Copyright (c) 2023 Anindya Pramitaqwati Wati, Sri Budi Purwaningsih
This work is licensed under a Creative Commons Attribution 4.0 International License.
This article presents a meticulously curated dataset comprising 54 journal articles extracted from a pool of 579 documents on digital forensics and firewall technologies. Spanning 2002-2012, the dataset explores the intersection of these fields, emphasizing Computer Science, institutional contributions (notably from the University of East London), and global diversity in authorship. Peak periods in 2006 and 2008 underscore evolving scholarly output. Inderscience Publisher, notably through the "International Journal of Electronic Security and Digital Forensics," stands out as a significant platform. The absence of prolific authors hints at a diversified authorship landscape. This dataset offers a foundational resource for detailed analyses of the dynamic relationship between digital forensics and firewall technologies.
- Scholarly Focus: Emphasizes Computer Science and the technological aspects of digital forensics and firewalls.
- Institutional Contributions: Highlights the University of East London as a prominent contributor.
- Global Perspective: Reflects diverse global authorship and identifies the United Kingdom as a hub for related research.
Keywords: Digital Forensic, Cybersecurity, Academic Research, Firewall Technologies, Global Authorship
- B. Schatz, G. M. Mohay, and A. Clark, "A correlation method for establishing provenance of timestamps in digital evidence,"Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 151-162, Jun. 2006.
- R. McCusker, "Transnational organised cyber crime: distinguishing threat from reality," Journal of Computer Security, vol. 15, no. 4, pp. 447-458, Jul. 2007.
- I. Flechais, C. Mascolo, and M. A. Sasse, "Integrating security and usability into the requirements and design process," Security & Privacy, vol. 3, no. 5, pp. 24-33, Sep./Oct. 2005.
- W. C. Calhoun and D. Coles, "Predicting the types of file fragments," Digital Investigation, vol. 4, no. Supplement, pp. S69-S76, Dec. 2007.
- H. Jahankani, B. Antonijevic, and T. H. Walcott, "Tools protecting stakeholders against hackers and crackers: an insight review," International Journal of Information Management, vol. 28, no. 5, pp. 413-419, Oct. 2008.
- H. Alipour, M. Esmaeili, and K. Kia, "Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic," Computers & Security, vol. 28, no. 3-4, pp. 169-180, May/Jun. 2009.
- S. Han, C.-H. Chu, and Z. Luo, "Tamper Detection in the EPC Network Using Digital Watermarking,"Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 884-892, Sep. 2011.
- M. L. Williams and M. Levi, "Perceptions of the eCrime controllers: Modelling the influence of cooperation and data source factors," Government Information Quarterly, vol. 29, no. 1, pp. 75-87, Jan. 2012.
- R. Mukhtar, A. Al-Nemrat, M. Alazab, S. Venkatraman, and H. Jahankhani, "Analysis of firewall log-based detection scenarios for evidence in digital forensics," Journal of Digital Forensic, Security and Law, vol. 6, no. 3, pp. 33-60, 2011.
- S. Shiaeles, V. Katos, A. Karakos, and B. K. Papadopoulos, "Real time DDoS detection using fuzzy estimators," Computers & Security, vol. 31, no. 5, pp. 610-617, Jul. 2012.