Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Digital Evidence Lifecycle Management Framework in Courts of Law (DELM-C): A Case of Zanzibar High Courts

    Idarous Saleh Said1, Gilbert Gilibrays Ocen1,*, Mwase Ali2, Alunyu Andrew Egwar1

    Journal of Cyber Security, Vol.7, pp. 359-375, 2025, DOI:10.32604/jcs.2025.066979 - 25 September 2025

    Abstract The growing reliance on digital evidence in judicial proceedings has heightened the need for structured, secure, and legally sound frameworks for its collection, preservation, storage, and presentation. In Zanzibar, however, the integration of digital evidence into the court system remains hindered by the absence of standardized procedures and digital infrastructure, undermining the integrity and admissibility of such evidence. This study addresses these challenges by developing a comprehensive Digital Evidence Lifecycle Management Framework (DELM-C) tailored to the operational and legal context of the Zanzibar High Court. The proposed framework aims to streamline digital evidence handling, enhance… More >

  • Open Access

    ARTICLE

    Data-Driven Digital Evidence Analysis for the Forensic Investigation of the Electric Vehicle Charging Infrastructure

    Dong-Hyuk Shin1, Jae-Jun Ha1, Ieck-Chae Euom2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3795-3838, 2025, DOI:10.32604/cmes.2025.066727 - 30 June 2025

    Abstract The accelerated global adoption of electric vehicles (EVs) is driving significant expansion and increasing complexity within the EV charging infrastructure, consequently presenting novel and pressing cybersecurity challenges. While considerable effort has focused on preventative cybersecurity measures, a critical deficiency persists in structured methodologies for digital forensic analysis following security incidents, a gap exacerbated by system heterogeneity, distributed digital evidence, and inconsistent logging practices which hinder effective incident reconstruction and attribution. This paper addresses this critical need by proposing a novel, data-driven forensic framework tailored to the EV charging infrastructure, focusing on the systematic identification, classification,… More >

  • Open Access

    ARTICLE

    Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation

    Waleed Halboob1,*, Jalal Almuhtadi1,2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2071-2092, 2023, DOI:10.32604/csse.2023.024110 - 03 November 2022

    Abstract Privacy preservation (PP) in Digital forensics (DF) is a conflicted and non-trivial issue. Existing solutions use the searchable encryption concept and, as a result, are not efficient and support only a keyword search. Moreover, the collected forensic data cannot be analyzed using existing well-known digital tools. This research paper first investigates the lawful requirements for PP in DF based on the organization for economic co-operation and development OECB) privacy guidelines. To have an efficient investigation process and meet the increased volume of data, the presented framework is designed based on the selective imaging concept and… More >

  • Open Access

    ARTICLE

    An Advanced Integrated Approach in Mobile Forensic Investigation

    G. Maria Jones1,*, S. Godfrey Winster2, P. Valarmathie3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 87-102, 2022, DOI:10.32604/iasc.2022.022972 - 05 January 2022

    Abstract Rapid advancement of digital technology has encouraged its use in all aspects of life, including the workplace, education, and leisure. As technology advances, so does the number of users, which leads to an increase in criminal activity and demand for a cyber-crime investigation. Mobile phones have been the epicenter of illegal activity in recent years. Sensitive information is transferred due to numerous technical applications available at one’s fingertips, which play an essential part in cyber-crime attacks in the mobile environment. Mobile forensic is a technique of recovering or retrieving digital evidence from mobile devices so… More >

Displaying 1-10 on page 1 of 4. Per Page