1. Agarwal, A., Gupta, M., Gupta, S., & Gupta, S. C. (2011). Systematic digital forensic investigation model. International Journal of Computer Science and Security (IJCSS), 5(1), 118–131. https://www.researchgate.net/publication/228410430_Systematic_Digital_Forensic_Investigation_Model.
2. Alhazmi, A., Macia-Fernandez, G., Camacho, J., & Salah, S. (2017a). Torrent Forensics: Are your Files Being Shared in the BitTorrent Network? CYBER 2017: The Second International Conference on Cyber-Technologies and Cyber-Systems Torrent, December. https://www.researchgate.net/profile/Saeed-Salah/publication/322131860_Torrent_Forensics_Are_your_Files_Being_Shared_in_the_BitTorrent_Network/links/5a469a420f7e9ba868aa5068/Torrent-Forensics-Are-your-Files-Being-Shared-in-the-BitTorrent-Network.pdf
3. Alhazmi, A., Macia-Fernandez, G., Camacho, J., & Salah, S. (2017b). Torrent Forensics: Are your Files Being Shared in the BitTorrent Network? CYBER 2017: The Second International Conference on Cyber-Technologies and Cyber-Systems Torrent, December.
4. Ali, A., Abd Razak, S., Othman, S. H., Mohammed, A., & Saeed, F. (2017). A metamodel for mobile forensics investigation domain. PLOS ONE, 12(4), e0176223. https://doi.org/10.1371/journal.pone.0176223.
5. Allen, M. (2017). Designing Online Asynchronous Information Literacy Instruction Using the ADDIE Model. In Distributed Learning (pp. 69–91). Elsevier. https://doi.org/10.1016/B978-0-08-100598-9.00004-0