[HTML][HTML] Behavioral analysis of cybercrime: Paving the way for effective policing strategies

G Sarkar, SK Shukla - Journal of Economic Criminology, 2023 - Elsevier
This comprehensive survey paper offers a panoramic exploration of the dynamic realm of
cybercrime policing, encompassing a wide spectrum of intricacies from cybercrime …

[PDF][PDF] Digital chain of custody: State of the art

Y Prayudi, A Sn - International Journal of Computer Applications, 2015 - researchgate.net
Digital forensics starts to show its role and contribution in the society as a solution in
disclosure of cybercrime. The essential in digital forensics is chain of custody, which is an …

Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer

AH Lone, RN Mir - Digital investigation, 2019 - Elsevier
Abstract Advancements in Information Technology landscape over the past two decades
have made the collection, preservation, and analysis of digital evidence an extremely …

[PDF][PDF] Improving chain of custody in forensic investigation of electronic digital systems

G Giova - International Journal of Computer Science and …, 2011 - academia.edu
Forensic investigators should acquire and analyze large amount of digital evidence and
submit to the court the technical truth about facts in virtual worlds. Since digital evidence is …

A survey on forensics and compliance auditing for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - IEEE Access, 2024 - ieeexplore.ieee.org
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …

Tactics, techniques and procedures of cybercrime: A methodology and tool for cybercrime investigation process

G Sarkar, H Singh, S Kumar, SK Shukla - Proceedings of the 18th …, 2023 - dl.acm.org
Individuals, organizations and nation-states are increasingly falling victim to cyberattacks. A
lot of research on how to understand the modus operandi of a cyber attacker through the …

Custodyblock: A distributed chain of custody evidence framework

FF Alruwaili - Information, 2021 - mdpi.com
With the increasing number of cybercrimes, the digital forensics team has no choice but to
implement more robust and resilient evidence-handling mechanisms. The capturing of …

[PDF][PDF] Digital evidence cabinets: A proposed framework for handling digital chain of custody

Y Prayudi, A Ashari, TK Priyambodo - International Journal of …, 2014 - researchgate.net
Chain of custody is the procedure to do a chronological documentation of evidence, and it is
an important procedure in the investigation process. Both physical and digital evidence is an …

Distilling blockchain requirements for digital investigation platforms

O Olukoya - Journal of Information Security and Applications, 2021 - Elsevier
When handling a security incident, there is a lot of information that needs to be stored,
processed, and analyzed. As a result of the volume of information and the necessity to deal …

Responding to targeted stealthy attacks on android using timely-captured memory dumps

J Bellizzi, M Vella, C Colombo… - IEEE Access, 2022 - ieeexplore.ieee.org
The increasing dominance of Android smartphones for everyday communication and data
processing makes long-term stealthy malware an even more dangerous threat. Recent …