[HTML][HTML] Cyber resilience and incident response in smart cities: A systematic literature review

G Ahmadi-Assalemi, H Al-Khateeb, G Epiphaniou… - Smart Cities, 2020 - mdpi.com
The world is experiencing a rapid growth of smart cities accelerated by Industry 4.0,
including the Internet of Things (IoT), and enhanced by the application of emerging …

Digital forensics: challenges and opportunities for future studies

R Montasari, R Hill, S Parkinson, P Peltola… - International Journal of …, 2020 - igi-global.com
Considering the ever-growing ubiquity of technology, there is an associated growth in the
possibility of digital devices related to a criminal investigation or civil litigation. As the variety …

[HTML][HTML] Unboxing the digital forensic investigation process

G Horsman, N Sunde - Science & Justice, 2022 - Elsevier
As digital forensics continues to play an important role in criminal investigations, it is crucial
that its investigative work is underpinned with well-defined and robust methodologies. Over …

[HTML][HTML] The effect of ISO/IEC 27001 standard over open-source intelligence

A Qusef, H Alkilani - PeerJ Computer Science, 2022 - peerj.com
The Internet's emergence as a global communication medium has dramatically expanded
the volume of content that is freely accessible. Through using this information, open-source …

Research perspective on digital forensic tools and investigation process

K Barik, A Abirami, K Konar, S Das - Illumination of Artificial Intelligence in …, 2022 - Springer
The digital forensic tool plays a crucial role in protecting from share trading fraud, financial
fraud, identity theft, and money laundering. Investigators in Digital Forensic analysis have …

[HTML][HTML] A comprehensive forensic preservation methodology for crypto wallets

S Taylor, SH Kim, KAZ Ariffin, SNHS Abdullah - Forensic Science …, 2022 - Elsevier
Studies have shown that the existing methodology of digital forensics preservation, which is
to acquire and hash the evidence, is insufficient for cryptocurrencies as it does not secure …

[PDF][PDF] Forensic analysis using text clustering in the age of large volume data: A review

B Almaslukh - International Journal of Advanced …, 2019 - pdfs.semanticscholar.org
Exploring digital devices in order to generate digital evidence related to an incident being
investigated is essential in modern digital investigation. The emergence of text clustering …

[PDF][PDF] Pengukuran Kelayakan Simulator Forensik Digital Menggunakan Metode Multimedia Mania

EP Nugroho, I Afrianto… - MATRIK …, 2022 - download.garuda.kemdikbud.go.id
Pengujian kelayakan suatu media pembelajaran merupakan hal yang penting dilakukan
untuk menjamin keberlangsungan, keberlanjutan dan keterikatan (engagement) antara …

A Granular Approach to Secure the Privacy of Electronic Health Records Through Blockchain Technology

M Jain, D Pandey, KK Sharma - International Journal of Distributed …, 2022 - igi-global.com
The method of storing data in traditional Electronic Health Records (EHRs) becomes even
more obsolete when it has to undertake data from more than one institution. This problem is …

[PDF][PDF] 面向网络取证的网络攻击追踪溯源技术分析

刘雪花, 丁丽萍, 郑涛, 吴敬征, 李彦峰 - 软件学报, 2020 - jos.org.cn
首先定位网络攻击事件的源头, 然后进行有效的电子数据证据的收集, 是网络取证的任务之一.
定位网络攻击事件源头需要使用网络攻击追踪溯源技术. 然而, 现有的网络攻击追踪溯源技术 …