3.2(top 10%)
impact factor
766(top 20%)
papers
21.0K(top 10%)
citations
67(top 10%)
h-index
3.4(top 10%)
impact factor
999
all documents
21.9K
doc citations
102(top 10%)
g-index

Top Articles

#TitleJournalYearCitations
1Digital forensics research: The next 10 yearsDigital Investigation2010406
2Identifying almost identical files using context triggered piecewise hashingDigital Investigation2006341
3Digital image forgery detection using passive techniques: A surveyDigital Investigation2013312
4MalDozer: Automatic framework for android malware detection using deep learningDigital Investigation2018273
5Bringing science to digital forensics with standardized forensic corporaDigital Investigation2009256
6A hierarchical, objectives-based framework for the digital investigations processDigital Investigation2005225
7Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniquesDigital Investigation2012206
8An integrated conceptual digital forensic framework for cloud computingDigital Investigation2012205
9Network forensic frameworks: Survey and research challengesDigital Investigation2010197
10APK Auditor: Permission-based Android malware detection systemDigital Investigation2015188
11Passive copy move image forgery detection using undecimated dyadic wavelet transformDigital Investigation2012185
12Impacts of increasing volume of digital forensic data: A survey and future research challengesDigital Investigation2014180
13Author gender identification from textDigital Investigation2011178
14Future challenges for smart cities: Cyber-security and digital forensicsDigital Investigation2017176
15Carving contiguous and fragmented files with fast object validationDigital Investigation2007174
16A review on feature selection in mobile malware detectionDigital Investigation2015162
17Forensic analysis of social networking applications on mobile devicesDigital Investigation2012161
18Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey resultsDigital Investigation2013147
19Dropbox analysis: Data remnants on user machinesDigital Investigation2013147
20Digital forensic investigation of cloud storage servicesDigital Investigation2012144
21Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platformDigital Investigation2013141
22A hardware-based memory acquisition procedure for digital investigationsDigital Investigation2004136
23Cloud storage forensics: ownCloud as a case studyDigital Investigation2013135
24Forensic analysis of WhatsApp Messenger on Android smartphonesDigital Investigation2014135
25Digital forensic approaches for Amazon Alexa ecosystemDigital Investigation2017130
26Deep learning at the shallow end: Malware classification for non-domain expertsDigital Investigation2018129
27Toward a general collection methodology for Android devicesDigital Investigation2011120
28FORZA – Digital forensics investigation framework that incorporate legal issuesDigital Investigation2006119
29Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problemDigital Investigation2006119
30Searching for processes and threads in Microsoft Windows memory dumpsDigital Investigation2006113
31Mining writeprints from anonymous e-mails for forensic investigationDigital Investigation2010109
32Acquisition and analysis of volatile memory from android devicesDigital Investigation2012107
33Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?Digital Investigation2013102
34Cloud forensics: Technical challenges, solutions and comparative analysisDigital Investigation2015101
35Digital video tampering detection: An overview of passive techniquesDigital Investigation201699
36A novel approach of mining write-prints for authorship attribution in e-mail forensicsDigital Investigation200895
37Network and device forensic analysis of Android social-messaging applicationsDigital Investigation201594
38FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memoryDigital Investigation200693
39Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger ComposerDigital Investigation201992
40PyFlag – An advanced network forensic frameworkDigital Investigation200891
41An evaluation of forensic similarity hashesDigital Investigation201191
42Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search resultsDigital Investigation200790
43IoT forensic challenges and opportunities for digital tracesDigital Investigation201989
44Live memory forensics of mobile phonesDigital Investigation201088
45Forensic feature extraction and cross-drive analysisDigital Investigation200687
46An automated timeline reconstruction approach for digital forensic investigationsDigital Investigation201283
47FACE: Automated digital evidence discovery and correlationDigital Investigation200880
48Availability of datasets for digital forensics – And what is missingDigital Investigation201780
49Finite state machine approach to digital event reconstructionDigital Investigation200478
50Forensic imaging of embedded systems using JTAG (boundary-scan)Digital Investigation200678