


default search action
International Journal of Electronic Security and Digital Forensics, Volume 16
Volume 16, Number 1, 2024
- Sergey Manin, Salahiden Sabikenov, Yelena Manina:

Essence, concept, and types of national legislation in the field of information technology. 1-13 - Aigerim Issakhankyzy, Gulnar A. Alibayeva, Ainur A. Sabitova, Serik K. Zhetpisov, Botakoz S. Shansharbayeva:

Legal mechanism for regulating responsibilities in the information sphere. 14-27 - Sonam Mittal

, Soni Singh
, D. Balakumaran, K. Hemalatha:
Security of internet of things based on cryptographic algorithm. 28-39 - Alagappan Annamalai, Ramesh Chandra Poonia, Suresh Shanmugasundaram:

Internet of things-based virtual private social networks on a text messaging strategy on mobile platforms. 40-62 - T. Thirumurugan, Bojaraj Leena, R. Lavanya, T. J. Nagalakshmi:

Formulation of a two-level electronic security and protection system for malls. 63-72 - A. Rajasekar, A. Karunakaran, C. Sivakumaran, Sheshang Dipakkumar Degadwala:

An original data encryption technique for communication networks. 73-83 - D. Ravikumar, K. Sasikala, R. S. Vijayashanthi, S. Narasimha Prasad:

Analysis of smart grid-based intrusion detection system through machine learning methods. 84-96 - Rui Yang, Lijuan Feng, Jiangjiang Li:

Image encryption based on 3D Arnold and elementary cellular automata method. 97-111 - C. Ravichandran, Ashok Vajravelu, Sankarsan Panda

, Sheshang Dipakkumar Degadwala:
Data hiding using video steganography. 112-123 - M. Deepa, J. Dhilipan:

Security in database management system using machine learning. 124-133
Volume 16, Number 2, 2024
- Chenghua Tang, Min Hu, Mengmeng Yang, Baohua Qiang:

Malicious program ontology rule set based on association decision and linear discriminant. 135-159 - Helina Rajini Suresh

, M. Shanmuganathan, T. Senthilkumar, B. S. Vidhyasagar:
Deep learning-based image forgery detection system. 160-172 - Bassam Al-Shargabi

, Rame Jamil Al-Dwairi, Mohammed Abbas Fadhil Al-Husainy:
Using DNA to develop a lightweight symmetric encryption method to encrypt the data of IoT devices. 173-189 - Kiran Shrimant Kakade, T. J. Nagalakshmi, S. Pradeep, B. R. Tapas Bapu:

Network intrusion detection: systematic evaluation using deep learning. 190-201 - P. J. Sathish Kumar, Jency Rubia J

, R. Anitha, Sheshang Degadwala:
Dark web data classification using deep neural network. 202-212 - A. Sivakumar, Jency Rubia J

, Hima Vijayan, C. Sivakumaran:
Detection of Botnet using deep learning algorithm: application of machine learning in cyber-security. 213-222 - Sonam Mittal

, K. R. Ramkumar:
A retrospective analysis on fully homomorphic encryption scheme. 223-254 - Kiran Shrimant Kakade, Swagata Sarkar, S. Asha, C. Sivakumaran:

A novel colour image encryption algorithm using S-box technique. 255-266
Volume 16, Number 3, 2024
- Faleh Alshameri, Katrina Khanta, Stephen Boyce:

A comparison study to analyse the data acquisitions of iOS and android smartphones using multiple forensic tools. 267-283 - Shahid Karim, Geng Tong, Muhammad Shakir, Asif Ali Laghari

, Syed Wajid Ali Shah:
Infrared and visible image fusion based on improved NSCT and NSST. 284-303 - Abhinav Shah, Digvijaysinh Rathod, Yash Mehta:

A comparative study of covert channel attacks in Android with different parameters and detection tools. 304-316 - D. Kalaiyarasi, S. Leopauline, S. Krishnaveni, Ashok Vajravelu:

Cloud computing-based computer forensics: a deep learning technique. 317-328 - Sulakshana B. Mane

, Kiran Shrimant Kakade, S. Shibu, Sundar Suvitha:
Functional encryption implementation to protect storage data in the cloud. 329-343 - Kiran Shrimant Kakade, C. Rajesh, T. Veena, P. Sivakumar:

Security challenges for routing protocols in mobile ad hoc network. 344-356 - Priya Sharma

, Om Prakash Jasuja:
Forensic examination of digitally captured handwriting - a review of contemporary tools and techniques. 357-371 - Suraj Harsha Kamtam, Harjinder Singh Lallie, Muhammad Ajmal Azad:

The application of AI techniques for firearm detection in digital forensic investigation. 372-396
Volume 16, Number 4, 2024
- Hitesh Sanghvi, Digvijaysinh Rathod, Parag Shukla

, Ramya Shah, Yashrajsinh Zala
:
Web browser forensics: Mozilla Firefox. 397-423 - Borase Bhushan Gulabrao, Digvijaysinh Rathod:

A review of research in forensic investigation of cryptocurrencies. 424-440 - Asem Bani Amer, Noor Issa Al-Hendi:

Right of attribution in digital children's literature. 441-450 - M. Balasubramanian, Kiran Shrimant Kakade, Sulakshana B. Mane

, Sujatha Jamuna Anand
:
Deep learning for smart home security systems: CNN-based home security. 451-463 - K. Sivakumar, C. Rajesh, S. Julia Faith, S. Narasimha Prasad:

An effective network security scrutinising method based on deep learning. 464-473 - Sulakshana B. Mane

, Kiran Shrimant Kakade, S. P. Shingare, Nanasaheb M. Halgare:
SQL injection authentication security threat. 474-485 - Manju Lata, Vikas Kumar

:
A framework for security of public cloud environment. 486-502 - Divya Singhal

, Richa Vijay:
Predictive modelling for fake news detection using TF-IDF and count vectorizers. 503-519 - Noor Issa Al-Hendi, Asem Baniamer, Muamar Hassan Salameh:

Legislative deficiency in moral authors' rights in digital literature (international conventions and Jordanian law). 520-532
Volume 16, Number 5, 2024
- Chandrakant Mallick, Sarojananda Mishra, Parimal Kumar Giri, Bijay Kumar Paikaray:

A metaheuristic optimisation-based deep learning model for fake news detection in online social networks. 533-556 - Abdullah Alkhseilat, Naser Al Ali

, Lujain Edweidar:
Legal regulation of impersonation through websites. 557-576 - A. Mani, Kiran Shrimant Kakade, P. R. Therasa, M. Vanitha:

Cryptography in the cloud: securing cloud data with encryption. 577-589 - P. R. Therasa, M. Shanmuganathan, B. R. Tapas Bapu, N. Sankarram:

Machine learning models for enhancing cyber security. 590-601 - Durga Prasad Srirangam, Salina Adinarayana, B. R. Tapas Bapu, N. Partheeban:

Network security intrusion target detection system in the cloud. 602-613 - Yamin Li:

Adversarial attack model based on deep neural network interpretability and artificial fish swarm algorithm. 614-632 - Muhammad Ibrar, Shoulin Yin, Hang Li, Shahid Karim, Asif Ali Laghari

:
Comprehensive review of emerging cybersecurity trends and developments. 633-647 - E. Sivajothi, S. Mary Diana, M. Rekha, R. Babitha Lincy, P. Damodharan, Jency Rubia J:

A future prediction for cyber-attacks in the network domain with the visualisation of patterns in cyber-security tickets with machine learning. 648-661
Volume 16, Number 6, 2024
- Ata Jahangir Moshayedi, Atanu Shuvam Roy, Hamidreza Ghorbani, Habibollah Lotfi, Xiaohong Zhang, Leifa Liao, Mehdi Gheisari:

A novel IoT-enabled portable, secure automatic self-lecture attendance system: design, development and comparison. 663-689 - Sulakshana B. Mane, Kiran Shrimant Kakade, Arun H. Ukarande, B. P. Saoji, Kiran Joshi:

Honeybrid method for network security in a software defined network system. 690-702 - Oday Mohammad Al-Hilat, Nayel Musa AlOmran:

Electronic disciplinary violations and methods of proof in Jordanian and Egyptian laws. 703-719 - Abdullah Alkhseilat, Tareq Al-Billeh, Mohammed Albazi, Naser Al Ali

:
The authenticity of digital evidence in criminal courts: a comparative study. 720-738 - Laxmi B. Bhagwat, Balaji M. Patil:

Implementation of a novel technique for ordering of features algorithm in detection of ransomware attack. 739-751 - Rahul Kumar Sahani, Madhusudan Anand, Arhit Bose Tagore, Shreyash Mehrotra, Ruksana Tabassum, S. P. Raja:

Android malware analysis using multiple machine learning algorithms. 752-774 - Kanica Chugh, Pooja Ahuja:

A forensic approach: identification of source printer through deep learning. 775-798

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














