Journal articles on the topic 'Data forensics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data forensics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Adzogbley, Amenuveve Gracious. "Storing Forensic Data Against Interference." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 7–14. http://dx.doi.org/10.22624/aims/crp-bk3-p2.
Full textImeri Saiti, Deshira, Mentor Hamiti, and Jehona Asani. "Handling Data Security in Education." International Journal of Education & Well-Being 2, no. 2 (2024): 108–22. https://doi.org/10.62416/ijwb-41.
Full textResearcher. "THE ROLE OF CLOUD-BASED TOOLS IN MODERN CYBERCRIME INVESTIGATIONS: INSIGHTS FROM A RANSOMWARE CASE STUDY." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 267–77. https://doi.org/10.5281/zenodo.13819547.
Full textTasmi, Tasmi, Fery Antony, and Ubaidillah Ubaidillah. "NETWORK FORENSIK UNTUK MENGANALISA TRAFIK DATA GAME ONLINE." Klik - Jurnal Ilmu Komputer 3, no. 1 (2022): 50–58. http://dx.doi.org/10.56869/klik.v3i1.352.
Full textEl Majdoub, Asmae, Chaimae Saadi, and Habiba Chaoui. "Mobile Forensics Data Acquisition." ITM Web of Conferences 46 (2022): 02006. http://dx.doi.org/10.1051/itmconf/20224602006.
Full textP A, Safuwan Ali, and Kavitha R. "Unraveling Cyber Threats: The Role of Forensic Investigation in Cyber Security." International Journal of Multidisciplinary Research in Science, Engineering and Technology 7, no. 05 (2024): 10258–60. http://dx.doi.org/10.15680/ijmrset.2024.0705108.
Full textLim, Michelle Chee Ern, Brandon Hong Chow Chen, Le Ying Lim, et al. "Analysis of Forensic Disk Imaging Tools for Data Acquisition and Preservation." Journal of Informatics and Web Engineering 4, no. 2 (2025): 158–81. https://doi.org/10.33093/jiwe.2025.4.2.11.
Full textSingh, Sakshi, and Suresh Kumar. "Qualitative Assessment of Digital Forensic Tools." Asian Journal of Electrical Sciences 9, no. 1 (2020): 25–32. http://dx.doi.org/10.51983/ajes-2020.9.1.2372.
Full textHamed, Abdul Sallam Said. "Digital Forensic: Techniques, Challenges, and Future Direction." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 5869–73. https://doi.org/10.22214/ijraset.2025.71562.
Full textAlshabibi, Munirah Maher, Alanood Khaled Bu dookhi, and M. M. Hafizur Rahman. "Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review." Computers 13, no. 8 (2024): 213. http://dx.doi.org/10.3390/computers13080213.
Full textPremanand Narasimhan and Dr. N. Kala. "Emerging Trends in Digital Forensics : Investigating Cybercrime." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3645–52. https://doi.org/10.32628/cseit251451.
Full textSutikno, Tole. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology (IJ-ICT) 13, no. 2 (2024): 321. http://dx.doi.org/10.11591/ijict.v13i2.pp321-332.
Full textTole, Sutikno. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology 13, no. 2 (2024): 321–32. https://doi.org/10.11591/ijict.v13i2.pp321-332.
Full textVatsenko, A. "Digital Forensics Techniques Overview." Bulletin of Science and Practice 6, no. 6 (2020): 167–74. http://dx.doi.org/10.33619/2414-2948/55/21.
Full textBerghel, Hal. "Hiding data, forensics, and anti-forensics." Communications of the ACM 50, no. 4 (2007): 15–20. http://dx.doi.org/10.1145/1232743.1232761.
Full textKenneth, Chukwujekwu Nwafor, Zziwa Ivan, O. T. Ihenacho Daniel, and J. Adeyeye Oladele. "Innovative approaches in complex data forensics: error rate assessment and its impact on cybersecurity." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 1772–92. https://doi.org/10.5281/zenodo.15045230.
Full textHuang, Yitai. "Application of Digital Forensics in Cybercrime Investigations." Applied and Computational Engineering 151, no. 1 (2025): 69–74. https://doi.org/10.54254/2755-2721/2025.22847.
Full textKaleem, Hassan, and Ijaz Ahmed. "Cloud Forensics: Challenges and Solutions (Blockchain Based Solutions)." Innovative Computing Review 1, no. 2 (2021): 1–26. http://dx.doi.org/10.32350/icr.0102.01.
Full textMaulina, Sinta Nur, Niken Dwi Wahyu Cahyani, and Erwid Musthofa Jadied. "ANALYSIS OF THE EFFECT OF VSM ON THE MEMORY ACQUISITION PROCESS USING THE DYNAMIC ANALYSIS METHOD." JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 8, no. 2 (2023): 638–46. http://dx.doi.org/10.29100/jipi.v8i2.3745.
Full textDr., J. Saravanesh. "RETROSPECTIVE VIEW OF DIGITAL FORENSIC PROCESS EMPHASISING COMPUTER FORENSICS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 5 (2019): 509–15. https://doi.org/10.5281/zenodo.3234978.
Full textBaafi, Peter Oppong. "Tools For Cyber Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 285–90. http://dx.doi.org/10.22624/aims/crp-bk3-p46.
Full textSoni, Nishchal. "IoT forensics: Challenges, methodologies, and future directions in securing the Internet of Things ecosystem." Computer and Telecommunication Engineering 2, no. 4 (2024): 3070. https://doi.org/10.54517/cte3070.
Full textHani Roslee, Nurul Adhlina, and Nurul Hidayah Bt Ab Rahman. "A Visualization Approach to Analyze Android Smartphone Data." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (2018): 184. http://dx.doi.org/10.30630/joiv.2.3-2.137.
Full textSutikno, Tole, and Iqbal Busthomi. "Capabilities of cellebrite universal forensics extraction device in mobile device forensics." Computer Science and Information Technologies 5, no. 3 (2024): 254–64. http://dx.doi.org/10.11591/csit.v5i3.p254-264.
Full textTole, Sutikno, and Busthomi Iqbal. "Capabilities of cellebrite universal forensics extraction device in mobile device forensics." Computer Science and Information Technologies 5, no. 3 (2024): 254–64. https://doi.org/10.11591/csit.v5i3.pp254-264.
Full textAdinata, Ivan, and Yustian Servanda. "Kajian Literatur: Metode Analisis dan Tools Live Forensics Pada Random Access Memory (RAM)." Jurnal Sains dan Teknologi (JSIT) 4, no. 2 (2024): 175–80. http://dx.doi.org/10.47233/jsit.v4i2.1760.
Full textMicah, Ezekiel Elton Mike, Ibrahim Halidu Saidu, Taiwo Ibitomi, and Bello Sambo Sanusi. "Digital Forensics in the Era of Cybercrime: Emerging Trends and Challenges for Forensic Accountants in Nigeria." European Journal of Accounting, Auditing and Finance Research 11, no. 9 (2023): 85–100. http://dx.doi.org/10.37745/ejaafr.2013/vol11n985100.
Full textMantiri, Astria Santa Natalia, and Elvis Sumanti. "THE ROLE OF DIGITAL FORENSICS IN THE PRELIMINARY INVESTIGATION." Klabat Accounting Review 3, no. 1 (2022): 79. http://dx.doi.org/10.60090/kar.v3i1.821.79-95.
Full textSaragih, Naikson, Ridho Agus Wery Nanda Panjaitan, and Mufria Jonatan Purba. "FORENSIC NETWORK ANALYSIS AND IMPLEMENTATION OF SECURITY ATTACKS ON VIRTUAL PRIVATE SERVERS." Jurnal Sistem Informasi dan Ilmu Komputer Prima(JUSIKOM PRIMA) 6, no. 2 (2023): 28–34. http://dx.doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932.
Full textGyimah, Seth Adjei. "X-Ways Forensics Platform For Digital Forensics Examiners." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 353–56. http://dx.doi.org/10.22624/aims/crp-bk3-p56.
Full textFaiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.
Full textZeng, Gang. "Data Handling of Digital Forensics Cloud Computing." Advanced Materials Research 756-759 (September 2013): 1739–43. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1739.
Full textZhang, Guan Zhu. "Computer Forensics Based on Data Mining." Applied Mechanics and Materials 536-537 (April 2014): 371–75. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.371.
Full textRamadhani, Erika. "A bibliometrics analysis of multimedia forensics and deep learning research based on Scopus index." JITSI : Jurnal Ilmiah Teknologi Sistem Informasi 4, no. 3 (2023): 129–33. http://dx.doi.org/10.30630/jitsi.4.3.187.
Full textRamadhani, Erika, and Dedy Hariyadi. "A Bibliometrics Analysis of Multimedia Forensics and Deep Learning Research Based on Scopus Index." JITSI : Jurnal Ilmiah Teknologi Sistem Informasi 4, no. 3 (2023): 129–33. https://doi.org/10.62527/jitsi.4.3.187.
Full textTabona, Oteng, Andrew Blyth, Thabiso M. Maupong, and Thabo Semong. "Forensic cloud environment: a solution for big data forensics." International Journal of Electronic Security and Digital Forensics 14, no. 5 (2022): 513. http://dx.doi.org/10.1504/ijesdf.2022.125401.
Full textSemong, Thabo, Thabiso Maupong, Andrew Blyth, and Oteng Tabona. "Forensic cloud environment: a solution for big data forensics." International Journal of Electronic Security and Digital Forensics 1, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijesdf.2022.10043965.
Full textTeing, Yee-Yang, Ali Dehghantanha, and Kim-Kwang Raymond Choo. "CloudMe forensics: A case of big data forensic investigation." Concurrency and Computation: Practice and Experience 30, no. 5 (2017): e4277. http://dx.doi.org/10.1002/cpe.4277.
Full textMualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.
Full textLi, Yunkun, and Gabriela Mogos. "Digital forensics on Tencent QQ-instant messaging service in China." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (2022): 412. http://dx.doi.org/10.11591/ijeecs.v29.i1.pp412-420.
Full textLi, Yunkun, and Gabriela Mogos. "Digital forensics on Tencent QQ-instant messaging service in China." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (2023): 412–20. https://doi.org/10.11591/ijeecs.v29.i1.pp412-420.
Full textAddo-Sampong, Rosemond O. "Application Information for Forensic Analysis Considerations for Registered Host / Users / Device Name & Bearer Tokens." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 167–72. http://dx.doi.org/10.22624/aims/crp-bk3-p27.
Full textMalpani, Riya, Aneesh Pande, and Ms Sushama Deshmukh. "Cyber Espionage Against Critical Infrastructure: A Case Study of Targeted Attacks on Indian State Load Dispatch Centres (SLDCs)." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem.ncft013.
Full textSachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.
Full textMalik, Dr Pankaj, Harshit Jain, Vartika Bhawsar, Neha Patidar, and Tanishka Soni. "Development of a Machine Learning Framework for Real-Time PMI (Post-Mortem Interval) Estimation in Field Forensics." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem37561.
Full textYang, Pengpeng, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, and Alessandro Piva. "A Survey of Deep Learning-Based Source Image Forensics." Journal of Imaging 6, no. 3 (2020): 9. http://dx.doi.org/10.3390/jimaging6030009.
Full textVoronkov, Dmitry. "On the Relationship Between Traditional Criminalistics and Digital Forensics." Baikal Research Journal 16, no. 1 (2025): 70–75. https://doi.org/10.17150/2411-6262.2025.16(1).70-75.
Full textHikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.
Full textAbdul, Shareef Pallivalappil, and S. N. Jagadeesha. "Procedures for Digital Forensics and Incident Response on Including Data Integrity Constraints on Solid-State Drives (SSD) - A Literature Review." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 6, no. 1 (2022): 328–50. https://doi.org/10.5281/zenodo.6513305.
Full textAL-Hadi, Fatima Ismail, and Nagi Ali Al-Shaibany. "Digital Forensic Accounting: An Overview." International Journal of Computer Science and Mobile Computing 13, no. 8 (2024): 99–106. http://dx.doi.org/10.47760/ijcsmc.2024.v13i08.011.
Full text