Open Access Open Access  Restricted Access Subscription or Fee Access

Novel Perspectives in Computational Forensics: Trends, Opportunities, Future Challenges

Manas Kumar Yogi, Dwarampudi Aiswarya

Abstract


The present golden age of PC forensics is rapidly reaching a conclusion. Without a reasonable technique for empowering research endeavours that expand upon each other, criminological examination will fall behind the market, instruments will turn out to be progressively out of date, and law authorization, military and different clients of PC forensics items will be not able to depend on the consequences of legal investigation. This article sums up ebb and flow measurable exploration headings and contends that to push ahead, the network needs to receive normalized, particular methodologies for information portrayal and scientific handling.


Full Text:

PDF

References


Franke K, Srihari SN. Computational forensics: an overview. In: Srihari N, Franke K, editors. Proceedings of the Computational Forensics: Second International Workshop, IWCF 2008, Washington, DC, USA, August 7–8, 2008. Berlin: Springer; 2008. pp. 1–10.

Jacquet M, Champod C. Automated face recognition in forensic science: review and perspectives. Forensic Sci Int. 2020;307: 110124.

Farid H. Image forensics. Annu Rev Vision Sci. 2019;5: 549–573.

Yaqoob I, Ahmed E, Hashem IA, Ahmed AI, Gani A, Imran M, Guizani M. Internet of things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wireless Commun. 2017;24 (3): 10–16.

Pourvahab M, Ekbatanifard G. Digital forensics architecture for evidence collection and provenance preservation in IAAS cloud environment using SDN and blockchain technology. IEEE Access. 2019;7: 153349–153364.

Sharma H, Kanwal N, Batth RS. An ontology of digital video forensics: classification, research gaps & datasets. In: 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) 2019, Dec 11, Dubai, UAE. Piscataway, NJ: IEEE; 2019. pp. 485–491.

Akter O, Akther A, Uddin MA, Islam MM. Cloud forensics: challenges and blockchain based solutions. Int J Wireless Microw Technol. 2020; 10 (5): 1–2.

Zhao S, Li S, Qi L, Da Xu L. Computational intelligence enabled cybersecurity for the internet of things. IEEE Trans Emerging Top Comput Intell. 2020; 4 (5): 666–674.

Mayer O, Stamm MC. Exposing fake images with forensic similarity graphs. IEEE J Select Top Signal Process. 2020; 14 (5): 1049–1064.

Computer forensics analysis challenges. Computer Forensics Recruiter. 2021. Available at https://www.computer-forensics-recruiter.com/topics/computer_forensics_analysis_challenges/


Refbacks

  • There are currently no refbacks.