Digital Forensic and Methods: A Decade in Review

Forensik dan Metode Digital: Tinjauan Satu Dekade

  • Ferdi Safari Universitas Muhammadiyah Sidoarjo
  • Rifqi Ridlo Phahlevy Universitas Muhammadiyah Sidoarjo
  • Irta Fiddina Universitas Muhammadiyah Sidoarjo
Keywords: Digital Forensic, Methods, Scholarly Works, Publication Trends

Abstract

This study examines a decade of digital forensic research using data from lens.org, focusing on "Digital Forensic" and "Methods." The dataset, rigorously filtered for Scholarly Works, reveals key trends: the University of Worcester as a prolific contributor (2 articles), a publication peak between 2010-2011 (15 articles), and Computer Science dominating with 65 articles. Concordia University Wisconsin emerges as active, publishing 2 articles, with Ameir Hossein Taherinia as a standout author (3 publications). Notably, the seminal work "An Automated Timeline Reconstruction Approach for Digital Forensic Investigations" garnered 100 citations. The United States leads in activity (18 articles), with Inderscience Publishers notably featuring in the "International Journal of Electronic Security and Digital Forensics" (24 articles). This dataset lays a vital foundation for future research in digital forensics and methods.

Highlights :

  • Examination of a decade of digital forensic research
  • Reveals prolific contributors, notable publications, and leading authors
  • Provides a foundational resource for future digital forensic studies

Keywords: Digital Forensic, Methods, Scholarly Works, Publication Trends

Downloads

Download data is not yet available.

References

M. Khatir and S. M. Hejazi, "How to find exculpatory and inculpatory evidence using a circular digital forensics process model," Int. J. Electron. Secur. Digit. Forensics, vol. 2, no. 1, pp. 68-76, 2009.

A. Case, L. Marziale, C. Neckar, and G. G. Richard, "Treasure and tragedy in kmem_cache mining for live forensics investigation," Digital Invest, vol. 7, 2010.

M. Pollitt, "Forensic Twitter," J. Digital Forensic Pract, vol. 3, no. 1, pp. 1-3, Mar. 18, 2010.[4] C. Hosmer, "Discovering Hidden Evidence," J. Digital Forensic Pract, vol. 1, no. 1, pp. 47-56, 2006.

E. H. Freeman, "Computer Printouts as Legal Evidence," J. Digital Forensic Pract, vol. 3, no. 2-4, pp. 98-105, Dec. 15, 2010.

J. Lee, S.-K. Un, and D. Hong, "High-speed search using Tarari content processor in digital forensics," Digital Invest, vol. 5, 2008.

L. Suffern, "A Study of Current Trends in Database Forensics," J. Digital Forensic Pract, vol. 3, no. 2-4, pp. 67-73, Dec. 15, 2010.

J. Kuzma, C. Price, and R. Henson, "Flash vulnerabilities analysis of US educational websites," Int. J. Electron. Secur. Digit. Forensics, vol. 3, no. 2, pp. 95-107, 2010.

K. Papadaki and D. Polemi, "A meta-process for information security risk management," Int. J. Electron. Secur. Digit. Forensics, vol. 1, no. 4, pp. 336-343, 2008.

E. Van Buskirk and V. T. Liu, "Digital Evidence: Challenging the Presumption of Reliability," J. Digital Forensic Pract, vol. 1, no. 1, pp. 19-26, 2006.

Published
2023-10-13
How to Cite
Safari, F., Phahlevy, R. R., & Fiddina, I. (2023). Digital Forensic and Methods: A Decade in Review. Proceedings of The ICECRS, 12(1). https://doi.org/10.21070/icecrs.v12i2.1524