[PDF][PDF] Digital chain of custody: State of the art

Y Prayudi, A Sn - International Journal of Computer Applications, 2015 - researchgate.net
Digital forensics starts to show its role and contribution in the society as a solution in
disclosure of cybercrime. The essential in digital forensics is chain of custody, which is an …

[PDF][PDF] Improved mechanism to prevent denial of service attack in IPv6 duplicate address detection process

SU Rehman, S Manickam - International Journal of Advanced …, 2017 - researchgate.net
From the days of ARPANET, with slightly over two hundred connected hosts involving five
organizations to a massive global, always-on network connecting hosts in the billions, the …

A procedure for tracing chain of custody in digital image forensics: A paradigm based on grey hash and blockchain

M Ali, A Ismail, H Elgohary, S Darwish, S Mesbah - Symmetry, 2022 - mdpi.com
Digital evidence is critical in cybercrime investigations because it is used to connect
individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily …

Improving uncertainty in chain of custody for image forensics investigation applications

HM Elgohary, SM Darwish, SM Elkaffas - IEEE Access, 2022 - ieeexplore.ieee.org
Cybercrime investigations rely heavily on digital evidence to establish links between
suspects and the criminal conduct they are allegedly involved in. As a result, digital …

[HTML][HTML] Managing Digital Evidence in Cybercrime: Efforts Towards a Sustainable Blockchain-Based Solution

MHA Ratul, S Mollajafari, M Wynn - Sustainability, 2024 - mdpi.com
Digital evidence plays a crucial role in cybercrime investigations by linking individuals to
criminal activities. Data collection, preservation, and analysis can benefit from emerging …

Protecting the integrity of digital evidence and basic human rights during the process of digital forensics

S Saleem - 2015 - diva-portal.org
Scientific development and progress in the fields of computer science, information
technology and their related disciplines, have transformed our world into a “digital world” …

Proof of concept of the online neighbourhood watch system

S Omeleze, HS Venter - e-Infrastructure and e-Services: 7th International …, 2016 - Springer
Potential digital evidence captured by an onlooker at a crime scene when stored in a
repository can be used during criminal investigations, or as admissible evidence in a court of …

Secure and trusted environment as a strategy to maintain the integrity and authenticity of digital evidence

Y Prayudi, TK Priyambodo - International Journal of Security and Its …, 2015 - earticle.net
The authenticity and the integrity of digital evidence are critical issues in digital forensics
activities. Both aspects are directly related to the application of The Locard Exchange …

A systematic literature review in cyber forensics: current trends from the client perspective

B Coronel, P Cedillo, K Campos… - 2018 IEEE Third …, 2018 - ieeexplore.ieee.org
Nowadays, with the demand of web applications there is also an increase in the number of
problems and crimes that demand an investigation that requires digital forensics techniques …

An Empirical Comparison of Widely Adopted Hash Functions in Digital Forensics: Does the Programming Language and Operating System Make a Difference?

S Gurjar, I Baggili, F Breitinger, A Fischer - 2015 - commons.erau.edu
Hash functions are widespread in computer sciences and have a wide range of applications
such as ensuring integrity in cryptographic protocols, structuring database entries (hash …