研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态

Journal of Digital Forensics, Security and Law

短名JDFSL
Journal Impact0.42
国际分区COMPUTER SCIENCE, INFORMATION SYSTEMS(Q4)
ISSN1558-7215, 1558-7223
h-index

期刊主页投稿网址

阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!

涉及主题计算机科学操作系统计算机安全政治学法学程序设计语言万维网工程类生物数学业务心理学数字取证经济互联网隐私地理医学物理哲学历史人工智能社会学考古计算机网络
出版信息出版商: ERAU Hunt Library - DIGITAL COMMONS JOURNALS出版周期: 期刊类型: journal
基本数据创刊年份: 2013原创研究文献占比83.33%自引率:0.00%Gold OA占比: 0.00%
平均审稿周期 网友分享经验:10 Weeks

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS

点击下方按钮,免费开启试用!

最新文章

AN ML BASED DIGITAL FORENSICS SOFTWARE FOR TRIAGE ANALYSIS THROUGH FACE RECOGNITION

2023-7-1

An Analysis of Product Liability for AI Entities with special reference to the Consumer Protection Act, 2019

2022-10-27

An Evaluation Framework For Digital Image Forensics Tools

2022-10-27

A Study of the Data Remaining on Second-Hand Mobile Devices in the UK

2022-10-27

Assessment of 3D mesh watermarking techniques

2022-1-1

The Digital Detective's Discourse - A toolset for forensically sound collaborative dark web content annotation and collection

2022-1-1

Fault Lines In The Application Of International Humanitarian Law To Cyberwarfare

2022-1-1

Viability of Consumer Grade Hardware for Learning Computer Forensics Principles

2022-1-1

A Combined Approach For Private Indexing Mechanism

2022-1-1

TECHNICAL BEHAVIOURS OF CHILD SEXUAL EXPLOITATION MATERIAL OFFENDERS

2022-1-1

Forensic Discoverability of iOS Vault Applications

2022-1-1

A CRITICAL COMPARISON OF BRAVE BROWSER AND GOOGLE CHROME FORENSIC ARTEFACTS

2022-1-1

Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020

2022-1-1

To License or Not to License Reexamined: An Updated Report on Licensing of Digital Examiners Under State Private Investigator Statutes

2022-1-1

Proposed L-Shape Pattern on UFS ACM For Risk Analysis

2022-1-1

Performance Assessment of some Phishing predictive models based on Minimal Feature corpus

2021-12-5

DON'T BITE THE BAIT: PHISHING ATTACK FOR INTERNET BANKING (E-BANKING)

2021-11-8

The survey on cross-border collection of digital evidence by representatives from Polish prosecutors’ offices and judicial authorities

2021-9-30

Internet of Things Software and Hardware Architectures and Their Impacts on Forensic Investigations: Current Approaches and Challenges

2021-9-30

DIGITAL FORENSIC READINESS FRAMEWORK BASED ON HONEYPOT AND HONEYNET FOR BYOD

2021-9-7

An Economical Method for Securely Disintegrating Solid-State Drives Using Blenders

2021-7-15

Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the Rescue Again

2021-6-10

Identification of LSB image Steganography using Cover Image Comparisons

2021-1-1

Social Media User Relationship Framework (SMURF)

2021-1-1

Backup and Recovery Mechanisms of Cassandra Database: A Review

2021-1-1

A Constructive DIREST Security Threat Modeling for Drone as a Service

2021-1-1

Front Matter

2020-3-31

What’s in the Cloud? - An examination of the impact of cloud storage usage on the browser cache

2020-1-1

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools

2020-1-1

Cryptography, Passwords, Privacy, and the Fifth Amendment

2020-1-1

A FORENSIC FIRST LOOK AT A POS DEVICE: SEARCHING FOR PCI DSS DATA STORAGE VIOLATIONS

2020-1-1

An Evaluation Of Data Erasing Tools

2020-1-1

A Two-Stage Model for Social Network Investigations in Digital Forensics

2020-1-1

Front Matter

2019-12-31

Front Matter

2019-6-30

Front Matter

2019-3-31

Cyber-Security Risks of Fedwire

2019-1-1

Memoryranger Prevents Highjacking File_object Structures in Windows Kernel

2019-1-1

Digital Evidence in Criminal Cases Before the U.S. Courts of Appeal: Trends and Issues for Consideration

2019-1-1

Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems

2019-1-1

Examining the Correlates of Failed DRDoS Attacks

2019-1-1

Enhancing Forensic-Tool Security with Rust: Development of a String Extraction Utility

2019-1-1

Teaching Data Carving Using The Real World Problem of Text Message Extraction From Unstructured Mobile Device Data Dumps

2019-1-1

A Framework to Reveal Clandestine Organ Trafficking in the Dark Web and Beyond

2019-1-1

Digital Forensics, A Need for Credentials and Standards

2019-1-1

An Examination of Computer Forensics and Related Certifications In The Accounting Curriculum

2019-1-1

Forensic Cell Site Analysis: Mobile Network Operator Evidence Integrity Maintenance Research

2019-1-1

Improved Decay Tolerant Inference of Previously Uninstalled Computer Applications

2019-1-1

DF 2.0: An Automated, Privacy Preserving, and Efficient Digital Forensic Framework That Leverages Machine Learning for Evidence Prediction and Privacy Evaluation

2019-1-1

Back Matter

2018-12-31

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司