Integrating industry 4.0 technologies for the administration of courts and justice dispensation—a systematic review
H Bhatt, R Bahuguna, S Swami, R Singh… - Humanities and Social …, 2024 - nature.com
The judiciary is a foundation of democracy, upholding the rule of law and protecting rights.
Efficient court administration is vital for public trust, justice, and timely proceedings …
Efficient court administration is vital for public trust, justice, and timely proceedings …
[HTML][HTML] Forensic investigation, challenges, and issues of Cloud Data: A systematic literature review
MM Alshabibi, AK Bu dookhi, MM Hafizur Rahman - Computers, 2024 - mdpi.com
Cloud computing technology delivers services, resources, and computer systems over the
internet, enabling the easy modification of resources. Each field has its challenges, and the …
internet, enabling the easy modification of resources. Each field has its challenges, and the …
NLP-based digital forensic analysis for online social network based on system security
Social media evidence is the new topic in digital forensics. If social media information is
correctly explored, there will be significant support for investigating various offenses …
correctly explored, there will be significant support for investigating various offenses …
Ai-enabled system for efficient and effective cyber incident detection and response in cloud environments
MAM Farzaan, MC Ghanem, A El-Hajjar… - arxiv preprint arxiv …, 2024 - arxiv.org
The escalating sophistication and volume of cyber threats in cloud environments necessitate
a paradigm shift in strategies. Recognising the need for an automated and precise response …
a paradigm shift in strategies. Recognising the need for an automated and precise response …
Crypto-preserving investigation framework for deep learning based malware attack detection for network forensics
The exponential growth in technology observed over the past decade has introduced newer
ways to exploit network and cyber-physical system-related vulnerabilities. Cybercriminals …
ways to exploit network and cyber-physical system-related vulnerabilities. Cybercriminals …
[PDF][PDF] Digital forensic tools: A literature review
KM Salih, N Dabagh - Journal of Education and Science, 2023 - iasj.net
Digital forensics is a process of collection, identification, extraction, and documentation of
electronic evidence which is used in a court of law. There are a large number of tools that …
electronic evidence which is used in a court of law. There are a large number of tools that …
An optimized neural network for prediction of security threats on software testing
RA Khan - Computers & Security, 2024 - Elsevier
Software testing involves evaluating and confirming a software program or product to ensure
it operates according to its intended functionality. Testing offers advantages like bug …
it operates according to its intended functionality. Testing offers advantages like bug …
A Metamodeling Approach for Structuring and Organizing Cloud Forensics Domain
R Al-Mugerrn, A Al-Dhaqm… - … Conference on Smart …, 2023 - ieeexplore.ieee.org
Metamodeling is a technique that can be utilized in general to integrate and define models
from various cloud computing research areas. Metamodeling method is applicable in a wide …
from various cloud computing research areas. Metamodeling method is applicable in a wide …
Research perspective on digital forensic tools and investigation process
The digital forensic tool plays a crucial role in protecting from share trading fraud, financial
fraud, identity theft, and money laundering. Investigators in Digital Forensic analysis have …
fraud, identity theft, and money laundering. Investigators in Digital Forensic analysis have …
An evolutionary algorithmic framework cloud based evidence collection architecture
Forensic in cloud computing is an advancement of evolutionary modern forensic science
that protects against cyber criminals. Single centralize point compilation and storage of data …
that protects against cyber criminals. Single centralize point compilation and storage of data …