Cloud digital forensics: Beyond tools, techniques, and challenges

AW Malik, DS Bhatti, TJ Park, HU Ishtiaq, JC Ryou… - Sensors, 2024 - mdpi.com
Cloud computing technology is rapidly becoming ubiquitous and indispensable. However,
its widespread adoption also exposes organizations and individuals to a broad spectrum of …

[HTML][HTML] Digital forensics as a service: Stepping up the game

HMA van Beek, J van den Bos, A Boztas… - Forensic Science …, 2020 - Elsevier
Abstract After providing Digital Forensics as a Service (DFaaS) implementations to law
enforcement agencies for close to a decade, we present our view from an inside-out …

Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.0

KAZ Ariffin, FH Ahmad - Computers & Security, 2021 - Elsevier
Abstract The introduction of Industrial Revolution 4.0 (IR 4.0) brings benefits to the industries
and our daily life. Innovation such as the Internet of Things, cloud computing, and blockchain …

BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem

K Awuson-David, T Al-Hadhrami, M Alazab… - Future Generation …, 2021 - Elsevier
Log files are the primary source of recording users, applications and protocols, activities in
the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when …

NLP-based digital forensic analysis for online social network based on system security

Z Shahbazi, YC Byun - … journal of environmental research and public …, 2022 - mdpi.com
Social media evidence is the new topic in digital forensics. If social media information is
correctly explored, there will be significant support for investigating various offenses …

Application of artificial intelligence and machine learning in producing actionable cyber threat intelligence

R Montasari, F Carroll, S Macdonald… - … forensic investigation of …, 2021 - Springer
Abstract Cyber Threat Intelligence (CTI) can be used by organisations to assist their security
teams in safeguarding their networks against cyber-attacks. This can be achieved by …

Cyber–physical systems forensics: Today and tomorrow

N Mohamed, J Al-Jaroodi, I Jawhar - Journal of Sensor and Actuator …, 2020 - mdpi.com
Cyber–Physical Systems (CPS) connect the physical world (systems, environments, and
humans) with the cyber world (software, data, etc.) to intelligently enhance the operational …

Blockchain meets Internet of Things (IoT) forensics: A unified framework for IoT ecosystems

S Brotsis, KP Grammatikakis, D Kavallieros, AI Mazilu… - Internet of Things, 2023 - Elsevier
With the continuously increasing number of security incidents targeting sensors, embedded
devices, and other electronics appliances and systems that comprise the so-called Internet …

Cyber forensic investigation infrastructure of Pakistan: an analysis of the cyber threat landscape and readiness

EU Haque, W Abbasi, S Murugesan, MS Anwar… - IEEE …, 2023 - ieeexplore.ieee.org
Rapid growth in technological criminal activities has drawn worldwide attention to cyber
forensics. The objective of a cyber forensics is to provide situation awareness in terms of …

Post-mortem digital forensic artifacts of TikTok Android App

P Domingues, R Nogueira, JC Francisco… - Proceedings of the 15th …, 2020 - dl.acm.org
TikTok is a social network known mostly for the creation and sharing of short videos and for
its popularity for those under 30 years old. Although it has only appeared as Android and …