Journal articles on the topic 'Digital forensic process'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Digital forensic process.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Boateng, Bismark. "Mobile Device’s Digital Forensic Process Model." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 267–72. http://dx.doi.org/10.22624/aims/crp-bk3-p43.
Full textDr., J. Saravanesh. "RETROSPECTIVE VIEW OF DIGITAL FORENSIC PROCESS EMPHASISING COMPUTER FORENSICS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 5 (2019): 509–15. https://doi.org/10.5281/zenodo.3234978.
Full textSachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.
Full textAl Jum'ah, Muhammad Na'im, Hamid Wijaya, and Rima Ruktiari Ismail. "Implementasi Model Digital Forensik Procces Untuk Sosial Media Investigation Dengan Tools Hunchly." Cyber Security dan Forensik Digital 6, no. 2 (2024): 48–53. http://dx.doi.org/10.14421/csecurity.2023.6.2.4265.
Full textRochmadi, Tri, Abdul Fadlil, and Imam Riadi. "Tinjauan Pustaka Sistematis: Tantangan Dan Faktor-Faktor Pengembangan Kesiapan Forensik Digital." Cyber Security dan Forensik Digital 7, no. 2 (2024): 81–89. https://doi.org/10.14421/csecurity.2024.7.2.4861.
Full textBrown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.
Full textHakim, Muhamad Faishol, and Alamsyah Alamsyah. "Development of Digital Forensic Framework for Anti-Forensic and Profiling Using Open Source Intelligence in Cyber Crime Investigation." Recursive Journal of Informatics 2, no. 2 (2024): 114–23. http://dx.doi.org/10.15294/rji.v2i2.73731.
Full textAziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.
Full textVenter, Hein, and Ivan Burke. "The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks." JUCS - Journal of Universal Computer Science 18, no. (12) (2012): 1721–40. https://doi.org/10.3217/jucs-018-12-1721.
Full textHoldberh, Natalia, and Viktoriya Kolonska. "DIGITAL FORENSICS IN MARTIAL LAW." Scientific works of National Aviation University Series Law Journal "Air and Space Law" 4, no. 73 (2024): 213–18. https://doi.org/10.18372/2307-9061.73.19470.
Full textKohn, M. D., M. M. Eloff, and J. H. P. Eloff. "Integrated digital forensic process model." Computers & Security 38 (October 2013): 103–15. http://dx.doi.org/10.1016/j.cose.2013.05.001.
Full textFirdonsyah, Arizona, Purwanto Purwanto, and Imam Riadi. "Framework for Digital Forensic Ethical Violations: A Systematic Literature Review." E3S Web of Conferences 448 (2023): 01003. http://dx.doi.org/10.1051/e3sconf/202344801003.
Full textMalik, Basit Ahmad. "Provocations Open Problems Encountered By Digital Forensics Ensuing Trends in Near Future." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 879–83. https://doi.org/10.31142/ijtsrd16955.
Full textAlex, Makheti, Gilbert Gilibrays Ocen, Badru Lusiba, et al. "A Process Model to Enhance the Accuracy of Digital Forensic Investigations: A case of National Identification and Registration Authority (NIRA-Uganda)." East African Journal of Information Technology 5, no. 1 (2022): 216–43. http://dx.doi.org/10.37284/eajit.5.1.1015.
Full textBaroto, Wishnu Agung. "Advancing Digital Forensic through Machine Learning: An Integrated Framework for Fraud Investigation." Asia Pacific Fraud Journal 9, no. 1 (2024): 1–16. http://dx.doi.org/10.21532/apfjournal.v9i1.346.
Full textSaniyazova, Yerkemay, Renat Mediyev, Elmira Saitova, Gulzat Utegenova, and Aisaulem Kzylkhojayeva. "Advancing Forensic Science in Kazakhstan." Law, State and Telecommunications Review 16, no. 2 (2024): 48–68. https://doi.org/10.26512/lstr.v16i2.49190.
Full textGrobler, Marthie. "The Need for Digital Evidence Standardisation." International Journal of Digital Crime and Forensics 4, no. 2 (2012): 1–12. http://dx.doi.org/10.4018/jdcf.2012040101.
Full textNasrulloh, Imam Mahfudl, Sunardi Sunardi, and Imam Riadi. "Analisis Forensik Solid State Drive (SSD) Menggunakan Framework Rapid Response." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 5 (2019): 509. http://dx.doi.org/10.25126/jtiik.2019651516.
Full textArizona, Nanda Diaz, Muhammad Agung Nugroho, Ahmad Rois Syujak, Rizqi Kurniawan Saputra, and Istri Sulistyowati. "Metadata Forensic Analysis as Support for Digital Investigation Process by Utilizing Metadata-Extractor." Journal of Intelligent Software Systems 3, no. 2 (2024): 27. https://doi.org/10.26798/jiss.v3i2.1503.
Full textVadlamudi, Divya, Dr K. Thirupathi Rao, Pellakuri Vidyullatha, and B. AjasekharReddy. "Analysis on digital forensics challenges and anti-forensics techniques in cloud computing." International Journal of Engineering & Technology 7, no. 2.7 (2018): 1072. http://dx.doi.org/10.14419/ijet.v7i2.7.12230.
Full textAlexander, Cheryl Ann, and Lidong Wang. "Cyber Forensic Reporting: Benefits, Elements, Process, Expert Witnesses, and Ethical Considerations." International Journal of Criminology and Sociology 14 (July 10, 2025): 129–35. https://doi.org/10.6000/1929-4409.2025.14.12.
Full textNarayana Samy, Ganthan, Nurazean Maarop, Doris Hooi-Ten Wong, et al. "Proposed Proactive Digital Forensic Approach for Cloud Computing Environment." International Journal of Engineering & Technology 7, no. 4.15 (2018): 12. http://dx.doi.org/10.14419/ijet.v7i4.15.21362.
Full textTuharea, Ibnu Rohan, Ahmad Luthfi, and Erika Ramadani. "Enhancing Digital Forensic Investigation: A Focus on Compact Electronic Devices and Social Media Metadata." Journal of Information Systems and Informatics 5, no. 4 (2023): 1385–401. http://dx.doi.org/10.51519/journalisi.v5i4.594.
Full textLi, Yunkun, and Gabriela Mogos. "Digital forensics on Tencent QQ-instant messaging service in China." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (2022): 412. http://dx.doi.org/10.11591/ijeecs.v29.i1.pp412-420.
Full textLi, Yunkun, and Gabriela Mogos. "Digital forensics on Tencent QQ-instant messaging service in China." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (2023): 412–20. https://doi.org/10.11591/ijeecs.v29.i1.pp412-420.
Full textKausar Parveen. "Digital Investigations: Navigating Challenges in Tool Selection for Operating System Forensics." International Journal for Electronic Crime Investigation 8, no. 1 (2024): 79–92. http://dx.doi.org/10.54692/ijeci.2024.0801189.
Full textZamsari, Febriand Gysberth Pariela, and Teguh Wahyono. "Forensic Investigation of Digital Evidence on Flash Disk with Forensic Process Method Based on NIST." Jurnal Ecotipe (Electronic, Control, Telecommunication, Information, and Power Engineering) 11, no. 1 (2024): 88–96. http://dx.doi.org/10.33019/jurnalecotipe.v11i1.4489.
Full textIgonor, Oshoke Samson, Muhammad Bilal Amin, and Saurabh Garg. "The Application of Blockchain Technology in the Field of Digital Forensics: A Literature Review." Blockchains 3, no. 1 (2025): 5. https://doi.org/10.3390/blockchains3010005.
Full textHorsman, Graeme, and Nina Sunde. "Unboxing the digital forensic investigation process." Science & Justice 62, no. 2 (2022): 171–80. http://dx.doi.org/10.1016/j.scijus.2022.01.002.
Full textOmeleze, Stacey, and Hein S. Venter. "Digital forensic application requirements specification process." Australian Journal of Forensic Sciences 51, no. 4 (2017): 371–94. http://dx.doi.org/10.1080/00450618.2017.1374456.
Full textMantiri, Astria Santa Natalia, and Elvis Sumanti. "THE ROLE OF DIGITAL FORENSICS IN THE PRELIMINARY INVESTIGATION." Klabat Accounting Review 3, no. 1 (2022): 79. http://dx.doi.org/10.60090/kar.v3i1.821.79-95.
Full textWodugah, Francis. "SIFT Multi-Purpose Forensic Operating System For Digital Forensic Process." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 55–58. http://dx.doi.org/10.22624/aims/crp-bk3-p9.
Full textSurayyo, Yusupova, Radjabova Madina, Abdullayev Ibrohim, and Avazbekov Mirsaid. "RESEARCH CHALLENGES & OPEN PROBLEMS IN DIGITAL FORENSICS (DF)." RESEARCH AND EDUCATION 2, no. 1 (2023): 80–89. https://doi.org/10.5281/zenodo.7530249.
Full textJiang, Jian Guo, Bo Yang, Sen Lin, Ming Xing Zhang, and Kun Ying Liu. "A Practical Approach for Digital Forensic Triage." Applied Mechanics and Materials 742 (March 2015): 437–44. http://dx.doi.org/10.4028/www.scientific.net/amm.742.437.
Full textParra de Gallo, Herminia Beatriz, and Marcela Vegetti. "OntoFoCE and ObE Forensics. Email-traceability supporting tools for digital forensics." JUCS - Journal of Universal Computer Science 29, no. 12 (2023): 1482–509. http://dx.doi.org/10.3897/jucs.97822.
Full textParra, de Gallo Herminia Beatriz, and Marcela Vegetti. "OntoFoCE and ObE Forensics. Email-traceability supporting tools for digital forensics." JUCS - Journal of Universal Computer Science 29, no. (12) (2023): 1482–509. https://doi.org/10.3897/jucs.97822.
Full textAlqahtany, Saad Said, and Toqeer Ali Syed. "ForensicTransMonitor: A Comprehensive Blockchain Approach to Reinvent Digital Forensics and Evidence Management." Information 15, no. 2 (2024): 109. http://dx.doi.org/10.3390/info15020109.
Full textFakhriansyah, Amru Rizal, and Ahmad Luthfi. "Development of Xiaomi Product Mobile Forensic Acquisition Framework on Second Space Features Based on SNI/ISO 27037:2014." JURNAL INFOTEL 16, no. 2 (2024): 255–72. http://dx.doi.org/10.20895/infotel.v16i2.1091.
Full textMeshram, Bandu B., Vikas Mendhe, and Manish Kumar Singh. "Medical Forensics Principles and Cyber Crime Forensic Investigation Model." Journal of Web Applications and Cyber Security 2, no. 1 (2024): 1–17. http://dx.doi.org/10.48001/jowacs.2024.211-17.
Full textDwi Lestari, Yuyun, Yessi Fitri Annisah Lubis, and Fadli Akbar Siregar. "Analisis Perbandingan Kinerja Root Explorer Dan Oxygen Forensic Detective Pada Forensic Digital." Jurnal Syntax Fusion 3, no. 08 (2023): 832–46. http://dx.doi.org/10.54543/fusion.v3i08.350.
Full textMaulina, Sinta Nur, Niken Dwi Wahyu Cahyani, and Erwid Musthofa Jadied. "ANALYSIS OF THE EFFECT OF VSM ON THE MEMORY ACQUISITION PROCESS USING THE DYNAMIC ANALYSIS METHOD." JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 8, no. 2 (2023): 638–46. http://dx.doi.org/10.29100/jipi.v8i2.3745.
Full textMontasari, Reza. "A comprehensive digital forensic investigation process model." International Journal of Electronic Security and Digital Forensics 8, no. 4 (2016): 285. http://dx.doi.org/10.1504/ijesdf.2016.079430.
Full textLutui, Raymond. "A multidisciplinary digital forensic investigation process model." Business Horizons 59, no. 6 (2016): 593–604. http://dx.doi.org/10.1016/j.bushor.2016.08.001.
Full textWang, Jian, Zhen Min Tang, and Xian Li Jin. "An OCL-Based Formal Model for Cloud Forensics." Advanced Materials Research 989-994 (July 2014): 1513–16. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.1513.
Full textAidil Wijaya Kusuma, Erick Irawadi Alwi, and Ramdaniah Ramdaniah. "Analisis Bukti Digital Pada Media Penyimpanan Flash Disk Menggunakan Metode National Institute Of Standards And Technology (NIST)." Cyber Security dan Forensik Digital 7, no. 1 (2024): 18–24. http://dx.doi.org/10.14421/csecurity.2024.7.1.4345.
Full textAl Jouhi, Mariam, and Sara Al Hosani. "Windows Forensics Analysis." Emirati Journal of Policing & Security Studies 1, no. 1 (2022): 4–11. https://doi.org/10.54878/jagh3855.
Full textNahdli, Muhammad Fahmi Mubarok, Imam Riadi, and Muhammad Kunta Biddinika. "Comparison of Digital Forensic Tools for Drug Trafficking Cases on Instagram Messenger using NIST Method." Scientific Journal of Informatics 11, no. 4 (2024): 891–902. https://doi.org/10.15294/sji.v11i4.13463.
Full textShin, Dong-Hyuk, Seung-Ju Han, Yu-Bin Kim, and Ieck-Chae Euom. "Research on Digital Forensics Analyzing Heterogeneous Internet of Things Incident Investigations." Applied Sciences 14, no. 3 (2024): 1128. http://dx.doi.org/10.3390/app14031128.
Full textAdesoji, A. Adesina, Ariyo Adebiyi Ayodele, and K. Ayo Charles. "Identification of forensic artifacts from the registry of windows 10 device in relation to idrive cloud storage usage." Bulletin of Electrical Engineering and Informatics 11, no. 1 (2022): 521–29. https://doi.org/10.11591/eei.v11i1.3489.
Full textAdesina, Adesoji A., Ayodele Ariyo Adebiyi, and Charles K. Ayo. "Identification of forensic artifacts from the registry of windows 10 device in relation to idrive cloud storage usage." Bulletin of Electrical Engineering and Informatics 11, no. 1 (2022): 521–29. http://dx.doi.org/10.11591/eei.v11i1.3489.
Full text