Most Popular Papers *
Towards a More Representative Definition of Cyber Security
Daniel Schatz, Rabih Bashroush, and Julie Wall
Computer Crimes: A Case Study of What Malaysia Can Learn from Others?
Janaletchumi Appudurai and Chitra L. Ramalingam
Leveraging the Windows Amcache.hve File in Forensic Investigations
Bhupendra Singh and Upasna Singh
Drone Forensic Analysis Using Open Source Tools
M A Hannan Bin Azhar, Thomas Edward Allen Barton, and Tasmina Islam
Protecting Digital Evidence Integrity and Preserving Chain of Custody
Makhdoom Syed Muhammad Baqir Shah, Shahzad Saleem, and Roha Zulqarnain
Automated Man-in-the-Middle Attack Against Wi‑Fi Networks
Martin Vondráček, Jan Pluskal, and Ondřej Ryšavý
Digital Forensic Readiness in Organizations: Issues and Challenges
Nickson menza Karie 275404 and Simon Maina Karume Dr.
Electronic Voting Service Using Block-Chain
Kibin Lee, Joshua I. James, Tekachew G. Ejeta, and Hyoung J. Kim
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 05/31/19.