“…Memory forensic techniques increase day by day from a string search to deep search, memory structural analysis, operating systems analysis, etc. Several researchers worked on different technologies of computer forensics such as: memory forensics [32], [33], [34], [35], [36], volatile memory [35], [37], [38], [39], [40], [41], log forensics [42], [43], [44], [45], [46], [47], operating system [48], [49], [50], [51], [52], [53] etc. Table 2 presents the literature review of current research work in the areas of memory forensics, computer forensics, IoT forensics, and log forensics.…”