A review of mobile forensic investigation process models

A Al-Dhaqm, S Abd Razak, RA Ikuesan… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering
Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques …

Towards the development of an integrated incident response model for database forensic investigation field

A Al-Dhaqm, S Abd Razak, K Siddique… - IEEE …, 2020 - ieeexplore.ieee.org
For every contact that is made in a database, a digital trace will potentially be left and most of
the database breaches are mostly aimed at defeating the major security goals …

Categorization and organization of database forensic investigation processes

A Al-Dhaqm, S Abd Razak, DA Dampier… - IEEE …, 2020 - ieeexplore.ieee.org
Database forensic investigation (DBFI) is an important area of research within digital
forensics. It's importance is growing as digital data becomes more extensive and …

A comprehensive collection and analysis model for the drone forensics field

FM Alotaibi, A Al-Dhaqm, YD Al-Otaibi, AA Alsewari - Sensors, 2022 - mdpi.com
Unmanned aerial vehicles (UAVs) are adaptable and rapid mobile boards that can be
applied to several purposes, especially in smart cities. These involve traffic observation …

A unified forensic model applicable to the database forensics field

AA Alhussan, A Al-Dhaqm, WMS Yafooz, AHM Emara… - Electronics, 2022 - mdpi.com
The Database Forensics Investigation (DBFI) field is focused on capturing and investigating
database incidents. DBFI is a subdomain of the digital forensics domain, which deals with …

Towards development of a high abstract model for drone forensic domain

AA Alhussan, A Al-Dhaqm, WMS Yafooz, SBA Razak… - Electronics, 2022 - mdpi.com
Drone Forensics (DRF) is one of the subdomains of digital forensics, which aims to capture
and analyse the drone's incidents. It is a diverse, unclear, and complex domain due to …

A Novel Administration Model for Managing and Organising the Heterogeneous Information Security Policy Field

FM Alotaibi, A Al-Dhaqm, WMS Yafooz, YD Al-Otaibi - Applied Sciences, 2023 - mdpi.com
Information security policy (ISP) plays a crucial role in maintaining the availability,
confidentiality, and integrity of sensitive data. However, it is of high complexity and …

A metamodel for mobile forensics investigation domain

A Ali, S Abd Razak, SH Othman, A Mohammed… - PloS one, 2017 - journals.plos.org
With the rapid development of technology, mobile phones have become an essential tool in
terms of crime fighting and criminal investigation. However, many mobile forensics …

Advanced technologies and mathematical metacognition: The present and future orientation

A Kouzalis, A Antoniou, N Rossides, R Panaoura… - BioSystems, 2024 - Elsevier
The intersection of mathematical cognition, metacognition, and advanced technologies
presents a frontier with profound implications for human learning and artificial intelligence …

Overview of u-learning. Concepts, characteristics, uses, application scenarios and topics for research

GAM Lopez, JAJ Builes… - IEEE Latin America …, 2016 - ieeexplore.ieee.org
The Information and Communication Technology (ICT) has generated important changes in
the education process. This paper presents an overview of u-learning as a paradigm that …