


default search action
International Journal of Electronic Security and Digital Forensics, Volume 13
Volume 13, Number 1, 2021
- Ronghai Gao, Jiwen Zeng:

Forward secure certificateless proxy multi-signature scheme. 1-27 - Nathaporn Utakrit, Pongpisit Wuttidittachotti

:
Possible attempts to identify e-mail header of the sender for academic qualification fraud. 28-52 - Volodymyr I. Rozvadovsky

, Liubomyr V. Zinych
, Andriy A. Albu:
Post-Soviet Estonia's information safety: lessons for Ukraine. 53-63 - Manish Kumar

:
Mobile phone forensics - a systematic approach, tools, techniques and challenges. 64-87 - Yogita Deepak Mane, Uday Pandit Khot:

An efficient technique to detect slow rate DDoS attack from a private Tor network. 88-104 - Taras Y. Tkachuk, Leontii G. Chystokletov, Oleksandra L. Khytra, Valerii V. Shyshko, Leonid O. Ostapenko

:
Philosophical reflections on the information society in the context of a security-creating paradigm. 105-113
Volume 13, Number 2, 2021
- Valeriia V. Loiko

, Olena S. Aleksandrova, Nataliia N. Vinnikova, Vitaliy N. Zavadskyi, Daria N. Loiko
:
Methodical tools for security level diagnostics of the modern university's activity. 115-132 - Serik M. Apenov, Nurbol S. Jetibayev, Mariyash K. Makisheva, Guldana A. Kuanalieva, Sergazy Kussainov

:
International crime as a threat to global socio-economic security. 133-154 - Aizhan Aryn, Sagyngaliy Aidarbayev

, Assel Sharipova
, Akynkozha Zhanibekov
, Aina Otarbayeva
:
International and interstate aspects of ensuring the rights of the suspect and the accused in the proceedings of forensic investigation. 155-179 - Kudrat-E.-Khuda Babu

, Md. Ahsan Ullah:
Cyber legislation and cyber-related legal issues in Bangladesh: inadequacies and challenges. 180-196 - Chittetti Venkateswarlu, Venkateswara Rao Nandanavanam:

A robust and secure time-domain interference cancellation using optimisation method in MIMO-OFDM system. 197-218 - Alicia Francois, Alastair Nisbet:

Forensic analysis and data recovery from water-submerged hard drives. 219-231
Volume 13, Number 3, 2021
- Asgarali Bouyer

, Mojtaba Zirak:
Digital forensics in private Seafile cloud storage from both client and server side. 233-267 - Mitha Rachel Jose

, J. Amar Pratap Singh:
Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues. 268-297 - Hazim S. Al-Sibai, Theyab Alrubaie, Wael M. Elmedany:

IoT cybersecurity threats mitigation via integrated technical and non-technical solutions. 298-333 - Nilay R. Mistry

, Hitesh P. Sanghvi:
Drone forensics: investigative guide for law enforcement agencies. 334-345 - P. N. R. L. Chandra Sekhar, T. N. Shankar:

Splicing forgery localisation using colour illumination inconsistencies. 346-358
Volume 13, Number 4, 2021
- Serik M. Apenov, Almagul Zh. Tusupova, Natalya V. Gileva, Dina M. Baimakhanova, Mariyash K. Makisheva:

Methods of ensuring the principle of adversary of the parties during the pre-trial stage of the criminal process. 359-372 - Maya Sitsinska, Anatoliy Sitsinskiy, Nataliia Kravtsova, Svitlana Khadzhyradieva, Yurii Baiun:

Threats to the state security of Ukraine in the humanitarian sphere: sociological dimension. 373-389 - Konstantin A. Polovchenko:

Constitutional foundations of the security system in a modern state. 390-402 - Piotr Lewulis

:
Digital forensic standards and digital evidence in Polish criminal proceedings. An updated definition of digital evidence in forensic science. 403-417 - Doug Weeks, Bing Zhou:

Physical security design of a digital forensic lab. 418-444 - Brajesh Kumar Singh

, Ravinder Kumar, R. Rama Kishore:
LB and LT feature approach to personal identification using finger knuckle image biological trait. 445-459 - A. Vyasa Bharadwaja

, V. Ganesan:
A novel hybrid image hiding technique using elliptic curve cryptography and DNA computing technique. 460-473
Volume 13, Number 5, 2021
- Danish Ahamad, Md. Mobin Akhtar

, Shabi Alam Hameed
, Mahmoud Mohammad Mahmoud Al Qerom
:
Provably secure authentication approach for data security in the cloud using hashing, encryption, and Chebyshev-based authentication. 475-497 - Bijay Kumar Paikaray, Debabala Swain, Sujata Chakravarty

:
Reversible selective embedding for DICOM image security and integrity using visual cryptography. 498-514 - Valery A. Konyavsky, Gennady V. Ross, Artem M. Sychev, Viktor N. Kvasnitsky, Tamara B. Zhuravleva:

The upgrade of security of automated process control systems. 515-527 - Punam Sunil Raskar

, Sanjeevani Kiran Shah:
Methods for forgery detection in digital forensics. 528-547 - A. Shakeela Joy, R. Ravi:

Smart card authentication model based on elliptic curve cryptography in IoT networks. 548-569
Volume 13, Number 6, 2021
- Nawal Alsaffar, Wael M. El-Medany, Hayat Ali:

Low complexity cybersecurity architecture for the development of ITS in smart cities. 571-599 - Abdullah Ayub Khan

, Syed Asif Ali:
Network forensics investigation: behaviour analysis of distinct operating systems to detect and identify the host in IPv6 network. 600-611 - Le Dinh Son, Tran Van An, Nguyen Ngoc Thuy:

Improving the asymmetric encryption algorithm based on genetic algorithm, application in online information transmission. 612-629 - Reza Montasari, Stuart Macdonald

, Amin Hosseinian Far, Fiona Carroll
, Alireza Daneshkhah:
Network and hypervisor-based attacks in cloud computing environments. 630-651 - Anjana Rodrigues, Archana Bhise:

Digital watermarking of compressed videos using larger dimension 2D error correcting codes for higher embedding capacity. 652-670 - Nilay R. Mistry, Sampada Kanitkar, S. O. Junare:

Volatile memory forensics of privacy-aware operating systems. 671-684

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














