Most Popular Papers *
Towards a More Representative Definition of Cyber Security
Daniel Schatz, Rabih Bashroush, and Julie Wall
Computer Crimes: A Case Study of What Malaysia Can Learn from Others?
Janaletchumi Appudurai and Chitra L. Ramalingam
Leveraging the Windows Amcache.hve File in Forensic Investigations
Bhupendra Singh and Upasna Singh
Chip-off Success Rate Analysis Comparing Temperature and Chip Type
Choli Ence, Joan Runs Through, and Gary D. Cantrell
Forensic Analysis of a Crash-Damaged Cheerson CX-20 Auto Pathfinder Drone
Ian N. McAteer, Peter Hannay, Muhammad I. Malik, and Zubair Baig
Drone Forensic Analysis Using Open Source Tools
M A Hannan Bin Azhar, Thomas Edward Allen Barton, and Tasmina Islam
Protecting Digital Evidence Integrity and Preserving Chain of Custody
Makhdoom Syed Muhammad Baqir Shah, Shahzad Saleem, and Roha Zulqarnain
Automated Man-in-the-Middle Attack Against Wi‑Fi Networks
Martin Vondráček, Jan Pluskal, and Ondřej Ryšavý
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 03/08/19.