[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
A review of mobile forensic investigation process models
A Al-Dhaqm, S Abd Razak, RA Ikuesan… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering
Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques …
Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques …
A multifaceted framework for adoption of cloud computing in Malaysian SMEs
A Asiaei, NZ Ab. Rahim - Journal of Science and Technology Policy …, 2019 - emerald.com
Purpose The purpose of this study is to develop a model to understand the relationships
among technology, organizational and environmental (TOE) contexts, intention to adopt …
among technology, organizational and environmental (TOE) contexts, intention to adopt …
A systematic survey on cloud forensics challenges, solutions, and future directions
The challenges of cloud forensics have been well-documented by both researchers and
government agencies (eg, US National Institute of Standards and Technology), although …
government agencies (eg, US National Institute of Standards and Technology), although …
Research challenges and opportunities in drone forensics models
The emergence of unmanned aerial vehicles (also referred to as drones) has transformed
the digital landscape of surveillance and supply chain logistics, especially in terrains where …
the digital landscape of surveillance and supply chain logistics, especially in terrains where …
[HTML][HTML] Interpol review of digital evidence 2016-2019
P Reedy - Forensic Science International: Synergy, 2020 - Elsevier
This review paper covers the forensic-relevant literature in digital evidence from 2016 to
2019 as a part of the 19th Interpol International Forensic Science Managers Symposium …
2019 as a part of the 19th Interpol International Forensic Science Managers Symposium …
Proactive forensics in IoT: Privacy-aware log-preservation architecture in fog-enabled-cloud using holochain and containerization technologies
Collecting and preserving the smart environment logs connected to cloud storage is
challenging due to the black-box nature and the multi-tenant cloud models which can …
challenging due to the black-box nature and the multi-tenant cloud models which can …
[HTML][HTML] Holistic digital forensic readiness framework for IoT-enabled organizations
Abstract Internet of Things (IoT) are becoming commonplace in homes, buildings, cities, and
nations, and IoT networks are also getting more complex and interconnected. The …
nations, and IoT networks are also getting more complex and interconnected. The …
Towards the development of an integrated incident response model for database forensic investigation field
A Al-Dhaqm, S Abd Razak, K Siddique… - IEEE …, 2020 - ieeexplore.ieee.org
For every contact that is made in a database, a digital trace will potentially be left and most of
the database breaches are mostly aimed at defeating the major security goals …
the database breaches are mostly aimed at defeating the major security goals …
Real-time monitoring as a supplementary security component of vigilantism in modern network environments
The phenomenon of network vigilantism is autonomously attributed to how anomalies and
obscure activities from adversaries can be tracked in real-time. Needless to say, in today's …
obscure activities from adversaries can be tracked in real-time. Needless to say, in today's …