[1]
M. H. Abdussalam and R. R. Sadewa, “Dataset Protocol and Evidence Preservation for Detecting Cyber Incident Screenshot Manipulation: Data Structure, Tamper Recipes, and Chain of Custody”, esaprom, vol. 5, no. 02, pp. 337–346, Feb. 2026.