A review of mobile forensic investigation process models
A Al-Dhaqm, S Abd Razak, RA Ikuesan… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering
Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques …
Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques …
Digital forensics subdomains: the state of the art and future directions
A Al-Dhaqm, RA Ikuesan, VR Kebande… - IEEE …, 2021 - ieeexplore.ieee.org
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …
scientifically proven digital forensic investigation techniques to corroborate a suspected …
[HTML][HTML] Interpol review of digital evidence 2016-2019
P Reedy - Forensic Science International: Synergy, 2020 - Elsevier
This review paper covers the forensic-relevant literature in digital evidence from 2016 to
2019 as a part of the 19th Interpol International Forensic Science Managers Symposium …
2019 as a part of the 19th Interpol International Forensic Science Managers Symposium …
Common investigation process model for Internet of Things forensics
MA Saleh, SH Othman, A Al-Dhaqm… - … on Smart Computing …, 2021 - ieeexplore.ieee.org
Internet of Things Forensics (IoTFs) is a new discipline in digital forensics science used in
the detection, acquisition, preservation, rebuilding, analyzing, and the presentation of …
the detection, acquisition, preservation, rebuilding, analyzing, and the presentation of …
[HTML][HTML] A Metamodeling Approach for IoT Forensic Investigation
The Internet of Things (IoT) Investigation of Forensics (IoTFI) is one of the subdomains of
Digital Forensics that aims to record and evaluate incidents involving the Internet of Things …
Digital Forensics that aims to record and evaluate incidents involving the Internet of Things …
A survey and a credit card fraud detection and prevention model using the decision tree algorithm
AS Alraddadi - Engineering, Technology & Applied Science Research, 2023 - etasr.com
Today, many people prefer online payment methods due to the rapid growth in cashless
electronic transactions. Credit and debit cards are the most popular electronic payment …
electronic transactions. Credit and debit cards are the most popular electronic payment …
CDBFIP: Common database forensic investigation processes for Internet of Things
Database forensics is a domain that uses database content and metadata to reveal
malicious activities on database systems in an Internet of Things environment. Although the …
malicious activities on database systems in an Internet of Things environment. Although the …
[HTML][HTML] A unified forensic model applicable to the database forensics field
AA Alhussan, A Al-Dhaqm, WMS Yafooz, AHM Emara… - Electronics, 2022 - mdpi.com
The Database Forensics Investigation (DBFI) field is focused on capturing and investigating
database incidents. DBFI is a subdomain of the digital forensics domain, which deals with …
database incidents. DBFI is a subdomain of the digital forensics domain, which deals with …
[HTML][HTML] Towards development of a high abstract model for drone forensic domain
AA Alhussan, A Al-Dhaqm, WMS Yafooz, SBA Razak… - Electronics, 2022 - mdpi.com
Drone Forensics (DRF) is one of the subdomains of digital forensics, which aims to capture
and analyse the drone's incidents. It is a diverse, unclear, and complex domain due to …
and analyse the drone's incidents. It is a diverse, unclear, and complex domain due to …
[HTML][HTML] A Novel Administration Model for Managing and Organising the Heterogeneous Information Security Policy Field
FM Alotaibi, A Al-Dhaqm, WMS Yafooz, YD Al-Otaibi - Applied Sciences, 2023 - mdpi.com
Information security policy (ISP) plays a crucial role in maintaining the availability,
confidentiality, and integrity of sensitive data. However, it is of high complexity and …
confidentiality, and integrity of sensitive data. However, it is of high complexity and …