Most Popular Papers *
Computer Crimes: A Case Study of What Malaysia Can Learn from Others?
Janaletchumi Appudurai and Chitra L. Ramalingam
Towards a More Representative Definition of Cyber Security
Daniel Schatz, Rabih Bashroush, and Julie Wall
Leveraging the Windows Amcache.hve File in Forensic Investigations
Bhupendra Singh and Upasna Singh
Possession of Child Exploitation Material in Computer Temporary Internet Cache
Sungmi Park, Yunsik Jake Jang, and Joshua I. James
Protecting Digital Evidence Integrity and Preserving Chain of Custody
Makhdoom Syed Muhammad Baqir Shah, Shahzad Saleem, and Roha Zulqarnain
Analysis of Security in Big Data Related to Healthcare
Isabel de la Torre, Begoña García-Zapirain, and Miguel López-Coronado
Low Budget Forensic Drive Imaging Using Arm Based Single Board Computers
Eric Olson and Narasimha Shashidhar
Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser
Jason Moore, Ibrahim Baggili, and Frank Breitinger
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 04/05/18.