{"id":"https://openalex.org/W4385816185","doi":"https://doi.org/10.1145/3592307.3592328","title":"A Literature Review on the Various Trends of Digital Forensics Usage in Combating Cybercrimes","display_name":"A Literature Review on the Various Trends of Digital Forensics Usage in Combating Cybercrimes","publication_year":2023,"publication_date":"2023-03-24","ids":{"openalex":"https://openalex.org/W4385816185","doi":"https://doi.org/10.1145/3592307.3592328"},"language":"en","primary_location":{"id":"doi:10.1145/3592307.3592328","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3592307.3592328","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027459129","display_name":"Eric Blancaflor","orcid":"https://orcid.org/0000-0002-7189-3040"},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":true,"raw_author_name":"Eric Blancaflor","raw_affiliation_strings":["School of I.T., Mapua University, Philippines"],"raw_orcid":"https://orcid.org/0000-0002-7189-3040","affiliations":[{"raw_affiliation_string":"School of I.T., Mapua University, Philippines","institution_ids":["https://openalex.org/I137967721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092638251","display_name":"Joseph Anthony T. Arpilleda","orcid":"https://orcid.org/0000-0003-3941-0579"},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Joseph Anthony Arpilleda","raw_affiliation_strings":["School of I.T., Mapua University, Philippines"],"raw_orcid":"https://orcid.org/0000-0003-3941-0579","affiliations":[{"raw_affiliation_string":"School of I.T., Mapua University, Philippines","institution_ids":["https://openalex.org/I137967721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048877075","display_name":"Adam Ulric Garcia","orcid":"https://orcid.org/0009-0006-2240-0656"},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Adam Ulric Garcia","raw_affiliation_strings":["School of I.T., Mapua University, Philippines"],"raw_orcid":"https://orcid.org/0009-0006-2240-0656","affiliations":[{"raw_affiliation_string":"School of I.T., Mapua University, Philippines","institution_ids":["https://openalex.org/I137967721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092638252","display_name":"Justin Angelo Monasterial","orcid":"https://orcid.org/0009-0001-8414-8592"},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Justin Angelo Monasterial","raw_affiliation_strings":["School of I.T., Mapua University, Philippines"],"raw_orcid":"https://orcid.org/0009-0001-8414-8592","affiliations":[{"raw_affiliation_string":"School of I.T., Mapua University, Philippines","institution_ids":["https://openalex.org/I137967721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092638253","display_name":"Romeo Robert R. Sulit","orcid":"https://orcid.org/0000-0001-9486-9257"},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Romeo Robert Sulit","raw_affiliation_strings":["School of I.T., Mapua University, Philippines"],"raw_orcid":"https://orcid.org/0000-0001-9486-9257","affiliations":[{"raw_affiliation_string":"School of I.T., Mapua University, Philippines","institution_ids":["https://openalex.org/I137967721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5027459129"],"corresponding_institution_ids":["https://openalex.org/I137967721"],"apc_list":null,"apc_paid":null,"fwci":0.4484,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67938177,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"132","last_page":"138"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.9014215469360352},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.8003700971603394},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6471663117408752},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6254503726959229},{"id":"https://openalex.org/keywords/cyber-crime","display_name":"Cyber crime","score":0.5719566345214844},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.570915699005127},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.5623074769973755},{"id":"https://openalex.org/keywords/damages","display_name":"Damages","score":0.5614622831344604},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5508831739425659},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5407147407531738},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.5308440923690796},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.47745874524116516},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4519587755203247},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45076900720596313},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.4426397979259491},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4400532841682434},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22463145852088928},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.09603181481361389},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08960890769958496}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.9014215469360352},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.8003700971603394},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6471663117408752},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6254503726959229},{"id":"https://openalex.org/C2989129637","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cyber crime","level":3,"score":0.5719566345214844},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.570915699005127},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.5623074769973755},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.5614622831344604},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5508831739425659},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5407147407531738},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.5308440923690796},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47745874524116516},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4519587755203247},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45076900720596313},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.4426397979259491},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4400532841682434},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22463145852088928},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.09603181481361389},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08960890769958496},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3592307.3592328","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3592307.3592328","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W117869092","https://openalex.org/W1996767106","https://openalex.org/W2041407017","https://openalex.org/W2110760901","https://openalex.org/W2166059863","https://openalex.org/W2400381163","https://openalex.org/W2955798923","https://openalex.org/W2961414252","https://openalex.org/W3018602826","https://openalex.org/W3091920973","https://openalex.org/W4212798336","https://openalex.org/W6765956539"],"related_works":["https://openalex.org/W3006110715","https://openalex.org/W4312338404","https://openalex.org/W3090832836","https://openalex.org/W2304095548","https://openalex.org/W2961202638","https://openalex.org/W2883757844","https://openalex.org/W4242080468","https://openalex.org/W2490674191","https://openalex.org/W3000838006","https://openalex.org/W354740698"],"abstract_inverted_index":{"Different":[0],"cybercrimes":[1],"have":[2,26],"been":[3],"identified":[4],"with":[5,46],"instances":[6],"of":[7,12,24,48,95,104],"ransomware,":[8],"online":[9,51],"scams,":[10],"Denial":[11],"Service":[13],"(DoS)":[14],"and":[15,61,87,124,136,144,148,160],"many":[16],"more.":[17],"Wherein":[18],"in":[19,92],"the":[20,36,42,93,102,111,128,163],"present,":[21],"a":[22,134],"variety":[23],"solutions":[25],"also":[27],"emerged":[28],"to":[29,32,71,100,107,156],"be":[30,90,154],"able":[31,155],"combat":[33],"cybercrime.":[34],"In":[35],"Philippines,":[37,129],"cybercrime":[38,109],"has":[39],"increased":[40],"throughout":[41,162],"past":[43],"few":[44],"years":[45],"most":[47],"them":[49],"being":[50],"scams.":[52],"Digital":[53],"forensics":[54,106,117],"focuses":[55],"on":[56,63],"locating,":[57],"acquiring,":[58],"processing,":[59],"analyzing,":[60],"reporting":[62],"electronically":[64],"stored":[65],"data.":[66],"Its":[67],"main":[68],"goal":[69],"is":[70,133],"extract":[72],"data":[73],"from":[74],"different":[75,112],"devices":[76],"such":[77,118],"as":[78,119],"computers":[79],"or":[80],"smartphones,":[81],"process":[82],"it":[83],"into":[84],"actionable":[85],"intelligence,":[86],"can":[88],"then":[89],"used":[91],"court":[94],"law.":[96],"The":[97],"researchers":[98],"aim":[99],"know":[101],"effectiveness":[103],"digital":[105,116],"fight":[108],"using":[110],"emerging":[113],"trends":[114],"regarding":[115],"cloud,":[120],"social":[121],"media,":[122],"IoT,":[123],"network":[125],"forensics.":[126],"For":[127],"having":[130],"sufficient":[131],"infrastructure":[132],"possible":[135,158],"rational":[137],"solution":[138],"since":[139],"globally,":[140],"technology":[141],"keeps":[142],"evolving":[143],"so":[145],"do":[146],"cyber-attacks":[147],"crimes.":[149],"With":[150],"this,":[151],"one":[152],"may":[153],"mitigate":[157],"attacks":[159],"damages":[161],"country.":[164]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
