[1]
Casino, Fran, et al. "Research trends, challenges, and emerging topics in digital forensics: A review of reviews." IEEE Access 10 (2022): 25464-25493.
DOI: 10.1109/access.2022.3154059
Google Scholar
[2]
Javed, Abdul Rehman, et al. "A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions." IEEE Access 10 (2022): 11065-11089.
DOI: 10.1109/access.2022.3142508
Google Scholar
[3]
Schneider, Janine. On the Trustworthiness of Digital Evidence and How It Can Be Established. Diss. Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2023.
Google Scholar
[4]
Sabatino, Jack M. "The Appellate Digital Deluge: Addressing Challenges for Appellate Review Posed by the Rising Tide of Video and Audio Recording Evidence." Temp. L. Rev. 96 (2023): 11.
Google Scholar
[5]
Regehr, Cheryl, and Ann Wolbert Burgess. Victims of Cybercrime. Sudbury, 2010.
Google Scholar
[6]
Abd Zaid, Mustafa M., Ahmed Ali Talib Al-Khazaali, and Ahmed Abed Mohammed. "LSB Steganography using Dual Layer for Text Crypto-Stego." BIO Web of Conferences. Vol. 97. EDP Sciences, 2024.
DOI: 10.1051/bioconf/20249700069
Google Scholar
[7]
Rasjid, Zulfany Erlisa, et al. "A review of collisions in cryptographic hash function used in digital forensic tools." Procedia computer science 116 (2017): 381-392.
DOI: 10.1016/j.procs.2017.10.072
Google Scholar
[8]
Almotiri, Smah Doeban. "Forensic hash value guidelines: Why md5 and sha1 should no longer be used and a recommendation for their replacement." (2022).
Google Scholar
[9]
Schmitt, Veronica, and Jason Jordaan. "Establishing the validity of MD5 and SHA-1 hashing in digital forensic practice in light of recent research demonstrating cryptographic weaknesses in these algorithms." International Journal of Computer Applications 68.23 (2013).
DOI: 10.5120/11723-7433
Google Scholar
[10]
Kessler, Gary C. "The impact of MD5 file hash collisions on digital forensic imaging." Journal of digital forensics, security and law 11.4 (2016): 9.
DOI: 10.15394/jdfsl.2016.1431
Google Scholar
[11]
Rasjid, Zulfany Erlisa, et al. "A review of collisions in cryptographic hash function used in digital forensic tools." Procedia computer science 116 (2017): 381-392.
DOI: 10.1016/j.procs.2017.10.072
Google Scholar
[12]
Faiz, Muhammad Nur. "Comparative Analysis of Cloning-Hashing Applications for Securing Digital Evidence." Infotekmesin 14.2 (2023): 214-220.
DOI: 10.35970/infotekmesin.v14i2.1844
Google Scholar
[13]
Danker, Shira, Rick Ayers, and Richard P. Mislan. "Hashing techniques for mobile device forensics." Stress 6.4f16334e774b5c (2009): 77bebd7fb998797dd.
Google Scholar
[14]
Pradeep, K. C., Rajashree Soman, and Prasad Honnavalli. "Validity of Forensic Evidence using Hash Function." 2020 5th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2020.
DOI: 10.1109/icces48766.2020.9138061
Google Scholar
[15]
Sivaprasad, Abirami, and Smita Jangale. "A complete study on tools & techniques for digital forensic analysis." 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET). IEEE, 2012.
DOI: 10.1109/icceet.2012.6203877
Google Scholar
[16]
Shahrin, M. (n.d.). What is digital forensics? Medium. Retrieved November 30, 2024, from https://medium.com/@mahbuba.shahrin/what-is-digital-forensics-e20957a002e4
Google Scholar
[17]
Kumar, K. Kranthi, et al. "Role of MD5 message-digest algorithm for providing security to low-power devices." 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2022.
DOI: 10.1109/iciccs53718.2022.9788249
Google Scholar
[18]
Pittalia, Prashant P. "A comparative study of hash algorithms in cryptography." International Journal of Computer Science and Mobile Computing 8.6 (2019): 147-152.
Google Scholar
[19]
Ali, Ammar Mohammed, and Alaa Kadhim Farhan. "A novel improvement with an effective expansion to enhance the MD5 hash function for verification of a secure E-document." IEEE Access 8 (2020): 80290-80304.
DOI: 10.1109/access.2020.2989050
Google Scholar
[20]
Maetouq, Ali, et al. "Comparison of hash function algorithms against attacks: A review." International Journal of Advanced Computer Science and Applications 9.8 (2018).
Google Scholar
[21]
Pradeep, K. C., Rajashree Soman, and Prasad Honnavalli. "Validity of Forensic Evidence using Hash Function." 2020 5th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2020.
DOI: 10.1109/icces48766.2020.9138061
Google Scholar
[22]
Wang, Xiaoyun, et al. "Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD." Cryptology ePrint Archive (2004).
Google Scholar
[23]
Rasjid, Zulfany Erlisa, et al. "A review of collisions in cryptographic hash function used in digital forensic tools." Procedia computer science 116 (2017): 381-392.
DOI: 10.1016/j.procs.2017.10.072
Google Scholar
[24]
Wang, Xiaoyun, and Hongbo Yu. "How to break MD5 and other hash functions." Annual international conference on the theory and applications of cryptographic techniques. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005.
Google Scholar
[25]
Liang, Jie, and Xue-Jia Lai. "Improved collision attack on hash function MD5." Journal of Computer Science and Technology 22.1 (2007): 79-87.
DOI: 10.1007/s11390-007-9010-1
Google Scholar
[26]
Buncle, James. "MD5 HASHING IN DIGITAL FORENSICS." (2009).
Google Scholar
[27]
Kale, A. M., and Shrikant Dhamdhere. "Survey paper on different type of hashing algorithm." International Journal of Advance Scientific Research Algorithm 3.2 (2018).
Google Scholar