Journal articles on the topic 'Forensic analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Forensic analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.
Full textAntwi, Paul. "Device Information for Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 373–78. http://dx.doi.org/10.22624/aims/crp-bk3-p59.
Full textDodoo, Herbert Cyril. "Deep Learning (DL) Oriented Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 321–28. http://dx.doi.org/10.22624/aims/crp-bk3-p51.
Full textSabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.
Full textHaoyang, Xie, Jiang Keyu, Yuan Xiaohong, and Zeng Hongbiao. "FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION." FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION 4, no. 2 (2012): 121–34. https://doi.org/10.5281/zenodo.3247268.
Full textAl Jouhi, Mariam, and Sara Al Hosani. "Windows Forensics Analysis." Emirati Journal of Policing & Security Studies 1, no. 1 (2022): 4–11. https://doi.org/10.54878/jagh3855.
Full textMaulina, Sinta Nur, Niken Dwi Wahyu Cahyani, and Erwid Musthofa Jadied. "ANALYSIS OF THE EFFECT OF VSM ON THE MEMORY ACQUISITION PROCESS USING THE DYNAMIC ANALYSIS METHOD." JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 8, no. 2 (2023): 638–46. http://dx.doi.org/10.29100/jipi.v8i2.3745.
Full textLee, Sang Young. "Mobile Digital Forensics Framework for Smartphone User Analysis." Webology 19, no. 1 (2022): 4335–51. http://dx.doi.org/10.14704/web/v19i1/web19285.
Full textDwi Syahputri, Rischi, Alexander Anggono, Prasetyono Prasetyono, and Mohamad Djasuli. "Evolution and Research Opportunities of Digital Forensic Tools: A Bibliometric Analysis." CogITo Smart Journal 10, no. 2 (2024): 474–85. https://doi.org/10.31154/cogito.v10i2.675.474-485.
Full textQureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, and Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.
Full textAdeyemi, Ikuesan R., Shukor Abd Razak, and Nor Amira Nor Azhan. "A Review of Current Research in Network Forensic Analysis." International Journal of Digital Crime and Forensics 5, no. 1 (2013): 1–26. http://dx.doi.org/10.4018/jdcf.2013010101.
Full textAsamoah, Jonas Takyi. "Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness." Advances in Multidisciplinary and scientific Research Journal Publication 1 (July 26, 2022): 307–14. http://dx.doi.org/10.22624/aims/crp-bk3-p49.
Full textAL-Hadi, Fatima Ismail, and Nagi Ali Al-Shaibany. "Digital Forensic Accounting: An Overview." International Journal of Computer Science and Mobile Computing 13, no. 8 (2024): 99–106. http://dx.doi.org/10.47760/ijcsmc.2024.v13i08.011.
Full textAlotaibi, Fahad Mazaed, Arafat Al-Dhaqm, Yasser D. Al-Otaibi, and Abdulrahman A. Alsewari. "A Comprehensive Collection and Analysis Model for the Drone Forensics Field." Sensors 22, no. 17 (2022): 6486. http://dx.doi.org/10.3390/s22176486.
Full textSangwan, Preeti, Tarsem Nain, Priyanka Yadav, and Neelkamal Sharma. "Molecular Approaches in Soil Microbial Analysis: Forensic Perspective." Biosciences Biotechnology Research Asia 20, no. 2 (2023): 367–79. http://dx.doi.org/10.13005/bbra/3096.
Full textGhanem, Mohamed Chahine, Eduardo Almeida Palmieri, Wiktor Sowinski-Mydlarz, Sahar Al-Sudani, and Dipo Dunsin. "Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine." IoT 6, no. 1 (2025): 18. https://doi.org/10.3390/iot6010018.
Full textSukamto, Pria, Ispandi, Arman Syah Putra, Nurul Aisyah, and Rohmat Toufiq. "Forensic Digital Analysis for CCTV Video Recording." International Journal of Science, Technology & Management 3, no. 1 (2022): 284–91. http://dx.doi.org/10.46729/ijstm.v3i1.460.
Full textGoc, Mieczysław, Piotr Jastrzębski, and Dorota Semków. "COMPARATOR – a Universal Application for Forensic Comparative Examinations and a Statistical Analysis of Sample Parameters." PRZEGLĄD POLICYJNY 150, no. 2 (2023): 246–71. http://dx.doi.org/10.5604/01.3001.0053.8542.
Full textHikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.
Full textOkan, Emmanuel Tettey. "Forensic Analysis on Streaming Multimedia." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 221–26. http://dx.doi.org/10.22624/aims/crp-bk3-p36.
Full textDumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.
Full textVadlamudi, Divya, Dr K. Thirupathi Rao, Pellakuri Vidyullatha, and B. AjasekharReddy. "Analysis on digital forensics challenges and anti-forensics techniques in cloud computing." International Journal of Engineering & Technology 7, no. 2.7 (2018): 1072. http://dx.doi.org/10.14419/ijet.v7i2.7.12230.
Full textFaiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.
Full textSonali, Ekhande, Patil Uttam, and Vishwanath Kulhalli Kshama. "Review on effectiveness of deep learning approach in digital forensics." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5481–92. https://doi.org/10.11591/ijece.v12i5.pp5481-5492.
Full textAmparbeng, Maxwell. "Inaccessibility of Services as a Threat to Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 29–34. http://dx.doi.org/10.22624/aims/crp-bk3-p5.
Full textKroz, M. V., and N. A. Ratinova. "History and Current State of Forensic Analysis of Extremist Materials." Theory and Practice of Forensic Science, no. 3(43) (September 30, 2016): 146–54. http://dx.doi.org/10.30764/64/1819-2785-2016-3-146-154.
Full textAlotaibi, Fahad Mazaed, Arafat Al-Dhaqm, and Yasser D. Al-Otaibi. "A Novel Forensic Readiness Framework Applicable to the Drone Forensics Field." Computational Intelligence and Neuroscience 2022 (February 28, 2022): 1–13. http://dx.doi.org/10.1155/2022/8002963.
Full textEkhande, Sonali, Uttam Patil, and Kshama Vishwanath Kulhalli. "Review on effectiveness of deep learning approach in digital forensics." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5481. http://dx.doi.org/10.11591/ijece.v12i5.pp5481-5592.
Full textSaragih, Naikson, Ridho Agus Wery Nanda Panjaitan, and Mufria Jonatan Purba. "FORENSIC NETWORK ANALYSIS AND IMPLEMENTATION OF SECURITY ATTACKS ON VIRTUAL PRIVATE SERVERS." Jurnal Sistem Informasi dan Ilmu Komputer Prima(JUSIKOM PRIMA) 6, no. 2 (2023): 28–34. http://dx.doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932.
Full textMualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.
Full textSyed Khurram Hassan and Hafiza Hadia Shehzad. "The Nanoforensic: An Advanced Perspective in Crime Investigation." International Journal for Electronic Crime Investigation 7, no. 1 (2023): 33–38. http://dx.doi.org/10.54692/ijeci.2023.0701126.
Full textHamed, Abdul Sallam Said. "Digital Forensic: Techniques, Challenges, and Future Direction." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 5869–73. https://doi.org/10.22214/ijraset.2025.71562.
Full textBhatia, Manjot Kaur, Palak Gambhir, Shefali Sinha, and Saksham Kumar Singh. "A Comparative Analysis of OS Forensics Tools." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 494–502. http://dx.doi.org/10.22214/ijraset.2022.47346.
Full textSoni, Nishchal. "IoT forensics: Challenges, methodologies, and future directions in securing the Internet of Things ecosystem." Computer and Telecommunication Engineering 2, no. 4 (2024): 3070. https://doi.org/10.54517/cte3070.
Full textMorić, Zlatan, Vedran Dakić, Ana Kapulica, and Damir Regvart. "Forensic Investigation Capabilities of Microsoft Azure: A Comprehensive Analysis and Its Significance in Advancing Cloud Cyber Forensics." Electronics 13, no. 22 (2024): 4546. http://dx.doi.org/10.3390/electronics13224546.
Full textSharma, Sandeep Kumar, and Mazhar Khaliq. "Design and development of software quality forensics framework and model." Multidisciplinary Science Journal 6, no. 7 (2024): 2024111. http://dx.doi.org/10.31893/multiscience.2024111.
Full textHakim, Muhamad Faishol, and Alamsyah Alamsyah. "Development of Digital Forensic Framework for Anti-Forensic and Profiling Using Open Source Intelligence in Cyber Crime Investigation." Recursive Journal of Informatics 2, no. 2 (2024): 114–23. http://dx.doi.org/10.15294/rji.v2i2.73731.
Full textChandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.
Full textHammond, Roselyn Abena Terbie. "Smartphone RSS Traces For Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 227–32. http://dx.doi.org/10.22624/aims/crp-bk3-p37.
Full textHaryanto, Eri, and Imam Riadi. "Forensik Internet Of Things pada Device Level berbasis Embedded System." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 6 (2019): 703. http://dx.doi.org/10.25126/jtiik.2019661828.
Full textSheldon, Andrew. "Forensic analysis." Infosecurity 4, no. 8 (2007): 17. http://dx.doi.org/10.1016/s1754-4548(07)70196-1.
Full textBallou, Susan, John Goodpaster, William MacCrehan, and Dennis Reeder. "Forensic analysis." Analytical and Bioanalytical Chemistry 376, no. 8 (2003): 1149–50. http://dx.doi.org/10.1007/s00216-003-2068-x.
Full textLloyd, J. B. F., and J. G. Sutton. "Forensic analysis." Analytical Proceedings 24, no. 8 (1987): 239. http://dx.doi.org/10.1039/ap9872400239.
Full textMikayla, Halimah Septya, Ari Kusyanti, and Primantara Hari Trisnawan. "Analisis Forensik Digital untuk Investigasi Kasus Cyberbullying pada Media Sosial Tiktok." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 7 (2023): 1571–82. http://dx.doi.org/10.25126/jtiik.1078017.
Full textMikayla, Halimah Septya, Ari Kusyanti, and Primantara Hari Trisnawan. "Analisis Forensik Digital untuk Investigasi Kasus Cyberbullying pada Media Sosial Tiktok." Jurnal Teknologi Informasi dan Ilmu Komputer 11, no. 5 (2024): 1113–24. https://doi.org/10.25126/jtiik.2024118017.
Full textBadger, Eric Sowah. "Liabilities of Shared System in Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 191–96. http://dx.doi.org/10.22624/aims/crp-bk3-p31.
Full textAlansari, Iman S. "A Detection and Investigation Model for the Capture and Analysis of Network Crimes." Engineering, Technology & Applied Science Research 13, no. 5 (2023): 11871–77. http://dx.doi.org/10.48084/etasr.6316.
Full textSavenko, A. S. "Formation of Intellectual Property Forensics in the System of the Russian Ministry of Justice." Theory and Practice of Forensic Science 15, no. 3 (2020): 98–105. http://dx.doi.org/10.30764/1819-2785-2020-3-98-105.
Full textShalgynbayeva, A. R. "COMPARATIVE ANALYSIS OF FORENSIC TOOLS: ENCASE AND FTK IMAGER." Bulletin of Shakarim University. Technical Sciences, no. 1(17) (March 29, 2025): 86–92. https://doi.org/10.53360/2788-7995-2025-1(17)-11.
Full textMalik, Dr Pankaj, Harshit Jain, Vartika Bhawsar, Neha Patidar, and Tanishka Soni. "Development of a Machine Learning Framework for Real-Time PMI (Post-Mortem Interval) Estimation in Field Forensics." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem37561.
Full text