An ontological approach to study and manage digital chain of custody of digital evidence J Ćosić, Z Ćosić, M Bača Journal of Information and Organizational Sciences 35 (1), 1-13, 2011 | 58 | 2011 |
Chain of custody and life cycle of digital evidence J Cosic, Z Cosic Computer technology and application 3 (2), 2012 | 54 | 2012 |
Do we have full control over integrity in digital evidence life cycle? J Cosic, M Baca Proceedings of the ITI 2010, 32nd International Conference on Information …, 2010 | 52 | 2010 |
A framework to (Im) Prove „Chain of Custody “in Digital Investigation Process J Cosic, M Baca Proceeding of Central European Conference of Information and Intelligent …, 2010 | 50 | 2010 |
(Im) proving chain of custody and digital evidence integrity with time stamp J Cosic, M Baca The 33rd International Convention MIPRO, 2010 | 29 | 2010 |
Forensic analysis of social networks (case study) M Baca, J Cosic, Z Cosic Information Technology Interfaces (ITI), Proceedings of the ITI 2013 35th …, 2013 | 22 | 2013 |
Formal acceptability of digital evidence J Cosic Multimedia Forensics and Security: Foundations, Innovations, and …, 2017 | 20* | 2017 |
The necessity of developing a digital evidence ontology J Ćosić, Z Ćosić The proceedings of the Central European Conference on Information and …, 2012 | 20 | 2012 |
Leveraging DEMF to Ensure and Represent 5ws&1h in Digital Forensic Domain J Ćosić, M Bača International Journal of Computer Science and Information Security 13 (2), 7-10, 2015 | 14* | 2015 |
"Chain of Digital Evidence" Based Model of Digital Forensic Investigation Process J Cosic, Z Cosic, M Baca International Journal of Computer Science and Information Security 9 (8), 18-24, 2011 | 14* | 2011 |
Prevencija računalnog kriminaliteta M Bača, J Ćosić Policija i sigurnost 22 (1), 146-158, 2013 | 12 | 2013 |
STEGANOGRAPHY AND ITS IMPLICATION OF FORENSIC INVESTIGATION Ć Jasmin, M Bača Infoteh 2010 Jahorina, B&H, 2010 | 9 | 2010 |
New Challeges in Forensic Analysis in Railway Domain J Cosic, C Schlehuber, D Morog 2019 IEEE 15th International Scientific Conference on Informatics, 66-69, 2019 | 8 | 2019 |
Digital forensic investigation process in railway environment J Cosic, C Schlehuber, D Morog 2021 11th IFIP International Conference on New Technologies, Mobility and …, 2021 | 7 | 2021 |
Web 2.0 services (vulnerability, threats and protection measures) J Ćosić Conference Article, CECIIS, 2009 | 7 | 2009 |
Biometric system vulnerability as a compromising factor for integrity of chain of custody and admissibility of digital evidence in court of justice: Analysis and improvement … Z Ćosić, J Ćosić, M Bača Journal of Information and Organizational Sciences 38 (1), 11-33, 2014 | 5 | 2014 |
Implementing a security architecture for safety-critical railway infrastructure M Eckel, D Kuzhiyelil, C Krauß, M Zhdanova, S Katzenbeisser, J Cosic, ... 2021 International Symposium on Secure and Private Execution Environment …, 2021 | 4 | 2021 |
Modeling Digital Evidence Management and Dynamics Using Petri Nets J Ćosić, M Bača Computer Technology and Application 2, 545-549, 2011 | 4* | 2011 |
eGovernment Maturity & eRediness at BiH Municipality J Cosic, A Medic Central European Conference on Information and Intelligent Systems, 395, 2009 | 4 | 2009 |
Additive model of reliability of biometric systems with exponential distribution of failure probability Z Cosic, J Cosic, M Baca International Journal of Computer Science and Information Security 9 (6), 1, 2011 | 3 | 2011 |