A comprehensive survey on artifact recovery from social media platforms: approaches and future research directions
Social media applications have been ubiquitous in modern society, and their usage has
grown exponentially over the years. With the widespread adoption of these platforms, social …
grown exponentially over the years. With the widespread adoption of these platforms, social …
A Comparative Study on the Performance of 64-bit ARM Processors.
Mobile devices are playing an important role in our daily lives. Nowadays, mobile devices
are not only phones to call and text, but they are also smart devices that enable users to do …
are not only phones to call and text, but they are also smart devices that enable users to do …
Security challenges review in Agile and DevOps practices
S Afaneh, MR Al-Mousa, HS Al-hamid… - 2023 International …, 2023 - ieeexplore.ieee.org
Agile and DevOps methodologies are becoming increasingly popular in software
development, as they offer many benefits to software development teams and the …
development, as they offer many benefits to software development teams and the …
Comparison of Digital Forensic Tools for Drug Trafficking Cases on Instagram Messenger using NIST Method
MFM Nahdli, I Riadi, MK Biddinika - Scientific Journal of …, 2024 - journal.unnes.ac.id
Purpose: Cybercrime is an unlawful act that utilizes computer technology and the
development of the internet. Cybercrime can occur on all electronic devices, including …
development of the internet. Cybercrime can occur on all electronic devices, including …
A Study on the Forensic Analysis of Airlines Applications on Android Operating System
U Maryam, M Hussain - 2023 IEEE Conference on Dependable …, 2023 - ieeexplore.ieee.org
Airline mobile applications store a lot of sensitive data in mobile devices such as users'
Personal Identifiable Information (PII) and credit/debit card details. In this paper, we have …
Personal Identifiable Information (PII) and credit/debit card details. In this paper, we have …
Analyzing and contrasting machine learning algorithms for Intrusion Detection System
S Al-Daja, MR Al-Mousa, A Al-Qammaz… - … Arab Conference on …, 2023 - ieeexplore.ieee.org
As the prevalence of sophisticated network attacks continues to rise, enhancing
conventional intrusion detection systems (IDS) methods presents a significant challenge …
conventional intrusion detection systems (IDS) methods presents a significant challenge …