Electronic voting service using block-chain K Lee, JI James, TG Ejeta, HJ Kim Journal of Digital Forensics, Security and Law 11 (2), 8, 2016 | 137 | 2016 |
The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security MM Losavio, KP Chow, A Koltay, J James Security and Privacy 1 (3), e23, 2018 | 91 | 2018 |
Evidence identification in IoT networks based on threat assessment N Akatyev, JI James Future Generation Computer Systems 93, 814-821, 2019 | 80 | 2019 |
Challenges with Automation in Digital Forensic Investigations JI James, P Gladyshev Computers and Society, p. 17, 2013 | 70 | 2013 |
A study of user data integrity during acquisition of Android devices N Son, Y Lee, D Kim, JI James, S Lee, K Lee Digital Investigation 10, S3-S11, 2013 | 69 | 2013 |
Key terms for service level agreements to support cloud forensics K Ruan, J James, J Carthy, T Kechadi Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International …, 2012 | 45 | 2012 |
Analysis of evidence using formal event reconstruction J James, P Gladyshev, MT Abdullah, Y Zhu Digital Forensics and Cyber Crime, 85-98, 2010 | 45 | 2010 |
A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview JI James, P Gladyshev Digital investigation 10 (2), 148-157, 2013 | 40 | 2013 |
Automated inference of past action instances in digital investigations JI James, P Gladyshev International Journal of Information Security 14, 249-261, 2015 | 39 | 2015 |
Using shellbag information to reconstruct user activities Y Zhu, P Gladyshev, J James digital investigation 6, S69-S77, 2009 | 29 | 2009 |
Designing robustness and resilience in digital investigation laboratories P Amann, JI James Digital Investigation 12, S111-S120, 2015 | 28 | 2015 |
Automated network triage MB Koopmans, JI James Digital Investigation 10 (2), 129-137, 2013 | 26 | 2013 |
Anti-forensic trace detection in digital forensic triage investigations KJ Park, JM Park, E Kim, CG Cheon, JI James Journal of Digital Forensics, Security and Law 12 (1), 8, 2017 | 25 | 2017 |
A survey of mutual legal assistance involving digital evidence JI James, P Gladyshev Digital Investigation 18, 23-32, 2016 | 25 | 2016 |
Decision-theoretic file carving P Gladyshev, JI James Digital Investigation 22, 46-61, 2017 | 23 | 2017 |
Signature Based Detection of User Events for Post-mortem Forensic Analysis JI James, P Gladyshev, Y Zhu Digital Forensics and Cyber Crime, 96-109, 2011 | 23 | 2011 |
The juridical spheres for digital forensics and electronic evidence in the insecure electronic world MM Losavio, P Pastukov, S Polyakova, X Zhang, KP Chow, A Koltay, ... Wiley Interdisciplinary Reviews: Forensic Science 1 (5), e1337, 2019 | 20 | 2019 |
Digital Forensic Investigation and Cloud Computing JI James, AF Shosha, P Gladyshev Cybercrime and Cloud Forensics: Applications for Investigation Processes, 1-41, 2013 | 17 | 2013 |
Development and initial user evaluation of a virtual crime scene simulator including digital evidence A Conway, JI James, P Gladyshev Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015 …, 2015 | 15 | 2015 |
Cyber peacekeeping N Akatyev, JI James Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015 …, 2015 | 14 | 2015 |