Vol 12 No 1 (2023): Proceedings of Data in Education, Culture, and Interdisciplinary Studies
Data Articles in Law Science

Digital Forensic and Methods: A Decade in Review
Forensik dan Metode Digital: Tinjauan Satu Dekade


Ferdi Safari
Universitas Muhammadiyah Sidoarjo, Indonesia
Rifqi Ridlo Phahlevy
Universitas Muhammadiyah Sidoarjo, Indonesia
Irta Fiddina
Universitas Muhammadiyah Sidoarjo, Indonesia
Picture in here are illustration from public domain image or provided by the author, as part of their works
Published October 13, 2023
Keywords
  • Digital Forensic,
  • Methods,
  • Scholarly Works,
  • Publication Trends
How to Cite
Safari, F., Phahlevy, R. R., & Fiddina, I. (2023). Digital Forensic and Methods: A Decade in Review. Proceedings of The ICECRS, 12(1). https://doi.org/10.21070/icecrs.v12i2.1524

Abstract

This study examines a decade of digital forensic research using data from lens.org, focusing on "Digital Forensic" and "Methods." The dataset, rigorously filtered for Scholarly Works, reveals key trends: the University of Worcester as a prolific contributor (2 articles), a publication peak between 2010-2011 (15 articles), and Computer Science dominating with 65 articles. Concordia University Wisconsin emerges as active, publishing 2 articles, with Ameir Hossein Taherinia as a standout author (3 publications). Notably, the seminal work "An Automated Timeline Reconstruction Approach for Digital Forensic Investigations" garnered 100 citations. The United States leads in activity (18 articles), with Inderscience Publishers notably featuring in the "International Journal of Electronic Security and Digital Forensics" (24 articles). This dataset lays a vital foundation for future research in digital forensics and methods.

Highlights :

  • Examination of a decade of digital forensic research
  • Reveals prolific contributors, notable publications, and leading authors
  • Provides a foundational resource for future digital forensic studies

Keywords: Digital Forensic, Methods, Scholarly Works, Publication Trends

Downloads

Download data is not yet available.

References

  1. M. Khatir and S. M. Hejazi, "How to find exculpatory and inculpatory evidence using a circular digital forensics process model," Int. J. Electron. Secur. Digit. Forensics, vol. 2, no. 1, pp. 68-76, 2009.
  2. A. Case, L. Marziale, C. Neckar, and G. G. Richard, "Treasure and tragedy in kmem_cache mining for live forensics investigation," Digital Invest, vol. 7, 2010.
  3. M. Pollitt, "Forensic Twitter," J. Digital Forensic Pract, vol. 3, no. 1, pp. 1-3, Mar. 18, 2010.[4] C. Hosmer, "Discovering Hidden Evidence," J. Digital Forensic Pract, vol. 1, no. 1, pp. 47-56, 2006.
  4. E. H. Freeman, "Computer Printouts as Legal Evidence," J. Digital Forensic Pract, vol. 3, no. 2-4, pp. 98-105, Dec. 15, 2010.
  5. J. Lee, S.-K. Un, and D. Hong, "High-speed search using Tarari content processor in digital forensics," Digital Invest, vol. 5, 2008.
  6. L. Suffern, "A Study of Current Trends in Database Forensics," J. Digital Forensic Pract, vol. 3, no. 2-4, pp. 67-73, Dec. 15, 2010.
  7. J. Kuzma, C. Price, and R. Henson, "Flash vulnerabilities analysis of US educational websites," Int. J. Electron. Secur. Digit. Forensics, vol. 3, no. 2, pp. 95-107, 2010.
  8. K. Papadaki and D. Polemi, "A meta-process for information security risk management," Int. J. Electron. Secur. Digit. Forensics, vol. 1, no. 4, pp. 336-343, 2008.
  9. E. Van Buskirk and V. T. Liu, "Digital Evidence: Challenging the Presumption of Reliability," J. Digital Forensic Pract, vol. 1, no. 1, pp. 19-26, 2006.