Digital forensic tools: Recent advances and enhancing the status quo

T Wu, F Breitinger, S O'Shaughnessy - Forensic Science International …, 2020 - Elsevier
Publications in the digital forensics domain frequently come with tools–a small piece of
functional software. These tools are often released to the public for others to reproduce …

[PDF][PDF] Digital forensic tools: A literature review

KM Salih, N Dabagh - Journal of Education and Science, 2023 - iasj.net
Digital forensics is a process of collection, identification, extraction, and documentation of
electronic evidence which is used in a court of law. There are a large number of tools that …

Electronic Evidence: A Framework for Applying Digital Forensics to Data Base

S Boumediene, S Boumediene - Journal of Forensic …, 2023 - publications.aaahq.org
Accounting data bases contain much information reflecting a company's financial
performance, clients, suppliers, and other relevant information about the company's …

[PDF][PDF] The Comparison Performance of Digital Forensic Tools Using Additional Root Access Options

A Leonardo, R Indrayani - Jurnal Ilmiah Teknik Elektro …, 2021 - pdfs.semanticscholar.org
This research used MiChat and SayHi as materials for forensic investigations using three
different tools, namely MOBILedit, Magnet Axiom, and Belkasoft. These three tools will show …

Forensic cloud environment: a solution for big data forensics

O Tabona, A Blyth, TM Maupong… - International Journal of …, 2022 - inderscienceonline.com
Big data forensics is a new and interesting research field because of the enormous amount
of data and a variety of digital sources that are available today. Many of the proposed …

Intelligence sharing in big data forensics

O Tabona, TM Maupong… - … Security and Digital …, 2023 - inderscienceonline.com
With the high prevalence of digital crimes, forensic investigators rely on traditional desktop
tools to conduct investigations. Most of these tools are device-specific and majority of them …

[PDF][PDF] DF-toolkit: interacting with low-level database storage

J Wagner, A Rasin, K Heart, T Malik… - Proceedings of the VLDB …, 2020 - par.nsf.gov
Applications in several areas, such as privacy, security, and integrity validation, require
direct access to database management system (DBMS) storage. However, relational DBM …

On Big Data Forensic and Forensic Cloud Environment

O Tabona, KM Ramokapane… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
The number of electronic devices involved in cyber related crimes has increased
significantly in the last few years. This is primarily due to advancements in technology and …

Forget About It: Batched Database Sanitization

J Wagner, A Rasin - Proceedings of the 39th ACM/SIGAPP Symposium …, 2024 - dl.acm.org
In file systems and database management systems (DBMSes), deleting data marks it as
unallocated storage rather than explicitly erasing data. This data can be reconstructed from …

Forensic Requirements Specification for Mobile Device Malware Forensic Models

AM Alashjaee, M Haney - 2021 IEEE 11th Annual Computing …, 2021 - ieeexplore.ieee.org
Due to the prevalent use of smartphones, mobile devices have attracted some of the most
sophisticated mobile device malware in existence. Traditional forensics investigation tools …