Journal articles on the topic 'Software forensic tools'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Software forensic tools.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Azra, Parveen, Husain Khan Zishan, and Naseem Ahmad Syed. "Classification and evaluation of digital forensic tools." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 6 (2020): 3096~3106. https://doi.org/10.12928/TELKOMNIKA.v18i6.15295.
Full textSutikno, Tole. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology (IJ-ICT) 13, no. 2 (2024): 321. http://dx.doi.org/10.11591/ijict.v13i2.pp321-332.
Full textTole, Sutikno. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology 13, no. 2 (2024): 321–32. https://doi.org/10.11591/ijict.v13i2.pp321-332.
Full textManjre, Mr Bhushan M., and Dr Krishan Kumar Goyal. "Urge for Novel and Secure Software Framework for Extraction and Decoding of Mobile Artifacts." YMER Digital 20, no. 12 (2021): 589–98. http://dx.doi.org/10.37896/ymer20.12/56.
Full textGyana, Ranjana Panigrahi, Kanta Barpanda Nalini, and Kumar Sethy Prabira. "Navigating the cyber forensics landscape a review of recent innovations." International Journal of Informatics and Communication Technology 13, no. 1 (2024): 27–33. https://doi.org/10.11591/ijict.v13i1.pp27-33.
Full textFadillah, Muhammad Fadil, and Trihastuti Yuniati. "Perbandingan Hasil Recovery Tools Mobile Forensic Di Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ)." Cyber Security dan Forensik Digital 6, no. 2 (2024): 54–61. http://dx.doi.org/10.14421/csecurity.2023.6.2.4172.
Full textDwi Syahputri, Rischi, Alexander Anggono, Prasetyono Prasetyono, and Mohamad Djasuli. "Evolution and Research Opportunities of Digital Forensic Tools: A Bibliometric Analysis." CogITo Smart Journal 10, no. 2 (2024): 474–85. https://doi.org/10.31154/cogito.v10i2.675.474-485.
Full textPanigrahi, Gyana Ranjana, Nalini Kanta Barpanda, and Prabira Kumar Sethy. "Navigating the cyber forensics landscape a review of recent innovations." International Journal of Informatics and Communication Technology (IJ-ICT) 13, no. 1 (2024): 27. http://dx.doi.org/10.11591/ijict.v13i1.pp27-33.
Full textLi, Yunkun, and Gabriela Mogos. "Digital forensics on Tencent QQ-instant messaging service in China." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (2022): 412. http://dx.doi.org/10.11591/ijeecs.v29.i1.pp412-420.
Full textLi, Yunkun, and Gabriela Mogos. "Digital forensics on Tencent QQ-instant messaging service in China." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (2023): 412–20. https://doi.org/10.11591/ijeecs.v29.i1.pp412-420.
Full textSamy Abdelwahab Safaan. "Computer Forensics Education: The Applications of Forensic Tools in Modern Education System." American Journal of Chemistry and Pharmacy 1, no. 2 (2022): 13–20. http://dx.doi.org/10.54536/ajcp.v1i2.1077.
Full textAdeyemi, Ikuesan R., Shukor Abd Razak, and Nor Amira Nor Azhan. "A Review of Current Research in Network Forensic Analysis." International Journal of Digital Crime and Forensics 5, no. 1 (2013): 1–26. http://dx.doi.org/10.4018/jdcf.2013010101.
Full textZuhriyanto, Ikhsan, Anton Yudhana, and Imam Riadi. "Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 5 (2020): 829–36. http://dx.doi.org/10.29207/resti.v4i5.2152.
Full textФиляк, Петр Юрьевич, Сергей Владимирович Королев, and Никита Владимирович Тебеньков. "ENSURING THE INFORMATION SECURITY WITH THE USE OF TOOLS OF FORENSICS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 4(-) (December 15, 2021): 571–80. http://dx.doi.org/10.36622/vstu.2021.24.4.009.
Full textYuwono, Doddy Teguh, Abdul Fadlil, and Sunardi Sunardi. "Performance Comparison of Forensic Software for Carving Files using NIST Method." Jurnal Teknologi dan Sistem Komputer 7, no. 3 (2019): 89–92. http://dx.doi.org/10.14710/jtsiskom.7.3.2019.89-92.
Full textTong, Tan Pei, Kannan Asokan, and Iqbal Singh Munjal. "The impact of forensic accounting tools in investigating white-collar crime." E3S Web of Conferences 389 (2023): 09034. http://dx.doi.org/10.1051/e3sconf/202338909034.
Full textShalgynbayeva, A. R. "COMPARATIVE ANALYSIS OF FORENSIC TOOLS: ENCASE AND FTK IMAGER." Bulletin of Shakarim University. Technical Sciences, no. 1(17) (March 29, 2025): 86–92. https://doi.org/10.53360/2788-7995-2025-1(17)-11.
Full textMaulina, Sinta Nur, Niken Dwi Wahyu Cahyani, and Erwid Musthofa Jadied. "ANALYSIS OF THE EFFECT OF VSM ON THE MEMORY ACQUISITION PROCESS USING THE DYNAMIC ANALYSIS METHOD." JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 8, no. 2 (2023): 638–46. http://dx.doi.org/10.29100/jipi.v8i2.3745.
Full textNizam, Syafiqah Hanisah Shahrol, Nurul Hidayah Ab Rahman, and Niken Dwi Wahyu Cahyani. "Keyword Indexing And Searching Tool (KIST): A Tool to Assist the Forensics Analysis of WhatsApp Chat." International Journal on Information and Communication Technology (IJoICT) 6, no. 1 (2020): 23. http://dx.doi.org/10.21108/ijoict.2020.61.481.
Full textKarabiyik, Umit, and Tugba Karabiyik. "A Game Theoretic Approach for Digital Forensic Tool Selection †." Mathematics 8, no. 5 (2020): 774. http://dx.doi.org/10.3390/math8050774.
Full textGuo, Yinghua, and Jill Slay. "Testing Forensic Copy Function of Computer Forensics Investigation Tools." Journal of Digital Forensic Practice 3, no. 1 (2010): 46–61. http://dx.doi.org/10.1080/15567280903521392.
Full textMara, Dr Sudheer S., Krishnendhu R, and Ashish L. "Computer Forensic in Image Steganography." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 3831–42. http://dx.doi.org/10.22214/ijraset.2022.43237.
Full textAltulaihan, Esra, Abrar Alismail, M. M. Hafizur Rahman, and Adamu A. Ibrahim. "Email Security Issues, Tools, and Techniques Used in Investigation." Sustainability 15, no. 13 (2023): 10612. http://dx.doi.org/10.3390/su151310612.
Full textYang, Lin. "The Research and Application of Forensic DNA Fragment Analysis Software." Applied Mechanics and Materials 687-691 (November 2014): 1904–7. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1904.
Full textNahdli, Muhammad Fahmi Mubarok, Imam Riadi, and Muhammad Kunta Biddinika. "Comparison of Digital Forensic Tools for Drug Trafficking Cases on Instagram Messenger using NIST Method." Scientific Journal of Informatics 11, no. 4 (2024): 891–902. https://doi.org/10.15294/sji.v11i4.13463.
Full textMeister, Sam, and Alexandra Chassanoff. "Integrating Digital Forensics Techniques into Curatorial Tasks: A Case Study." International Journal of Digital Curation 9, no. 2 (2014): 6–16. http://dx.doi.org/10.2218/ijdc.v9i2.325.
Full textGuo, Yinghua, Jill Slay, and Jason Beckett. "Validation and verification of computer forensic software tools—Searching Function." Digital Investigation 6 (September 2009): S12—S22. http://dx.doi.org/10.1016/j.diin.2009.06.015.
Full textPrat, Lionel, Cheryl Baker, and Nhien An Le-Khac. "MapExif." International Journal of Digital Crime and Forensics 7, no. 2 (2015): 53–78. http://dx.doi.org/10.4018/ijdcf.2015040104.
Full textRiadi, Imam, Anton Yudhana, and Galih Pramuja Inngam Fanani. "Comparative Analysis of Forensic Software on Android-based MiChat using ACPO and DFRWS Framework." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, no. 2 (2023): 286–92. http://dx.doi.org/10.29207/resti.v7i2.4547.
Full textMalik, Nabila. "A Study on Different Software Used to Perform Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 879–82. http://dx.doi.org/10.22214/ijraset.2021.39395.
Full textCurran, Kevin, Andrew Robinson, Stephen Peacocke, and Sean Cassidy. "Mobile Phone Forensic Analysis." International Journal of Digital Crime and Forensics 2, no. 3 (2010): 15–27. http://dx.doi.org/10.4018/jdcf.2010070102.
Full textBashir, Engr Tahir. "Adoption of Digital Forensic Tools Based On Perceived Usefulness (PU) To Mitigate the Risks in Criminal Investigation." Journal of Software Engineering and Simulation 7, no. 7 (2021): 20–29. http://dx.doi.org/10.35629/3795-07072029.
Full textUnderhill, Paul, Toyosi Oyinloye, Lee Speakman, and Thaddeus Eze. "Forensic Trails Obfuscation and Preservation via Hard Drive Firmware." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 419–28. http://dx.doi.org/10.34190/eccws.21.1.188.
Full textOnome, Dr Oghene Augustine. "Computer Forensics and Advanced Methodology." International Journal of Emerging Science and Engineering 11, no. 7 (2023): 1–15. http://dx.doi.org/10.35940/ijese.g2552.0611723.
Full textDr., Oghene Augustine Onome. "Computer Forensics and Advanced Methodology." International Journal of Emerging Science and Engineering (IJESE) 11, no. 7 (2023): 1–15. https://doi.org/10.35940/ijese.G2552.0611723.
Full textAli Diko Putra, Muhammad, Arif Wirawan Muhammad, Bita Parga Zen, Rianti Yunita Kisworini, and Tuti Rohayati. "Analisis Forensik Pada Instagram dan Tik Tok Dalam Mendapatkan Bukti Digital Dengan Menggunakan Metode NIST 800-86." Jurnal Sistem Informasi Galuh 2, no. 1 (2024): 44–54. http://dx.doi.org/10.25157/jsig.v2i1.3695.
Full textVeena, S. T., and A. Selvaraj. "Forensic steganalysis for identification of steganography software tools using multiple format image." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 3 (2021): 188–97. https://doi.org/10.11591/ijict.v10i3.pp188-197.
Full textSalam, Hassan Ahmad Ali Kawar Mohammed Mousa. "The role of forensic DNA experts and Artificial Intelligence in enhancing the effectiveness of wildlife crime investigations in Cyprus." Journal of Wildlife and Biodiversity 9, no. 2 (2025): 77–94. https://doi.org/10.5281/zenodo.15510998.
Full textVeena, S. T., and A. Selvaraj. "Forensic steganalysis for identification of steganography software tools using multiple format image." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 3 (2021): 188. http://dx.doi.org/10.11591/ijict.v10i3.pp188-197.
Full textZulfikar Sidik, Panji, Hery Priyanto, Tris Zeno Alkindi, Hasta Saputra, and Agus Dwi Setiyono. "PEMERIKSAAN SAMSUNG GALAXY TAB S MODEL SM-T705 MENGGUNAKAN ALAT EASY JTAG PLUS." Journal of Forensic Expert 2, no. 1 (2022): 13–19. http://dx.doi.org/10.54579/jfe.v2i1.16.
Full textSalamh, Fahad E., Mohammad Meraj Mirza, and Umit Karabiyik. "UAV Forensic Analysis and Software Tools Assessment: DJI Phantom 4 and Matrice 210 as Case Studies." Electronics 10, no. 6 (2021): 733. http://dx.doi.org/10.3390/electronics10060733.
Full textFaheem, Muhammad, Tahar Kechadi, and Nhien An Le-Khac. "The State of the Art Forensic Techniques in Mobile Cloud Environment." International Journal of Digital Crime and Forensics 7, no. 2 (2015): 1–19. http://dx.doi.org/10.4018/ijdcf.2015040101.
Full textGhannam, Hussein Abed. "Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone." Journal of Applied Information, Communication and Technology 5, no. 2 (2018): 73–83. http://dx.doi.org/10.33555/ejaict.v5i2.55.
Full textGyimah, Seth Adjei. "X-Ways Forensics Platform For Digital Forensics Examiners." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 353–56. http://dx.doi.org/10.22624/aims/crp-bk3-p56.
Full textKarman Paula da Silva, Rubens, Islan Amorim Bezerra, Sidney Marlon Lopes de Lima, and Sérgio Murilo Maciel Fernandes. "Analysis of Forensic Tools for Recovery of Formatted Data: a case study with Microsoft Word files." Revista de Informática Teórica e Aplicada 31, no. 2 (2024): 110–19. https://doi.org/10.22456/2175-2745.140149.
Full textRalf, Arwin, Bram van Wersch, Diego Montiel González, and Manfred Kayser. "Male Pedigree Toolbox: A Versatile Software for Y-STR Data Analyses." Genes 15, no. 2 (2024): 227. http://dx.doi.org/10.3390/genes15020227.
Full textNurettin Selcuk SENOL and Amar Rasheed. "Forensic Insights into SenseCAP: A Comprehensive Examination of Technical and LoRa Connectivity Dimensions." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 595–604. https://doi.org/10.34190/iccws.20.1.3217.
Full textShishkin, Y. Y., S. Y. Burlakov, A. Y. Burlakov, A. S. Kataev, and A. S. Suvorov. "ORGANIZATION OF THE USE OF THREE-DIMENSIONAL TECHNOLOGIES IN THE DETECTION OF MICROPARTICLES AT FORENSIC FACILITIES." Bulletin of the Medical Institute of Continuing Education 5, no. 1 (2025): 86–88. https://doi.org/10.36107/2782-1714_2025-5-1-86-88.
Full textSheena Mohammed and Sridevi Rangu. "The cloud forensics frameworks and tools: A brief review." International Journal of Science and Research Archive 8, no. 1 (2023): 173–81. http://dx.doi.org/10.30574/ijsra.2023.8.1.0023.
Full textMubarokah, Islahiyatul Ilma, and Fahmi Fachri. "IDENTIFIKASI BUKTI DIGITAL PINJAMAN ONLINE MENGGUNAKAN LIVE FORENSIC PADA SISTEM OPERASI PROPRIETARY." Rabit : Jurnal Teknologi dan Sistem Informasi Univrab 10, no. 1 (2025): 117–29. https://doi.org/10.36341/rabit.v10i1.5514.
Full text