Follow
Reza Montasari
Title
Cited by
Cited by
Year
Next-generation digital forensics: Challenges and future paradigms
R Montasari, R Hill
2019 IEEE 12th International conference on global security, safety and …, 2019
782019
A standardised data acquisition process model for digital forensic investigations
R Montasari
International Journal of Information and Computer Security 9 (3), 229-249, 2017
382017
Computer forensic analysis of private browsing modes
R Montasari, P Peltola
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber …, 2015
352015
A comprehensive digital forensic investigation process model
R Montasari
International Journal of Electronic Security and Digital Forensics 8 (4 …, 2016
332016
Integrated computer forensics investigation process model (ICFIPM) for computer crime investigations
R Montasari, P Peltola, D Evans
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber …, 2015
322015
Application of artificial intelligence and machine learning in producing actionable cyber threat intelligence
R Montasari, F Carroll, S Macdonald, H Jahankhani, A Hosseinian-Far, ...
Digital forensic investigation of internet of things (IoT) devices, 47-64, 2021
312021
Review and assessment of the existing digital forensic investigation process models
R Montasari
International Journal of Computer Applications 147 (7), 41-49, 2016
312016
Crime data mining, threat analysis and prediction
M Farsi, A Daneshkhah, AH Far, O Chatrabgoun, R Montasari
Cyber Criminology, 183-202, 2018
292018
The standardised digital forensic investigation process model (SDFIPM)
R Montasari, R Hill, V Carpenter, A Hosseinian-Far
Blockchain and Clinical Trial: Securing Patient Data, 169-209, 2019
232019
Digital forensics: challenges and opportunities for future studies
R Montasari, R Hill, S Parkinson, P Peltola, A Hosseinian-Far, ...
International Journal of Organizational and Collective Intelligence (IJOCI …, 2020
222020
An ad hoc detailed review of digital forensic investigation process models
R Montasari
International Journal of Electronic Security and Digital Forensics 8 (3 …, 2016
222016
How good are we at detecting a phishing attack? Investigating the evolving phishing attack email and why it continues to successfully deceive society
F Carroll, JA Adejobi, R Montasari
SN Computer science 3 (2), 170, 2022
212022
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice
R Montasari
International Journal of Computer Science and Security (IJCSS) 10 (2), 69-87, 2016
212016
Digital forensic investigation of social media, acquisition and analysis of digital evidence
R Montasari, R Hill, V Carpenter, F Montaseri
International Journal of Strategic Engineering (IJoSE) 2 (1), 52-60, 2019
192019
A low cost and highly accurate technique for big data spatial-temporal interpolation
M Esmaeilbeigi, O Chatrabgoun, A Hosseinian-Far, R Montasari, ...
Applied Numerical Mathematics 153, 492-502, 2020
172020
An overview of cloud forensics strategy: capabilities, challenges, and opportunities
R Montasari
Strategic Engineering for Cloud Computing and Big Data Analytics, 189-205, 2017
152017
The comprehensive digital forensic investigation process model (CDFIPM) for digital forensic practice
R Montasari
PQDT-Global, 2016
152016
A road map for digital forensics research: A novel approach for establishing the design science research process in digital forensics
R Montasari, V Carpenter, R Hill
International Journal of Electronic Security and Digital Forensics 11 (2 …, 2019
142019
Testing the comprehensive digital forensic investigation process model (the CDFIPM)
R Montasari
Technology for smart futures, 303-327, 2018
142018
Policies, innovative self-adaptive techniques and understanding psychology of cybersecurity to counter adversarial attacks in network and cyber environments
R Montasari, A Hosseinian-Far, R Hill
Cyber criminology, 71-93, 2018
112018
The system can't perform the operation now. Try again later.
Articles 1–20