Forensic investigation framework for cryptocurrency wallet in the end device

[1]  Doowon Jeong,et al.  A reference database of Windows artifacts for file‐wiping tool execution analysis , 2023, Journal of forensic sciences.

[2]  W. Buchanan,et al.  A framework for live host-based Bitcoin wallet forensics and triage , 2023, Forensic Sci. Int. Digit. Investig..

[3]  Mohammad Meraj Mirza,et al.  Mobile Cyber Forensic Investigations of Web3 Wallets on Android and iOS , 2022, Applied Sciences.

[4]  Yanyan Zhuang,et al.  Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files , 2022, 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC).

[5]  Cheman Shaik Securing Cryptocurrency Wallet Seed Phrase Digitally with Blind Key Encryption , 2020, International Journal on Cryptography and Information Security.

[6]  Saru Kumari,et al.  Supervised learning model for identifying illegal activities in Bitcoin , 2020, Appl. Intell..

[7]  Nickson M. Karie,et al.  Cursory View of IoT-Forensic Readiness Framework Based on ISO/IEC 27043 Recommendations , 2020, International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020).

[8]  Tyler Thomas,et al.  Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets - A Tool and Visualization Framework , 2020, Digit. Investig..

[9]  Nhien-An Le-Khac,et al.  Forensic analysis of privacy-oriented cryptocurrencies , 2020, Digit. Investig..

[10]  Kim-Kwang Raymond Choo,et al.  An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems , 2019, IEEE Access.

[11]  Kristopher McKay Duffin,et al.  The use of cryptocurrencies in the money laundering process , 2019, Journal of Money Laundering Control.

[12]  Md. Mahin,et al.  Digital Forensic Investigation Framework for Internet of Things (IoT): A Comprehensive Approach , 2019, 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT).

[13]  Kim-Kwang Raymond Choo,et al.  Cracking Bitcoin wallets: I want what you have in the wallets , 2019, Future Gener. Comput. Syst..

[14]  Kim-Kwang Raymond Choo,et al.  Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core , 2017, IEEE Access.

[15]  Ranko Petrović,et al.  ISO/IEC 27043:2015 — Role and application , 2016, 2016 24th Telecommunications Forum (TELFOR).

[16]  Indrakshi Ray,et al.  A Generic Digital Forensic Investigation Framework for Internet of Things (IoT) , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[17]  James Caverlee,et al.  The Deep Web and the Darknet: A Look Inside the Internet's Massive Black Box , 2015 .

[18]  Leyla Bilge,et al.  Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.

[19]  Narasimha Shashidhar,et al.  Digital Forensic Analysis on Prefetch Files , 2015 .

[20]  Upasna Singh,et al.  Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability , 2018, Comput. Secur..

[21]  Daniel Davis Wood ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .