Research Techniques in Network and Information Technologies (III)Research Techniques in Network and Information Technologies (III)

Hi!

We continue with the third part, complementing the study of the first articles we will work with for the research.

Assessing the relevance of the authors

In the following table, the different authors will be evaluated based on their number of publications, the number of times they have been cited and the H-Index. This data will also be used in the following task.

AuthorPaperPapers authoredCitationsH-index
Faleh AlshameriA comparison study to analyse the data acquisitions of iOS and android smartphones using multiple forensic tools8293
Katrina KhantaA comparison study to analyse the data acquisitions of iOS and android smartphones using multiple forensic tools662
Stephen BoyceA comparison study to analyse the data acquisitions of iOS and android smartphones using multiple forensic tools121
Aya FukamiA new model for forensic data extraction from encrypted mobile devices121044
Radina StoykovaA new model for forensic data extraction from encrypted mobile devices11815
Zeno GeradtsA new model for forensic data extraction from encrypted mobile devices91100918
Bandr FakihaUnlocking Digital Evidence: Recent Challenges and Strategies in Mobile Device Forensic Analysis13313
Qiu JiahaoIntellectualized forensic technique for Android pattern locks281
Qiu WeidongIntellectualized forensic technique for Android pattern locks125101215
Wang YangdeIntellectualized forensic technique for Android pattern locks411
Zha YanIntellectualized forensic technique for Android pattern locks100
Xie YumingIntellectualized forensic technique for Android pattern locks100
Li YanIntellectualized forensic technique for Android pattern locks7563
V. BalajichandrasekharAn Improvised Methodology to Unbar Android Mobile Phone for Forensic Examination431
T. Srinivasa RaoAn Improvised Methodology to Unbar Android Mobile Phone for Forensic Examination271998
G. SrinivasAn Improvised Methodology to Unbar Android Mobile Phone for Forensic Examination24836

Table. Assessing the relevance of the authors

Who is the most relevant author

After having reviewed the table generated with the information collected in the previous task, and having evaluated all the authors, I believe that the two most relevant authors are Zeno Geradts y Qiu Weidong, they are the two writers with the largest volume of articles written, most cited and with the highest H-index.

AuthorPaperPapers authoredCitationsH-index
Zeno GeradtsA new model for forensic data extraction from encrypted mobile devices91100918
Qiu WeidongIntellectualized forensic technique for Android pattern locks125101215

Table. Comparative between the most influent authors

Now, a comparison must be made between the two because one has more published articles and has been cited more times while the other has a higher H-index.

That is why I raise the question of whether the quality and impact of one author is more than another and why. In the scientific field, three parameters are usually measured, which are the three that are requested of us:

  1. Number of published articles: Here you can see how productive an author is. But productivity does not necessarily indicate quality.
  2. Number of citations: This value denotes how much the author has influenced the community. If there are citations, it should denote greater impact.
  3. H-index: It is a more correct measure to assess productivity and impact since it is generated based on the fact that ‘x’ articles have been published that have been cited at least ‘x’ times each, that is, if the author writes 10, he must be cited at least 10 times to have that value.

After this, I must conclude that among the authors, the two selected are the most prolific and influential, but among the two, I must select the one with the highest H-index, in this case Zeno Geradts.

That’s all for today.
We’ll continue in a few days.

Deja una respuesta

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

Related Post