Digital Forensic and Methods: A Decade in Review


Forensik dan Metode Digital: Tinjauan Satu Dekade


  • (1) * Ferdi Safari            Universitas Muhammadiyah Sidoarjo  
            Indonesia

  • (2)  Rifqi Ridlo Phahlevy            Universitas Muhammadiyah Sidoarjo  
            Indonesia

  • (3)  Irta Fiddina            Universitas Muhammadiyah Sidoarjo  
            Indonesia

    (*) Corresponding Author

Abstract

This study examines a decade of digital forensic research using data from lens.org, focusing on "Digital Forensic" and "Methods." The dataset, rigorously filtered for Scholarly Works, reveals key trends: the University of Worcester as a prolific contributor (2 articles), a publication peak between 2010-2011 (15 articles), and Computer Science dominating with 65 articles. Concordia University Wisconsin emerges as active, publishing 2 articles, with Ameir Hossein Taherinia as a standout author (3 publications). Notably, the seminal work "An Automated Timeline Reconstruction Approach for Digital Forensic Investigations" garnered 100 citations. The United States leads in activity (18 articles), with Inderscience Publishers notably featuring in the "International Journal of Electronic Security and Digital Forensics" (24 articles). This dataset lays a vital foundation for future research in digital forensics and methods.

Highlights :

  • Examination of a decade of digital forensic research
  • Reveals prolific contributors, notable publications, and leading authors
  • Provides a foundational resource for future digital forensic studies

Keywords: Digital Forensic, Methods, Scholarly Works, Publication Trends

Downloads

Download data is not yet available.

References

M. Khatir and S. M. Hejazi, "How to find exculpatory and inculpatory evidence using a circular digital forensics process model," Int. J. Electron. Secur. Digit. Forensics, vol. 2, no. 1, pp. 68-76, 2009.

A. Case, L. Marziale, C. Neckar, and G. G. Richard, "Treasure and tragedy in kmem_cache mining for live forensics investigation," Digital Invest, vol. 7, 2010.

M. Pollitt, "Forensic Twitter," J. Digital Forensic Pract, vol. 3, no. 1, pp. 1-3, Mar. 18, 2010.[4] C. Hosmer, "Discovering Hidden Evidence," J. Digital Forensic Pract, vol. 1, no. 1, pp. 47-56, 2006.

E. H. Freeman, "Computer Printouts as Legal Evidence," J. Digital Forensic Pract, vol. 3, no. 2-4, pp. 98-105, Dec. 15, 2010.

J. Lee, S.-K. Un, and D. Hong, "High-speed search using Tarari content processor in digital forensics," Digital Invest, vol. 5, 2008.

L. Suffern, "A Study of Current Trends in Database Forensics," J. Digital Forensic Pract, vol. 3, no. 2-4, pp. 67-73, Dec. 15, 2010.

J. Kuzma, C. Price, and R. Henson, "Flash vulnerabilities analysis of US educational websites," Int. J. Electron. Secur. Digit. Forensics, vol. 3, no. 2, pp. 95-107, 2010.

K. Papadaki and D. Polemi, "A meta-process for information security risk management," Int. J. Electron. Secur. Digit. Forensics, vol. 1, no. 4, pp. 336-343, 2008.

E. Van Buskirk and V. T. Liu, "Digital Evidence: Challenging the Presumption of Reliability," J. Digital Forensic Pract, vol. 1, no. 1, pp. 19-26, 2006.

Picture in here are illustration from public domain image (License) or provided by the author, as part of their works
Published
2023-10-13
 
How to Cite
Safari, F., Phahlevy, R. R., & Fiddina, I. (2023). Digital Forensic and Methods: A Decade in Review. Proceedings of The ICECRS, 12(1). https://doi.org/10.21070/icecrs.v12i2.1524