default search action
International Journal of Electronic Security and Digital Forensics, Volume 12
Volume 12, Number 1, 2020
- Jayanta Mondal, Debabala Swain:
A 3-layer RDH method in encrypted domain for medical information security. 1-15 - Mahesh Gangarde, Shruti Oza, Janardhan Chitode:
Authenticate audio video-crypto invisible watermarking approach for enhancing hidden information security and robustness. 16-42 - Manar AbuTalib, Reem Alnanih, Adel Khelifi:
Application of quality in use model to assess the user experience of open source digital forensics tools. 43-76 - Muhammad Azeem, Jingsha He, Allah Ditta, Faheem Akhtar, Sher Muhammad Daudpota:
A novel approach to secret data concealment with high cover text capacity and security. 77-98 - Utkarsh Saxena, J. S. Sodhi, Rajneesh Tanwar:
Augmenting smart home network security using blockchain technology. 99-117 - Animesh Kumar Agrawal, Aman Sharma, Sumitra Ranjan Sinha, Pallavi Khatri:
Forensic of an unrooted mobile device. 118-137
Volume 12, Number 2, 2020
- Xiaojun Zhang, Ziyu Zhou, Jingwei Zhang, Chunxiang Xu, Xinpeng Zhang:
Efficient light-weight private auditing scheme for cloud-based wireless body area networks. 139-153 - Harmeet Kaur Khanuja, Dattatraya S. Adane:
Monitor and detect suspicious transactions with database forensics and Dempster-Shafer theory of evidence. 154-173 - Barnali Gupta Banik, Abhinandan Banik:
Robust, imperceptible and blind video steganography using RGB secret, maximum likelihood estimation and Fibonacci encryption. 174-199 - Nureni Ayofe Azeez, Balikis Bolanle Salaudeen, Sanjay Misra, Robertas Damasevicius, Rytis Maskeliunas:
Identifying phishing attacks in communication networks using URL consistency features. 200-213 - Mustapha Sadi, Mourad Amad, Nadjib Badache:
Improving performance overhead of a trust-clustering key management protocol in ad hoc networks. 214-228 - Seyyed-Mohammad Javadi-Moghaddam, Mohammad Golami:
Detecting phishing pages using the relief feature selection and multiple classifiers. 229-242
Volume 12, Number 3, 2020
- Massoud Masoumi, Ali Dehghan:
Design and implementation of a ring oscillator-based physically unclonable function on field programmable gate array to enhance electronic security. 243-261 - Puneet Sharma, Deepak Arora, T. Sakthivel:
UML-based process model for mobile cloud forensic application framework - a preliminary study. 262-278 - Kalpana Chauhan, Rajeev Kumar Chauhan:
Design and development of two levels electronic security and safety system for buildings. 279-292 - Konstantinos Kardaras, George I. Lambrou, Dimitrios D. Koutsouris:
Security efficient command control communication and integration with digital television. 293-301 - Ainur K. Kussainova, Aiman B. Omarova, Djamilya A. Ospanova, Duman O. Kussainov, Rysgul Abilsheyeva:
Problems of legal regulations of relations in the sphere of the electronic document flow. 302-322 - Oluwasefunmi 'Tale Arogundade, Temitope Elizabeth Abioye, Sanjay Misra:
An ontological approach to threats pattern collection and classification: a preliminary study to security management. 323-335
Volume 12, Number 4, 2020
- Djamel Herbadji, Nadir Derouiche, Aïssa Belmeguenaï, Nedal Tahat, Selma Boumerdassi:
A new colour image encryption approach using a combination of two 1D chaotic map. 337-356 - Anas AlMajali, Yatin Wadhawan, Mahmood S. Saadeh, Laith Shalalfeh, Clifford Neuman:
Risk assessment of smart grids under cyber-physical attacks using Bayesian networks. 357-385 - V. Joseph Raymond, R. Jeberson Retna Raj:
Reversing and auditing of android malicious applications using sandboxing environment. 386-396 - Reza Montasari, Richard Hill, Simon Parkinson, Alireza Daneshkhah, Amin Hosseinian Far:
Hardware-based cyber threats: attack vectors and defence techniques. 397-411 - Kanat S. Lakbayev, Gulnara M. Rysmagambetova, Alizhan U. Umetov, Askar K. Sysoyev:
The crimes in the field of high technology: concept, problems and methods of counteraction in Kazakhstan. 412-423 - Reza Montasari, Richard Hill, Farshad Montaseri, Hamid Jahankhani, Amin Hosseinian Far:
Internet of things devices: digital forensic process and data reduction. 424-436
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.