N Rananga, HS Venter - 2020 IEEE Conference on e-Learning …, 2020 - ieeexplore.ieee.org
The COVID-19 outbreak has been declared as one of the worst global disasters. The impact of COVID-19 is visible in many sectors, such as health, logistics, and many other critical …
B Bernardo, V Santos - Handbook of research on cyber crime and …, 2021 - igi-global.com
One of the main topics that is discussed today is how can a person leverage technology in a positive and secure way in order to enhance their lives. However, with improvements in …
C Warren, E El-Sheikh, NA Le-Khac - Computer and network security …, 2018 - Springer
With the advance of technology, Criminal Justice agencies are being confronted with an increased need to investigate cybercrimes perpetrated partially or entirely over the Internet …
The use of cloud storage media is very popular nowadays, especially with the Google Drive cloud storage media on smartphones. The increasing number of users of google drive …
LA Herrera - 2020 8th International Symposium on Digital …, 2020 - ieeexplore.ieee.org
The move from computers to mobile devices has placed forensic professionals in a tough spot when performing analysis of seized hardware. Forensics specialists must contend with …
IA Alnajjar, M Mahmuddin - Information Security Journal: A Global …, 2021 - Taylor & Francis
The increased utilization of Mobile Cloud Computing (MCC) technology creates an opportunity for cybercrimes. Modeling the suitable methods for mobile cloud forensic …
Background: Cloud computing is widely used in this era of IoTs. Cloud users utilize cloud computing to access various cloud services. The defects in cloud services are exploited by …
NA Le‐Khac, J Plunkett, MT Kechadi… - Security, Privacy, and …, 2019 - Wiley Online Library
Cloud computing offers significant advantages to organisations through the provision of fast and flexible ICT hardware and software infrastructures, thus enabling organisations to focus …
For reliable and relevant scientific evidence to be admitted in a court of law, it is important to apply digital forensic investigation techniques to corroborate a suspected potential security …