KM Salih, N Dabagh - Journal of Education and Science, 2023 - iasj.net
Digital forensics is a process of collection, identification, extraction, and documentation of electronic evidence which is used in a court of law. There are a large number of tools that …
S Boumediene, S Boumediene - Journal of Forensic …, 2023 - publications.aaahq.org
Accounting data bases contain much information reflecting a company's financial performance, clients, suppliers, and other relevant information about the company's …
A Leonardo, R Indrayani - Jurnal Ilmiah Teknik Elektro …, 2021 - pdfs.semanticscholar.org
This research used MiChat and SayHi as materials for forensic investigations using three different tools, namely MOBILedit, Magnet Axiom, and Belkasoft. These three tools will show …
Big data forensics is a new and interesting research field because of the enormous amount of data and a variety of digital sources that are available today. Many of the proposed …
O Tabona, TM Maupong… - … Security and Digital …, 2023 - inderscienceonline.com
With the high prevalence of digital crimes, forensic investigators rely on traditional desktop tools to conduct investigations. Most of these tools are device-specific and majority of them …
Applications in several areas, such as privacy, security, and integrity validation, require direct access to database management system (DBMS) storage. However, relational DBM …
The number of electronic devices involved in cyber related crimes has increased significantly in the last few years. This is primarily due to advancements in technology and …
J Wagner, A Rasin - Proceedings of the 39th ACM/SIGAPP Symposium …, 2024 - dl.acm.org
In file systems and database management systems (DBMSes), deleting data marks it as unallocated storage rather than explicitly erasing data. This data can be reconstructed from …
AM Alashjaee, M Haney - 2021 IEEE 11th Annual Computing …, 2021 - ieeexplore.ieee.org
Due to the prevalent use of smartphones, mobile devices have attracted some of the most sophisticated mobile device malware in existence. Traditional forensics investigation tools …