Citations (41)
Keep up to date with the latest research on this topic with citation updates for this article.
Articles from other publishers (41)
Jinpeng Han, Zhiyang Ju, Xiaoguang Chen, Manzhi Yang, Hui Zhang & Rouxing Huai. (2023) Secure Operations of Connected and Autonomous Vehicles. IEEE Transactions on Intelligent Vehicles 8:11, pages 4484-4497.
Crossref
Crossref
Johannes Fähndrich, Wilfried Honekamp, Roman Povalej, Heiko Rittelmeier, Silvio Berner & Dirk Labudde. (2023) Digital forensics and strong AI: A structured literature review. Forensic Science International: Digital Investigation 46, pages 301617.
Crossref
Crossref
Vijay Prakash, Alex Williams, Lalit Garg, Pradip Barik & Rajesh Kumar Dhanaraj. (2022) Cloud-Based Framework for Performing Digital Forensic Investigations. International Journal of Wireless Information Networks 29:4, pages 419-441.
Crossref
Crossref
Salam Khanji, Omar Alfandi, Liza Ahmad, Lubna Kakkengal & Mousa Al-kfairy. (2022) A systematic analysis on the readiness of Blockchain integration in IoT forensics. Forensic Science International: Digital Investigation 42-43, pages 301472.
Crossref
Crossref
Nidhi Sagarwal. 2022. Digital Forensics and Internet of Things. Digital Forensics and Internet of Things
237
254
.
Abdellah Akilal & M-Tahar Kechadi. (2022) An improved forensic-by-design framework for cloud computing with systems engineering standard compliance. Forensic Science International: Digital Investigation 40, pages 301315.
Crossref
Crossref
Stacey O. Baror, H. S. Venter & Victor R. Kebande. 2022. Innovations in Smart Cities Applications Volume 5. Innovations in Smart Cities Applications Volume 5
1085
1099
.
Kousik Barik, A. Abirami, Karabi Konar & Saptarshi Das. 2022. Illumination of Artificial Intelligence in Cybersecurity and Forensics. Illumination of Artificial Intelligence in Cybersecurity and Forensics
71
95
.
Victor R. Kebande & Kim‐Kwang Raymond Choo. (2021)
Finite state machine for cloud forensic readiness as a service (
CFRaaS
) events
. SECURITY AND PRIVACY 5:1.
Crossref
Crossref
G. Rekha & B Uma Maheswari. (2021) Raspberry Pi Forensic Investigation and Evidence Preservation using Blockchain. Raspberry Pi Forensic Investigation and Evidence Preservation using Blockchain.
Bharat Manral & Gaurav Somani. (2021) Establishing forensics capabilities in the presence of superuser insider threats. Forensic Science International: Digital Investigation 38, pages 301263.
Crossref
Crossref
Arafat Al-Dhaqm, Richard A. Ikuesan, Victor R. Kebande, Shukor Razak & Fahad M. Ghabban. (2021) Research Challenges and Opportunities in Drone Forensics Models. Electronics 10:13, pages 1519.
Crossref
Crossref
Fahad M Ghabban, Ibrahim M Alfadli, Omair Ameerbakhsh, Amer Nizar AbuAli, Arafat Al-Dhaqm & Mahmoud Ahmad Al-Khasawneh. (2021) Comparative Analysis of Network Forensic Tools and Network Forensics Processes. Comparative Analysis of Network Forensic Tools and Network Forensics Processes.
Ibrahim M Alfadli, Fahad M Ghabban, Omair Ameerbakhsh, Amer Nizar AbuAli, Arafat Al-Dhaqm & Mahmoud Ahmad Al-Khasawneh. (2021) CIPM: Common Identification Process Model for Database Forensics Field. CIPM: Common Identification Process Model for Database Forensics Field.
Victor R. Kebande, Nickson M. Karie, Kim‐Kwang Raymond Choo & Sadi Alawadi. (2021) Digital forensic readiness intelligence crime repository. SECURITY AND PRIVACY 4:3.
Crossref
Crossref
Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan & Sadi Alawadi. (2021)
Digital forensic readiness in operational cloud leveraging
ISO
/
IEC
27043 guidelines on security monitoring
. SECURITY AND PRIVACY 4:3.
Crossref
Crossref
Victor R. Kebande, Nickson M. Karie & Richard A. Ikuesan. (2020) Real-time monitoring as a supplementary security component of vigilantism in modern network environments. International Journal of Information Technology 13:1, pages 5-17.
Crossref
Crossref
Sung Jin Lee & Gi Bum Kim. (2021) K-FFRaaS: A Generic Model for Financial Forensic Readiness as a Service in Korea. IEEE Access 9, pages 130094-130110.
Crossref
Crossref
Nik Zulkarnaen Khidzir, Shekh Abdullah-Al-Musa Ahmed, Tan Tse Guan & Khairul Azhar Mat Daud. Social engineering (SoE) attacks towards network security in higher learning institute: The partial least squares path modeling approach. Social engineering (SoE) attacks towards network security in higher learning institute: The partial least squares path modeling approach.
C. Alexakos, C. Katsini, K. Votis, A. Lalas, D. Tzovaras & D. Serpanos. (2021) Enabling Digital Forensics Readiness for Internet of Vehicles. Transportation Research Procedia 52, pages 339-346.
Crossref
Crossref
Atonu Ghosh, Debashis De & Koushik Majumder. 2021. Inventive Computation and Information Technologies. Inventive Computation and Information Technologies
333
347
.
Phathutshedzo P. Mudau, H. S. Venter, Victor R. Kebande, Richard A. Ikuesan & Nickson M. Karie. 2021. International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020). International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)
229
239
.
Stacey O. Baror, H. S. Venter & Victor R. Kebande. 2021. Innovations in Smart Cities Applications Volume 4. Innovations in Smart Cities Applications Volume 4
1183
1196
.
Victor R. Kebande, Stacey O. Baror, Reza M. Parizi, Kim-Kwang Raymond Choo & H.S. Venter. (2020) Mapping digital forensic application requirement specification to an international standard. Forensic Science International: Reports 2, pages 100137.
Crossref
Crossref
Victor R. Kebande, Phathutshedzo P. Mudau, Richard A. Ikuesan, H.S. Venter & Kim-Kwang Raymond Choo. (2020) Holistic digital forensic readiness framework for IoT-enabled organizations. Forensic Science International: Reports 2, pages 100117.
Crossref
Crossref
Victor R. Kebande & Richard A. Ikuesan. (2020) Virtual sensor forensics. Virtual sensor forensics.
Likhwa Lothar Mlotshwa, Sheunesu M. Makura, Nickson M. Karie & Victor R. Kebande. (2020) Opportunistic security architecture for osmotic computing paradigm in dynamic IoT-Edge's resource diffusion. Opportunistic security architecture for osmotic computing paradigm in dynamic IoT-Edge's resource diffusion.
Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan & Hein S. Venter. (2020) Ontology‐driven perspective of CFRaaS. WIREs Forensic Science 2:5.
Crossref
Crossref
Jaishree Jain & Ajit Singh. (2020) Quantum-based Rivest–Shamir–Adleman (RSA) approach for digital forensic reports. Modern Physics Letters B 34:06, pages 2050085.
Crossref
Crossref
Sheunesu M. Makura, H. S. Venter, Richard Adeyemi Ikuesan, Victor R. Kebande & Nickson M. Karie. (2020) Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes. Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes.
Maria Stoyanova, Yannis Nikoloudakis, Spyridon Panagiotakis, Evangelos Pallis & Evangelos K. Markakis. (2020) A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues. IEEE Communications Surveys & Tutorials 22:2, pages 1191-1221.
Crossref
Crossref
Doowon Jeong. (2020) Artificial Intelligence Security Threat, Crime, and Forensics: Taxonomy and Open Issues. IEEE Access 8, pages 184560-184574.
Crossref
Crossref
Arafat Al-Dhaqm, Shukor Abd Razak, Richard Adeyemi Ikuesan, Victor R. Kebande & Kamran Siddique. (2020) A Review of Mobile Forensic Investigation Process Models. IEEE Access 8, pages 173359-173375.
Crossref
Crossref
Arafat Al-Dhaqm, Shukor Abd Razak, David A. Dampier, Kim-Kwang Raymond Choo, Kamran Siddique, Richard Adeyemi Ikuesan, Abdulhadi Alqarni & Victor R. Kebande. (2020) Categorization and Organization of Database Forensic Investigation Processes. IEEE Access 8, pages 112846-112858.
Crossref
Crossref
Yunus Khan & Sunita Varma. 2020. Social Networking and Computational Intelligence. Social Networking and Computational Intelligence
27
37
.
Ahmed Alenezi, Hany F. Atlam & Gary B. Wills. (2019) Experts reviews of a cloud forensic readiness framework for organizations. Journal of Cloud Computing 8:1.
Crossref
Crossref
Abdullah Al-Ghushami, NIckson Karie & Victor Kebande. (2019) Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem-TSP-NP Technique. Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem-TSP-NP Technique.
Nickson. M. Karie, Victor R. Kebande, H.S. Venter & Kim-Kwang Raymond Choo. (2019) On the importance of standardising the process of generating digital forensic reports. Forensic Science International: Reports 1, pages 100008.
Crossref
Crossref
Victor Rigworo Kebande & Hein S. Venter. (2019) A comparative analysis of digital forensic readiness models using CFRaaS as a baseline. WIREs Forensic Science 1:6.
Crossref
Crossref
Victor R. Kebande, Nickson M. Karie, Ruth D. Wario & H. S. Venter. (2018) Forensic Profiling of Cyber-Security Adversaries based on Incident Similarity Measures Interaction Index. Forensic Profiling of Cyber-Security Adversaries based on Incident Similarity Measures Interaction Index.
Sangho Park, Yanghoon Kim, Gwangmin Park, Onechul Na & Hangbae Chang. (2018) Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment. Sustainability 10:4, pages 1203.
Crossref
Crossref