Login
Section Data Articles in Law Science

Digital Forensic and Methods: A Decade in Review

Forensik dan Metode Digital: Tinjauan Satu Dekade
Vol. 12 No. 1 (2023): Proceedings of Data in Education, Culture, and Interdisciplinary Studies :

Ferdi Safari (1), Rifqi Ridlo Phahlevy (2), Irta Fiddina (3)

(1) Universitas Muhammadiyah Sidoarjo, Indonesia
(2) Universitas Muhammadiyah Sidoarjo, Indonesia
(3) Universitas Muhammadiyah Sidoarjo, Indonesia

Abstract:

This study examines a decade of digital forensic research using data from lens.org, focusing on "Digital Forensic" and "Methods." The dataset, rigorously filtered for Scholarly Works, reveals key trends: the University of Worcester as a prolific contributor (2 articles), a publication peak between 2010-2011 (15 articles), and Computer Science dominating with 65 articles. Concordia University Wisconsin emerges as active, publishing 2 articles, with Ameir Hossein Taherinia as a standout author (3 publications). Notably, the seminal work "An Automated Timeline Reconstruction Approach for Digital Forensic Investigations" garnered 100 citations. The United States leads in activity (18 articles), with Inderscience Publishers notably featuring in the "International Journal of Electronic Security and Digital Forensics" (24 articles). This dataset lays a vital foundation for future research in digital forensics and methods.


Highlights :



  • Examination of a decade of digital forensic research

  • Reveals prolific contributors, notable publications, and leading authors

  • Provides a foundational resource for future digital forensic studies


Keywords: Digital Forensic, Methods, Scholarly Works, Publication Trends

Downloads

Download data is not yet available.

References

M. Khatir and S. M. Hejazi, "How to find exculpatory and inculpatory evidence using a circular digital forensics process model," Int. J. Electron. Secur. Digit. Forensics, vol. 2, no. 1, pp. 68-76, 2009.

A. Case, L. Marziale, C. Neckar, and G. G. Richard, "Treasure and tragedy in kmem_cache mining for live forensics investigation," Digital Invest, vol. 7, 2010.

M. Pollitt, "Forensic Twitter," J. Digital Forensic Pract, vol. 3, no. 1, pp. 1-3, Mar. 18, 2010.[4] C. Hosmer, "Discovering Hidden Evidence," J. Digital Forensic Pract, vol. 1, no. 1, pp. 47-56, 2006.

E. H. Freeman, "Computer Printouts as Legal Evidence," J. Digital Forensic Pract, vol. 3, no. 2-4, pp. 98-105, Dec. 15, 2010.

J. Lee, S.-K. Un, and D. Hong, "High-speed search using Tarari content processor in digital forensics," Digital Invest, vol. 5, 2008.

L. Suffern, "A Study of Current Trends in Database Forensics," J. Digital Forensic Pract, vol. 3, no. 2-4, pp. 67-73, Dec. 15, 2010.

J. Kuzma, C. Price, and R. Henson, "Flash vulnerabilities analysis of US educational websites," Int. J. Electron. Secur. Digit. Forensics, vol. 3, no. 2, pp. 95-107, 2010.

K. Papadaki and D. Polemi, "A meta-process for information security risk management," Int. J. Electron. Secur. Digit. Forensics, vol. 1, no. 4, pp. 336-343, 2008.

E. Van Buskirk and V. T. Liu, "Digital Evidence: Challenging the Presumption of Reliability," J. Digital Forensic Pract, vol. 1, no. 1, pp. 19-26, 2006.