2023
DOI: 10.1007/978-3-031-21199-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Database Forensics Field and Children Crimes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…It aids in creating models and solutions that incorporate modeling and analysis [9,60,61]. It is a powerful research methodology that combines theory and practice to create and evaluate innovative artifacts or systems [62]. By associating problem definition, design, evaluation, and implementation, researchers can address real-world challenges and contribute to technological advancements.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…It aids in creating models and solutions that incorporate modeling and analysis [9,60,61]. It is a powerful research methodology that combines theory and practice to create and evaluate innovative artifacts or systems [62]. By associating problem definition, design, evaluation, and implementation, researchers can address real-world challenges and contribute to technological advancements.…”
Section: Methodsmentioning
confidence: 99%
“…Various studies have been reported that investigate and recognize cybercrime [22,[31][32][33][34][35][36][37][38][39][40], data cracks [23,[41][42][43][44][45][46][47][48][49][50], and other digital risks [24,25,[41][42][43][44][45][46][47][48][49][50][51][52][53][54][55][56][57][58].…”
Section: A Related Workmentioning
confidence: 99%
“…A metamodeling approach was used to develop the detection and investigation model for network forensics. A metamodeling approach can be described as a nonlinear iterative process used to construct a high-level model that organizes and structures diverse domains at a higher level of abstraction [15,70]. In the first step, relevant network forensic…”
Section: Wwwetasrcom Alansari: a Detection And Investigation Model Fo...mentioning
confidence: 99%
“…Security techniques, models, frameworks, procedures, policies, and processes have been proposed in several fields. These include database systems (Al-Dhaqm et al, 2023b), networks, robotics (Mohammed et al, 2021), prevent cyberbullying (Yafooz et al, 2023), wireless networks (Onwuegbuzie et al, 2022;Al-dhaqm et al, 2013) cloud security (Al-Mugerrn et al, 2023;Zubair et al, 2022), the internet of vehicles, IoT (Saleh et al, 2023), UAV field and mobile field (Yahya et al, 2023), medical field (Qureshi et al, 2022;Ngadi et al, 2012;Onwuegbuzie et al, 2020;Abd Razak et al, 2020;Altowayti et al, 2022;Rasool et al, 2022;Mohammed et al, 2022;Onwuegbuzie et al, 2021;Bakhtiari and Al-dhaqm, 2012).…”
Section: Introductionmentioning
confidence: 99%
“…Database crimes increase daily, threatening privacy, integrity, and accessibility (Al-Dhaqm et al, 2023b). It is therefore essential to have a database forensics field that investigates who is the criminal when the crimes occur, and how they occurred (Salem et al, 2023).…”
Section: Introductionmentioning
confidence: 99%