当前位置: X-MOL首页最新SCI期刊查询及投稿分析系统 › Digital Investigation杂志
Digital Investigation
基本信息
期刊名称 Digital Investigation
DIGIT INVEST
期刊ISSN 1742-2876
期刊官方网站 http://www.journals.elsevier.com/digital-investigation/
是否OA
出版商 Elsevier Ltd
出版周期 Quarterly
始发年份
年文章数 70
最新影响因子 2.86(2021)  scijournal影响因子  greensci影响因子
中科院SCI期刊分区
大类学科 小类学科 Top 综述
工程技术4区 COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统4区
COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS 计算机:跨学科应用4区
CiteScore
CiteScore排名 CiteScore SJR SNIP
学科 排名 百分位 2.88 0.543 1.985
Health Professions
Medical Laboratory Technology
3 / 27 90%
Social Sciences
Law
25 / 609 95%
Medicine
Pathology and Forensic Medicine
29 / 184 84%
Computer Science
Information Systems
63 / 269 76%
Computer Science
Computer Science Applications
145 / 569 74%
补充信息
自引率 24.40%
H-index 37
SCI收录状况 Science Citation Index Expanded
官方审稿时间
网友分享审稿时间 数据统计中,敬请期待。
PubMed Central (PML) http://www.ncbi.nlm.nih.gov/nlmcatalog?term=1742-2876%5BISSN%5D
投稿指南
期刊投稿网址 http://ees.elsevier.com/diin/default.asp?acw=3
收稿范围

Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence, with the core qualities of provenance, integrity and authenticity. 
This widely referenced publication promotes innovations and advances in utilizing digital evidence for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology. 
This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas: 
Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents. 
Cyber-criminal investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies. 
Cyber-risk management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite. 
Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.sciencedirect.com/science/article/pii/S1742287618301713
Scientific practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence. 
Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence. 
Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics. 
Application analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements. 
Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements. 
Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create. 
Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive. 
Legal analysis and updates: Carefully considered commentary by legal experts on recent cases involving digital evidence, forensic applications and computer security risk management, relevant legal developments, privacy issues, and legislative limitations. 
Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.
Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of DIIN, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.

收录体裁
Research and development
Cyber-criminal investigation
Cyber-risk management
Case Notes
Scientific practices
Effective practices
Survey papers
投稿指南
投稿模板
参考文献格式
编辑信息

Editor-in-Chief

Eoghan Casey

University of Lausanne School of Criminology and Forensic Science, Lausanne, Switzerland Email Eoghan Casey

Associate Editors

Zeno Geradts

Nederlands Forensisch Institute, Rijswijk, Netherlands 

(For: Digital Forensic Science, Multimedia Evidence, Biometrics, Deep Learning, Big Data Analysis)

Bruce Nikkel

Bern University of Applied Sciences, Bern, Switzerland 

(For: Incident response, Cyber intelligence and investigation, Financially motivated cyber-crime) 

Legal Panel

Chris Kelly

Boston, Massachusetts, USA

Marco Provvidera

New York, USA

Brian Roux

Hanry Law

Giuseppe Vaciago

Milano, Italy

Ian Walden

London, United Kingdom

Editorial Board

David Baker

The Mitre Corporation, McLean, Virginia, United States

Brian Carrier

Basis Technology Corp, Cambridge, Massachusetts, United States

Michael Cohen

Velocidex Innovations, Australia

Pavel Gladyshev

University College Dublin, Dublin, Ireland

Chris Hargreaves

University of Oxford / HARGS Solutions Ltd, United Kingdom

Hans Henseler

University of Applied Sciences Leiden / Tracks Inspector

David-Olivier Jaquet-Chiffelle

University of Lausanne, Lausanne, Switzerland

Nigel Jones

Technology Risk Limited, London, United Kingdom

Nicole Lang Beebe

University of Texas at San Antonio, San Antonio, Texas, United States

Troy Larson

Microsoft Research, Redmond, Washington, United States

Angus Marshall

n-gate ltd, Darlington , United Kingdom

Golden Richard III

Louisiana State University, Baton Rouge, Louisiana, United States

Vassil Roussev

University of New Orleans, New Orleans, Louisiana, United States

Bradley Schatz

Schatz Forensic, Brisbane, Queensland, Australia

Peter Sommer

London School of Economics and Political Science, London, United Kingdom

Philip Turner

DXC Technology UK and Ireland, United Kingdom

Board of Referees

Frank Adelstein

Architecture Technology Corporation New York (ATC-NY), Ithaca, New York, United States

Philip Anderson

Northumbria University, Newcastle Upon Tyne, United Kingdom

Olga Angelopoulou

University of Hertfordshire, Hatfield, United Kingdom

Cosimo Anglano

Università del Piemonte Orientale Computer Science Institute - DiSIT, Alessandria, Italy

Endre Bangerter

Bern Fachhochschule, Biel-Bienne, Switzerland

Andrew Barnes

UK Home Office, United Kingdom

Justin R Bartshe

Naval Criminal Investigative Service, United States

Suman Beros

SEC ITFL

Raoul Bhoedjang

Netherlands Forensic Institute, The Hague, Netherlands

David Billard

HEG - School of Business Administration, Switzerland

Georg Blome

Alexandre Borges

Black Storm Security

Owen Brady

UK Financial Services Regulator, United Kingdom

Frank Breitinger

University of New Haven, West Haven, Connecticut, United States

Susan Brenner

University of Dayton, Dayton, Ohio, United States

Sam Brothers

US Customs and Border Protection, United States

Ian Bryant

Centre for Protection of National Infrastructure, London, United Kingdom

Emlyn Butterfield

Leeds Beckett University, Leeds, United Kingdom

Federico Cervelli

Reparto Investigazioni Scientifiche Carabinie, Parma, Italy

Yoan Chabot

Orange Labs Research and Development, Belfort, France

Kim-Kwang Raymond Choo

University of South Australia Division of IT Engineering and the Environment, Adelaide, Australia

Fred Cohen

All.Net & Affiliated Companies, Livermore, California, United States

David A. Dampier

Mississippi State University, United States

Suvrojit Das

National Institute of Technology Durgapur, Durgapur, India

Ali Dehghantanha

University of Salford, Manchester, United Kingdom

Patrick De Smet

Institut National de Criminalistique et Criminologie, Brussels, Belgium

Jason Doyle

National Cyber Investigative Joint Task Force, United States

Denis Edgar-Nevill

Canterbury Christ Church University, Canterbury, United Kingdom

Tobias Eggendorfer

Eggendorfer IT-Beratung & Datenschutz, Germany

Mattia Epifani

Reality Net

Barry Foster

Standard Charted Bank

Kevvie Fowler

Virginia Franqueira

University of Derby, Derby, United Kingdom

Eric Freyssinet

Pôle Judiciaire De La Gendarmerie Nationale, Pontoise France

Ian Fulton

Forensic Science Northern Ireland, Carrickfergus, County Antrim, United Kingdom

Benjamin, C.M. Fung

Benjamin, C.M. Fung

McGill University, Montreal, Quebec, Canada

Simson Garfinkel

National Institute of Standards and Technology, Gaithersburg Maryland, United States

Thomas Gloe

TU Dresden, Dresden, Germany

Kate Greenwood

UK Financial Conduct Authority, United Kingdom

George Grispos

University of Nebraska at Omaha, Omaha, Nebraska, United States

Justin Grover

The Mitre Corporation, McLean, Virginia, United States

Irvin Homem

Stockholm University, Stockholm, Sweden

Chet Hosmer

WetStone Technologies, Inc, A Div. of Allen Corporation, Ithaca, New York, United States

Solal Jacob

ArxSys SAS, France

Joshua I. James

Hallym University, Chuncheon, Gangwon-do, South Korea

Andy Johnston

University of Maryland at College Park, College Park, Maryland, United States

Jim Jones

George Mason University, Fairfax, Virginia, United States

Costas Katsavounidis

3K Ventures

Jim Kempvanee

LogicForce

Ian Kennedy

Canterbury Christ Church University, School of Engineering and Technology, Kent, United Kingdom

Gary Kessler

Gary Kessler Associates, Burlington, Vermont, United States

Coert Klaver

Netherlands Forensic Institute, Dept. of Digital Technology and Biometrics, Den Haag, Netherlands

Christopher Kollmann

Baltimore County, Towson, Maryland, United States

Jesse Kornblum

Facebook Inc, Menlo Park, California, United States

Kenji Kurosawa

National Research Institute of Police Science, Chiba, Japan

Frank Law

Hong Kong Police Force, Commercial Crime Bureau, Wanchai, Hong Kong

Rob Lee

Sans Institute, Bethesda, Maryland, United States

Andrina Y.-L. Lin

Ministry of Justice Investigation Bureau

Kevin Manson

Cybercop Portal, Arlington, Virginia, United States

Andrew Marrington

Zayed University, Dubai, United Arab Emirates

Ben Martini

University of South Australia, Adelaide, Australia

Vico Marziale

Blackbag

Bryan McCaffrey

Ambient Data

David McClelland

The University of Edinburgh, Edinburgh, United Kingdom

Keith McDonald

National Technical Assistance Centre (NTAC), London, United Kingdom

Robert Jan Mora

Shell Information Technology International B.V

Holger Morgenstern

Sachverstaendigen-Buero Morgenstern (Sachverständigen-Büro Morgenstern), Gammertingen, Germany

Srinivas Mukkamala

New Mexico Institute of Mining and Technology, Socorro, New Mexico, United States

George Noel

Affiliation Defense Information Systems Agency

Erika Noerenberg

Logrythm

Owen O'Connor

Cernam Ltd, Dublin, Ireland

Jan-Jaap Oerlemans

Leiden University, Leiden, Netherlands

Richard Overill

King's College London, London, United Kingdom

Yin Pan

Rochester Institute of Technology, Rochester, New York, United States

Jungheum Park

National Institute of Standards and Technology, Gaithersburg Maryland, United States

Gilbert L. Peterson

U.S. Air Force Institute of Technology, Department of Electrical and Computer Engineering, Ohio, Ohio, United States

Emmanuel Pilli

Malaviya National Institute of Technology, Jaipur, India

Ryan Pittman

NASA Office of Inspector General Computer Crimes Division, Ames Research Center, Moffett Field, California, United States

Darren Quick

University of South Australia, Adelaide, Australia

Alexander Rasin

DePaul University, Chicago, Illinois, United States

Indraskhi Ray

Colorado State University, Fort Collins, Colorado, United States

Frederick Rehault

Pôle Judiciaire De La Gendarmerie Nationale, STRJD, ROSNY SOUS BOIS CEDEX, France

Mark Roeloffs

Netherlands Forensic Institute, Digital Technology, The Hague, Netherlands

Curtis Rose

Curtis W. Rose & Associates LLC, Laurel, Maryland, United States

Mark Russinovich

Microsoft Research, Redmond, Washington, United States

Julie Ryan

National Defense University, Washington, District of Columbia, United States

Paul Sanderson

Sanderson Forensics Ltd., Bicester, United Kingdom

Mark Scanlon

University College Dublin, Dublin, Ireland

Ruud Schramp

Netherlands Forensic Institute, Netherlands

Andreas Schuster

Vivento Deutsche Telekom AG, Bonn, Germany

Kathryn Seigfried-Spellar

Purdue University, West Lafayette, Indiana, United States

Eric Shaw

Elliot School of International Affairs, George Washington University and Institute of Contemporary Psychotherapy and Psychoanalysis, Stroz Friedberg, Washington, District of Columbia, United States

Todd Shipley

Vere Software, Reno, Nevada, United States

Thomas Souvignet

Institut de Recherche Criminelle de la Gendarmerie Nationale (IRCGN), France

Iain Sutherland

University of Glamorgan, Rhondda Cynon Taff, WALES, United Kingdom

Joe Sylve

Blackbag

Gergely Tapolyai

DC3 Defense Cyber Investigations Training Academy (DCITA), United States

John Thackray

Thackray Forensics Ltd., Onerahi, Whangarei, New Zealand

Vrizlynn Thing

Institute for Infocomm Research, Singapore, Singapore

Ben Turnbull

University of South Australia, Adelaide, Australia

Bart Vanautgaerden

NATO Headquarters, Brussels, Belgium

Harm van Beek

Netherlands Forensic Institute, Department of Digital Technology and Biometry, The Hague, Netherlands

Ronald Martijn van der Knijff

Netherlands Forensic Institute, The Hague, Netherlands

Erwin van Eijk

Netherlands Forensic Institute, The Hague, Netherlands

Jan Peter van Zandwijk

Netherlands Forensic Institute, Department of Digital and Biometric Traces, The Hague, Netherlands

Cor Veenman

Netherlands Forensic Institute, The Hague, Netherlands & Leiden University, Leiden, The Netherlands

Hein Venter

University of Pretoria, Pretoria, South Africa

Tim Vidas

Carnegie Mellon University, Pittsburgh, Pennsylvania, United States

Rob Zirnstein

Forensic Innovations, Inc., United States


我要分享  (欢迎您来完善期刊的资料,分享您的实际投稿经验)
研究领域:
投稿录用情况: 审稿时间:  个月返回审稿结果
本次投稿点评:
提交
down
wechat
bug