研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态
Journal of Digital Forensics, Security and Law
短名 | JDFSL |
Journal Impact | 0.42 |
国际分区 | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q4) |
ISSN | 1558-7215, 1558-7223 |
h-index |
阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!
涉及主题 | 计算机科学操作系统计算机安全政治学法学程序设计语言万维网工程类生物数学业务心理学数字取证经济互联网隐私地理医学物理哲学历史人工智能社会学考古计算机网络 |
出版信息 | 出版商: ERAU Hunt Library - DIGITAL COMMONS JOURNALS,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2013,原创研究文献占比: 83.33%,自引率:0.00%, Gold OA占比: 0.00% |
平均审稿周期 | 网友分享经验:10 Weeks |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS
点击下方按钮,免费开启试用!
最新文章
AN ML BASED DIGITAL FORENSICS SOFTWARE FOR TRIAGE ANALYSIS THROUGH FACE RECOGNITION
2023-7-1
An Analysis of Product Liability for AI Entities with special reference to the Consumer Protection Act, 2019
2022-10-27
An Evaluation Framework For Digital Image Forensics Tools
2022-10-27
A Study of the Data Remaining on Second-Hand Mobile Devices in the UK
2022-10-27
Assessment of 3D mesh watermarking techniques
2022-1-1
The Digital Detective's Discourse - A toolset for forensically sound collaborative dark web content annotation and collection
2022-1-1
Fault Lines In The Application Of International Humanitarian Law To Cyberwarfare
2022-1-1
Viability of Consumer Grade Hardware for Learning Computer Forensics Principles
2022-1-1
A Combined Approach For Private Indexing Mechanism
2022-1-1
TECHNICAL BEHAVIOURS OF CHILD SEXUAL EXPLOITATION MATERIAL OFFENDERS
2022-1-1
Forensic Discoverability of iOS Vault Applications
2022-1-1
A CRITICAL COMPARISON OF BRAVE BROWSER AND GOOGLE CHROME FORENSIC ARTEFACTS
2022-1-1
Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020
2022-1-1
To License or Not to License Reexamined: An Updated Report on Licensing of Digital Examiners Under State Private Investigator Statutes
2022-1-1
Proposed L-Shape Pattern on UFS ACM For Risk Analysis
2022-1-1
Performance Assessment of some Phishing predictive models based on Minimal Feature corpus
2021-12-5
DON'T BITE THE BAIT: PHISHING ATTACK FOR INTERNET BANKING (E-BANKING)
2021-11-8
The survey on cross-border collection of digital evidence by representatives from Polish prosecutors’ offices and judicial authorities
2021-9-30
Internet of Things Software and Hardware Architectures and Their Impacts on Forensic Investigations: Current Approaches and Challenges
2021-9-30
DIGITAL FORENSIC READINESS FRAMEWORK BASED ON HONEYPOT AND HONEYNET FOR BYOD
2021-9-7
An Economical Method for Securely Disintegrating Solid-State Drives Using Blenders
2021-7-15
Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the Rescue Again
2021-6-10
Identification of LSB image Steganography using Cover Image Comparisons
2021-1-1
Social Media User Relationship Framework (SMURF)
2021-1-1
Backup and Recovery Mechanisms of Cassandra Database: A Review
2021-1-1
A Constructive DIREST Security Threat Modeling for Drone as a Service
2021-1-1
Front Matter
2020-3-31
What’s in the Cloud? - An examination of the impact of cloud storage usage on the browser cache
2020-1-1
Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools
2020-1-1
Cryptography, Passwords, Privacy, and the Fifth Amendment
2020-1-1
A FORENSIC FIRST LOOK AT A POS DEVICE: SEARCHING FOR PCI DSS DATA STORAGE VIOLATIONS
2020-1-1
An Evaluation Of Data Erasing Tools
2020-1-1
A Two-Stage Model for Social Network Investigations in Digital Forensics
2020-1-1
Front Matter
2019-12-31
Front Matter
2019-6-30
Front Matter
2019-3-31
Cyber-Security Risks of Fedwire
2019-1-1
Memoryranger Prevents Highjacking File_object Structures in Windows Kernel
2019-1-1
Digital Evidence in Criminal Cases Before the U.S. Courts of Appeal: Trends and Issues for Consideration
2019-1-1
Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems
2019-1-1
Examining the Correlates of Failed DRDoS Attacks
2019-1-1
Enhancing Forensic-Tool Security with Rust: Development of a String Extraction Utility
2019-1-1
Teaching Data Carving Using The Real World Problem of Text Message Extraction From Unstructured Mobile Device Data Dumps
2019-1-1
A Framework to Reveal Clandestine Organ Trafficking in the Dark Web and Beyond
2019-1-1
Digital Forensics, A Need for Credentials and Standards
2019-1-1
An Examination of Computer Forensics and Related Certifications In The Accounting Curriculum
2019-1-1
Forensic Cell Site Analysis: Mobile Network Operator Evidence Integrity Maintenance Research
2019-1-1
Improved Decay Tolerant Inference of Previously Uninstalled Computer Applications
2019-1-1
DF 2.0: An Automated, Privacy Preserving, and Efficient Digital Forensic Framework That Leverages Machine Learning for Evidence Prediction and Privacy Evaluation
2019-1-1
Back Matter
2018-12-31
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远