Journal of Advanced Forensic Sciences

Journal of Advanced Forensic Sciences

Journal of Advanced Forensic Sciences

Open Access & Peer-Reviewed

Submit Manuscript

Previous Issue

Vol 1, No 2
Previous Issue
4
Articles
87,070
Views
39,955
Downloads
In Press
Published
Published: In Press
Pages: 1-32

Submit Your Research

Fair & Rigorous Review โ€ข Open Access โ€ข Indexed & Discoverable

Review-article

Pages: 1-6


Is the Onion Router a Secure Network?

Abstract: This paper attempts to answer the question of how government agencies use The Onion Router, or Tor, in conducting investigations. The essay observes that Tor is free open-source software that... Read more
Abstract: This paper attempts to answer the question of how government agencies use The Onion Router, or Tor, in conducting investigations. The essay o... Read more
๐Ÿ‘๏ธ Views: 15,962
๐Ÿ“ฅ Downloads: 10,236 (PDF: 5,352, XML: 4,884)
Open Access
๐Ÿ“– View Article ๐Ÿ“„ PDF ๐Ÿ“ XML

Research-article

Pages: 7-14


A Critical Evaluation of the Estonian Cyber Incident

๐Ÿ“š Cited by 10
View citing articles
Abstract: This paper evaluates the effect of the Estonian cyber incident on Estonia, Russia, the United States, the European Union, and the North Atlantic Treaty Organization, also known as NATO. The p... Read more
Abstract: This paper evaluates the effect of the Estonian cyber incident on Estonia, Russia, the United States, the European Union, and the North Atlan... Read more
๐Ÿ‘๏ธ Views: 22,021
๐Ÿ“ฅ Downloads: 9,888 (PDF: 5,371, XML: 4,517)
๐Ÿ“š Citations: 10
Open Access
๐Ÿ“– View Article ๐Ÿ“„ PDF ๐Ÿ“ XML

Opinion-article

Pages: 15-26


Russian Cyber-Attacks on Estonia, Georgia, and Ukraine, Including Tactics, Techniques, Procedures, and Effects

๐Ÿ“š Cited by 6
View citing articles
Abstract: The purpose of this essay is to compare and contrast the cyber-attacks on Estonia, Georgia, and Ukraine, including tactics, techniques, procedure... Read more
Abstract: The purpose of this essay is to compare and contrast the cyber-attacks on Estonia, Georgia, and Ukraine, including ta... Read more
๐Ÿ‘๏ธ Views: 28,552
๐Ÿ“ฅ Downloads: 10,169 (PDF: 5,564, XML: 4,605)
๐Ÿ“š Citations: 6
Open Access
๐Ÿ“– View Article ๐Ÿ“„ PDF ๐Ÿ“ XML

Review-article

Pages: 27-32


The Computer Crimes of Vasiliy Gorshkov and Alexey Ivanov

Abstract: The purpose of this essay was to document the cybercrimes of Vasiliy Gorshkov and Alexey Ivanov, starting from their humble beginnings in Chelyabinsk, Russia ... Read more
Abstract: The purpose of this essay was to document the cybercrimes of Vasiliy Gorshkov and Alexey Ivanov, starting from their humble ... Read more
๐Ÿ‘๏ธ Views: 20,535
๐Ÿ“ฅ Downloads: 9,662 (PDF: 5,458, XML: 4,204)
Open Access
๐Ÿ“– View Article ๐Ÿ“„ PDF ๐Ÿ“ XML