Electronic voting service using block-chain K Lee, JI James, TG Ejeta, HJ Kim Journal of Digital Forensics, Security and Law 11 (2), 8, 2016 | 77 | 2016 |
A study of user data integrity during acquisition of Android devices N Son, Y Lee, D Kim, JI James, S Lee, K Lee Digital Investigation 10, S3-S11, 2013 | 60 | 2013 |
Challenges with Automation in Digital Forensic Investigations JI James, P Gladyshev Computers and Society, p. 17, 2013 | 46 | 2013 |
Analysis of evidence using formal event reconstruction J James, P Gladyshev, MT Abdullah, Y Zhu Digital Forensics and Cyber Crime, 85-98, 2010 | 36 | 2010 |
Evidence identification in IoT networks based on threat assessment N Akatyev, JI James Future Generation Computer Systems 93, 814-821, 2019 | 35 | 2019 |
Key terms for service level agreements to support cloud forensics K Ruan, J James, J Carthy, T Kechadi IFIP International Conference on Digital Forensics, 201-212, 2012 | 35 | 2012 |
A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview JI James, P Gladyshev Digital investigation 10 (2), 148-157, 2013 | 31 | 2013 |
Automated inference of past action instances in digital investigations JI James, P Gladyshev International Journal of Information Security 14 (3), 249-261, 2015 | 26 | 2015 |
The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security MM Losavio, KP Chow, A Koltay, J James Security and Privacy 1 (3), e23, 2018 | 25 | 2018 |
Automated network triage MB Koopmans, JI James Digital Investigation 10 (2), 129-137, 2013 | 24 | 2013 |
Signature Based Detection of User Events for Post-mortem Forensic Analysis JI James, P Gladyshev, Y Zhu Digital Forensics and Cyber Crime, 96-109, 2011 | 18 | 2011 |
Using shellbag information to reconstruct user activities Y Zhu, P Gladyshev, J James digital investigation 6, S69-S77, 2009 | 16 | 2009 |
Decision-theoretic file carving P Gladyshev, JI James Digital Investigation 22, 46-61, 2017 | 14 | 2017 |
Anti-forensic trace detection in digital forensic triage investigations KJ Park, JM Park, E Kim, CG Cheon, JI James Journal of Digital Forensics, Security and Law 12 (1), 8, 2017 | 14 | 2017 |
A survey of mutual legal assistance involving digital evidence JI James, P Gladyshev Digital Investigation 18, 23-32, 2016 | 13 | 2016 |
Digital Forensic Investigation and Cloud Computing JI James, AF Shosha, P Gladyshev Cybercrime and Cloud Forensics: Applications for Investigation Processes, 1-41, 2013 | 13 | 2013 |
Designing robustness and resilience in digital investigation laboratories P Amann, JI James Digital Investigation 12, S111-S120, 2015 | 12 | 2015 |
Cyber peacekeeping N Akatyev, JI James International Conference on Digital Forensics and Cyber Crime, 126-139, 2015 | 11 | 2015 |
Development and initial user evaluation of a virtual crime scene simulator including digital evidence A Conway, JI James, P Gladyshev International Conference on Digital Forensics and Cyber Crime, 16-26, 2015 | 11 | 2015 |
Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers JI James, F Breitinger Springer, 2015 | 10* | 2015 |