A review of mobile forensic investigation process models

A Al-Dhaqm, S Abd Razak, RA Ikuesan… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering
Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques …

Efficient and reliable forensics using intelligent edge computing

A Razaque, M Aloqaily, M Almiani, Y Jararweh… - Future Generation …, 2021 - Elsevier
Due to the increasing awareness and use of cloud and edge computing, society and
industries are beginning to understand the benefits they can provide. Cloud and Edge are …

[Retracted] Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications

S Raghavendra, P Srividya, M Mohseni… - Security and …, 2022 - Wiley Online Library
Using cloud computing, businesses can adopt IT without incurring a significant upfront cost.
The Internet has numerous benefits, but model security remains a concern, which affects …

Artificial Intelligence in Social Media Forensics: A Comprehensive Survey and Analysis

BG Bokolo, Q Liu - Electronics, 2024 - mdpi.com
Social media platforms have completely revolutionized human communication and social
interactions. Their positive impacts are simply undeniable. What has also become …

Analisa dan Perbandingan Performa Tools Forensik Digital pada Smartphone Android menggunakan Instant Messaging Whatsapp

IA Plianda, R Indrayani - Jurnal Media Informatika Budidarma, 2022 - stmik-budidarma.ac.id
Technology services are currently developing rapidly, one of the services that rapidly
increased is the development of Instant messaging (IM) technology which is increasingly …

Research on Digital Forensics Analyzing Heterogeneous Internet of Things Incident Investigations

DH Shin, SJ Han, YB Kim, IC Euom - Applied Sciences, 2024 - mdpi.com
In the landscape of the Fourth Industrial Revolution, the integration of the Internet of Things
(IoT) in smart-home technology presents intricate challenges for digital forensics. This study …

Network Attacks Classification for Network Forensics Investigation: Literature Reviews

M Maulana, A Luthfi, DK Wibowo - Jurnal RESTI (Rekayasa Sistem …, 2023 - jurnal.iaii.or.id
The computer network plays an important role in supporting various jobs and other activities
in the cyber world. Various kinds of crimes have often occurred on computer networks. It is …

[PDF][PDF] The Comparison Performance of Digital Forensic Tools Using Additional Root Access Options

A Leonardo, R Indrayani - Jurnal Ilmiah Teknik Elektro …, 2021 - pdfs.semanticscholar.org
This research used MiChat and SayHi as materials for forensic investigations using three
different tools, namely MOBILedit, Magnet Axiom, and Belkasoft. These three tools will show …

Cloud forensics-enabled chain of custody: a novel and secure modular architecture using Blockchain Hyperledger Sawtooth

AA Khan, AA Laghari, A Kumar… - International …, 2023 - inderscienceonline.com
The exchange of digital information has significantly emerged in the last decade. The
increased number of cyber threats over the cloud increases the rate of utilisation of cloud …

Where do Databases and Digital Forensics meet? A Comprehensive Survey and Taxonomy

DB Seufitelli, MA Brandão, ACA Fernandes… - ACM SIGMOD …, 2023 - dl.acm.org
We present a systematic literature review and propose a taxonomy for research at the
intersection of Digital Forensics and Databases. The merge between these two areas has …