Journal articles on the topic 'Digital forensic analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Digital forensic analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.
Full textSabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.
Full textJafari, Fakeeha, and Rabail Shafique Satti. "Comparative Analysis of Digital Forensic Models." Journal of Advances in Computer Networks 3, no. 1 (2015): 82–86. http://dx.doi.org/10.7763/jacn.2015.v3.146.
Full textHikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (January 7, 2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.
Full textFaiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (March 30, 2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.
Full textMualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 7, 2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.
Full textDumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.
Full textZuhriyanto, Ikhsan, Anton Yudhana, and Imam Riadi. "Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 5 (October 30, 2020): 829–36. http://dx.doi.org/10.29207/resti.v4i5.2152.
Full textVadlamudi, Divya, Dr K. Thirupathi Rao, Pellakuri Vidyullatha, and B. AjasekharReddy. "Analysis on digital forensics challenges and anti-forensics techniques in cloud computing." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 1072. http://dx.doi.org/10.14419/ijet.v7i2.7.12230.
Full textLee, Jae-Ung, and Woo-Young Soh. "Comparative analysis on integrated digital forensic tools for digital forensic investigation." IOP Conference Series: Materials Science and Engineering 834 (June 23, 2020): 012034. http://dx.doi.org/10.1088/1757-899x/834/1/012034.
Full textShree, Barkha, and Parneeta Dhaliwal. "Behavioural Evidence Analysis." International Journal of Digital Crime and Forensics 13, no. 5 (September 2021): 20–42. http://dx.doi.org/10.4018/ijdcf.20210901.oa2.
Full textHani Roslee, Nurul Adhlina, and Nurul Hidayah Bt Ab Rahman. "A Visualization Approach to Analyze Android Smartphone Data." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (June 6, 2018): 184. http://dx.doi.org/10.30630/joiv.2.3-2.137.
Full textJiang, Jian Guo, Bo Yang, Sen Lin, Ming Xing Zhang, and Kun Ying Liu. "A Practical Approach for Digital Forensic Triage." Applied Mechanics and Materials 742 (March 2015): 437–44. http://dx.doi.org/10.4028/www.scientific.net/amm.742.437.
Full textBashir, Muhammad, and M. Khan. "Triage in Live Digital Forensic Analysis." International Journal of Forensic Computer Science 8, no. 1 (July 2, 2013): 35–44. http://dx.doi.org/10.5769/j201301005.
Full textCarrier, Brian D. "Risks of live digital forensic analysis." Communications of the ACM 49, no. 2 (February 2006): 56–61. http://dx.doi.org/10.1145/1113034.1113069.
Full textHuamaní, Enrique Lee. "High performance computer analysis for indexing emails in digital forensic analysis (Computer Forensics)." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 4 (August 25, 2020): 5867–71. http://dx.doi.org/10.30534/ijatcse/2020/247942020.
Full textNizam, Syafiqah Hanisah Shahrol, Nurul Hidayah Ab Rahman, and Niken Dwi Wahyu Cahyani. "Keyword Indexing And Searching Tool (KIST): A Tool to Assist the Forensics Analysis of WhatsApp Chat." International Journal on Information and Communication Technology (IJoICT) 6, no. 1 (June 20, 2020): 23. http://dx.doi.org/10.21108/ijoict.2020.61.481.
Full textLempereur, Brett, Madjid Merabti, and Qi Shi. "Pypette." International Journal of Digital Crime and Forensics 4, no. 4 (October 2012): 31–46. http://dx.doi.org/10.4018/jdcf.2012100103.
Full textMahendra, Kadek Dwi Oka, and I. Komang Ari Mogi. "Digital Forensic Analysis Of Michat Application On Android As Digital Proof In Handling Online Prostitution Cases." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 3 (February 18, 2021): 381. http://dx.doi.org/10.24843/jlk.2021.v09.i03.p09.
Full textWang, Yan, Qindong Sun, Dongzhu Rong, Shancang Li, and Li Da Xu. "Image Source Identification Using Convolutional Neural Networks in IoT Environment." Wireless Communications and Mobile Computing 2021 (September 10, 2021): 1–12. http://dx.doi.org/10.1155/2021/5804665.
Full textJoseph, Paul, and Jasmine Norman. "Systematic Memory Forensic Analysis of Ransomware using Digital Forensic Tools." International Journal of Natural Computing Research 9, no. 2 (April 2020): 61–81. http://dx.doi.org/10.4018/ijncr.2020040105.
Full textVoznyuk, M. A., and Yu A. Denisov. "Forensic Diagnostics of the Circumstances of Digital Video and Audio Production: Analytical Review." Theory and Practice of Forensic Science 12, no. 1 (March 30, 2017): 48–71. http://dx.doi.org/10.30764/64/1819-2785-2017-12-1-48-71.
Full textN. Patil, Dinesh. "Digital Forensic Analysis of Ubuntu File System." International Journal of Cyber-Security and Digital Forensics 5, no. 4 (2016): 175–86. http://dx.doi.org/10.17781/p002213.
Full textInglot, Bartosz, and Lu Liu. "Enhanced Timeline Analysis for Digital Forensic Investigations." Information Security Journal: A Global Perspective 23, no. 1-2 (January 2, 2014): 32–44. http://dx.doi.org/10.1080/19393555.2014.897401.
Full textCasey, Eoghan. "Focused digital evidence analysis and forensic distinguishers." Digital Investigation 18 (September 2016): A1—A3. http://dx.doi.org/10.1016/j.diin.2016.08.004.
Full textWang, Jian, Zhen Min Tang, and Xian Li Jin. "An OCL-Based Formal Model for Cloud Forensics." Advanced Materials Research 989-994 (July 2014): 1513–16. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.1513.
Full textH Bhat, Veena, Prasanth G. Rao, Abhilash R. V, P. Deepa Shenoy, Venugopal K. R., and L. M. Patnaik. "A Data Mining Approach for Data Generation and Analysis for Digital Forensic Application." International Journal of Engineering and Technology 2, no. 3 (2010): 313–19. http://dx.doi.org/10.7763/ijet.2010.v2.140.
Full textKao, Da-Yu. "Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps." Applied Sciences 10, no. 13 (July 7, 2020): 4686. http://dx.doi.org/10.3390/app10134686.
Full textSalamh, Fahad E., Umit Karabiyik, Marcus K. Rogers, and Eric T. Matson. "A Comparative UAV Forensic Analysis: Static and Live Digital Evidence Traceability Challenges." Drones 5, no. 2 (May 21, 2021): 42. http://dx.doi.org/10.3390/drones5020042.
Full textUmar, Rusydi, Anton Yudhana, and Muhammad Nur Faiz. "Experimental Analysis of Web Browser Sessions Using Live Forensics Method." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 2951. http://dx.doi.org/10.11591/ijece.v8i5.pp2951-2958.
Full textAkremi, Aymen, Mohamed-Foued Sriti, Hassen Sallay, and Mohsen Rouached. "Ontology-Based Smart Sound Digital Forensics Analysis for Web Services." International Journal of Web Services Research 16, no. 1 (January 2019): 70–92. http://dx.doi.org/10.4018/ijwsr.2019010104.
Full textMeister, Sam, and Alexandra Chassanoff. "Integrating Digital Forensics Techniques into Curatorial Tasks: A Case Study." International Journal of Digital Curation 9, no. 2 (September 9, 2014): 6–16. http://dx.doi.org/10.2218/ijdc.v9i2.325.
Full textSalamh, Fahad E., Umit Karabiyik, and Marcus K. Rogers. "RPAS Forensic Validation Analysis Towards a Technical Investigation Process: A Case Study of Yuneec Typhoon H." Sensors 19, no. 15 (July 24, 2019): 3246. http://dx.doi.org/10.3390/s19153246.
Full textMontasari, Reza, Richard Hill, Victoria Carpenter, and Farshad Montaseri. "Digital Forensic Investigation of Social Media, Acquisition and Analysis of Digital Evidence." International Journal of Strategic Engineering 2, no. 1 (January 2019): 52–60. http://dx.doi.org/10.4018/ijose.2019010105.
Full textGhannam, Hussein Abed. "Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone." Journal of Applied Information, Communication and Technology 5, no. 2 (October 28, 2018): 73–83. http://dx.doi.org/10.33555/ejaict.v5i2.55.
Full textJin, Park Chan. "Personal Information Analysis Using Digital Forensic on Cloud." Advanced Science Letters 22, no. 9 (September 1, 2016): 2252–56. http://dx.doi.org/10.1166/asl.2016.7837.
Full textSouvignet, T., and J. Frinken. "Differential Power Analysis as a digital forensic tool." Forensic Science International 230, no. 1-3 (July 2013): 127–36. http://dx.doi.org/10.1016/j.forsciint.2013.03.040.
Full textPetrov, S. M. "Forensic Analysis of Time Markers of Digital Recordings." Theory and Practice of Forensic Science 16, no. 1 (April 23, 2021): 69–77. http://dx.doi.org/10.30764/1819-2785-2021-1-69-77.
Full textEskidere, Ömer. "Source Digital Voice Recorder Identification by Wavelet Analysis." International Journal on Artificial Intelligence Tools 25, no. 03 (June 2016): 1650016. http://dx.doi.org/10.1142/s0218213016500160.
Full textAkremi, Aymen, Hassen Sallay, Mohsen Rouached, and Rafik Bouaziz. "Applying Digital Forensics to Service Oriented Architecture." International Journal of Web Services Research 17, no. 1 (January 2020): 17–42. http://dx.doi.org/10.4018/ijwsr.2020010102.
Full textHaryanto, Eri, and Imam Riadi. "Forensik Internet Of Things pada Device Level berbasis Embedded System." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 6 (December 2, 2019): 703. http://dx.doi.org/10.25126/jtiik.2019661828.
Full textLi, Xiu Zhi, Bao Ling Qin, Huan Qiu, and Song Min Jia. "Sparse Lp-Norm Based ICP for 3D Registration." Applied Mechanics and Materials 742 (March 2015): 433–36. http://dx.doi.org/10.4028/www.scientific.net/amm.742.433.
Full textBenancio, Lizbardo Orellano, Ricardo Muñoz Canales, Paolo Rodriguez Leon, and Enrique Lee Huamaní. "Integrity and Authenticity of Digital Images by Digital Forensic Analysis of Metadata." International Journal of Emerging Technology and Advanced Engineering 11, no. 9 (September 20, 2021): 38–45. http://dx.doi.org/10.46338/ijetae0921_05.
Full textKeim, Yansi, Yung Han Yoon, and Umit Karabiyik. "Digital Forensics Analysis of Ubuntu Touch on PinePhone." Electronics 10, no. 3 (February 1, 2021): 343. http://dx.doi.org/10.3390/electronics10030343.
Full textJankun-Kelly, T. J., David Wilson, Andrew S. Stamps, Josh Franck, Jeffery Carver, and J. Edward Swan. "Visual Analysis for Textual Relationships in Digital Forensic Evidence." Information Visualization 10, no. 2 (April 2011): 134–44. http://dx.doi.org/10.1057/ivs.2010.15.
Full textRiadi, Imam, Rusydi Umar, and Arizona Firdonsyah. "Forensic Tools Performance Analysis on Android-based Blackberry Messenger using NIST Measurements." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 3991. http://dx.doi.org/10.11591/ijece.v8i5.pp3991-4003.
Full textFerreira, Sara, Mário Antunes, and Manuel E. Correia. "A Dataset of Photos and Videos for Digital Forensics Analysis Using Machine Learning Processing." Data 6, no. 8 (August 5, 2021): 87. http://dx.doi.org/10.3390/data6080087.
Full textHariyadi, Dedy, Hendro Wijayanto, and Indah Daila Sari. "PAZIIM DIGITAL EVIDENCE ANALYSIS APPLICATION ON ANDROID SMARTPHONES WITH A LOGICAL ACQUISITION APPROACH." Cyber Security dan Forensik Digital 2, no. 2 (November 28, 2019): 52–56. http://dx.doi.org/10.14421/csecurity.2019.2.2.1603.
Full textB. Meshram, Bandu. "Digital Forensic Analysis of Hard Disk for Evidence Collection." International Journal of Cyber-Security and Digital Forensics 7, no. 2 (2018): 100–110. http://dx.doi.org/10.17781/p002372.
Full textLee, Aeri. "Intelligent Digital Forensic Analysis Method for CYBER CRIME INVESTIGATION." J-Institute 1, no. 2 (December 30, 2016): 8–13. http://dx.doi.org/10.22471/police.2016.1.2.08.
Full text