International Journal of Digital Crime and Forensics
短名 | Int. J. Digit. Crime Forensics |
Journal Impact | 0.72 |
国际分区 | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS(Q4) |
ISSN | 1941-6210, 1941-6229 |
h-index | 18 |
涉及主题 | 计算机科学人工智能数学计算机安全计算机视觉操作系统图像(数学)工程类心理学程序设计语言物理算法计算机网络政治学法学生物哲学认知心理学 |
出版信息 | 出版商: IGI Global Publishing,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2009,原创研究文献占比: 100.00%,自引率:0.00%, Gold OA占比: 97.33% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
Laboratory Abnormal Behavior Detection Based on Multimodal Information Fusion
2024-8-6
Examining the Behavior of Web Browsers Using Popular Forensic Tools
2024-7-17
Efficient Task Offloading for Mobile Edge Computing in Vehicular Networks
2024-7-17
Laboratory Dangerous Operation Behavior Detection System Based on Deep Learning Algorithm
2024-3-19
International Journal of Digital Crime and Forensics
2024-3-19
A Novel Watermarking Scheme for Audio Data Stored in Third Party Servers
2024-3-12
Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning
2023-10-26
UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network
2023-10-25
Task Offloading in Cloud-Edge Environments
2023-10-12
MD-S3C3
2023-8-29
A Crime Scene Reconstruction for Digital Forensic Analysis
2023-7-31
Abnormality Retrieval Method of Laboratory Surveillance Video Based on Deep Automatic Encoder
2023-7-7
The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree
2023-6-27
Latest Trends in Deep Learning Techniques for Image Steganography
2023-2-24
Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology
2023-1-20
Semisupervised Surveillance Video Character Extraction and Recognition With Attentional Learning Multiframe Fusion
2022-12-23
Golden Eye
2022-12-23
Design and Implementation of Identity Verification Software Based on Deep Learning
2022-12-23
Improvement of the PBFT Algorithm Based on Grouping and Reputation Value Voting
2022-12-23
An Unhealthy Webpage Discovery System Based on Convolutional Neural Network
2022-12-23
Research and Application of Warship Multiattribute Threat Assessment Based on Improved TOPSIS Gray Association Analysis
2022-12-9
SRGM Decision Model Considering Cost-Reliability
2022-8-11
An Incremental Acquisition Method for Web Forensics
2022-8-11
Monocular Depth Matching With Hybrid Sampling and Depth Label Propagation
2022-8-5
A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control
2022-7-8
A Model Study on Hierarchical Assisted Exploration of RBAC
2022-6-22
Security Enhancement Through Compiler-Assisted Software Diversity With Deep Reinforcement Learning
2022-6-17
A Model of Network Security Situation Assessment Based on BPNN Optimized by SAA-SSA
2022-6-15
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing
2022-6-10
Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence
2022-6-10
A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology
2022-6-10
Web Vulnerability Detection Analyzer Based on Python
2022-6-3
A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures
2022-5-31
Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features Set
2022-5-27
A High Capacity Test Disguise Method Combined With Interpolation Backup and Double Authentications
2022-5-26
A Privacy Protection Scheme for Cross-Chain Transactions Based on Group Signature and Relay Chain
2022-5-12
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远