0.3(top 100%)
impact factor
436(top 50%)
papers
621(top 50%)
citations
10(top 50%)
h-index
0.3(top 100%)
impact factor
522
all documents
694
doc citations
18(top 50%)
g-index
Top Articles
# | Title | Journal | Year | Citations |
---|---|---|---|---|
1 | Cognitive Systems for Dark Web Cyber Delinquent Association Malignant Data Crawling | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2023 | 46 |
2 | Anonymous Trading on the Dark Online Marketplace | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2022 | 37 |
3 | The “Human Factor” in Cybersecurity | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2018 | 26 |
4 | Darknet Traffic Analysis and Network Management for Malicious Intent Detection by Neural Network Frameworks | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2022 | 23 |
5 | Systematic Approach for Detection and Assessment of Dark Web Threat Evolution | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2022 | 19 |
6 | Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2010 | 14 |
7 | The Role of Artificial Intelligence in Cyber Security | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2019 | 13 |
8 | Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2010 | 11 |
9 | Insider Threats | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 9 |
10 | A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 8 |
11 | The Innovation and Promise of STEM-Oriented Cybersecurity Charter Schools in Urban Minority Communities in the United States as a Tool to Create a Critical Business Workforce | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 8 |
12 | Information Warfare in the 2013-2014 Ukraine Crisis | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 8 |
13 | Trends in Malware Attacks | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2020 | 8 |
14 | Face Detection and Recognition From Distance Based on Deep Learning | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2022 | 8 |
15 | AI-Based Cyber Defense for More Secure Cyberspace | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2016 | 6 |
16 | Forensic Investigation of Peer-to-Peer Networks | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2010 | 6 |
17 | Security Issues in Mobile Wireless Ad Hoc Networks | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 6 |
18 | Introduction to Email, Web, and Message Forensics | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2020 | 6 |
19 | Fluorescent Nanomaterials and Its Application in Biomedical Engineering | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2023 | 6 |
20 | Fighting Cybercrime and Protecting Privacy | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 5 |
21 | Event Reconstruction | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 5 |
22 | Mobile Devices | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 5 |
23 | Survey in Smartphone Malware Analysis Techniques | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 5 |
24 | Emerging Threats for the Human Element and Countermeasures in Current Cyber Security Landscape | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2018 | 5 |
25 | Network Intrusion Detection and Prevention Systems for Attacks in IoT Systems | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2019 | 5 |
26 | Principles and Methods for Face Recognition and Face Modelling | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2010 | 5 |
27 | Metamorphic Malware Analysis and Detection Methods | Advances in Digital Crime, Forensics, and Cyber Terrorism | 0 | 5 |
28 | Current Challenges of Digital Forensics in Cyber Security | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2020 | 5 |
29 | Cyber Forensics Evolution and Its Goals | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2020 | 5 |
30 | World Politics and the Challenges for International Security | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2022 | 5 |
31 | Navigating the Economic Challenges of the Russia-Ukraine Conflict on India | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2023 | 5 |
32 | The Nexus of War, Violence, and Rights | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2023 | 5 |
33 | Examining the Effects of the Russia-Ukraine Conflict on Global Supply Chains | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2023 | 5 |
34 | Network Situational Awareness | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 4 |
35 | Trolling Is Not Just a Art. It Is an Science | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 4 |
36 | Toward Principles of Cyberspace Security | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 4 |
37 | Human Factors Leading to Online Fraud Victimisation | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2018 | 4 |
38 | Examinations of Email Fraud Susceptibility | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2018 | 4 |
39 | IoT Evolution and Security Challenges in Cyber Space | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2019 | 4 |
40 | DoS Attacks in MANETs | Advances in Digital Crime, Forensics, and Cyber Terrorism | 0 | 4 |
41 | Cyber Attacks on Critical Infrastructure | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 4 |
42 | Native Language Identification (NLID) for Forensic Authorship Analysis of Weblogs | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 4 |
43 | Emergency Response to Mumbai Terror Attacks | Advances in Digital Crime, Forensics, and Cyber Terrorism | 0 | 4 |
44 | Machine Learning Forensics | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2021 | 3 |
45 | Composition of the Top Management Team and Information Security Breaches | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 3 |
46 | Automatic Detection of Cyberbullying to Make Internet a Safer Environment | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 3 |
47 | Honeypots and Honeynets | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 3 |
48 | The Rigorous Security Risk Management Model | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 3 |
49 | Cybersecurity Requires a Clear Systems Engineering Approach as a Basis for Its Cyberstrategy | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 3 |
50 | The Islamist Cyberpropaganda Threat and Its Counter-Terrorism Policy Implications | Advances in Digital Crime, Forensics, and Cyber Terrorism | 2015 | 3 |