International Journal of Digital Crime and Forensics

短名Int. J. Digit. Crime Forensics
Journal Impact0.72
国际分区COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS(Q4)
ISSN1941-6210, 1941-6229
h-index18
涉及主题计算机科学人工智能数学计算机安全计算机视觉操作系统图像(数学)工程类心理学程序设计语言物理算法计算机网络政治学法学生物哲学认知心理学
出版信息出版商: IGI Global Publishing出版周期: 期刊类型: journal
基本数据创刊年份: 2009原创研究文献占比100.00%自引率:0.00%Gold OA占比: 97.33%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

Laboratory Abnormal Behavior Detection Based on Multimodal Information Fusion

2024-8-6

Examining the Behavior of Web Browsers Using Popular Forensic Tools

2024-7-17

Efficient Task Offloading for Mobile Edge Computing in Vehicular Networks

2024-7-17

Laboratory Dangerous Operation Behavior Detection System Based on Deep Learning Algorithm

2024-3-19

International Journal of Digital Crime and Forensics

2024-3-19

A Novel Watermarking Scheme for Audio Data Stored in Third Party Servers

2024-3-12

Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning

2023-10-26

UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network

2023-10-25

Task Offloading in Cloud-Edge Environments

2023-10-12

MD-S3C3

2023-8-29

A Crime Scene Reconstruction for Digital Forensic Analysis

2023-7-31

Abnormality Retrieval Method of Laboratory Surveillance Video Based on Deep Automatic Encoder

2023-7-7

The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree

2023-6-27

Latest Trends in Deep Learning Techniques for Image Steganography

2023-2-24

Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology

2023-1-20

Semisupervised Surveillance Video Character Extraction and Recognition With Attentional Learning Multiframe Fusion

2022-12-23

Golden Eye

2022-12-23

Design and Implementation of Identity Verification Software Based on Deep Learning

2022-12-23

Improvement of the PBFT Algorithm Based on Grouping and Reputation Value Voting

2022-12-23

An Unhealthy Webpage Discovery System Based on Convolutional Neural Network

2022-12-23

Research and Application of Warship Multiattribute Threat Assessment Based on Improved TOPSIS Gray Association Analysis

2022-12-9

SRGM Decision Model Considering Cost-Reliability

2022-8-11

An Incremental Acquisition Method for Web Forensics

2022-8-11

Monocular Depth Matching With Hybrid Sampling and Depth Label Propagation

2022-8-5

A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control

2022-7-8

A Model Study on Hierarchical Assisted Exploration of RBAC

2022-6-22

Security Enhancement Through Compiler-Assisted Software Diversity With Deep Reinforcement Learning

2022-6-17

A Model of Network Security Situation Assessment Based on BPNN Optimized by SAA-SSA

2022-6-15

Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing

2022-6-10

Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence

2022-6-10

A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology

2022-6-10

Web Vulnerability Detection Analyzer Based on Python

2022-6-3

A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures

2022-5-31

Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features Set

2022-5-27

A High Capacity Test Disguise Method Combined With Interpolation Backup and Double Authentications

2022-5-26

A Privacy Protection Scheme for Cross-Chain Transactions Based on Group Signature and Relay Chain

2022-5-12

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司