Journal articles on the topic 'Digital and Computer Forensics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Digital and Computer Forensics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Vatsenko, A. "Digital Forensics Techniques Overview." Bulletin of Science and Practice 6, no. 6 (2020): 167–74. http://dx.doi.org/10.33619/2414-2948/55/21.
Full textThangavel, Vijayakumar. "Survey on Computer Forensics and its most using Technique Steganography." December 2023 2, no. 2 (2023): 425–34. http://dx.doi.org/10.36548/rrrj.2023.2.013.
Full textDr., J. Saravanesh. "RETROSPECTIVE VIEW OF DIGITAL FORENSIC PROCESS EMPHASISING COMPUTER FORENSICS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 5 (2019): 509–15. https://doi.org/10.5281/zenodo.3234978.
Full textSenanu, James Hebidzi. "Libforensics For Developing Digital Forensics Applications." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 335–38. http://dx.doi.org/10.22624/aims/crp-bk3-p53.
Full textBrown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.
Full textBrushkovskiy, K. B. "Forensics - computer criminalistics." Scientific works "Adilet", no. 3 (2023): 13–18. https://doi.org/10.54649/2077-9860-2023-3-13-18.
Full textWisdom, Frey John. "Digital Forensics In Multimedia." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 239–50. http://dx.doi.org/10.22624/aims/crp-bk3-p39.
Full textAziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.
Full textBaafi, Peter Oppong. "Tools For Cyber Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 285–90. http://dx.doi.org/10.22624/aims/crp-bk3-p46.
Full textPremanand Narasimhan and Dr. N. Kala. "Emerging Trends in Digital Forensics : Investigating Cybercrime." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3645–52. https://doi.org/10.32628/cseit251451.
Full textAL-Hadi, Fatima Ismail, and Nagi Ali Al-Shaibany. "Digital Forensic Accounting: An Overview." International Journal of Computer Science and Mobile Computing 13, no. 8 (2024): 99–106. http://dx.doi.org/10.47760/ijcsmc.2024.v13i08.011.
Full textBhatia, Manjot Kaur, Palak Gambhir, Shefali Sinha, and Saksham Kumar Singh. "A Comparative Analysis of OS Forensics Tools." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 494–502. http://dx.doi.org/10.22214/ijraset.2022.47346.
Full textSubair, Saad, Derar Yosif, Abdelgader Ahmed, and Christopher Thron. "Cyber Crime Forensics." International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence 1, no. 1 (2022): 41–49. http://dx.doi.org/10.54938/ijemdcsai.2022.01.1.37.
Full textAddo-Sampong, Rosemond O. "Application Information for Forensic Analysis Considerations for Registered Host / Users / Device Name & Bearer Tokens." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 167–72. http://dx.doi.org/10.22624/aims/crp-bk3-p27.
Full textMualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.
Full textYadav, Priya R. "Review Paper on Introduction to Cyber Forensics." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (2021): 1939–42. http://dx.doi.org/10.22214/ijraset.2021.37684.
Full textAzra, Parveen, Husain Khan Zishan, and Naseem Ahmad Syed. "Classification and evaluation of digital forensic tools." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 6 (2020): 3096~3106. https://doi.org/10.12928/TELKOMNIKA.v18i6.15295.
Full textAlex, Makheti, Gilbert Gilibrays Ocen, Badru Lusiba, et al. "A Process Model to Enhance the Accuracy of Digital Forensic Investigations: A case of National Identification and Registration Authority (NIRA-Uganda)." East African Journal of Information Technology 5, no. 1 (2022): 216–43. http://dx.doi.org/10.37284/eajit.5.1.1015.
Full textSingh, Sakshi, and Suresh Kumar. "Qualitative Assessment of Digital Forensic Tools." Asian Journal of Electrical Sciences 9, no. 1 (2020): 25–32. http://dx.doi.org/10.51983/ajes-2020.9.1.2372.
Full textSamy Abdelwahab Safaan. "Computer Forensics Education: The Applications of Forensic Tools in Modern Education System." American Journal of Chemistry and Pharmacy 1, no. 2 (2022): 13–20. http://dx.doi.org/10.54536/ajcp.v1i2.1077.
Full textRiadi, Imam, Sunardi Sunardi, and Muhamad Ermansyah Rauli. "Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics." Jurnal Teknik Elektro 10, no. 1 (2018): 18–22. http://dx.doi.org/10.15294/jte.v10i1.14070.
Full textHikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.
Full textShivdas, Sajin. "Introduction to Digital Forensics." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 833–36. http://dx.doi.org/10.22214/ijraset.2023.55258.
Full textKessler, Gary C., and Gregory H. Carlton. "Exploring Myths in Digital Forensics." International Journal of Interdisciplinary Telecommunications and Networking 9, no. 4 (2017): 1–9. http://dx.doi.org/10.4018/ijitn.2017100101.
Full textFaiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.
Full textAl Jouhi, Mariam, and Sara Al Hosani. "Windows Forensics Analysis." Emirati Journal of Policing & Security Studies 1, no. 1 (2022): 4–11. https://doi.org/10.54878/jagh3855.
Full textAltheyabi, Jasir Adel. "The Digital Forensic Tools Accuracy and Specifications." Academic Journal of Research and Scientific Publishing 3, no. 35 (2022): 58–65. http://dx.doi.org/10.52132/ajrsp.e.2022.35.3.
Full textParra de Gallo, Herminia Beatriz, and Marcela Vegetti. "OntoFoCE and ObE Forensics. Email-traceability supporting tools for digital forensics." JUCS - Journal of Universal Computer Science 29, no. 12 (2023): 1482–509. http://dx.doi.org/10.3897/jucs.97822.
Full textRehman, Danish, and Er Jasdeep Singh. "A Study of Minimization of Cybercrimes by the Implementation of Cyber Forensics Tool Kit." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 1335–45. http://dx.doi.org/10.22214/ijraset.2022.40867.
Full textSurayyo, Yusupova, Radjabova Madina, Abdullayev Ibrohim, and Avazbekov Mirsaid. "RESEARCH CHALLENGES & OPEN PROBLEMS IN DIGITAL FORENSICS (DF)." RESEARCH AND EDUCATION 2, no. 1 (2023): 80–89. https://doi.org/10.5281/zenodo.7530249.
Full textSanjay, Vaddi Krishna, Dhwaniket Kamble, Raj Vaingankar, Tushar Khatri, and Pranil Bhalerao. "Enhancements in the world of digital forensics." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 1 (2024): 680–86. https://doi.org/10.11591/ijai.v13.i1.pp680-686.
Full textKazemi, Seyyed Sajjad, and Sajjad Heidari. "Digital forensics and its role in promoting criminal prosecution." Revista Eletrônica em Gestão, Educação e Tecnologia Ambiental 25 (March 22, 2021): e5. http://dx.doi.org/10.5902/2236117063798.
Full textTong, Tan Pei, Kannan Asokan, and Iqbal Singh Munjal. "The impact of forensic accounting tools in investigating white-collar crime." E3S Web of Conferences 389 (2023): 09034. http://dx.doi.org/10.1051/e3sconf/202338909034.
Full textVaddi, Krishna Sanjay, Dhwaniket Kamble, Raj Vaingankar, Tushar Khatri, and Pranil Bhalerao. "Enhancements in the world of digital forensics." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 1 (2024): 680. http://dx.doi.org/10.11591/ijai.v13.i1.pp680-686.
Full textRaza, Syed Atir, Aqsa Anwar, and Abdul Hannan Khan. "Current Issues and Challenges with Scientific Validation of Digital Evidence." Review of Computer Engineering Studies 9, no. 3 (2022): 111–15. http://dx.doi.org/10.18280/rces.090304.
Full textCigoj, Primož, and Borka Jerman Blažič. "An Advanced Educational Tool for Digital Forensic Engineering." International Journal of Emerging Technologies in Learning (iJET) 11, no. 03 (2016): 15. http://dx.doi.org/10.3991/ijet.v11i03.5294.
Full textParra, de Gallo Herminia Beatriz, and Marcela Vegetti. "OntoFoCE and ObE Forensics. Email-traceability supporting tools for digital forensics." JUCS - Journal of Universal Computer Science 29, no. (12) (2023): 1482–509. https://doi.org/10.3897/jucs.97822.
Full textRich, Marshall S., and Mary P. Aiken. "An Interdisciplinary Approach to Enhancing Cyber Threat Prediction Utilizing Forensic Cyberpsychology and Digital Forensics." Forensic Sciences 4, no. 1 (2024): 110–51. http://dx.doi.org/10.3390/forensicsci4010008.
Full textSachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.
Full textEkhande, Sonali, Uttam Patil, and Kshama Vishwanath Kulhalli. "Review on effectiveness of deep learning approach in digital forensics." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5481. http://dx.doi.org/10.11591/ijece.v12i5.pp5481-5592.
Full textDumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.
Full textAmparbeng, Maxwell. "Inaccessibility of Services as a Threat to Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 29–34. http://dx.doi.org/10.22624/aims/crp-bk3-p5.
Full textBoateng, Samuel Opuni. "Cloud Computing Forensic Challenges for Law Enforcement." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 339–44. http://dx.doi.org/10.22624/aims/crp-bk3-p54.
Full textUmar, Rusydi, Anton Yudhana, and Muhammad Nur Faiz. "Experimental Analysis of Web Browser Sessions Using Live Forensics Method." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 2951. http://dx.doi.org/10.11591/ijece.v8i5.pp2951-2958.
Full textRusydi, Umar, Yudhana Anton, and Nur Faiz Muhammad. "Experimental Analysis of Web Browser Sessions Using Live Forensics Method." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 2951–58. https://doi.org/10.11591/ijece.v8i5.pp2951-2958.
Full textChoi, Kyung-Shick, Lou Chitkushev, Kyung-Seok Choo, and Claire Lee. "Bureau of Justice Assistance Student Computer and Digital Forensics Educational Opportunities Program." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 36–44. http://dx.doi.org/10.34190/iccws.17.1.30.
Full textLee, Sang Young. "Mobile Digital Forensics Framework for Smartphone User Analysis." Webology 19, no. 1 (2022): 4335–51. http://dx.doi.org/10.14704/web/v19i1/web19285.
Full textMachaka, Valentine, and Titus Balan. "Investigating Proactive Digital Forensics Leveraging Adversary Emulation." Applied Sciences 12, no. 18 (2022): 9077. http://dx.doi.org/10.3390/app12189077.
Full textImeri Saiti, Deshira, Mentor Hamiti, and Jehona Asani. "Handling Data Security in Education." International Journal of Education & Well-Being 2, no. 2 (2024): 108–22. https://doi.org/10.62416/ijwb-41.
Full textPrakash, Vijay, Alex Williams, Lalit Garg, Claudio Savaglio, and Seema Bawa. "Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems." Electronics 10, no. 11 (2021): 1229. http://dx.doi.org/10.3390/electronics10111229.
Full text