0.3(top 100%)
impact factor
436(top 50%)
papers
621(top 50%)
citations
10(top 50%)
h-index
0.3(top 100%)
impact factor
522
all documents
694
doc citations
18(top 50%)
g-index

Top Articles

#TitleJournalYearCitations
1Cognitive Systems for Dark Web Cyber Delinquent Association Malignant Data CrawlingAdvances in Digital Crime, Forensics, and Cyber Terrorism202346
2Anonymous Trading on the Dark Online MarketplaceAdvances in Digital Crime, Forensics, and Cyber Terrorism202237
3The “Human Factor” in CybersecurityAdvances in Digital Crime, Forensics, and Cyber Terrorism201826
4Darknet Traffic Analysis and Network Management for Malicious Intent Detection by Neural Network FrameworksAdvances in Digital Crime, Forensics, and Cyber Terrorism202223
5Systematic Approach for Detection and Assessment of Dark Web Threat EvolutionAdvances in Digital Crime, Forensics, and Cyber Terrorism202219
6Source Code Authorship Analysis For Supporting the Cybercrime Investigation ProcessAdvances in Digital Crime, Forensics, and Cyber Terrorism201014
7The Role of Artificial Intelligence in Cyber SecurityAdvances in Digital Crime, Forensics, and Cyber Terrorism201913
8Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image AuthenticationAdvances in Digital Crime, Forensics, and Cyber Terrorism201011
9Insider ThreatsAdvances in Digital Crime, Forensics, and Cyber Terrorism20159
10A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber TerrorismAdvances in Digital Crime, Forensics, and Cyber Terrorism20158
11The Innovation and Promise of STEM-Oriented Cybersecurity Charter Schools in Urban Minority Communities in the United States as a Tool to Create a Critical Business WorkforceAdvances in Digital Crime, Forensics, and Cyber Terrorism20158
12Information Warfare in the 2013-2014 Ukraine CrisisAdvances in Digital Crime, Forensics, and Cyber Terrorism20158
13Trends in Malware AttacksAdvances in Digital Crime, Forensics, and Cyber Terrorism20208
14Face Detection and Recognition From Distance Based on Deep LearningAdvances in Digital Crime, Forensics, and Cyber Terrorism20228
15AI-Based Cyber Defense for More Secure CyberspaceAdvances in Digital Crime, Forensics, and Cyber Terrorism20166
16Forensic Investigation of Peer-to-Peer NetworksAdvances in Digital Crime, Forensics, and Cyber Terrorism20106
17Security Issues in Mobile Wireless Ad Hoc NetworksAdvances in Digital Crime, Forensics, and Cyber Terrorism20156
18Introduction to Email, Web, and Message ForensicsAdvances in Digital Crime, Forensics, and Cyber Terrorism20206
19Fluorescent Nanomaterials and Its Application in Biomedical EngineeringAdvances in Digital Crime, Forensics, and Cyber Terrorism20236
20Fighting Cybercrime and Protecting PrivacyAdvances in Digital Crime, Forensics, and Cyber Terrorism20155
21Event ReconstructionAdvances in Digital Crime, Forensics, and Cyber Terrorism20155
22Mobile DevicesAdvances in Digital Crime, Forensics, and Cyber Terrorism20155
23Survey in Smartphone Malware Analysis TechniquesAdvances in Digital Crime, Forensics, and Cyber Terrorism20155
24Emerging Threats for the Human Element and Countermeasures in Current Cyber Security LandscapeAdvances in Digital Crime, Forensics, and Cyber Terrorism20185
25Network Intrusion Detection and Prevention Systems for Attacks in IoT SystemsAdvances in Digital Crime, Forensics, and Cyber Terrorism20195
26Principles and Methods for Face Recognition and Face ModellingAdvances in Digital Crime, Forensics, and Cyber Terrorism20105
27Metamorphic Malware Analysis and Detection MethodsAdvances in Digital Crime, Forensics, and Cyber Terrorism05
28Current Challenges of Digital Forensics in Cyber SecurityAdvances in Digital Crime, Forensics, and Cyber Terrorism20205
29Cyber Forensics Evolution and Its GoalsAdvances in Digital Crime, Forensics, and Cyber Terrorism20205
30World Politics and the Challenges for International SecurityAdvances in Digital Crime, Forensics, and Cyber Terrorism20225
31Navigating the Economic Challenges of the Russia-Ukraine Conflict on IndiaAdvances in Digital Crime, Forensics, and Cyber Terrorism20235
32The Nexus of War, Violence, and RightsAdvances in Digital Crime, Forensics, and Cyber Terrorism20235
33Examining the Effects of the Russia-Ukraine Conflict on Global Supply ChainsAdvances in Digital Crime, Forensics, and Cyber Terrorism20235
34Network Situational AwarenessAdvances in Digital Crime, Forensics, and Cyber Terrorism20154
35Trolling Is Not Just a Art. It Is an ScienceAdvances in Digital Crime, Forensics, and Cyber Terrorism20154
36Toward Principles of Cyberspace SecurityAdvances in Digital Crime, Forensics, and Cyber Terrorism20154
37Human Factors Leading to Online Fraud VictimisationAdvances in Digital Crime, Forensics, and Cyber Terrorism20184
38Examinations of Email Fraud SusceptibilityAdvances in Digital Crime, Forensics, and Cyber Terrorism20184
39IoT Evolution and Security Challenges in Cyber SpaceAdvances in Digital Crime, Forensics, and Cyber Terrorism20194
40DoS Attacks in MANETsAdvances in Digital Crime, Forensics, and Cyber Terrorism04
41Cyber Attacks on Critical InfrastructureAdvances in Digital Crime, Forensics, and Cyber Terrorism20154
42Native Language Identification (NLID) for Forensic Authorship Analysis of WeblogsAdvances in Digital Crime, Forensics, and Cyber Terrorism20154
43Emergency Response to Mumbai Terror AttacksAdvances in Digital Crime, Forensics, and Cyber Terrorism04
44Machine Learning ForensicsAdvances in Digital Crime, Forensics, and Cyber Terrorism20213
45Composition of the Top Management Team and Information Security BreachesAdvances in Digital Crime, Forensics, and Cyber Terrorism20153
46Automatic Detection of Cyberbullying to Make Internet a Safer EnvironmentAdvances in Digital Crime, Forensics, and Cyber Terrorism20153
47Honeypots and HoneynetsAdvances in Digital Crime, Forensics, and Cyber Terrorism20153
48The Rigorous Security Risk Management ModelAdvances in Digital Crime, Forensics, and Cyber Terrorism20153
49Cybersecurity Requires a Clear Systems Engineering Approach as a Basis for Its CyberstrategyAdvances in Digital Crime, Forensics, and Cyber Terrorism20153
50The Islamist Cyberpropaganda Threat and Its Counter-Terrorism Policy ImplicationsAdvances in Digital Crime, Forensics, and Cyber Terrorism20153