Stop the war!
Остановите войну!
for scientists:
default search action
International Journal of Electronic Security and Digital Forensics, Volume 9
Volume 9, Number 1, 2017
- Fernando Molina Granja, Glen Dario Rodriguez Rafael:
The preservation of digital evidence and its admissibility in the court. 1-18 - Maede Ashouri-Talouki, Ahmad Baraani-Dastjerdi:
Cryptographic collusion-resistant protocols for secure sum. 19-34 - Zhi-hai Zhuo, Ning Zhong:
A new kind of steganography schemes for image. 35-44 - Rosario Culmone, Maria Concetta De Vivo:
Vanishing files: protocols and regulations for immaterial documents. 45-61 - Mehrdad Tajbakhsh, Elaheh Homayounvala, Sajjad Shokouhyar:
Forensically ready digital identity management systems, issues of digital identity life cycle and context of usage. 62-83
Volume 9, Number 2, 2017
- Nilay R. Mistry, Mohindersinh Dahiya:
VolNet: a framework for analysing network-based artefacts from volatile memory. 101-115 - S. Carolin Jeeva, Elijah Blessing Rajsingh:
Phishing URL detection-based feature selection to classifiers. 116-131 - Haoran Chen, Jianhua Chen, Han Shen:
An improved authenticated key agreement with anonymity for session initiation protocol. 132-149 - Fernando Molina Granja, Glen Dario Rodriguez Rafael:
Model for digital evidence preservation in criminal research institutions - PREDECI. 150-166 - Mohammed I. Al-Saleh, Mona J. Al-Shamaileh:
Forensic artefacts associated with intentionally deleted user accounts. 167-179 - Manoj Kumar Chande, Te-Yu Chen, Cheng-Chi Lee:
An improved multi-signature scheme for specified group of verifiers. 180-190
Volume 9, Number 3, 2017
- Manar Abduljabbar Ahmad Mizher, Mei Choo Ang, Ahmad A. Mazhar, Manal A. Mizher:
A review of video falsifying techniques and video forgery detection techniques. 191-208 - Ilane Cunha, Jefferson Rodrigo A. Cavalcante, Ahmed Patel:
A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution. 209-238 - Mohd Anuar Mat Isa, Habibah Hashim, Syed Farid Syed Adnan, Norhaflyza Marbukhari, Nur Nabila Mohamed:
An automobile security protocol: side-channel security against timing and relay attacks. 239-253 - Jayanta Mondal, Debabala Swain, Dushant P. Singh, Sharmila Mohanty:
An improved LSB-based RDH technique with better reversibility. 254-268 - Gandeva B. Satrya, A. Ahmad Nasrullah, Soo Young Shin:
Identifying artefact on Microsoft OneDrive client to support Android forensics. 269-291
Volume 9, Number 4, 2017
- Jacques Barnard, Magda Huisman, Günther Drevin:
Security awareness and the use of location-based services, technologies and games. 293-325 - Diana Hintea, Robert Bird, Michael Green:
An investigation into the forensic implications of the Windows 10 operating system: recoverable artefacts and significant changes from Windows 8.1. 326-345 - Dinesh N. Patil, Bandu Baburao Meshram:
An evidence collection and analysis of Windows registry. 346-361 - Arashdeep Kaur, Malay Kishore Dutta, Krishan Mohan Soni, Nidhi Taneja:
Embedding digital watermark in one-dimensional signals using wavelet and Schur decomposition. 362-380 - Jonathan Pan:
Encryption scheme classification: a deep learning approach. 381-395 - Lili Yan, Yan Chang, Shibin Zhang:
Comments on 'An improved authentication scheme for mobile satellite communication systems'. 396-406
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.