About
Technology
Issues
FAQ
Title
Abstract
Text
Figure Captions
Table Cells
Section Titles
Keywords
Subjects
Authors
From
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1995
1990
1985
1980
1975
1970
1960
1950
1940
1930
1920
1910
1900
1850
1800
1700
1600
To
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1995
1990
1985
1980
1975
1970
1960
1950
1940
1930
1920
1910
1900
1850
1800
1700
1600
All Types
Articles
Communications
Reviews
Discussions
Case Reports
Chapters
Books
News
Editorials
Order By
Order By Year ASC
Order By Year DESC
Order By Citations ASC
Order By Citations DESC
Go
Scientometrics
Impact Factor
Discipline Ranks
H-Index
G-Index
Articles
Citations
Article Citations
Citation Distribution
Search This Journal
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
exaly
›
Journals
›
International Journal of Electronic Security and Digital Forensics
›
Top Articles
International Journal of Electronic Security and Digital Forensics
1
(top 23%)
Impact Factor
1.2
(top 23%)
extended IF
13
(top 22%)
H-Index
131
authors
248
papers
1.1K
citations
290
citing journals
703
citing authors
Most Cited Articles of International Journal of Electronic Security and Digital Forensics
Title
Year
Citations
Opcodes as predictor for malware
2007
176
Integrating security and usability into the requirements and design process
2007
53
Improved wireless security for GMSK-based devices using RF fingerprinting
2010
47
Radio frequency fingerprinting commercial communication devices to enhance electronic security
2008
46
A machine learning approach to keystroke dynamics based user authentication
2007
34
New methodology in facial composite construction: from theory to practice
2009
27
Identifying phishing attacks in communication networks using URL consistency features
2020
27
Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine
2014
21
Detecting malicious behaviour using supervised learning algorithms of the function calls
2013
21
Vulnerabilities in e-governments
2007
17
Drunk person identification using thermal infrared images
2012
16
Wavelet-transform steganography: algorithm and hardware implementation
2013
14
Secure k-NN query on encrypted cloud database without key-sharing
2013
13
Rule generalisation in intrusion detection systems using SNORT
2007
13
A comprehensive digital forensic investigation process model
2016
13
A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection
2015
12
The preservation of digital evidence and its admissibility in the court
2017
11
Efficient hierarchical identity-based signatures from lattices
2013
11
Vulnerability considerations for power line communication's supervisory control and data acquisition
2014
10
M-government services for rural SMEs
2009
10
Weaknesses of a dynamic ID-based remote user authentication scheme
2010
10
An ad hoc detailed review of digital forensic investigation process models
2016
10
An efficient certificateless aggregate signature without pairing
2018
9
A review of video falsifying techniques and video forgery detection techniques
2017
9
Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm
2009
9
0
1
2
next
How are inpact factors calculated?
The impact factor (IF) is calculated by counting citations from peer-reviewed journals only.
extended IF
also counts citations from books and conference papers. However, no patent, abstract, working papers, online documents, etc., are covered.
site/software ©
exaly
; All materials licenced under
CC by-SA
.