Author:
Mandela Ngaira,Mahmoud Amir Aboubakar Shaker,Agrawal Animesh
Publisher
Springer Nature Switzerland
Reference20 articles.
1. Akhgar, B., et al.: Dark web investigation. Security Informatics and Law Enforcement (2021, Preprint). https://doi.org/10.1007/978-3-030-55343-2
2. Al-Khaleel, A., Bani-Salameh, D., Al-Saleh, M.I.: On the memory artifacts of the tor browser bundle. In: The International Conference on Computing Technology and Information Management (ICCTIM), p. 41. Society of Digital Information and Wireless Communication (2014)
3. Alotaibi, M., et al.: Computer forensics: dark net forensic framework and tools used for digital evidence detection. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 11(3), 424–431 (2022). https://doi.org/10.17762/ijcnis.v11i3.4407
4. Arshad, M.R., Hussain, M., Tahir, H., Qadir, S., Memon, F.I.A., Javed, Y.: Forensic analysis of tor browser on Windows 10 and Android 10 operating systems. IEEE Access 9, 141273–141294 (2021)
5. Ashburn, M.: Understanding the dark web and how IT can aid your investigation, authentic8 (2021). https://www.authentic8.com/blog/understanding-dark-web-and-how-it-can-aid-your-investigation. Accessed 3 Oct 2022
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring the Use of Tails Operating System in Cybercrime and its Impact on Law Enforcement Investigations;2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28
2. Forensic Analysis of I2P Communication Network in Android and macOS Environments;2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28