[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
[HTML][HTML] Exploring blockchain technology for chain of custody control in physical evidence: A systematic literature review
D Batista, AL Mangeth, I Frajhof, PH Alves… - Journal of Risk and …, 2023 - mdpi.com
Blockchain technology, initially known for its applications in the financial industry, has
emerged as a promising solution for various other domains. One prominent area for the use …
emerged as a promising solution for various other domains. One prominent area for the use …
[HTML][HTML] The chain of custody in the era of modern forensics: from the classic procedures for gathering evidence to the new challenges related to digital data
T D'Anna, M Puntarello, G Cannella, G Scalzo… - Healthcare, 2023 - mdpi.com
The purpose of this work is to renew the interest and attention for the chain of custody in
forensic medicine, its establishment and maintenance, protecting the integrity and validity of …
forensic medicine, its establishment and maintenance, protecting the integrity and validity of …
[HTML][HTML] Interoperability-Enhanced Knowledge Management in Law Enforcement: An Integrated Data-Driven Forensic Ontological Approach to Crime Scene Analysis
Nowadays, more and more sciences are involved in strengthening the work of law
enforcement authorities. Scientific documentation is evidence highly respected by the courts …
enforcement authorities. Scientific documentation is evidence highly respected by the courts …
A survey on blockchain based IoT forensic evidence preservation: research trends and current challenges
Internet-of-Things and blockchain technology are surging technologies that enhance the
digital world by reusability of current network architecture. Internet-of-Things has cooperated …
digital world by reusability of current network architecture. Internet-of-Things has cooperated …
A forensic framework to improve digital image evidence administration in IIoT✰
The extensive growth of Industrial Internet of Things (IIoT) has prompted cyber attackers to
commence a variety of attacks which need to be identified to maintain the security of …
commence a variety of attacks which need to be identified to maintain the security of …
[HTML][HTML] GM-Ledger: Blockchain-Based Certificate Authentication for International Food Trade
W George, T Al-Ansari - Foods, 2023 - mdpi.com
Maritime transportation plays a critical role for many Arab countries and their food security
and has evolved into a complex system that involves a plethora of supply chain stakeholders …
and has evolved into a complex system that involves a plethora of supply chain stakeholders …
Cloud forensics-enabled chain of custody: a novel and secure modular architecture using Blockchain Hyperledger Sawtooth
The exchange of digital information has significantly emerged in the last decade. The
increased number of cyber threats over the cloud increases the rate of utilisation of cloud …
increased number of cyber threats over the cloud increases the rate of utilisation of cloud …
Computer Vision for Multimedia Geolocation in Human Trafficking Investigation: A Systematic Literature Review
O Bamigbade, J Sheppard, M Scanlon - arXiv preprint arXiv:2402.15448, 2024 - arxiv.org
The task of multimedia geolocation is becoming an increasingly essential component of the
digital forensics toolkit to effectively combat human trafficking, child sexual exploitation, and …
digital forensics toolkit to effectively combat human trafficking, child sexual exploitation, and …
A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence
The effective management of digital evidence is critical to modern forensic investigations.
However, traditional evidence management approaches are often prone to security and …
However, traditional evidence management approaches are often prone to security and …