Journal articles on the topic 'Digital Forensic investigations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Digital Forensic investigations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Aziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (April 2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.
Full textSabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.
Full textFerguson, R. I., Karen Renaud, Sara Wilford, and Alastair Irons. "PRECEPT: a framework for ethical digital forensics investigations." Journal of Intellectual Capital 21, no. 2 (March 9, 2020): 257–90. http://dx.doi.org/10.1108/jic-05-2019-0097.
Full textMualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 7, 2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.
Full textJiang, Jian Guo, Bo Yang, Sen Lin, Ming Xing Zhang, and Kun Ying Liu. "A Practical Approach for Digital Forensic Triage." Applied Mechanics and Materials 742 (March 2015): 437–44. http://dx.doi.org/10.4028/www.scientific.net/amm.742.437.
Full textZav’yalova, D. V. "Current Capacities of Digital Forensics for Investigations of Different Types of Crimes." Theory and Practice of Forensic Science 15, no. 3 (October 23, 2020): 89–97. http://dx.doi.org/10.30764/1819-2785-2020-3-89-97.
Full textKarabiyik, Umit, and Tugba Karabiyik. "A Game Theoretic Approach for Digital Forensic Tool Selection †." Mathematics 8, no. 5 (May 12, 2020): 774. http://dx.doi.org/10.3390/math8050774.
Full textMontasari, Reza, Richard Hill, Simon Parkinson, Pekka Peltola, Amin Hosseinian-Far, and Alireza Daneshkhah. "Digital Forensics." International Journal of Organizational and Collective Intelligence 10, no. 2 (April 2020): 37–53. http://dx.doi.org/10.4018/ijoci.2020040103.
Full textLi, Xiu Zhi, Bao Ling Qin, Huan Qiu, and Song Min Jia. "Sparse Lp-Norm Based ICP for 3D Registration." Applied Mechanics and Materials 742 (March 2015): 433–36. http://dx.doi.org/10.4028/www.scientific.net/amm.742.433.
Full textNortje, Jacobus Gerhardus, and Daniel Christoffel Myburgh. "The Search and Seizure of Digital Evidence by Forensic Investigators in South Africa." Potchefstroom Electronic Law Journal 22 (April 25, 2019): 1–42. http://dx.doi.org/10.17159/1727-3781/2019/v22i0a4886.
Full textInglot, Bartosz, and Lu Liu. "Enhanced Timeline Analysis for Digital Forensic Investigations." Information Security Journal: A Global Perspective 23, no. 1-2 (January 2, 2014): 32–44. http://dx.doi.org/10.1080/19393555.2014.897401.
Full textOverill, Richard E., Jantje A. M. Silomon, and Keith A. Roscoe. "Triage template pipelines in digital forensic investigations." Digital Investigation 10, no. 2 (September 2013): 168–74. http://dx.doi.org/10.1016/j.diin.2013.03.001.
Full textChristinina, E. V. "ON THE USE OF DIGITAL LOGISTICS IN CRIMINAL PROCEEDINGS AND CRIMINALISTICS." Juridical Journal of Samara University 6, no. 3 (September 28, 2020): 128–32. http://dx.doi.org/10.18287/2542-047x-2020-6-3-128-132.
Full textWilson-Kovacs, Dana. "Digital media investigators: challenges and opportunities in the use of digital forensics in police investigations in England and Wales." Policing: An International Journal 44, no. 4 (May 7, 2021): 669–82. http://dx.doi.org/10.1108/pijpsm-02-2021-0019.
Full textVeber, Jaromír, Lea Nedomová, and Petr Doucek. "Corporate Digital Incident Investigation." Quality Innovation Prosperity 20, no. 1 (June 30, 2016): 57. http://dx.doi.org/10.12776/qip.v20i1.656.
Full textLizarti, Nora, Bambang Sugiantoro, and Yudi Prayudi. "PENERAPAN COMPOSITE LOGIC DALAM MENGKOLABORASIKAN FRAMEWORK TERKAIT MULTIMEDIA FORENSIK." JISKA (Jurnal Informatika Sunan Kalijaga) 2, no. 1 (August 29, 2017): 26. http://dx.doi.org/10.14421/jiska.2017.21-04.
Full textYadav, Priya R. "Review Paper on Introduction to Cyber Forensics." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (August 31, 2021): 1939–42. http://dx.doi.org/10.22214/ijraset.2021.37684.
Full textRiadi, Imam, Anton Yudhana, and Mushab Al Barra. "Forensik Mobile pada Layanan Media Sosial LinkedIn." JISKA (Jurnal Informatika Sunan Kalijaga) 6, no. 1 (January 20, 2021): 9–20. http://dx.doi.org/10.14421/jiska.2021.61-02.
Full textOstrovsky, Oleg A. "THE VALUE OF DIGITAL EVIDENCE IN CRIMINAL INVESTIGATIONS." RUDN Journal of Law 23, no. 1 (December 15, 2019): 123–40. http://dx.doi.org/10.22363/2313-2337-2019-23-1-123-140.
Full textAkremi, Aymen, Hassen Sallay, Mohsen Rouached, and Rafik Bouaziz. "Applying Digital Forensics to Service Oriented Architecture." International Journal of Web Services Research 17, no. 1 (January 2020): 17–42. http://dx.doi.org/10.4018/ijwsr.2020010102.
Full textPolański, Jan. "Dawn Raids and the Role of Forensic IT in Antitrust Investigations." Yearbook of Antitrust and Regulatory Studies 12, no. 21 (2020): 187–218. http://dx.doi.org/10.7172/1689-9024.yars.2020.13.21.7.
Full textKloosterman, Ate, Anna Mapes, Zeno Geradts, Erwin van Eijk, Carola Koper, Jorrit van den Berg, Saskia Verheij, Marcel van der Steen, and Arian van Asten. "The interface between forensic science and technology: how technology could cause a paradigm shift in the role of forensic institutes in the criminal justice system." Philosophical Transactions of the Royal Society B: Biological Sciences 370, no. 1674 (August 5, 2015): 20140264. http://dx.doi.org/10.1098/rstb.2014.0264.
Full textSarkar, Niladri. "Risk Mitigation and Quality Assurance in Digital Forensic Investigations." International Journal of Scientific and Research Publications (IJSRP) 9, no. 6 (June 6, 2019): p9022. http://dx.doi.org/10.29322/ijsrp.9.06.2019.p9022.
Full textDagher, Gaby G., and Benjamin C. M. Fung. "Subject-based semantic document clustering for digital forensic investigations." Data & Knowledge Engineering 86 (July 2013): 224–41. http://dx.doi.org/10.1016/j.datak.2013.03.005.
Full textBas Seyyar, M., and Z. J. M. H. Geradts. "Privacy impact assessment in large-scale digital forensic investigations." Forensic Science International: Digital Investigation 33 (June 2020): 200906. http://dx.doi.org/10.1016/j.fsidi.2020.200906.
Full textHargreaves, Christopher, and Jonathan Patterson. "An automated timeline reconstruction approach for digital forensic investigations." Digital Investigation 9 (August 2012): S69—S79. http://dx.doi.org/10.1016/j.diin.2012.05.006.
Full textPreda, Marius. "Digital Forensics of Internet of Things Smart Heating System Investigation." Journal of Military Technology 3, no. 1 (June 26, 2020): 23–28. http://dx.doi.org/10.32754/jmt.2020.1.04.
Full textNour Mohammad, Hasan Fayyad-Kazan, Mohamad Saab. "Anti- Forensics: The Tampering of Media." International Journal on Recent and Innovation Trends in Computing and Communication 8, no. 10 (October 31, 2020): 06–30. http://dx.doi.org/10.17762/ijritcc.v8i10.5447.
Full textBatten, Lynn, Lei Pan, and Nisar Khan. "Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations." International Journal of Digital Crime and Forensics 4, no. 4 (October 2012): 1–14. http://dx.doi.org/10.4018/jdcf.2012100101.
Full textM. Karie, Nickson. "Knowledge Management as a Strategic Asset in Digital Forensic Investigations." International Journal of Cyber-Security and Digital Forensics 7, no. 1 (2018): 10–20. http://dx.doi.org/10.17781/p002311.
Full textMontasari, Reza. "A standardised data acquisition process model for digital forensic investigations." International Journal of Information and Computer Security 9, no. 3 (2017): 229. http://dx.doi.org/10.1504/ijics.2017.085139.
Full textMontasari, Reza. "A standardised data acquisition process model for digital forensic investigations." International Journal of Information and Computer Security 9, no. 3 (2017): 229. http://dx.doi.org/10.1504/ijics.2017.10005908.
Full textHorsman, Graeme. "The different types of reports produced in digital forensic investigations." Science & Justice 61, no. 5 (September 2021): 627–34. http://dx.doi.org/10.1016/j.scijus.2021.06.009.
Full textSudyana, Didik, Reza Tanujiwa Putra, and Soni Soni. "Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037:2014." Sinkron 3, no. 2 (March 9, 2019): 67–72. http://dx.doi.org/10.33395/sinkron.v3i2.10029.
Full textHo, Shuyuan Mary, and Mike Burmester. "Cyber Forensics on Internet of Things: Slicing and Dicing Raspberry Pi." International Journal of Cyber Forensics and Advanced Threat Investigations 2, no. 1 (May 22, 2021): 29–49. http://dx.doi.org/10.46386/ijcfati.v2i1.22.
Full textKim, Soram, Myungseo Park, Sehoon Lee, and Jongsung Kim. "Smart Home Forensics—Data Analysis of IoT Devices." Electronics 9, no. 8 (July 28, 2020): 1215. http://dx.doi.org/10.3390/electronics9081215.
Full textKeim, Yansi, Yung Han Yoon, and Umit Karabiyik. "Digital Forensics Analysis of Ubuntu Touch on PinePhone." Electronics 10, no. 3 (February 1, 2021): 343. http://dx.doi.org/10.3390/electronics10030343.
Full textPaligu, Furkan, and Cihan Varol. "Browser Forensic Investigations of WhatsApp Web Utilizing IndexedDB Persistent Storage." Future Internet 12, no. 11 (October 28, 2020): 184. http://dx.doi.org/10.3390/fi12110184.
Full textYeboah-Boateng, Ezer Osei, and Elvis Akwa-Bonsu. "Digital Forensic Investigations: Issues of Intangibility, Complications and Inconsistencies in Cyber-crimes." Journal of Cyber Security and Mobility 4, no. 2 (2016): 87–104. http://dx.doi.org/10.13052/jcsm2245-1439.425.
Full textEskidere, Ömer. "Source Digital Voice Recorder Identification by Wavelet Analysis." International Journal on Artificial Intelligence Tools 25, no. 03 (June 2016): 1650016. http://dx.doi.org/10.1142/s0218213016500160.
Full textÇakır, Huseyin, and Mehmet Serkan Kılıç. "The keyword search method and its importance in computer forensics Adli bilişimde anahtar kelime araması metodu ve önemi." Journal of Human Sciences 13, no. 1 (April 26, 2016): 2368. http://dx.doi.org/10.14687/ijhs.v13i1.3401.
Full textFaheem, Muhammad, Tahar Kechadi, and Nhien An Le-Khac. "The State of the Art Forensic Techniques in Mobile Cloud Environment." International Journal of Digital Crime and Forensics 7, no. 2 (April 2015): 1–19. http://dx.doi.org/10.4018/ijdcf.2015040101.
Full textKim, Yunhyong, and Seamus Ross. "Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving." International Journal of Digital Curation 7, no. 2 (October 23, 2012): 21–39. http://dx.doi.org/10.2218/ijdc.v7i2.227.
Full textRenaud, Karen, Ivano Bongiovanni, Sara Wilford, and Alastair Irons. "PRECEPT-4-Justice: A bias-neutralising framework for digital forensics investigations." Science & Justice 61, no. 5 (September 2021): 477–92. http://dx.doi.org/10.1016/j.scijus.2021.06.003.
Full textGraeme, Horsman. "Part 1:- quality assurance mechanisms for digital forensic investigations: Introducing the Verification of Digital Evidence (VODE) framework." Forensic Science International: Reports 2 (December 2020): 100038. http://dx.doi.org/10.1016/j.fsir.2019.100038.
Full textHaggerty, John, Sheryllynne Haggerty, and Mark Taylor. "Forensic triage of email network narratives through visualisation." Information Management & Computer Security 22, no. 4 (October 7, 2014): 358–70. http://dx.doi.org/10.1108/imcs-11-2013-0080.
Full textLEE, Sangwook, Ji Eun SONG, Wan Yeon LEE, Young Woong KO, and Heejo LEE. "Integrity Verification Scheme of Video Contents in Surveillance Cameras for Digital Forensic Investigations." IEICE Transactions on Information and Systems E98.D, no. 1 (2015): 95–97. http://dx.doi.org/10.1587/transinf.2014mul0001.
Full textDolliver, Diana S., Carson Collins, and Beau Sams. "Hybrid approaches to digital forensic investigations: A comparative analysis in an institutional context." Digital Investigation 23 (December 2017): 124–37. http://dx.doi.org/10.1016/j.diin.2017.10.005.
Full textOverill, Richard E., and Jan Collie. "Quantitative evaluation of the results of digital forensic investigations: a review of progress." Forensic Sciences Research 6, no. 1 (January 2, 2021): 13–18. http://dx.doi.org/10.1080/20961790.2020.1837429.
Full textNaru, A. S., and E. Dykes. "Digital image cross-correlation technique for bite mark investigations." Science & Justice 37, no. 4 (October 1997): 251–58. http://dx.doi.org/10.1016/s1355-0306(97)72199-3.
Full text