Search dblp for Publications

export results for "stream:streams/journals/ijesdf:"

 download as .bib file

@article{DBLP:journals/ijesdf/AdanbekovaOYKT22,
  author    = {Zaripa N. Adanbekova and
               Ayman B. Omarova and
               Saulegul R. Yermukhametova and
               Gulnura A. Khudaiberdina and
               Serikkali T. Tynybekov},
  title     = {Features of the conclusion of a civil transaction on the internet},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {1},
  pages     = {19--36},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.120035},
  doi       = {10.1504/IJESDF.2022.120035},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AdanbekovaOYKT22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AkhmetovR22,
  author    = {Dauren T. Akhmetov and
               Gulnara M. Rysmagambetova},
  title     = {Legal aspects of law enforcement operative-investigative activity
               in special conditions in Kazakhstan},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {2},
  pages     = {199--208},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.121179},
  doi       = {10.1504/IJESDF.2022.121179},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AkhmetovR22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AubakirovaIBTA22,
  author    = {Anna A. Aubakirova and
               Rizabek E. Ildebayev and
               Yernar N. Begaliyev and
               Ruslan K. Tumanshiyev and
               Elvira A. Alimova},
  title     = {Forensic investigation of forged educational documents},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {3},
  pages     = {274--288},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.122585},
  doi       = {10.1504/IJESDF.2022.122585},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AubakirovaIBTA22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BabuS22,
  author    = {Kudrat{-}E.{-}Khuda Babu and
               Md. Abu Bakar Siddik},
  title     = {Cybercrime in the social media of Bangladesh: an analysis of existing
               legal frameworks},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {1},
  pages     = {1--18},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.119998},
  doi       = {10.1504/IJESDF.2022.119998},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BabuS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DeepikaS22,
  author    = {S. Deepika and
               S. Senthil},
  title     = {Credit card fraud detection using moth-flame earth worm optimisation
               algorithm-based deep belief neural network},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {1},
  pages     = {53--75},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.120021},
  doi       = {10.1504/IJESDF.2022.120021},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/DeepikaS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HuiMR22,
  author    = {Tay Xin Hui and
               Kamaruddin Malik Mohamad and
               Nurul Hidayah Ab Rahman},
  title     = {myEntropy: a file type identification tool using entropy scoring},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {1},
  pages     = {76--95},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.120008},
  doi       = {10.1504/IJESDF.2022.120008},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/HuiMR22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/IssaA22,
  author    = {Hamzeh Abu Issa and
               Abdullah Alkhseilat},
  title     = {The cyber espionage crimes in the Jordanian law},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {2},
  pages     = {111--123},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.121203},
  doi       = {10.1504/IJESDF.2022.121203},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/IssaA22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KassymzhanovaUB22,
  author    = {Ainur A. Kassymzhanova and
               Gulnara R. Usseinova and
               Dina M. Baimakhanova and
               Alua S. Ibrayeva and
               Nurlan S. Ibrayev},
  title     = {Legal framework for external security of the Republic of Kazakhstan},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {2},
  pages     = {209--222},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.121180},
  doi       = {10.1504/IJESDF.2022.121180},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KassymzhanovaUB22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KhanSLDRA22,
  author    = {Abdullah Ayub Khan and
               Aftab Ahmed Shaikh and
               Asif Ali Laghari and
               Mazhar Ali Dootio and
               Muhammad Malook Rind and
               Shafique Ahmed Awan},
  title     = {Digital forensics and cyber forensics investigation: security challenges,
               limitations, open issues, and future direction},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {2},
  pages     = {124--150},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.121174},
  doi       = {10.1504/IJESDF.2022.121174},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KhanSLDRA22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/LataK22,
  author    = {Manju Lata and
               Vikas Kumar},
  title     = {Security and privacy issues in fog computing environment},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {3},
  pages     = {289--307},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.122588},
  doi       = {10.1504/IJESDF.2022.122588},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/LataK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MadhuK22,
  author    = {G. C. Madhu and
               P. Vijaya Kumar},
  title     = {A survey and analysis of different lightweight block cipher techniques
               for resource-constrained devices},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {1},
  pages     = {96--110},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.120011},
  doi       = {10.1504/IJESDF.2022.120011},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MadhuK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ManaleM22,
  author    = {Boughanja Manale and
               Tomader Mazri},
  title     = {Intrusion detection method for {GPS} based on deep learning for autonomous
               vehicle},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {1},
  pages     = {37--52},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.120039},
  doi       = {10.1504/IJESDF.2022.120039},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ManaleM22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/NurtazinKSIT22,
  author    = {Erkinbek K. Nurtazin and
               Aizhan Kozhaknmetova and
               Kalbike A. Sultankulova and
               Baktygul K. Ilyasova and
               Galym B. Teleuyev},
  title     = {The role and problems of legal culture in the social security of the
               population of the Republic of Kazakhstan},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {3},
  pages     = {223--237},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.122582},
  doi       = {10.1504/IJESDF.2022.122582},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/NurtazinKSIT22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RajashreePKRRJ22,
  author    = {R. Rajashree and
               Vijayakumar Peroumal and
               Lalit Kishore and
               K. Venkata Diwakar Reddy and
               Srujan Reddy and
               M. Jagannath},
  title     = {Implementation of high speed and lightweight symmetric key encryption
               algorithm-based authentication protocol for resource constrained devices},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {3},
  pages     = {238--263},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.122578},
  doi       = {10.1504/IJESDF.2022.122578},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/RajashreePKRRJ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SawantB22,
  author    = {Vidya Sawant and
               Archana Bhise},
  title     = {Hybrid turbo code for information security and reliability},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {2},
  pages     = {165--187},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.121181},
  doi       = {10.1504/IJESDF.2022.121181},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SawantB22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SeitzhanulyBAGS22,
  author    = {Gani Seitzhanuly and
               Sergey N. Bachurin and
               Alfiya B. Aituarova and
               Aivazkhan A. Gassanov and
               Aleksandr V. Syrbu},
  title     = {Confidentiality in the activities of law enforcement agencies and
               the court during covert investigative activities},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {2},
  pages     = {151--164},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.121192},
  doi       = {10.1504/IJESDF.2022.121192},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SeitzhanulyBAGS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/UmitchinovaGMAK22,
  author    = {Botagoz A. Umitchinova and
               Yuliya A. Gavrilova and
               Galina A. Menzuk and
               Kairat O. Alembayev and
               Dinara Z. Kozhuganova},
  title     = {Legal nature and transformation of the national security concept in
               the context of global challenges of the present (on the example of
               the Republic of Kazakhstan)},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {3},
  pages     = {264--273},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.122586},
  doi       = {10.1504/IJESDF.2022.122586},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/UmitchinovaGMAK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhamiyevaSAZK22,
  author    = {Roza M. Zhamiyeva and
               Gulmira B. Sultanbekova and
               Maral T. Abzalbekova and
               Bakytzhan A. Zhakupov and
               Murat G. Kozhanov},
  title     = {The role of financial investigations in combating money laundering},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {14},
  number    = {2},
  pages     = {188--198},
  year      = {2022},
  url       = {https://doi.org/10.1504/IJESDF.2022.121183},
  doi       = {10.1504/IJESDF.2022.121183},
  timestamp = {Mon, 16 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZhamiyevaSAZK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AhamadAHQ21,
  author    = {Danish Ahamad and
               Md Mobin Akhtar and
               Shabi Alam Hameed and
               Mahmoud Mohammad Mahmoud Al Qerom},
  title     = {Provably secure authentication approach for data security in the cloud
               using hashing, encryption, and Chebyshev-based authentication},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {5},
  pages     = {475--497},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.117315},
  doi       = {10.1504/IJESDF.2021.117315},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AhamadAHQ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Al-SibaiAE21,
  author    = {Hazim S. Al{-}Sibai and
               Theyab Alrubaie and
               Wael M. Elmedany},
  title     = {IoT cybersecurity threats mitigation via integrated technical and
               non-technical solutions},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {3},
  pages     = {298--333},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.114957},
  doi       = {10.1504/IJESDF.2021.114957},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Al-SibaiAE21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AlsaffarEA21,
  author    = {Nawal Alsaffar and
               Wael M. El{-}Medany and
               Hayat Ali},
  title     = {Low complexity cybersecurity architecture for the development of {ITS}
               in smart cities},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {6},
  pages     = {571--599},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.118544},
  doi       = {10.1504/IJESDF.2021.118544},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AlsaffarEA21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ApenovJMKK21,
  author    = {Serik M. Apenov and
               Nurbol S. Jetibayev and
               Mariyash K. Makisheva and
               Guldana A. Kuanalieva and
               Sergazy Kussainov},
  title     = {International crime as a threat to global socio-economic security},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {2},
  pages     = {133--154},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.113387},
  doi       = {10.1504/IJESDF.2021.113387},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ApenovJMKK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ApenovTGBM21,
  author    = {Serik M. Apenov and
               Almagul Zh. Tusupova and
               Natalya V. Gileva and
               Dina M. Baimakhanova and
               Mariyash K. Makisheva},
  title     = {Methods of ensuring the principle of adversary of the parties during
               the pre-trial stage of the criminal process},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {4},
  pages     = {359--372},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.116023},
  doi       = {10.1504/IJESDF.2021.116023},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ApenovTGBM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ArynASZO21,
  author    = {Aizhan Aryn and
               Sagyngaliy Aidarbayev and
               Assel Sharipova and
               Akynkozha Zhanibekov and
               Aina Otarbayeva},
  title     = {International and interstate aspects of ensuring the rights of the
               suspect and the accused in the proceedings of forensic investigation},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {2},
  pages     = {155--179},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.113386},
  doi       = {10.1504/IJESDF.2021.113386},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ArynASZO21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BabuU21,
  author    = {Kudrat{-}E.{-}Khuda Babu and
               Md. Ahsan Ullah},
  title     = {Cyber legislation and cyber-related legal issues in Bangladesh: inadequacies
               and challenges},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {2},
  pages     = {180--196},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.113379},
  doi       = {10.1504/IJESDF.2021.113379},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BabuU21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BharadwajaG21,
  author    = {A. Vyasa Bharadwaja and
               V. Ganesan},
  title     = {A novel hybrid image hiding technique using elliptic curve cryptography
               and {DNA} computing technique},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {4},
  pages     = {460--473},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.116020},
  doi       = {10.1504/IJESDF.2021.116020},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BharadwajaG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BouyerZ21,
  author    = {Asgarali Bouyer and
               Mojtaba Zirak},
  title     = {Digital forensics in private Seafile cloud storage from both client
               and server side},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {3},
  pages     = {233--267},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.114954},
  doi       = {10.1504/IJESDF.2021.114954},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BouyerZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/FrancoisN21,
  author    = {Alicia Francois and
               Alastair Nisbet},
  title     = {Forensic analysis and data recovery from water-submerged hard drives},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {2},
  pages     = {219--231},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.113374},
  doi       = {10.1504/IJESDF.2021.113374},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/FrancoisN21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GaoZ21,
  author    = {Ronghai Gao and
               Jiwen Zeng},
  title     = {Forward secure certificateless proxy multi-signature scheme},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {1},
  pages     = {1--27},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.111718},
  doi       = {10.1504/IJESDF.2021.111718},
  timestamp = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GaoZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JoseS21,
  author    = {Mitha Rachel Jose and
               J. Amar Pratap Singh},
  title     = {Security challenges for routing protocols in mobile ad hoc network:
               a systematic review and open research issues},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {3},
  pages     = {268--297},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.114963},
  doi       = {10.1504/IJESDF.2021.114963},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/JoseS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Joy021,
  author    = {A. Shakeela Joy and
               R. Ravi},
  title     = {Smart card authentication model based on elliptic curve cryptography
               in IoT networks},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {5},
  pages     = {548--569},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.117314},
  doi       = {10.1504/IJESDF.2021.117314},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Joy021.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KhanA21,
  author    = {Abdullah Ayub Khan and
               Syed Asif Ali},
  title     = {Network forensics investigation: behaviour analysis of distinct operating
               systems to detect and identify the host in IPv6 network},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {6},
  pages     = {600--611},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.118542},
  doi       = {10.1504/IJESDF.2021.118542},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KhanA21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KonyavskyRSKZ21,
  author    = {Valery A. Konyavsky and
               Gennady V. Ross and
               Artem M. Sychev and
               Viktor N. Kvasnitsky and
               Tamara B. Zhuravleva},
  title     = {The upgrade of security of automated process control systems},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {5},
  pages     = {515--527},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.117311},
  doi       = {10.1504/IJESDF.2021.117311},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KonyavskyRSKZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Kumar21,
  author    = {Manish Kumar},
  title     = {Mobile phone forensics - a systematic approach, tools, techniques
               and challenges},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {1},
  pages     = {64--87},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.111725},
  doi       = {10.1504/IJESDF.2021.111725},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Kumar21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Lewulis21,
  author    = {Piotr Lewulis},
  title     = {Digital forensic standards and digital evidence in Polish criminal
               proceedings. An updated definition of digital evidence in forensic
               science},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {4},
  pages     = {403--417},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.116024},
  doi       = {10.1504/IJESDF.2021.116024},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Lewulis21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/LoikoAVZL21,
  author    = {Valeriia V. Loiko and
               Olena S. Aleksandrova and
               Nataliia N. Vinnikova and
               Vitaliy N. Zavadskyi and
               Daria N. Loiko},
  title     = {Methodical tools for security level diagnostics of the modern university's
               activity},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {2},
  pages     = {115--132},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.113385},
  doi       = {10.1504/IJESDF.2021.113385},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/LoikoAVZL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ManeK21,
  author    = {Yogita Deepak Mane and
               Uday Pandit Khot},
  title     = {An efficient technique to detect slow rate DDoS attack from a private
               Tor network},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {1},
  pages     = {88--104},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.111726},
  doi       = {10.1504/IJESDF.2021.111726},
  timestamp = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ManeK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MistryKJ21,
  author    = {Nilay R. Mistry and
               Sampada Kanitkar and
               S. O. Junare},
  title     = {Volatile memory forensics of privacy-aware operating systems},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {6},
  pages     = {671--684},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.118548},
  doi       = {10.1504/IJESDF.2021.118548},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MistryKJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MistryS21,
  author    = {Nilay R. Mistry and
               Hitesh P. Sanghvi},
  title     = {Drone forensics: investigative guide for law enforcement agencies},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {3},
  pages     = {334--345},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.114950},
  doi       = {10.1504/IJESDF.2021.114950},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MistryS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MontasariMFCD21,
  author    = {Reza Montasari and
               Stuart Macdonald and
               Amin Hosseinian Far and
               Fiona Carroll and
               Alireza Daneshkhah},
  title     = {Network and hypervisor-based attacks in cloud computing environments},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {6},
  pages     = {630--651},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.118549},
  doi       = {10.1504/IJESDF.2021.118549},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MontasariMFCD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PaikaraySC21,
  author    = {Bijay Kumar Paikaray and
               Debabala Swain and
               Sujata Chakravarty},
  title     = {Reversible selective embedding for {DICOM} image security and integrity
               using visual cryptography},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {5},
  pages     = {498--514},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.117306},
  doi       = {10.1504/IJESDF.2021.117306},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PaikaraySC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Polovchenko21,
  author    = {Konstantin A. Polovchenko},
  title     = {Constitutional foundations of the security system in a modern state},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {4},
  pages     = {390--402},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.116021},
  doi       = {10.1504/IJESDF.2021.116021},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Polovchenko21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RaskarS21,
  author    = {Punam Sunil Raskar and
               Sanjeevani Kiran Shah},
  title     = {Methods for forgery detection in digital forensics},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {5},
  pages     = {528--547},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.117310},
  doi       = {10.1504/IJESDF.2021.117310},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/RaskarS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RodriguesB21,
  author    = {Anjana Rodrigues and
               Archana Bhise},
  title     = {Digital watermarking of compressed videos using larger dimension 2D
               error correcting codes for higher embedding capacity},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {6},
  pages     = {652--670},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.118546},
  doi       = {10.1504/IJESDF.2021.118546},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/RodriguesB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RozvadovskyZA21,
  author    = {Volodymyr I. Rozvadovsky and
               Liubomyr V. Zinych and
               Andriy A. Albu},
  title     = {Post-Soviet Estonia's information safety: lessons for Ukraine},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {1},
  pages     = {53--63},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.111733},
  doi       = {10.1504/IJESDF.2021.111733},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/RozvadovskyZA21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SekharS21,
  author    = {P. N. R. L. Chandra Sekhar and
               T. N. Shankar},
  title     = {Splicing forgery localisation using colour illumination inconsistencies},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {3},
  pages     = {346--358},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.114956},
  doi       = {10.1504/IJESDF.2021.114956},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SekharS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SinghKK21,
  author    = {Brajesh Kumar Singh and
               Ravinder Kumar and
               R. Rama Kishore},
  title     = {{LB} and {LT} feature approach to personal identification using finger
               knuckle image biological trait},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {4},
  pages     = {445--459},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.116016},
  doi       = {10.1504/IJESDF.2021.116016},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SinghKK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SitsinskaSKKB21,
  author    = {Maya Sitsinska and
               Anatoliy Sitsinskiy and
               Nataliia Kravtsova and
               Svitlana Khadzhyradieva and
               Yurii Baiun},
  title     = {Threats to the state security of Ukraine in the humanitarian sphere:
               sociological dimension},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {4},
  pages     = {373--389},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.116022},
  doi       = {10.1504/IJESDF.2021.116022},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SitsinskaSKKB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SonAT21,
  author    = {Le Dinh Son and
               Tran Van An and
               Nguyen Ngoc Thuy},
  title     = {Improving the asymmetric encryption algorithm based on genetic algorithm,
               application in online information transmission},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {6},
  pages     = {612--629},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.118543},
  doi       = {10.1504/IJESDF.2021.118543},
  timestamp = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SonAT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TkachukCKSO21,
  author    = {Taras Y. Tkachuk and
               Leontii G. Chystokletov and
               Oleksandra L. Khytra and
               Valerii V. Shyshko and
               Leonid O. Ostapenko},
  title     = {Philosophical reflections on the information society in the context
               of a security-creating paradigm},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {1},
  pages     = {105--113},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.111734},
  doi       = {10.1504/IJESDF.2021.111734},
  timestamp = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TkachukCKSO21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/UtakritW21,
  author    = {Nathaporn Utakrit and
               Pongpisit Wuttidittachotti},
  title     = {Possible attempts to identify e-mail header of the sender for academic
               qualification fraud},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {1},
  pages     = {28--52},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.111719},
  doi       = {10.1504/IJESDF.2021.111719},
  timestamp = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/UtakritW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/VenkateswarluN21,
  author    = {Chittetti Venkateswarlu and
               Venkateswara Rao Nandanavanam},
  title     = {A robust and secure time-domain interference cancellation using optimisation
               method in {MIMO-OFDM} system},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {2},
  pages     = {197--218},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.113388},
  doi       = {10.1504/IJESDF.2021.113388},
  timestamp = {Mon, 10 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/VenkateswarluN21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Weeks021,
  author    = {Doug Weeks and
               Bing Zhou},
  title     = {Physical security design of a digital forensic lab},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {13},
  number    = {4},
  pages     = {418--444},
  year      = {2021},
  url       = {https://doi.org/10.1504/IJESDF.2021.116017},
  doi       = {10.1504/IJESDF.2021.116017},
  timestamp = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Weeks021.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AgrawalSSK20,
  author    = {Animesh Kumar Agrawal and
               Aman Sharma and
               Sumitra Ranjan Sinha and
               Pallavi Khatri},
  title     = {Forensic of an unrooted mobile device},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {1},
  pages     = {118--137},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.103882},
  doi       = {10.1504/IJESDF.2020.103882},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AgrawalSSK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AlMajaliWSSN20,
  author    = {Anas AlMajali and
               Yatin Wadhawan and
               Mahmood S. Saadeh and
               Laith Shalalfeh and
               Clifford Neuman},
  title     = {Risk assessment of smart grids under cyber-physical attacks using
               Bayesian networks},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {4},
  pages     = {357--385},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.110660},
  doi       = {10.1504/IJESDF.2020.110660},
  timestamp = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AlMajaliWSSN20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ArogundadeAM20,
  author    = {Oluwasefunmi 'Tale Arogundade and
               Temitope Elizabeth Abioye and
               Sanjay Misra},
  title     = {An ontological approach to threats pattern collection and classification:
               a preliminary study to security management},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {3},
  pages     = {323--335},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.108320},
  doi       = {10.1504/IJESDF.2020.108320},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ArogundadeAM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AzeemHDAD20,
  author    = {Muhammad Azeem and
               Jingsha He and
               Allah Ditta and
               Faheem Akhtar and
               Sher Muhammad Daudpota},
  title     = {A novel approach to secret data concealment with high cover text capacity
               and security},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {1},
  pages     = {77--98},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.103878},
  doi       = {10.1504/IJESDF.2020.103878},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AzeemHDAD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AzeezSMDM20,
  author    = {Nureni Ayofe Azeez and
               Balikis Bolanle Salaudeen and
               Sanjay Misra and
               Robertas Damasevicius and
               Rytis Maskeliunas},
  title     = {Identifying phishing attacks in communication networks using {URL}
               consistency features},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {2},
  pages     = {200--213},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.106318},
  doi       = {10.1504/IJESDF.2020.106318},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AzeezSMDM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BanikB20,
  author    = {Barnali Gupta Banik and
               Abhinandan Banik},
  title     = {Robust, imperceptible and blind video steganography using {RGB} secret,
               maximum likelihood estimation and Fibonacci encryption},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {2},
  pages     = {174--199},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.106310},
  doi       = {10.1504/IJESDF.2020.106310},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BanikB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ChauhanC20,
  author    = {Kalpana Chauhan and
               Rajeev Kumar Chauhan},
  title     = {Design and development of two levels electronic security and safety
               system for buildings},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {3},
  pages     = {279--292},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.108297},
  doi       = {10.1504/IJESDF.2020.108297},
  timestamp = {Thu, 03 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ChauhanC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GangardeOC20,
  author    = {Mahesh Gangarde and
               Shruti Oza and
               Janardhan Chitode},
  title     = {Authenticate audio video-crypto invisible watermarking approach for
               enhancing hidden information security and robustness},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {1},
  pages     = {16--42},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.103871},
  doi       = {10.1504/IJESDF.2020.103871},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GangardeOC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HerbadjiDBTB20,
  author    = {Djamel Herbadji and
               Nadir Derouiche and
               A{\"{\i}}ssa Belmeguena{\"{\i}} and
               Nedal Tahat and
               Selma Boumerdassi},
  title     = {A new colour image encryption approach using a combination of two
               1D chaotic map},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {4},
  pages     = {337--356},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.110649},
  doi       = {10.1504/IJESDF.2020.110649},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/HerbadjiDBTB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Javadi-Moghaddam20,
  author    = {Seyyed{-}Mohammad Javadi{-}Moghaddam and
               Mohammad Golami},
  title     = {Detecting phishing pages using the relief feature selection and multiple
               classifiers},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {2},
  pages     = {229--242},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.106325},
  doi       = {10.1504/IJESDF.2020.106325},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Javadi-Moghaddam20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KardarasLK20,
  author    = {Konstantinos Kardaras and
               George I. Lambrou and
               Dimitrios D. Koutsouris},
  title     = {Security efficient command control communication and integration with
               digital television},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {3},
  pages     = {293--301},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.108298},
  doi       = {10.1504/IJESDF.2020.108298},
  timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KardarasLK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KhanujaA20,
  author    = {Harmeet Kaur Khanuja and
               Dattatraya S. Adane},
  title     = {Monitor and detect suspicious transactions with database forensics
               and Dempster-Shafer theory of evidence},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {2},
  pages     = {154--173},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.106302},
  doi       = {10.1504/IJESDF.2020.106302},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KhanujaA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KussainovaOOKA20,
  author    = {Ainur K. Kussainova and
               Aiman B. Omarova and
               Djamilya A. Ospanova and
               Duman O. Kussainov and
               Rysgul Abilsheyeva},
  title     = {Problems of legal regulations of relations in the sphere of the electronic
               document flow},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {3},
  pages     = {302--322},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.108301},
  doi       = {10.1504/IJESDF.2020.108301},
  timestamp = {Thu, 03 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KussainovaOOKA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/LakbayevRUS20,
  author    = {Kanat S. Lakbayev and
               Gulnara M. Rysmagambetova and
               Alizhan U. Umetov and
               Askar K. Sysoyev},
  title     = {The crimes in the field of high technology: concept, problems and
               methods of counteraction in Kazakhstan},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {4},
  pages     = {412--423},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.110651},
  doi       = {10.1504/IJESDF.2020.110651},
  timestamp = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/LakbayevRUS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MasoumiD20,
  author    = {Massoud Masoumi and
               Ali Dehghan},
  title     = {Design and implementation of a ring oscillator-based physically unclonable
               function on field programmable gate array to enhance electronic security},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {3},
  pages     = {243--261},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.108295},
  doi       = {10.1504/IJESDF.2020.108295},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MasoumiD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MondalS20,
  author    = {Jayanta Mondal and
               Debabala Swain},
  title     = {A 3-layer {RDH} method in encrypted domain for medical information
               security},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {1},
  pages     = {1--15},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.103869},
  doi       = {10.1504/IJESDF.2020.103869},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MondalS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MontasariHMJF20,
  author    = {Reza Montasari and
               Richard Hill and
               Farshad Montaseri and
               Hamid Jahankhani and
               Amin Hosseinian Far},
  title     = {Internet of things devices: digital forensic process and data reduction},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {4},
  pages     = {424--436},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.110676},
  doi       = {10.1504/IJESDF.2020.110676},
  timestamp = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MontasariHMJF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MontasariHPDF20,
  author    = {Reza Montasari and
               Richard Hill and
               Simon Parkinson and
               Alireza Daneshkhah and
               Amin Hosseinian Far},
  title     = {Hardware-based cyber threats: attack vectors and defence techniques},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {4},
  pages     = {397--411},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.110675},
  doi       = {10.1504/IJESDF.2020.110675},
  timestamp = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MontasariHPDF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RaymondR20,
  author    = {V. Joseph Raymond and
               R. Jeberson Retna Raj},
  title     = {Reversing and auditing of android malicious applications using sandboxing
               environment},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {4},
  pages     = {386--396},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.110674},
  doi       = {10.1504/IJESDF.2020.110674},
  timestamp = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/RaymondR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SadiAB20,
  author    = {Mustapha Sadi and
               Mourad Amad and
               Nadjib Badache},
  title     = {Improving performance overhead of a trust-clustering key management
               protocol in ad hoc networks},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {2},
  pages     = {214--228},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.106319},
  doi       = {10.1504/IJESDF.2020.106319},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SadiAB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SaxenaST20,
  author    = {Utkarsh Saxena and
               J. S. Sodhi and
               Rajneesh Tanwar},
  title     = {Augmenting smart home network security using blockchain technology},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {1},
  pages     = {99--117},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.103881},
  doi       = {10.1504/IJESDF.2020.103881},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SaxenaST20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SharmaAS20,
  author    = {Puneet Sharma and
               Deepak Arora and
               T. Sakthivel},
  title     = {UML-based process model for mobile cloud forensic application framework
               - a preliminary study},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {3},
  pages     = {262--278},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.108296},
  doi       = {10.1504/IJESDF.2020.108296},
  timestamp = {Thu, 03 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SharmaAS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TalibAK20,
  author    = {Manar AbuTalib and
               Reem Alnanih and
               Adel Khelifi},
  title     = {Application of quality in use model to assess the user experience
               of open source digital forensics tools},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {1},
  pages     = {43--76},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.103870},
  doi       = {10.1504/IJESDF.2020.103870},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TalibAK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhangZZXZ20,
  author    = {Xiaojun Zhang and
               Ziyu Zhou and
               Jingwei Zhang and
               Chunxiang Xu and
               Xinpeng Zhang},
  title     = {Efficient light-weight private auditing scheme for cloud-based wireless
               body area networks},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {12},
  number    = {2},
  pages     = {139--153},
  year      = {2020},
  url       = {https://doi.org/10.1504/IJESDF.2020.106301},
  doi       = {10.1504/IJESDF.2020.106301},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZhangZZXZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AnandK19,
  author    = {Darpan Anand and
               Vineeta Khemchandani},
  title     = {Study of e-governance in India: a survey},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {2},
  pages     = {119--144},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.098729},
  doi       = {10.1504/IJESDF.2019.098729},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AnandK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AttallahSCB19,
  author    = {Bilal Attallah and
               Amina Serir and
               Youssef Chahir and
               Abdelwahhab Boudjelal},
  title     = {Superpixel-based Zernike moments for palm-print recognition},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {4},
  pages     = {420--433},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.102561},
  doi       = {10.1504/IJESDF.2019.102561},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AttallahSCB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AzeemHRR19,
  author    = {Muhammad Azeem and
               Jingsha He and
               Khurram Gulzar Rana and
               Faheem Akhtar Rajpoot},
  title     = {A cryptographic data hiding algorithm with high cover text capacity},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {2},
  pages     = {225--244},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.098804},
  doi       = {10.1504/IJESDF.2019.098804},
  timestamp = {Wed, 27 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AzeemHRR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BarzaminiG19,
  author    = {Hamed Barzamini and
               Mona Ghassemian},
  title     = {Comparison analysis of electricity theft detection methods for advanced
               metering infrastructure in smart grid},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {3},
  pages     = {265--280},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.100475},
  doi       = {10.1504/IJESDF.2019.100475},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BarzaminiG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BharadwajaG19,
  author    = {A. Vyasa Bharadwaja and
               V. Ganesan},
  title     = {A survey on security analysis and privacy issues of wireless multimedia
               communication system},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {3},
  pages     = {338--346},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.100484},
  doi       = {10.1504/IJESDF.2019.100484},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BharadwajaG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ElkamchouchiSA19,
  author    = {Hassan M. Elkamchouchi and
               Wessam M. Salama and
               Yasmine Abouelseoud},
  title     = {ArMTFr: a new permutation-based image encryption scheme},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {1},
  pages     = {1--28},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.096516},
  doi       = {10.1504/IJESDF.2019.096516},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ElkamchouchiSA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GranjaRHY19,
  author    = {Fernando Molina Granja and
               Glen D. Rodriguez Rafael and
               Edmundo Cabezas Heredia and
               Ra{\'{u}}l Lozada Y{\'{a}}nez},
  title     = {Implementation of the {PREDECI} model in the prosecution of Chimborazo
               in Ecuador: a case study evaluation},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {1},
  pages     = {29--45},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.096526},
  doi       = {10.1504/IJESDF.2019.096526},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GranjaRHY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/IqbalYAAQSB19,
  author    = {Farkhund Iqbal and
               Benjamin Yankson and
               Maryam A. AlYammahi and
               Naeema AlMansoori and
               Suaad Mohammed Qayed and
               Babar Shah and
               Thar Baker},
  title     = {Drone forensics: examination and analysis},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {3},
  pages     = {245--264},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.100473},
  doi       = {10.1504/IJESDF.2019.100473},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/IqbalYAAQSB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KardarasLK19,
  author    = {Konstantinos Kardaras and
               George I. Lambrou and
               Dimitrios D. Koutsouris},
  title     = {Security methods and approaches for internal and external network
               hospital information systems with single sign-on},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {4},
  pages     = {434--446},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.102563},
  doi       = {10.1504/IJESDF.2019.102563},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KardarasLK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KarthikeyanSH19,
  author    = {Karthikeyan Balasubramanian and
               Venkata Keerthy S and
               G. Hariharan},
  title     = {Secure Gray code-based reversible data hiding scheme in radiographic
               images},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {3},
  pages     = {347--362},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.100489},
  doi       = {10.1504/IJESDF.2019.100489},
  timestamp = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KarthikeyanSH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/LeeLCCL19,
  author    = {Cheng{-}Chi Lee and
               Chun{-}Ta Li and
               Zhi{-}Wei Chen and
               Shun{-}Der Chen and
               Yan{-}Ming Lai},
  title     = {A novel authentication scheme for anonymity and digital rights management
               based on elliptic curve cryptography},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {1},
  pages     = {96--117},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.096529},
  doi       = {10.1504/IJESDF.2019.096529},
  timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/LeeLCCL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/LiZT19,
  author    = {Li Li and
               Siqin Zhou and
               Hang Tu},
  title     = {Fingerprint authentication based on fuzzy extractor in the mobile
               device},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {3},
  pages     = {321--337},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.100479},
  doi       = {10.1504/IJESDF.2019.100479},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/LiZT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MehtaDK19,
  author    = {Garima Mehta and
               Malay Kishore Dutta and
               Pyung Soo Kim},
  title     = {Biometric data security using joint encryption and watermarking},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {4},
  pages     = {379--394},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.102543},
  doi       = {10.1504/IJESDF.2019.102543},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MehtaDK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MoalosiHP19,
  author    = {Motlhaleemang Moalosi and
               Hlomani Hlomani and
               Othusitse S. D. Phefo},
  title     = {Combating credit card fraud with online behavioural targeting and
               device fingerprinting},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {1},
  pages     = {46--69},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.096527},
  doi       = {10.1504/IJESDF.2019.096527},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MoalosiHP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MondalSP19,
  author    = {Jayanta Mondal and
               Debabala Swain and
               Devee Darshani Panda},
  title     = {A novel LSB-based {RDH} with dual embedding for encrypted images},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {3},
  pages     = {281--293},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.100477},
  doi       = {10.1504/IJESDF.2019.100477},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MondalSP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MontasariCH19,
  author    = {Reza Montasari and
               Victoria Carpenter and
               Richard Hill},
  title     = {A road map for digital forensics research: a novel approach for establishing
               the design science research process in digital forensics},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {2},
  pages     = {194--224},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.098784},
  doi       = {10.1504/IJESDF.2019.098784},
  timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MontasariCH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MontasariHFM19,
  author    = {Reza Montasari and
               Richard Hill and
               Amin Hosseinian Far and
               Farshad Montaseri},
  title     = {Countermeasures for timing-based side-channel attacks against shared,
               modern computing hardware},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {3},
  pages     = {294--320},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.100480},
  doi       = {10.1504/IJESDF.2019.100480},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MontasariHFM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MoonR19,
  author    = {Sunil K. Moon and
               Rajeshree D. Raut},
  title     = {Information security model using data embedding technique for enhancing
               perceptibility and robustness},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {1},
  pages     = {70--95},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.096528},
  doi       = {10.1504/IJESDF.2019.096528},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MoonR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/NguyenV19,
  author    = {Hieu Cuong Nguyen and
               Duc Thang Vo},
  title     = {Using machine learning and the first digit law to detect forgeries
               in digital images},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {4},
  pages     = {447--457},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.102565},
  doi       = {10.1504/IJESDF.2019.102565},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/NguyenV19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PieterseOH19,
  author    = {Heloise Pieterse and
               Martin Olivier and
               Renier van Heerden},
  title     = {Evaluation of smartphone data using a reference architecture},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {2},
  pages     = {160--182},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.098773},
  doi       = {10.1504/IJESDF.2019.098773},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PieterseOH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PrayudiAP19,
  author    = {Yudi Prayudi and
               Ahmad Ashari and
               Tri Kuntoro Priyambodo},
  title     = {The pseudo metadata concept for the chain of custody of digital evidence},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {4},
  pages     = {395--419},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.102554},
  doi       = {10.1504/IJESDF.2019.102554},
  timestamp = {Wed, 19 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PrayudiAP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SahuS19,
  author    = {Aditya Kumar Sahu and
               Gandharba Swain},
  title     = {Data hiding using adaptive {LSB} and {PVD} technique resisting {PDH}
               and {RS} analysis},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {4},
  pages     = {458--476},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.102567},
  doi       = {10.1504/IJESDF.2019.102567},
  timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SahuS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Saleh19,
  author    = {Malik F. Saleh},
  title     = {Malware detection model based on classifying system calls and code
               attributes: a proof of concept},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {2},
  pages     = {183--193},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.098772},
  doi       = {10.1504/IJESDF.2019.098772},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Saleh19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SinS19,
  author    = {Jong{-}Min Sin and
               Hye{-}Ryon Son},
  title     = {Dealing with the problem of collection and analysis of electronic
               evidence},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {3},
  pages     = {363--377},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.100497},
  doi       = {10.1504/IJESDF.2019.100497},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SinS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WangL19,
  author    = {Xian Wang and
               Bing{-}Zhao Li},
  title     = {A novel median filtering forensics based on principal component analysis
               network},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {2},
  pages     = {145--159},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.098771},
  doi       = {10.1504/IJESDF.2019.098771},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/WangL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhangZMZ19,
  author    = {Xiaojun Zhang and
               Jie Zhao and
               Liming Mu and
               Xinpeng Zhang},
  title     = {Cost-effective provable secure cloud storage self-auditing scheme
               for big data in {WMSNS}},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {11},
  number    = {4},
  pages     = {477--490},
  year      = {2019},
  url       = {https://doi.org/10.1504/IJESDF.2019.102566},
  doi       = {10.1504/IJESDF.2019.102566},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZhangZMZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Arabeyyat18,
  author    = {Omar Suleiman Arabeyyat},
  title     = {Information security model using decision tree for Jordanian public
               sector},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {3},
  pages     = {228--241},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10013062},
  doi       = {10.1504/IJESDF.2018.10013062},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Arabeyyat18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BarikSC18,
  author    = {Ram Chandra Barik and
               Sitanshu Sekhar Sahu and
               Suvamoy Changder},
  title     = {A novel smooth texture-based visual cryptography approach for secure
               communication},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {2},
  pages     = {109--137},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10011976},
  doi       = {10.1504/IJESDF.2018.10011976},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BarikSC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ChenD18,
  author    = {Xiaojuan Chen and
               Huiwen Deng},
  title     = {A new scheme of preserving user privacy for location-based service},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {4},
  pages     = {417--433},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.095152},
  doi       = {10.1504/IJESDF.2018.095152},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ChenD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/CuiT18,
  author    = {Jingsong Cui and
               Hang Tu},
  title     = {Secure and efficient authentication scheme for access control in mobile
               pay-TV systems},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {3},
  pages     = {292--310},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10013063},
  doi       = {10.1504/IJESDF.2018.10013063},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/CuiT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DalalJ18,
  author    = {Mukesh Dalal and
               Mamta Juneja},
  title     = {Video steganalysis to obstruct criminal activities for digital forensics:
               a survey},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {4},
  pages     = {338--355},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.095122},
  doi       = {10.1504/IJESDF.2018.095122},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/DalalJ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DittaCARYM18,
  author    = {Allah Ditta and
               Yongquan Cai and
               Muhammad Azeem and
               Khurram Gulzar Rana and
               Haiyang Yu and
               Muhammad Qasim Memon},
  title     = {Information hiding: Arabic text steganography by using Unicode characters
               to hide secret data},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {1},
  pages     = {61--78},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10009832},
  doi       = {10.1504/IJESDF.2018.10009832},
  timestamp = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/DittaCARYM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DrooganW18,
  author    = {Julian Droogan and
               Lise Waldek},
  title     = {Should we be afraid of cyber-terrorism?},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {3},
  pages     = {242--254},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10013064},
  doi       = {10.1504/IJESDF.2018.10013064},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/DrooganW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GabetSR18,
  author    = {Ryan M. Gabet and
               Kathryn C. Seigfried{-}Spellar and
               Marcus K. Rogers},
  title     = {A comparative forensic analysis of privacy enhanced web browsers and
               private browsing modes of common web browsers},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {4},
  pages     = {356--371},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.095126},
  doi       = {10.1504/IJESDF.2018.095126},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GabetSR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GuptaMS18,
  author    = {Surbhi Gupta and
               Neeraj Mohan and
               Parvinder Singh Sandhu},
  title     = {Energy deviation measure: a technique for digital image forensics},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {4},
  pages     = {401--416},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.095141},
  doi       = {10.1504/IJESDF.2018.095141},
  timestamp = {Fri, 05 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GuptaMS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/IrshadAMAH18,
  author    = {Mustafa Irshad and
               Haider M. Al{-}Khateeb and
               Ali Mansour and
               Moses Ashawa and
               Muhammad Hamisu},
  title     = {Effective methods to detect metamorphic malware: a systematic review},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {2},
  pages     = {138--154},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10011975},
  doi       = {10.1504/IJESDF.2018.10011975},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/IrshadAMAH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JiaoX18,
  author    = {Chunhong Jiao and
               Xinyin Xiang},
  title     = {Attribute-based encryption supporting data filtration over post-quantum
               assumptions},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {4},
  pages     = {323--337},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.095113},
  doi       = {10.1504/IJESDF.2018.095113},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/JiaoX18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JinZ18,
  author    = {Chunhua Jin and
               Jianyang Zhao},
  title     = {Certificateless aggregate deniable authentication protocol for ad
               hoc networks},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {2},
  pages     = {168--187},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10010114},
  doi       = {10.1504/IJESDF.2018.10010114},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/JinZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KallashLLA18,
  author    = {Mohammad Muneer Kallash and
               Jonathan Loo and
               Aboubaker Lasebae and
               Mahdi Aiash},
  title     = {A security framework for node-to-node communications based on the
               {LISP} architecture},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {3},
  pages     = {276--291},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10013042},
  doi       = {10.1504/IJESDF.2018.10013042},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KallashLLA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KapurKP18,
  author    = {Raj Kamal Kapur and
               Sunil Kumar Khatri and
               Lalit M. Patnaik},
  title     = {Optimised elliptic curve digital signature on {NIST} compliant curves
               for authentication of {MANET} nodes},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {4},
  pages     = {372--387},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.095139},
  doi       = {10.1504/IJESDF.2018.095139},
  timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KapurKP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MancyV18,
  author    = {L. Mancy and
               S. Maria Celestin Vigila},
  title     = {A new diffusion and substitution based cryptosystem for securing medical
               image applications},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {4},
  pages     = {388--400},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.095140},
  doi       = {10.1504/IJESDF.2018.095140},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MancyV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Mesleh18,
  author    = {Abdelwadood Mesleh},
  title     = {Black hole attack evaluation for {AODV} and {AOMDV} routing protocols},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {3},
  pages     = {207--227},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10013056},
  doi       = {10.1504/IJESDF.2018.10013056},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Mesleh18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Nasrullah18,
  author    = {Mohammed A. Nasrullah},
  title     = {{LSB} based audio steganography preserving minimum sample {SNR}},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {3},
  pages     = {311--321},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10013069},
  doi       = {10.1504/IJESDF.2018.10013069},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Nasrullah18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/QuM18,
  author    = {Yunyun Qu and
               Quanwu Mu},
  title     = {An efficient certificateless aggregate signature without pairing},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {2},
  pages     = {188--203},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10011982},
  doi       = {10.1504/IJESDF.2018.10011982},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/QuM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ShokouhyarPKN18,
  author    = {Sajjad Shokouhyar and
               Farhad Panahifar and
               Azadeh Karimisefat and
               Maryam Nezafatbakhsh},
  title     = {An information system risk assessment model: a case study in online
               banking system},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {1},
  pages     = {39--60},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10009830},
  doi       = {10.1504/IJESDF.2018.10009830},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ShokouhyarPKN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TahatI18,
  author    = {Nedal Tahat and
               Eddie Shahril Ismail},
  title     = {Improvement of signature scheme based on factoring and chaotic maps},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {2},
  pages     = {155--167},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10011979},
  doi       = {10.1504/IJESDF.2018.10011979},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TahatI18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TammaA18,
  author    = {Lakshmi Naga Divya Tamma and
               Shaik Shakeel Ahamad},
  title     = {A novel chaotic hash-based attribute-based encryption and decryption
               on cloud computing},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {1},
  pages     = {1--19},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10009829},
  doi       = {10.1504/IJESDF.2018.10009829},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TammaA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TangALD18,
  author    = {MingJian Tang and
               Mamoun Alazab and
               Yuxiu Luo and
               Matthew Donlon},
  title     = {Disclosure of cyber security vulnerabilities: time series modelling},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {3},
  pages     = {255--275},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10013065},
  doi       = {10.1504/IJESDF.2018.10013065},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TangALD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/XuKWW18,
  author    = {Hongcai Xu and
               Xiaobing Kang and
               Yihan Wang and
               Yilan Wang},
  title     = {Exploring robust and blind watermarking approach of colour images
               in {DWT-DCT-SVD} domain for copyright protection},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {1},
  pages     = {79--96},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10009833},
  doi       = {10.1504/IJESDF.2018.10009833},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/XuKWW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhangXX18,
  author    = {Xiaojun Zhang and
               Chunxiang Xu and
               Jingting Xue},
  title     = {Efficient multi-receiver identity-based signcryption from lattice
               assumption},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {1},
  pages     = {20--38},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10009828},
  doi       = {10.1504/IJESDF.2018.10009828},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZhangXX18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Zhuo18,
  author    = {Zhihai Zhuo},
  title     = {Novel image watermarking method based on {FRWT} and {SVD}},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {10},
  number    = {1},
  pages     = {97--107},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJESDF.2018.10009836},
  doi       = {10.1504/IJESDF.2018.10009836},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Zhuo18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Al-SalehA17,
  author    = {Mohammed I. Al{-}Saleh and
               Mona J. Al{-}Shamaileh},
  title     = {Forensic artefacts associated with intentionally deleted user accounts},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {2},
  pages     = {167--179},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10003678},
  doi       = {10.1504/IJESDF.2017.10003678},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Al-SalehA17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Ashouri-Talouki17,
  author    = {Maede Ashouri{-}Talouki and
               Ahmad Baraani{-}Dastjerdi},
  title     = {Cryptographic collusion-resistant protocols for secure sum},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {1},
  pages     = {19--34},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10002631},
  doi       = {10.1504/IJESDF.2017.10002631},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Ashouri-Talouki17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BarnardHD17,
  author    = {Jacques Barnard and
               Magda Huisman and
               G{\"{u}}nther Drevin},
  title     = {Security awareness and the use of location-based services, technologies
               and games},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {4},
  pages     = {293--325},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10008010},
  doi       = {10.1504/IJESDF.2017.10008010},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BarnardHD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ChandeCL17,
  author    = {Manoj Kumar Chande and
               Te{-}Yu Chen and
               Cheng{-}Chi Lee},
  title     = {An improved multi-signature scheme for specified group of verifiers},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {2},
  pages     = {180--190},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10004414},
  doi       = {10.1504/IJESDF.2017.10004414},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ChandeCL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ChenCS17,
  author    = {Haoran Chen and
               Jianhua Chen and
               Han Shen},
  title     = {An improved authenticated key agreement with anonymity for session
               initiation protocol},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {2},
  pages     = {132--149},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10004413},
  doi       = {10.1504/IJESDF.2017.10004413},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ChenCS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/CulmoneV17,
  author    = {Rosario Culmone and
               Maria Concetta De Vivo},
  title     = {Vanishing files: protocols and regulations for immaterial documents},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {1},
  pages     = {45--61},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10002641},
  doi       = {10.1504/IJESDF.2017.10002641},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/CulmoneV17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/CunhaCP17,
  author    = {Ilane Cunha and
               Jefferson Rodrigo A. Cavalcante and
               Ahmed Patel},
  title     = {A proposal for curriculum development of educating and training Brazilian
               police officers in digital forensics investigation and cybercrime
               prosecution},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {3},
  pages     = {209--238},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10005633},
  doi       = {10.1504/IJESDF.2017.10005633},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/CunhaCP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GranjaR17,
  author    = {Fernando Molina Granja and
               Glen D. Rodriguez Rafael},
  title     = {The preservation of digital evidence and its admissibility in the
               court},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {1},
  pages     = {1--18},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10002624},
  doi       = {10.1504/IJESDF.2017.10002624},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GranjaR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GranjaR17a,
  author    = {Fernando Molina Granja and
               Glen D. Rodriguez Rafael},
  title     = {Model for digital evidence preservation in criminal research institutions
               - {PREDECI}},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {2},
  pages     = {150--166},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10004412},
  doi       = {10.1504/IJESDF.2017.10004412},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GranjaR17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HinteaBG17,
  author    = {Diana Hintea and
               Robert Bird and
               Michael Green},
  title     = {An investigation into the forensic implications of the Windows 10
               operating system: recoverable artefacts and significant changes from
               Windows 8.1},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {4},
  pages     = {326--345},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10008013},
  doi       = {10.1504/IJESDF.2017.10008013},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/HinteaBG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/IsaHAMM17,
  author    = {Mohd Anuar Mat Isa and
               Habibah Hashim and
               Syed Farid Syed Adnan and
               Norhaflyza Marbukhari and
               Nur Nabila Mohamed},
  title     = {An automobile security protocol: side-channel security against timing
               and relay attacks},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {3},
  pages     = {239--253},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10005632},
  doi       = {10.1504/IJESDF.2017.10005632},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/IsaHAMM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JeevaR17,
  author    = {S. Carolin Jeeva and
               Elijah Blessing Rajsingh},
  title     = {Phishing {URL} detection-based feature selection to classifiers},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {2},
  pages     = {116--131},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10004411},
  doi       = {10.1504/IJESDF.2017.10004411},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/JeevaR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KaurDST17,
  author    = {Arashdeep Kaur and
               Malay Kishore Dutta and
               Krishan Mohan Soni and
               Nidhi Taneja},
  title     = {Embedding digital watermark in one-dimensional signals using wavelet
               and Schur decomposition},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {4},
  pages     = {362--380},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10007972},
  doi       = {10.1504/IJESDF.2017.10007972},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KaurDST17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MistryD17,
  author    = {Nilay R. Mistry and
               Mohindersinh Dahiya},
  title     = {VolNet: a framework for analysing network-based artefacts from volatile
               memory},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {2},
  pages     = {101--115},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10004409},
  doi       = {10.1504/IJESDF.2017.10004409},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MistryD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MizherAMM17,
  author    = {Manar Abduljabbar Ahmad Mizher and
               Mei Choo Ang and
               Ahmad A. Mazhar and
               Manal A. Mizher},
  title     = {A review of video falsifying techniques and video forgery detection
               techniques},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {3},
  pages     = {191--208},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10005634},
  doi       = {10.1504/IJESDF.2017.10005634},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MizherAMM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MondalSSM17,
  author    = {Jayanta Mondal and
               Debabala Swain and
               Dushant P. Singh and
               Sharmila Mohanty},
  title     = {An improved LSB-based {RDH} technique with better reversibility},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {3},
  pages     = {254--268},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10005631},
  doi       = {10.1504/IJESDF.2017.10005631},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MondalSSM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Pan17,
  author    = {Jonathan Pan},
  title     = {Encryption scheme classification: a deep learning approach},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {4},
  pages     = {381--395},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10008036},
  doi       = {10.1504/IJESDF.2017.10008036},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Pan17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PatilM17,
  author    = {Dinesh N. Patil and
               Bandu Baburao Meshram},
  title     = {An evidence collection and analysis of Windows registry},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {4},
  pages     = {346--361},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10008016},
  doi       = {10.1504/IJESDF.2017.10008016},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PatilM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SatryaNS17,
  author    = {Gandeva B. Satrya and
               A. Ahmad Nasrullah and
               Soo Young Shin},
  title     = {Identifying artefact on Microsoft OneDrive client to support Android
               forensics},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {3},
  pages     = {269--291},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10005630},
  doi       = {10.1504/IJESDF.2017.10005630},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SatryaNS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Sriratanaviriyakul17,
  author    = {Narumon Cherry Sriratanaviriyakul and
               Mathews Z. Nkhoma and
               Anna Lyza Felipe and
               Thanh Kim Cao and
               Quyen Ha Tran and
               Roger Epworth and
               Avinash Shankaranarayanan and
               Huy Le Quang},
  title     = {{ASEAN} users' privacy concerns and security in using online social
               networks},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {1},
  pages     = {84--99},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10002659},
  doi       = {10.1504/IJESDF.2017.10002659},
  timestamp = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Sriratanaviriyakul17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TajbakhshHS17,
  author    = {Mehrdad Tajbakhsh and
               Elaheh Homayounvala and
               Sajjad Shokouhyar},
  title     = {Forensically ready digital identity management systems, issues of
               digital identity life cycle and context of usage},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {1},
  pages     = {62--83},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10002653},
  doi       = {10.1504/IJESDF.2017.10002653},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TajbakhshHS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/YanCZ17,
  author    = {Lili Yan and
               Yan Chang and
               Shibin Zhang},
  title     = {Comments on 'An improved authentication scheme for mobile satellite
               communication systems'},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {4},
  pages     = {396--406},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10008037},
  doi       = {10.1504/IJESDF.2017.10008037},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/YanCZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhuoZ17,
  author    = {Zhi{-}hai Zhuo and
               Ning Zhong},
  title     = {A new kind of steganography schemes for image},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {9},
  number    = {1},
  pages     = {35--44},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJESDF.2017.10002635},
  doi       = {10.1504/IJESDF.2017.10002635},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZhuoZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Al-SalehS16,
  author    = {Mohammed I. Al{-}Saleh and
               Bilal Shebaro},
  title     = {Enhancing malware detection: clients deserve more protection},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {1},
  pages     = {1--16},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.073728},
  doi       = {10.1504/IJESDF.2016.073728},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Al-SalehS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ChenMWS16,
  author    = {Xiaojuan Chen and
               Yi Mu and
               Xiaofen Wang and
               Runhua Shi},
  title     = {Privacy-enhanced distance computation with applications},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {3},
  pages     = {234--249},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.077448},
  doi       = {10.1504/IJESDF.2016.077448},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ChenMWS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DongL16,
  author    = {Shujun Dong and
               Xingan Li},
  title     = {Besieged privacy in social networking services},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {3},
  pages     = {224--233},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.077447},
  doi       = {10.1504/IJESDF.2016.077447},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/DongL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/FlowersMA16,
  author    = {Cassandra Flowers and
               Ali Mansour and
               Haider M. Al{-}Khateeb},
  title     = {Web browser artefacts in private and portable modes: a forensic investigation},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {2},
  pages     = {99--117},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.075583},
  doi       = {10.1504/IJESDF.2016.075583},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/FlowersMA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HansAM16,
  author    = {Kanchan Hans and
               Laxmi Ahuja and
               Sunil Kumar Muttoo},
  title     = {A fuzzy logic approach for detecting redirection spam},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {3},
  pages     = {191--204},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.077435},
  doi       = {10.1504/IJESDF.2016.077435},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/HansAM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HemalathaAR16,
  author    = {S. Hemalatha and
               U. Dinesh Acharya and
               A. Renuka},
  title     = {Audio data hiding technique using integer wavelet transform},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {2},
  pages     = {131--147},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.075586},
  doi       = {10.1504/IJESDF.2016.075586},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/HemalathaAR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KaurDST16,
  author    = {Arashdeep Kaur and
               Malay Kishore Dutta and
               Krishan Mohan Soni and
               Nidhi Taneja},
  title     = {Hiding biometric features in audio signals using Gram-Schmidt orthogonalisation},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {1},
  pages     = {63--81},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.073735},
  doi       = {10.1504/IJESDF.2016.073735},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KaurDST16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KumarR16,
  author    = {P. Mohan Kumar and
               J. Arokia Renjith},
  title     = {An image steganographic algorithm on smart mechanism of embedding
               secret data in images},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {1},
  pages     = {35--52},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.073732},
  doi       = {10.1504/IJESDF.2016.073732},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KumarR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/LaouamerANP16,
  author    = {Lamri Laouamer and
               Muath AlShaikh and
               Laurent Nana and
               Anca Christine Pascu},
  title     = {Generating optimal informed and adaptive watermark image based on
               zero-suppressed binary decision diagrams for medical images},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {3},
  pages     = {262--284},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.077451},
  doi       = {10.1504/IJESDF.2016.077451},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/LaouamerANP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MohdHKV16,
  author    = {Bassam Jamil Mohd and
               Thaier Hayajneh and
               Zaid Abu Khalaf and
               Athanasios V. Vasilakos},
  title     = {A comparative study of steganography designs based on multiple {FPGA}
               platforms},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {2},
  pages     = {164--190},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.075589},
  doi       = {10.1504/IJESDF.2016.075589},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MohdHKV16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Montasari16,
  author    = {Reza Montasari},
  title     = {An ad hoc detailed review of digital forensic investigation process
               models},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {3},
  pages     = {205--223},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.077444},
  doi       = {10.1504/IJESDF.2016.077444},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Montasari16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Montasari16a,
  author    = {Reza Montasari},
  title     = {A comprehensive digital forensic investigation process model},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {4},
  pages     = {285--302},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.079430},
  doi       = {10.1504/IJESDF.2016.079430},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Montasari16a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/QuDBH16,
  author    = {Yunyun Qu and
               Lunzhi Deng and
               Xiaomin Bao and
               Huawei Huang},
  title     = {An efficient certificateless multi-proxy signature scheme without
               pairing},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {2},
  pages     = {148--163},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.075588},
  doi       = {10.1504/IJESDF.2016.075588},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/QuDBH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RamaiahG16,
  author    = {Yeluripati Govindha Ramaiah and
               VijayaKumari Gunta},
  title     = {A new fully homomorphic encryption over the integers using smaller
               public key},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {4},
  pages     = {303--331},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.079441},
  doi       = {10.1504/IJESDF.2016.079441},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/RamaiahG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RuanZZ16,
  author    = {Ou Ruan and
               Jing Zhou and
               Mingwu Zhang},
  title     = {An efficient resource-fair commit-prove-fair-open protocol},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {1},
  pages     = {17--34},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.073729},
  doi       = {10.1504/IJESDF.2016.073729},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/RuanZZ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SaravanakumarD16,
  author    = {S. Saravanakumar and
               R. Deepa},
  title     = {Concatenated and interleaving codes for {MC} {DS} {CDMA} using Cadence
               virtuoso},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {2},
  pages     = {118--130},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.075585},
  doi       = {10.1504/IJESDF.2016.075585},
  timestamp = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SaravanakumarD16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SinghD16,
  author    = {Abhilasha Singh and
               Malay Kishore Dutta},
  title     = {Wavelet-based reversible watermarking system for integrity control
               and authentication in tele-ophthalmological applications},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {4},
  pages     = {392--411},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.079452},
  doi       = {10.1504/IJESDF.2016.079452},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SinghD16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SinghDR16,
  author    = {Anushikha Singh and
               Malay Kishore Dutta and
               Namrata Raghuvanshi},
  title     = {Digital tags from multi-subject biometric features for joint ownership
               of digital data},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {4},
  pages     = {366--391},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.079451},
  doi       = {10.1504/IJESDF.2016.079451},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SinghDR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Tao16,
  author    = {Yun Tao},
  title     = {An authentication scheme for multi-server environments based on chaotic
               maps},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {3},
  pages     = {250--261},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.077450},
  doi       = {10.1504/IJESDF.2016.077450},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Tao16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WuCZY16,
  author    = {Min Wu and
               Jianhua Chen and
               Wenxia Zhu and
               Zhenyang Yuan},
  title     = {Security analysis and enhancements of a multi-factor biometric authentication
               scheme},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {4},
  pages     = {352--365},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.079447},
  doi       = {10.1504/IJESDF.2016.079447},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/WuCZY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/XieXHZ16,
  author    = {Run Xie and
               Chunxiang Xu and
               Chanlian He and
               Xiaojun Zhang},
  title     = {A new group signature scheme for dynamic membership},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {4},
  pages     = {332--351},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.079446},
  doi       = {10.1504/IJESDF.2016.079446},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/XieXHZ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZargarS16,
  author    = {Anum Javeed Zargar and
               Amit Kumar Singh},
  title     = {Robust and imperceptible image watermarking in {DWT-BTC} domain},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {1},
  pages     = {53--62},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.073734},
  doi       = {10.1504/IJESDF.2016.073734},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZargarS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhangXJ16,
  author    = {Xiaojun Zhang and
               Chunxiang Xu and
               Chunhua Jin},
  title     = {Enabling identity-based cloud storage public auditing with quantum
               computers resistance},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {8},
  number    = {1},
  pages     = {82--98},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJESDF.2016.073736},
  doi       = {10.1504/IJESDF.2016.073736},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZhangXJ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BanerjeeISBS15,
  author    = {Indradip Banerjee and
               Pabak Indu and
               Anupam Pratap Singh and
               Souvik Bhattacharyya and
               Gautam Sanyal},
  title     = {Robust watermarking using four bit per pixel technique},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {4},
  pages     = {345--357},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.072177},
  doi       = {10.1504/IJESDF.2015.072177},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BanerjeeISBS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/CuiZSW15,
  author    = {Jie Cui and
               Hong Zhong and
               Runhua Shi and
               Jiankai Wang},
  title     = {Related-key cryptanalysis on 7-round {AES-128/192}},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {2},
  pages     = {166--178},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.069609},
  doi       = {10.1504/IJESDF.2015.069609},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/CuiZSW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DollyBP15,
  author    = {D. Raveena Judie Dolly and
               G. Josemin Bala and
               J. Dinesh Peter},
  title     = {Adaptation of frames for {GOP} using {NSEW} affine translation for
               effective privacy protection mechanism},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {3},
  pages     = {223--233},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.070388},
  doi       = {10.1504/IJESDF.2015.070388},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/DollyBP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DuraipandianP15,
  author    = {M. Duraipandian and
               C. Palanisamy},
  title     = {Network layer intrusion detection in mobile ad hoc network using on-demand
               attack detection protocol},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {3},
  pages     = {245--257},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.070391},
  doi       = {10.1504/IJESDF.2015.070391},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/DuraipandianP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GhosalMB15,
  author    = {Sandip Ghosal and
               Debasis Mitra and
               Subhasis Bhattacharjee},
  title     = {Certificate-based encoding of gate level description for secure transmission},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {1},
  pages     = {54--75},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.067994},
  doi       = {10.1504/IJESDF.2015.067994},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GhosalMB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GohT15,
  author    = {Jonathan Goh and
               Vrizlynn L. L. Thing},
  title     = {A hybrid evolutionary algorithm for feature and ensemble selection
               in image tampering detection},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {1},
  pages     = {76--104},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.067996},
  doi       = {10.1504/IJESDF.2015.067996},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GohT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HuZM15,
  author    = {Zhiwen Hu and
               Li Zhu and
               Huaqing Mao},
  title     = {Random linear network coding with probabilistic polynomial-time wiretap
               adversary},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {1},
  pages     = {41--53},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.067993},
  doi       = {10.1504/IJESDF.2015.067993},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/HuZM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ImenT15,
  author    = {Bouguerne Imen and
               Yamina Tlili Guiyassa},
  title     = {Steganographic detection in image using the reduction of support vectors},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {1},
  pages     = {20--29},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.067986},
  doi       = {10.1504/IJESDF.2015.067986},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ImenT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JinXZL15,
  author    = {Chunhua Jin and
               Chunxiang Xu and
               Xiaojun Zhang and
               Fagen Li},
  title     = {An efficient certificateless deniable authentication protocol without
               pairings},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {2},
  pages     = {179--196},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.069611},
  doi       = {10.1504/IJESDF.2015.069611},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/JinXZL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JobyS15,
  author    = {P. P. Joby and
               P. Sengottuvelan},
  title     = {A localised clustering scheme to detect attacks in wireless sensor
               network},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {3},
  pages     = {211--222},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.070386},
  doi       = {10.1504/IJESDF.2015.070386},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/JobyS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JolfaeiMM15,
  author    = {Alireza Jolfaei and
               Ahmadreza Matinfar and
               Abdolrasoul Mirghadri},
  title     = {Preserving the confidentiality of digital images using a chaotic encryption
               scheme},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {3},
  pages     = {258--277},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.070389},
  doi       = {10.1504/IJESDF.2015.070389},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/JolfaeiMM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KhanCKRC15,
  author    = {Hari Narayan Khan and
               Ayan Chaudhuri and
               Souvik Kar and
               Parijat Roy and
               Atal Chaudhuri},
  title     = {Robust symmetric cryptography using plain-text variant session key},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {1},
  pages     = {30--40},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.067990},
  doi       = {10.1504/IJESDF.2015.067990},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KhanCKRC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MangaiVC15,
  author    = {N. M. Siva Mangai and
               Shilu Tresa Vinod and
               D. Abraham Chandy},
  title     = {Recognition of elephants in infrared images using clustering-based
               image segmentation},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {3},
  pages     = {234--244},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.070390},
  doi       = {10.1504/IJESDF.2015.070390},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MangaiVC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Matveeva15,
  author    = {Vesta Matveeva},
  title     = {Assessment of uniformity of byte distribution in a file based on the
               wavelet transform as an approach to search encrypted data},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {2},
  pages     = {134--146},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.069606},
  doi       = {10.1504/IJESDF.2015.069606},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Matveeva15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MoonR15,
  author    = {Sunil K. Moon and
               Rajeshree D. Raut},
  title     = {Efficient performance analysis of data hiding technique for enhancement
               of information security, robustness and perceptibility},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {4},
  pages     = {305--329},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.072175},
  doi       = {10.1504/IJESDF.2015.072175},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MoonR15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/NaskarC15,
  author    = {Prabir Kumar Naskar and
               Atal Chaudhuri},
  title     = {A robust image encryption technique using dual chaotic map},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {4},
  pages     = {358--380},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.072180},
  doi       = {10.1504/IJESDF.2015.072180},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/NaskarC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PovarSG15,
  author    = {Digambar Povar and
               S. Saibharath and
               G. Geethakumari},
  title     = {Real-time digital forensic triaging for cloud data analysis using
               MapReduce on Hadoop framework},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {2},
  pages     = {119--133},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.069602},
  doi       = {10.1504/IJESDF.2015.069602},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PovarSG15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Qiao15,
  author    = {Pengshuai Qiao},
  title     = {A security enhanced user authentication scheme for multi-server environment
               without using smart cards},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {2},
  pages     = {197--210},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.069592},
  doi       = {10.1504/IJESDF.2015.069592},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Qiao15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/VaishnaviS15,
  author    = {Dharmalingam Vaishnavi and
               T. S. Subashini},
  title     = {A passive technique for image forgery detection using contrast context
               histogram features},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {3},
  pages     = {278--289},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.070394},
  doi       = {10.1504/IJESDF.2015.070394},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/VaishnaviS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/VijayakumarVZ15,
  author    = {P. Vijayakumar and
               V. Vijayalakshmi and
               G. Zayaraz},
  title     = {Hybrid secure {GSM} architecture using {DNA} computing-based hyperelliptic
               curve cryptography},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {2},
  pages     = {105--118},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.069598},
  doi       = {10.1504/IJESDF.2015.069598},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/VijayakumarVZ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WaghK15,
  author    = {Sharmila Kishor Wagh and
               Satish R. Kolhe},
  title     = {Effective semi-supervised approach towards intrusion detection system
               using machine learning techniques},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {3},
  pages     = {290--304},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.070395},
  doi       = {10.1504/IJESDF.2015.070395},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/WaghK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WattS15,
  author    = {Allan Charles Watt and
               Jill Slay},
  title     = {First responders actions to cope with volatile digital evidence},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {4},
  pages     = {381--399},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.072182},
  doi       = {10.1504/IJESDF.2015.072182},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/WattS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhangXJW15,
  author    = {Xiaojun Zhang and
               Chunxiang Xu and
               Chunhua Jin and
               Junwei Wen},
  title     = {A post-quantum communication secure identity-based proxy-signcryption
               scheme},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {2},
  pages     = {147--165},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.069607},
  doi       = {10.1504/IJESDF.2015.069607},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZhangXJW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhuCH15,
  author    = {Wenxia Zhu and
               Jianhua Chen and
               Debiao He},
  title     = {Enhanced authentication protocol for session initiation protocol using
               smart card},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {4},
  pages     = {330--342},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.072176},
  doi       = {10.1504/IJESDF.2015.072176},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZhuCH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhuT15,
  author    = {Youwen Zhu and
               Tsuyoshi Takagi},
  title     = {Efficient scalar product protocol and its privacy-preserving application},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {7},
  number    = {1},
  pages     = {1--19},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJESDF.2015.067985},
  doi       = {10.1504/IJESDF.2015.067985},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZhuT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Alashwali14,
  author    = {Eman Alashwali},
  title     = {Incorporating hacking projects in computer and information security
               education: an empirical study},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {3},
  pages     = {185--203},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.064406},
  doi       = {10.1504/IJESDF.2014.064406},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Alashwali14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AlbondaY14,
  author    = {Haider Daami R. Albonda and
               Sufian Yousef},
  title     = {Multi-carrier coded division multiple access multiplexing against
               multi-path fading},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {2},
  pages     = {140--146},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.063111},
  doi       = {10.1504/IJESDF.2014.063111},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AlbondaY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BrewsterASWAMJ14,
  author    = {Ben Brewster and
               Babak Akhgar and
               Andrew Staniforth and
               David Waddington and
               Simon Andrews and
               Sarah Johnson Mitchell and
               Kayleigh Johnson},
  title     = {Towards a model for the integration of knowledge management in law
               enforcement agencies},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {1},
  pages     = {1--17},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.060169},
  doi       = {10.1504/IJESDF.2014.060169},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BrewsterASWAMJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DengLY14,
  author    = {Lunzhi Deng and
               Siwei Li and
               Yafeng Yu},
  title     = {Identity-based threshold ring signcryption from pairing},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {2},
  pages     = {90--103},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.063093},
  doi       = {10.1504/IJESDF.2014.063093},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/DengLY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DengZL14,
  author    = {Lunzhi Deng and
               Jiwen Zeng and
               Siwei Li},
  title     = {A new identity-based ring signcryption scheme},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {4},
  pages     = {333--342},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.065736},
  doi       = {10.1504/IJESDF.2014.065736},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/DengZL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Hosseinpournajarkolaei14,
  author    = {Ali Hosseinpournajarkolaei and
               Hamid Jahankhani and
               Amin Hosseinian Far},
  title     = {Vulnerability considerations for power line communication's supervisory
               control and data acquisition},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {2},
  pages     = {104--114},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.063108},
  doi       = {10.1504/IJESDF.2014.063108},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Hosseinpournajarkolaei14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JegatheesanM14,
  author    = {A. Jegatheesan and
               D. Manimegalai},
  title     = {Symmetric key management for mobile ad hoc networks using novel secure
               and authenticated key distribution protocol-revised},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {4},
  pages     = {268--284},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.065738},
  doi       = {10.1504/IJESDF.2014.065738},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/JegatheesanM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KumarM14,
  author    = {Sushil Kumar and
               Sunil Kumar Muttoo},
  title     = {Robust and secure image steganographic algorithm based on matrix embedding},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {3},
  pages     = {219--240},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.064411},
  doi       = {10.1504/IJESDF.2014.064411},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KumarM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/NwobodoJE14,
  author    = {Ikechukwu Nwobodo and
               Hossein Jahankhani and
               Aloysius Edoh},
  title     = {Security challenges in the distributed cloud computing},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {1},
  pages     = {38--51},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.060168},
  doi       = {10.1504/IJESDF.2014.060168},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/NwobodoJE14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PournouriC14,
  author    = {Sina Pournouri and
               Matthew J. Craven},
  title     = {E-business, recent threats and security countermeasures},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {3},
  pages     = {169--184},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.064402},
  doi       = {10.1504/IJESDF.2014.064402},
  timestamp = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PournouriC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PsaroudakisKSM14,
  author    = {Ioannis Psaroudakis and
               Vasilios Katos and
               Panagiotis Saragiotis and
               Lilian Mitrou},
  title     = {A method for forensic artefact collection, analysis and incident response
               in environments running session initiation protocol and session description
               protocol},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {4},
  pages     = {241--267},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.065737},
  doi       = {10.1504/IJESDF.2014.065737},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PsaroudakisKSM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/QiaoT14,
  author    = {Pengshuai Qiao and
               Hang Tu},
  title     = {A security enhanced password authentication and update scheme based
               on elliptic curve cryptography},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {2},
  pages     = {130--139},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.063109},
  doi       = {10.1504/IJESDF.2014.063109},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/QiaoT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RuizMSMD14,
  author    = {M. Dolores Ruiz and
               Mar{\'{\i}}a J. Mart{\'{\i}}n{-}Bautista and
               Daniel S{\'{a}}nchez and
               Mar{\'{\i}}a Amparo Vila Miranda and
               Miguel Delgado},
  title     = {Anomaly detection using fuzzy association rules},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {1},
  pages     = {25--37},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.060171},
  doi       = {10.1504/IJESDF.2014.060171},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/RuizMSMD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SaMS14,
  author    = {V{\'{\i}}tor J. S{\'{a}} and
               S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and
               Henrique M. Dinis Santos},
  title     = {Enrolment time as a requirement for biometric fingerprint recognition},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {1},
  pages     = {18--24},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.060172},
  doi       = {10.1504/IJESDF.2014.060172},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SaMS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SadrO14,
  author    = {Ali Sadr and
               Raziyeh Sadat Okhovat},
  title     = {Thresholding attack on the BSS-based cryptosystem which has binary
               key},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {2},
  pages     = {81--89},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.063087},
  doi       = {10.1504/IJESDF.2014.063087},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SadrO14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SalimTT14,
  author    = {Abu Salim and
               Sachin Tripathi and
               Rajesh Kumar Tiwari},
  title     = {A secure and timestamp-based communication scheme for cloud environment},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {4},
  pages     = {319--332},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.065741},
  doi       = {10.1504/IJESDF.2014.065741},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SalimTT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SeuwouPU14,
  author    = {Patrice Seuwou and
               Dilip Patel and
               George Ubakanma},
  title     = {Vehicular ad hoc network applications and security: a study into the
               economic and the legal implications},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {2},
  pages     = {115--129},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.063107},
  doi       = {10.1504/IJESDF.2014.063107},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SeuwouPU14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SinghDM14,
  author    = {Amit Kumar Singh and
               Mayank Dave and
               Anand Mohan},
  title     = {Hybrid technique for robust and imperceptible dual watermarking using
               error correcting codes for application in telemedicine},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {4},
  pages     = {285--305},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.065739},
  doi       = {10.1504/IJESDF.2014.065739},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SinghDM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Sriratanaviriyakul14,
  author    = {Narumon Cherry Sriratanaviriyakul and
               Mathews Zanda Nkhoma and
               Anna Lyza Felipe and
               Thanh Kim Cao and
               Quyen Ha Tran},
  title     = {Vietnamese privacy concerns and security in using online social networks},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {4},
  pages     = {306--318},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.065740},
  doi       = {10.1504/IJESDF.2014.065740},
  timestamp = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Sriratanaviriyakul14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Tait14,
  author    = {Bobby L. Tait},
  title     = {Secure cloud-based biometric authentication utilising smart devices
               for electronic transactions},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {1},
  pages     = {52--61},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.060170},
  doi       = {10.1504/IJESDF.2014.060170},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Tait14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Tait14a,
  author    = {Bobby L. Tait},
  title     = {The biometric landscape - towards a sustainable biometric terminology
               framework},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {2},
  pages     = {147--156},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.063110},
  doi       = {10.1504/IJESDF.2014.063110},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Tait14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TianHY14,
  author    = {Miaomiao Tian and
               Liusheng Huang and
               Wei Yang},
  title     = {Practical certificateless short signature scheme},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {3},
  pages     = {204--218},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.064409},
  doi       = {10.1504/IJESDF.2014.064409},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TianHY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WardmanBW14,
  author    = {Brad Wardman and
               Jason Britt and
               Gary Warner},
  title     = {New tackle to catch a phisher},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {1},
  pages     = {62--80},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.060178},
  doi       = {10.1504/IJESDF.2014.060178},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/WardmanBW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhaoZ14,
  author    = {Yun Zhao and
               Chunming Zhang},
  title     = {Cryptanalysis and improvement of an authentication scheme for telecare
               medical information systems},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {6},
  number    = {3},
  pages     = {157--168},
  year      = {2014},
  url       = {https://doi.org/10.1504/IJESDF.2014.064401},
  doi       = {10.1504/IJESDF.2014.064401},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZhaoZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Al-Saleh13,
  author    = {Mohammed I. Al{-}Saleh},
  title     = {The impact of the antivirus on the digital evidence},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {3/4},
  pages     = {229--240},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.058656},
  doi       = {10.1504/IJESDF.2013.058656},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Al-Saleh13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AlazabV13,
  author    = {Mamoun Alazab and
               Sitalakshmi Venkatraman},
  title     = {Detecting malicious behaviour using supervised learning algorithms
               of the function calls},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {2},
  pages     = {90--109},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.055047},
  doi       = {10.1504/IJESDF.2013.055047},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AlazabV13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/CecchiniG13,
  author    = {Simone Cecchini and
               Diane Gan},
  title     = {{SQL} injection attacks with the {AMPA} suite},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {2},
  pages     = {139--160},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.055051},
  doi       = {10.1504/IJESDF.2013.055051},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/CecchiniG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HeCSK13,
  author    = {Debiao He and
               Jianhua Chen and
               Wenbo Shi and
               Muhammad Khurram Khan},
  title     = {On the security of an authentication scheme for multi-server architecture},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {3/4},
  pages     = {288--296},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.058669},
  doi       = {10.1504/IJESDF.2013.058669},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/HeCSK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HeK13,
  author    = {Debiao He and
               Muhammad Khurram Khan},
  title     = {Cryptanalysis of a key agreement protocol based on chaotic Hash},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {3/4},
  pages     = {172--177},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.058650},
  doi       = {10.1504/IJESDF.2013.058650},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/HeK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KangLZC13,
  author    = {XiaoBing Kang and
               Guangfeng Lin and
               Erhu Zhang and
               Yajun Chen},
  title     = {On the reliability of forensic schemes using resampling for image
               copy-move forgery},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {3/4},
  pages     = {270--287},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.058665},
  doi       = {10.1504/IJESDF.2013.058665},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KangLZC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KarthikeyanCV13,
  author    = {Karthikeyan Balasubramanian and
               Jagannathan Chakravarthy and
               V. Vaithiyanathan},
  title     = {An enhanced Hill cipher approach for image encryption in steganography},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {3/4},
  pages     = {178--187},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.058652},
  doi       = {10.1504/IJESDF.2013.058652},
  timestamp = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KarthikeyanCV13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MohdHQ13,
  author    = {Bassam Jamil Mohd and
               Thaier Hayajneh and
               Ahmad Nahar Quttoum},
  title     = {Wavelet-transform steganography: algorithm and hardware implementation},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {3/4},
  pages     = {241--256},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.058657},
  doi       = {10.1504/IJESDF.2013.058657},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MohdHQ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MuttooK13,
  author    = {Sunil Kumar Muttoo and
               Sushil Kumar},
  title     = {Self-synchronising image steganography algorithms based on error-correcting
               codes},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {3/4},
  pages     = {297--316},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.058670},
  doi       = {10.1504/IJESDF.2013.058670},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MuttooK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Overill13,
  author    = {Richard E. Overill},
  title     = {The 'inverse {CSI} effect': further evidence from e-crime data},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {2},
  pages     = {81--89},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.055034},
  doi       = {10.1504/IJESDF.2013.055034},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Overill13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SagayeeAM13,
  author    = {G. Mary Amirtha Sagayee and
               S. Arumugam and
               G. S. Anandha Mala},
  title     = {Biometric encryption using enhanced finger print image and elliptic
               curve},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {2},
  pages     = {110--123},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.055049},
  doi       = {10.1504/IJESDF.2013.055049},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SagayeeAM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SallavaciG13,
  author    = {Oriola Sallavaci and
               Carlisle Eldwidge George},
  title     = {New admissibility regime for expert evidence: the likely impact on
               digital forensics},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {1},
  pages     = {67--79},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.054420},
  doi       = {10.1504/IJESDF.2013.054420},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SallavaciG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SallavaciG13a,
  author    = {Oriola Sallavaci and
               Carlisle Eldwidge George},
  title     = {Procedural aspects of the new regime for the admissibility of expert
               evidence: what the digital forensic expert needs to know},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {3/4},
  pages     = {161--171},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.058645},
  doi       = {10.1504/IJESDF.2013.058645},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SallavaciG13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ShakeriJ13,
  author    = {Mahsa Shakeri and
               Mansour Jamzad},
  title     = {A robust zero-watermarking scheme using Canny edge detector},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {1},
  pages     = {25--44},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.054406},
  doi       = {10.1504/IJESDF.2013.054406},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ShakeriJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SinghYM13,
  author    = {Harsh Vikram Singh and
               Suman Yadav and
               Anand Mohan},
  title     = {Intellectual property right protection of image data using {DCT} and
               spread spectrum-based watermarking},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {3/4},
  pages     = {218--228},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.058655},
  doi       = {10.1504/IJESDF.2013.058655},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SinghYM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SridharP13,
  author    = {Laavanya Sridhar and
               V. Lakshmi Prabha},
  title     = {{RF} authenticated reconfiguration-based access control protection
               scheme for SRAM-based {FPGA} {IP} cores},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {1},
  pages     = {45--66},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.054404},
  doi       = {10.1504/IJESDF.2013.054404},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SridharP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TianH13,
  author    = {Miaomiao Tian and
               Liusheng Huang},
  title     = {Lattice-based message recovery signature schemes},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {3/4},
  pages     = {257--269},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.058658},
  doi       = {10.1504/IJESDF.2013.058658},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TianH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TianHY13,
  author    = {Miaomiao Tian and
               Liusheng Huang and
               Wei Yang},
  title     = {Efficient hierarchical identity-based signatures from lattices},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {1},
  pages     = {1--10},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.054403},
  doi       = {10.1504/IJESDF.2013.054403},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TianHY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TurediH13,
  author    = {Zeki Turedi and
               Liangxiu Han},
  title     = {Automatic forensic log file analysis for Mac {OS} {X} systems},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {2},
  pages     = {124--138},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.055050},
  doi       = {10.1504/IJESDF.2013.055050},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TurediH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/VenkateshSVKA13,
  author    = {G. Kirubavathi Venkatesh and
               V. Srihari and
               R. Veeramani and
               R. Karthikeyan and
               R. Anitha Nadarajan},
  title     = {{HTTP} botnet detection using hidden semi-Markov model with {SNMP}
               {MIB} variables},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {3/4},
  pages     = {188--200},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.058653},
  doi       = {10.1504/IJESDF.2013.058653},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/VenkateshSVKA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/VigilaM13,
  author    = {S. Maria Celestin Vigila and
               K. Muneeswaran},
  title     = {A new elliptic curve cryptosystem for securing sensitive data applications},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {1},
  pages     = {11--24},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.054405},
  doi       = {10.1504/IJESDF.2013.054405},
  timestamp = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/VigilaM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhuXT13,
  author    = {Youwen Zhu and
               Rui Xu and
               Tsuyoshi Takagi},
  title     = {Secure k-NN query on encrypted cloud database without key-sharing},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {5},
  number    = {3/4},
  pages     = {201--217},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJESDF.2013.058654},
  doi       = {10.1504/IJESDF.2013.058654},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZhuXT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DamascenoTC12,
  author    = {Marcelo Damasceno and
               Jerffeson Teixeira and
               Gustavo A. L. de Campos},
  title     = {A prediction model for criminal levels using socio-criminal data},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {2/3},
  pages     = {201--214},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.048414},
  doi       = {10.1504/IJESDF.2012.048414},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/DamascenoTC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GranadilloMHD12,
  author    = {Gustavo {Gonzalez Granadillo} and
               Yosra Ben Mustapha and
               Nabil Hachem and
               Herv{\'{e}} Debar},
  title     = {An ontology-driven approach to model {SIEM} information and operations
               using the {SWRL} formalism},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {2/3},
  pages     = {104--123},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.048412},
  doi       = {10.1504/IJESDF.2012.048412},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GranadilloMHD12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HeC12,
  author    = {Debiao He and
               Jianhua Chen},
  title     = {Cryptanalysis of a three-party password-based authenticated key exchange
               protocol using Weil pairing},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {4},
  pages     = {244--251},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.049754},
  doi       = {10.1504/IJESDF.2012.049754},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/HeC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HeH12,
  author    = {Debiao He and
               Yin Huang},
  title     = {Weaknesses in a dynamic ID-based remote user authentication scheme
               for multi-server environment},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {1},
  pages     = {43--53},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.045389},
  doi       = {10.1504/IJESDF.2012.045389},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/HeH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JannatiF12,
  author    = {Hoda Jannati and
               Abolfazl Falahati},
  title     = {Security enhanced user authentication scheme for wireless sensor network},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {4},
  pages     = {215--228},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.049735},
  doi       = {10.1504/IJESDF.2012.049735},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/JannatiF12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JolfaeiVM12,
  author    = {Alireza Jolfaei and
               Ahmadreza Vizandan and
               Abdolrasoul Mirghadri},
  title     = {Image encryption using {HC-128} and {HC-256} stream ciphers},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {1},
  pages     = {19--42},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.045388},
  doi       = {10.1504/IJESDF.2012.045388},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/JolfaeiVM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KarayianniKG12,
  author    = {Stavroula Karayianni and
               Vasilios Katos and
               Christos K. Georgiadis},
  title     = {A framework for password harvesting from volatile memory},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {2/3},
  pages     = {154--163},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.048411},
  doi       = {10.1504/IJESDF.2012.048411},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KarayianniKG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KoukiouA12,
  author    = {Georgia Koukiou and
               Vassilis Anastassopoulos},
  title     = {Drunk person identification using thermal infrared images},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {4},
  pages     = {229--243},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.049747},
  doi       = {10.1504/IJESDF.2012.049747},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KoukiouA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Kuzma12,
  author    = {Joanne Kuzma},
  title     = {Children and geotagged images: quantitative analysis for security
               risk assessment},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {1},
  pages     = {54--64},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.045390},
  doi       = {10.1504/IJESDF.2012.045390},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Kuzma12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MavridouZDP12,
  author    = {Anastasia Mavridou and
               Victor Zhou and
               Jerald Dawkins and
               Mauricio Papa},
  title     = {A situational awareness framework for securing the smart grid using
               monitoring sensors and threat models},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {2/3},
  pages     = {138--153},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.048417},
  doi       = {10.1504/IJESDF.2012.048417},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MavridouZDP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MukhtarAAVJ12,
  author    = {Rabiu Mukhtar and
               Ameer Al{-}Nemrat and
               Mamoun Alazab and
               Sitalakshmi Venkatraman and
               Hamid Jahankhani},
  title     = {Analysis of firewall log-based detection scenarios for evidence in
               digital forensics},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {4},
  pages     = {261--279},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.049761},
  doi       = {10.1504/IJESDF.2012.049761},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MukhtarAAVJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/NtouskasPP12,
  author    = {Theodoros Ntouskas and
               Dimitrios Papanikas and
               Nineta Polemi},
  title     = {Trusted collaborative services for the {IT} security management of
               SMEs/mEs},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {2/3},
  pages     = {124--137},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.048413},
  doi       = {10.1504/IJESDF.2012.048413},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/NtouskasPP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SaBMS12,
  author    = {V{\'{\i}}tor J. S{\'{a}} and
               Daniela Borges and
               S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and
               Henrique M. Dinis Santos},
  title     = {Biometric technologies and their perception by the common citizen},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {2/3},
  pages     = {187--200},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.048418},
  doi       = {10.1504/IJESDF.2012.048418},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SaBMS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ShankarSN12,
  author    = {T. N. Shankar and
               Gadadhar Sahoo and
               S. Niranjan},
  title     = {Steganographic manipulations with elliptic curve cryptography},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {4},
  pages     = {280--297},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.049762},
  doi       = {10.1504/IJESDF.2012.049762},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ShankarSN12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SridharP12,
  author    = {Laavanya Sridhar and
               V. Lakshmi Prabha},
  title     = {{RF} authenticated protection scheme for SRAM-based {FPGA} {IP} cores},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {1},
  pages     = {82--100},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.045392},
  doi       = {10.1504/IJESDF.2012.045392},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SridharP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Tait12,
  author    = {Bobby L. Tait},
  title     = {Applied Fletcher-Munson curve algorithm for improved voice recognition},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {2/3},
  pages     = {178--186},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.048421},
  doi       = {10.1504/IJESDF.2012.048421},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Tait12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Tiwari12,
  author    = {Rajesh Kumar Tiwari},
  title     = {High capacity and secured methodologies for steganography},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {1},
  pages     = {1--18},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.045387},
  doi       = {10.1504/IJESDF.2012.045387},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Tiwari12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TsiakisKG12,
  author    = {Theodosios Tsiakis and
               Panagiotis Katsaros and
               Dimitris Gritzalis},
  title     = {Economic assessment of externalities for interactive audio media anti-SPIT
               protection of internet services},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {2/3},
  pages     = {164--177},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.048416},
  doi       = {10.1504/IJESDF.2012.048416},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TsiakisKG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/VigilaM12,
  author    = {S. Maria Celestin Vigila and
               K. Muneeswaran},
  title     = {Key generation based on elliptic curve over finite prime field},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {1},
  pages     = {65--81},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.045391},
  doi       = {10.1504/IJESDF.2012.045391},
  timestamp = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/VigilaM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WangPW12,
  author    = {Yichen Wang and
               Qiong Pu and
               Shuhua Wu},
  title     = {Cryptanalysis and enhancements of delegation-based authentication
               protocol for secure roaming service},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {4},
  number    = {4},
  pages     = {252--260},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJESDF.2012.049755},
  doi       = {10.1504/IJESDF.2012.049755},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/WangPW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/CaldeiraMS10,
  author    = {Filipe Caldeira and
               Edmundo Monteiro and
               Paulo Sim{\~{o}}es},
  title     = {Trust and reputation management for critical infrastructure protection},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {3},
  pages     = {187--203},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038282},
  doi       = {10.1504/IJESDF.2010.038282},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/CaldeiraMS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ChenM10,
  author    = {Liqun Chen and
               Chris J. Mitchell},
  title     = {Parsing ambiguities in authentication and key establishment protocols},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {1},
  pages     = {82--94},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.032333},
  doi       = {10.1504/IJESDF.2010.032333},
  timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ChenM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Desoky10,
  author    = {Abdelrahman Desoky},
  title     = {Headstega: e-mail-headers-based steganography methodology},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {4},
  pages     = {289--310},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038611},
  doi       = {10.1504/IJESDF.2010.038611},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Desoky10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Dutta10,
  author    = {Malay Kishore Dutta},
  title     = {Perceptible watermarking: a promising application},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {4},
  pages     = {363--375},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038614},
  doi       = {10.1504/IJESDF.2010.038614},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Dutta10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GarrityW10,
  author    = {Sean Garrity and
               George R. S. Weir},
  title     = {Balancing the threat of personal technology in the workplace},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {1},
  pages     = {73--81},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.032332},
  doi       = {10.1504/IJESDF.2010.032332},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GarrityW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GeorgiadisPK10,
  author    = {Christos K. Georgiadis and
               Elias Pimenidis and
               Ioannis Kokkinidis},
  title     = {A coloured Petri net analysis of the Transaction Internet Protocol},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {3},
  pages     = {204--222},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038283},
  doi       = {10.1504/IJESDF.2010.038283},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GeorgiadisPK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HeCZ10,
  author    = {Debiao He and
               Jianhua Chen and
               Rui Zhang},
  title     = {Weaknesses of a dynamic ID-based remote user authentication scheme},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {4},
  pages     = {355--362},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038613},
  doi       = {10.1504/IJESDF.2010.038613},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/HeCZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/IbrahimZ10,
  author    = {Fawzy Ibrahim and
               M. Zaki},
  title     = {Design and implementation of a block-based lossless watermarking scheme},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {2},
  pages     = {164--185},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.033784},
  doi       = {10.1504/IJESDF.2010.033784},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/IbrahimZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KarantjiasP10,
  author    = {Athanasios Karantjias and
               Nineta Polemi},
  title     = {Assessment of advanced cryptographic antiviral techniques},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {1},
  pages     = {60--72},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.032331},
  doi       = {10.1504/IJESDF.2010.032331},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KarantjiasP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KarthigaikumarB10,
  author    = {P. Karthigaikumar and
               K. Baskaran},
  title     = {Hardware implementation of invisible image watermarking algorithm
               using secured binary image authentication technique},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {4},
  pages     = {333--354},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038615},
  doi       = {10.1504/IJESDF.2010.038615},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KarthigaikumarB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KuzmaPH10,
  author    = {Joanne Kuzma and
               Colin B. Price and
               Richard N. Henson},
  title     = {Flash vulnerabilities analysis of {US} educational websites},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {2},
  pages     = {95--107},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.033779},
  doi       = {10.1504/IJESDF.2010.033779},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KuzmaPH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MagalhaesSSJ10,
  author    = {S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and
               Henrique M. Dinis Santos and
               Leonel Duarte Dos Santos and
               Hamid Jahankhani},
  title     = {Cyberwar and the Russian Federation: the usual suspect},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {2},
  pages     = {151--163},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.033783},
  doi       = {10.1504/IJESDF.2010.033783},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MagalhaesSSJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MartinsM10,
  author    = {Tiago Martins and
               S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es},
  title     = {Baby crying acceptance in Portugal},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {3},
  pages     = {278--287},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038289},
  doi       = {10.1504/IJESDF.2010.038289},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MartinsM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MuttooK10,
  author    = {Sunil Kumar Muttoo and
               Vinay Kumar},
  title     = {Hamiltonian graph approach to steganography},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {4},
  pages     = {311--332},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038612},
  doi       = {10.1504/IJESDF.2010.038612},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MuttooK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PereiraS10,
  author    = {Teresa Susana Mendes Pereira and
               Henrique M. Dinis Santos},
  title     = {An audit framework to support information system security management},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {3},
  pages     = {265--277},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038288},
  doi       = {10.1504/IJESDF.2010.038288},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PereiraS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PerumalN10,
  author    = {Sundresan Perumal and
               Norita Md Norwawi},
  title     = {Integrated computer forensic investigation model based on Malaysian
               standards},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {2},
  pages     = {108--119},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.033780},
  doi       = {10.1504/IJESDF.2010.033780},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PerumalN10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Pimenta10,
  author    = {Jos{\'{e}} Miguel Pimenta},
  title     = {The new strategic concept of {NATO:} the Portuguese role},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {3},
  pages     = {234--239},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038285},
  doi       = {10.1504/IJESDF.2010.038285},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Pimenta10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RashedS10,
  author    = {Abdullah Abdali Rashed and
               Henrique M. Dinis Santos},
  title     = {User acceptance {OTM} machine: in the Arab culture},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {3},
  pages     = {240--248},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038286},
  doi       = {10.1504/IJESDF.2010.038286},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/RashedS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ReisingTM10,
  author    = {Donald R. Reising and
               Michael A. Temple and
               Michael J. Mendenhall},
  title     = {Improved wireless security for GMSK-based devices using {RF} fingerprinting},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {1},
  pages     = {41--59},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.032330},
  doi       = {10.1504/IJESDF.2010.032330},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ReisingTM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SaarelainenJ10,
  author    = {Tapio Saarelainen and
               Jorma Jormakka},
  title     = {Interfacing collaboration and command tools for crises management
               military command and control systems},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {3},
  pages     = {249--264},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038287},
  doi       = {10.1504/IJESDF.2010.038287},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SaarelainenJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SahooT10,
  author    = {Gadadhar Sahoo and
               Rajesh Kumar Tiwari},
  title     = {Some new methodologies for secured data coding and transmission},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {2},
  pages     = {120--137},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.033781},
  doi       = {10.1504/IJESDF.2010.033781},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SahooT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TaheriniaJ10,
  author    = {Amirhossein Taherinia and
               Mansour Jamzad},
  title     = {A new spread spectrum watermarking method using two levels {DCT}},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {1},
  pages     = {1--26},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.032328},
  doi       = {10.1504/IJESDF.2010.032328},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TaheriniaJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TiwariS10,
  author    = {Rajesh Kumar Tiwari and
               Gadadhar Sahoo},
  title     = {A new methodology for data coding and embedding for high-capacity
               transmitting},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {1},
  pages     = {27--40},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.032329},
  doi       = {10.1504/IJESDF.2010.032329},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TiwariS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WeirM10,
  author    = {George R. S. Weir and
               Michael Morran},
  title     = {Hiding the hidden message: approaches to textual steganography},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {3},
  pages     = {223--233},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.038284},
  doi       = {10.1504/IJESDF.2010.038284},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/WeirM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WuH10,
  author    = {Raymond Wu and
               Masayuki Hisada},
  title     = {Static and dynamic analysis for web security in industry applications},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {3},
  number    = {2},
  pages     = {138--150},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJESDF.2010.033782},
  doi       = {10.1504/IJESDF.2010.033782},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/WuH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AlipourEK09,
  author    = {Hamid R. Alipour and
               Mostafa Esmaeili and
               Kashefi Kia},
  title     = {Supporting security against {SYN} flooding attacks in distributed
               denial-of-service via measuring internet protocol flow information
               export-based traffic},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {1},
  pages     = {49--57},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.023875},
  doi       = {10.1504/IJESDF.2009.023875},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AlipourEK09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AnagnostouL09,
  author    = {Miltiades E. Anagnostou and
               Maria A. Lambrou},
  title     = {Privacy now and in the age of ambient intelligence},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {4},
  pages     = {355--364},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027668},
  doi       = {10.1504/IJESDF.2009.027668},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AnagnostouL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BerteDGLMO09,
  author    = {Rosamaria Berte and
               Fabio Dellutri and
               Antonio Grillo and
               Alessandro Lentini and
               Gianluigi Me and
               Vittorio Ottaviani},
  title     = {Fast smartphones forensic analysis results through mobile internal
               acquisition tool and forensic farm},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {1},
  pages     = {18--28},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.023872},
  doi       = {10.1504/IJESDF.2009.023872},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BerteDGLMO09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Blackwell09,
  author    = {Clive Blackwell},
  title     = {A reasoning agent for credit card fraud using the event calculus},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {1},
  pages     = {77--91},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.023878},
  doi       = {10.1504/IJESDF.2009.023878},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Blackwell09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Boyd09,
  author    = {David J. Boyd},
  title     = {A pragmatic approach to temporary payment card numbers},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {3},
  pages     = {253--268},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027521},
  doi       = {10.1504/IJESDF.2009.027521},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Boyd09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ChildsS09,
  author    = {Dave Childs and
               Paul Stephens},
  title     = {An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {2},
  pages     = {182--198},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.024902},
  doi       = {10.1504/IJESDF.2009.024902},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ChildsS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Collins09,
  author    = {David Collins},
  title     = {{XFT:} a forensic toolkit for the original Xbox game console},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {2},
  pages     = {199--205},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.024903},
  doi       = {10.1504/IJESDF.2009.024903},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Collins09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DavidsonOY09,
  author    = {Alan Davidson and
               Rein Oja and
               Louise Yngstr{\"{o}}m},
  title     = {A Swedish {IT} forensics course - expert opinions},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {3},
  pages     = {322--333},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027525},
  doi       = {10.1504/IJESDF.2009.027525},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/DavidsonOY09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GibsonSMC09,
  author    = {Stuart J. Gibson and
               Christopher J. Solomon and
               Matthew I. S. Maylin and
               Clifford Clark},
  title     = {New methodology in facial composite construction: from theory to practice},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {2},
  pages     = {156--168},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.024900},
  doi       = {10.1504/IJESDF.2009.024900},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GibsonSMC09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HesseP09,
  author    = {Malte Hesse and
               Norbert Pohlmann},
  title     = {European internet early warning system},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {1},
  pages     = {1--17},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.023871},
  doi       = {10.1504/IJESDF.2009.023871},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/HesseP09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Induruwa09,
  author    = {Abhaya Induruwa},
  title     = {Mobile phone forensics: an overview of technical and legal aspects},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {2},
  pages     = {169--181},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.024901},
  doi       = {10.1504/IJESDF.2009.024901},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Induruwa09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Jahankhani09,
  author    = {Hamid Jahankhani},
  title     = {Criminal investigation and forensic tools for smartphones},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {4},
  pages     = {387--406},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027671},
  doi       = {10.1504/IJESDF.2009.027671},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Jahankhani09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Jones09,
  author    = {Nigel Jones},
  title     = {{IT} forensics: 22 years on},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {2},
  pages     = {116--131},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.024897},
  doi       = {10.1504/IJESDF.2009.024897},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Jones09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KarantjiasP09,
  author    = {Athanasios Karantjias and
               Nineta Polemi},
  title     = {An innovative platform architecture for complex secure e/m-governmental
               services},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {4},
  pages     = {338--354},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027667},
  doi       = {10.1504/IJESDF.2009.027667},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KarantjiasP09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KesslerSF09,
  author    = {Gary C. Kessler and
               Robert Simpson and
               James Fry},
  title     = {Multidisciplinary learning using mock trials},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {2},
  pages     = {141--155},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.024899},
  doi       = {10.1504/IJESDF.2009.024899},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KesslerSF09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KhatirH09,
  author    = {Marjan Khatir and
               Seyed Mahmood Hejazi},
  title     = {How to find exculpatory and inculpatory evidence using a circular
               digital forensics process model},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {1},
  pages     = {68--76},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.023877},
  doi       = {10.1504/IJESDF.2009.023877},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KhatirH09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KonarM09,
  author    = {Debajyoti Konar and
               Chandan Mazumdar},
  title     = {A generalised model of e-trading for gradual secret release fair exchange
               protocol},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {1},
  pages     = {101--111},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.023880},
  doi       = {10.1504/IJESDF.2009.023880},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KonarM09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MoirW09,
  author    = {Iain Moir and
               George R. S. Weir},
  title     = {Contact centres and identity theft},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {1},
  pages     = {92--100},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.023879},
  doi       = {10.1504/IJESDF.2009.023879},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MoirW09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Norris-JonesM09,
  author    = {Lynne Norris{-}Jones and
               Steve Marsh},
  title     = {An investigation into the technical, legal and ethical issues associated
               with biometrics in the {UK} (application to biometrics module for
               computing programmes)},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {2},
  pages     = {206--218},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.024904},
  doi       = {10.1504/IJESDF.2009.024904},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Norris-JonesM09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/NtalianiCMK09,
  author    = {Maria Ntaliani and
               Constantina I. Costopoulou and
               Nikos Manouselis and
               Sotiris Karetsos},
  title     = {M-government services for rural SMEs},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {4},
  pages     = {407--423},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027672},
  doi       = {10.1504/IJESDF.2009.027672},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/NtalianiCMK09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/OnwubikoL09,
  author    = {Cyril Onwubiko and
               Andrew P. Lenaghan},
  title     = {Challenges and complexities of managing information security},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {3},
  pages     = {306--321},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027524},
  doi       = {10.1504/IJESDF.2009.027524},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/OnwubikoL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Overill09,
  author    = {Richard E. Overill},
  title     = {Development of masters modules in computer forensics and cybercrime
               for computer science and forensic science students},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {2},
  pages     = {132--140},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.024898},
  doi       = {10.1504/IJESDF.2009.024898},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Overill09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PatrikakisKVN09,
  author    = {Charalampos Z. Patrikakis and
               Dimitris M. Kyriazanos and
               Athanasios Voulodimos and
               Ioannis G. Nikolakopoulos},
  title     = {Trust and security in Personal Network environments},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {4},
  pages     = {365--376},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027669},
  doi       = {10.1504/IJESDF.2009.027669},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PatrikakisKVN09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PimenidisG09,
  author    = {Elias Pimenidis and
               Christos K. Georgiadis},
  title     = {Web services security evaluation considerations},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {3},
  pages     = {239--252},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027520},
  doi       = {10.1504/IJESDF.2009.027520},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PimenidisG09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PimenidisSA09,
  author    = {Elias Pimenidis and
               Alexander B. Sideridis and
               Eleni Antonopoulou},
  title     = {Mobile devices and services: bridging the digital divide in rural
               areas},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {4},
  pages     = {424--434},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027673},
  doi       = {10.1504/IJESDF.2009.027673},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PimenidisSA09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/QiWX09,
  author    = {Man Qi and
               Yongquan Wang and
               Rongsheng Xu},
  title     = {Fighting cybercrime: legislation in China},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {2},
  pages     = {219--227},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.024905},
  doi       = {10.1504/IJESDF.2009.024905},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/QiWX09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RehakPGBKC09,
  author    = {Martin Reh{\'{a}}k and
               Michal Pechoucek and
               Martin Grill and
               Karel Bartos and
               Vojtech Krmicek and
               Pavel Celeda},
  title     = {Collaborative approach to network behaviour analysis based on hardware-accelerated
               FlowMon probes},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {1},
  pages     = {35--48},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.023874},
  doi       = {10.1504/IJESDF.2009.023874},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/RehakPGBKC09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RossSU09,
  author    = {Margaret Ross and
               Geoff Staples and
               Mark Udall},
  title     = {Cybercrime - raising awareness for future professionals},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {2},
  pages     = {228--238},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.024906},
  doi       = {10.1504/IJESDF.2009.024906},
  timestamp = {Fri, 04 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/RossSU09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SeedorfBH09,
  author    = {Jan Seedorf and
               Kristian Beckers and
               Felipe Huici},
  title     = {Single-message denial-of-service attacks against voice-over-internet
               protocol terminals},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {1},
  pages     = {29--34},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.023873},
  doi       = {10.1504/IJESDF.2009.023873},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SeedorfBH09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SirhindiAM09,
  author    = {Rabia Sirhindi and
               Mehreen Afzal and
               Saeed Murtaza},
  title     = {An extended secret sharing scheme for colour images with fixed pixel
               expansion},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {1},
  pages     = {58--67},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.023876},
  doi       = {10.1504/IJESDF.2009.023876},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SirhindiAM09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TaheriniaJ09,
  author    = {Amirhossein Taherinia and
               Mansour Jamzad},
  title     = {A robust spread spectrum watermarking method using two levels {DCT}},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {3},
  pages     = {280--305},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027523},
  doi       = {10.1504/IJESDF.2009.027523},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TaheriniaJ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TaitS09,
  author    = {Bobby L. Tait and
               Sebastiaan H. von Solms},
  title     = {BioVault: biometrically based encryption},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {3},
  pages     = {269--279},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027522},
  doi       = {10.1504/IJESDF.2009.027522},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/TaitS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZorkadisK09,
  author    = {Vasilios Zorkadis and
               Dimitrios A. Karras},
  title     = {On privacy-enhancing architectures for distribution of real time performance
               demanding mobile services},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {2},
  number    = {4},
  pages     = {377--386},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJESDF.2009.027670},
  doi       = {10.1504/IJESDF.2009.027670},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/ZorkadisK09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/0002P08,
  author    = {Katerina Papadaki and
               Despina Polemi},
  title     = {A meta-process for information security risk management},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {4},
  pages     = {336--343},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.021451},
  doi       = {10.1504/IJESDF.2008.021451},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/0002P08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AfzalM08,
  author    = {Mehreen Afzal and
               Ashraf Masood},
  title     = {Algebraic analysis of Trivium and Trivium/128},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {4},
  pages     = {344--352},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.021452},
  doi       = {10.1504/IJESDF.2008.021452},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AfzalM08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AsaarMS08,
  author    = {Maryam Rajabzadeh Asaar and
               Javad Mohajeri and
               Mahmoud Salmasizadeh},
  title     = {Another security improvement over the Lin et al.'s electronic-voting
               scheme},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {4},
  pages     = {413--422},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.021458},
  doi       = {10.1504/IJESDF.2008.021458},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AsaarMS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BoucherkhaB08,
  author    = {Samia Boucherkha and
               Mohamed Benmohamed},
  title     = {Textural features extraction for image integrity verification},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {3},
  pages     = {268--280},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.020944},
  doi       = {10.1504/IJESDF.2008.020944},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BoucherkhaB08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BurnsW08,
  author    = {Susan Burns and
               George R. S. Weir},
  title     = {Varieties of smartcard fraud},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {4},
  pages     = {374--386},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.021455},
  doi       = {10.1504/IJESDF.2008.021455},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/BurnsW08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DaiSZ08,
  author    = {Yi Dai and
               Jinshu Su and
               Ying Zhang},
  title     = {A coordination scheduling mechanism to guarantee packet ordering in
               parallel packet switch},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {4},
  pages     = {362--373},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.021454},
  doi       = {10.1504/IJESDF.2008.021454},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/DaiSZ08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GeorgiadisBP08,
  author    = {Christos K. Georgiadis and
               Dimitrios A. Baltatzis and
               George Pangalos},
  title     = {Secure mobile agent environments: modelling role assignments},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {3},
  pages     = {249--267},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.020943},
  doi       = {10.1504/IJESDF.2008.020943},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GeorgiadisBP08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JahankaniAW08,
  author    = {Hossein Jahankani and
               Branko Antonijevic and
               Terry Hugh Walcott},
  title     = {Tools protecting stakeholders against hackers and crackers: an insight
               review},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {4},
  pages     = {423--429},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.021459},
  doi       = {10.1504/IJESDF.2008.021459},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/JahankaniAW08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KumarHR08,
  author    = {Manish Kumar and
               M. Hanumanthappa and
               Bhavanam Lakshma Reddy},
  title     = {Security issues in m-government},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {4},
  pages     = {401--412},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.021457},
  doi       = {10.1504/IJESDF.2008.021457},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KumarHR08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MousaviPJ08,
  author    = {Amin Mousavi and
               Elias Pimenidis and
               Hamid Jahankhani},
  title     = {Cultivating trust - an electronic-government development model for
               addressing the needs of developing countries},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {3},
  pages     = {233--248},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.020942},
  doi       = {10.1504/IJESDF.2008.020942},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MousaviPJ08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Onwubiko08,
  author    = {Cyril Onwubiko},
  title     = {Multisensor message exchange mechanism},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {4},
  pages     = {387--400},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.021456},
  doi       = {10.1504/IJESDF.2008.021456},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Onwubiko08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/QiEWX08,
  author    = {Man Qi and
               Denis Edgar{-}Nevill and
               Yongquan Wang and
               Rongsheng Xu},
  title     = {Tracking online trails},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {4},
  pages     = {353--361},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.021453},
  doi       = {10.1504/IJESDF.2008.021453},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/QiEWX08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SuskiTMM08,
  author    = {William C. Suski and
               Michael A. Temple and
               Michael J. Mendenhall and
               Robert F. Mills},
  title     = {Radio frequency fingerprinting commercial communication devices to
               enhance electronic security},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {3},
  pages     = {301--322},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.020946},
  doi       = {10.1504/IJESDF.2008.020946},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijesdf/SuskiTMM08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Yampolskiy08,
  author    = {Roman V. Yampolskiy},
  title     = {Action-based user authentication},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {3},
  pages     = {281--300},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.020945},
  doi       = {10.1504/IJESDF.2008.020945},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Yampolskiy08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/YauKW08,
  author    = {Wai Chee Yau and
               Dinesh Kant Kumar and
               Hans Weghorn},
  title     = {Vision-based technique for secure recognition of voice-less commands},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {4},
  pages     = {323--335},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJESDF.2008.021450},
  doi       = {10.1504/IJESDF.2008.021450},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/YauKW08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Ahsan07,
  author    = {Syed Ahsan},
  title     = {{IT} enabled counter terrorism infrastructure: issues and challenges},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {1},
  pages     = {117--124},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.013597},
  doi       = {10.1504/IJESDF.2007.013597},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Ahsan07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AickelinTH07,
  author    = {Uwe Aickelin and
               Jamie Twycross and
               Thomas Hesketh{-}Roberts},
  title     = {Rule generalisation in intrusion detection systems using {SNORT}},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {1},
  pages     = {101--116},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.013596},
  doi       = {10.1504/IJESDF.2007.013596},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AickelinTH07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AngelopoulouTXT07,
  author    = {Olga Angelopoulou and
               Paula Thomas and
               Konstantinos Xynos and
               Theodore Tryfonas},
  title     = {Online {ID} theft techniques, investigation and response},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {1},
  pages     = {76--88},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.013594},
  doi       = {10.1504/IJESDF.2007.013594},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AngelopoulouTXT07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AppavuR07,
  author    = {Subramanian Appavu and
               Ramasamy Rajaram},
  title     = {Detection of e-mail concerning criminal activities using association
               rule-based decision tree},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {2},
  pages     = {131--145},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.016863},
  doi       = {10.1504/IJESDF.2007.016863},
  timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AppavuR07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AssoraKS07,
  author    = {Mohammed Assora and
               James Kadirire and
               Ayoub Shirvani},
  title     = {A web transaction security scheme based on disposable credit card
               numbers},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {2},
  pages     = {146--155},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.016864},
  doi       = {10.1504/IJESDF.2007.016864},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/AssoraKS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Bilar07,
  author    = {Daniel Bilar},
  title     = {Opcodes as predictor for malware},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {2},
  pages     = {156--168},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.016865},
  doi       = {10.1504/IJESDF.2007.016865},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Bilar07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/FlechaisMS07,
  author    = {Ivan Flechais and
               Cecilia Mascolo and
               Martina Angela Sasse},
  title     = {Integrating security and usability into the requirements and design
               process},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {1},
  pages     = {12--26},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.013589},
  doi       = {10.1504/IJESDF.2007.013589},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/FlechaisMS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GeisslerM07,
  author    = {William K. Geissler and
               John C. McEachen},
  title     = {Exploiting error control in network traffic for robust, high rate
               covert channels},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {2},
  pages     = {180--193},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.016867},
  doi       = {10.1504/IJESDF.2007.016867},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/GeisslerM07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Jahankhani07,
  author    = {Hamid Jahankhani},
  title     = {Evaluation of cyber legislations: trading in the global cyber village},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {1},
  pages     = {1--11},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.013588},
  doi       = {10.1504/IJESDF.2007.013588},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Jahankhani07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KardarasKCK07,
  author    = {Konstantinos Kardaras and
               Zacharias Kamarianakis and
               Andrew Chanerley and
               Dimitris Koutsouris},
  title     = {Unauthorised person recognition using gait biometry and information
               analysis: integration and transparency of security operations in a
               centralised intelligence environment},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {2},
  pages     = {206--217},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.016869},
  doi       = {10.1504/IJESDF.2007.016869},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/KardarasKCK07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MoenKSH07,
  author    = {Vebj{\o}rn Moen and
               Andr{\'{e}} N. Klingsheim and
               Kent Inge Fagerland Simonsen and
               Kjell J{\o}rgen Hole},
  title     = {Vulnerabilities in e-governments},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {1},
  pages     = {89--100},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.013595},
  doi       = {10.1504/IJESDF.2007.013595},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/MoenKSH07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Mouratidis07,
  author    = {Haralambos Mouratidis},
  title     = {Secure information systems engineering: a manifesto},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {1},
  pages     = {27--41},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.013590},
  doi       = {10.1504/IJESDF.2007.013590},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Mouratidis07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PattinsonH07,
  author    = {Colin Pattinson and
               Kemal Hajdarevic},
  title     = {Timing considerations in detecting resource starvation attacks using
               statistical profiles},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {2},
  pages     = {194--205},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.016868},
  doi       = {10.1504/IJESDF.2007.016868},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PattinsonH07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PimenidisS07,
  author    = {Elias Pimenidis and
               Ioannis Savvas},
  title     = {E-identification technologies for e-government interoperability in
               the {EU}},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {2},
  pages     = {169--179},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.016866},
  doi       = {10.1504/IJESDF.2007.016866},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/PimenidisS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RevettGGEMS07,
  author    = {Kenneth Revett and
               Florin Gorunescu and
               Marina Gorunescu and
               Marius Ene and
               S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and
               Henrique M. Dinis Santos},
  title     = {A machine learning approach to keystroke dynamics based user authentication},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {1},
  pages     = {55--70},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.013592},
  doi       = {10.1504/IJESDF.2007.013592},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/RevettGGEMS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Taal07,
  author    = {Aminata Taal},
  title     = {Report examining the weaknesses in the fight against cyber-crime from
               within},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {2},
  pages     = {125--130},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.016862},
  doi       = {10.1504/IJESDF.2007.016862},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Taal07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Watney07,
  author    = {Murdoch Watney},
  title     = {State surveillance of the internet: human rights infringement or e-security
               mechanism?},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {1},
  pages     = {42--54},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.013591},
  doi       = {10.1504/IJESDF.2007.013591},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Watney07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Watson07,
  author    = {David Lilburn Watson},
  title     = {Stealing corporate secrets using open source intelligence (the practitioner's
               view)},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {1},
  pages     = {71--75},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.013593},
  doi       = {10.1504/IJESDF.2007.013593},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Watson07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Zorkadis07,
  author    = {Vasilios Zorkadis},
  title     = {Detection and surveillance technologies: privacy-related requirements
               and protection schemes},
  journal   = {Int. J. Electron. Secur. Digit. Forensics},
  volume    = {1},
  number    = {2},
  pages     = {218--231},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJESDF.2007.016870},
  doi       = {10.1504/IJESDF.2007.016870},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijesdf/Zorkadis07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics