Next-generation digital forensics: Challenges and future paradigms R Montasari, R Hill 2019 IEEE 12th International conference on global security, safety and …, 2019 | 78 | 2019 |
A standardised data acquisition process model for digital forensic investigations R Montasari International Journal of Information and Computer Security 9 (3), 229-249, 2017 | 39 | 2017 |
Computer forensic analysis of private browsing modes R Montasari, P Peltola Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber …, 2015 | 35 | 2015 |
A comprehensive digital forensic investigation process model R Montasari International Journal of Electronic Security and Digital Forensics 8 (4 …, 2016 | 33 | 2016 |
Review and assessment of the existing digital forensic investigation process models R Montasari International Journal of Computer Applications 147 (7), 41-49, 2016 | 32 | 2016 |
Integrated computer forensics investigation process model (ICFIPM) for computer crime investigations R Montasari, P Peltola, D Evans Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber …, 2015 | 32 | 2015 |
Application of artificial intelligence and machine learning in producing actionable cyber threat intelligence R Montasari, F Carroll, S Macdonald, H Jahankhani, A Hosseinian-Far, ... Digital forensic investigation of internet of things (IoT) devices, 47-64, 2021 | 31 | 2021 |
Crime data mining, threat analysis and prediction M Farsi, A Daneshkhah, AH Far, O Chatrabgoun, R Montasari Cyber Criminology, 183-202, 2018 | 29 | 2018 |
The standardised digital forensic investigation process model (SDFIPM) R Montasari, R Hill, V Carpenter, A Hosseinian-Far Blockchain and Clinical Trial: Securing Patient Data, 169-209, 2019 | 24 | 2019 |
Digital forensics: challenges and opportunities for future studies R Montasari, R Hill, S Parkinson, P Peltola, A Hosseinian-Far, ... International Journal of Organizational and Collective Intelligence (IJOCI …, 2020 | 22 | 2020 |
An ad hoc detailed review of digital forensic investigation process models R Montasari International Journal of Electronic Security and Digital Forensics 8 (3 …, 2016 | 22 | 2016 |
How good are we at detecting a phishing attack? Investigating the evolving phishing attack email and why it continues to successfully deceive society F Carroll, JA Adejobi, R Montasari SN Computer science 3 (2), 170, 2022 | 21 | 2022 |
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice R Montasari International Journal of Computer Science and Security (IJCSS) 10 (2), 69-87, 2016 | 21 | 2016 |
Digital forensic investigation of social media, acquisition and analysis of digital evidence R Montasari, R Hill, V Carpenter, F Montaseri International Journal of Strategic Engineering (IJoSE) 2 (1), 52-60, 2019 | 19 | 2019 |
A low cost and highly accurate technique for big data spatial-temporal interpolation M Esmaeilbeigi, O Chatrabgoun, A Hosseinian-Far, R Montasari, ... Applied Numerical Mathematics 153, 492-502, 2020 | 17 | 2020 |
The comprehensive digital forensic investigation process model (CDFIPM) for digital forensic practice R Montasari PQDT-Global, 2016 | 16 | 2016 |
An overview of cloud forensics strategy: capabilities, challenges, and opportunities R Montasari Strategic Engineering for Cloud Computing and Big Data Analytics, 189-205, 2017 | 15 | 2017 |
A road map for digital forensics research: A novel approach for establishing the design science research process in digital forensics R Montasari, V Carpenter, R Hill International Journal of Electronic Security and Digital Forensics 11 (2 …, 2019 | 14 | 2019 |
Testing the comprehensive digital forensic investigation process model (the CDFIPM) R Montasari Technology for smart futures, 303-327, 2018 | 14 | 2018 |
Policies, innovative self-adaptive techniques and understanding psychology of cybersecurity to counter adversarial attacks in network and cyber environments R Montasari, A Hosseinian-Far, R Hill Cyber criminology, 71-93, 2018 | 12 | 2018 |