[HTML][HTML] Best practices and current implementation of emerging smartphone-based (bio) sensors–Part 1: Data handling and ethics

GMS Ross, Y Zhao, AJ Bosman… - TrAC Trends in …, 2023 - Elsevier
Smartphones are ubiquitous in modern society; in 2021, the number of active subscriptions
surpassed 6 billion. These devices have become more than a means of communication; …

Digital forensics subdomains: the state of the art and future directions

A Al-Dhaqm, RA Ikuesan, VR Kebande… - IEEE …, 2021 - ieeexplore.ieee.org
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …

[HTML][HTML] A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response

D Dunsin, MC Ghanem, K Ouazzane… - Forensic Science …, 2024 - Elsevier
In the dynamic landscape of digital forensics, the integration of Artificial Intelligence (AI) and
Machine Learning (ML) stands as a transformative technology, poised to amplify the …

[HTML][HTML] Forensic operations for recognizing sqlite content (forc): An automated forensic tool for efficient sqlite evidence extraction on android devices

E Daraghmi, Z Qaroush, M Hamdi, O Cheikhrouhou - Applied Sciences, 2023 - mdpi.com
Mobile forensics is crucial in reconstructing various everyday activities accomplished
through mobile applications during an investigation. Manual analysis can be tedious, time …

[HTML][HTML] Technology in forensic sciences: Innovation and precision

X Chango, O Flor-Unda, P Gil-Jiménez… - Technologies, 2024 - mdpi.com
The advancement of technology and its developments have provided the forensic sciences
with many cutting-edge tools, devices, and applications, allowing forensics a better and …

Assessing the effectiveness of masking and encryption in safeguarding the identity of social media publishers from advanced metadata analysis

M Khader, M Karam - Data, 2023 - mdpi.com
Machine learning algorithms, such as KNN, SVM, MLP, RF, and MLR, are used to extract
valuable information from shared digital data on social media platforms through their APIs in …

[HTML][HTML] Contamination of digital evidence: Understanding an underexposed risk

J Gruber, CJ Hargreaves, FC Freiling - Forensic Science International …, 2023 - Elsevier
The dangers of contamination have received considerable attention in the literature
regarding the investigation of physical crime scenes and physical evidence. The …

[HTML][HTML] Bitcoin as an investment and hedge alternative. A DCC MGARCH model analysis

KO Rudolf, S Ajour El Zein, NJ Lansdowne - Risks, 2021 - mdpi.com
Volatility and investor sentiment have been factors for the slow adoption rate of Bitcoin (BTC)
that was first recognized in 2008 as a potential store of value, investment vehicle and a …

Testing a hybrid risk assessment model: predicting CSAM offender risk from digital forensic artifacts

KC Seigfried-Spellar, MK Rogers, NL Matulis… - Child Abuse & …, 2024 - Elsevier
Background Recent research argues for a formalized hybrid risk assessment model that
combines the current online child sex abuse risk measures with digital forensics artifacts …

[HTML][HTML] Encrochat: The hacker with a warrant and fair trials?

R Stoykova - Forensic Science International: Digital Investigation, 2023 - Elsevier
This paper introduces the Encrochat operation as an example of the technological, cross-
border, and cross-disciplinary complexity of one contemporary digital investigation. The use …