Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
84
0
2

Year Published

2012
2012
2020
2020

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 176 publications
(86 citation statements)
references
References 10 publications
0
84
0
2
Order By: Relevance
“…Digital forensics is defined as proven methodology towards the collection, identification, validation, and analysis of digital data logs for the purpose of further criminal investigation [20].…”
Section: Digital Forensicsmentioning
confidence: 99%
“…Digital forensics is defined as proven methodology towards the collection, identification, validation, and analysis of digital data logs for the purpose of further criminal investigation [20].…”
Section: Digital Forensicsmentioning
confidence: 99%
“…Presently there are several digital forensic investigation methodologies developed to assist law enforcement in dealing with the digitallybased evidence. The review which will only focus on the number of forensic models that have been proposed reveals the role of documentation process in digital forensic investigation models or frameworks as in Table (1), (2), [9], [10], [11], [12], [13], [14], [15], [16], [1 7], [18], [19], [20] and [21]. …”
Section: Existing Digital Forensic Investigation Models/ Frameworkmentioning
confidence: 99%
“…Therefore, an efficient way of studying those threats is needed. Studying and understanding security problems and attacks is easier to do with access to real event data, which is usually collected by intrusion detection systems, honeypots and different network forensic systems [1]. The collected event data is then thoroughly analyzed and interpreted.…”
Section: Introductionmentioning
confidence: 99%