To see the other types of publications on this topic, follow the link: Data forensics.

Journal articles on the topic 'Data forensics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Data forensics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Adzogbley, Amenuveve Gracious. "Storing Forensic Data Against Interference." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 7–14. http://dx.doi.org/10.22624/aims/crp-bk3-p2.

Full text
Abstract:
Digital forensic investigators face a wide range of inquiry goals, such as dealing with cybercrime. Digital forensic tools are no different. Different digital traces were examined on persistent storage devices (SSDs, SD cards, and USB drives), volatile memory snapshots, and network captures. A large realistic, timely training data is required to train experts, improve the forensic tools and keep their knowledge and capabilities up to date. However, there is a significant gap in digital forensic training data due to many factors such as privacy, secrecy, data protection, and intellectual proper
APA, Harvard, Vancouver, ISO, and other styles
2

Imeri Saiti, Deshira, Mentor Hamiti, and Jehona Asani. "Handling Data Security in Education." International Journal of Education & Well-Being 2, no. 2 (2024): 108–22. https://doi.org/10.62416/ijwb-41.

Full text
Abstract:
Digital forensics is a new science and follows the rapid changes in the computer environment, expanding into many disciplines, which turns it into a very challenging field that requires the continuous development of methodologies and tools to counter the ever-newer changes in cybercrime. The research subject refers to the analysis and challenges of digital forensics, tracking of hard drives, recovery of deleted files from the hard drive, their quality after recovery, and the possibility of creating forensic images on physically damaged hard drives. The research is based on digital forensics an
APA, Harvard, Vancouver, ISO, and other styles
3

Researcher. "THE ROLE OF CLOUD-BASED TOOLS IN MODERN CYBERCRIME INVESTIGATIONS: INSIGHTS FROM A RANSOMWARE CASE STUDY." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 267–77. https://doi.org/10.5281/zenodo.13819547.

Full text
Abstract:
This article examines the application of cloud-based digital forensics techniques in investigating a ransomware attack on a company's cloud storage infrastructure. Through a comprehensive case study approach, we explore how cloud computing capabilities enhance the forensic process, focusing on scalable data processing, collaborative investigation methods, and the utilization of cloud-native forensic tools. The article demonstrates that cloud-based forensics significantly improves the efficiency and effectiveness of ransomware investigations by enabling rapid analysis of massive datasets, facil
APA, Harvard, Vancouver, ISO, and other styles
4

Tasmi, Tasmi, Fery Antony, and Ubaidillah Ubaidillah. "NETWORK FORENSIK UNTUK MENGANALISA TRAFIK DATA GAME ONLINE." Klik - Jurnal Ilmu Komputer 3, no. 1 (2022): 50–58. http://dx.doi.org/10.56869/klik.v3i1.352.

Full text
Abstract:
Network forensics adalah salah satu cara dalam menganalisi jenis trafik dalam sebuah jaringan adalah dengan menggunakan file log dengan merecord aktifitas pada jaringan. File log disetiap sistem sering dipakai untuk media melihat aktifitas pada sebuah sistem, terkhusus pada sebuah router dan server file ini sangat diperlukan proses investigasi analisis forensik jaringan dengan menggunakan metode Generic Network Forensics Process Model yang merupakan ilmu digital forensik yang berkaitan dengan tahap-tahap untuk menemukan sumber serangan dan mendapatkan bukti-bukti serangan yang bersumber dari f
APA, Harvard, Vancouver, ISO, and other styles
5

El Majdoub, Asmae, Chaimae Saadi, and Habiba Chaoui. "Mobile Forensics Data Acquisition." ITM Web of Conferences 46 (2022): 02006. http://dx.doi.org/10.1051/itmconf/20224602006.

Full text
Abstract:
Mobile technology is among the fastest developing technologies that have changed the way we live our lives. And, with the increase of the need to protect our personal information, smartphone companies have developed multiple types of security protection measures on their devices which makes the forensic data acquisition for law enforcement purposes so much harder. As we all know, one of the biggest tasks in mobile forensics investigation is the step of data acquisition, it is the step of extracting all the valuable information that will help the investigators to bring out all the evidences. In
APA, Harvard, Vancouver, ISO, and other styles
6

P A, Safuwan Ali, and Kavitha R. "Unraveling Cyber Threats: The Role of Forensic Investigation in Cyber Security." International Journal of Multidisciplinary Research in Science, Engineering and Technology 7, no. 05 (2024): 10258–60. http://dx.doi.org/10.15680/ijmrset.2024.0705108.

Full text
Abstract:
In today's digital landscape, cyber threats pose significant risks to organizations worldwide, demanding robust cybersecurity measures. Forensic investigation is pivotal in identifying, analyzing, and mitigating these threats, providing insights into their nature and impact for effective incident response. Leveraging forensic techniques and tools empowers organizations to fortify defense strategies and resilience against evolving threats. Cyber forensics encompasses diverse domains such as digital, data, system, and network forensics, crucial for legally admissible evidence presentation. Syste
APA, Harvard, Vancouver, ISO, and other styles
7

Lim, Michelle Chee Ern, Brandon Hong Chow Chen, Le Ying Lim, et al. "Analysis of Forensic Disk Imaging Tools for Data Acquisition and Preservation." Journal of Informatics and Web Engineering 4, no. 2 (2025): 158–81. https://doi.org/10.33093/jiwe.2025.4.2.11.

Full text
Abstract:
The identification, preservation, analysis, and presentation of electronic evidence to support legal or organizational inquiries constitute the discipline of digital forensics, which is crucial to contemporary investigations. A crucial component of forensic inquiry, disk imaging guarantees precision, dependability, and legal defensibility. To preserve the original evidence, disk imaging makes an identical, bit-by-bit duplicate of a digital storage device, capturing hidden data, deleted material, and active files. Given the critical role of disk imaging in forensic investigations, selecting the
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Sakshi, and Suresh Kumar. "Qualitative Assessment of Digital Forensic Tools." Asian Journal of Electrical Sciences 9, no. 1 (2020): 25–32. http://dx.doi.org/10.51983/ajes-2020.9.1.2372.

Full text
Abstract:
Forensic science is a study of science to criminals and civil laws. Digital forensics is the part of forensic science relating to proof found in computers and advanced storage media. Forensic examiners gather, protect and break down logical confirmations over the span of examination. Digital information contains data as content, pictures, sound, video and so on. These days numerous cybercrime cases, for example, hacking, banking cheats, phishing, email spamming, etc., have developed which are connected with a computerized information. Since the digital investigation is turning into an expandin
APA, Harvard, Vancouver, ISO, and other styles
9

Hamed, Abdul Sallam Said. "Digital Forensic: Techniques, Challenges, and Future Direction." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 5869–73. https://doi.org/10.22214/ijraset.2025.71562.

Full text
Abstract:
Digital forensics is now a crucial field of study in cybersecurity and criminal investigation, which helps identify, analyze, and preserve digital evidence. This systematic literature review discusses the current techniques, challenges, and future directions of research in digital forensics. Contemporary forensic techniques include disk forensics, network forensics, memory forensics, and cloud forensics, with the help of artificial intelligence (AI) and machine learning (ML) to improve evidence identification and analysis. Yet, digital forensics is confronted by various challenges, such as the
APA, Harvard, Vancouver, ISO, and other styles
10

Alshabibi, Munirah Maher, Alanood Khaled Bu dookhi, and M. M. Hafizur Rahman. "Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review." Computers 13, no. 8 (2024): 213. http://dx.doi.org/10.3390/computers13080213.

Full text
Abstract:
Cloud computing technology delivers services, resources, and computer systems over the internet, enabling the easy modification of resources. Each field has its challenges, and the challenges of data transfer in the cloud pose unique obstacles for forensic analysts, making it necessary for them to investigate and adjust the evolving landscape of cloud computing. This is where cloud forensics emerges as a critical component. Cloud forensics, a specialized field within digital forensics, focuses on uncovering evidence of exploitation, conducting thorough investigations, and presenting findings t
APA, Harvard, Vancouver, ISO, and other styles
11

Premanand Narasimhan and Dr. N. Kala. "Emerging Trends in Digital Forensics : Investigating Cybercrime." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3645–52. https://doi.org/10.32628/cseit251451.

Full text
Abstract:
Digital forensics is a rapidly evolving field that plays a critical role in investigating cybercrime, data breaches, and illicit activities across various domains, including blockchain, cryptocurrency, and the dark web. This paper explores key areas of digital forensics, including computer forensics, mobile forensics, network forensics, cloud forensics, IoT forensics, and embedded system forensics. Emerging trends such as drone and satellite forensics highlight the increasing scope of forensic investigations beyond traditional computing environments. Additionally, the study delves into blockch
APA, Harvard, Vancouver, ISO, and other styles
12

Sutikno, Tole. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology (IJ-ICT) 13, no. 2 (2024): 321. http://dx.doi.org/10.11591/ijict.v13i2.pp321-332.

Full text
Abstract:
<p>Extracting and analyzing data from smartphones, IoT devices, and drones is crucial for conducting digital crime investigations. Effective cyberattack mitigation necessitates the use of advanced Android mobile forensics techniques. The investigation necessitates proficiency in manual, logical, hex dump, chip-off, and microread methodologies. This paper provides a comprehensive overview of Android mobile forensics tools and techniques for digital crime investigation, as well as their use in gathering and analyzing evidence. Forensic software tools like Cellebrite UFED, Oxygen Forensic D
APA, Harvard, Vancouver, ISO, and other styles
13

Tole, Sutikno. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology 13, no. 2 (2024): 321–32. https://doi.org/10.11591/ijict.v13i2.pp321-332.

Full text
Abstract:
Extracting and analyzing data from smartphones, IoT devices, and drones is crucial for conducting digital crime investigations. Effective cyberattack mitigation necessitates the use of advanced Android mobile forensics techniques. The investigation necessitates proficiency in manual, logical, hex dump, chip-off, and microread methodologies. This paper provides a comprehensive overview of Android mobile forensics tools and techniques for digital crime investigation, as well as their use in gathering and analyzing evidence. Forensic software tools like Cellebrite UFED, Oxygen Forensic Detective,
APA, Harvard, Vancouver, ISO, and other styles
14

Vatsenko, A. "Digital Forensics Techniques Overview." Bulletin of Science and Practice 6, no. 6 (2020): 167–74. http://dx.doi.org/10.33619/2414-2948/55/21.

Full text
Abstract:
This article discusses the important issue of the use of forensic technology in computer forensics. The basic techniques of computer forensics existing today, such as real-time tracking, sandboxing, data and password recovery, and so on, are examined. The advantages and disadvantages of existing methods are given and recommendations are made on the development of computer forensics techniques in the future. Conclusions are drawn up on the problem of using forensic technology in computer forensics.
APA, Harvard, Vancouver, ISO, and other styles
15

Berghel, Hal. "Hiding data, forensics, and anti-forensics." Communications of the ACM 50, no. 4 (2007): 15–20. http://dx.doi.org/10.1145/1232743.1232761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kenneth, Chukwujekwu Nwafor, Zziwa Ivan, O. T. Ihenacho Daniel, and J. Adeyeye Oladele. "Innovative approaches in complex data forensics: error rate assessment and its impact on cybersecurity." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 1772–92. https://doi.org/10.5281/zenodo.15045230.

Full text
Abstract:
In the realm of cybersecurity, the integrity of forensic investigations is paramount, especially as the volume and complexity of data continue to escalate. This paper explores innovative approaches to complex data forensics, focusing on the methodologies used to assess error rates in data retrieval and analysis. High error rates in forensic processes can compromise the reliability of findings, leading to erroneous conclusions that may impact security measures and legal proceedings. This research examines various techniques for error rate assessment, including statistical methods and data valid
APA, Harvard, Vancouver, ISO, and other styles
17

Huang, Yitai. "Application of Digital Forensics in Cybercrime Investigations." Applied and Computational Engineering 151, no. 1 (2025): 69–74. https://doi.org/10.54254/2755-2721/2025.22847.

Full text
Abstract:
As cybercrime continues to pose significant threats to individuals, businesses, and national security, digital forensics has become an important tool for investigating cybercrime. This article explores the application of digital forensics technology, with a focus on disk forensics, memory forensics, and network forensics. It provides an overview of common forensic techniques, including key forensic methods, their advantages, limitations, and real-world applications. This study emphasizes the latest advancements in forensic tools and technologies, including AI-driven automation and machine lear
APA, Harvard, Vancouver, ISO, and other styles
18

Kaleem, Hassan, and Ijaz Ahmed. "Cloud Forensics: Challenges and Solutions (Blockchain Based Solutions)." Innovative Computing Review 1, no. 2 (2021): 1–26. http://dx.doi.org/10.32350/icr.0102.01.

Full text
Abstract:
Cloud computing is an on-demand service provided for computer resources, data storage and enhancing computing power. Digital forensics is used to help forensic investigators extract evidence against cloud/ cybercriminals and maintain the integrity and security of data stored in a cloud environment. Based on the prior research in this area concerning existing challenges and solutions, this survey focuses on exploring the problems and their proposed solutions on the basis of a detailed literature survey. It critically explores and reviews the prevailing challenges and solutions through an in-dep
APA, Harvard, Vancouver, ISO, and other styles
19

Maulina, Sinta Nur, Niken Dwi Wahyu Cahyani, and Erwid Musthofa Jadied. "ANALYSIS OF THE EFFECT OF VSM ON THE MEMORY ACQUISITION PROCESS USING THE DYNAMIC ANALYSIS METHOD." JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 8, no. 2 (2023): 638–46. http://dx.doi.org/10.29100/jipi.v8i2.3745.

Full text
Abstract:
At first, forensics was restricted to studying data that was stored on a system's hard disk. However, as storage capacity and data encryption increased, applying conventional digital forensic procedures became more challenging. As a result, memory forensics techniques are developed, or are frequently referred to as live forensics, because the process is quicker and more sophisticated. Volatile memory forensics, often known as live forensics, are necessary for this condition. Live forensics has flaws, specifically that some programs can fail when the computer is in active VSM (virtual secure mo
APA, Harvard, Vancouver, ISO, and other styles
20

Dr., J. Saravanesh. "RETROSPECTIVE VIEW OF DIGITAL FORENSIC PROCESS EMPHASISING COMPUTER FORENSICS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 5 (2019): 509–15. https://doi.org/10.5281/zenodo.3234978.

Full text
Abstract:
Forensics is a constantly improvising field which can be said as an application of science to the legal process. Digital forensics is a division of forensic science detailing the recovery and investigation of material found in digital devices, frequently in relation to computer based crimes. The term digital forensics was initially used as a synonym for computer forensics and has extended to wrap investigation of all devices capable of storing digital data. Branches of forensic science are embedded in every branch of science and many other aspects of Digital era because of its capability to un
APA, Harvard, Vancouver, ISO, and other styles
21

Baafi, Peter Oppong. "Tools For Cyber Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 285–90. http://dx.doi.org/10.22624/aims/crp-bk3-p46.

Full text
Abstract:
Digital Forensics & Cyber Security Graduate Programme Department Of Information Systems & Innovations Ghana Institute of Management & Public Administration Greenhill, Accra, Ghana E-mails: peeuncle3@gmail.com Phone: +233242776968 ABSTRACT Digital forensics, or Cyber security, has become a vital part of almost every research, and digital forensics tools' users are becoming more diverse in their backgrounds and interests. As a result, usability is an important section of these tools. This paper investigates the usability aspect of forensics tools. The study results highlight several
APA, Harvard, Vancouver, ISO, and other styles
22

Soni, Nishchal. "IoT forensics: Challenges, methodologies, and future directions in securing the Internet of Things ecosystem." Computer and Telecommunication Engineering 2, no. 4 (2024): 3070. https://doi.org/10.54517/cte3070.

Full text
Abstract:
<p>The rapid growth of the Internet of Things (IoT) has significantly impacted digital forensics, introducing both new opportunities and challenges. IoT forensics, a specialized field within digital forensics, focuses on the acquisition, analysis, and interpretation of data from diverse IoT devices such as smart home systems, wearables, and industrial platforms. This review examines the current state of IoT forensics, highlighting challenges such as device diversity, data volatility, encryption, and the need for real-time analysis. It also evaluates existing forensic methodologies and to
APA, Harvard, Vancouver, ISO, and other styles
23

Hani Roslee, Nurul Adhlina, and Nurul Hidayah Bt Ab Rahman. "A Visualization Approach to Analyze Android Smartphone Data." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (2018): 184. http://dx.doi.org/10.30630/joiv.2.3-2.137.

Full text
Abstract:
This study aims to design and develop an interactive system that can visualize evidence collected from Android smartphone data. This project is developing to support forensic investigator in investigating the security incidents particularly involving Android smartphone forensic data. The used of smartphone in crime was widely recognized. Several types of personnel information are stored in their smartphones. When the investigator analyses the image data of the smartphone, the investigator can know the behaviour of the smartphone’s owner and his social relationship with other people. The analys
APA, Harvard, Vancouver, ISO, and other styles
24

Sutikno, Tole, and Iqbal Busthomi. "Capabilities of cellebrite universal forensics extraction device in mobile device forensics." Computer Science and Information Technologies 5, no. 3 (2024): 254–64. http://dx.doi.org/10.11591/csit.v5i3.p254-264.

Full text
Abstract:
The powerful digital forensics tool cellebrite universal forensics extraction device (UFED) extracts and analyzes mobile device data, helping investigators solve criminal and cybersecurity cases. Advanced methods and algorithms allow Cellebrite UFED to recover data from erased or obscured devices. Cellebrite UFED can pull data from call logs, texts, emails, and social media, providing valuable evidence for investigations. The use of smartphones and tablets in personal and professional settings has spurred the development of mobile device forensics. The intuitive user interface speeds up data e
APA, Harvard, Vancouver, ISO, and other styles
25

Tole, Sutikno, and Busthomi Iqbal. "Capabilities of cellebrite universal forensics extraction device in mobile device forensics." Computer Science and Information Technologies 5, no. 3 (2024): 254–64. https://doi.org/10.11591/csit.v5i3.pp254-264.

Full text
Abstract:
The powerful digital forensics tool cellebrite universal forensics extraction device (UFED) extracts and analyzes mobile device data, helping investigators solve criminal and cybersecurity cases. Advanced methods and algorithms allow Cellebrite UFED to recover data from erased or obscured devices. Cellebrite UFED can pull data from call logs, texts, emails, and social media, providing valuable evidence for investigations. The use of smartphones and tablets in personal and professional settings has spurred the development of mobile device forensics. The intuitive user interface speeds up data e
APA, Harvard, Vancouver, ISO, and other styles
26

Adinata, Ivan, and Yustian Servanda. "Kajian Literatur: Metode Analisis dan Tools Live Forensics Pada Random Access Memory (RAM)." Jurnal Sains dan Teknologi (JSIT) 4, no. 2 (2024): 175–80. http://dx.doi.org/10.47233/jsit.v4i2.1760.

Full text
Abstract:
Live forensics terhadap media peyimpanan RAM merupakan salah satu aspek penting dalam forensik digital yang berkaitan dengan proses pengumpulan dan analisis data yang ada dalam memori komputer yang sedang berjalan. Random Access Memory (RAM) merupakan media penyimpanan komputer yang menyimpan data secara random dan bersifat volatile, sehingga dalam melakukan analisa diperlukan metode yang tepat dan efektif. Dalam kajian literatur ini, kami melakukan pengkajian terhadap metode analisis dan alat yang digunakan dalam live forensics RAM. Kami menjelaskan metode apa saja yang diguanakan dalam prose
APA, Harvard, Vancouver, ISO, and other styles
27

Micah, Ezekiel Elton Mike, Ibrahim Halidu Saidu, Taiwo Ibitomi, and Bello Sambo Sanusi. "Digital Forensics in the Era of Cybercrime: Emerging Trends and Challenges for Forensic Accountants in Nigeria." European Journal of Accounting, Auditing and Finance Research 11, no. 9 (2023): 85–100. http://dx.doi.org/10.37745/ejaafr.2013/vol11n985100.

Full text
Abstract:
This study examined the impact of technology on digital forensics and the challenges faced by forensic accountants in the era of cybercrime. The study highlights the four dimensions in which technology has an impact on digital forensics: technical, legal, organizational, and educational. The paper also discusses how emerging technologies such as artificial intelligence and machine learning can be used in digital forensics, along with the challenges they present. Cloud computing is also examined, and the challenges it poses for forensic accountants who need to access and analyze financial data
APA, Harvard, Vancouver, ISO, and other styles
28

Mantiri, Astria Santa Natalia, and Elvis Sumanti. "THE ROLE OF DIGITAL FORENSICS IN THE PRELIMINARY INVESTIGATION." Klabat Accounting Review 3, no. 1 (2022): 79. http://dx.doi.org/10.60090/kar.v3i1.821.79-95.

Full text
Abstract:
In this era, technological developments have a significant influence in business. However, many taxpayers abuse the use of technology to commit fraud. Therefore, there needs to be a system that can filter and detect data of taxpayers who commit fraud. This research is conducted to analyze digital forensics' role in dealing with fraud and to determine the critical success factors that support the digital forensics in detecting fraud. This study uses qualitative reasearch where the author wanted to find out the role of Digital Forensics in the Preliminary Evidence Examination by interviewing the
APA, Harvard, Vancouver, ISO, and other styles
29

Saragih, Naikson, Ridho Agus Wery Nanda Panjaitan, and Mufria Jonatan Purba. "FORENSIC NETWORK ANALYSIS AND IMPLEMENTATION OF SECURITY ATTACKS ON VIRTUAL PRIVATE SERVERS." Jurnal Sistem Informasi dan Ilmu Komputer Prima(JUSIKOM PRIMA) 6, no. 2 (2023): 28–34. http://dx.doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932.

Full text
Abstract:
ABSTRACT-PT Kodinglab Integrasi Indonesia's Virtual Private Server (VPS) product requires good quality standards, including security. The challenge that arises is still frequent disruptions to the protection of PT Kodinglab's VPS customers, where it is difficult to identify the source of the attack. Network forensics in the form of dead forensics and live forensics using the NIST method with the stages of collection, examination, Analysis, and reporting are used to find the source of the attack. Data for dead forensics comes from snort tools, and data for live forensics comes from capture Wire
APA, Harvard, Vancouver, ISO, and other styles
30

Gyimah, Seth Adjei. "X-Ways Forensics Platform For Digital Forensics Examiners." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 353–56. http://dx.doi.org/10.22624/aims/crp-bk3-p56.

Full text
Abstract:
Digital Forensics & Cyber Security Graduate Programme Department Of Information Systems & Innovations Ghana Institute of Management & Public Administration Greenhill, Accra, Ghana E-mails: sethadjeigyimah@gmail.com/ seth-adjei.gyimah@st.gimpa.edu.gh Phone: +233244475540 ABSTRACT Crime has evolved over the years from its traditional form to digital crimes. Those who commit such crimes use advanced and sophisticated tools, equipment and techniques to perpetuate such crimes. In order to effectively and efficiently investigate, examine and gather evidence from such complex crimes, digi
APA, Harvard, Vancouver, ISO, and other styles
31

Faiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.

Full text
Abstract:
Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of
APA, Harvard, Vancouver, ISO, and other styles
32

Zeng, Gang. "Data Handling of Digital Forensics Cloud Computing." Advanced Materials Research 756-759 (September 2013): 1739–43. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1739.

Full text
Abstract:
With development of network and digital devices, traditional digital forensics tools show their drawbacks, and investigators need new forensics tools to deal with enormous digital evidences. Therefore, this paper introduces digital forensics and cloud computing, then lists the advantages of private forensics cloud computing, proposes a model of Data Handling of Digital Forensics Cloud Computing.
APA, Harvard, Vancouver, ISO, and other styles
33

Zhang, Guan Zhu. "Computer Forensics Based on Data Mining." Applied Mechanics and Materials 536-537 (April 2014): 371–75. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.371.

Full text
Abstract:
This essay introduces the concept, principle and step of computer dynamic forensics, then proposed a computer dynamic forensics system model, and aims at the question which the computer dynamic forensics faces in the data analysis stage, the data mining technology applies to magnanimous data analysis in the computer dynamic forensics, it can effectively enhancement the data analysis speed, the analysis accuracy and the analysis intelligence, solute dynamic forensics usability, the validity, compatibility and extended question.
APA, Harvard, Vancouver, ISO, and other styles
34

Ramadhani, Erika. "A bibliometrics analysis of multimedia forensics and deep learning research based on Scopus index." JITSI : Jurnal Ilmiah Teknologi Sistem Informasi 4, no. 3 (2023): 129–33. http://dx.doi.org/10.30630/jitsi.4.3.187.

Full text
Abstract:
Forensics of digital data are concerned with identifying, acquiring, processing, analysing, and reporting on electronic data. Multimedia forensics focuses on investigating computer crimes using forensic methods. The analysis of multimedia evidence is the role of multimedia forensics, on the other hand. In the analysis, digital evidence is evaluated scientifically to maintain its integrity, to find its source, and to authenticate it. There are several methods in multimedia forensics, such as the implementation of deep learning. The purpose of this research is to conduct bibliometric analysis in
APA, Harvard, Vancouver, ISO, and other styles
35

Ramadhani, Erika, and Dedy Hariyadi. "A Bibliometrics Analysis of Multimedia Forensics and Deep Learning Research Based on Scopus Index." JITSI : Jurnal Ilmiah Teknologi Sistem Informasi 4, no. 3 (2023): 129–33. https://doi.org/10.62527/jitsi.4.3.187.

Full text
Abstract:
Forensics of digital data are concerned with identifying, acquiring, processing, analysing, and reporting on electronic data. Multimedia forensics focuses on investigating computer crimes using forensic methods. The analysis of multimedia evidence is the role of multimedia forensics, on the other hand. In the analysis, digital evidence is evaluated scientifically to maintain its integrity, to find its source, and to authenticate it. There are several methods in multimedia forensics, such as the implementation of deep learning. The purpose of this research is to conduct bibliometric analysis in
APA, Harvard, Vancouver, ISO, and other styles
36

Tabona, Oteng, Andrew Blyth, Thabiso M. Maupong, and Thabo Semong. "Forensic cloud environment: a solution for big data forensics." International Journal of Electronic Security and Digital Forensics 14, no. 5 (2022): 513. http://dx.doi.org/10.1504/ijesdf.2022.125401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Semong, Thabo, Thabiso Maupong, Andrew Blyth, and Oteng Tabona. "Forensic cloud environment: a solution for big data forensics." International Journal of Electronic Security and Digital Forensics 1, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijesdf.2022.10043965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Teing, Yee-Yang, Ali Dehghantanha, and Kim-Kwang Raymond Choo. "CloudMe forensics: A case of big data forensic investigation." Concurrency and Computation: Practice and Experience 30, no. 5 (2017): e4277. http://dx.doi.org/10.1002/cpe.4277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.

Full text
Abstract:
Kejahatan konvensial yang terekam kamera CCTV (Closed Circuit Televison) semakin banyak ditemukan di masyarakat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Kamera CCTV memiliki peran penting dalam keamanan, banyak diantaranya hasil tangkapan rekaman kamera CCTV dijadikan sebagai alat bukti digital. Tantangannya adalah bagaimana teknik yang diperlukan untuk penanganan khusus investigasi digital forensik dalam mencari bukti ditgital rekaman kamera CCTV menggunakan metode live forensik, yaitu ketika barang bukti
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Yunkun, and Gabriela Mogos. "Digital forensics on Tencent QQ-instant messaging service in China." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (2022): 412. http://dx.doi.org/10.11591/ijeecs.v29.i1.pp412-420.

Full text
Abstract:
Data packet analysis targeting instant messaging (IM) applications has become one of the most mentioned case examples in the digital forensic industry, considering that the forensic engineers can extract valuable information by analysing the data packets used by the IM software. The crucial part of this process is to accomplish a series of research and investigation, in addition to correctly implement the related forensics tools. This paper is intended to use QQ, a popular IM software in China, as an experiment example, in cooperation with various tools from Kali Linux, a digital forensics-ori
APA, Harvard, Vancouver, ISO, and other styles
41

Li, Yunkun, and Gabriela Mogos. "Digital forensics on Tencent QQ-instant messaging service in China." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (2023): 412–20. https://doi.org/10.11591/ijeecs.v29.i1.pp412-420.

Full text
Abstract:
Data packet analysis targeting instant messaging (IM) applications has become one of the most mentioned case examples in the digital forensic industry, considering that the forensic engineers can extract valuable information by analysing the data packets used by the IM software. The crucial part of this process is to accomplish a series of research and investigation, in addition to correctly implement the related forensics tools. This paper is intended to use QQ, a popular IM software in China, as an experiment example, in cooperation with various tools from Kali Linux, a digital forensics-ori
APA, Harvard, Vancouver, ISO, and other styles
42

Addo-Sampong, Rosemond O. "Application Information for Forensic Analysis Considerations for Registered Host / Users / Device Name & Bearer Tokens." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 167–72. http://dx.doi.org/10.22624/aims/crp-bk3-p27.

Full text
Abstract:
As the dependence on digital information and the Internet continues to grow, it changes the way of computer crime. The number of computer crimes increases dramatically in recent years and investigators have been facing the difficulty of admissibility of digital evidence. To solve this problem, we must collect evidence by digital forensics techniques and analyze the digital data or recover the damaged data. One place to collect evidence is from application software. This paper seeks to find out how to collect, store and analyze application information for forensic purposes. This is also to dete
APA, Harvard, Vancouver, ISO, and other styles
43

Malpani, Riya, Aneesh Pande, and Ms Sushama Deshmukh. "Cyber Espionage Against Critical Infrastructure: A Case Study of Targeted Attacks on Indian State Load Dispatch Centres (SLDCs)." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem.ncft013.

Full text
Abstract:
Abstract—With rapid digitalization, India has witnessed an exponential rise in cybercrime, necessitating robust cyber security measures and advanced cyber forensic techniques. While cybersecurity seeks to prevent attacks, Cyber forensics, also known as digital forensics, is a critical discipline within the broader field of cybersecurity that involves the identification, preservation, analysis, and presentation of digital evidence. As cybercrimes continue to evolve in complexity and scale, cyber forensics plays a vital role in investigating incidents such as data breaches, cyber terrorism, and
APA, Harvard, Vancouver, ISO, and other styles
44

Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.

Full text
Abstract:
This paper aims to analyze different tools for Forensic Data Analysis comes under the branch of Digital Forensics. Forensic data analysis is done with digital techniques. Digital forensics becomes more important in law enforcement, due to the large use of computers and mobile devices. The pattern recognition system most appropriately fits into the Analysis Phase of the Digital Forensics. Pattern Recognition involves two processes. One Process is an analysis and the second process is recognition. The result of the analysis is taken out of the attributes from the patterns to be recognized i.e.,
APA, Harvard, Vancouver, ISO, and other styles
45

Malik, Dr Pankaj, Harshit Jain, Vartika Bhawsar, Neha Patidar, and Tanishka Soni. "Development of a Machine Learning Framework for Real-Time PMI (Post-Mortem Interval) Estimation in Field Forensics." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem37561.

Full text
Abstract:
Accurate estimation of the Post-Mortem Interval (PMI) is critical in forensic investigations, aiding in determining the time of death. However, traditional PMI estimation methods, often reliant on physiological observations and environmental factors, face significant limitations in accuracy and efficiency, especially in field conditions. This paper presents the development of a machine learning (ML) framework designed for real-time PMI estimation, integrating multimodal sensor data to address the challenges encountered in field forensics. Our framework utilizes environmental and physiological
APA, Harvard, Vancouver, ISO, and other styles
46

Yang, Pengpeng, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, and Alessandro Piva. "A Survey of Deep Learning-Based Source Image Forensics." Journal of Imaging 6, no. 3 (2020): 9. http://dx.doi.org/10.3390/jimaging6030009.

Full text
Abstract:
Image source forensics is widely considered as one of the most effective ways to verify in a blind way digital image authenticity and integrity. In the last few years, many researchers have applied data-driven approaches to this task, inspired by the excellent performance obtained by those techniques on computer vision problems. In this survey, we present the most important data-driven algorithms that deal with the problem of image source forensics. To make order in this vast field, we have divided the area in five sub-topics: source camera identification, recaptured image forensic, computer g
APA, Harvard, Vancouver, ISO, and other styles
47

Voronkov, Dmitry. "On the Relationship Between Traditional Criminalistics and Digital Forensics." Baikal Research Journal 16, no. 1 (2025): 70–75. https://doi.org/10.17150/2411-6262.2025.16(1).70-75.

Full text
Abstract:
The article provides a comparative analysis of the structure, methodology and terminology of classical criminalistics as a humanitarian discipline and digital forensics as a technical discipline, identifying their similarities and differences. The Russian system of criminalistics, based on a hierarchical model including general provisions, special and special parts, and its difference from Western systems, in particular American and European, which are organized according to the chronological principle, are considered. It is noted that a similar difference in structural approach is observed in
APA, Harvard, Vancouver, ISO, and other styles
48

Hikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.

Full text
Abstract:
As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and cr
APA, Harvard, Vancouver, ISO, and other styles
49

Abdul, Shareef Pallivalappil, and S. N. Jagadeesha. "Procedures for Digital Forensics and Incident Response on Including Data Integrity Constraints on Solid-State Drives (SSD) - A Literature Review." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 6, no. 1 (2022): 328–50. https://doi.org/10.5281/zenodo.6513305.

Full text
Abstract:
<strong>Background/Purpose:</strong> <em>To get evidence from suspect computers running on Windows Operating System, law enforcement agencies and corporations follow many standard procedures relevant to Digital Forensics and Incident Response processes. The primary contrast between forensics and incident response is that forensics is evidence-driven and is often more closely connected with criminal activity, while incident response is more focused on discovering, containing, and recovering from breach of security incidents. A guideline is often intended to simplify certain procedures in accord
APA, Harvard, Vancouver, ISO, and other styles
50

AL-Hadi, Fatima Ismail, and Nagi Ali Al-Shaibany. "Digital Forensic Accounting: An Overview." International Journal of Computer Science and Mobile Computing 13, no. 8 (2024): 99–106. http://dx.doi.org/10.47760/ijcsmc.2024.v13i08.011.

Full text
Abstract:
Forensic analysis has become crucial for detecting financial crimes such as fraud, extortion, money laundering, and tax evasion in a rapidly evolving world. This type of analysis is also essential for promoting economic development and enhancing public trust in governments. As fraud strategies advance alongside rapid digital innovations, traditional forensic accounting relies on manual data examination and is increasingly inadequate for addressing sophisticated criminal fraud. The rise in cybercrime underscores digital forensics' need to conduct effective investigations. This study provides an
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!