•  
  •  
 

Most Popular Papers *

PDF

Towards a More Representative Definition of Cyber Security
Daniel Schatz, Rabih Bashroush, and Julie Wall

PDF

Computer Crimes: A Case Study of What Malaysia Can Learn from Others?
Janaletchumi Appudurai and Chitra L. Ramalingam

PDF

Chip-off Success Rate Analysis Comparing Temperature and Chip Type
Choli Ence, Joan Runs Through, and Gary D. Cantrell

PDF

Forensic Analysis of a Crash-Damaged Cheerson CX-20 Auto Pathfinder Drone
Ian N. McAteer, Peter Hannay, Muhammad I. Malik, and Zubair Baig

PDF

Drone Forensic Analysis Using Open Source Tools
M A Hannan Bin Azhar, Thomas Edward Allen Barton, and Tasmina Islam

PDF

Protecting Digital Evidence Integrity and Preserving Chain of Custody
Makhdoom Syed Muhammad Baqir Shah, Shahzad Saleem, and Roha Zulqarnain

PDF

Signatures of Viber Security Traffic
M.A.K. Sudozai, N. Habib, S. Saleem, and A.A. Khan

PDF

Automated Man-in-the-Middle Attack Against Wi‑Fi Networks
Martin Vondráček, Jan Pluskal, and Ondřej Ryšavý

* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 03/08/19.