default search action
International Journal of Electronic Security and Digital Forensics, Volume 14
Volume 14, Number 1, 2022
- Kudrat-E.-Khuda Babu, Md. Abu Bakar Siddik:
Cybercrime in the social media of Bangladesh: an analysis of existing legal frameworks. 1-18 - Zaripa N. Adanbekova, Ayman B. Omarova, Saulegul R. Yermukhametova, Gulnura A. Khudaiberdina, Serikkali T. Tynybekov:
Features of the conclusion of a civil transaction on the internet. 19-36 - Boughanja Manale, Tomader Mazri:
Intrusion detection method for GPS based on deep learning for autonomous vehicle. 37-52 - S. Deepika, S. Senthil:
Credit card fraud detection using moth-flame earth worm optimisation algorithm-based deep belief neural network. 53-75 - Tay Xin Hui, Kamaruddin Malik Mohamad, Nurul Hidayah Ab Rahman:
myEntropy: a file type identification tool using entropy scoring. 76-95 - G. C. Madhu, P. Vijaya Kumar:
A survey and analysis of different lightweight block cipher techniques for resource-constrained devices. 96-110
Volume 14, Number 2, 2022
- Hamzeh Abu Issa, Abdullah Alkhseilat:
The cyber espionage crimes in the Jordanian law. 111-123 - Abdullah Ayub Khan, Aftab Ahmed Shaikh, Asif Ali Laghari, Mazhar Ali Dootio, Muhammad Malook Rind, Shafique Ahmed Awan:
Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction. 124-150 - Gani Seitzhanuly, Sergey N. Bachurin, Alfiya B. Aituarova, Aivazkhan A. Gassanov, Aleksandr V. Syrbu:
Confidentiality in the activities of law enforcement agencies and the court during covert investigative activities. 151-164 - Vidya Sawant, Archana Bhise:
Hybrid turbo code for information security and reliability. 165-187 - Roza M. Zhamiyeva, Gulmira B. Sultanbekova, Maral T. Abzalbekova, Bakytzhan A. Zhakupov, Murat G. Kozhanov:
The role of financial investigations in combating money laundering. 188-198 - Dauren T. Akhmetov, Gulnara M. Rysmagambetova:
Legal aspects of law enforcement operative-investigative activity in special conditions in Kazakhstan. 199-208 - Ainur A. Kassymzhanova, Gulnara R. Usseinova, Dina M. Baimakhanova, Alua S. Ibrayeva, Nurlan S. Ibrayev:
Legal framework for external security of the Republic of Kazakhstan. 209-222
Volume 14, Number 3, 2022
- Erkinbek K. Nurtazin, Aizhan Kozhaknmetova, Kalbike A. Sultankulova, Baktygul K. Ilyasova, Galym B. Teleuyev:
The role and problems of legal culture in the social security of the population of the Republic of Kazakhstan. 223-237 - R. Rajashree, Vijayakumar Peroumal, Lalit Kishore, K. Venkata Diwakar Reddy, Srujan Reddy, M. Jagannath:
Implementation of high speed and lightweight symmetric key encryption algorithm-based authentication protocol for resource constrained devices. 238-263 - Botagoz A. Umitchinova, Yuliya A. Gavrilova, Galina A. Menzuk, Kairat O. Alembayev, Dinara Z. Kozhuganova:
Legal nature and transformation of the national security concept in the context of global challenges of the present (on the example of the Republic of Kazakhstan). 264-273 - Anna A. Aubakirova, Rizabek E. Ildebayev, Yernar N. Begaliyev, Ruslan K. Tumanshiyev, Elvira A. Alimova:
Forensic investigation of forged educational documents. 274-288 - Manju Lata, Vikas Kumar:
Security and privacy issues in fog computing environment. 289-307
Volume 14, Number 4, 2022
- Iryna Leroy:
The relationship between cyber-attacks and dynamics of company stock: the role of reputation management. 309-317 - Samir Bourekkache, Okba Kazar, Ahmed Aloui, Ghazali Hamouda:
Computer and network security: intrusion detection system using mobile agent. 318-340 - Gajanan K. Birajdar, Vijay H. Mankar:
Passive contrast enhancement detection using NSCT-based statistical features and ensemble classifier. 341-372 - Mohammed Abbas Fadhil Al-Husainy, Hamza Abbass Al-Sewadi, Shadi Rasheed Masadeh:
Using a DNA tape as a key for encrypt images. 373-387 - Khalil M. Ahmad Yousef, Anas AlMajali, Bassam Jamil Mohd, Salah Abu Ghalyon:
Quantitative impact analysis of application-level attacks on a robotic platform. 388-412 - Aashish Bhardwaj, Vikas Kumar:
A framework for enhancing privacy in online collaboration. 413-432
Volume 14, Number 5, 2022
- Rupashree Sahoo, Paromita Chattoraj:
Child pornography through cyberspace - a comparative analysis of laws and criminal justice responses in India, USA, UK and Japan. 433-455 - Simranjot Kaur, Rajneesh Rani, Ritu Garg, Nonita Sharma:
State-of-the-art techniques for passive image forgery detection: a brief review. 456-473 - Gulmira M. Ishkibayeva, Daniya Nurmukhankyzy:
Problems of legal regulation of activities for the commercial use of space communications. 474-487 - E. Poornima, C. Sasikala, Vijayakumar Peroumal:
A secured data sharing framework for dynamic groups using an attribute-based cryptography in public cloud: agri-cloud. 488-512 - Oteng Tabona, Andrew Blyth, Thabiso M. Maupong, Thabo Semong:
Forensic cloud environment: a solution for big data forensics. 513-533 - Vijayakumar Peroumal, Sujan Krishna, Harivamsi Reddy, Polineni Ramakrishna, M. Jagannath:
FPGA implementation of hybrid asymmetric key-based digital signature and Diffie-Hellman key exchange algorithm for IoT application. 534-546
Volume 14, Number 6, 2022
- Mohassin Ahmad, Farida Khursheed:
A comparative analysis of copy-move forgery detection algorithms. 547-564 - Noor Issa Al-Hendi:
Electronic administrative contract: a comparative study. 565-578 - Asia Othman Aljahdali, Ghalia Alluhaib, Rasha Alqarni, Majdah Alsharef, Amal Alsaqqaf:
Big data analysis and forensics. 579-593 - Sunil Gupta, Pradeep Kumar Arya, Sri Vemuri Dwijesh Sai, Sri Sai Bhargav Nagandla:
A framework for evaluating cyber forensic tools. 594-615 - Nureni Ayofe Azeez, Ogunlusi E. Victor, Sanjay Misra, Robertas Damasevicius, Rytis Maskeliunas:
Extracted rule-based technique for anomaly detection in a global network. 616-637 - A. Sujan Reddy, Bhawana Rudra:
Detection of injections in API requests using recurrent neural networks and transformers. 638-658
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.