To see the other types of publications on this topic, follow the link: Forensic analysis.

Journal articles on the topic 'Forensic analysis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Forensic analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.

Full text
Abstract:
This paper aims to analyze different tools for Forensic Data Analysis comes under the branch of Digital Forensics. Forensic data analysis is done with digital techniques. Digital forensics becomes more important in law enforcement, due to the large use of computers and mobile devices. The pattern recognition system most appropriately fits into the Analysis Phase of the Digital Forensics. Pattern Recognition involves two processes. One Process is an analysis and the second process is recognition. The result of the analysis is taken out of the attributes from the patterns to be recognized i.e.,
APA, Harvard, Vancouver, ISO, and other styles
2

Antwi, Paul. "Device Information for Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 373–78. http://dx.doi.org/10.22624/aims/crp-bk3-p59.

Full text
Abstract:
This document provides an overview of information for forensic analysis related to device name, serial number and model of devices used to connect to social networking platforms. The increasing use of social networking applications on smartphones makes these devices a gold mine for forensic researchers. Potential evidence can be captured on these devices and recovered with the right tools and research methods. The increasing proliferation of network devices in homes and buildings increases the possibilities of finding digital traces relevant to an investigation, physical or virtual: cyber-atta
APA, Harvard, Vancouver, ISO, and other styles
3

Dodoo, Herbert Cyril. "Deep Learning (DL) Oriented Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 321–28. http://dx.doi.org/10.22624/aims/crp-bk3-p51.

Full text
Abstract:
Cyber-attacks are now more prevalent than ever before in all aspects of our daily lives. As a result of this circumstance, both individuals and organizations are fighting cybercrime on a regular basis. Furthermore, today's hackers have advanced a step further and are capable of employing complex cyber-attack strategies, exacerbating the problem. Some of these approaches are minute and undetectable, and they frequently masquerade as genuine requests and directives. To combat this threat, cyber security professionals, as well as digital forensic investigators, are constantly compelled to filter
APA, Harvard, Vancouver, ISO, and other styles
4

Sabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.

Full text
Abstract:
This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing prevention knowledge and lessons learned. The authors also introduce a compact cyber forens
APA, Harvard, Vancouver, ISO, and other styles
5

Haoyang, Xie, Jiang Keyu, Yuan Xiaohong, and Zeng Hongbiao. "FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION." FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION 4, no. 2 (2012): 121–34. https://doi.org/10.5281/zenodo.3247268.

Full text
Abstract:
Windows Registry forensics is an important branch of computer and network forensics. Windows Registry is often considered as the heart of Windows Operating Systems because it contains all of the configuration setting of specific users, groups, hardware, software, and networks. Therefore, Windows Registry can be viewed as a gold mine of forensic evidences which could be used in courts. This paper introduces the basics of Windows Registry, describes its structure and its keys and subkeys that have forensic values. This paper also discusses how the Windows Registry forensic keys can be applied in
APA, Harvard, Vancouver, ISO, and other styles
6

Al Jouhi, Mariam, and Sara Al Hosani. "Windows Forensics Analysis." Emirati Journal of Policing & Security Studies 1, no. 1 (2022): 4–11. https://doi.org/10.54878/jagh3855.

Full text
Abstract:
Computer forensics investigates crimes on digital devices hard disk and any other digital storage devices to determine the evidence of any unauthorized access. Essentially, forensic investigators conduct forensic analysis with the help of different approaches (Static and Dynamic) and also tools like ProDiscover, Encase, Accessdata FTK and Autopsy to guarantee the security of a system in an organization. The process requires knowledge of different registry, laws, and regulations related to computer crimes, the operating system (Windows, Linux, etc.) and the network in an organization (e.g., Win
APA, Harvard, Vancouver, ISO, and other styles
7

Maulina, Sinta Nur, Niken Dwi Wahyu Cahyani, and Erwid Musthofa Jadied. "ANALYSIS OF THE EFFECT OF VSM ON THE MEMORY ACQUISITION PROCESS USING THE DYNAMIC ANALYSIS METHOD." JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 8, no. 2 (2023): 638–46. http://dx.doi.org/10.29100/jipi.v8i2.3745.

Full text
Abstract:
At first, forensics was restricted to studying data that was stored on a system's hard disk. However, as storage capacity and data encryption increased, applying conventional digital forensic procedures became more challenging. As a result, memory forensics techniques are developed, or are frequently referred to as live forensics, because the process is quicker and more sophisticated. Volatile memory forensics, often known as live forensics, are necessary for this condition. Live forensics has flaws, specifically that some programs can fail when the computer is in active VSM (virtual secure mo
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Sang Young. "Mobile Digital Forensics Framework for Smartphone User Analysis." Webology 19, no. 1 (2022): 4335–51. http://dx.doi.org/10.14704/web/v19i1/web19285.

Full text
Abstract:
Blockchain-based digital forensics technology is an efficient way to prevent forgery/modulation of evidence including collecting and analyzing evidential data using the technology in compliance with smartphone forensics procedures after a smartphone is seized. Moreover, the use of large-capacity storage devices and various digital devices have become a realistic solution for its development of IT in situations where the existing digital forensics analysis methods are regarded as limitations. This paper analyzed user’s status on smartphone application and implemented a smartphone user analysis
APA, Harvard, Vancouver, ISO, and other styles
9

Lim, Michelle Chee Ern, Brandon Hong Chow Chen, Le Ying Lim, et al. "Analysis of Forensic Disk Imaging Tools for Data Acquisition and Preservation." Journal of Informatics and Web Engineering 4, no. 2 (2025): 158–81. https://doi.org/10.33093/jiwe.2025.4.2.11.

Full text
Abstract:
The identification, preservation, analysis, and presentation of electronic evidence to support legal or organizational inquiries constitute the discipline of digital forensics, which is crucial to contemporary investigations. A crucial component of forensic inquiry, disk imaging guarantees precision, dependability, and legal defensibility. To preserve the original evidence, disk imaging makes an identical, bit-by-bit duplicate of a digital storage device, capturing hidden data, deleted material, and active files. Given the critical role of disk imaging in forensic investigations, selecting the
APA, Harvard, Vancouver, ISO, and other styles
10

Dwi Syahputri, Rischi, Alexander Anggono, Prasetyono Prasetyono, and Mohamad Djasuli. "Evolution and Research Opportunities of Digital Forensic Tools: A Bibliometric Analysis." CogITo Smart Journal 10, no. 2 (2024): 474–85. https://doi.org/10.31154/cogito.v10i2.675.474-485.

Full text
Abstract:
The use of digital technology has increased rapidly, presenting new challenges such as cybercrime, online fraud and money laundering. To address these threats, digital forensic tools have become crucial in investigating and analyzing electronic evidence to combat increasingly complex digital crimes. Therefore, research and development in the field of digital forensics is crucial to address the growing digital security challenges. This study aims to conduct a bibliometric analysis of digital forensic tools research in the business, management and accounting domains over the past ten years, eval
APA, Harvard, Vancouver, ISO, and other styles
11

Qureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, and Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.

Full text
Abstract:
Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and detection of community assaults. It covers the necessity for dedicated investigative abilities. When you look at the design, this indeed currently allows investigating harmful behavior in communities. It will help organizations to examine external and community this is undoubtedly around. It is also important for police force investigations. Network forensic techniques can be used to identify the source of the intrusion and the intruder’s location. Forensics can resolve many c
APA, Harvard, Vancouver, ISO, and other styles
12

Adeyemi, Ikuesan R., Shukor Abd Razak, and Nor Amira Nor Azhan. "A Review of Current Research in Network Forensic Analysis." International Journal of Digital Crime and Forensics 5, no. 1 (2013): 1–26. http://dx.doi.org/10.4018/jdcf.2013010101.

Full text
Abstract:
Establishing facts on cyber crime is gradually gaining wider relevance in prosecuting cyber criminals. The branch of cyber policing saddled with this responsibility is the network forensic community (researchers, developer, and investigator). However, the recurring rate of advances in cybercrime poses greater challenge to the available improvements in network forensics analysis tools (NFAT) as well as to investigators, and ultimately, researchers. The need for an efficient cutting-edge research finding in curbing network crimes therefore is undeniably critical. This paper describes the distinc
APA, Harvard, Vancouver, ISO, and other styles
13

Asamoah, Jonas Takyi. "Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness." Advances in Multidisciplinary and scientific Research Journal Publication 1 (July 26, 2022): 307–14. http://dx.doi.org/10.22624/aims/crp-bk3-p49.

Full text
Abstract:
The usage of digital technology in the digital forensic investigation has grown in tandem with the rising importance of technology today. Too many incidences of digital and physical crime which is the focus of the world nowadays. To gather the finest evidence and investigative outcomes, a digital forensic model must be established. This study included a review of the literature on digital forensics and models established in digital forensics. According to the findings, the majority of research involves broad inquiries and procedures that overlap. Furthermore, no model has been developed to des
APA, Harvard, Vancouver, ISO, and other styles
14

Alotaibi, Fahad Mazaed, Arafat Al-Dhaqm, Yasser D. Al-Otaibi, and Abdulrahman A. Alsewari. "A Comprehensive Collection and Analysis Model for the Drone Forensics Field." Sensors 22, no. 17 (2022): 6486. http://dx.doi.org/10.3390/s22176486.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) are adaptable and rapid mobile boards that can be applied to several purposes, especially in smart cities. These involve traffic observation, environmental monitoring, and public safety. The need to realize effective drone forensic processes has mainly been reinforced by drone-based evidence. Drone-based evidence collection and preservation entails accumulating and collecting digital evidence from the drone of the victim for subsequent analysis and presentation. Digital evidence must, however, be collected and analyzed in a forensically sound manner using the ap
APA, Harvard, Vancouver, ISO, and other styles
15

AL-Hadi, Fatima Ismail, and Nagi Ali Al-Shaibany. "Digital Forensic Accounting: An Overview." International Journal of Computer Science and Mobile Computing 13, no. 8 (2024): 99–106. http://dx.doi.org/10.47760/ijcsmc.2024.v13i08.011.

Full text
Abstract:
Forensic analysis has become crucial for detecting financial crimes such as fraud, extortion, money laundering, and tax evasion in a rapidly evolving world. This type of analysis is also essential for promoting economic development and enhancing public trust in governments. As fraud strategies advance alongside rapid digital innovations, traditional forensic accounting relies on manual data examination and is increasingly inadequate for addressing sophisticated criminal fraud. The rise in cybercrime underscores digital forensics' need to conduct effective investigations. This study provides an
APA, Harvard, Vancouver, ISO, and other styles
16

Sangwan, Preeti, Tarsem Nain, Priyanka Yadav, and Neelkamal Sharma. "Molecular Approaches in Soil Microbial Analysis: Forensic Perspective." Biosciences Biotechnology Research Asia 20, no. 2 (2023): 367–79. http://dx.doi.org/10.13005/bbra/3096.

Full text
Abstract:
The growing field of soil microbial forensics provides the legal answer to how microorganisms play a crucial role in criminal investigations. It is an advanced crossdisciplinary science capable of offering significant physical evidence with considerable interest in criminal investigations, environmental crime, and counterterrorism. Microbial forensics of soil consists of different techniques to identify and evaluate microbial abundance, their complexity, and their interaction with soil and surrounding objects. The present review highlights various microbial analysis techniques such as Terminal
APA, Harvard, Vancouver, ISO, and other styles
17

Ghanem, Mohamed Chahine, Eduardo Almeida Palmieri, Wiktor Sowinski-Mydlarz, Sahar Al-Sudani, and Dipo Dunsin. "Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine." IoT 6, no. 1 (2025): 18. https://doi.org/10.3390/iot6010018.

Full text
Abstract:
The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities. This research focuses on the forensic analysis capabilities of Raspberry Pi devices configured with Kali Linux, comparing their forensic capabilities to conventional PC-based forensic investigations. The study identifies key gaps in existing IoT forensic methodologies, including limited tool compatibility, constrained data retention, and difficulties in live memory analysis due
APA, Harvard, Vancouver, ISO, and other styles
18

Sukamto, Pria, Ispandi, Arman Syah Putra, Nurul Aisyah, and Rohmat Toufiq. "Forensic Digital Analysis for CCTV Video Recording." International Journal of Science, Technology & Management 3, no. 1 (2022): 284–91. http://dx.doi.org/10.46729/ijstm.v3i1.460.

Full text
Abstract:
The background of this research is how to make a video that can be analyzed as forensic data to prove the truth of the video, therefore with forensics it can be used as evidence if the video contains incorrect data or contains data capable of crime so that it can be used as data forensics. The method used in this study is to use the literature review method which uses the basis of many previous studies. From journals and books based on similar research, so that it can help develop existing problems to the latest problems so that they can find novelty in this research. The problem raised in thi
APA, Harvard, Vancouver, ISO, and other styles
19

Goc, Mieczysław, Piotr Jastrzębski, and Dorota Semków. "COMPARATOR – a Universal Application for Forensic Comparative Examinations and a Statistical Analysis of Sample Parameters." PRZEGLĄD POLICYJNY 150, no. 2 (2023): 246–71. http://dx.doi.org/10.5604/01.3001.0053.8542.

Full text
Abstract:
In recent years, both in Poland and abroad, computer analysis methods have been increasingly used in forensic examinations. The article presents the operation and functionality of the computer program called COMPARATOR which is a joint project of the Polish Forensic Associationand its Institute of Criminalistics. The COMPARATOR program is used for registration and presentation of images (samples) of handwriting, documents or their fragments as well as various types of forensic traces in 8 windows. The program allows of numerous useful operations in comparative and identification forensic analy
APA, Harvard, Vancouver, ISO, and other styles
20

Hikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.

Full text
Abstract:
As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and cr
APA, Harvard, Vancouver, ISO, and other styles
21

Okan, Emmanuel Tettey. "Forensic Analysis on Streaming Multimedia." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 221–26. http://dx.doi.org/10.22624/aims/crp-bk3-p36.

Full text
Abstract:
Since the advent of technology and digitalization of multimedia, there has been a massive increase in cybercrime. During streaming, with the availability of a network or internet source, multimedia; audio and visual can easily be accessed whiles being aired live. This technology dates as far back as 1990s. Similar to still videos and images, the user is able to download, pause, reverse or forward the show. The ability to stream multimedia has made it easier for users to partake or retrieve multimedia from the comfort of their homes, offices or personal spaces without necessarily being present.
APA, Harvard, Vancouver, ISO, and other styles
22

Dumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.

Full text
Abstract:
The article deals with some aspects of digitalization of forensic activity, such as improving the efficiency of search and cognitive activity of an investigator using digital technologies, and effective organization of such activity. Use of computer hardware, software, various computer and digital technologies and scripting to investigate crimes. The definitions of “digital trace” and “virtual trace” demonstrate the complexity of these issues. Certain dynamic movement of criminal activity in the information environment is analyzed. Defines the concept of virtual trace as a specific trace of ce
APA, Harvard, Vancouver, ISO, and other styles
23

Vadlamudi, Divya, Dr K. Thirupathi Rao, Pellakuri Vidyullatha, and B. AjasekharReddy. "Analysis on digital forensics challenges and anti-forensics techniques in cloud computing." International Journal of Engineering & Technology 7, no. 2.7 (2018): 1072. http://dx.doi.org/10.14419/ijet.v7i2.7.12230.

Full text
Abstract:
In the modern life, there is a rapid increase in the usage of the technology. One reason of increasing the technology is usage of cloud. The mobile devices or any other technological devices mainly depend on cloud. The cloud can be accessible from anywhere. Cloud forensic process had introduced to help the investigators to find the evidence when the criminal attacks the cloud and to maintain the integrity and security for the data stored in the cloud. The increasing in the criminal attacks in cloud, made the investigators to find the latest methods for the forensic investigation process. Simil
APA, Harvard, Vancouver, ISO, and other styles
24

Faiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.

Full text
Abstract:
Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of
APA, Harvard, Vancouver, ISO, and other styles
25

Sonali, Ekhande, Patil Uttam, and Vishwanath Kulhalli Kshama. "Review on effectiveness of deep learning approach in digital forensics." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5481–92. https://doi.org/10.11591/ijece.v12i5.pp5481-5492.

Full text
Abstract:
Cyber forensics is use of scientific methods for definite description of cybercrime activities. It deals with collecting, processing and interpreting digital evidence for cybercrime analysis. Cyber forensic analysis plays very important role in criminal investigations. Although lot of research has been done in cyber forensics, it is still expected to face new challenges in near future. Analysis of digital media specifically photographic images, audio and video recordings are very crucial in forensics This paper specifically focus on digital forensics. There are several methods for digital fore
APA, Harvard, Vancouver, ISO, and other styles
26

Kroz, M. V., and N. A. Ratinova. "History and Current State of Forensic Analysis of Extremist Materials." Theory and Practice of Forensic Science, no. 3(43) (September 30, 2016): 146–54. http://dx.doi.org/10.30764/64/1819-2785-2016-3-146-154.

Full text
Abstract:
The paper looks at the history and current state of forensic analysis of the content and intentionality of contentious (extremist) materials. It discusses different approaches based in linguistics, psychology, and social sciences/humanities, as well as issues relating to integrated forensic psycholinguistic analysis. Techniques and methodological recommendations described in the paper were developed by the experts of the Research Institute for Law and Order of the Prosecutor General's Office of the Russian Federation, various national forensic organizations, such as the Russian Federal Center
APA, Harvard, Vancouver, ISO, and other styles
27

Amparbeng, Maxwell. "Inaccessibility of Services as a Threat to Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 29–34. http://dx.doi.org/10.22624/aims/crp-bk3-p5.

Full text
Abstract:
Computer and Internet-based crimes are widespread problems that affect a vast number of individuals. Combating such criminals has become a difficult task for competent authorities, as it has enabled a new wave of criminal activity. This phenomenon has drew the attention of security and justice systems all over the world, and these institutions must now deal with the task of reforming and redefining the laws and methodologies used to investigate computer-related criminal activity (Garfinkel, 2010). On the other hand cybercriminals are also making use of existing technologies or systems and new
APA, Harvard, Vancouver, ISO, and other styles
28

Alotaibi, Fahad Mazaed, Arafat Al-Dhaqm, and Yasser D. Al-Otaibi. "A Novel Forensic Readiness Framework Applicable to the Drone Forensics Field." Computational Intelligence and Neuroscience 2022 (February 28, 2022): 1–13. http://dx.doi.org/10.1155/2022/8002963.

Full text
Abstract:
The Drone Forensics (DRFs) field is a branch of digital forensics, which involves the identification, capture, preservation, reconstruction, analysis, and documentation of drone incidents. Several models have been proposed in the literature for the DRF field, which generally discusses DRF from a reactive forensic perspective; however, the proactive forensic perspective is missing. Therefore, this paper proposes a novel forensic readiness framework called Drone Forensics Readiness Framework (DRFRF) using the design science method. It consists of two stages: (i) proactive forensic stage and (ii)
APA, Harvard, Vancouver, ISO, and other styles
29

Ekhande, Sonali, Uttam Patil, and Kshama Vishwanath Kulhalli. "Review on effectiveness of deep learning approach in digital forensics." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5481. http://dx.doi.org/10.11591/ijece.v12i5.pp5481-5592.

Full text
Abstract:
<p><span>Cyber forensics is use of scientific methods for definite description of cybercrime activities. It deals with collecting, processing and interpreting digital evidence for cybercrime analysis. Cyber forensic analysis plays very important role in criminal investigations. Although lot of research has been done in cyber forensics, it is still expected to face new challenges in near future. Analysis of digital media specifically photographic images, audio and video recordings are very crucial in forensics This paper specifically focus on digital forensics. There are several met
APA, Harvard, Vancouver, ISO, and other styles
30

Saragih, Naikson, Ridho Agus Wery Nanda Panjaitan, and Mufria Jonatan Purba. "FORENSIC NETWORK ANALYSIS AND IMPLEMENTATION OF SECURITY ATTACKS ON VIRTUAL PRIVATE SERVERS." Jurnal Sistem Informasi dan Ilmu Komputer Prima(JUSIKOM PRIMA) 6, no. 2 (2023): 28–34. http://dx.doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932.

Full text
Abstract:
ABSTRACT-PT Kodinglab Integrasi Indonesia's Virtual Private Server (VPS) product requires good quality standards, including security. The challenge that arises is still frequent disruptions to the protection of PT Kodinglab's VPS customers, where it is difficult to identify the source of the attack. Network forensics in the form of dead forensics and live forensics using the NIST method with the stages of collection, examination, Analysis, and reporting are used to find the source of the attack. Data for dead forensics comes from snort tools, and data for live forensics comes from capture Wire
APA, Harvard, Vancouver, ISO, and other styles
31

Mualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.

Full text
Abstract:
Kejahatan konvensial yang terekam kamera CCTV (Closed Circuit Televison) semakin banyak ditemukan di masyarakat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Kamera CCTV memiliki peran penting dalam keamanan, banyak diantaranya hasil tangkapan rekaman kamera CCTV dijadikan sebagai alat bukti digital. Tantangannya adalah bagaimana teknik yang diperlukan untuk penanganan khusus investigasi digital forensik dalam mencari bukti ditgital rekaman kamera CCTV menggunakan metode live forensik, yaitu ketika barang bukti
APA, Harvard, Vancouver, ISO, and other styles
32

Syed Khurram Hassan and Hafiza Hadia Shehzad. "The Nanoforensic: An Advanced Perspective in Crime Investigation." International Journal for Electronic Crime Investigation 7, no. 1 (2023): 33–38. http://dx.doi.org/10.54692/ijeci.2023.0701126.

Full text
Abstract:
Nano forensics is the advanced application of nanotechnology-based techniques to resolve cases in forensic science. Forensic science offers scientific methods in a criminal investigation. Nano-forensics deals with the development of new approaches for fingerprint visualization, DNA isolation, forensic toxicology, explosive detection, identification of body fluids, gunshot residue analysis, detection of illicit drugs, etc. The nanomaterials used in forensic science are nanocrystals, nanoparticles, quantum dots, nanobelts, nanocomposites, nanoclusters, nanotubes, nanorods, etc. The scope of nano
APA, Harvard, Vancouver, ISO, and other styles
33

Yu, Shilong, Binglong Li, Lin Zhu, et al. "Tencent Meeting forensics based on memory reverse analysis." PeerJ Computer Science 11 (June 17, 2025): e2963. https://doi.org/10.7717/peerj-cs.2963.

Full text
Abstract:
Tencent Meeting, an instant meeting software, is widely used at present, but no research has been conducted on its forensics. Since the real-time data generated by such software during meetings will not be stored in the computer disk, the traditional disk forensics method against such software is no longer applicable and needs to obtain evidence through memory analysis. To extract meeting data transmitted during meetings, this article proposes a method for Tencent Meeting forensics based on memory reverse analysis. First, by analyzing the process storage and metadata format of Tencent Meeting
APA, Harvard, Vancouver, ISO, and other styles
34

Hamed, Abdul Sallam Said. "Digital Forensic: Techniques, Challenges, and Future Direction." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 5869–73. https://doi.org/10.22214/ijraset.2025.71562.

Full text
Abstract:
Digital forensics is now a crucial field of study in cybersecurity and criminal investigation, which helps identify, analyze, and preserve digital evidence. This systematic literature review discusses the current techniques, challenges, and future directions of research in digital forensics. Contemporary forensic techniques include disk forensics, network forensics, memory forensics, and cloud forensics, with the help of artificial intelligence (AI) and machine learning (ML) to improve evidence identification and analysis. Yet, digital forensics is confronted by various challenges, such as the
APA, Harvard, Vancouver, ISO, and other styles
35

Bhatia, Manjot Kaur, Palak Gambhir, Shefali Sinha, and Saksham Kumar Singh. "A Comparative Analysis of OS Forensics Tools." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 494–502. http://dx.doi.org/10.22214/ijraset.2022.47346.

Full text
Abstract:
Abstract: The internet is expanding at a breakneck pace, as the number of crimes perpetrated using or against computers. The area of computer forensics has arisen in reaction to the rise of computer crime. Computer forensics is the meticulous collection and examination of electronic evidence that not only analyses the damage to a computer because of an electronic attack but also recovers lost data from such a system to convict a criminal. As a result, the standard forensic process that is required after an electronic attack involves collecting evidence from a computer system, analyzing, and pr
APA, Harvard, Vancouver, ISO, and other styles
36

Soni, Nishchal. "IoT forensics: Challenges, methodologies, and future directions in securing the Internet of Things ecosystem." Computer and Telecommunication Engineering 2, no. 4 (2024): 3070. https://doi.org/10.54517/cte3070.

Full text
Abstract:
<p>The rapid growth of the Internet of Things (IoT) has significantly impacted digital forensics, introducing both new opportunities and challenges. IoT forensics, a specialized field within digital forensics, focuses on the acquisition, analysis, and interpretation of data from diverse IoT devices such as smart home systems, wearables, and industrial platforms. This review examines the current state of IoT forensics, highlighting challenges such as device diversity, data volatility, encryption, and the need for real-time analysis. It also evaluates existing forensic methodologies and to
APA, Harvard, Vancouver, ISO, and other styles
37

Morić, Zlatan, Vedran Dakić, Ana Kapulica, and Damir Regvart. "Forensic Investigation Capabilities of Microsoft Azure: A Comprehensive Analysis and Its Significance in Advancing Cloud Cyber Forensics." Electronics 13, no. 22 (2024): 4546. http://dx.doi.org/10.3390/electronics13224546.

Full text
Abstract:
This article delves into Microsoft Azure’s cyber forensic capabilities, focusing on the unique challenges in cloud security incident investigation. Cloud services are growing in popularity, and Azure’s shared responsibility model, multi-tenant nature, and dynamically scalable resources offer unique advantages and complexities for digital forensics. These factors complicate forensic evidence collection, preservation, and analysis. Data collection, logging, and virtual machine analysis are covered, considering physical infrastructure restrictions and cloud data transience. It evaluates Azure-nat
APA, Harvard, Vancouver, ISO, and other styles
38

Sharma, Sandeep Kumar, and Mazhar Khaliq. "Design and development of software quality forensics framework and model." Multidisciplinary Science Journal 6, no. 7 (2024): 2024111. http://dx.doi.org/10.31893/multiscience.2024111.

Full text
Abstract:
The illicit activist tampers the software for malcious purposes. The process of forensics examining and gathering evidence for software accused in forensic laboratories presents challenges in terms of software quality. Therefore, it is crucial to design and develop a framework, model, and dedicated standards for the forensic analysis of software quality. These resources can be employed for investigations, legal proceedings, as well as establishing criteria and standards for both past and present scenarios. The aim of the research work is to design a software-quality forensics framework for for
APA, Harvard, Vancouver, ISO, and other styles
39

Hakim, Muhamad Faishol, and Alamsyah Alamsyah. "Development of Digital Forensic Framework for Anti-Forensic and Profiling Using Open Source Intelligence in Cyber Crime Investigation." Recursive Journal of Informatics 2, no. 2 (2024): 114–23. http://dx.doi.org/10.15294/rji.v2i2.73731.

Full text
Abstract:
Abstract. Cybercrime is a crime that increases every year. The development of cyber crime occurs by utilizing mobile devices such as smartphones. So it is necessary to have a scientific discipline that studies and handles cybercrime activities. Digital forensics is one of the disciplines that can be utilized in dealing with cyber crimes. One branch of digital forensic science is mobile forensics which studies forensic processes on mobile devices. However, in its development, cybercriminals also apply various techniques used to thwart the forensic investigation process. The technique used is ca
APA, Harvard, Vancouver, ISO, and other styles
40

Chandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.

Full text
Abstract:
The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With the help of anti-forensic techniques, attackers defend themselves, from being tracked by destroying and distorting evidences. To detect and prevent network attacks, the main modus of operandi in network forensics is the successful implementation and analysis of attack graph from gathered evidences. This paper conveys the main concepts of attack graphs, requirements for modeling and implementation of graphs. It also co
APA, Harvard, Vancouver, ISO, and other styles
41

Hammond, Roselyn Abena Terbie. "Smartphone RSS Traces For Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 227–32. http://dx.doi.org/10.22624/aims/crp-bk3-p37.

Full text
Abstract:
This paper’s topic is on Smartphone RSS traces for Forensic analysis; RSS represents Really Simple Syndication whereas smartphone RSS traces refers to a small software program that collects and displays RSS feeds. It allows you to scan headlines from a number of news sources in a central location and has the ability to suggest information of interest to you based on the criteria of your search. RSS feed has been in existence for many years but has never been as widely used as it is today, the term syndication refers to publishing information on the Internet that can be used by other sites as w
APA, Harvard, Vancouver, ISO, and other styles
42

Haryanto, Eri, and Imam Riadi. "Forensik Internet Of Things pada Device Level berbasis Embedded System." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 6 (2019): 703. http://dx.doi.org/10.25126/jtiik.2019661828.

Full text
Abstract:
<p>Perangkat Internet of Things (IoT) merupakan perangkat cerdas yang memiliki interkoneksi dengan jaringan internet global. Investigasi kasus yang menyangkut perangkat IoT akan menjadi tantangan tersendiri bagi investigator forensik. Keberagaman jenis perangkat dan teknologi akan memunculkan tantangan baru bagi investigator forensik. Dalam penelitian ini dititikberatkan forensik di level internal device perangkat IoT. Belum banyak bahkan belum penulis temukan penelitian sejenis yang fokus dalam analisis forensik perangkat IoT pada level device. Penelitian yang sudah dilakukan sebelumnya
APA, Harvard, Vancouver, ISO, and other styles
43

Mikayla, Halimah Septya, Ari Kusyanti, and Primantara Hari Trisnawan. "Analisis Forensik Digital untuk Investigasi Kasus Cyberbullying pada Media Sosial Tiktok." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 7 (2023): 1571–82. http://dx.doi.org/10.25126/jtiik.1078017.

Full text
Abstract:
TikTok merupakan media sosial yang populer digunakan pada masa kini. Media sosial TikTok yang populer di kalangan pengguna menjadi salah satu media yang banyak ditemui jenis kejahatan siber cyberbullying. Kasus cyberbullying pada media sosial TikTok dapat ditindak secara hukum yakni dengan dilakukan investigasi forensik digital. Penelitian ini dilakukan untuk mengumpulkan dan menganalisis bukti digital kasus cyberbullying pada TikTok android dan juga TikTok web dengan melakukan skenario kasus serta menerapkan model investigasi forensik digital yang berfokus pada jejaring sosial. Fase skenario
APA, Harvard, Vancouver, ISO, and other styles
44

Mikayla, Halimah Septya, Ari Kusyanti, and Primantara Hari Trisnawan. "Analisis Forensik Digital untuk Investigasi Kasus Cyberbullying pada Media Sosial Tiktok." Jurnal Teknologi Informasi dan Ilmu Komputer 11, no. 5 (2024): 1113–24. https://doi.org/10.25126/jtiik.2024118017.

Full text
Abstract:
TikTok merupakan media sosial yang populer digunakan pada masa kini. Media sosial TikTok yang populer di kalangan pengguna menjadi salah satu media yang banyak ditemui jenis kejahatan siber cyberbullying. Kasus cyberbullying pada media sosial TikTok dapat ditindak secara hukum yakni dengan dilakukan investigasi forensik digital. Penelitian ini dilakukan untuk mengumpulkan dan menganalisis bukti digital kasus cyberbullying pada TikTok android dan juga TikTok web dengan melakukan skenario kasus serta menerapkan model investigasi forensik digital yang berfokus pada jejaring sosial. Fase skenario
APA, Harvard, Vancouver, ISO, and other styles
45

Sheldon, Andrew. "Forensic analysis." Infosecurity 4, no. 8 (2007): 17. http://dx.doi.org/10.1016/s1754-4548(07)70196-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ballou, Susan, John Goodpaster, William MacCrehan, and Dennis Reeder. "Forensic analysis." Analytical and Bioanalytical Chemistry 376, no. 8 (2003): 1149–50. http://dx.doi.org/10.1007/s00216-003-2068-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Lloyd, J. B. F., and J. G. Sutton. "Forensic analysis." Analytical Proceedings 24, no. 8 (1987): 239. http://dx.doi.org/10.1039/ap9872400239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Savenko, A. S. "Formation of Intellectual Property Forensics in the System of the Russian Ministry of Justice." Theory and Practice of Forensic Science 15, no. 3 (2020): 98–105. http://dx.doi.org/10.30764/1819-2785-2020-3-98-105.

Full text
Abstract:
The article analyses legal regulations of a forensic investigation into intellectual property o jects regarding the appointment of examinations of trademarks and service marks. The matter of necessity of specialized knowledge to conduct such investigations is addressed as well as current expert and judicial practice in this field. The author notes that forensic analysis of trade and service marks should be carried out as a part of a comprehensive examination in complex cases. The investigation should also include a sociological study.It is shown that the training of state forensic experts in t
APA, Harvard, Vancouver, ISO, and other styles
49

Alansari, Iman S. "A Detection and Investigation Model for the Capture and Analysis of Network Crimes." Engineering, Technology & Applied Science Research 13, no. 5 (2023): 11871–77. http://dx.doi.org/10.48084/etasr.6316.

Full text
Abstract:
Investigation in the field of network forensics involves examining network traffic to identify, capture, preserve, reconstruct, analyze, and document network crimes. Although there are different perspectives on the practical and technical aspects of network forensics, there is still a lack of fundamental guidelines. This paper proposes a new detection and investigation model for capturing and analyzing network crimes, using design science research. The proposed model involves six processes: identification, verification, gathering, preservation, examination, analysis, and documentation. Each pr
APA, Harvard, Vancouver, ISO, and other styles
50

Badger, Eric Sowah. "Liabilities of Shared System in Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 191–96. http://dx.doi.org/10.22624/aims/crp-bk3-p31.

Full text
Abstract:
In today’s connected world, there is a tendency for connectivity even in the sectors which conventionally have been not so connected in the past, such as power systems substations. Substations have seen considerable digitalization of the grid hence, providing much more available insights than before. This has all been possible due to connectivity, digitalization, and automation of the power grids. Interestingly, this also means that anybody can access such critical infrastructures from a remote location, and gone are the days of physical barriers. The power of connectivity and control makes it
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!