense in the investigation of which digital evidence does not play a key role. Constant increase of the capacity of media that store digital data leads to continuous increase of the time necessary to identify and copy (acquire) digital evidence. Selection of appropriate digital forensics software is gaining in importance. Selection of adequate software includes a previous comparative analysis of two or more digital forensics software tools and an optimization process. The objective of the comparative analysis of these software tools is to determine and compare each of their realistic and comparable performances. Optimization aims to determine which of digital forensics software tools has better performances. This paper shows one of possible variants of selecting digital forensics software, using the latest scientific achievements in support of decision making based on the analytic hierarchy process (AHP) method and the Expert Choice computer program.",64,4,1083,1101,Software engineering; Data mining; Key (cryptography); Computer program; Software; Digital data; Digital evidence; Computer science; Process (engineering); Digital forensics; Analytic hierarchy process,,,,,https://scindeks-clanci.ceon.rs/data/pdf/0042-8469/2016/0042-84691604083S.pdf https://scindeks.ceon.rs/Article.aspx?artid=0042-84691604083S https://cyberleninka.ru/article/n/application-of-multiple-criteria-decision-making-in-the-selection-of-digital-forensics-software,http://dx.doi.org/10.5937/vojtehg64-8938,,10.5937/vojtehg64-8938,2516568482,,0,,0,true,cc-by,gold
176-605-425-739-746,The Hierarchy of Case Priority (HiCaP):- A proposed method for case prioritisation in digital forensic laboratories,,2022,journal article,Science & Justice,13550306; 18764452,Elsevier BV,United Kingdom,Graeme Horsman,"The need for digital forensic science (DFS) services has grown due to widespread and consistent engagement with technology by members of society. Whilst digital evidence often plays an important role in many inquiries, available investigative resources have failed to keep pace with such demand for them. As a result, the use case prioritisation models for backlog/workload management are of increasing importance to ensure the effective deployment of laboratory resources. This work focuses on the concept of case prioritisation in a digital forensic laboratory setting, following the submission of exhibits for examination, where this workflow is described. The challenges of case management and prioritisation in laboratories are discussed, with both ‘case acceptance’ and ‘case prioritisation’ procedures explained. Finally, the ‘Hierarchy of Case Priority’ (HiCaP) - a transparent, risk-based approach for the prioritisation of cases for examination, is proposed and described using examples.",62,5,594,601,Workflow; Hierarchy; Software deployment; Workload; Pace; Computer science; Risk analysis (engineering); Digital forensics; Work (physics); Computer security; Process management; Engineering; Business; Software engineering; Mechanical engineering; Geodesy; Database; Economics; Market economy; Geography; Operating system,,,,,,http://dx.doi.org/10.1016/j.scijus.2022.08.008,,10.1016/j.scijus.2022.08.008,,,0,000-360-120-513-679; 003-232-363-219-004; 031-655-872-268-787; 039-464-927-660-188; 040-567-901-099-238; 079-273-634-331-435; 083-937-536-208-584; 094-142-794-127-63X; 108-884-210-316-066; 126-591-597-706-715; 184-069-302-229-82X; 190-343-104-111-19X,0,true,,hybrid
176-777-857-831-803,CYBER FORENSIC TOOLS AND ITS APPLICATION IN THE INVESTIGATION OF DIGITAL CRIMES: PREVENTIVE MEASURES WITH CASE STUDIES,2022-02-01,2022,journal article,INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH,,World Wide Journals,,Yerriswamy K; G. S. Venumadhava,"Forensics, the science of using physical evidence to crack crime, has taken on a new avatar. The cyber forensic process is also advancing in new; ways. Digital forensics is the science of identifying, extracting, analyzing, and presenting the digital evidence that has been stored in digital; devices. Various digital tools and techniques are being used to achieve this. Here, the new cyber sleuths step in, armed with cyber forensics tools.; According to Section 65 of the Indian IT Act, a person who intentionally conceals or destroys or alters or intentionally or knowingly causes another; to conceal, destroy or alter any computer source code used for a computer, computer program, computer system, or network. To primary objective; of this study is to nd the role of Cyber Forensic Tools in Cyber investigation. It is better to sue security programmers by the body corporate to; control information on sites. Strict statutory laws need to be passed by the legislatures keeping in mind the interest of citizens. Working on this; paper helped me understand the primary aim of the cyber lab in solving the cases by analyzing the evidence given to them. Using cyber forensic; tools allows us to extract the data from the targeted devices, which plays a signicant role in detecting and collecting information regarding; cybercrimes.",,,71,73,Computer forensics; Digital evidence; Digital forensics; Computer science; Cyber crime; Computer security; Process (computing); Hacker; Data science; World Wide Web; The Internet; Operating system,,,,,,http://dx.doi.org/10.36106/ijsr/9633529,,10.36106/ijsr/9633529,,,0,007-362-065-583-626; 009-671-935-335-418; 014-065-195-857-333; 015-264-924-343-905; 021-563-550-669-43X; 023-252-810-319-853; 030-269-579-295-629; 032-810-109-985-524; 040-097-713-526-921; 042-972-111-603-681; 044-688-819-027-098; 046-527-367-793-765; 047-221-550-114-462; 055-590-023-850-939; 092-733-362-703-818; 095-437-078-101-003; 097-291-912-559-74X; 114-586-389-130-502; 133-332-986-537-019; 151-978-817-476-177; 192-212-429-382-054,0,false,,
177-886-630-508-584,Accrediting a Digital Evidence Laboratory,,2019,journal article,Forensic Science International: Synergy,2589871x,Elsevier BV,,Tracy Walraven,,1,,S7,,Engineering; Digital evidence; Medical education,,,,,https://api.elsevier.com/content/article/PII:S2589871X19301056?httpAccept=text/xml,http://dx.doi.org/10.1016/j.fsisyn.2019.06.022,,10.1016/j.fsisyn.2019.06.022,2969145815,,0,,0,true,"CC BY, CC BY-NC-ND",gold
178-083-319-545-064,Digital Forensics: Smart Aid for Digital Evidences,2018-04-24,2018,journal article,International journal of engineering research and technology,22780181,,,Mukul Kumar Srivastava; Devansh Chopra; null Vaishali,,5,10,,,Computer science; Multimedia; Digital forensics,,,,,https://www.ijert.org/research/digital-forensics-smart-aid-for-digital-evidences-IJERTCONV5IS10048.pdf https://www.ijert.org/digital-forensics-smart-aid-for-digital-evidences,https://www.ijert.org/digital-forensics-smart-aid-for-digital-evidences,,,2940971534,,0,,0,false,,
178-861-239-354-75X,Distance Learning in Forensic Nursing: The Lived Educational Experience,2018-04-17,2018,journal article,Journal of Forensic Sciences and Digital Investigation,26377136,Northern California Open Access Publications,,,,,,18,26,Forensic nursing; Forensic science; Psychology; Nursing; Medical education; Medicine; Geography; Archaeology,,,,,,http://dx.doi.org/10.29199/2637-7136/fsdi-101015,,10.29199/2637-7136/fsdi-101015,,,0,,0,true,cc-by,gold
179-322-950-074-016,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,36,,301143,301143,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00041-x,,10.1016/s2666-2817(21)00041-x,,,0,,0,false,,
179-683-412-689-404,Second Annual DFRWS APAC Conference,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,43,,301462,301462,Political science,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301462,,10.1016/j.fsidi.2022.301462,,,0,,0,false,,
179-762-953-856-987,A Block-chain based Enforcement to Reduce Cybercrimes in Digital Forensics,2021-07-01,2021,journal article,Journal of emerging technologies and innovative research,23495162,,,Susheel George Joseph; Tincy Thomas; Sahal P Najeeb; Sangeetha Sathyapal,"The fundamental aim of digital forensics is to discover, investigate, and protect an evidence, increasing cybercrime enforces, digital forensics team have to more accurate evidence handling. It makes digital evidence as an important factor to link persons with criminal activities. A chain of custody refers to a process of recording and preserving in court of law. It forms the forensic link of evidence sequence of control, transfer, analysis to preserve integrity, and to prevent its contamination. Thus it is of utmost importance to guarantee integrity, authenticity, of digital evidences in cyber-crime investigation. So guaranteeing the authenticity and legality of processes and procedures used to gather and transfer the evidence in a digital society is a real challenge. Block-chain technologies of enabling view of transaction back to origination provide enormous promise for the coming era.it is also used for securing IoT devices through efficient authentication and data transfer mechanisms. Block-chain based digital forensics chain of custody, influence forensic applications in bringing integrity to digital forensics.",8,7,,,Chain of custody; Authentication (law); Cybercrime; Enforcement; Digital evidence; Computer security; Computer science; Process (engineering); Database transaction; Digital forensics,,,,,https://www.jetir.org/papers/JETIR2107536.pdf https://www.jetir.org/view?paper=JETIR2107536,https://www.jetir.org/view?paper=JETIR2107536,,,3186463163,,0,,0,false,,
179-768-158-884-687,BeatClass: A Sustainable ECG Classification System in IoT-Based eHealth,2022-05-15,2022,journal article,IEEE Internet of Things Journal,23274662; 23722541,Institute of Electrical and Electronics Engineers (IEEE),United States,Le Sun; Yilin Wang; Zhiguo Qu; Neal N. Xiong,,9,10,7178,7195,,,,,National Natural Science Foundation of China; Priority Academic Program Development,,http://dx.doi.org/10.1109/jiot.2021.3108792,,10.1109/jiot.2021.3108792,,,0,000-099-369-206-782; 000-300-029-616-517; 003-036-167-472-899; 004-328-157-921-129; 005-834-508-447-755; 005-969-590-439-807; 006-720-431-080-617; 007-938-231-874-71X; 008-548-466-272-724; 008-845-774-303-685; 013-830-938-681-770; 014-430-146-200-135; 015-871-394-747-842; 017-041-772-309-963; 018-152-293-983-502; 019-626-708-661-862; 021-116-237-608-310; 021-270-808-127-891; 022-797-858-011-915; 023-979-812-700-057; 024-237-994-854-746; 025-716-961-802-207; 026-193-038-313-22X; 029-425-452-049-996; 031-824-904-893-988; 034-297-493-798-528; 035-797-753-090-129; 036-230-871-730-894; 037-749-870-845-291; 039-032-160-233-455; 043-252-925-112-751; 048-075-250-484-879; 048-589-423-925-74X; 051-123-575-499-851; 051-691-464-234-311; 055-436-967-663-668; 057-179-637-180-282; 063-496-550-304-162; 070-222-741-649-089; 082-932-537-054-872; 084-305-564-542-847; 086-396-555-703-986; 088-955-369-233-66X; 098-051-089-135-038; 099-300-786-330-833; 117-500-513-151-386; 118-236-461-472-212; 132-856-699-721-658; 136-104-577-044-031; 144-189-203-158-371; 162-919-031-232-954; 164-900-611-021-857; 186-755-774-542-817,17,false,,
180-118-259-265-800,Storing Forensic Data Against Interference,2022-07-20,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Amenuveve Gracious Adzogbley,"Digital forensic investigators face a wide range of inquiry goals, such as dealing with cybercrime. Digital forensic tools are no different. Different digital traces were examined on persistent storage devices (SSDs, SD cards, and USB drives), volatile memory snapshots, and network captures. A large realistic, timely training data is required to train experts, improve the forensic tools and keep their knowledge and capabilities up to date. However, there is a significant gap in digital forensic training data due to many factors such as privacy, secrecy, data protection, and intellectual property rights. Multiple frameworks for generating realistic digital forensic data sets have been proposed in recent years. None of these frameworks offers a comprehensive strategy for creating digital forensic tools, for relevant traces, from many sources. Keywords s: Data Storage, Cybersecurity, Cybercrime, Protection, Forensics, interference. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Amenuveve Gracious Adzogbley (2022). Storing Forensic Data Against Interference SMART-IEEE-Creative Research Publications Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 7-14. www.isteams.net/ITlawbookchapter2022. dx.doi.org/",1,1,7,14,Digital forensics; Computer science; Computer security; Nexus (standard); Cybercrime; Secrecy; Intellectual property; Law enforcement; Data science; World Wide Web; The Internet; Law; Political science; Embedded system; Operating system,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p2,,10.22624/aims/crp-bk3-p2,,,0,,0,true,,bronze
180-706-989-021-884,Digital Evidence for Database Tamper Detection,,2012,journal article,Journal of Information Security,21531234; 21531242,"Scientific Research Publishing, Inc.",,Shweta Tripathi; Bandu B. Meshram,"Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. Starting with the basics of oracle architecture, continuing with the basic steps of forensic analysis the paper elaborates the extraction of suspicious locations in oracle. As a forensic examiner, collecting digital evidence in a database is a key factor. Planned and a modelled way of examination will lead to a valid detection. Based on the literature survey conducted on different aspects of collecting digital evidence for database tamper detection, the paper proposes a block diagram which may guide a database forensic examiner to obtain the evidences.",3,2,113,121,Block diagram; Key (cryptography); Digital evidence; Oracle database; Literature survey; Focus (computing); Computer science; Oracle; Database; Identification (information),,,,,https://dblp.uni-trier.de/db/journals/jisec/jisec3.html#TripathiM12 https://www.scirp.org/html/7-7800072_18796.htm https://file.scirp.org/pdf/JIS20120200006_49093321.pdf https://file.scirp.org/Html/7-7800072_18796.htm https://www.scirp.org/journal/PaperDownload.aspx?paperID=18796 https://dx.doi.org/10.4236/jis.2012.32014 http://dx.doi.org/10.4236/jis.2012.32014,http://dx.doi.org/10.4236/jis.2012.32014,,10.4236/jis.2012.32014,2135960911,,0,043-328-161-679-384; 043-742-356-311-540; 129-415-196-725-196; 138-851-840-986-301; 193-611-410-267-544; 193-668-588-183-329,21,true,,gold
180-750-337-060-181,Rise of Digital Forensics and its impact on criminal justice: A study of tools and techniques involved,2021-10-01,2021,journal article,Technoarete Transactions on Advances in Social Sciences and Humanities,25831127,Technoarete Research and Development Association,,Askar Mohammed Ali Garad,"With the technological advancement in various fields, the digital forensics technology has also been revolutionized and as a result, criminal justice system has been substantially changed. However, various information technologies has not just enabled the researchers to find out the criminals but also helped them to identify the root cause for crimes. Along with that, there has been a growth in justice system as a result of the technological advancements. In the study, various aspects of digital forensics have been identified and described effectively. In India, the numbers of crimes are growing faster and their techniques are changing as well. That is creating challenges to make justice against it without adequate evidence. In that case, which kinds of evidence can be collected and from which resources, have been discussed here with clear information. How the technological changes are impacting the criminal investigation procedures and bringing more efficiency, have been discussed as well. Keyword : Digital forensic technologies, Criminal activities, Criminal justice, Justice System, Evidence.",1,1,16,20,,,,,,,http://dx.doi.org/10.36647/ttassh/01.01.a005,,10.36647/ttassh/01.01.a005,,,0,,0,false,,
181-046-082-158-36X,Digital Forensics Triage Classification Model using Hybrid Learning Approaches,2022-05-01,2022,journal article,International Journal of Innovative Research in Computer Science & Technology,23475552,Innovative Research Publication,,Mohmed Afridhi L; Palanivel K,"The Internet and the accessibility of gadgets with connectivity have resulted in the global spread of cyber threats and cybercrime, posing significant hurdles for digital forensics. Consequently, the volume of information that may need to be investigated is growing, necessitating the development of new forensic technologies and methods. Those now in use are, in fact, old-fashioned, as they are more focused on complete device extraction for case-relevant device identification. A practical approach, a Digital Forensics Triage, tries to quickly collect facts and give essential insight into this circumstance, which could be described as data-rich but information-poor. In time- sensitive scenarios, digital forensics triage approaches can prioritize some electronic gadgets over others based on their significance to the criminal case. The Digital Forensic Laboratories (DFS) make it easier to identify essential gadgets in criminal proceedings when time, significant accumulations, and the accused's confidentiality are critical considerations. Consequently, digital forensics and machine learning techniques allow for the rapid classification of appropriate gadgets despite dipping the quantity of information that has to be adequately studied. This study presents a digital forensic model that may be utilized to build a robotic digital device categorization tool employed in real- world criminal investigations.",,,29,39,Digital forensics; Computer science; Cybercrime; Computer forensics; Triage; Identification (biology); Confidentiality; Computer security; The Internet; Categorization; Digital evidence; Data science; Criminal investigation; World Wide Web,,,,,,http://dx.doi.org/10.55524/ijircst.2022.10.3.7,,10.55524/ijircst.2022.10.3.7,,,0,,0,true,,gold
181-079-576-381-773,Prelim i - Editorial Board,,2020,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,34,,301066,301066,Editorial board; Library science; Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(20)30363-2,,10.1016/s2666-2817(20)30363-2,,,0,,0,true,,bronze
181-095-475-426-346,A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS,,2014,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Asou Aminnezhad; Ali Dehghantanha,"Privacy issues have always been a major concern in ; computer forensics and security and in case of any ; investigation whether it is pertaining to computer or ; not always privacy issues appear. To enable ; privacy’s protection in the physical world we need ; the law that should be legislated, but in a digital ; world by rapidly growing of technology and using ; the digital devices more and more that generate a ; huge amount of private data it is impossible to ; provide fully protected space in cyber world ; during the transfer, store and collect data. Since its ; introduction to the field, forensics investigators, ; and developers have faced challenges in finding the ; balance between retrieving key evidences and ; infringing user privacy. This paper looks into ; developmental trends in computer forensics and ; security in various aspects in achieving such a ; balance. In addition, the paper analyses each ; scenario to determine the trend of solutions in these ; aspects and evaluate their effectiveness in resolving ; the aforementioned issues.",1,4,311,323,Internet privacy; Information privacy; Privacy by Design; Key (cryptography); Space (commercial competition); Field (computer science); Computer security; Computer science; Privacy software; Computer forensics; Digital forensics,,,,,https://oaji.net/articles/2014/541-1394063756.pdf http://sdiwc.net/digital-library/a-survey-on-privacy-issues-in-digital-forensics.html https://usir.salford.ac.uk/id/eprint/34016/ https://usir.salford.ac.uk/34016/1/asurvey.pdf,http://sdiwc.net/digital-library/a-survey-on-privacy-issues-in-digital-forensics.html,,,1777986895,,0,001-135-038-170-705; 002-309-657-882-780; 005-371-287-203-15X; 009-701-742-236-493; 011-972-444-921-827; 014-299-240-901-551; 014-843-854-619-370; 021-081-859-033-024; 025-697-732-683-864; 026-641-935-890-517; 029-556-786-638-555; 033-418-529-263-94X; 035-877-258-121-493; 041-227-773-004-745; 043-424-400-377-990; 045-581-544-307-619; 049-510-490-983-722; 050-308-742-156-878; 055-171-589-229-352; 055-298-070-090-639; 062-325-585-829-185; 076-578-517-786-850; 078-308-540-254-61X; 085-438-282-926-16X; 093-551-054-279-495; 096-551-303-281-385; 101-175-825-913-864; 106-457-582-124-533; 116-992-792-378-045; 117-614-574-133-806; 128-881-441-058-633; 162-294-443-562-944; 174-154-493-004-474,47,false,,
181-649-072-258-458,Defining principles for preserving privacy in digital forensic examinations,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Graeme Horsman,"As digital devices play an increasing role in criminal investigations, where in some cases the data they contain may describe events where few other sources of information exist, there is an increasing concern regarding potential privacy invasion caused by their examination. ICO, 2020, the Information Commissioner's Office called for the greater evaluation and scrutiny of data extraction and examination processes deployed by investigating authorities with regard to smartphone data. In doing so, a light was shone on the wider issues and balancing act of maintaining data privacy whilst still allowing for an effective investigation to be conducted by law enforcement. This article proposes a set of ten Privacy-Preserving Data Processing Principles (PPDPP) for consideration by those conducting the digital forensic extraction and examination of data from a digital device. These principles define conduct that is indicative of privacy-preserving, where it is encouraged that those undertaking device investigations demonstrate evidence of adherence to the spirit of them. • The challenges of maintaining privacy whilst conducting a digital investigation are discussed. • The balancing act of carrying out effective investigations Vs. limiting intrusion is explored. • 10 Privacy-Preserving Data Processing Principles (PPDPP) for digital forensic examinations are offered.",40,,301350,301350,Scrutiny; Limiting; Computer science; Internet privacy; Law enforcement; Computer security; Digital forensics; Intrusion; Information privacy; Data extraction; Digital evidence; Privacy policy; Digital data; Enforcement; Law; Political science; Engineering; Data transmission; Mechanical engineering; Computer network; Geochemistry; MEDLINE; Geology,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301350,,10.1016/j.fsidi.2022.301350,,,0,006-138-917-123-177; 010-963-610-208-920; 016-526-859-340-786; 032-451-540-235-796; 045-581-544-307-619; 053-514-971-073-351; 061-269-967-405-492; 062-137-637-964-947; 102-243-142-344-71X; 114-090-829-194-843,1,true,,bronze
182-664-038-879-615,Methods for forgery detection in digital forensics,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Punam Sunil Raskar; Sanjeevani Kiran Shah,,13,5,528,528,Computer science; Digital forensics; Computer forensics; Computer security; Digital evidence; Cybercrime; Data science,,,,,,http://dx.doi.org/10.1504/ijesdf.2021.117310,,10.1504/ijesdf.2021.117310,,,0,,0,false,,
182-757-173-672-636,Smart Digital Forensic Readiness Model for Shadow IoT Devices,2022-01-12,2022,journal article,Applied Sciences,20763417,MDPI AG,,Funmilola Ikeolu Fagbola; Hein S. Venter,"Internet of Things (IoT) is the network of physical objects for communication and data sharing. However, these devices can become shadow IoT devices when they connect to an existing network without the knowledge of the organization’s Information Technology team. More often than not, when shadow devices connect to a network, their inherent vulnerabilities are easily exploited by an adversary and all traces are removed after the attack or criminal activity. Hence, shadow connections pose a challenge for both security and forensic investigations. In this respect, a forensic readiness model for shadow device-inclusive networks is sorely needed for the purposes of forensic evidence gathering and preparedness, should a security or privacy breach occur. However, the hidden nature of shadow IoT devices does not facilitate the effective adoption of the most conventional digital and IoT forensic methods for capturing and preserving potential forensic evidence that might emanate from shadow devices in a network. Therefore, this paper aims to develop a conceptual model for smart digital forensic readiness of organizations with shadow IoT devices. This model will serve as a prototype for IoT device identification, IoT device monitoring, as well as digital potential evidence capturing and preservation for forensic readiness.",12,2,730,730,Shadow (psychology); Digital forensics; Computer science; Computer security; Internet of Things; Digital evidence; Identification (biology); Adversary; Network forensics; Data science,,,,,,http://dx.doi.org/10.3390/app12020730,,10.3390/app12020730,,,0,007-394-596-774-68X; 008-782-115-725-766; 010-056-989-204-596; 016-526-859-340-786; 018-203-874-457-567; 025-484-846-284-184; 030-049-554-857-766; 030-467-408-846-630; 033-988-523-544-139; 034-940-557-037-083; 045-098-715-794-977; 069-321-740-091-392; 071-286-450-911-218; 098-597-156-681-069; 099-237-242-218-916; 114-116-684-871-032; 144-332-771-355-17X; 166-496-298-791-206,5,true,cc-by,gold
182-962-693-791-500,A generalized approach to automotive forensics,,2021,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Kevin Klaus Gomez Buquerin; Christopher Corbett; Hans-Joachim Hof,"Abstract In the past years, software became an essential topic in modern vehicles, e.g., with the rise of more and more complex driver assistance systems. The advent of automated driving will drive this trend even further. Today, accident investigation, as well as warranty claim analysis, need to take into consideration an analysis of the rapidly increasing proportion of software and security based implementations as part of modern vehicles, the so-called digital forensics. This paper evaluates the general feasibility of digital forensics on a state-of-the-art vehicle. To do so, we analyzed current digital forensics techniques on a state-of-the-art vehicle to constitute gaps in the automotive forensics process used on in-vehicle systems. We present a general process for automotive forensics to close existing gaps and implemented it on a state-of-the-art vehicle in an in-vehicle device manipulation scenario. The implementation uses the on-board diagnostics interface, the diagnostics over internet protocol, as well as the unified diagnostic services for communication. Our implementation requires automotive Ethernet at the diagnostic interface. Our research shows future directions for efficient automotive forensic as well as the exemplary feasibility of automotive forensic analysis on state-of-the-art vehicles without the need for additional in-vehicle components such as intrusion detection systems or event data recorders.",36,,301111,,Interface (computing); Systems engineering; Implementation; Software; Intrusion detection system; Computer science; Process (engineering); Automotive industry; Digital forensics; Advanced driver assistance systems,,,,,https://www.sciencedirect.com/science/article/pii/S2666281721000056 https://dfrws.org/wp-content/uploads/2021/08/2021_EU_paper-a_generalized_approach_to_automotive_forensics.pdf https://dfrws.org/presentation/a-generalized-approach-to-automotive-forensics/,http://dx.doi.org/10.1016/j.fsidi.2021.301111,,10.1016/j.fsidi.2021.301111,3138203095,,0,004-902-840-417-30X; 005-899-402-239-840; 024-846-790-183-200; 056-136-854-556-542; 058-156-586-882-704; 061-579-640-433-241; 098-748-261-333-651; 101-524-637-170-787; 112-810-718-627-378; 113-275-562-703-091; 124-724-491-020-815; 131-190-659-305-284; 133-680-557-338-223; 154-726-837-554-003; 158-761-508-726-627; 164-237-361-721-835; 176-677-801-635-928; 180-201-633-247-977; 196-559-417-455-648,2,true,cc-by-nc-nd,hybrid
183-680-361-426-436,A Secure Information Transmission Protocol for Healthcare Cyber Based on Quantum Image Expansion and Grover Search Algorithm,,2022,journal article,IEEE Transactions on Network Science and Engineering,23274697; 2334329x,Institute of Electrical and Electronics Engineers (IEEE),,Zhiguo Qu; Hanrong Sun,,,,1,13,,,,,"National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National Natural Science Foundation of China; Natural Science Foundation of Jiangsu Province; Sichuan Youth Science and Technique Foundation; Open Foundation of State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications",,http://dx.doi.org/10.1109/tnse.2022.3187861,,10.1109/tnse.2022.3187861,,,0,,0,false,,
184-069-302-229-82X,Methods and Tools of Digital Triage in Forensic Context: Survey and Future Directions,2017-03-28,2017,journal article,Symmetry,20738994,MDPI AG,Switzerland,Vacius Jusas; Darius Birvinskas; Elvar Gahramanov,"Digital triage is the first investigative step of the forensic examination. The digital triage comes in two forms, live triage and post-mortem triage. The primary goal of the live triage is a rapid extraction of an intelligence from the potential sources. The live triage raises legitimate concerns. The post-mortem triage is conducted in the laboratory and its main goal is ranking of the seized devices for the possible existence of the relevant evidence. The digital triage has the potential to quickly identify items that are likely to contain the evidential data. Therefore, it is a solution to the problem of case backlogs. However, existing methods and tools of the digital triage have limitations, especially, in the forensic context. Nevertheless, we have no better solution for the time being. In this paper, we critically review published research works and the proposed solutions for digital triage. The review is divided into four sections as follows: live triage, post-mortem triage, mobile device triage, and triage tools. We conclude that many challenges are awaiting for the developers in creating methods and tools of digital triage in order to keep pace with the development of new technologies.",9,4,49,,Mobile device; Ranking; Emerging technologies; Data science; Triage; Pace; Context (language use); Forensic examination; Computer security; Computer science; Digital forensics,,,,,https://dblp.uni-trier.de/db/journals/symmetry/symmetry9.html#JusasBG17 https://doi.org/10.3390/sym9040049 https://www.mdpi.com/2073-8994/9/4/49 https://www.mdpi.com/2073-8994/9/4/49/pdf https://core.ac.uk/download/80047889.pdf,http://dx.doi.org/10.3390/sym9040049,,10.3390/sym9040049,2604064983,,0,000-750-047-594-348; 003-982-227-180-136; 004-962-084-085-761; 005-169-707-018-083; 009-885-874-541-907; 010-985-077-415-59X; 011-006-176-487-462; 012-089-942-653-099; 014-514-641-367-15X; 016-731-888-079-073; 016-873-099-383-893; 018-447-058-666-847; 025-290-159-757-335; 027-658-395-615-692; 030-351-009-711-953; 031-522-316-310-252; 032-451-540-235-796; 034-008-964-356-002; 042-409-013-562-238; 042-767-661-429-064; 047-630-600-014-492; 049-896-268-388-337; 056-715-378-869-201; 058-052-081-943-595; 061-869-577-104-546; 066-078-012-998-723; 066-235-037-082-291; 075-148-096-695-582; 076-020-683-409-265; 078-995-601-408-182; 081-447-017-308-327; 087-950-081-760-226; 089-115-596-397-298; 089-212-328-523-934; 090-752-043-508-733; 092-237-744-940-330; 094-295-279-676-447; 096-685-107-801-738; 109-749-496-799-933; 125-939-677-745-616; 126-591-597-706-715; 128-940-875-499-986; 130-778-270-601-465; 131-516-331-360-906; 131-796-930-292-035; 136-224-445-947-796; 142-884-607-464-932; 150-305-598-712-279; 155-063-496-030-974; 155-226-042-989-551; 166-178-398-716-39X; 168-211-791-741-422; 170-238-670-627-975,17,true,cc-by,gold
184-298-619-472-94X,Research and Development of Digital Forensics Platforms,,2012,journal article,Journal of Shanghai Jiaotong University,0411972x,,,Yang Chung-huang,"Number of cyber crime increases dramatically these days and there are rapid progress on computer and smartphone systems,therefore,forensic investigators have been facing the difficulty of admissibility of digital evidence.To solve this problem,this paper developed forensic techniques and tools to collect digital evidence for computer systems and Android mobile devices.Forensics were carried out on both Windows and Linux systems to ensure judicial review of the evidence on the effectiveness of digital evidence with credibility.",,,,,Engineering; Credibility; Digital evidence; Cyber crime; Computer security; Judicial review; Network forensics; Computer forensics; Android (operating system); Digital forensics,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SHJT201202019.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SHJT201202019.htm,,,2377639714,,0,,2,false,,
184-546-625-187-133,Generic Digital Forensic Business Model – Malaysian Case Study,2018-05-21,2018,journal article,International Journal of Innovative Computing,21804370,Penerbit UTM Press,,Nurul Haswani Saiman; Mazura Mat Din,"Rapid development of cyberspace has created a healthy competition in the creation of computer systems and other devices. The impact of these developments is that cyber threats had caused hectic in digital security area and its reliability to be the trusted system in the industry. Therefore, in order resolve the problem, many countries began developing their own procedures for investigating cyber-related cases based on their own law and regulations and it when the term of digital forensic take place. Researchers began to provide the best definition of each potential element that said as can be a structure in the digital forensic. On other part, the preparations of designing the investigation procedures were based on various designs. In this research, modified investigative procedures are centered on the Malaysian Chief Government Security Office (MCGSO) as a central authority providing advisory services in the field of physical security, document security, personnel security and ICT security. The comparison between approaches had been made where it cover two (2) approaches namely framework and business model. Based on the survey that been made within the organization, selection of design and framework for digital forensic for this organization is based on the business model in general and the Digital Forensic Business Model in particular and it will link together with the general elements and components of digital forensic.",8,1,,,Engineering management; Government; Physical security; Digital security; Cyberspace; Trusted system; Computer science; Business model; Information and Communications Technology; Digital forensics,,,,,https://ijic.utm.my/index.php/ijic/article/view/160 http://eprints.utm.my/id/eprint/82198/,http://dx.doi.org/10.11113/ijic.v8n1.160,,10.11113/ijic.v8n1.160,2805077520,,0,,2,true,,bronze
185-798-265-234-254,Forensic Investigation Technique on Android’s Blackberry Messenger using NISTFramework,,2017,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),," Riadi; Arizona Firdonsyah Sunardi",,6,4,198,205,World Wide Web; Computer science; Multimedia; Wireless; Android (operating system),,,,,http://sdiwc.net/digital-library/forensic-investigation-technique-on-androids-blackberry-messenger-using-nistframework,http://dx.doi.org/10.17781/p002306,,10.17781/p002306,2766809087,,0,,12,false,,
185-892-083-398-013,Digital Forensics: Where Are We?,2020-09-21,2020,journal article,International Journal of Forensic Research,27672972,Opast Group LLC,,,"Digital Foensics is a branch of Forensic Sciences that involves the recovery of materials in digital devices, e.g. computers, mobile phones and storage devices. Fast and continuous advances in digital techniques and devices are happening. On the other hand, the forensic tools to track these technologies are short lagged. This mini-review discusses the issue and its consequences and recommendations for covering the gap between the two.",1,1,,,Digital forensics; Mobile device; Computer science; Digital evidence; Computer forensics; Computer security; Data science,,,,,,http://dx.doi.org/10.33140/ijfr.01.01.10,,10.33140/ijfr.01.01.10,,,0,,1,true,,bronze
186-940-557-741-427,Forensics chain for evidence preservation system: An evidence preservation forensics framework for internet of things‐based smart city security using blockchain,2022-05-20,2022,journal article,Concurrency and Computation: Practice and Experience,15320626; 15320634,Wiley,United States,Randa Kamal; Ezz El‐Din Hemdan; Nawal El‐Fishway,"In recent times, the new revolution of IoT facilitates communication and information sharing among people in different domains like a smart city. This revolution came with a risk of cyber-attacks that target devices and shared data. The digital evidence resulting from the digital forensics process applied to IoT devices must be kept safe for later analysis. Preserving digital evidence on a centralized server raises the risk of a single point of failure. Evidence preserving on cloud servers raises the tampering risk with the evidence or even sharing them with malicious third parties. Therefore, this paper presents a novel framework called Forensics Chain for Evidence Preservation System for IoT-based smart city security. The proposed framework aims to integrate blockchain with digital forensics to overcome the problems faced by forensic investigators; single point of failure and/or evidence modifications and enhance the security of preserving digital evidence via applying blockchain. Applying blockchain guarantees the immutability and data integrity of the preserved evidence. Furthermore, preserving the digital evidence among the forensic participant nodes eliminates the possibility of the single-point failure of a centralized storage server. The results provided a Proof of Concept for forensic evidence preservation based on blockchain and evaluated its performance.",34,21,,,Blockchain; Internet of Things; Network forensics; Computer security; Computer science; The Internet; Internet privacy; Digital forensics; World Wide Web,,,,,,http://dx.doi.org/10.1002/cpe.7062,,10.1002/cpe.7062,,,0,010-284-227-477-250; 012-199-054-127-602; 014-448-058-704-128; 015-973-222-946-009; 017-843-938-494-981; 026-698-451-512-277; 029-610-096-288-863; 032-169-069-596-979; 041-749-004-943-703; 044-247-442-262-35X; 050-244-001-533-04X; 054-079-583-763-10X; 055-498-537-115-235; 082-403-932-515-639; 083-888-956-568-609; 089-419-984-563-123; 101-258-932-366-249; 131-581-925-248-197; 132-746-973-839-652; 132-810-780-767-932; 154-393-793-915-985,0,false,,
186-989-428-380-116,Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness,2022-07-26,2022,journal article,Advances in Multidisciplinary and scientific Research Journal Publication,24888699,Creative Research Publishers,,Jonas Takyi Asamoah,"The usage of digital technology in the digital forensic investigation has grown in tandem with the rising importance of technology today. Too many incidences of digital and physical crime which is the focus of the world nowadays. To gather the finest evidence and investigative outcomes, a digital forensic model must be established. This study included a review of the literature on digital forensics and models established in digital forensics. According to the findings, the majority of research involves broad inquiries and procedures that overlap. Furthermore, no model has been developed to design a systemic inquiry. In this study, we propose a methodology for digital forensic examination to address this issue. This model combines several of the previous models and adds some new variables that are relevant to the study. Keywords: Due Diligence, Threats, Forensic Analysis, Preparation, Readiness, Cyber Security, BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Jonas Takyi Asamoah (2022): Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 307-314 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P49",1,,307,314,Digital forensics; Digital evidence; Nexus (standard); Due diligence; Computer forensics; Computer security; Computer science; Data science; Internet privacy,,,,,,http://dx.doi.org/10.22624/aims/crp-bk3-p49,,10.22624/aims/crp-bk3-p49,,,0,,0,true,,bronze
187-108-280-798-543,WhatsApp Messenger Forensic Analysis Based on Android Using Text Mining Method,,2018,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,The Society of Digital Information and Wireless Communications (SDIWC),,Anang Marfianto; Riadi,,7,3,319,327,World Wide Web; Computer science; Wireless; Android (operating system); Text mining,,,,,http://sdiwc.net/digital-library/whatsapp-messenger-forensic-analysis-based-on-android-using-text-mining-method,http://dx.doi.org/10.17781/p002470,,10.17781/p002470,2887363464,,0,,6,false,,
187-733-044-298-76X,What is Digital Forensics?,2022-05-12,2022,journal article,ITNOW,17465702; 17465710,Oxford University Press (OUP),United Kingdom,Shahrzad Zargari,"Abstract; The definition of digital forensics is the process of uncovering and interpreting electronic data for use in a court of law, writes Shahrzad Zargari, Senior Lecturer and Course Leader in Cybersecurity with Forensics, after recently hosting the BCS webinar, Digital Forensics 101.",64,2,46,47,Digital forensics; Computer forensics; Computer security; Computer science; Network forensics; Process (computing); Digital evidence,,,,,,http://dx.doi.org/10.1093/itnow/bwac055,,10.1093/itnow/bwac055,,,0,,0,false,,
187-947-933-345-849,Disposable Virtual Machines and Challenges to Digital Forensics Investigation,,2021,journal article,International Journal of Advanced Computer Science and Applications,21565570; 2158107x,The Science and Information Organization,,Ahmad Alisher; Mohammed Yousuf Uddin; Mohammad Mazhar Afzal,"Digital forensics field faces new challenges with emerging technologies. Virtualization is one of the significant challenges in the field of digital forensics. Virtual Machines (VM) have many advantages either it be an optimum utilization of hardware resources or cost saving for organizations. Traditional forensics’ tools are not competent enough to analyze the virtual machines as they only support for physical machines, to overcome this challenge Virtual Machine Introspection technologies were developed to perform forensic investigation of virtual machines. Until now, we were dealing with persistent virtual machines; these are created once and used many times. We have extreme version of virtual machine and that is disposable virtual machine. However, the disposable virtual machine once created and are used one time, it vanish from the system without leaving behind any significant traces or artifacts for digital investigator. The purpose of this paper is to discuss various disposable virtualization technologies available and challenges posed by them on the digital forensics investigation process and provided some future directions to overcome these challenges.",12,2,,,Emerging technologies; Virtual machine; Virtual machine introspection; Qubes; Field (computer science); Computer science; Process (engineering); Multimedia; Virtualization; Digital forensics,,,,,https://thesai.org/Downloads/Volume12No2/Paper_99-Disposable_Virtual_Machines_and_Challenges.pdf https://thesai.org/Publications/ViewPaper?Volume=12&Issue=2&Code=IJACSA&SerialNo=99 https://repository.psau.edu.sa/xmlui/handle/123456789/1561178,http://dx.doi.org/10.14569/ijacsa.2021.0120299,,10.14569/ijacsa.2021.0120299,3134892529,,0,003-480-534-241-322; 019-698-064-288-240; 029-069-214-346-997; 052-337-723-472-520; 073-129-712-116-200; 074-022-824-976-957; 086-161-291-588-657; 132-593-656-855-005; 133-397-275-695-990,0,true,cc-by,gold
189-547-854-321-849,Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Jewan Bang; Jungheum Park; Sangjin Lee,"It is increasingly becoming difficult to acquire meaningful information in the field of digital forensics through the traditional approach owing to advances in information security and anti-forensics techniques. To counteract anonymous services such as data in remote areas without authentication information, data encryption, device locks, and cryptocurrencies, it is important to acquire key information through live forensics at search and seizure sites. Thus, it is necessary to establish a response system that explores and processes credential information on site and extracts meaningful information based on the processed information. To this end, this study proposes a new digital forensics framework for application at search and seizure sites. The proposed framework is designed to allow expansion in the form of additional functions on account of a module type development for the system even when new services and digital devices appear in the future. We then explain its applicability through case studies of actual digital investigations. • This work proposes a framework for live system forensics at search and seizure sites. • Procedures and techniques to accessing password-protected resources are explored. • A tool is designed and implemented based on the proposed framework. • Three actual cases are described for demonstrating the proposal's usefulness.",40,,301376,301376,Computer science; Digital forensics; Credential; Password; Digital evidence; Computer security; Authentication (law); Key (lock); Encryption; Password cracking; Field (mathematics); World Wide Web,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301376,,10.1016/j.fsidi.2022.301376,,,0,010-985-077-415-59X; 037-711-093-033-550; 041-277-806-049-882; 042-793-944-798-15X; 063-084-969-285-764; 140-344-223-660-774,0,true,,bronze
189-977-135-419-911,Editorial,2012-10-23,2012,journal article,International Journal of Digital Curation,17468256,Edinburgh University Library,,Alexander Ball,"Alexander Ball, Production Editor, introduces Volume 7, Issue 2 (2012) of the International Journal of Digital Curation.",7,2,1,2,Computer science,,,,,https://core.ac.uk/download/pdf/162675731.pdf,http://dx.doi.org/10.2218/ijdc.v7i2.225,,10.2218/ijdc.v7i2.225,,,0,,0,true,cc-by,gold
189-979-945-502-249,An Enhanced Blockchain-Based IoT Digital Forensics Architecture Using Fuzzy Hash,,2021,journal article,IEEE Access,21693536,Institute of Electrical and Electronics Engineers (IEEE),United States,Wael A. Mahrous; Mahmoud Farouk; Saad M. Darwish,"Due to businesses’ growing use of IoT services in their day-to-day operations and the increased use of smart devices, digital forensic investigations involving such systems will need increasingly sophisticated digital evidence collection and processing. The majority of IoT systems are composed of disparate software and hardware components, which may pose security and privacy concerns. Recently, blockchain technology was presented as one of the options for achieving IoT security via the use of an immutable ledger, a decentralized architecture, and strong cryptographic primitives. Integrating blockchain platforms with IoT-based applications, on the other hand, poses a number of difficulties owing to the trustworthiness, integrity, and real-time responsiveness of IoT data. However, certain IoT devices may be incompatible with existing blockchain-based IoT forensic methods for additional digital evidence processing owing to their usage of conventional hash. A critical feature of cryptographic hash functions is that even if just one bit of the input is altered, the output acts pseudo-randomly, making it impossible to identify identical files. However, in the field of computer forensics, it is essential to locate comparable files (e.g., various versions of a file); therefore, we need a hash function that preserves similarity. It is getting more difficult to establish how forensic investigators might utilize traces from such devices. To effectively deal with IoT digital forensics applications, this article presents an improved blockchain-based IoT digital forensics architecture that uses the fuzzy hash to construct the Blockchain’s Merkle tree in addition to the conventional hash for authentication. Fuzzy hashing enables the identification of potentially damning documents that might otherwise remain undiscovered using conventional hashing techniques. By comparing blocks/files to all nodes in the blockchain network using fuzzy hash similarity, the digital forensics investigator will be able to verify their authenticity. To support the proof of concept, we simulated the suggested model.",9,,151327,151336,Cryptographic primitive; Authentication; Merkle tree; Digital evidence; Computer security; Computer science; Computer forensics; Cryptographic hash function; Digital forensics; Hash function,,,,,https://dblp.uni-trier.de/db/journals/access/access9.html#MahrousFD21 https://ieeexplore.ieee.org/document/9606922,http://dx.doi.org/10.1109/access.2021.3126715,,10.1109/access.2021.3126715,3213609011,,0,002-020-246-447-998; 006-138-917-123-177; 007-321-225-339-593; 008-454-749-236-945; 010-284-227-477-250; 010-458-498-389-380; 012-587-637-705-413; 013-410-561-307-525; 018-552-581-098-658; 019-912-316-692-552; 022-028-128-880-266; 022-338-684-752-242; 023-858-572-607-02X; 025-217-964-155-547; 027-096-043-528-331; 028-705-577-620-56X; 029-164-830-214-360; 030-121-862-351-330; 031-061-623-893-188; 032-456-953-732-97X; 032-725-437-508-413; 035-859-793-614-223; 036-017-549-836-946; 041-749-004-943-703; 047-125-525-662-686; 047-782-671-230-742; 055-811-656-615-740; 056-216-240-850-368; 058-156-586-882-704; 058-882-017-546-096; 060-971-363-644-947; 065-322-784-190-818; 068-520-918-599-405; 074-995-483-560-419; 077-425-502-034-153; 092-827-935-965-207; 093-801-189-809-800; 103-535-795-864-289; 105-030-249-648-537; 124-276-088-610-544; 125-682-509-275-554; 141-227-167-540-818; 148-828-929-349-306; 170-516-749-420-456,2,true,"CC BY, CC BY-NC-ND",gold
190-471-875-086-638,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,37,,301201,301201,Computer science,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00109-8,,10.1016/s2666-2817(21)00109-8,,,0,,0,true,,bronze
190-571-870-134-934,Computer forensics between the italian legislation and pragmatic questions,,2013,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Gianni Fenu; Fabrizio Solinas,"Over the last few years, analysing a computer or a digital device has become a necessity in the field of criminal investigations. However, during the forensic analysis, some ordinary mistakes are often made. The aim of this paper is to define a new approach to the problem of evidence examination, analysing and studying practical experiences of case studies within the Italian legal system concerning techniques of computer forensic and forensic data analysis. The user of this type of approaches has to guarantee efficient level of both specialized legal competences and technical skills and highly qualified technical skill in order to analyse digital systems in conformity with the best practices, and national and European regulations. In addition, although many types of software are not free and particular hardware could be adopted in this presented work, one of the main objectives has been the only use of the personal computer in order to prove the possibility to obtain the same results minimizing the costs. The cases studies have focused on computer forensic of various magnetic and optical devices (mass memory), such as hard disk, usb flash, memory and cards.",2,1,9,24,Criminal investigation; Best practice; Data science; Software; Cybercrime; Personal computer; Field (computer science); Computer security; Computer science; Computer forensics; Digital forensics,,,,,http://sdiwc.net/digital-library/computer-forensics-between-the-italian-legislation-and-pragmatic-questions https://iris.unica.it/handle/11584/91629,http://sdiwc.net/digital-library/computer-forensics-between-the-italian-legislation-and-pragmatic-questions,,,1485219111,,0,003-741-821-824-144; 004-706-447-836-905; 010-086-703-646-194; 020-944-423-224-895; 021-803-769-323-628; 023-789-485-678-544; 030-252-249-391-836; 032-697-093-668-898; 038-668-970-194-854; 047-630-600-014-492; 055-602-900-718-397; 102-822-532-339-461; 111-090-978-711-139; 124-466-422-768-986; 127-604-905-464-807; 132-355-634-397-986; 170-299-458-679-224; 184-948-841-629-735; 190-065-821-748-92X; 199-745-676-923-766,3,false,,
190-597-436-230-873,Digital forensic models: A comparative analysis,,2018,journal article,"International Journal of Management, IT, and Engineering",,,,Sudesh Rani,"With increase in new and ever evolving technologies like internet and information technology in the 21st century, the digital crimes are also increasing. the evidence of such crimes which are technology driven are in digital form and need to employ technology inclined techniques to uncover evidence that are admissible in court. Digital forensics applies digital investigation and analysis techniques to help in detection of digital crimes. Digital forensics provide the investigation techniques identification, preservation, collection, validation, analysis documentation and presentation of digital evidences. Different models have been presented to study the basics of digital forensics. Methods used for digital forensic investigation play an important role because inappropriate model choice may result in incomplete of missing evidence. In this paper we study different models. Their strengths and weaknesses and finally make a comparative study that which model is best among them.",8,6,432,443,The Internet; Information technology; Data science; Presentation; Analysis Documentation; Model choice; Computer science; Strengths and weaknesses; Identification (information); Digital forensics,,,,,https://www.indianjournals.com/ijor.aspx?target=ijor:ijmie&volume=8&issue=6&article=034,https://www.indianjournals.com/ijor.aspx?target=ijor:ijmie&volume=8&issue=6&article=034,,,3202151067,,0,000-938-884-410-192; 004-872-169-627-620; 008-047-275-222-577; 020-944-423-224-895; 032-697-093-668-898; 038-668-970-194-854; 132-355-634-397-986; 163-581-541-690-876; 190-065-821-748-92X; 199-745-676-923-766,0,false,,
191-992-698-018-836,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,37,,301257,301257,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00171-2,,10.1016/s2666-2817(21)00171-2,,,0,,0,true,,bronze
192-222-612-275-635,Turkish vowel classification based on acoustical and decompositional features optimized by Genetic Algorithm,,2019,journal article,Applied Acoustics,0003682x; 1872910x,Elsevier BV,United Kingdom,Yunus Korkmaz; Aytuğ Boyaci; Turker Tuncer,,154,,28,35,Speaker recognition; Feature selection; Formant; Zero-crossing rate; Vowel; Speech recognition; Computer science; Speech processing; Feature vector; Cepstrum,,,,,https://www.sciencedirect.com/science/article/pii/S0003682X19303573,http://dx.doi.org/10.1016/j.apacoust.2019.04.027,,10.1016/j.apacoust.2019.04.027,2941750937,,0,000-149-293-490-547; 000-802-054-480-690; 001-253-139-363-159; 018-195-105-830-630; 021-467-987-457-747; 026-152-783-597-954; 028-398-793-194-270; 037-668-105-432-321; 040-718-325-548-001; 047-321-935-280-275; 062-921-055-312-809; 074-006-036-662-535; 074-273-174-756-43X; 098-876-081-016-68X; 099-414-007-397-744; 107-742-316-418-482; 125-905-542-132-673; 131-459-589-196-658; 144-775-135-281-440; 181-376-656-550-136,8,false,,
192-955-966-543-738,Digital Forensic Trends and Future,,2013,journal article,International Journal of Cyber-Security and Digital Forensics,23050012,,,Ramlan Mahmoud; Farid Daryabar,"Nowadays, rapid evolution of computers and mobile phones has caused these devices to be used in criminal activities. Providing appropriate and sufficient security measures is a difficult job due to complexity of devices which makes investigating crimes involving these devices even harder. Digital forensic is the procedure of investigating computer crimes in the cyber world. Many researches have been done in this area to help forensic investigation to resolve existing challenges. This paper attempts to look into trends of applications of digital forensics and security at hand in various aspects and provide some estimations about future research trends in this area.",2,2,48,76,Digital transformation; Computer security; Computer science; Wireless; Computer forensics; Digital forensics,,,,,http://sdiwc.net/digital-library/digital-forensic-trends-and-future https://usir.salford.ac.uk/34014/1/digital%20forensics.pdf,http://sdiwc.net/digital-library/digital-forensic-trends-and-future,,,2325821398,,0,000-116-031-001-044; 001-067-333-050-958; 001-255-768-346-633; 001-755-455-053-419; 001-960-134-177-077; 003-021-184-147-818; 003-412-732-826-511; 004-260-804-798-107; 005-116-312-278-527; 005-296-771-590-748; 007-768-465-953-956; 007-902-133-940-280; 008-035-714-410-353; 009-832-452-035-773; 010-637-615-113-45X; 011-972-444-921-827; 014-299-240-901-551; 014-843-854-619-370; 015-055-920-643-15X; 015-264-924-343-905; 015-875-923-802-359; 016-046-803-187-724; 016-648-632-030-746; 017-709-374-060-311; 021-081-859-033-024; 026-641-935-890-517; 028-864-845-913-819; 029-556-786-638-555; 030-209-733-733-785; 030-467-474-056-880; 030-837-615-114-470; 031-053-206-482-767; 031-542-664-705-080; 032-192-641-675-455; 033-418-529-263-94X; 034-773-286-616-44X; 035-098-440-268-982; 035-480-612-079-123; 036-384-272-299-395; 036-720-465-389-565; 039-969-975-233-977; 040-062-000-006-889; 040-483-737-660-282; 042-581-004-806-995; 043-424-400-377-990; 044-452-432-963-876; 049-510-490-983-722; 051-165-387-606-715; 052-420-031-509-262; 052-425-455-819-822; 054-389-084-057-423; 054-956-509-864-828; 055-171-589-229-352; 055-210-121-952-616; 055-298-070-090-639; 056-689-263-355-386; 058-448-820-778-759; 064-484-797-196-528; 065-459-442-784-779; 066-661-875-761-631; 068-795-016-904-418; 068-897-302-908-249; 073-314-575-222-676; 073-399-840-863-155; 074-815-704-684-263; 074-926-358-202-250; 078-341-589-406-121; 084-539-519-373-345; 085-343-554-667-033; 085-438-282-926-16X; 087-822-595-959-826; 088-424-276-289-442; 090-908-568-187-870; 091-848-747-540-654; 092-050-206-285-789; 092-656-354-398-685; 093-372-732-871-479; 094-135-298-524-825; 094-936-739-708-890; 095-676-928-467-342; 095-748-218-155-627; 098-825-093-704-930; 107-218-961-146-992; 108-520-189-704-445; 112-043-085-982-411; 116-992-792-378-045; 117-614-574-133-806; 119-001-475-681-576; 127-387-421-016-487; 128-881-441-058-633; 130-324-491-638-054; 130-547-183-065-459; 139-495-561-188-858; 140-572-617-723-277; 142-729-737-144-734; 145-505-603-683-704; 147-457-693-761-284; 150-249-549-372-358; 150-327-843-369-29X; 150-968-572-984-716; 151-061-311-529-230; 156-925-993-816-946; 160-104-273-869-923; 163-661-153-365-182; 163-843-472-725-971; 170-801-816-294-529; 171-483-137-477-150; 174-154-493-004-474; 176-489-122-876-73X; 179-236-922-448-665; 181-095-475-426-346; 184-176-512-492-048; 186-019-966-947-987; 187-686-058-593-955; 195-136-336-597-694,32,false,,
193-055-388-536-239,Special Issue of Best Papers from the 11th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE 2016),,2017,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,,,,,,,Forensic science; Digital forensics; Engineering ethics; Engineering; Library science; Computer science; History; Computer security; Archaeology,,,,,,http://dx.doi.org/10.15394/jdfsl.2017.1443,,10.15394/jdfsl.2017.1443,,,0,,0,true,cc-by-nc,gold
193-815-688-276-212,Cyber Crime Forensics,2022-05-30,2022,journal article,International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence,27910164,Publishing House International Enterprise,,Saad Subair; Derar Yosif; Abdelgader Ahmed; Christopher Thron,"Cyber crime is becoming more frequent in our daily life since computers are everywhere now and hence the term cyberspace is becoming our ordinary life. Digital forensics or computer forensics which the process of securing digital evidence against the crime is becoming inevitable. Digital evidence is the foundation for any digital forensic investigation that can be collected by several means using technologies and scientific crime scene investigation. Modifications with crime scene data may possibly change the evidences that may lead to different investigation results. Several models and frameworks to help investigating cybercrimes have been proposed. In this paper we are proposing a frame work that to suit the Sudanese judiciary system. The framework suggested studied several models and frameworks in the globe to come out with a suitable framework model that can help the Sudanese courts taking their decisions concerning cybercrime. The conventional chain of custody is our main platform to construct our framework. That is due to fact that computer crime is different from conventional crime in that it may have no definite place or space. Although The share of people in computer crime is more crucial than the technology itself, achieving evidence integrity is more challenging than normal crimes. This work aims to study and evaluate the applicability of existing digital forensic process models to the Sudanese environment, analyze each of these frameworks might and then construct a framework to Sudan courts.",1,1,41,49,Cyberspace; Construct (python library); Digital forensics; Computer forensics; Cybercrime; Computer science; Process (computing); Computer security; Globe; Digital evidence; Cyber crime; Crime scene; Frame (networking); Work (physics); Data science; Internet privacy,,,,,,http://dx.doi.org/10.54938/ijemdcsai.2022.01.1.37,,10.54938/ijemdcsai.2022.01.1.37,,,0,,0,true,,hybrid
194-646-821-795-161,An improved forensic-by-design framework for cloud computing with systems engineering standard compliance,,2022,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,Abdellah Akilal; M-Tahar Kechadi,"“Forensic-by-design” is an emergent and ambitious paradigm that extends the Digital Forensic Readiness (DFR) perspective. Similar to Security-by-design, this new vision advocates the integration of Forensic requirements into the system's design and development stages to get “Forensic-ready” systems. While it seems promising, we hypothesize that: (a) this new alternative is not effective for some open boundaries systems, and (b) this strategy is not fully aligned with the Systems and software Engineering (SE) standards. A six phases research methodology based on systematic literature review, mapping, and analysis was adopted. Our results confirm indeed the stated hypothesis, identify missing key factors, and point out potential omissions. A new System and software Engineering driven Forensic-by-design framework, with an emphasis on Cloud computing systems, is therefore proposed. • “Forensic-by-design” can be seen as an adversarial shift in Digital Forensic Readiness (DFR). • “Forensic-by-design” is more suited to closed boundaries systems and suffers from multiple insufficiencies. • The proposed framework remedy to the observed limits and is compliant with the systems and software engineering standards. • The proposed framework aims to integrate security, privacy, and resiliency requirements into systems design and development.",40,,301315,301315,Computer science; Digital forensics; Cloud computing; Adversarial system; Requirements engineering; Software engineering; Key (lock); Security engineering; Software; Data science; Computer security; Systems engineering,,,,,,http://dx.doi.org/10.1016/j.fsidi.2021.301315,,10.1016/j.fsidi.2021.301315,,,0,000-566-000-503-971; 002-383-410-319-043; 005-800-655-385-595; 008-358-741-185-610; 008-437-429-472-135; 014-558-090-827-619; 018-948-094-812-86X; 022-991-306-740-078; 024-462-843-796-80X; 030-858-457-088-176; 039-756-277-761-714; 043-826-131-546-638; 044-982-723-456-135; 045-273-682-926-448; 046-357-391-782-442; 049-337-278-368-275; 050-304-428-383-118; 054-626-009-006-964; 060-874-727-746-537; 076-889-170-335-628; 080-029-349-030-650; 082-793-334-095-933; 090-980-715-883-62X; 091-540-399-535-662; 091-619-263-117-914; 092-121-205-176-412; 107-272-816-064-541; 120-361-603-676-195; 120-848-133-769-462; 124-837-341-752-034; 124-912-663-881-389; 130-150-403-430-724; 132-342-259-584-364; 138-518-998-385-929; 151-944-242-677-668,1,true,,bronze
195-616-478-575-653,Digital forensics in private Seafile cloud storage from both client and server side,,2021,journal article,International Journal of Electronic Security and Digital Forensics,1751911x; 17519128,Inderscience Publishers,United Kingdom,Asgarali Bouyer; Mojtaba Zirak,,13,3,233,233,Computer science; Client-side; Cloud storage; Cloud computing; Computer security; Server-side; Digital forensics; Side channel attack; World Wide Web; Internet privacy; Digital evidence; Digital storage; Operating system; Database,,,,,,http://dx.doi.org/10.1504/ijesdf.2021.114954,,10.1504/ijesdf.2021.114954,,,0,,0,false,,
198-188-537-910-708,Distance Learning in Forensic Nursing: The Lived Educational Experience,2017-09-13,2017,journal article,Journal of Forensic Sciences and Digital Investigation,,Northern California Open Access Publications,,,,,,18,26,Lived experience; Forensic nursing; Forensic science; Psychology; Nursing; Medical education; Medicine; Psychoanalysis; Veterinary medicine,,,,,,http://dx.doi.org/10.29199/fsdi.101015,,10.29199/fsdi.101015,,,0,,0,true,cc-by,hybrid
198-480-779-430-174,Radio-morphometric Analysis of Sella Turcica in the South Indian Population: A Digital Cephalometric Study,2017-06-15,2017,journal article,Arab Journal of Forensic Sciences and Forensic Medicine,16586786; 16586794,Naif Arab University for Security Sciences,,,,1,5,,,Sella turcica; Orthodontics; Cephalometric analysis; Population; Geography; Anatomy; Medicine; Environmental health,,,,,,http://dx.doi.org/10.26735/16586794.2017.019,,10.26735/16586794.2017.019,,,0,,1,true,cc-by-nc,gold
198-534-899-847-91X,Prelim i - Editorial Board,,2021,journal article,Forensic Science International: Digital Investigation,26662817; 26662825,Elsevier BV,,,,38,,301277,301277,Editorial board,,,,,,http://dx.doi.org/10.1016/s2666-2817(21)00195-5,,10.1016/s2666-2817(21)00195-5,,,0,,0,true,,bronze
199-320-642-531-170,Alt-tech social forensics: Forensic analysis of alternative social networking applications,,2022,journal article,Forensic Science International: Digital Investigation,26662817,Elsevier BV,,Hailey Johnson; Karl Volk; Robert Serafin; Cinthya Grajeda; Ibrahim Baggili,,42,,301406,,,,,,,,http://dx.doi.org/10.1016/j.fsidi.2022.301406,,10.1016/j.fsidi.2022.301406,,,0,003-504-554-245-316; 008-667-688-301-190; 008-855-420-001-822; 020-405-975-217-252; 039-999-270-718-277; 042-746-308-855-318; 049-131-797-799-081; 072-302-303-718-198; 085-317-975-978-471; 089-038-694-381-605,0,false,,