Most Popular Papers *
Towards a More Representative Definition of Cyber Security
Daniel Schatz, Rabih Bashroush, and Julie Wall
Computer Crimes: A Case Study of What Malaysia Can Learn from Others?
Janaletchumi Appudurai and Chitra L. Ramalingam
Leveraging the Windows Amcache.hve File in Forensic Investigations
Bhupendra Singh and Upasna Singh
Drone Forensic Analysis Using Open Source Tools
M A Hannan Bin Azhar, Thomas Edward Allen Barton, and Tasmina Islam
Protecting Digital Evidence Integrity and Preserving Chain of Custody
Makhdoom Syed Muhammad Baqir Shah, Shahzad Saleem, and Roha Zulqarnain
A Framework to Reveal Clandestine Organ Trafficking in the Dark Web and Beyond
Michael P. Heinl, Bo Yu, and Duminda Wijesekera
Digital Forensic Readiness in Organizations: Issues and Challenges
Nickson menza Karie 275404 and Simon Maina Karume Dr.
Automated Man-in-the-Middle Attack Against Wi‑Fi Networks
Martin Vondráček, Jan Pluskal, and Ondřej Ryšavý
An Examination of Computer Forensics and Related Certifications In The Accounting Curriculum
Michael A. Seda, Bonita Peterson Kramer, and D. Larry Crumbley
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 08/08/19.