Digital Forensic and Methods: A Decade in Review
Forensik dan Metode Digital: Tinjauan Satu Dekade
Abstract
This study examines a decade of digital forensic research using data from lens.org, focusing on "Digital Forensic" and "Methods." The dataset, rigorously filtered for Scholarly Works, reveals key trends: the University of Worcester as a prolific contributor (2 articles), a publication peak between 2010-2011 (15 articles), and Computer Science dominating with 65 articles. Concordia University Wisconsin emerges as active, publishing 2 articles, with Ameir Hossein Taherinia as a standout author (3 publications). Notably, the seminal work "An Automated Timeline Reconstruction Approach for Digital Forensic Investigations" garnered 100 citations. The United States leads in activity (18 articles), with Inderscience Publishers notably featuring in the "International Journal of Electronic Security and Digital Forensics" (24 articles). This dataset lays a vital foundation for future research in digital forensics and methods.
Highlights :
- Examination of a decade of digital forensic research
- Reveals prolific contributors, notable publications, and leading authors
- Provides a foundational resource for future digital forensic studies
Keywords: Digital Forensic, Methods, Scholarly Works, Publication Trends
Downloads
References
M. Khatir and S. M. Hejazi, "How to find exculpatory and inculpatory evidence using a circular digital forensics process model," Int. J. Electron. Secur. Digit. Forensics, vol. 2, no. 1, pp. 68-76, 2009.
A. Case, L. Marziale, C. Neckar, and G. G. Richard, "Treasure and tragedy in kmem_cache mining for live forensics investigation," Digital Invest, vol. 7, 2010.
M. Pollitt, "Forensic Twitter," J. Digital Forensic Pract, vol. 3, no. 1, pp. 1-3, Mar. 18, 2010.[4] C. Hosmer, "Discovering Hidden Evidence," J. Digital Forensic Pract, vol. 1, no. 1, pp. 47-56, 2006.
E. H. Freeman, "Computer Printouts as Legal Evidence," J. Digital Forensic Pract, vol. 3, no. 2-4, pp. 98-105, Dec. 15, 2010.
J. Lee, S.-K. Un, and D. Hong, "High-speed search using Tarari content processor in digital forensics," Digital Invest, vol. 5, 2008.
L. Suffern, "A Study of Current Trends in Database Forensics," J. Digital Forensic Pract, vol. 3, no. 2-4, pp. 67-73, Dec. 15, 2010.
J. Kuzma, C. Price, and R. Henson, "Flash vulnerabilities analysis of US educational websites," Int. J. Electron. Secur. Digit. Forensics, vol. 3, no. 2, pp. 95-107, 2010.
K. Papadaki and D. Polemi, "A meta-process for information security risk management," Int. J. Electron. Secur. Digit. Forensics, vol. 1, no. 4, pp. 336-343, 2008.
E. Van Buskirk and V. T. Liu, "Digital Evidence: Challenging the Presumption of Reliability," J. Digital Forensic Pract, vol. 1, no. 1, pp. 19-26, 2006.
Copyright (c) 2023 Ferdi Safari, Rifqi Ridlo Phahlevy
This work is licensed under a Creative Commons Attribution 4.0 International License.