{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:44:29Z","timestamp":1756993469808,"version":"3.40.3"},"publisher-location":"Cham","reference-count":80,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031815720"},{"type":"electronic","value":"9783031815737"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81573-7_3","type":"book-chapter","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T09:39:25Z","timestamp":1739353165000},"page":"35-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Digital Forensics Investigations: Major Challenges in Mobile and Cloud Forensics"],"prefix":"10.1007","author":[{"given":"Tanita","family":"Singano","sequence":"first","affiliation":[]},{"given":"Norman","family":"Nelufule","sequence":"additional","affiliation":[]},{"given":"Boitumelo","family":"Nkwe","sequence":"additional","affiliation":[]},{"given":"Kele","family":"Masemola","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Shadung","sequence":"additional","affiliation":[]},{"given":"Zamo","family":"Ngubane","sequence":"additional","affiliation":[]},{"given":"Ntombizodwa","family":"Thwala","sequence":"additional","affiliation":[]},{"given":"Japhtalina","family":"Mokoena","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"key":"3_CR1","first-page":"1","volume-title":"Mobile Forensics using the Harmonised Digital Forensic Investigation Process, Information security for South Africa (ISSA)","author":"HS Venter","year":"2014","unstructured":"Venter, H.S.: Mobile Forensics using the Harmonised Digital Forensic Investigation Process, Information security for South Africa (ISSA), pp. 1\u201310. Johannesburg South Africa, IEEE, Sandton (2014)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Neware, R., Khan, A.: Cloud Computing Digital Forensic challenges, In: Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018), pp. 1\u20133. (2018)","DOI":"10.1109\/ICECA.2018.8474838"},{"key":"3_CR3","unstructured":"Mohay, G., Technical Challenges and Directions for Digital Forensics. (2005). [Online]. Available: www.e-evidence.info\/cellular.html"},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"59705","DOI":"10.1109\/ACCESS.2018.2875068","volume":"6","author":"K Barmpatsalou","year":"2018","unstructured":"Barmpatsalou, K., Cruz, T., Monteiro, E., Simoes, P.: Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence. IEEE Access 6, 59705\u201359727 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2875068","journal-title":"IEEE Access"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/WNIS.2009.32","volume":"2009","author":"S Chen","year":"2009","unstructured":"Chen, S., Hao, X., Luo, M.: Research of mobile forensic software system based on windows mobile. International Conference on Wireless Networks and Information Systems, WNIS 2009, 366\u2013369 (2009). https:\/\/doi.org\/10.1109\/WNIS.2009.32","journal-title":"International Conference on Wireless Networks and Information Systems, WNIS"},{"key":"3_CR6","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-101r1","author":"R Ayers","year":"2014","unstructured":"Ayers, R., Brothers, S., Jansen, W.: Guidelines on mobile device forensics, Gaithersburg. Maryland (2014). https:\/\/doi.org\/10.6028\/NIST.SP.800-101r1","journal-title":"Maryland"},{"key":"3_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98467-0","author":"C Hummert","year":"2022","unstructured":"Hummert, C., Pawlaszcyk, D.: Mobile Forensics \u2013 The File Format Handbook. Springer International Publishing (2022). https:\/\/doi.org\/10.1007\/978-3-030-98467-0","journal-title":"Springer International Publishing"},{"key":"3_CR8","unstructured":"Burrows, C., Zadeh, P.B.: A Mobile Forensic Investigation into Steganography. [Online]. Available: http:\/\/www.ericsson.com\/res\/docs\/2015\/ericsson-"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Yusof, M.N., Mahmod, R., Abdullah, M.T., Dehghantanha.: Mobile Forensic Data Acquisition in Firefox OS, In: Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2014 Third International Conference on\u202f: date April 29 2014-May 1 2014, pp. 691\u20135. (2014)","DOI":"10.1109\/CyberSec.2014.6913967"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"301129","DOI":"10.1016\/j.fsidi.2021.301129","volume":"38","author":"G Humphries","year":"2021","unstructured":"Humphries, G., Nordvik, R., Manifavas, H., Cobley, P., Sorell, M.: Law enforcement educational challenges for mobile forensics. Forensic Science International: Digital Investigation 38, 301129 (2021). https:\/\/doi.org\/10.1016\/j.fsidi.2021.301129","journal-title":"Forensic Science International: Digital Investigation"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Ghafarian, A.: Foreniscs Analysis of Cloud Computing Services, In: Science and Information Conference 2015, pp. 1\u20135. [Online]. (2015) Available: www.conference.thesai.org","DOI":"10.1109\/SAI.2015.7237316"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Sonia Akter, S., Shahriar Rahman, M.: Cloud Forensic: Issues, Challenges and Solution Models, ArXiv, pp. 2\u201323. (2023)","DOI":"10.1142\/9789811273551_0004"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"45","DOI":"10.14445\/22315381\/CATI3P207","volume":"1","author":"SY Lim","year":"2020","unstructured":"Lim, S.Y., Johan, A., Daud, P., Ismail, N.A.: Dropbox forensics: Forensic analysis of a cloud storage service. International Journal of Engineering Trends and Technology 1, 45\u201349 (2020). https:\/\/doi.org\/10.14445\/22315381\/CATI3P207","journal-title":"International Journal of Engineering Trends and Technology"},{"issue":"3","key":"3_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MCC.2017.39","volume":"4","author":"K-KR Choo","year":"2017","unstructured":"Choo, K.-K.R., Esposito, C., Castiglione, A.: Evidence and Forensics in the Cloud: Challenges and Future Research Directions. IEEE Cloud Computing 4(3), 1\u20136 (2017)","journal-title":"IEEE Cloud Computing"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Sibiya, G., Venter, H.S., Fogwill, T.: Digital Forensics in the Cloud: The State of the Art, In: 2015 IST-Africa Conference\u202f: 06\u201308 May 2015, Lilongwe, Malawi, Malawi: IEEE (2015)","DOI":"10.1109\/ISTAFRICA.2015.7190540"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"Shah, J.J., Malik, L.G.: Cloud forensics: Issues and challenges. In: International Conference on Emerging Trends in Engineering and Technology, ICETET, IEEE Computer Society, pp. 138\u2013139. (2013). https:\/\/doi.org\/10.1109\/ICETET.2013.44","DOI":"10.1109\/ICETET.2013.44"},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"Dhake, B., Limaye, H., Motwani, D.: Cloud Forensics: Threat Assessment and Proposed Mitigations. In: 2022 International Conference for Advancement in Technology, ICONAT 2022, Institute of Electrical and Electronics Engineers Inc, (2022). https:\/\/doi.org\/10.1109\/ICONAT53423.2022.9725922","DOI":"10.1109\/ICONAT53423.2022.9725922"},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"301210","DOI":"10.1016\/j.fsidi.2021.301210","volume":"38","author":"P Lutta","year":"2021","unstructured":"Lutta, P., Sedky, M., Hassan, M., Jayawickrama, U., Bakhtiari Bastaki, B.: The complexity of internet of things forensics: A state-of-the-art review. Forensic Science International: Digital Investigation 38, 301210 (2021). https:\/\/doi.org\/10.1016\/j.fsidi.2021.301210","journal-title":"Forensic Science International: Digital Investigation"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Fernandes, R., Colaco, R.M.: A New Era of Digital Forensics in the form of Cloud Forensics: A Review July, 2020, In: Proceedings of the Second International Conference on Inventive Research in Computing Applications (ICIRCA-2020), pp. 1\u20136. (2020)","DOI":"10.1109\/ICIRCA48905.2020.9182938"},{"key":"3_CR20","unstructured":"Ayers, R., Brothers, S., Jansen, W.: Guidelines on Cell Phone Forensics Guidelines on Mobile Device Forensics. Archived NIST Technical Series Publication Archived Publication, vol. 1 (2007)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics Recommendations of the National Institute of Standards and Technology. Nist Special Publication, 800(101) (2007)","DOI":"10.6028\/NIST.SP.800-101"},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1146\/annurev-psych-010418","volume":"70","author":"AP Siddaway","year":"2019","unstructured":"Siddaway, A.P., Wood, A.M., Hedges, L.V.: How to Do a Systematic Review: A Best Practice Guide for Conducting and Reporting Narrative Reviews, Meta-Analyses, and Meta-Syntheses. Annu. Rev. Psychol. 70, 747\u2013770 (2019). https:\/\/doi.org\/10.1146\/annurev-psych-010418","journal-title":"Annu. Rev. Psychol."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Khan, K.S., Kunz, R., Kleijnen, J., Antes, G.: Five steps to conducting a systematic review (2003) [Online]. Available: http:\/\/www.ncbi.nlm.nib.gov\/entrez\/query\/","DOI":"10.1258\/jrsm.96.3.118"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Okoli, C.: A Guide to Conducting a Standalone Systematic Literature Review. Communications of the Association for Information Systems, 37, 1\u201333 (2015) [Online]. Available: http:\/\/aisel.aisnet.org\/cais\/vol37\/iss1\/43","DOI":"10.17705\/1CAIS.03743"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"250","DOI":"10.29007\/42v2","volume":"12","author":"G Oosterwyk","year":"2019","unstructured":"Oosterwyk, G., Brown, I., Geeling, S.: A Synthesis of Literature Review Guidelines from Information Systems Journals. Kalpa Publications in Computing 12, 250\u2013260 (2019)","journal-title":"Kalpa Publications in Computing"},{"issue":"1","key":"3_CR26","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M., Bailey, J., Linkman, S.: Systematic literature reviews in software engineering - A systematic literature review. Information and Software Technology 51(1), 7\u201315 (2009). https:\/\/doi.org\/10.1016\/j.infsof.2008.09.009","journal-title":"Information and Software Technology"},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"286","DOI":"10.17705\/1cais.03712","volume":"37","author":"G Schryen","year":"2015","unstructured":"Schryen, G.: Writing qualitative is literature reviews\u2014Guidelines for synthesis, interpretation, and guidance of research. Commun. Assoc. Inf. Syst. 37, 286\u2013325 (2015). https:\/\/doi.org\/10.17705\/1cais.03712","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"3_CR28","doi-asserted-by":"publisher","unstructured":"Yadav, D., Mishra, M., Prakash, S.: Mobile forensics challenges and admissibility of electronic evidences in India, In: Proceedings - 5th International Conference on Computational Intelligence and Communication Networks, CICN 2013, pp. 237\u2013242. (2013). https:\/\/doi.org\/10.1109\/CICN.2013.57","DOI":"10.1109\/CICN.2013.57"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Zawoad, S., Hasan, R.: Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities, In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, IEEE, pp. 1320\u20131325. (2015). https:\/\/doi.org\/10.1109\/HPCC-CSS-ICESS.2015.305","DOI":"10.1109\/HPCC-CSS-ICESS.2015.305"},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"25464","DOI":"10.1109\/ACCESS.2022.3154059","volume":"10","author":"F Casino","year":"2022","unstructured":"Casino, F., et al.: Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. IEEE Access Institute of Electrical and Electronics Engineers Inc 10, 25464\u201325493 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3154059","journal-title":"IEEE Access Institute of Electrical and Electronics Engineers Inc"},{"issue":"3","key":"3_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3177847","volume":"51","author":"K Barmpatsalou","year":"2018","unstructured":"Barmpatsalou, K., Cruz, T., Monteiro, E., Simoes, P.: Current and future trends in mobile device forensics: A survey. ACM Comput Surv 51(3), 1\u201331 (2018). https:\/\/doi.org\/10.1145\/3177847","journal-title":"ACM Comput Surv"},{"key":"3_CR32","doi-asserted-by":"publisher","unstructured":"Said, H., Yousif, A., Humaid, H.: IPhone forensics techniques and crime investigation. In:\nThe 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11), \nDubai, United Arab Emirates, pp. 120\u2013125 (2011). https:\/\/doi.org\/10.1109\/CTIT.2011.6107946","DOI":"10.1109\/CTIT.2011.6107946"},{"issue":"2","key":"3_CR33","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/s11042-013-1603-9","volume":"71","author":"SH Kang","year":"2014","unstructured":"Kang, S.H., Park, K.Y., Kim, J.: Cost effective data wiping methods for mobile phone. Multimed Tools Appl 71(2), 643\u2013655 (2014). https:\/\/doi.org\/10.1007\/s11042-013-1603-9","journal-title":"Multimed Tools Appl"},{"key":"3_CR34","doi-asserted-by":"publisher","unstructured":"Pandey, A.K., et al.: Current Challenges of Digital Forensics in Cyber Security. (2020). https:\/\/doi.org\/10.4018\/978-1-7998-1558-7.ch003","DOI":"10.4018\/978-1-7998-1558-7.ch003"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Almehmadi, T., Batarfi, O.: Impact of Android Phone Rooting on User Data Integrity in Mobile Forensics, In: 2nd International Conference on Computer Applications & Information Security (ICCAIS\u2019 2019)\u202f: 01\u201303 May, 2019 Riyadh, Kingdom of Saudi Arabia, pp. 1\u20136. (2019)","DOI":"10.1109\/CAIS.2019.8769520"},{"issue":"1","key":"3_CR36","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/00450618.2016.1182589","volume":"50","author":"R Chanajitt","year":"2018","unstructured":"Chanajitt, R., Viriyasitavat, W., Choo, K.K.R.: Forensic analysis and security assessment of Android m-banking apps. Australian Journal of Forensic Sciences 50(1), 3\u201319 (2018). https:\/\/doi.org\/10.1080\/00450618.2016.1182589","journal-title":"Australian Journal of Forensic Sciences"},{"key":"3_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60425-7_10","author":"T Janarthanan","year":"2021","unstructured":"Janarthanan, T., Bagheri, M., Zargari, S.: IoT Forensics: An Overview of the Current Issues and Challenges. Advanced Sciences and Technologies for Security Applications (2021). https:\/\/doi.org\/10.1007\/978-3-030-60425-7_10","journal-title":"Advanced Sciences and Technologies for Security Applications"},{"key":"3_CR38","first-page":"1","volume":"2011","author":"EK Mabuto","year":"2011","unstructured":"Mabuto, E.K., Venter, H.S.: State of the art of Digital Forensic Techniques. Information Security for South Africa (ISSA) 2011, 1\u20137 (2011)","journal-title":"Information Security for South Africa (ISSA)"},{"key":"3_CR39","doi-asserted-by":"publisher","unstructured":"Ahmed Ali, S., Memon, S., Sahito, F.: Challenges and solutions in cloud forensics, In: ACM International Conference Proceeding Series, Association for Computing Machinery, pp. 6\u201310. (2018). https:\/\/doi.org\/10.1145\/3264560.3264565","DOI":"10.1145\/3264560.3264565"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Mousa, A.N., Ithnin, N., Almolhis, N., Zainal, A.: A Consumer-Oriented Cloud Forensic Process Model, In: 2019 IEEE 10th Control and System Graduate Research Colloquium (ICSGRC 2019), pp. 1\u20136. (2019)","DOI":"10.1109\/ICSGRC.2019.8837096"},{"issue":"5","key":"3_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijwmt.2020.05.01","volume":"10","author":"O Akter","year":"2020","unstructured":"Akter, O., Akther, A., Uddin, M.A., Manowarul Islam, M.: Cloud Forensics: Challenges and Blockchain Based Solutions. International Journal of Wireless and Microwave Technologies 10(5), 1\u201312 (2020). https:\/\/doi.org\/10.5815\/ijwmt.2020.05.01","journal-title":"International Journal of Wireless and Microwave Technologies"},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Montasari, R., Hill, R.: Next-Generation Digital Forensics: Challenges and Future Paradigms, In: 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), pp. 1\u20138. (2019)","DOI":"10.1109\/ICGS3.2019.8688020"},{"key":"3_CR43","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.diin.2017.06.015","volume":"22","author":"ZA Baig","year":"2017","unstructured":"Baig, Z.A., et al.: Future challenges for smart cities: Cyber-security and digital forensics. Digital Investigation 22, 3\u201313 (2017). https:\/\/doi.org\/10.1016\/j.diin.2017.06.015","journal-title":"Digital Investigation"},{"key":"3_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52491-7_11","author":"R Montasari","year":"2017","unstructured":"Montasari, R.: An overview of cloud forensics strategy: Capabilities, challenges, and opportunities. Strategic Engineering for Cloud Computing and Big Data Analytics (2017). https:\/\/doi.org\/10.1007\/978-3-319-52491-7_11","journal-title":"Strategic Engineering for Cloud Computing and Big Data Analytics"},{"issue":"2","key":"3_CR45","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/COMST.2019.2962586","volume":"22","author":"M Stoyanova","year":"2020","unstructured":"Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E., Markakis, E.K.: A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues. IEEE Communications Surveys and Tutorials 22(2), 1191\u20131221 (2020). https:\/\/doi.org\/10.1109\/COMST.2019.2962586","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"3_CR46","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8006","author":"M Herman","year":"2020","unstructured":"Herman, M., et al.: NIST cloud computing forensic science challenges, Gaithersburg. Maryland (2020). https:\/\/doi.org\/10.6028\/NIST.IR.8006","journal-title":"Maryland"},{"issue":"10","key":"3_CR47","doi-asserted-by":"publisher","first-page":"10217","DOI":"10.1016\/j.jksuci.2022.10.018","volume":"34","author":"O Isaac Abiodun","year":"2022","unstructured":"Isaac Abiodun, O., Alawida, M., Esther Omolara, A., Alabdulatif, A.: Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey. Journal of King Saud University - Computer and Information Sciences 34(10), 10217\u201310245 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2022.10.018","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"issue":"34","key":"3_CR48","doi-asserted-by":"publisher","first-page":"28","DOI":"10.5120\/ijca2019919220","volume":"178","author":"P Jain","year":"2019","unstructured":"Jain, P., Mahalkari, A.: Review of Cloud Forensics: Challenges, Solutions and Comparative Analysis. Int J Comput Appl 178(34), 28\u201334 (2019). https:\/\/doi.org\/10.5120\/ijca2019919220","journal-title":"Int J Comput Appl"},{"issue":"3","key":"3_CR49","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1504\/IJESDF.2020.108296","volume":"12","author":"P Sharma","year":"2020","unstructured":"Sharma, P., Arora, D., Sakthivel, T.: UML-based process model for mobile cloud forensic application framework - a preliminary study. International Journal of Electronic Security and Digital Forensics 12(3), 262 (2020). https:\/\/doi.org\/10.1504\/IJESDF.2020.108296","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"key":"3_CR50","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-86","volume-title":"Guide to Integrating Forensic Techniques into Incident Response","author":"K Kent","year":"2006","unstructured":"Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to Integrating Forensic Techniques into Incident Response. Gaitherburg, Maryland (2006)"},{"key":"3_CR51","doi-asserted-by":"crossref","unstructured":"Ninawe, P., Ardhapurkar, S.: Design and Implementation of Cloud Based Mobile Forensic Tool. In: ICIIECS\u201915\u202f: DRDO sponsored 2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems\u202f: 19th and 20th March 2015\u202f: proceedings (2015)","DOI":"10.1109\/ICIIECS.2015.7193033"},{"key":"3_CR52","doi-asserted-by":"crossref","unstructured":"Kazim, A., Almaeeni, F., Al Ali, S.: \u201cMemory Forensics: Recovering Chat Messages and Encryption Master Key,\u201d In: 2019 10th International Conference on Information and Communication Systems (ICICS)\u202f: 11\u201313 June, 2019, Jordan University of Science and Technology, Irbid, Jordan, pp. 1\u20137. (2019)","DOI":"10.1109\/IACS.2019.8809179"},{"key":"3_CR53","doi-asserted-by":"publisher","unstructured":"Guttman, B., White, D.R., Walraven, T.: Digital Evidence Preservation, (2022). https:\/\/doi.org\/10.6028\/NIST.IR.8387","DOI":"10.6028\/NIST.IR.8387"},{"key":"3_CR54","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2005.10","volume-title":"Digital Evidence Search Kit","author":"KP Chow","year":"2005","unstructured":"Chow, K.P., et al.: Digital Evidence Search Kit. IEEE, Taipei Taiwan (2005)"},{"key":"3_CR55","doi-asserted-by":"publisher","unstructured":"Silvarajoo, V.R., Yun Lim, S., Daud, P.: Digital Evidence Case Management Tool for Collaborative Digital Forensics Investigation, In: 2021 3rd International Cyber Resilience Conference, CRC 2021, Institute of Electrical and Electronics Engineers Inc. (2021). https:\/\/doi.org\/10.1109\/CRC50527.2021.9392497","DOI":"10.1109\/CRC50527.2021.9392497"},{"key":"3_CR56","doi-asserted-by":"crossref","unstructured":"Soltani, S., Seno, S.A.H.: A survey on digital evidence collection and analysis, In: 7th International Conference on Computer and Knowledge Engineering, Iran: IEEE, pp. 1\u20137. (2017)","DOI":"10.1109\/ICCKE.2017.8167885"},{"key":"3_CR57","unstructured":"Lee, S., Kim, H., Lee, S., Lim, J.: Digital evidence collection process in integrity and memory information gathering, (2005)"},{"issue":"5","key":"3_CR58","doi-asserted-by":"publisher","first-page":"181","DOI":"10.3390\/info12050181","volume":"12","author":"C Karagiannis","year":"2021","unstructured":"Karagiannis, C., Vergidis, K.: Digital evidence and cloud forensics: Contemporary legal challenges and the power of disposal. Information (Switzerland) 12(5), 181 (2021). https:\/\/doi.org\/10.3390\/info12050181","journal-title":"Information (Switzerland)"},{"issue":"2","key":"3_CR59","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.diin.2006.05.002","volume":"3","author":"BJ Nikkel","year":"2006","unstructured":"Nikkel, B.J.: Improving evidence acquisition from live network sources. Digit. Investig. 3(2), 89\u201396 (2006). https:\/\/doi.org\/10.1016\/j.diin.2006.05.002","journal-title":"Digit. Investig."},{"issue":"2","key":"3_CR60","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1108\/JIC-05-2019-0097","volume":"21","author":"RI Ferguson","year":"2020","unstructured":"Ferguson, R.I., Renaud, K., Wilford, S., Irons, A.: PRECEPT: a framework for ethical digital forensics investigations. J. Intellect. Cap. 21(2), 257\u2013290 (2020). https:\/\/doi.org\/10.1108\/JIC-05-2019-0097","journal-title":"J. Intellect. Cap."},{"key":"3_CR61","unstructured":"Allie, R.: Judgement of Hanna Cornelius: Case No: CC 04\/2018. Cape Town: Western Cape High Court, pp. 1\u201369. (2018)"},{"key":"3_CR62","unstructured":"Masipa, J.: Oscar Pistorius Murder Charge: Case No: CC113\/2013, pp. 1\u201326. (2016)"},{"key":"3_CR63","unstructured":"Wilson, S.D.J.: Tshegofatso Pule Murder: Case No: SS36\/2021, pp. 1\u201310. (2022)"},{"key":"3_CR64","unstructured":"Desai, S.: Henri Christo Van Breda Murder Case: No SS17\/16, pp. 1\u2013270. (2018)"},{"key":"3_CR65","unstructured":"Makgoba, M.W.: The Report into the Circumstances Surrounding the Deaths of Mentally Ill Patients: Gauteng Province. (2017)"},{"key":"3_CR66","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/SADFE.2010.8","volume":"2010","author":"A Khan","year":"2010","unstructured":"Khan, A., Wiil, U.K., Memon, N.: \u201cDigital forensics and crime investigation: Legal issues in prosecution at national level\u201d, in 5th International Workshop on Systematic Approaches to Digital Forensic Engineering. SADFE 2010, 133\u2013140 (2010). https:\/\/doi.org\/10.1109\/SADFE.2010.8","journal-title":"SADFE"},{"key":"3_CR67","doi-asserted-by":"publisher","first-page":"301021","DOI":"10.1016\/j.fsidi.2020.301021","volume":"35","author":"HMA van Beek","year":"2020","unstructured":"van Beek, H.M.A., van den Bos, J., Boztas, A., van Eijk, E.J., Schramp, R., Ugen, M.: Digital forensics as a service: Stepping up the game. Forensic Science International: Digital Investigation 35, 301021 (2020). https:\/\/doi.org\/10.1016\/j.fsidi.2020.301021","journal-title":"Forensic Science International: Digital Investigation"},{"issue":"6","key":"3_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/wfs2.1418","volume":"3","author":"A Jarrett","year":"2021","unstructured":"Jarrett, A., Choo, K.R.: The impact of automation and artificial intelligence on digital forensics. WIREs Forensic Science 3(6), 1\u20135 (2021). https:\/\/doi.org\/10.1002\/wfs2.1418","journal-title":"WIREs Forensic Science"},{"key":"3_CR69","unstructured":"Marshall, K., Rea, A.: Legal challenges in cloud forensics. In: 27th Annual Americas Conference on Information Systems, AMCIS 2021 (2021)"},{"key":"3_CR70","doi-asserted-by":"publisher","DOI":"10.1002\/wfs2.1496","author":"AO Akinbi","year":"2023","unstructured":"Akinbi, A.O.: Digital forensics challenges and readiness for 6G Internet of Things (IoT) networks. WIREs Forensic Science (2023). https:\/\/doi.org\/10.1002\/wfs2.1496","journal-title":"WIREs Forensic Science"},{"key":"3_CR71","unstructured":"Choi, M., EL Azzaoui, A., Kumar Singh, S., Mohammed Salim, M., Reward Jeremiah, S., Hyuk Park, J.: The Future of Metaverse: Security Issues, Requirements, and Solutions. Human-centric Computing and Information Sciences, vol. 12 (2022)"},{"issue":"5","key":"3_CR72","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/MNET.011.1900635","volume":"34","author":"Y Sun","year":"2020","unstructured":"Sun, Y., Tian, Z., Li, M., Zhu, C., Guizani, N.: Automated Attack and Defense Framework toward 5G Security. IEEE Netw 34(5), 247\u2013253 (2020). https:\/\/doi.org\/10.1109\/MNET.011.1900635","journal-title":"IEEE Netw"},{"issue":"24","key":"3_CR73","doi-asserted-by":"publisher","first-page":"129993","DOI":"10.3390\/app122412993","volume":"12","author":"M Pooyandeh","year":"2022","unstructured":"Pooyandeh, M., Han, K.J., Sohn, I.: Cybersecurity in the AI-Based Metaverse: A Survey. Applied Sciences (Switzerland) 12(24), 129993 (2022). https:\/\/doi.org\/10.3390\/app122412993","journal-title":"Applied Sciences (Switzerland)"},{"issue":"8","key":"3_CR74","doi-asserted-by":"publisher","first-page":"360","DOI":"10.3390\/jrfm16080360","volume":"16","author":"D Batista","year":"2023","unstructured":"Batista, D., et al.: Exploring Blockchain Technology for Chain of Custody Control in Physical Evidence: A Systematic Literature Review. Journal of Risk and Financial Management 16(8), 360 (2023). https:\/\/doi.org\/10.3390\/jrfm16080360","journal-title":"Journal of Risk and Financial Management"},{"issue":"3","key":"3_CR75","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1080\/00450618.2016.1153714","volume":"49","author":"F Daryabar","year":"2017","unstructured":"Daryabar, F., Dehghantanha, A., Choo, K.K.R.: Cloud storage forensics: MEGA as a case study. Australian Journal of Forensic Sciences 49(3), 344\u2013357 (2017). https:\/\/doi.org\/10.1080\/00450618.2016.1153714","journal-title":"Australian Journal of Forensic Sciences"},{"issue":"4","key":"3_CR76","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.diin.2013.08.005","volume":"10","author":"B Martini","year":"2013","unstructured":"Martini, B., Choo, K.K.R.: Cloud storage forensics: OwnCloud as a case study. Digit Investig 10(4), 287\u2013299 (2013). https:\/\/doi.org\/10.1016\/j.diin.2013.08.005","journal-title":"Digit Investig"},{"issue":"2","key":"3_CR77","doi-asserted-by":"publisher","first-page":"41","DOI":"10.33166\/AETiC.2019.02.005","volume":"3","author":"A Jones","year":"2019","unstructured":"Jones, A., Vidalis, S.: Rethinking digital forensics. Annals of Emerging Technologies in Computing 3(2), 41\u201353 (2019). https:\/\/doi.org\/10.33166\/AETiC.2019.02.005","journal-title":"Annals of Emerging Technologies in Computing"},{"key":"3_CR78","doi-asserted-by":"crossref","unstructured":"Adedayo, O.M.: Big data and digital forensics, Rethinking Digital Forensics, In: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). (2016)","DOI":"10.1109\/ICCCF.2016.7740422"},{"issue":"2","key":"3_CR79","doi-asserted-by":"publisher","first-page":"101","DOI":"10.38094\/jastt301137","volume":"3","author":"MA Omer","year":"2022","unstructured":"Omer, M.A., Yazdeen, A.A., Malallah, H.S., Abdulrahman, L.M.: A Survey on Cloud Security: Concepts, Types, Limitations, and Challenges. Journal of Applied Science and Technology Trends 3(2), 101\u2013111 (2022). https:\/\/doi.org\/10.38094\/jastt301137","journal-title":"Journal of Applied Science and Technology Trends"},{"key":"3_CR80","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.fsisyn.2020.10.002","volume":"2","author":"R Apau","year":"2020","unstructured":"Apau, R., Koranteng, F.N.: An overview of the digital forensic investigation infrastructure of Ghana. Forensic Science International: Synergy 2, 299\u2013309 (2020). https:\/\/doi.org\/10.1016\/j.fsisyn.2020.10.002","journal-title":"Forensic Science International: Synergy"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Towards new e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81573-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T09:39:51Z","timestamp":1739353191000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81573-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031815720","9783031815737"],"references-count":80,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81573-7_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICOMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on e-Infrastructure and e-Services for Developing Countries","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bobo-Dioulasso","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Burkina Faso","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africom2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/africommconference.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}