Main Article Content
Abstract
Keywords
Article Details
Copyright (c) 2022 Jurnal Komputer TerapanÂ
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright info for authors
1. Authors hold the copyright in any process, procedure, or article described in the work and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors retain publishing rights to re-use all or portion of the work in different work but can not granting third-party requests for reprinting and republishing the work.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License
References
- W. D. A. Chirath and L. Rupasinghe, “Comprehensive Forensic Data Extraction and Representation System for Windows Registry,†2019 Int. Conf. Adv. Comput. ICAC 2019, pp. 346–350, 2019, doi: 10.1109/ICAC49085.2019.9103417.
- A. Dimitriadis, N. Ivezic, B. Kulvatunyou, and I. Mavridis, “D4I - Digital forensics framework for reviewing and investigating cyber attacks,†Array, vol. 5, no. December 2019, p. 100015, Mar. 2020, doi: 10.1016/j.array.2019.100015.
- Y. M. Song and K. S. Kwak, Electronics, Information Technology and Intellectualization. CRC Press, 2015.
- M. Rafique and M. N. A. Khan, “Exploring Static and Live Digital Forensics: Methods, Practices and Tools,†Int. J. Sci. Eng. Res., vol. 4, no. 10, pp. 1048–1056, 2013, [Online]. Available: http://www.ijser.org/researchpaper%5CExploring-Static-and-Live-Digital-Forensic-Methods-Practices-and-Tools.pdf.
- I. Riadi, Sunardi, and A. Hadi, “Analisis Bukti Digital SSD NVMe pada Sistem Operasi Proprietary Menggunakan Metode Static Forensics,†CoreIT, vol. 3321, no. 2, pp. 1–8, 2019.
- A. Faiz and R. Imam, “Forensic Analysis of Frozen Hard Drive Using Static Forensics Method,†Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 1, 2017.
- R. Umar and Sahiruddin, “Metode Nist Untuk Analisis Forensik Bukti Digital Pada Perangkat Android,†Pros. SENDU_U_2019, pp. 978–979, 2019.
- M. Fitriana, K. A. AR, and J. M. Marsya, “PENERAPANA METODE NATIONAL INSTITUTE OF STANDARS AND TECHNOLOGY (NIST) DALAM ANALISIS FORENSIK DIGITAL UNTUK PENANGANAN CYBER CRIME,†Cybersp. J. Pendidik. Teknol. Inf., vol. 4, no. 1, p. 29, Jul. 2020, doi: 10.22373/cj.v4i1.7241.
- R. Sistem et al., “JURNAL RESTI Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi,†vol. 1, no. 10, pp. 2–6, 2021.
- J. Kizza and F. Migga Kizza, “Digital Evidence and Computer Crime,†in Securing the Information Infrastructure, IGI Global, 2008, pp. 298–317.
- J.-P. Van Belle, “Anti-Forensics: A Practitioner Perspective,†Int. J. Cyber-Security Digit. Forensics, vol. 4, no. 2, pp. 390–403, 2015, doi: 10.17781/P001593.
- M. Abdulhamid, S. E. E. Profile, V. O. Waziri, S. E. E. Profile, S. E. E. Profile, and S. E. E. Profile, “Cyber Crimes Analysis Based-On Open Source Digital Forensics Tools Some of the authors of this publication are also working on these related projects : Nature Inspired Meta-heuristic Algorithms for Deep Learning : Recent Progress and Novel Perspective Vie,†no. July 2016, 2013.
- N. Kishore, C. Gupta, and D. Dawar, “An Insight View of Digital Forensics,†Int. J. Comput. Sci. Appl., vol. 4, no. 6, pp. 89–96, Dec. 2014, doi: 10.5121/ijcsa.2014.4608.
- M. Gül and E. Kugu, “A survey on anti-forensics techniques,†IDAP 2017 - Int. Artif. Intell. Data Process. Symp., 2017, doi: 10.1109/IDAP.2017.8090341.
- A. Jain and G. S. Chhabra, “Anti-forensics techniques: An analytical review,†in 2014 Seventh International Conference on Contemporary Computing (IC3), Aug. 2014, pp. 412–418, doi: 10.1109/IC3.2014.6897209.
- J. Sammons, The Basics of Digital Forensics - Second Edition [2015][UnitedVRG]. .
- I. Riadi, R. Umar, and A. Firdonsyah, “Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method,†Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 5, pp. 3–8, 2017.
- R. Umar, I. Riadi, and B. F. Muthohirin, “Live forensics of tools on android devices for email forensics,†TELKOMNIKA (Telecommunication Comput. Electron. Control., vol. 17, no. 4, p. 1803, Aug. 2019, doi: 10.12928/telkomnika.v17i4.11748.
- K. Kent, S. Chevalier, T. Grance, and H. Dang, “Guide to Integrating Forensic Techniques into Incident Response,†Natl. Inst. Stand. Technol., 2006.
- D. He, N. Kumar, J. H. Lee, and R. Sherratt, “Enhanced three-factor security protocol for consumer USB mass storage devices,†IEEE Trans. Consum. Electron., vol. 60, no. 1, pp. 30–37, 2014, doi: 10.1109/TCE.2014.6780922.
References
W. D. A. Chirath and L. Rupasinghe, “Comprehensive Forensic Data Extraction and Representation System for Windows Registry,†2019 Int. Conf. Adv. Comput. ICAC 2019, pp. 346–350, 2019, doi: 10.1109/ICAC49085.2019.9103417.
A. Dimitriadis, N. Ivezic, B. Kulvatunyou, and I. Mavridis, “D4I - Digital forensics framework for reviewing and investigating cyber attacks,†Array, vol. 5, no. December 2019, p. 100015, Mar. 2020, doi: 10.1016/j.array.2019.100015.
Y. M. Song and K. S. Kwak, Electronics, Information Technology and Intellectualization. CRC Press, 2015.
M. Rafique and M. N. A. Khan, “Exploring Static and Live Digital Forensics: Methods, Practices and Tools,†Int. J. Sci. Eng. Res., vol. 4, no. 10, pp. 1048–1056, 2013, [Online]. Available: http://www.ijser.org/researchpaper%5CExploring-Static-and-Live-Digital-Forensic-Methods-Practices-and-Tools.pdf.
I. Riadi, Sunardi, and A. Hadi, “Analisis Bukti Digital SSD NVMe pada Sistem Operasi Proprietary Menggunakan Metode Static Forensics,†CoreIT, vol. 3321, no. 2, pp. 1–8, 2019.
A. Faiz and R. Imam, “Forensic Analysis of Frozen Hard Drive Using Static Forensics Method,†Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 1, 2017.
R. Umar and Sahiruddin, “Metode Nist Untuk Analisis Forensik Bukti Digital Pada Perangkat Android,†Pros. SENDU_U_2019, pp. 978–979, 2019.
M. Fitriana, K. A. AR, and J. M. Marsya, “PENERAPANA METODE NATIONAL INSTITUTE OF STANDARS AND TECHNOLOGY (NIST) DALAM ANALISIS FORENSIK DIGITAL UNTUK PENANGANAN CYBER CRIME,†Cybersp. J. Pendidik. Teknol. Inf., vol. 4, no. 1, p. 29, Jul. 2020, doi: 10.22373/cj.v4i1.7241.
R. Sistem et al., “JURNAL RESTI Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi,†vol. 1, no. 10, pp. 2–6, 2021.
J. Kizza and F. Migga Kizza, “Digital Evidence and Computer Crime,†in Securing the Information Infrastructure, IGI Global, 2008, pp. 298–317.
J.-P. Van Belle, “Anti-Forensics: A Practitioner Perspective,†Int. J. Cyber-Security Digit. Forensics, vol. 4, no. 2, pp. 390–403, 2015, doi: 10.17781/P001593.
M. Abdulhamid, S. E. E. Profile, V. O. Waziri, S. E. E. Profile, S. E. E. Profile, and S. E. E. Profile, “Cyber Crimes Analysis Based-On Open Source Digital Forensics Tools Some of the authors of this publication are also working on these related projects : Nature Inspired Meta-heuristic Algorithms for Deep Learning : Recent Progress and Novel Perspective Vie,†no. July 2016, 2013.
N. Kishore, C. Gupta, and D. Dawar, “An Insight View of Digital Forensics,†Int. J. Comput. Sci. Appl., vol. 4, no. 6, pp. 89–96, Dec. 2014, doi: 10.5121/ijcsa.2014.4608.
M. Gül and E. Kugu, “A survey on anti-forensics techniques,†IDAP 2017 - Int. Artif. Intell. Data Process. Symp., 2017, doi: 10.1109/IDAP.2017.8090341.
A. Jain and G. S. Chhabra, “Anti-forensics techniques: An analytical review,†in 2014 Seventh International Conference on Contemporary Computing (IC3), Aug. 2014, pp. 412–418, doi: 10.1109/IC3.2014.6897209.
J. Sammons, The Basics of Digital Forensics - Second Edition [2015][UnitedVRG]. .
I. Riadi, R. Umar, and A. Firdonsyah, “Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method,†Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 5, pp. 3–8, 2017.
R. Umar, I. Riadi, and B. F. Muthohirin, “Live forensics of tools on android devices for email forensics,†TELKOMNIKA (Telecommunication Comput. Electron. Control., vol. 17, no. 4, p. 1803, Aug. 2019, doi: 10.12928/telkomnika.v17i4.11748.
K. Kent, S. Chevalier, T. Grance, and H. Dang, “Guide to Integrating Forensic Techniques into Incident Response,†Natl. Inst. Stand. Technol., 2006.
D. He, N. Kumar, J. H. Lee, and R. Sherratt, “Enhanced three-factor security protocol for consumer USB mass storage devices,†IEEE Trans. Consum. Electron., vol. 60, no. 1, pp. 30–37, 2014, doi: 10.1109/TCE.2014.6780922.