This module is a resource for lecturers

Advanced reading

The following readings are recommended for those interested in exploring the topics covered in this Module in more detail:

  • Alavrez, Karolina and Masooda Bashir. (2015). Exploring the Effectiveness of Digital Forensics Tools on the Sony PlayStation Vita. In: Joshua I. James and Frank Breitinger, eds. 7th International Conference on Digital forensics and Cyber Crime, Selected Conference Papers (Seoul, South Korea, 6-8 October 2015).
  • Antwi-Boasiako, Albert and Hein Venter. (2017). A Model for Digital Evidence Admissibility Assessment. In: G. Peterson and S. Shenoi. (eds.). Advances in Digital Forensics (pp. 23-38). Springer.
  • Barmpatsalou, Konstantia, Dimitrios Damopoulos, Georgios Kambourakis, and Vasilios Katos. (2013). A critical review of 7 years of Mobile Device Forensics. Digital Investigation, Vol. 10(4), 323-349.
  • Burke, Paul and Philip Craiger. (2007). Forensic Analysis of Xbox Consoles. Advances in Digital Forensics III: IFIP International Conference on Digital Forensics (pp. 269-280).
  • Eden, Peter, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, High Soulsby, and Kristin Stoddart. (2015). A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure. 10th International Conference, Critical Information Infrastructure Security (CRITIS), Berlin, Germany (pp. 27-39).
  • Joshi, R. C. and Pilli, Emmanuel S. (2016). Fundamentals of Network Forensics: A Research Perspective. Springer.
  • Pieterse, Heloise and Martin Olivier. (2014). Smartphones as Distributed Witnesses for Digital Forensics. Advances in Digital Forensics X: IFIP International Conference on Digital Forensics (pp. 237-251).
  • Quick, Darren and Kim-Kwang Raymond Choo. (2017). Pervasive social networking forensics: Intelligence and evidence from mobile device extracts. Journal of Network and Computer Applications, Vol. 86, 24-33.
  • Sommer, Peter. (2018). Accrediting digital forensics. Digital Investigation, Vol. 25, 116-120.
  • Suleman, Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Muhammad Shiraz, and Iftikhar Ahmad. (2016). Network forensics: Review, taxonomy, and open challenges. Journal of Network and Computer Applications 66, 214-235.
  • UK Crown Prosecution Service. (n.d.). Cybercrime - prosecution guidance .
Next: Student assessment
Back to top