*恭喜浙江省农业科学院俞老师在SCI期刊 Environmental Science and Pollution Research(IF:2.914)上成功发表
*恭喜西安理工大学张老师,环境水利专业,文章成功发表在SCI期刊Environmental Science and Pollution Research上,IF2.914
*恭喜山东交通学院谢老师在SCI期刊APPLIED SURFACE SCIENCE(IF5.15)上成功发表
*恭喜华中科技大学黄老师在SCI期刊 ACS Applied Materials & Interfaces(IF8.456)上成功发表
*恭喜中南大学湘雅医院黄医生在Frontiers in Oncology(IF 4.137)上成功发表
*恭喜复旦大学辛博士在SCI期刊 FEBS LETTERS(IF2.675)上成功发表
*恭喜中南大学陈博士在THIN-WALLED STRUCTURESSCI期刊(IF3.488)上成功发表
*恭喜湖南工学院郭老师在SCI期刊SIMULATION MODELLING PRACTICE AND THEORY(IF2.42)上成功发表
*恭喜东华大学闫老师在SCI期刊Advanced Functional Materials(IF 15.621)上成功发表
*恭喜安徽医科大学肖老师在SCI期刊BMC CELL BIOLOGY(IF 3.485)上成功发表
*恭喜四川大学华西医院谢医生在SCI期刊European Heart Journal: Acute Cardiovascular Care(IF 3.734)上成功发表

0591-83301811

周一~周日, 8:00 - 23:00

13107667616

周一~周日, 8:00 - 23:00

service@editideas.cn

随时欢迎您的来信!

2021年最新SCI期刊影响因子查询系统

期刊名称:
ISSN:
期刊研究方向:
IF范围:
中科院分区:
SCI/SCIE:
是否OA期刊:
排列方式:

Digital Investigation 期刊详细信息

基本信息
期刊名称 Digital Investigation
Digital Investigation
期刊ISSN 1742-2876
期刊官方网站 http://www.journals.elsevier.com/digital-investigation/
是否OA
出版商 Elsevier Ltd
出版周期 Quarterly
始发年份
年文章数 70
最新影响因子 2.86(2021)
中科院SCI期刊分区
大类学科 小类学科 Top 综述
工程技术4区 COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统4区
COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS 计算机:跨学科应用4区
CiteScore
CiteScore排名 CiteScore SJR SNIP
学科 排名 百分位 2.88 0.543 1.985
Health Professions
Medical Laboratory Technology
3 / 27 90%
Social Sciences
Law
25 / 609 95%
Medicine
Pathology and Forensic Medicine
29 / 184 84%
Computer Science
Information Systems
63 / 269 76%
Computer Science
Computer Science Applications
145 / 569 74%
补充信息
自引率 24.40%
H-index 37
SCI收录状况 Science Citation Index Expanded
官方审稿时间
网友分享审稿时间 数据统计中,敬请期待。
PubMed Central (PML) http://www.ncbi.nlm.nih.gov/nlmcatalog?term=1742-2876%5BISSN%5D
投稿指南
期刊投稿网址 http://ees.elsevier.com/diin/default.asp?acw=3
收稿范围
Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence, with the core qualities of provenance, integrity and authenticity.
This widely referenced publication promotes innovations and advances in utilizing digital evidence for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.
This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:
Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.
Cyber-criminal investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.
Cyber-risk management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.
Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.sciencedirect.com/science/article/pii/S1742287618301713.
Scientific practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence.
Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.
Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.
Application analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.
Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.
Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.
Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.
Legal analysis and updates: Carefully considered commentary by legal experts on recent cases involving digital evidence, forensic applications and computer security risk management, relevant legal developments, privacy issues, and legislative limitations.
Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.
Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of DIIN, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.
收录体裁
Research and development
Cyber-criminal investigation
Cyber-risk management
Case Notes
Scientific practices
Effective practices
Survey papers
投稿指南
投稿模板
参考文献格式
编辑信息
近期成功发表案例展示