Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Survey on current Digital forensic practices

Divith Devaiah M.M , Prakash B Metre , , ,
Acharya Doctor Sarvepalli Radhakrishnan Rd, Bengaluru, Karnataka 560107,
:10.22362/ijcert/2017/v4/i5/xxxx [UNDER PROCESS]

Cyber-crimes are taking over the world like a breeze. For every crimes committed around the globe, one or the other form of computer or any electronic device is used. So every crime can be linked as cyber-crime. To investigate these crimes, a cost friendly and easily available forensic device is required, which helps in collecting, analyzing and preserving data from which results can be extracted. This paper illuminates all the practices that are currently in place and also clarifies the effects of vulnerabilities.

Divith Devaiah M.M, “Survey on current Digital forensic practices”, International Journal of Computer Engineering In Research Trends, 4(5):180-184 ,May -2017

Keywords : : Cyber Crimes, Cyber Criminal, Forensic, Forensic tools, Vulnerability, Criminology, agile tool.

1.	Malek Harbawi and Asaf Varol, “The Role of Digital Forensics in Combating Cybercrimes”.
2.	M. Al Fahdi, N.L. Clarke and S.M. Furnell, “Challenges to Digital Forensics: A survey of researchers & practitioners attitudes and opinions.
3.	B.Skaggs, B. Blackburn, G. Manes, S. Shenoi, “Network Vulnerability Analysis”.
4.	Prashant S. Shinde and Prof. Shrikant B. Ardhapurkar, “Cyber Security Analysis using Vulnerability Assessment and penetration Testing”.
5.	Abirami Sivaprasad and Smita Jangale, “A Complete study on Tools and Techniques for digital Forensic Analysis”.
6.	Andrw Jones and Stilianos Vidalis and Nasser Abouzakhar, “Information Security and digital forensics in the world of cyber physical systems”.
7.	Arun V. Sathanur and David J. Haglin, “A novel centrality Measure for network-wide cyber vulnerability assessment”.
8.	Arni Ariani, John Lewis and Pradeep K. Ray, “The vulnerability assessment for Emergency response Plans”.
9.	C.Balan, Dija S, Divya S, VIdyadharan, “The need to adopt agile methodology in the development of cyber forensic tools”.
10.	S.Al Sharif, F.Iqbal,T.Baker and A. Marrington, “Magec:An image searching tool for detecting forged images in forensic investigation”.
11.	Noble Kumari and A.K Mohapatra, “An insight into digital forensics branches and tools”.
12.	Simson L Garfinkel and Nicole Beebe, Lishu liu, “Detecting Threatening insiders with lightweight media forensics”.

DOI Link : Not yet assigned

Download :

Refbacks : There are currently no refbacks

Support Us

We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.

Quick Links


Science Central

Score: 13.30

Submit your paper to