[HTML][HTML] A forensics and compliance auditing framework for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - International Journal of Critical …, 2023 - Elsevier
Contemporary societies are increasingly dependent on products and services provided by
Critical Infrastructure (CI) such as power plants, energy distribution networks, transportation …

A survey on forensics and compliance auditing for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - IEEE Access, 2024 - ieeexplore.ieee.org
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …

[PDF][PDF] Comparative evaluation of mobile forensic tools

O Osho, SO Ohida - IJ Inf. Technol. Comput. Sci, 2016 - researchgate.net
Mobile technology, over the years, has improved tremendously in sophistication and
functionality. Today, there are mobile phones, known as smartphones, that can perform …

[PDF][PDF] Forensics image acquisition process of digital evidence

E Akbal, S Dogan - International Journal of Computer Network and …, 2018 - mecs-press.org
For solving the crimes committed on digital materials, they have to be copied. An evidence
must be copied properly in valid methods that provide legal availability. Otherwise, the …

Security and Privacy in Cloud Computing

R Krishnan - 2017 - scholarworks.wmich.edu
Cloud computing (CC) gained a widespread acceptance as a paradigm of computing. The
main aim of CC is to reduce the need for customers' investment in new hardware or software …

[PDF][PDF] Conceptual model of national intellectucal system for children safety in internet environment

R Alguliyev, S Ojagverdieva - International Journal of Computer …, 2019 - mecs-press.net
The article presents a conceptual model for the national intellectual system aiming the safety
provision of the children in Internet environment. The structucal components and work …

Shaping anti-corruption strategies: investigator perspectives on electronic records

AA Lawan, P Henttonen - Journal of Financial Crime, 2024 - emerald.com
Purpose This study aims to investigate the specific difficulties involved in implementing
electronic recordkeeping for anti-corruption investigations in Nigeria. It recognises the …

[PDF][PDF] Pnfea: A proposal approach for proactive network forensics evidence analysis to resolve cyber crimes

M Rasmi, A Al-Qerem - International Journal of Computer Network …, 2015 - mecs-press.org
Nowadays, cyber crimes are increasing and have affected large organizations with highly
sensitive information. Consequently, the affected organizations spent more resources …

Clustering and Classification of Digital Forensic Data Using Machine Learning and Data Mining Approaches

EFI Raj - Advancements in Cybercrime Investigation and Digital …, 2023 - taylorfrancis.com
Nowadays, crime investigators collect a more significant amount of potential digital evidence
from suspects, necessitating the use of digital forensic techniques. This evidence is …

Standard ISO 27037: 2012 and collection of digital evidence: Experience in the Czech Republic

J Veber, Z Smutny - European Conference on Cyber Warfare and …, 2015 - books.google.com
Collection of digital evidence in criminal investigation is gaining in importance. It is an
outgrowth of the development and penetration of ICT into society (informatization). After a …