Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - Ieee …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

A review of mobile forensic investigation process models

A Al-Dhaqm, S Abd Razak, RA Ikuesan… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering
Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques …

[HTML][HTML] Forensic operations for recognizing sqlite content (forc): An automated forensic tool for efficient sqlite evidence extraction on android devices

E Daraghmi, Z Qaroush, M Hamdi, O Cheikhrouhou - Applied Sciences, 2023 - mdpi.com
Mobile forensics is crucial in reconstructing various everyday activities accomplished
through mobile applications during an investigation. Manual analysis can be tedious, time …

Blockchain and crypto forensics: Investigating crypto frauds

U Agarwal, V Rishiwal, S Tanwar… - International Journal of …, 2024 - Wiley Online Library
In the past few years, cryptocurrency has gained widespread acceptance because of its
decentralized nature, quick and secure transactions, and potential for investment and …

Digital forensics subdomains: the state of the art and future directions

A Al-Dhaqm, RA Ikuesan, VR Kebande… - IEEE …, 2021 - ieeexplore.ieee.org
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …

Towards the development of an integrated incident response model for database forensic investigation field

A Al-Dhaqm, S Abd Razak, K Siddique… - IEEE …, 2020 - ieeexplore.ieee.org
For every contact that is made in a database, a digital trace will potentially be left and most of
the database breaches are mostly aimed at defeating the major security goals …

Cyber forensic investigation infrastructure of Pakistan: an analysis of the cyber threat landscape and readiness

EU Haque, W Abbasi, S Murugesan, MS Anwar… - IEEE …, 2023 - ieeexplore.ieee.org
Rapid growth in technological criminal activities has drawn worldwide attention to cyber
forensics. The objective of a cyber forensics is to provide situation awareness in terms of …

[HTML][HTML] Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments

VR Kebande, RA Ikuesan, NM Karie, S Alawadi… - Forensic Science …, 2020 - Elsevier
Abstract Machine learning has been shown as a promising approach to mine larger
datasets, such as those that comprise data from a broad range of Internet of Things devices …

Common investigation process model for Internet of Things forensics

MA Saleh, SH Othman, A Al-Dhaqm… - … on Smart Computing …, 2021 - ieeexplore.ieee.org
Internet of Things Forensics (IoTFs) is a new discipline in digital forensics science used in
the detection, acquisition, preservation, rebuilding, analyzing, and the presentation of …

A cybersecurity awareness model for the protection of saudi students from social media attacks

G Alotibi - Engineering, Technology & Applied Science Research, 2024 - etasr.com
Social engineering addresses a broad category of techniques aiming to persuade someone
to reveal data or perform actions for criminal purposes, such as disclosing personal …