[41] Al-Hadadi, M., AlShidhani, A. 2013. Smartphone forensics analysis: A case study.
International Journal of Computer and Electrical Engineering, 5(6), 576.
[42] Garfinkel, S. L. 2013. Digital media triage with bulk data analysis and bulk_extractor.
Computers & Security, 32, 56–72.
[43] Van De Wiel, E., Scanlon, M., Le-Khac, N. A., 2018, January. Enabling non-expert analysis of
large volumes of intercepted network traffic. In IFIP International Conference on Digital
Forensics,183–197, Springer, Cham.
[44] Neware, R. 2017. Computer forensics for private web browsing of UC browser. IOSR Journal of
Computer Engineering (IOSR-JCE), 19(4), 56–60.
[45] Cohen, C. L. 2007. Growing challenge of computer forensics. Police Chief, 74(3), 24.
[46] Liu, H., Azadegan, S., Yu, W., Acharya, S., Sistani, A. 2012. Are we Relying too much on
Forensics Tools? In: Lee R. (ed.) Software Engineering Research, Management and
Applications 2011. Springer, Berlin, Heidelberg, 145–156.
[47] Taylor, T., Araujo, F., Kohlbrenner, A., Stoecklin, M. P., 2018, June. Hidden in plain sight:
Filesystem view separation for data integrity and deception. In International Conference on
Detection of Intrusions and Malware, and Vulnerability Assessment, 256–278, Springer,
Cham.
[48] Savoldi, A., Gubian, P., Echizen, I., 2010, January. Uncertainty in live forensics. In IFIP
International Conference on Digital Forensics,171–184, Springer, Berlin, Heidelberg.
[49] Wang, P., Rosenberg, M., D’Cruze, H. 2018. Integration of Mobile Forensic Tool Capabilities.
In: Shahram Latifi (ed.) Information Technology-New Generations. Springer, Cham, 81– 87.
[50] Davidoff, S., Ham, J. 2012. Network Forensics: Tracking Hackers Through
Cyberspace, Vol. 2014, Prentice hall, Upper Saddle River.
[51] Umair, A., Nanda, P., He, X., 2017. Online social network information forensics: A survey on
use of various tools and determining how cautious facebook users are? In 2017 IEEE
Trustcom/BigDataSE/ICESS, 1139–1144, IEEE.
[52] Meghanathan, N., Allam, S. R., Moore, L. A., 2010. Tools and techniques for network
forensics. arXiv preprint arXiv:1004.0570.
[53] Azadegan, S., Yu, W., Liu, H., Sistani, M., Acharya, S., 2012, January. Novel anti-forensics
approaches for smart phones. In 2012 45th Hawaii International Conference on System
Sciences, 5424–5431, IEEE.
[54] Talib, M. A., Alnanih, R., Khelifi, A. 2020. Application of quality in use model to assess the
user experience of open source digital forensics tools. International Journal of Electronic
Security and Digital Forensics, 12(1), 43– 76.
[55] Umar, R., Riadi, I., Zamroni, G. M. 2018. Mobile forensic tools evaluation for digital crime
investigation. International Journal of Advance Science Engineering Information Technology,
8(3), 949.
[56] Li, S., Choo, K. K. R., Sun, Q., Buchanan, W. J., Cao, J. 2019. IoT forensics: Amazon Echo as a
use case. IEEE Internet of Things Journal, 6(4), 6487–6497.
[57] Ogden, R. 2008. Fisheries forensics: the use of DNA tools for improving compliance,
traceability, and enforcement in the fishing industry. Fish and Fisheries, 9(4), 462–472.
[58] Shrivastava, G., Sharma, K., Khari, M., Zohora, S. E. 2018. Role of Cyber Security and Cyber
Forensics in India. In: Gulshan Shrivastava, Prabhat Kumar, B. B. Gupta, Suman Bala and
Nilanjan Dey (eds.) Handbook of Research on Network Forensics and Analysis Techniques. IGI
Global, 143–161.
[59] Shrivastava, G., Peng, S. L., Bansal, H., Sharma, K., Sharma, M. eds. 2020. New Age
Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling,
Apple Academic Press, New York.
A survey of popular digital forensic tools25