Results 11 to 20 of about 143,742 (178)

Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2020
Current crime is increasing, one of which is the crime of using social media, although no crime does not leave digital evidence. Twitter application is a social media that is widely used by its users.
Ikhsan Zuhriyanto   +2 more
doaj   +1 more source

Smart Digital Forensic Readiness Model for Shadow IoT Devices

open access: yesApplied Sciences, 2022
Internet of Things (IoT) is the network of physical objects for communication and data sharing. However, these devices can become shadow IoT devices when they connect to an existing network without the knowledge of the organization’s Information ...
Funmilola Ikeolu Fagbola, Hein S. Venter
doaj   +1 more source

Detection of Double-Compressed Videos Using Descriptors of Video Encoders

open access: yesSensors, 2022
In digital forensics, video becomes important evidence in an accident or a crime. However, video editing programs are easily available in the market, and even non-experts can delete or modify a section of an evidence video that contains adverse evidence.
Yun Gu Lee, Gihyun Na, Junseok Byun
doaj   +1 more source

A Case-Based Reasoning Method for Locating Evidence During Digital Forensic Device Triage [PDF]

open access: yes, 2014
The role of triage in digital forensics is disputed, with some practitioners questioning its reliability for identifying evidential data. Although successfully implemented in the field of medicine, triage has not established itself to the same degree in ...
Horsman, Graeme   +2 more
core   +1 more source

Calm before the storm: the challenges of cloud computing in digital forensics [PDF]

open access: yes, 2012
Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into ...
A.Reyes   +8 more
core   +4 more sources

Digital Forensic Science: A Manifesto

open access: yesSouth African Computer Journal, 2016
Forensic examination of evidence holds the promise of making claims about the truth of certain propositions with the inherent accuracy and reliability that characterises scientific endeavours.
Martin S Olivier
doaj   +1 more source

Digital Forensics Subdomains: The State of the Art and Future Directions

open access: yesIEEE Access, 2021
For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident.
Arafat Al-Dhaqm   +7 more
doaj   +1 more source

A Harmonized Information Security Taxonomy for Cyber Physical Systems

open access: yesApplied Sciences, 2022
Cyber physical systems (CPSs) are found in many aspects of daily life, and they control and protect energy production, manufacturing and even healthcare.
Johannes Hendrik Pool, Hein Venter
doaj   +1 more source

Digital forensics [PDF]

open access: yes, 2021
This chapter describes a network discovery technique on the basis of websites sharing the same Google Analytics and/or AdSense IDs.
  +5 more sources

Comparative Analysis of Forensic Software on Android-based MiChat using ACPO and DFRWS Framework

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2023
Instant Messaging (IM) is a popular and widely used communication application. MiChat is a multi-platform instant chat service with several features that can attract various segments of the population to use it as a tool for committing cybercrimes.
Imam Riadi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy