


default search action
International Journal of Electronic Security and Digital Forensics, Volume 12
Volume 12, Number 1, 2020
- Jayanta Mondal, Debabala Swain:

A 3-layer RDH method in encrypted domain for medical information security. 1-15 - Mahesh Gangarde

, Shruti Oza
, Janardhan Chitode
:
Authenticate audio video-crypto invisible watermarking approach for enhancing hidden information security and robustness. 16-42 - Manar AbuTalib, Reem Alnanih

, Adel Khelifi
:
Application of quality in use model to assess the user experience of open source digital forensics tools. 43-76 - Muhammad Azeem, Jingsha He, Allah Ditta

, Faheem Akhtar
, Sher Muhammad Daudpota
:
A novel approach to secret data concealment with high cover text capacity and security. 77-98 - Utkarsh Saxena, J. S. Sodhi, Rajneesh Tanwar:

Augmenting smart home network security using blockchain technology. 99-117 - Animesh Kumar Agrawal

, Aman Sharma, Sumitra Ranjan Sinha, Pallavi Khatri
:
Forensic of an unrooted mobile device. 118-137
Volume 12, Number 2, 2020
- Xiaojun Zhang, Ziyu Zhou, Jingwei Zhang, Chunxiang Xu, Xinpeng Zhang:

Efficient light-weight private auditing scheme for cloud-based wireless body area networks. 139-153 - Harmeet Kaur Khanuja, Dattatraya S. Adane:

Monitor and detect suspicious transactions with database forensics and Dempster-Shafer theory of evidence. 154-173 - Barnali Gupta Banik

, Abhinandan Banik
:
Robust, imperceptible and blind video steganography using RGB secret, maximum likelihood estimation and Fibonacci encryption. 174-199 - Nureni Ayofe Azeez, Balikis Bolanle Salaudeen, Sanjay Misra

, Robertas Damasevicius, Rytis Maskeliunas
:
Identifying phishing attacks in communication networks using URL consistency features. 200-213 - Mustapha Sadi, Mourad Amad, Nadjib Badache:

Improving performance overhead of a trust-clustering key management protocol in ad hoc networks. 214-228 - Seyyed-Mohammad Javadi-Moghaddam

, Mohammad Golami:
Detecting phishing pages using the relief feature selection and multiple classifiers. 229-242
Volume 12, Number 3, 2020
- Massoud Masoumi

, Ali Dehghan:
Design and implementation of a ring oscillator-based physically unclonable function on field programmable gate array to enhance electronic security. 243-261 - Puneet Sharma, Deepak Arora, T. Sakthivel:

UML-based process model for mobile cloud forensic application framework - a preliminary study. 262-278 - Kalpana Chauhan, Rajeev Kumar Chauhan:

Design and development of two levels electronic security and safety system for buildings. 279-292 - Konstantinos Kardaras, George I. Lambrou

, Dimitrios D. Koutsouris:
Security efficient command control communication and integration with digital television. 293-301 - Ainur K. Kussainova, Aiman B. Omarova

, Djamilya A. Ospanova, Duman O. Kussainov, Rysgul Abilsheyeva
:
Problems of legal regulations of relations in the sphere of the electronic document flow. 302-322 - Oluwasefunmi 'Tale Arogundade

, Temitope Elizabeth Abioye
, Sanjay Misra:
An ontological approach to threats pattern collection and classification: a preliminary study to security management. 323-335
Volume 12, Number 4, 2020
- Djamel Herbadji, Nadir Derouiche

, Aïssa Belmeguenaï
, Nedal Tahat, Selma Boumerdassi
:
A new colour image encryption approach using a combination of two 1D chaotic map. 337-356 - Anas AlMajali

, Yatin Wadhawan, Mahmood S. Saadeh
, Laith Shalalfeh, Clifford Neuman:
Risk assessment of smart grids under cyber-physical attacks using Bayesian networks. 357-385 - V. Joseph Raymond, R. Jeberson Retna Raj:

Reversing and auditing of android malicious applications using sandboxing environment. 386-396 - Reza Montasari, Richard Hill

, Simon Parkinson
, Alireza Daneshkhah, Amin Hosseinian Far:
Hardware-based cyber threats: attack vectors and defence techniques. 397-411 - Kanat S. Lakbayev, Gulnara M. Rysmagambetova

, Alizhan U. Umetov, Askar K. Sysoyev:
The crimes in the field of high technology: concept, problems and methods of counteraction in Kazakhstan. 412-423 - Reza Montasari, Richard Hill

, Farshad Montaseri, Hamid Jahankhani, Amin Hosseinian Far:
Internet of things devices: digital forensic process and data reduction. 424-436

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














