Main Article Content
Abstract
Keywords
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
References
- W. D. A. Chirath and L. Rupasinghe, “Comprehensive Forensic Data Extraction and Representation System for Windows Registry,†2019 Int. Conf. Adv. Comput. ICAC 2019, pp. 346–350, 2019, doi: 10.1109/ICAC49085.2019.9103417.
- A. Dimitriadis, N. Ivezic, B. Kulvatunyou, and I. Mavridis, “D4I - Digital forensics framework for reviewing and investigating cyber attacks,†Array, vol. 5, no. December 2019, p. 100015, Mar. 2020, doi: 10.1016/j.array.2019.100015.
- Y. M. Song and K. S. Kwak, Electronics, Information Technology and Intellectualization. CRC Press, 2015.
- M. Rafique and M. N. A. Khan, “Exploring Static and Live Digital Forensics: Methods, Practices and Tools,†Int. J. Sci. Eng. Res., vol. 4, no. 10, pp. 1048–1056, 2013, [Online]. Available: http://www.ijser.org/researchpaper%5CExploring-Static-and-Live-Digital-Forensic-Methods-Practices-and-Tools.pdf.
- I. Riadi, Sunardi, and A. Hadi, “Analisis Bukti Digital SSD NVMe pada Sistem Operasi Proprietary Menggunakan Metode Static Forensics,†CoreIT, vol. 3321, no. 2, pp. 1–8, 2019.
- A. Faiz and R. Imam, “Forensic Analysis of Frozen Hard Drive Using Static Forensics Method,†Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 1, 2017.
- R. Umar and Sahiruddin, “Metode Nist Untuk Analisis Forensik Bukti Digital Pada Perangkat Android,†Pros. SENDU_U_2019, pp. 978–979, 2019.
- M. Fitriana, K. A. AR, and J. M. Marsya, “PENERAPANA METODE NATIONAL INSTITUTE OF STANDARS AND TECHNOLOGY (NIST) DALAM ANALISIS FORENSIK DIGITAL UNTUK PENANGANAN CYBER CRIME,†Cybersp. J. Pendidik. Teknol. Inf., vol. 4, no. 1, p. 29, Jul. 2020, doi: 10.22373/cj.v4i1.7241.
- R. Sistem et al., “JURNAL RESTI Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi,†vol. 1, no. 10, pp. 2–6, 2021.
- J. Kizza and F. Migga Kizza, “Digital Evidence and Computer Crime,†in Securing the Information Infrastructure, IGI Global, 2008, pp. 298–317.
- J.-P. Van Belle, “Anti-Forensics: A Practitioner Perspective,†Int. J. Cyber-Security Digit. Forensics, vol. 4, no. 2, pp. 390–403, 2015, doi: 10.17781/P001593.
- M. Abdulhamid, S. E. E. Profile, V. O. Waziri, S. E. E. Profile, S. E. E. Profile, and S. E. E. Profile, “Cyber Crimes Analysis Based-On Open Source Digital Forensics Tools Some of the authors of this publication are also working on these related projects : Nature Inspired Meta-heuristic Algorithms for Deep Learning : Recent Progress and Novel Perspective Vie,†no. July 2016, 2013.
- N. Kishore, C. Gupta, and D. Dawar, “An Insight View of Digital Forensics,†Int. J. Comput. Sci. Appl., vol. 4, no. 6, pp. 89–96, Dec. 2014, doi: 10.5121/ijcsa.2014.4608.
- M. Gül and E. Kugu, “A survey on anti-forensics techniques,†IDAP 2017 - Int. Artif. Intell. Data Process. Symp., 2017, doi: 10.1109/IDAP.2017.8090341.
- A. Jain and G. S. Chhabra, “Anti-forensics techniques: An analytical review,†in 2014 Seventh International Conference on Contemporary Computing (IC3), Aug. 2014, pp. 412–418, doi: 10.1109/IC3.2014.6897209.
- J. Sammons, The Basics of Digital Forensics - Second Edition [2015][UnitedVRG]. .
- I. Riadi, R. Umar, and A. Firdonsyah, “Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method,†Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 5, pp. 3–8, 2017.
- R. Umar, I. Riadi, and B. F. Muthohirin, “Live forensics of tools on android devices for email forensics,†TELKOMNIKA (Telecommunication Comput. Electron. Control., vol. 17, no. 4, p. 1803, Aug. 2019, doi: 10.12928/telkomnika.v17i4.11748.
- K. Kent, S. Chevalier, T. Grance, and H. Dang, “Guide to Integrating Forensic Techniques into Incident Response,†Natl. Inst. Stand. Technol., 2006.
- D. He, N. Kumar, J. H. Lee, and R. Sherratt, “Enhanced three-factor security protocol for consumer USB mass storage devices,†IEEE Trans. Consum. Electron., vol. 60, no. 1, pp. 30–37, 2014, doi: 10.1109/TCE.2014.6780922.
References
W. D. A. Chirath and L. Rupasinghe, “Comprehensive Forensic Data Extraction and Representation System for Windows Registry,†2019 Int. Conf. Adv. Comput. ICAC 2019, pp. 346–350, 2019, doi: 10.1109/ICAC49085.2019.9103417.
A. Dimitriadis, N. Ivezic, B. Kulvatunyou, and I. Mavridis, “D4I - Digital forensics framework for reviewing and investigating cyber attacks,†Array, vol. 5, no. December 2019, p. 100015, Mar. 2020, doi: 10.1016/j.array.2019.100015.
Y. M. Song and K. S. Kwak, Electronics, Information Technology and Intellectualization. CRC Press, 2015.
M. Rafique and M. N. A. Khan, “Exploring Static and Live Digital Forensics: Methods, Practices and Tools,†Int. J. Sci. Eng. Res., vol. 4, no. 10, pp. 1048–1056, 2013, [Online]. Available: http://www.ijser.org/researchpaper%5CExploring-Static-and-Live-Digital-Forensic-Methods-Practices-and-Tools.pdf.
I. Riadi, Sunardi, and A. Hadi, “Analisis Bukti Digital SSD NVMe pada Sistem Operasi Proprietary Menggunakan Metode Static Forensics,†CoreIT, vol. 3321, no. 2, pp. 1–8, 2019.
A. Faiz and R. Imam, “Forensic Analysis of Frozen Hard Drive Using Static Forensics Method,†Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 1, 2017.
R. Umar and Sahiruddin, “Metode Nist Untuk Analisis Forensik Bukti Digital Pada Perangkat Android,†Pros. SENDU_U_2019, pp. 978–979, 2019.
M. Fitriana, K. A. AR, and J. M. Marsya, “PENERAPANA METODE NATIONAL INSTITUTE OF STANDARS AND TECHNOLOGY (NIST) DALAM ANALISIS FORENSIK DIGITAL UNTUK PENANGANAN CYBER CRIME,†Cybersp. J. Pendidik. Teknol. Inf., vol. 4, no. 1, p. 29, Jul. 2020, doi: 10.22373/cj.v4i1.7241.
R. Sistem et al., “JURNAL RESTI Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi,†vol. 1, no. 10, pp. 2–6, 2021.
J. Kizza and F. Migga Kizza, “Digital Evidence and Computer Crime,†in Securing the Information Infrastructure, IGI Global, 2008, pp. 298–317.
J.-P. Van Belle, “Anti-Forensics: A Practitioner Perspective,†Int. J. Cyber-Security Digit. Forensics, vol. 4, no. 2, pp. 390–403, 2015, doi: 10.17781/P001593.
M. Abdulhamid, S. E. E. Profile, V. O. Waziri, S. E. E. Profile, S. E. E. Profile, and S. E. E. Profile, “Cyber Crimes Analysis Based-On Open Source Digital Forensics Tools Some of the authors of this publication are also working on these related projects : Nature Inspired Meta-heuristic Algorithms for Deep Learning : Recent Progress and Novel Perspective Vie,†no. July 2016, 2013.
N. Kishore, C. Gupta, and D. Dawar, “An Insight View of Digital Forensics,†Int. J. Comput. Sci. Appl., vol. 4, no. 6, pp. 89–96, Dec. 2014, doi: 10.5121/ijcsa.2014.4608.
M. Gül and E. Kugu, “A survey on anti-forensics techniques,†IDAP 2017 - Int. Artif. Intell. Data Process. Symp., 2017, doi: 10.1109/IDAP.2017.8090341.
A. Jain and G. S. Chhabra, “Anti-forensics techniques: An analytical review,†in 2014 Seventh International Conference on Contemporary Computing (IC3), Aug. 2014, pp. 412–418, doi: 10.1109/IC3.2014.6897209.
J. Sammons, The Basics of Digital Forensics - Second Edition [2015][UnitedVRG]. .
I. Riadi, R. Umar, and A. Firdonsyah, “Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method,†Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 5, pp. 3–8, 2017.
R. Umar, I. Riadi, and B. F. Muthohirin, “Live forensics of tools on android devices for email forensics,†TELKOMNIKA (Telecommunication Comput. Electron. Control., vol. 17, no. 4, p. 1803, Aug. 2019, doi: 10.12928/telkomnika.v17i4.11748.
K. Kent, S. Chevalier, T. Grance, and H. Dang, “Guide to Integrating Forensic Techniques into Incident Response,†Natl. Inst. Stand. Technol., 2006.
D. He, N. Kumar, J. H. Lee, and R. Sherratt, “Enhanced three-factor security protocol for consumer USB mass storage devices,†IEEE Trans. Consum. Electron., vol. 60, no. 1, pp. 30–37, 2014, doi: 10.1109/TCE.2014.6780922.