{"title":"Cyber terrorism and its role in the outbreak of international crisis","authors":"Ahmad Alsharqawi, Abedalrzag Aldalbeeh","doi":"10.1504/ijesdf.2023.10045743","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10045743","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"2 1","pages":"24-32"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82076632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. A. Shaikh, Umair Baig, Abdul Ahad Abro, Adarsh Kumar, A. Laghari, A. Khan
{"title":"Cloud Forensics-Enabled Chain of Custody: A Novel and Secure Modular Architecture Using Blockchain Hyperledger Sawtooth","authors":"Z. A. Shaikh, Umair Baig, Abdul Ahad Abro, Adarsh Kumar, A. Laghari, A. Khan","doi":"10.1504/ijesdf.2023.10052381","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10052381","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on methodology on VoIP-based communication investigation through network packet analysis","authors":"Indrajeet Singh, N. Chaudhary","doi":"10.1504/ijesdf.2023.10052265","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10052265","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"15 1","pages":"443-455"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"The Electronic administrative decision and discretion authority of public administration\"","authors":"N. Alhendi","doi":"10.1504/ijesdf.2023.10054062","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10054062","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66717133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recovery of stolen assets from abroad","authors":"Rakhmatulla Balashov, Oxana Filipets, Svetlana Baimoldina","doi":"10.1504/ijesdf.2023.133188","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133188","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134888694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oteng Tabona, Thabiso M. Maupong, Kopo M. Ramokapane, Thabo Semong
{"title":"Intelligence sharing in big data forensics","authors":"Oteng Tabona, Thabiso M. Maupong, Kopo M. Ramokapane, Thabo Semong","doi":"10.1504/ijesdf.2023.127755","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.127755","url":null,"abstract":"With the high prevalence of digital crimes, forensic investigators rely on traditional desktop tools to conduct investigations. Most of these tools are device-specific and majority of them are desktop-based therefore they suffer from limited storage and fail to process big data. These tools also lack the analytical ability to link evidence between cases or share information between cases. Therefore, inter-links can exist between cases without being detected. The poor ability to detect links between cases may result in investigators: taking a long time to complete investigations and failing to establish organised crimes. In this paper, we propose a novel solution that can cross-link evidence between cases. Our solution is not desktop-based, nor is it restricted by the evidence source. Using real-world data for evaluation, we demonstrate that our solution is capable of uncovering evidence common between cases that could otherwise be missed.","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134955778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oteng Tabona, Thabiso M. Maupong, K. Ramokapane, Thabo Semong
{"title":"Intelligence sharing in big data forensics","authors":"Oteng Tabona, Thabiso M. Maupong, K. Ramokapane, Thabo Semong","doi":"10.1504/ijesdf.2023.10051337","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10051337","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"10 1","pages":"33-55"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89581011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A platform independent and forensically sound method to extract WhatsApp data from mobile phones","authors":"Aritro Sengupta, Amit Singh, B.M. Vinjit","doi":"10.1504/ijesdf.2023.130657","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.130657","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135637198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Denim enumeration and tabulation solution for the garments manufacturing environment","authors":"Muhammad Shakir, Shahid Karim, Shahnawaz Ali, Shahzor Memon, Halar Mustafa, Rabia Shaikh","doi":"10.1504/ijesdf.2023.133965","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133965","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136054115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A platform independent and forensically sound method to extract WhatsApp data from mobile phones","authors":"Ashutosh Kumar Singh, Aritro Sengupta, B.M. Vinjit","doi":"10.1504/ijesdf.2023.10050124","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10050124","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"15 1","pages":"259-280"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}