


default search action
International Journal of Electronic Security and Digital Forensics, Volume 17
Volume 17, Numbers 1/2, 2025
- Gabriela Ahmadi-Assalemi
, Haider M. Al-Khateeb
, Tanaka Laura Makonese, Vladlena Benson, Samiya Khan, Usman Javed Butt:
Feature-driven anomalous behaviour detection and incident classification model for ICS in water treatment plants. 1-29 - Ramya Shah, Digvijaysinh Rathod:
An approach towards development of a supervisory control and data acquisition system forensics framework: concerns and challenges. 30-44 - Rabia Nazir, Ahsan Hussain, Syed Zubair Ahmad Shah:
Blockchain as an indispensable asset for educational institutions: a systematic review. 45-59 - Jing Li, Mohd Shahizan Othman, Hewan Chen, Lizawati Mi Yusuf:
IoT security: a systematic literature review of feature selection methods for machine learning-based attack classification. 60-107 - Neetu Sharma, Rajesh Rohilla:
A novel scalable and cost efficient blockchain solution for managing lifetime vaccination records based on patient preference. 108-137 - Irfan Ali Kandhro, Ali Orangzeb Panhwar, Shafique Ahmed Awan, Raja Sohail Ahmed Larik, Abdul Ahad Abro:
Network security attack classification: leveraging machine learning methods for enhanced detection and defence. 138-148 - Meghana Solanki, Sangita Chaudhari:
VLMDALP: design of an efficient VARMA LSTM-based model for identification of DDoS attacks using application-level packet analysis. 149-168 - Frank Fiadufe
, Krishna Modi
, Kapil Shukla
, Felix O. Etyang
:
Forensic investigation and analysis of malware in Windows OS. 169-182 - Pratik S. Patel, Pooja Panchal:
Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defences. 183-193 - Raghav Modi, Ananjay Singh Jammoria, Akshat Pattiwar, Arnav Agrawal, S. P. Raja:
Secure system to secure crime data using hybrid: RSA-AES and hybrid: Blowfish-Triple DES. 194-232 - Rohit Deval, Nachiket Gupte, Johann Kyle Pinto, Adwaita Raj Modak, Akshat Verma, Anirudh Sharma, S. P. Raja:
Exploring advanced steganography techniques for secure digital image communication: a comparative analysis and performance evaluation. 233-266 - Lana Al-Khalaileh, Tareq Al-Billeh, Ali Al-Hammouri:
The legal authority of the electronic authentication certificate and its role in proving e-commerce transactions. 267-282 - Abitha V. K. Lija
, R. Shobana
, J. Caroline Misbha, S. Chandrakala:
IoT security using deep learning algorithm: intrusion detection model using LSTM. 283-293
Volume 17, Number 3, 2025
- Mohammad Alshible, Hamzeh Abu Issa:
Criminal protection to the digital right to be forgotten in Jordan. 295-306 - Radha Ramesh Murapaka, A. V. S. Pavan Kumar, Aditya Kumar Sahu:
Pixel recurrence based image watermarking for block based integrity verification. 307-326 - Awais Khan Jumani, Jinglun Shi, Asif Ali Laghari, Aftab ul Nabi:
A proposed model for security of quality of experience data in the cloud gaming environment. 327-350 - Tareq Al-Billeh, Ali Al-Hammouri, Lana Al-Khalaileh:
Methods of teaching electronic administration legislation by using artificial intelligence techniques. 351-362 - Mohammad Al-Freihat, Abdullah Khsellat, Talal Aleissa, Galb Shamailah, Ziad Alwahshat
, Hashim Balas:
Dispute rules applicable to electronic commerce contracts. 363-378 - Ramesh Balasubramani, Kumarganesh Sengottaiyan, Thillaikkarasi Rangasamy, Susaritha Muthusamy
, Elango Sellamuthu, Mahaboob Basha Shaik:
Secure sensing and computing techniques based on fuzzy in 5G. 379-390 - Usman Ali, Irfan Ali Kandhro, Raja Sohail Ahmed Larik, Abdullah Ayub Khan, Muhammad Huzaifa Shahbaz, Muhammad Osama:
The future of third web: a role of blockchain and Web 3.0. 391-403 - Prachee Dewangan, Debabala Swain, Monalisa Swain:
A DWT-DCT-SVD-based robust watermark method for image copyright protection. 404-418 - A. Rajasekar, R. Ramamoorthi, M. Ramya, Vinod Arunachalam:
A novel method to increase the security in 5G networks using deep learning. 419-431

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.