


default search action
International Journal of Electronic Security and Digital Forensics, Volume 1
Volume 1, Number 1, 2007
- Hamid Jahankhani:

Evaluation of cyber legislations: trading in the global cyber village. 1-11 - Ivan Flechais, Cecilia Mascolo, Martina Angela Sasse

:
Integrating security and usability into the requirements and design process. 12-26 - Haralambos Mouratidis:

Secure information systems engineering: a manifesto. 27-41 - Murdoch Watney

:
State surveillance of the internet: human rights infringement or e-security mechanism? 42-54 - Kenneth Revett, Florin Gorunescu, Marina Gorunescu, Marius Ene, Sérgio Tenreiro de Magalhães

, Henrique M. Dinis Santos
:
A machine learning approach to keystroke dynamics based user authentication. 55-70 - David Lilburn Watson:

Stealing corporate secrets using open source intelligence (the practitioner's view). 71-75 - Olga Angelopoulou

, Paula Thomas, Konstantinos Xynos
, Theodore Tryfonas
:
Online ID theft techniques, investigation and response. 76-88 - Vebjørn Moen, André N. Klingsheim, Kent Inge Fagerland Simonsen, Kjell Jørgen Hole:

Vulnerabilities in e-governments. 89-100 - Uwe Aickelin

, Jamie Twycross, Thomas Hesketh-Roberts:
Rule generalisation in intrusion detection systems using SNORT. 101-116 - Syed Ahsan:

IT enabled counter terrorism infrastructure: issues and challenges. 117-124
Volume 1, Number 2, 2007
- Aminata Taal:

Report examining the weaknesses in the fight against cyber-crime from within. 125-130 - Subramanian Appavu

, Ramasamy Rajaram:
Detection of e-mail concerning criminal activities using association rule-based decision tree. 131-145 - Mohammed Assora, James Kadirire, Ayoub Shirvani:

A web transaction security scheme based on disposable credit card numbers. 146-155 - Daniel Bilar:

Opcodes as predictor for malware. 156-168 - Elias Pimenidis, Ioannis Savvas:

E-identification technologies for e-government interoperability in the EU. 169-179 - William K. Geissler, John C. McEachen:

Exploiting error control in network traffic for robust, high rate covert channels. 180-193 - Colin Pattinson, Kemal Hajdarevic:

Timing considerations in detecting resource starvation attacks using statistical profiles. 194-205 - Konstantinos Kardaras, Zacharias Kamarianakis

, Andrew Chanerley, Dimitris Koutsouris:
Unauthorised person recognition using gait biometry and information analysis: integration and transparency of security operations in a centralised intelligence environment. 206-217 - Vasilios Zorkadis:

Detection and surveillance technologies: privacy-related requirements and protection schemes. 218-231
Volume 1, Number 3, 2008
- Amin Mousavi, Elias Pimenidis, Hamid Jahankhani:

Cultivating trust - an electronic-government development model for addressing the needs of developing countries. 233-248 - Christos K. Georgiadis

, Dimitrios A. Baltatzis, George Pangalos:
Secure mobile agent environments: modelling role assignments. 249-267 - Samia Boucherkha, Mohamed Benmohamed:

Textural features extraction for image integrity verification. 268-280 - Roman V. Yampolskiy:

Action-based user authentication. 281-300 - William C. Suski

, Michael A. Temple, Michael J. Mendenhall, Robert F. Mills:
Radio frequency fingerprinting commercial communication devices to enhance electronic security. 301-322
Volume 1, Number 4, 2008
- Wai Chee Yau, Dinesh Kant Kumar

, Hans Weghorn:
Vision-based technique for secure recognition of voice-less commands. 323-335 - Katerina Papadaki, Despina Polemi:

A meta-process for information security risk management. 336-343 - Mehreen Afzal

, Ashraf Masood:
Algebraic analysis of Trivium and Trivium/128. 344-352 - Man Qi, Denis Edgar-Nevill, Yongquan Wang, Rongsheng Xu:

Tracking online trails. 353-361 - Yi Dai, Jinshu Su

, Ying Zhang:
A coordination scheduling mechanism to guarantee packet ordering in parallel packet switch. 362-373 - Susan Burns, George R. S. Weir:

Varieties of smartcard fraud. 374-386 - Cyril Onwubiko

:
Multisensor message exchange mechanism. 387-400 - Manish Kumar

, M. Hanumanthappa, Bhavanam Lakshma Reddy:
Security issues in m-government. 401-412 - Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh:

Another security improvement over the Lin et al.'s electronic-voting scheme. 413-422 - Hossein Jahankani, Branko Antonijevic, Terry Hugh Walcott

:
Tools protecting stakeholders against hackers and crackers: an insight review. 423-429

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














