[PDF][PDF] Digital chain of custody: State of the art
Y Prayudi, A Sn - International Journal of Computer Applications, 2015 - researchgate.net
Digital forensics starts to show its role and contribution in the society as a solution in
disclosure of cybercrime. The essential in digital forensics is chain of custody, which is an …
disclosure of cybercrime. The essential in digital forensics is chain of custody, which is an …
[PDF][PDF] Improved mechanism to prevent denial of service attack in IPv6 duplicate address detection process
SU Rehman, S Manickam - International Journal of Advanced …, 2017 - researchgate.net
From the days of ARPANET, with slightly over two hundred connected hosts involving five
organizations to a massive global, always-on network connecting hosts in the billions, the …
organizations to a massive global, always-on network connecting hosts in the billions, the …
A procedure for tracing chain of custody in digital image forensics: A paradigm based on grey hash and blockchain
Digital evidence is critical in cybercrime investigations because it is used to connect
individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily …
individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily …
Improving uncertainty in chain of custody for image forensics investigation applications
HM Elgohary, SM Darwish, SM Elkaffas - IEEE Access, 2022 - ieeexplore.ieee.org
Cybercrime investigations rely heavily on digital evidence to establish links between
suspects and the criminal conduct they are allegedly involved in. As a result, digital …
suspects and the criminal conduct they are allegedly involved in. As a result, digital …
[HTML][HTML] Managing Digital Evidence in Cybercrime: Efforts Towards a Sustainable Blockchain-Based Solution
MHA Ratul, S Mollajafari, M Wynn - Sustainability, 2024 - mdpi.com
Digital evidence plays a crucial role in cybercrime investigations by linking individuals to
criminal activities. Data collection, preservation, and analysis can benefit from emerging …
criminal activities. Data collection, preservation, and analysis can benefit from emerging …
Protecting the integrity of digital evidence and basic human rights during the process of digital forensics
S Saleem - 2015 - diva-portal.org
Scientific development and progress in the fields of computer science, information
technology and their related disciplines, have transformed our world into a “digital world” …
technology and their related disciplines, have transformed our world into a “digital world” …
Proof of concept of the online neighbourhood watch system
Potential digital evidence captured by an onlooker at a crime scene when stored in a
repository can be used during criminal investigations, or as admissible evidence in a court of …
repository can be used during criminal investigations, or as admissible evidence in a court of …
Secure and trusted environment as a strategy to maintain the integrity and authenticity of digital evidence
Y Prayudi, TK Priyambodo - International Journal of Security and Its …, 2015 - earticle.net
The authenticity and the integrity of digital evidence are critical issues in digital forensics
activities. Both aspects are directly related to the application of The Locard Exchange …
activities. Both aspects are directly related to the application of The Locard Exchange …
A systematic literature review in cyber forensics: current trends from the client perspective
B Coronel, P Cedillo, K Campos… - 2018 IEEE Third …, 2018 - ieeexplore.ieee.org
Nowadays, with the demand of web applications there is also an increase in the number of
problems and crimes that demand an investigation that requires digital forensics techniques …
problems and crimes that demand an investigation that requires digital forensics techniques …
An Empirical Comparison of Widely Adopted Hash Functions in Digital Forensics: Does the Programming Language and Operating System Make a Difference?
S Gurjar, I Baggili, F Breitinger, A Fischer - 2015 - commons.erau.edu
Hash functions are widespread in computer sciences and have a wide range of applications
such as ensuring integrity in cryptographic protocols, structuring database entries (hash …
such as ensuring integrity in cryptographic protocols, structuring database entries (hash …