Vol 12 No 1 (2023): Proceedings of Data in Education, Culture, and Interdisciplinary Studies
Data Articles in Law Science

Digital Forensic and Firewall Nexus: Exploring a Decade of Scholarly Output
Nexus Forensik Digital dan Firewall: Menjelajahi Hasil Ilmiah Selama Satu Dekade


Anindya Pramitaqwati Wati
Universitas Muhammadiyah Sidoarjo, Indonesia
Sri Budi Purwaningsih
Universitas Muhammadiyah Sidoarjo, Indonesia
Irta Fiddina
Universitas Muhammadiyah Sidoarjo, Indonesia
Picture in here are illustration from public domain image or provided by the author, as part of their works
Published October 13, 2023
Keywords
  • Digital Forensic,
  • Firewall,
  • Cybersecurity,
  • Academic Research,
  • Firewall Technologies,
  • Global Authorship
  • ...More
    Less
How to Cite
Wati, A. P., Purwaningsih, S. B., & Fiddina, I. (2023). Digital Forensic and Firewall Nexus: Exploring a Decade of Scholarly Output. Proceedings of The ICECRS, 12(1). https://doi.org/10.21070/icecrs.v12i2.1571

Abstract

This article presents a meticulously curated dataset comprising 54 journal articles extracted from a pool of 579 documents on digital forensics and firewall technologies. Spanning 2002-2012, the dataset explores the intersection of these fields, emphasizing Computer Science, institutional contributions (notably from the University of East London), and global diversity in authorship. Peak periods in 2006 and 2008 underscore evolving scholarly output. Inderscience Publisher, notably through the "International Journal of Electronic Security and Digital Forensics," stands out as a significant platform. The absence of prolific authors hints at a diversified authorship landscape. This dataset offers a foundational resource for detailed analyses of the dynamic relationship between digital forensics and firewall technologies.

Highlights :

  • Scholarly Focus: Emphasizes Computer Science and the technological aspects of digital forensics and firewalls.
  • Institutional Contributions: Highlights the University of East London as a prominent contributor.
  • Global Perspective: Reflects diverse global authorship and identifies the United Kingdom as a hub for related research.

Keywords: Digital Forensic, Cybersecurity, Academic Research, Firewall Technologies, Global Authorship

Downloads

Download data is not yet available.

References

  1. B. Schatz, G. M. Mohay, and A. Clark, "A correlation method for establishing provenance of timestamps in digital evidence,"Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 151-162, Jun. 2006.
  2. R. McCusker, "Transnational organised cyber crime: distinguishing threat from reality," Journal of Computer Security, vol. 15, no. 4, pp. 447-458, Jul. 2007.
  3. I. Flechais, C. Mascolo, and M. A. Sasse, "Integrating security and usability into the requirements and design process," Security & Privacy, vol. 3, no. 5, pp. 24-33, Sep./Oct. 2005.
  4. W. C. Calhoun and D. Coles, "Predicting the types of file fragments," Digital Investigation, vol. 4, no. Supplement, pp. S69-S76, Dec. 2007.
  5. H. Jahankani, B. Antonijevic, and T. H. Walcott, "Tools protecting stakeholders against hackers and crackers: an insight review," International Journal of Information Management, vol. 28, no. 5, pp. 413-419, Oct. 2008.
  6. H. Alipour, M. Esmaeili, and K. Kia, "Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic," Computers & Security, vol. 28, no. 3-4, pp. 169-180, May/Jun. 2009.
  7. S. Han, C.-H. Chu, and Z. Luo, "Tamper Detection in the EPC Network Using Digital Watermarking,"Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 884-892, Sep. 2011.
  8. M. L. Williams and M. Levi, "Perceptions of the eCrime controllers: Modelling the influence of cooperation and data source factors," Government Information Quarterly, vol. 29, no. 1, pp. 75-87, Jan. 2012.
  9. R. Mukhtar, A. Al-Nemrat, M. Alazab, S. Venkatraman, and H. Jahankhani, "Analysis of firewall log-based detection scenarios for evidence in digital forensics," Journal of Digital Forensic, Security and Law, vol. 6, no. 3, pp. 33-60, 2011.
  10. S. Shiaeles, V. Katos, A. Karakos, and B. K. Papadopoulos, "Real time DDoS detection using fuzzy estimators," Computers & Security, vol. 31, no. 5, pp. 610-617, Jul. 2012.