A survey on forensics and compliance auditing for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - IEEE Access, 2024 - ieeexplore.ieee.org
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …

Visualizing digital forensic datasets: a proof of concept

CFR Tassone, B Martini… - Journal of forensic …, 2017 - Wiley Online Library
Digital forensic visualization is an understudied area despite its potential to achieve
significant improvements in the efficiency of an investigation, criminal or civil. In this study, a …

Forensic visualization: survey and future research directions

C Tassone, B Martini, KKR Choo - Contemporary digital forensic …, 2017 - Elsevier
This chapter provides a stripped-down background into the digital forensics process and the
issues that practitioners face in this increasingly dynamic environment focusing on portable …

Data mining-based integrated network traffic visualization framework for threat detection

AK Bhardwaj, M Singh - Neural Computing and Applications, 2015 - Springer
In this speedy and voluminous digital world, the threat detection and reporting are a
challenging job for rapid action. The present study deals with a strong and viable solution to …

Graph-based temporal analysis in digital forensics

NA Adderley - 2019 - scholar.afit.edu
Establishing a timeline as part of a digital forensics investigation is a vital part of
understanding the order in which system events occurred. However, most digital forensics …

A framework for identifying host-based artifacts in dark web investigations

A Kulm - 2020 - scholar.dsu.edu
The dark web is the hidden part of the internet that is not indexed by search engines and is
only accessible with a specific browser like The Onion Router (Tor). Tor was originally …

[PDF][PDF] Trustworthy and useful tools for mobile phone extraction

AM Piskopani, H Webb, L Dowthwaite… - The Leading Role of …, 2024 - dialnet.unirioja.es
Data collected from mobile phones can be a valuable resource in the investigation of crime.
However, the processes of collecting, handling and analysing such data raise ethical …

Development of InfoVis software for digital forensics

G Osborne, B Turnbull, J Slay - 2012 IEEE 36th Annual …, 2012 - ieeexplore.ieee.org
Information Visualisation techniques are one method that may be used to combat the
growing complexity and data sizes associated with digital forensic investigations. This work …

[PDF][PDF] Digital forensics: an overview of the current trends

N Rahim, WA Wahab, YI Idris, LM Kiah - Int J Cryptol Res, 2014 - researchgate.net
There are various digital forensic models occupied in digital investigative processes.
Developments of the suitable Digital Forensic Framework (DFF) were required for …

Answering to 5W using digital forensics data

C Ferrante, B Habibnia - 2021 International Symposium on …, 2021 - ieeexplore.ieee.org
In recent years the increasing capacity of storage devices, the advent of the cloud and the
quantity of email, messages, chats, pictures and files exchanged, led the data to be …