Digital forensics subdomains: the state of the art and future directions

A Al-Dhaqm, RA Ikuesan, VR Kebande… - IEEE …, 2021 - ieeexplore.ieee.org
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …

Mobile cloud computing adoption model as a feasible response to countries' lockdown as a result of the COVID-19 outbreak and beyond

N Rananga, HS Venter - 2020 IEEE Conference on e-Learning …, 2020 - ieeexplore.ieee.org
The COVID-19 outbreak has been declared as one of the worst global disasters. The impact
of COVID-19 is visible in many sectors, such as health, logistics, and many other critical …

Mobile device forensics investigation process: A systematic review

B Bernardo, V Santos - Handbook of research on cyber crime and …, 2021 - igi-global.com
One of the main topics that is discussed today is how can a person leverage technology in a
positive and secure way in order to enhance their lives. However, with improvements in …

Privacy preserving Internet browsers: Forensic analysis of Browzar

C Warren, E El-Sheikh, NA Le-Khac - Computer and network security …, 2018 - Springer
With the advance of technology, Criminal Justice agencies are being confronted with an
increased need to investigate cybercrimes perpetrated partially or entirely over the Internet …

[PDF][PDF] Digital Evidence Identification on Google Drive in Android Device Using NIST Mobile Forensic Method

A Yudhana, R Umar, A Ahmadi - Scientific Journal of …, 2019 - pdfs.semanticscholar.org
The use of cloud storage media is very popular nowadays, especially with the Google Drive
cloud storage media on smartphones. The increasing number of users of google drive …

Challenges of acquiring mobile devices while minimizing the loss of usable forensics data

LA Herrera - 2020 8th International Symposium on Digital …, 2020 - ieeexplore.ieee.org
The move from computers to mobile devices has placed forensic professionals in a tough
spot when performing analysis of seized hardware. Forensics specialists must contend with …

Feature indexing and search optimization for enhancing the forensic analysis of mobile cloud environment

IA Alnajjar, M Mahmuddin - Information Security Journal: A Global …, 2021 - Taylor & Francis
The increased utilization of Mobile Cloud Computing (MCC) technology creates an
opportunity for cybercrimes. Modeling the suitable methods for mobile cloud forensic …

A Systematic Literature Review of Latest Cloud Forensic Frameworks, Tools and Challenges

U Farooq, A Shaukat, WH Butt… - 2023 2nd International …, 2023 - ieeexplore.ieee.org
Background: Cloud computing is widely used in this era of IoTs. Cloud users utilize cloud
computing to access various cloud services. The defects in cloud services are exploited by …

Digital forensic process and model in the cloud

NA Le‐Khac, J Plunkett, MT Kechadi… - Security, Privacy, and …, 2019 - Wiley Online Library
Cloud computing offers significant advantages to organisations through the provision of fast
and flexible ICT hardware and software infrastructures, thus enabling organisations to focus …

[PDF][PDF] Digital Forensics Subdomains: The State of the art and Future Directions

R Choo, BAS Al-rimy, ARA Alsewari - core.ac.uk
For reliable and relevant scientific evidence to be admitted in a court of law, it is important to
apply digital forensic investigation techniques to corroborate a suspected potential security …