Acknowledgement
This paper was supported by 2023 Baekseok University Research Fund
References
- H.J.Seong, J.H.Jung, K.R.Park and S.J.Cho, "Research Trends in Vehicle Digital Forensics Focused on Infotainment Systems and Mobile Devices," Journal of KIISE, Vol.41, No.1, pp.38-45, 2023.
- J.O.Lee and T.S.Shin, "Forensics for Android and Linux-based file system on IoT platform," Journal of Digital Contents Society, Vol.23, No.2, pp.335-342, 2023. https://doi.org/10.9728/dcs.2023.24.2.335
- W.K.Jung and S.J.Lee, "Measures to maintain the admissibility of evidence for taking over digital evidence in accordance with the adjustment of the police.prosecution investigation authority," Journal of Digital Forensics, Vol.16, No.2, pp.126-141, 2022. https://doi.org/10.22798/KDFS.2022.16.2.126
- H.J.Jung and S.J.Lee, "Digital forensic technology trends in the Internet of Things era," Journal of KIISE, Vol.38, No.9, pp.33-39, 2020.
- S.B.Suhaili, C.C.A.Niam, Z.M.Zainn and N.Julai, "Design and Implementation of MD5 Hash Function Algorithm Using Verilog HDL," Proceedings of the 12th National Technical Seminar on Unmanned System Technology 2020, Vol.770, pp.499-510, 2021.
- U.Kumar and V.C.Venkaiah, "A New Modified MD5-224 Bits Hash Function and an Efficient Message Authentication Code Based on Quasigroups," Cyber Security, Privacy and Networking, Vol.370, 2022.
- F.Zhai, P.Tao, B.Xu, X.Liang and Y.Cao, "Research and System Design of Remote Comparison Method for Embedded Device Files," 2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE). pp.137-141, 2022.
- M.Ali, A.Ismail, H.Elgohary, S.Darwish and S.Mesbah, "A Procedure for Tracing Chain of Custody in Digital Image Forensics: A Paradigm Based on Grey Hash and Blockchain," Symmetry, Vol.14 No.2, pp.344, 2022.
- Z.Wang, X.Dong, Y.Kang and H.Chen, "Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages," The Journal of Supercomputing, Vol.79, pp.2332-2355, 2022.
- E.A.Adeniy, P.B.Falola, M.S.Maashi, M.Aljebreen and S.Bharany," Information, Vol.13, No.10, pp.442, 2022.
- M.Yang, Y.Zhang, B.Yang, H.Wang, S.Yin, S.Wei, L.Liu, "A SHA-512 Hardware Implementation Based on Block RAM Storage Structure," 2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), pp.132-135, 2022.
- D.P.Purba, "Analisa Dan Perbandingan Algoritma Whirpool Dan Sha-512 Dalam Penyandian Data Gambar," Bulletin of Artificial Intelligence, Vol.1, No.1, pp.8-12, 2022. https://doi.org/10.62866/buai.v1i1.2
- H.S.Lee, "A Prediction-Based Data Read Ahead Policy using Decision Tree for improving the performance of NAND flash memory based storage devices," The Korea Internet of Things Society, Vol.8, No.4, pp.9-15, 2022.
- H.S.Lee, "A Safety IO Throttling Method Inducting Differential End of Life to Improving the Reliability of Big Data Maintenance in the SSD based RAID," The Society of Digital Policy & Management, Vol.20, No.5, pp.593-598, 2022.
- H.S.Lee, "Performance analysis and prediction through various over-provision on NAND flash memory based storage," The Society of Digital Policy & Management, Vol.20, No.3, pp.343-348, 2022.
- H.S.Lee, "A method for optimizing lifetime prediction of a storage device using the frequency of occurrence of defects in NAND flash memory," The Korea Internet of Things Society, Vol.7, No.4, pp.9-14, 2021.