Framework for the retrieval of social media and instant messaging evidence from volatile memory

RD Thantilage, NA Le Khac - … On Trust, Security And Privacy In …, 2019 - ieeexplore.ieee.org
The human society today has had to be confronted by the threat posed by criminals who are
taking the advantages of social media and instant-messaging apps to conduct their criminal …

[PDF][PDF] Review Tools Web Browser Forensics untuk Mendukung Pencarian Bukti Digital

MF Sidiq, MN Faiz - J. Edukasi dan Penelit. Inform, 2019 - pdfs.semanticscholar.org
Perkembangan penggunaan internet yang semakin banyak setiap tahunnya mengakibatkan
penggunaan web browser juga meningkat. Hal ini berdampak pada kejahatan dengan …

Analysis of web browser for digital forensics investigation

BH AlOwaimer, S Mishra - International Journal of …, 2021 - inderscienceonline.com
In today's digitalised world, a lot of information is getting online; the size of online data is
getting huge day by day, and thus here emerges the field of data science. An internal …

[PDF][PDF] Detection of metasploit attacks using RAM Forensic on proprietary operating systems

DC Prakoso, I Riadi, Y Prayudi - Kinetik: Game Technology, Information …, 2020 - core.ac.uk
Information technology has become an essential thing in the digital era as it is today. With
the support of computer networks, information technology is used as a medium for …

The Influence of Virtual Secure Mode (VSM) on Memory Acquisition

NDW Cahyani, EM Jadied… - International …, 2022 - search.proquest.com
Abstract Recently, acquiring the Random Access Memory (RAM) full memory and access
data is gaining significant interest in digital forensics. However, a security feature on the …

Survey and Analysis of IoT Operating Systems: A Comparative Study on the Effectiveness and Acquisition Time of Open Source Digital Forensics Tools

J Fairbanks, MM Arifin, S Afreen, A Curtis - arXiv preprint arXiv …, 2024 - arxiv.org
The main goal of this research project is to evaluate the effectiveness and speed of open-
source forensic tools for digital evidence collecting from various Internet-of-Things (IoT) …

Comparative Analysis of Cloning-Hashing Applications for Securing Digital Evidence

MN Faiz - Infotekmesin, 2023 - ejournal.pnc.ac.id
The development of the Internet has resulted in an increasing variety of cyber crimes.
Cybercrime is closely related to digital evidence, so cybercriminals tend to delete, hide, and …

Analisis Kinerja Perangkat Lunak Forensic Imaging Pada Sistem Operasi Linux Menggunakan Metode Static Forensic

A Yudhana, I Riadi - Insect (Informatics and Security) …, 2022 - ejournal.um-sorong.ac.id
Perkembangan teknologi berbanding lurus dengan kasus kejahatan siber (cybercrime), hal
tersebut menjadi kunci perkembangan modus-modus dalam kejahatan siber, namun dapat …

[PDF][PDF] A Critical Introspective Analysis of Memory Acquisition Tools: An Investigative Approach

A Thakar, KV Ravikumar, K Kumar, BV Patel - Indian Police J., 2021 - bprd.nic.in
Forensically sound evidence processing is the key component of prosecution to convict the
perpetrator. When an investigator approaches the crime scene and encounters the running …

Operational Frameworks in Data Acquisition and Incidence Handling for Cyber Forensics Exploiting BigData رسالة ماجستير‎

LNEM Abuarram - 2023 - repository.aaup.edu
BigData is a key component of the fourth industrial revolution and has garnered significant
attention in recent years due to its ability to handle large amounts of data with speed and …