scispace - formally typeset
Search or ask a question
JournalISSN: 2305-0012

International Journal of Cyber-Security and Digital Forensics 

The Society of Digital Information and Wireless Communications (SDIWC)
About: International Journal of Cyber-Security and Digital Forensics is an academic journal. The journal publishes majorly in the area(s): Information system & Wireless. It has an ISSN identifier of 2305-0012. Over the lifetime, 216 publications have been published receiving 1072 citations.

Papers published on a yearly basis

Papers
More filters
Journal Article
TL;DR: Development trends in computer forensics and security in various aspects are looked into to determine the trend of solutions in these aspects and evaluate their effectiveness in resolving the aforementioned issues.
Abstract: Privacy issues have always been a major concern in computer forensics and security and in case of any investigation whether it is pertaining to computer or not always privacy issues appear. To enable privacy’s protection in the physical world we need the law that should be legislated, but in a digital world by rapidly growing of technology and using the digital devices more and more that generate a huge amount of private data it is impossible to provide fully protected space in cyber world during the transfer, store and collect data. Since its introduction to the field, forensics investigators, and developers have faced challenges in finding the balance between retrieving key evidences and infringing user privacy. This paper looks into developmental trends in computer forensics and security in various aspects in achieving such a balance. In addition, the paper analyses each scenario to determine the trend of solutions in these aspects and evaluate their effectiveness in resolving the aforementioned issues.

63 citations

Journal Article
TL;DR: Trends of applications of digital forensics and security at hand in various aspects are looked into and some estimations about future research trends in this area are provided.
Abstract: Nowadays, rapid evolution of computers and mobile phones has caused these devices to be used in criminal activities. Providing appropriate and sufficient security measures is a difficult job due to complexity of devices which makes investigating crimes involving these devices even harder. Digital forensic is the procedure of investigating computer crimes in the cyber world. Many researches have been done in this area to help forensic investigation to resolve existing challenges. This paper attempts to look into trends of applications of digital forensics and security at hand in various aspects and provide some estimations about future research trends in this area.

51 citations

Journal ArticleDOI
TL;DR: The evolution of the digital forensic; its origins, its current position and its future directions are studied, followed by the assessment and analysis of current state of art in both industrial and academic digital forensics research.
Abstract: 1. ABSTRACT Digital forensic has evolved from addressing minor computer crimes to investigation of complex international cases with massive effect on the world. This paper studies the evolution of the digital forensic; its origins, its current position and its future directions. This paper sets the scene with exploring past literature on digital forensic approaches followed by the assessment and analysis of current state of art in both industrial and academic digital forensics research. The obtained results are compared and analyzed to provide a comprehensive view of the current digital forensics landscape. Furthermore, this paper highlights critical digital forensic issues that are being overlooked and not being addressed as deserved. The paper finally concludes with offering future research directions in this area.

35 citations

Journal Article
TL;DR: The proposed cloud computing architecture would be available to individuals and organizations, large and small, and operate on the same pattern as other public utilities, namely: • Subscribers sign up for service from a service provider, on a contractual basis, and the service provider delivers services of data processing, data access and data storage to subscribers.
Abstract: KEYWORDS Cloud computing, cyber security metrics, mean failure cost, security requirements, security threats, threats classification . 1 INTRODUCTION With the rapid development of processing and storage technologies and the emergence of the Internet, computing resources have become cheaper, more powerful and more ubiquitously available than ever before. As a consequence, IT service providers are faced to challenges of expanding the structures and infrastructures with small expenditure and short a time in order to provide rising demands from their customers. To address these business challenges, cloud computing architecture was developed. In this technology, end users avail themselves of computing resources and services as a public utility, rather than a privately run small scale computing facility. In the same way that we use electricity as a public utility (rather than build our own generators), and that we use water as a public utility (rather than dig our own well), and that we use phone service as a public utility (rather than build and operate our own cell tower), we want to use computing services as a public utility. Such a service would be available to individuals and organizations, large and small, and would operate on the same pattern as other public utilities, namely: • Subscribers sign up for service from a service provider, on a contractual basis. • The service provider delivers services of data processing, data access and data storage to subscribers. • The service provider offers warranties on the quality of services delivered.

33 citations

Journal Article
TL;DR: This study reviews the literature on some challenges in cloud computing forensic investigation, and it is followed by evaluation and analysis of all types of information on cloud computing and its impacts on computer forensic investigations in publishing alliances with the survey was carried out in the field.
Abstract: Nowadays, digital storage of computer data is moving toward cloud computing which is a set of infrastructure provides data storage for organizations and individuals Due to this large scale, in case an attack occurs in the network of a cloud it would be a big challenge to investigate the cloud Therefore, digital forensics in cloud computing is a new discipline related to the increasing use of computers, networks and digital storage devices in numerous criminal activities in both traditional and Hi-Tech This study reviews the literature on some challenges in cloud computing forensic investigation, and it is followed by evaluation and analysis of all types of information on cloud computing and its impacts on computer forensic investigations in publishing alliances with the survey was carried out in the field

31 citations

Network Information
Related Journals (5)
Digital Investigation
843 papers, 23.6K citations
74% related
arXiv: Cryptography and Security
13.3K papers, 117.4K citations
72% related
Journal of Computer Science
2.7K papers, 23.5K citations
71% related
International Journal of Computer Applications
26.6K papers, 157.4K citations
71% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20213
202012
201925
201842
201719
201619