"A Forensic Traceability Index in Digital Forensic Investigation"
written by Siti Rahayu Selamat, Shahrin Sahib, Nor Hafeizah, Robiah Yusof, Mohd Faizal Abdollah,
published by Journal of Information Security, Vol.4 No.1, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Biometrically linking document leakage to the individuals responsible
Trust, Privacy and Security in Digital Business, 2018
[2] TRACEMAP: A traceability model for the digital forensics investigation process
2017
[3] Integrirani model upravljanja korporativnom digitalnom forenzičkom istragom
Tehni?ki vjesnik, 2016
[4] A Generic Framework for Digital Evidence Traceability
2016
[5] A Review of Intrusion Alerts Correlation Frameworks
International Journal of Computer Applications Technology and Research, 2016
[6] Design and Research of Hybrid Network Electronic Forensics Model Based on Cloud Computing
International Journal of Grid and Distributed Computing, 2016
[7] Digital Chain of Custody Quality Assessment
International Journal of Computer Science and Network Security (IJCSNS), 2016
[8] Integrated management model of the corporate digital forensic investigation
Tehnicki vjesnik/Technical Gazette, 2016
[9] Proposta para integração de laboratórios forenses via rede de weblabs.
Thesis, 2016
[10] Digital Forensics Tool Interface Visualization
ProQuest Dissertations Publishing, 2015
[11] Scenario-based design for a cloud forensics portal
Technologies for Homeland Security (HST), 2015 IEEE International Symposium on, 2015
[12] Towards a Built-In Digital Forensics-Aware Framework for Web Services
2015 11th International Conference on Computational Intelligence and Security (CIS), 2015
[13] Forensics-aware web services composition and ranking
iiWAS 2015 Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015
[14] DIGITAL FORENSIC TECHNOLOGIES AS E-FRAUD RISK MITIGATION TOOLS IN THE BANKING INDUSTRY: EVIDENCE FROM ZIMBABWE
RISK GOVERNANCE & CONTROL: Financial markets and institutions, 2014
[15] Detecting Information Leakage Based on Subtracting Matrix
Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on, 2014