Digital forensics subdomains: the state of the art and future directions
A Al-Dhaqm, RA Ikuesan, VR Kebande… - IEEE …, 2021 - ieeexplore.ieee.org
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …
scientifically proven digital forensic investigation techniques to corroborate a suspected …
Research challenges and opportunities in drone forensics models
The emergence of unmanned aerial vehicles (also referred to as drones) has transformed
the digital landscape of surveillance and supply chain logistics, especially in terrains where …
the digital landscape of surveillance and supply chain logistics, especially in terrains where …
[HTML][HTML] Holistic digital forensic readiness framework for IoT-enabled organizations
Abstract Internet of Things (IoT) are becoming commonplace in homes, buildings, cities, and
nations, and IoT networks are also getting more complex and interconnected. The …
nations, and IoT networks are also getting more complex and interconnected. The …
Towards the development of an integrated incident response model for database forensic investigation field
A Al-Dhaqm, S Abd Razak, K Siddique… - IEEE …, 2020 - ieeexplore.ieee.org
For every contact that is made in a database, a digital trace will potentially be left and most of
the database breaches are mostly aimed at defeating the major security goals …
the database breaches are mostly aimed at defeating the major security goals …
Common investigation process model for Internet of Things forensics
MA Saleh, SH Othman, A Al-Dhaqm… - … on Smart Computing …, 2021 - ieeexplore.ieee.org
Internet of Things Forensics (IoTFs) is a new discipline in digital forensics science used in
the detection, acquisition, preservation, rebuilding, analyzing, and the presentation of …
the detection, acquisition, preservation, rebuilding, analyzing, and the presentation of …
Real-time monitoring as a supplementary security component of vigilantism in modern network environments
The phenomenon of network vigilantism is autonomously attributed to how anomalies and
obscure activities from adversaries can be tracked in real-time. Needless to say, in today's …
obscure activities from adversaries can be tracked in real-time. Needless to say, in today's …
Secure storage model for digital forensic readiness
Securing digital evidence is a key factor that contributes to evidence admissibility during
digital forensic investigations, particularly in establishing the chain of custody of digital …
digital forensic investigations, particularly in establishing the chain of custody of digital …
A Conceptual Digital Forensic Investigation Model Applicable to the Drone Forensics Field
F Alotaibi, A Al-Dhaqm, YD Al-Otaibi - Engineering, Technology & Applied …, 2023 - etasr.com
Although there is a considerable amount of studies in drone forensics that describe
numerous practical and technical perspectives, there is a lack of a comprehensive …
numerous practical and technical perspectives, there is a lack of a comprehensive …
A novel forensic readiness framework applicable to the drone forensics field
FM Alotaibi, A Al-Dhaqm… - Computational …, 2022 - Wiley Online Library
The Drone Forensics (DRFs) field is a branch of digital forensics, which involves the
identification, capture, preservation, reconstruction, analysis, and documentation of drone …
identification, capture, preservation, reconstruction, analysis, and documentation of drone …
Digital forensic readiness framework for smart homes
Smart homes or home automation devices are increasingly adopted as they become more
useful and simplify daily tasks in our lives. Due to advances in the Internet of Things (IoT) …
useful and simplify daily tasks in our lives. Due to advances in the Internet of Things (IoT) …