Pandu Sarigati Sari (1), Mochammad Tanzil Multazam (2)
This data article presents a thorough examination of digital forensic literature with a focus on software from 2012 to 2022, retrieved from lens.org, with the aim of identifying the most influential institutions, authors, and research trends. Using keywords "digital forensic AND software," the data collection process involved filtering by date range, document type, and subject matter, resulting in 427 journal articles. The analysis highlights the most productive institutions, years, fields of study, active authors, and publishers. This data is valuable for researchers and practitioners in digital forensics, particularly those interested in software applications, providing insights into the most significant contributions and aiding future research development.
Highlights:
F. Servida and E. Casey, "IoT forensic challenges and opportunities for digital traces," in Digital Investigation, vol. 28, pp. S22-S29, Apr. 2019. doi: 10.1016/j.diin.2019.01.012.
G. Horsman, "A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage," in Digital Investigation, vol. 33, Nov. 2020. doi: 10.1016/j.diin.2020.301062.
C. Mills, B. Standlee, and H. Kahn, "Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit," in Digital Investigation, vol. 22, pp. S98-S106, Jun. 2017. doi: 10.1016/j.diin.2017.06.001.
M. B. Bella and J. Eloff, "Using digital forensics to improve software reliability," in Computer Fraud & Security, vol. 2015, no. 5, pp. 5-7, May 2015. doi: 10.1016/S1361-3723(15)30035-X.
M. Negrão and P. Domingues, "SpeechToText: An open-source software for automatic detection and transcription of voice recordings in digital forensics," in Forensic Science International: Digital Investigation, vol. 38, p. 301223, Sep. 2021. doi: 10.1016/j.fsidi.2021.301223.
S. Vömel and J. Stüttgen, "An evaluation platform for forensic memory acquisition software," in Digital Investigation, vol. 10, pp. S30-S40, Aug. 2013. doi: 10.1016/j.diin.2013.06.004.
G. Horsman, "A preliminary assessment of latent fingerprint evidence damage on mobile device screens caused by digital forensic extractions," in Forensic Science International: Digital Investigation, vol. 30, p. 200886, Mar. 2019. doi: 10.1016/j.fsidi.2019.200886.
G. Horsman, "A review of cyber security risk assessment methods for SCADA systems," in Computers & Security, vol. 59, pp. 1-15, Mar. 2016. doi: 10.1016/j.cose.2016.01.009.
G. Tully et al., "Quality standards for digital forensics : learning from experience in England & Wales," in Forensic Science International: Digital Investigation, vol. 32, Mar. 2020. doi: 10.1016/j.fsidi.2020.200905.
S. Garfinkel, "Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus," in Digital Investigation, vol. 9, pp. S80-S89, Aug. 2012. doi: 10.1016/j.diin.2012.05.002.
F. Michaux, "Forensic analysis of video file formats," in Digital Investigation, vol. 27, pp. S84-S94, Apr. 2018. doi: 10.1016/j.diin.2018.04.009.