default search action
International Journal of Electronic Security and Digital Forensics, Volume 13
Volume 13, Number 1, 2021
- Ronghai Gao, Jiwen Zeng:
Forward secure certificateless proxy multi-signature scheme. 1-27 - Nathaporn Utakrit, Pongpisit Wuttidittachotti:
Possible attempts to identify e-mail header of the sender for academic qualification fraud. 28-52 - Volodymyr I. Rozvadovsky, Liubomyr V. Zinych, Andriy A. Albu:
Post-Soviet Estonia's information safety: lessons for Ukraine. 53-63 - Manish Kumar:
Mobile phone forensics - a systematic approach, tools, techniques and challenges. 64-87 - Yogita Deepak Mane, Uday Pandit Khot:
An efficient technique to detect slow rate DDoS attack from a private Tor network. 88-104 - Taras Y. Tkachuk, Leontii G. Chystokletov, Oleksandra L. Khytra, Valerii V. Shyshko, Leonid O. Ostapenko:
Philosophical reflections on the information society in the context of a security-creating paradigm. 105-113
Volume 13, Number 2, 2021
- Valeriia V. Loiko, Olena S. Aleksandrova, Nataliia N. Vinnikova, Vitaliy N. Zavadskyi, Daria N. Loiko:
Methodical tools for security level diagnostics of the modern university's activity. 115-132 - Serik M. Apenov, Nurbol S. Jetibayev, Mariyash K. Makisheva, Guldana A. Kuanalieva, Sergazy Kussainov:
International crime as a threat to global socio-economic security. 133-154 - Aizhan Aryn, Sagyngaliy Aidarbayev, Assel Sharipova, Akynkozha Zhanibekov, Aina Otarbayeva:
International and interstate aspects of ensuring the rights of the suspect and the accused in the proceedings of forensic investigation. 155-179 - Kudrat-E.-Khuda Babu, Md. Ahsan Ullah:
Cyber legislation and cyber-related legal issues in Bangladesh: inadequacies and challenges. 180-196 - Chittetti Venkateswarlu, Venkateswara Rao Nandanavanam:
A robust and secure time-domain interference cancellation using optimisation method in MIMO-OFDM system. 197-218 - Alicia Francois, Alastair Nisbet:
Forensic analysis and data recovery from water-submerged hard drives. 219-231
Volume 13, Number 3, 2021
- Asgarali Bouyer, Mojtaba Zirak:
Digital forensics in private Seafile cloud storage from both client and server side. 233-267 - Mitha Rachel Jose, J. Amar Pratap Singh:
Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues. 268-297 - Hazim S. Al-Sibai, Theyab Alrubaie, Wael M. Elmedany:
IoT cybersecurity threats mitigation via integrated technical and non-technical solutions. 298-333 - Nilay R. Mistry, Hitesh P. Sanghvi:
Drone forensics: investigative guide for law enforcement agencies. 334-345 - P. N. R. L. Chandra Sekhar, T. N. Shankar:
Splicing forgery localisation using colour illumination inconsistencies. 346-358
Volume 13, Number 4, 2021
- Serik M. Apenov, Almagul Zh. Tusupova, Natalya V. Gileva, Dina M. Baimakhanova, Mariyash K. Makisheva:
Methods of ensuring the principle of adversary of the parties during the pre-trial stage of the criminal process. 359-372 - Maya Sitsinska, Anatoliy Sitsinskiy, Nataliia Kravtsova, Svitlana Khadzhyradieva, Yurii Baiun:
Threats to the state security of Ukraine in the humanitarian sphere: sociological dimension. 373-389 - Konstantin A. Polovchenko:
Constitutional foundations of the security system in a modern state. 390-402 - Piotr Lewulis:
Digital forensic standards and digital evidence in Polish criminal proceedings. An updated definition of digital evidence in forensic science. 403-417 - Doug Weeks, Bing Zhou:
Physical security design of a digital forensic lab. 418-444 - Brajesh Kumar Singh, Ravinder Kumar, R. Rama Kishore:
LB and LT feature approach to personal identification using finger knuckle image biological trait. 445-459 - A. Vyasa Bharadwaja, V. Ganesan:
A novel hybrid image hiding technique using elliptic curve cryptography and DNA computing technique. 460-473
Volume 13, Number 5, 2021
- Danish Ahamad, Md. Mobin Akhtar, Shabi Alam Hameed, Mahmoud Mohammad Mahmoud Al Qerom:
Provably secure authentication approach for data security in the cloud using hashing, encryption, and Chebyshev-based authentication. 475-497 - Bijay Kumar Paikaray, Debabala Swain, Sujata Chakravarty:
Reversible selective embedding for DICOM image security and integrity using visual cryptography. 498-514 - Valery A. Konyavsky, Gennady V. Ross, Artem M. Sychev, Viktor N. Kvasnitsky, Tamara B. Zhuravleva:
The upgrade of security of automated process control systems. 515-527 - Punam Sunil Raskar, Sanjeevani Kiran Shah:
Methods for forgery detection in digital forensics. 528-547 - A. Shakeela Joy, R. Ravi:
Smart card authentication model based on elliptic curve cryptography in IoT networks. 548-569
Volume 13, Number 6, 2021
- Nawal Alsaffar, Wael M. El-Medany, Hayat Ali:
Low complexity cybersecurity architecture for the development of ITS in smart cities. 571-599 - Abdullah Ayub Khan, Syed Asif Ali:
Network forensics investigation: behaviour analysis of distinct operating systems to detect and identify the host in IPv6 network. 600-611 - Le Dinh Son, Tran Van An, Nguyen Ngoc Thuy:
Improving the asymmetric encryption algorithm based on genetic algorithm, application in online information transmission. 612-629 - Reza Montasari, Stuart Macdonald, Amin Hosseinian Far, Fiona Carroll, Alireza Daneshkhah:
Network and hypervisor-based attacks in cloud computing environments. 630-651 - Anjana Rodrigues, Archana Bhise:
Digital watermarking of compressed videos using larger dimension 2D error correcting codes for higher embedding capacity. 652-670 - Nilay R. Mistry, Sampada Kanitkar, S. O. Junare:
Volatile memory forensics of privacy-aware operating systems. 671-684
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.