@article{Singh_2022,
doi = {10.1109/access.2022.3151403},
url = {https://doi.org/10.1109%2Faccess.2022.3151403},
year = 2022,
publisher = {Institute of Electrical and Electronics Engineers ({IEEE})},
pages = {1--1},
author = {Avinash Singh and Richard Adeyemi Ikuesan and Hein Venter},
title = {Secure Storage Model for Digital Forensic Readiness},
journal = {{IEEE} Access}
}
@article{Singh_2022, doi = {10.34190/iccws.17.1.53}, url = {https://doi.org/10.34190%2Ficcws.17.1.53}, year = 2022, month = {mar}, publisher = {Academic Conferences International Ltd}, volume = {17}, number = {1}, pages = {413--422}, author = {Avinash Singh and Richard Ikuesan and Hein Venter}, title = {Ransomware Detection using Process Memory}, journal = {International Conference on Cyber Warfare and Security}}
2022
Error Level Analysis Technique for Identifying JPEG Block Unique Signature for Digital Forensic Analysis
@article{Azhan_2022,
doi = {10.3390/electronics11091468},
url = {https://doi.org/10.3390%2Felectronics11091468},
year = 2022,
month = {may},
publisher = {{MDPI} {AG}},
volume = {11},
number = {9},
pages = {1468},
author = {Nor Amira Nor Azhan and Richard Adeyemi Ikuesan and Shukor Abd Razak and Victor R. Kebande},
title = {Error Level Analysis Technique for Identifying {JPEG} Block Unique Signature for Digital Forensic Analysis},
journal = {Electronics}
}
2022
A Digital Forensic Readiness Cybercrime Semantic Trigger Process