[1.] Y. Kim and K. J. Kim, “A Forensic Model on DeletedFile Verification for Securing Digital Evidence”. 978—14244-5493-8710 IEEE, 2010.

[2.] D. Chang, S. K. Sanadhya, M. Singh. “Security Analysis of MVHASH-B Similarity Hashing”. Journal of Digital Forensics, Security and Law, JDFSL, Vol. 11, No. 2, pp. 21-34, 2015.

[3.] Montasari, Reza & Hill, Richard. (2019). Next- Generation Digital Forensics: Challenges and Future Paradigms. 205-212. 10.1109/ICGS3.2019.8688020.

[4.] “Crime scene and physical evidence awareness for non-forensic personnel,” United Nations Office on

Drugs and Crime, 2009. Accessedon: Sep.3, 2019. [Online].

[5.] T. F. Kiely. ”Forensic evidence: science and the criminal law,” CRC Press, 2005.

[6.] J. Sachowski, “Understanding Digital Forensic Readiness,” Implementing Digital Forensic Readiness, pp. 80–86, 2019.

[7.] Shrivastava, Gulshan & Sharma, Kavita & Kumari, Reema. (2016). Network Forensics: Today and Tomorrow.

Template Design © VibeThemes. All rights reserved.