default search action
International Journal of Electronic Security and Digital Forensics, Volume 16
Volume 16, Number 1, 2024
- Sergey Manin, Salahiden Sabikenov, Yelena Manina:
Essence, concept, and types of national legislation in the field of information technology. 1-13 - Aigerim Issakhankyzy, Gulnar A. Alibayeva, Ainur A. Sabitova, Serik K. Zhetpisov, Botakoz S. Shansharbayeva:
Legal mechanism for regulating responsibilities in the information sphere. 14-27 - Sonam Mittal, Soni Singh, D. Balakumaran, K. Hemalatha:
Security of internet of things based on cryptographic algorithm. 28-39 - Alagappan Annamalai, Ramesh Chandra Poonia, Suresh Shanmugasundaram:
Internet of things-based virtual private social networks on a text messaging strategy on mobile platforms. 40-62 - T. Thirumurugan, Bojaraj Leena, R. Lavanya, T. J. Nagalakshmi:
Formulation of a two-level electronic security and protection system for malls. 63-72 - A. Rajasekar, A. Karunakaran, C. Sivakumaran, Sheshang Dipakkumar Degadwala:
An original data encryption technique for communication networks. 73-83 - D. Ravikumar, K. Sasikala, R. S. Vijayashanthi, S. Narasimha Prasad:
Analysis of smart grid-based intrusion detection system through machine learning methods. 84-96 - Rui Yang, Lijuan Feng, Jiangjiang Li:
Image encryption based on 3D Arnold and elementary cellular automata method. 97-111 - C. Ravichandran, Ashok Vajravelu, Sankarsan Panda, Sheshang Dipakkumar Degadwala:
Data hiding using video steganography. 112-123 - M. Deepa, J. Dhilipan:
Security in database management system using machine learning. 124-133
Volume 16, Number 2, 2024
- Chenghua Tang, Min Hu, Mengmeng Yang, Baohua Qiang:
Malicious program ontology rule set based on association decision and linear discriminant. 135-159 - Helina Rajini Suresh, M. Shanmuganathan, T. Senthilkumar, B. S. Vidhyasagar:
Deep learning-based image forgery detection system. 160-172 - Bassam Al-Shargabi, Rame Jamil Al-Dwairi, Mohammed Abbas Fadhil Al-Husainy:
Using DNA to develop a lightweight symmetric encryption method to encrypt the data of IoT devices. 173-189 - Kiran Shrimant Kakade, T. J. Nagalakshmi, S. Pradeep, B. R. Tapas Bapu:
Network intrusion detection: systematic evaluation using deep learning. 190-201 - P. J. Sathish Kumar, Jency Rubia J, R. Anitha, Sheshang Degadwala:
Dark web data classification using deep neural network. 202-212 - A. Sivakumar, Jency Rubia J, Hima Vijayan, C. Sivakumaran:
Detection of Botnet using deep learning algorithm: application of machine learning in cyber-security. 213-222 - Sonam Mittal, K. R. Ramkumar:
A retrospective analysis on fully homomorphic encryption scheme. 223-254 - Kiran Shrimant Kakade, Swagata Sarkar, S. Asha, C. Sivakumaran:
A novel colour image encryption algorithm using S-box technique. 255-266
Volume 16, Number 3, 2024
- Faleh Alshameri, Katrina Khanta, Stephen Boyce:
A comparison study to analyse the data acquisitions of iOS and android smartphones using multiple forensic tools. 267-283 - Shahid Karim, Geng Tong, Muhammad Shakir, Asif Ali Laghari, Syed Wajid Ali Shah:
Infrared and visible image fusion based on improved NSCT and NSST. 284-303 - Abhinav Shah, Digvijaysinh Rathod, Yash Mehta:
A comparative study of covert channel attacks in Android with different parameters and detection tools. 304-316 - D. Kalaiyarasi, S. Leopauline, S. Krishnaveni, Ashok Vajravelu:
Cloud computing-based computer forensics: a deep learning technique. 317-328 - Sulakshana B. Mane, Kiran Shrimant Kakade, S. Shibu, Sundar Suvitha:
Functional encryption implementation to protect storage data in the cloud. 329-343 - Kiran Shrimant Kakade, C. Rajesh, T. Veena, P. Sivakumar:
Security challenges for routing protocols in mobile ad hoc network. 344-356 - Priya Sharma, Om Prakash Jasuja:
Forensic examination of digitally captured handwriting - a review of contemporary tools and techniques. 357-371 - Suraj Harsha Kamtam, Harjinder Singh Lallie, Muhammad Ajmal Azad:
The application of AI techniques for firearm detection in digital forensic investigation. 372-396
Volume 16, Number 4, 2024
- Hitesh Sanghvi, Digvijaysinh Rathod, Parag Shukla, Ramya Shah, Yashrajsinh Zala:
Web browser forensics: Mozilla Firefox. 397-423 - Borase Bhushan Gulabrao, Digvijaysinh Rathod:
A review of research in forensic investigation of cryptocurrencies. 424-440 - Asem Bani Amer, Noor Issa Al-Hendi:
Right of attribution in digital children's literature. 441-450 - M. Balasubramanian, Kiran Shrimant Kakade, Sulakshana B. Mane, Sujatha Jamuna Anand:
Deep learning for smart home security systems: CNN-based home security. 451-463 - K. Sivakumar, C. Rajesh, S. Julia Faith, S. Narasimha Prasad:
An effective network security scrutinising method based on deep learning. 464-473 - Sulakshana B. Mane, Kiran Shrimant Kakade, S. P. Shingare, Nanasaheb M. Halgare:
SQL injection authentication security threat. 474-485 - Manju Lata, Vikas Kumar:
A framework for security of public cloud environment. 486-502 - Divya Singhal, Richa Vijay:
Predictive modelling for fake news detection using TF-IDF and count vectorizers. 503-519 - Noor Issa Al-Hendi, Asem Baniamer, Muamar Hassan Salameh:
Legislative deficiency in moral authors' rights in digital literature (international conventions and Jordanian law). 520-532
Volume 16, Number 5, 2024
- Chandrakant Mallick, Sarojananda Mishra, Parimal Kumar Giri, Bijay Kumar Paikaray:
A metaheuristic optimisation-based deep learning model for fake news detection in online social networks. 533-556 - Abdullah Alkhseilat, Naser Al Ali, Lujain Edweidar:
Legal regulation of impersonation through websites. 557-576 - A. Mani, Kiran Shrimant Kakade, P. R. Therasa, M. Vanitha:
Cryptography in the cloud: securing cloud data with encryption. 577-589 - P. R. Therasa, M. Shanmuganathan, B. R. Tapas Bapu, N. Sankarram:
Machine learning models for enhancing cyber security. 590-601 - Durga Prasad Srirangam, Salina Adinarayana, B. R. Tapas Bapu, N. Partheeban:
Network security intrusion target detection system in the cloud. 602-613 - Yamin Li:
Adversarial attack model based on deep neural network interpretability and artificial fish swarm algorithm. 614-632 - Muhammad Ibrar, Shoulin Yin, Hang Li, Shahid Karim, Asif Ali Laghari:
Comprehensive review of emerging cybersecurity trends and developments. 633-647 - E. Sivajothi, S. Mary Diana, M. Rekha, R. Babitha Lincy, P. Damodharan, Jency Rubia J:
A future prediction for cyber-attacks in the network domain with the visualisation of patterns in cyber-security tickets with machine learning. 648-661
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.