Detecting Cyber Crime for Forensic Computer Handling using OSINT
Gespeichert in:
| Titel: | Detecting Cyber Crime for Forensic Computer Handling using OSINT |
|---|---|
| Autoren: | Salza Aulia Fitri, Muhammad Ramadhan, Raffi Ciputra, Ernis Sita Eriana, M.Irham |
| Quelle: | International Journal of Educational and Life Sciences; Vol. 2 No. 12 (2024): December 2024; 1387-1394 ; 3026-2429 ; 10.59890/ijels.v2i12 |
| Verlagsinformationen: | MultiTech Publisher |
| Publikationsjahr: | 2025 |
| Schlagwörter: | Cyber Crime, OSINT, Computer Forensics |
| Beschreibung: | In handling computer forensics with backward chaining, the cybercrime detection expert system serves to detect cybercrime crimes committed by criminals. Problems encountered include how to detect cybercrime crimes committed, articles that correspond to cybercrime crimes committed, and what punishment should be given to cybercrime offenders. This article provides a brief explanation of the meaning of forensics, techniques, and applications with various applications available: This expert system uses observation, interviews, and literature studies. into a system that uses hypertext preprocessor programming (PHP) and MySQL database. The design that uses HTML and CSS during the process of making this system can help in the process of detecting and handling internet violations. to supervise the forensic stove, so as to be able to find out with the type of crime committed easily and cyber crime law. The search results show that live forensic, network forensic, and mobile forensic are the most handled crimes, with a trend topic graph above 10. In contrast, computer and database forensics only have two courses. |
| Publikationsart: | article in journal/newspaper |
| Dateibeschreibung: | application/pdf |
| Sprache: | English |
| Relation: | https://journal.multitechpublisher.com/index.php/ijels/article/view/2788/2785; https://journal.multitechpublisher.com/index.php/ijels/article/view/2788 |
| DOI: | 10.59890/ijels.v2i12.2788 |
| Verfügbarkeit: | https://journal.multitechpublisher.com/index.php/ijels/article/view/2788 https://doi.org/10.59890/ijels.v2i12.2788 |
| Rights: | Copyright (c) 2024 Salza Aulia Fitri, Muhammad Ramadhan, Raffi Ciputra, Ernis Sita Eriana, M.Irham ; https://creativecommons.org/licenses/by/4.0 |
| Dokumentencode: | edsbas.2427723B |
| Datenbank: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://journal.multitechpublisher.com/index.php/ijels/article/view/2788# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Fitri%20SA Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.2427723B RelevancyScore: 1009 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 1009.3056640625 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Detecting Cyber Crime for Forensic Computer Handling using OSINT – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Salza+Aulia+Fitri%22">Salza Aulia Fitri</searchLink><br /><searchLink fieldCode="AR" term="%22Muhammad+Ramadhan%22">Muhammad Ramadhan</searchLink><br /><searchLink fieldCode="AR" term="%22Raffi+Ciputra%22">Raffi Ciputra</searchLink><br /><searchLink fieldCode="AR" term="%22Ernis+Sita+Eriana%22">Ernis Sita Eriana</searchLink><br /><searchLink fieldCode="AR" term="%22M%2EIrham%22">M.Irham</searchLink> – Name: TitleSource Label: Source Group: Src Data: International Journal of Educational and Life Sciences; Vol. 2 No. 12 (2024): December 2024; 1387-1394 ; 3026-2429 ; 10.59890/ijels.v2i12 – Name: Publisher Label: Publisher Information Group: PubInfo Data: MultiTech Publisher – Name: DatePubCY Label: Publication Year Group: Date Data: 2025 – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22Cyber+Crime%22">Cyber Crime</searchLink><br /><searchLink fieldCode="DE" term="%22OSINT%22">OSINT</searchLink><br /><searchLink fieldCode="DE" term="%22Computer+Forensics%22">Computer Forensics</searchLink> – Name: Abstract Label: Description Group: Ab Data: In handling computer forensics with backward chaining, the cybercrime detection expert system serves to detect cybercrime crimes committed by criminals. Problems encountered include how to detect cybercrime crimes committed, articles that correspond to cybercrime crimes committed, and what punishment should be given to cybercrime offenders. This article provides a brief explanation of the meaning of forensics, techniques, and applications with various applications available: This expert system uses observation, interviews, and literature studies. into a system that uses hypertext preprocessor programming (PHP) and MySQL database. The design that uses HTML and CSS during the process of making this system can help in the process of detecting and handling internet violations. to supervise the forensic stove, so as to be able to find out with the type of crime committed easily and cyber crime law. The search results show that live forensic, network forensic, and mobile forensic are the most handled crimes, with a trend topic graph above 10. In contrast, computer and database forensics only have two courses. – Name: TypeDocument Label: Document Type Group: TypDoc Data: article in journal/newspaper – Name: Format Label: File Description Group: SrcInfo Data: application/pdf – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: https://journal.multitechpublisher.com/index.php/ijels/article/view/2788/2785; https://journal.multitechpublisher.com/index.php/ijels/article/view/2788 – Name: DOI Label: DOI Group: ID Data: 10.59890/ijels.v2i12.2788 – Name: URL Label: Availability Group: URL Data: https://journal.multitechpublisher.com/index.php/ijels/article/view/2788<br />https://doi.org/10.59890/ijels.v2i12.2788 – Name: Copyright Label: Rights Group: Cpyrght Data: Copyright (c) 2024 Salza Aulia Fitri, Muhammad Ramadhan, Raffi Ciputra, Ernis Sita Eriana, M.Irham ; https://creativecommons.org/licenses/by/4.0 – Name: AN Label: Accession Number Group: ID Data: edsbas.2427723B |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.2427723B |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.59890/ijels.v2i12.2788 Languages: – Text: English Subjects: – SubjectFull: Cyber Crime Type: general – SubjectFull: OSINT Type: general – SubjectFull: Computer Forensics Type: general Titles: – TitleFull: Detecting Cyber Crime for Forensic Computer Handling using OSINT Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Salza Aulia Fitri – PersonEntity: Name: NameFull: Muhammad Ramadhan – PersonEntity: Name: NameFull: Raffi Ciputra – PersonEntity: Name: NameFull: Ernis Sita Eriana – PersonEntity: Name: NameFull: M.Irham IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2025 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: International Journal of Educational and Life Sciences; Vol. 2 No. 12 (2024): December 2024; 1387-1394 ; 3026-2429 ; 10.59890/ijels.v2i12 Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science