2022
DOI: 10.1007/s11227-021-04172-x
|View full text |Cite
|
Sign up to set email alerts
|

Manipulating cyber army in pilot case forensics on social media

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…However, in areas with highly dynamic digital infrastructure, new media (such as Facebook, Instagram, snapchat twitter and cloud data) and hardware, such solid-state drives, are completely distinct from traditional media and devices. The tool or technique that worked well on one type of hard drive may not work at all well on another model [30][31][32]. Additionally, the investigative work done in digital forensics is incredibly dependent on the tools needed and required to interpret binary data.…”
Section: Erroneousmentioning
confidence: 99%
“…However, in areas with highly dynamic digital infrastructure, new media (such as Facebook, Instagram, snapchat twitter and cloud data) and hardware, such solid-state drives, are completely distinct from traditional media and devices. The tool or technique that worked well on one type of hard drive may not work at all well on another model [30][31][32]. Additionally, the investigative work done in digital forensics is incredibly dependent on the tools needed and required to interpret binary data.…”
Section: Erroneousmentioning
confidence: 99%
“…Modern societies depend on reliable secure cloud computing for a wide range of critical functions, including education through virtual learning environments [3][4][5] and health care [6][7][8], both for classical health care topics, such as heart health [9], as well as newly emerging diseases, such as Covid-19 [10][11][12][13]. Moreover, the influence that social media exert on people in conjunction with advanced cloud computing models enable sophisticated cyber influence campaigns for a wide range of purposes, ranging from public health awareness to military conflicts [14][15][16][17][18]. Also, the ongoing roll-out of fifth generation wireless systems (5G) will enable a new range of use cases that require low-latency communication and compute processing [19,20], e.g.…”
Section: Introductionmentioning
confidence: 99%