Digital Forensic and Firewall Nexus: Exploring a Decade of Scholarly Output

Nexus Forensik Digital dan Firewall: Menjelajahi Hasil Ilmiah Selama Satu Dekade

Authors

  • Anindya Pramitaqwati Wati Universitas Muhammadiyah Sidoarjo
  • Sri Budi Purwaningsih Universitas Muhammadiyah Sidoarjo
  • Irta Fiddina Universitas Muhammadiyah Sidoarjo

DOI:

https://doi.org/10.21070/icecrs.v12i2.1571

Keywords:

Digital Forensic, Firewall, Cybersecurity, Academic Research, Firewall Technologies, Global Authorship

Abstract

This article presents a meticulously curated dataset comprising 54 journal articles extracted from a pool of 579 documents on digital forensics and firewall technologies. Spanning 2002-2012, the dataset explores the intersection of these fields, emphasizing Computer Science, institutional contributions (notably from the University of East London), and global diversity in authorship. Peak periods in 2006 and 2008 underscore evolving scholarly output. Inderscience Publisher, notably through the "International Journal of Electronic Security and Digital Forensics," stands out as a significant platform. The absence of prolific authors hints at a diversified authorship landscape. This dataset offers a foundational resource for detailed analyses of the dynamic relationship between digital forensics and firewall technologies.

Highlights :

  • Scholarly Focus: Emphasizes Computer Science and the technological aspects of digital forensics and firewalls.
  • Institutional Contributions: Highlights the University of East London as a prominent contributor.
  • Global Perspective: Reflects diverse global authorship and identifies the United Kingdom as a hub for related research.

Keywords: Digital Forensic, Cybersecurity, Academic Research, Firewall Technologies, Global Authorship

Downloads

Download data is not yet available.

References

B. Schatz, G. M. Mohay, and A. Clark, "A correlation method for establishing provenance of timestamps in digital evidence,"Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 151-162, Jun. 2006.

R. McCusker, "Transnational organised cyber crime: distinguishing threat from reality," Journal of Computer Security, vol. 15, no. 4, pp. 447-458, Jul. 2007.

I. Flechais, C. Mascolo, and M. A. Sasse, "Integrating security and usability into the requirements and design process," Security & Privacy, vol. 3, no. 5, pp. 24-33, Sep./Oct. 2005.

W. C. Calhoun and D. Coles, "Predicting the types of file fragments," Digital Investigation, vol. 4, no. Supplement, pp. S69-S76, Dec. 2007.

H. Jahankani, B. Antonijevic, and T. H. Walcott, "Tools protecting stakeholders against hackers and crackers: an insight review," International Journal of Information Management, vol. 28, no. 5, pp. 413-419, Oct. 2008.

H. Alipour, M. Esmaeili, and K. Kia, "Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic," Computers & Security, vol. 28, no. 3-4, pp. 169-180, May/Jun. 2009.

S. Han, C.-H. Chu, and Z. Luo, "Tamper Detection in the EPC Network Using Digital Watermarking,"Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 884-892, Sep. 2011.

M. L. Williams and M. Levi, "Perceptions of the eCrime controllers: Modelling the influence of cooperation and data source factors," Government Information Quarterly, vol. 29, no. 1, pp. 75-87, Jan. 2012.

R. Mukhtar, A. Al-Nemrat, M. Alazab, S. Venkatraman, and H. Jahankhani, "Analysis of firewall log-based detection scenarios for evidence in digital forensics," Journal of Digital Forensic, Security and Law, vol. 6, no. 3, pp. 33-60, 2011.

S. Shiaeles, V. Katos, A. Karakos, and B. K. Papadopoulos, "Real time DDoS detection using fuzzy estimators," Computers & Security, vol. 31, no. 5, pp. 610-617, Jul. 2012.

Published

2023-10-13

How to Cite

Wati, A. P., Purwaningsih, S. B., & Fiddina, I. (2023). Digital Forensic and Firewall Nexus: Exploring a Decade of Scholarly Output: Nexus Forensik Digital dan Firewall: Menjelajahi Hasil Ilmiah Selama Satu Dekade. Proceedings of The ICECRS, 12(1). https://doi.org/10.21070/icecrs.v12i2.1571