Most Popular Papers *
Towards a More Representative Definition of Cyber Security
Daniel Schatz, Rabih Bashroush, and Julie Wall
Computer Crimes: A Case Study of What Malaysia Can Learn from Others?
Janaletchumi Appudurai and Chitra L. Ramalingam
Leveraging the Windows Amcache.hve File in Forensic Investigations
Bhupendra Singh and Upasna Singh
Drone Forensic Analysis Using Open Source Tools
M A Hannan Bin Azhar, Thomas Edward Allen Barton, and Tasmina Islam
Protecting Digital Evidence Integrity and Preserving Chain of Custody
Makhdoom Syed Muhammad Baqir Shah, Shahzad Saleem, and Roha Zulqarnain
Sharia Law and Digital Forensics in Saudi Arabia
Andrew Jones, Fahad Alanazi, and Catherine Menon
Automated Man-in-the-Middle Attack Against Wi‑Fi Networks
Martin Vondráček, Jan Pluskal, and Ondřej Ryšavý
Anti-Forensic Trace Detection in Digital Forensic Triage Investigations
Kyoung Jea Park, Jung-Min Park, Eun-jin Kim, Chang Geun Cheon, and Joshua I. James
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 01/24/19.