Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijesdf/ijesdf9.bht:"
@article{DBLP:journals/ijesdf/Al-SalehA17, author = {Mohammed I. Al{-}Saleh and Mona J. Al{-}Shamaileh}, title = {Forensic artefacts associated with intentionally deleted user accounts}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {2}, pages = {167--179}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10003678}, doi = {10.1504/IJESDF.2017.10003678}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Al-SalehA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Ashouri-Talouki17, author = {Maede Ashouri{-}Talouki and Ahmad Baraani{-}Dastjerdi}, title = {Cryptographic collusion-resistant protocols for secure sum}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {1}, pages = {19--34}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10002631}, doi = {10.1504/IJESDF.2017.10002631}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Ashouri-Talouki17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/BarnardHD17, author = {Jacques Barnard and Magda Huisman and G{\"{u}}nther Drevin}, title = {Security awareness and the use of location-based services, technologies and games}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {4}, pages = {293--325}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10008010}, doi = {10.1504/IJESDF.2017.10008010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/BarnardHD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/ChandeCL17, author = {Manoj Kumar Chande and Te{-}Yu Chen and Cheng{-}Chi Lee}, title = {An improved multi-signature scheme for specified group of verifiers}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {2}, pages = {180--190}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10004414}, doi = {10.1504/IJESDF.2017.10004414}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/ChandeCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/ChenCS17, author = {Haoran Chen and Jianhua Chen and Han Shen}, title = {An improved authenticated key agreement with anonymity for session initiation protocol}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {2}, pages = {132--149}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10004413}, doi = {10.1504/IJESDF.2017.10004413}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/ChenCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/CulmoneV17, author = {Rosario Culmone and Maria Concetta De Vivo}, title = {Vanishing files: protocols and regulations for immaterial documents}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {1}, pages = {45--61}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10002641}, doi = {10.1504/IJESDF.2017.10002641}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/CulmoneV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/CunhaCP17, author = {Ilane Cunha and Jefferson Rodrigo A. Cavalcante and Ahmed Patel}, title = {A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {3}, pages = {209--238}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10005633}, doi = {10.1504/IJESDF.2017.10005633}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/CunhaCP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/GranjaR17, author = {Fernando Molina Granja and Glen Dario Rodriguez Rafael}, title = {The preservation of digital evidence and its admissibility in the court}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {1}, pages = {1--18}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10002624}, doi = {10.1504/IJESDF.2017.10002624}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/GranjaR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/GranjaR17a, author = {Fernando Molina Granja and Glen Dario Rodriguez Rafael}, title = {Model for digital evidence preservation in criminal research institutions - {PREDECI}}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {2}, pages = {150--166}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10004412}, doi = {10.1504/IJESDF.2017.10004412}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/GranjaR17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/HinteaBG17, author = {Diana Hintea and Robert Bird and Michael Green}, title = {An investigation into the forensic implications of the Windows 10 operating system: recoverable artefacts and significant changes from Windows 8.1}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {4}, pages = {326--345}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10008013}, doi = {10.1504/IJESDF.2017.10008013}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/HinteaBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/IsaHAMM17, author = {Mohd Anuar Mat Isa and Habibah Hashim and Syed Farid Syed Adnan and Norhaflyza Marbukhari and Nur Nabila Mohamed}, title = {An automobile security protocol: side-channel security against timing and relay attacks}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {3}, pages = {239--253}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10005632}, doi = {10.1504/IJESDF.2017.10005632}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/IsaHAMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/JeevaR17, author = {S. Carolin Jeeva and Elijah Blessing Rajsingh}, title = {Phishing {URL} detection-based feature selection to classifiers}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {2}, pages = {116--131}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10004411}, doi = {10.1504/IJESDF.2017.10004411}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/JeevaR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/KaurDST17, author = {Arashdeep Kaur and Malay Kishore Dutta and Krishan Mohan Soni and Nidhi Taneja}, title = {Embedding digital watermark in one-dimensional signals using wavelet and Schur decomposition}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {4}, pages = {362--380}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10007972}, doi = {10.1504/IJESDF.2017.10007972}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/KaurDST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/MistryD17, author = {Nilay R. Mistry and Mohindersinh Dahiya}, title = {VolNet: a framework for analysing network-based artefacts from volatile memory}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {2}, pages = {101--115}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10004409}, doi = {10.1504/IJESDF.2017.10004409}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/MistryD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/MizherAMM17, author = {Manar Abduljabbar Ahmad Mizher and Mei Choo Ang and Ahmad A. Mazhar and Manal A. Mizher}, title = {A review of video falsifying techniques and video forgery detection techniques}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {3}, pages = {191--208}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10005634}, doi = {10.1504/IJESDF.2017.10005634}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/MizherAMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/MondalSSM17, author = {Jayanta Mondal and Debabala Swain and Dushant P. Singh and Sharmila Mohanty}, title = {An improved LSB-based {RDH} technique with better reversibility}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {3}, pages = {254--268}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10005631}, doi = {10.1504/IJESDF.2017.10005631}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/MondalSSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Pan17, author = {Jonathan Pan}, title = {Encryption scheme classification: a deep learning approach}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {4}, pages = {381--395}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10008036}, doi = {10.1504/IJESDF.2017.10008036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Pan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/PatilM17, author = {Dinesh N. Patil and Bandu Baburao Meshram}, title = {An evidence collection and analysis of Windows registry}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {4}, pages = {346--361}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10008016}, doi = {10.1504/IJESDF.2017.10008016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/PatilM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SatryaNS17, author = {Gandeva B. Satrya and A. Ahmad Nasrullah and Soo Young Shin}, title = {Identifying artefact on Microsoft OneDrive client to support Android forensics}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {3}, pages = {269--291}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10005630}, doi = {10.1504/IJESDF.2017.10005630}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SatryaNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Sriratanaviriyakul17, author = {Narumon Cherry Sriratanaviriyakul and Mathews Z. Nkhoma and Anna Lyza Felipe and Thanh Kim Cao and Quyen Ha Tran and Roger Epworth and Avinash Shankaranarayanan and Huy Le Quang}, title = {{ASEAN} users' privacy concerns and security in using online social networks}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {1}, pages = {84--99}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10002659}, doi = {10.1504/IJESDF.2017.10002659}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Sriratanaviriyakul17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/TajbakhshHS17, author = {Mehrdad Tajbakhsh and Elaheh Homayounvala and Sajjad Shokouhyar}, title = {Forensically ready digital identity management systems, issues of digital identity life cycle and context of usage}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {1}, pages = {62--83}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10002653}, doi = {10.1504/IJESDF.2017.10002653}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/TajbakhshHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/YanCZ17, author = {Lili Yan and Yan Chang and Shibin Zhang}, title = {Comments on 'An improved authentication scheme for mobile satellite communication systems'}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {4}, pages = {396--406}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10008037}, doi = {10.1504/IJESDF.2017.10008037}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/YanCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/ZhuoZ17, author = {Zhi{-}hai Zhuo and Ning Zhong}, title = {A new kind of steganography schemes for image}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {9}, number = {1}, pages = {35--44}, year = {2017}, url = {https://doi.org/10.1504/IJESDF.2017.10002635}, doi = {10.1504/IJESDF.2017.10002635}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/ZhuoZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.