


default search action
International Journal of Digital Crime and Forensics, Volume 3
Volume 3, Number 1, 2011
- Ahmad Ryad Soobhany

, Richard Leary, K. P. Lam:
On the Performance of Li's Unsupervised Image Classifier and the Optimal Cropping Position of Images for Forensic Investigations. 1-13 - Antonis Michalas

, Nikos Komninos
, Neeli R. Prasad:
Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks. 14-36 - Rajesh Kumar Tiwari

, G. Sahoo Mesra:
Microsoft Excel File: A Steganographic Carrier File. 37-52 - Fei Peng, Yu-Zhou Lei:

An Effective Reversible Watermarking for 2D CAD Engineering Graphics Based on Improved QIM. 53-69
Volume 3, Number 2, 2011
- Devanur S. Guru, K. B. Nagasundara

, S. Manjunath, R. Dinesh:
An Approach for Hand Vein Representation and Indexing. 1-15 - Sarabjot Singh Anand, Arshad Jhumka, Kimberley Wade

:
Towards the Ordering of Events from Multiple Textual Evidence Sources. 16-34 - Fei Peng

, Honglin Li:
A Steganalysis Method for 2D Engineering Graphics Based on the Statistic of Geometric Features. 35-40 - Nasser Abouzakhar, Huankai Chen, Bruce Christianson

:
An Enhanced Fuzzy ARM Approach for Intrusion Detection. 41-61
Volume 3, Number 3, 2011
- John Haggerty, Alexander John Karran, David J. Lamb, Mark John Taylor:

A Framework for the Forensic Investigation of Unstructured Email Relationship Data. 1-18 - Theodoros Spyridopoulos

, Vasilios Katos
:
Requirements for a Forensically Ready Cloud Storage Service. 19-36 - George Magklaras

, Steven Furnell
, Maria Papadaki
:
LUARM: An Audit Engine for Insider Misuse Detection. 37-49 - Kenan Kalajdzic, Ahmed Patel, Mona Taghavi:

Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs. 50-60
Volume 3, Number 4, 2011
- Yongjian Hu, Chang-Tsun Li

, Changhui Zhou, Xufeng Lin
:
Source Camera Identification Issues: Forensic Features Selection and Robustness. 1-15 - Rajesh Kumar Tiwari

, G. Sahoo Mesra:
Microsoft Power Point Files: A Secure Steganographic Carrier. 16-28 - Alexandros Zaharis, Adamantini Martini, Theo Tryfonas

, Christos Ilioudis
, George Pangalos:
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis. 29-41 - Chun-Ning Yang, Zhe-Ming Lu:

A Blind Image Watermarking Scheme Utilizing BTC Bitplanes. 42-53

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














