default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 45 matches
- 2023
- Ermek Abdrasulov, Akmaral Saktaganova, Indira Saktaganova, Sayash Zhenissov, Zhassulan Toleuov:
Legal awareness and its significance when determining the nature of a person's legal behaviour. Int. J. Electron. Secur. Digit. Forensics 15(6): 578-590 (2023) - Abylaikhan Aben:
State immunity as an obstacle in civil proceedings. Int. J. Electron. Secur. Digit. Forensics 15(5): 495-515 (2023) - Assel Abylkhanova, Gulmira Ashirbekova, Galiya Akseit, Aizhan Pernebekova, Bekzhigit Serdali:
Image of the country: problems of information security. Int. J. Electron. Secur. Digit. Forensics 15(5): 482-494 (2023) - Noor Issa Al-Hendi:
Electronic administrative decisions and discretionary authority of public administration. Int. J. Electron. Secur. Digit. Forensics 15(3): 240-251 (2023) - Safwan Muhammad Al-Shdaifat:
The criminal confrontation of the cryptocurrency (Bitcoin) and its illegal use. Int. J. Electron. Secur. Digit. Forensics 15(2): 114-123 (2023) - Abedalrzag Aldalbeeh, Ahmad Alsharqawi:
Cyber terrorism and its role in the outbreak of international crisis. Int. J. Electron. Secur. Digit. Forensics 15(1): 24-32 (2023) - Yerbol Alimkulov, Assel Sharipova, Akynkozha Zhanibekov, Gulzhan Mukhamadiyeva, Aizhan Aryn:
Private detective activity of the law enforcement system of Kazakhstan on the experience of foreign countries. Int. J. Electron. Secur. Digit. Forensics 15(6): 644-654 (2023) - Palak Aneja, Sumit Kumar Choudhary, Surbhi Mathur:
Aural-acoustic analysis and gender identification of morphed male and female audios. Int. J. Electron. Secur. Digit. Forensics 15(2): 177-183 (2023) - Nurlan Z. Apakhayev, Ainur S. Ramazanova, Dina B. Bugybay, Kultay A. Adilova, Duman Z. Kopbayev:
Adoption of the administrative procedural code as the implementation of Kazakhstan's legal policy concept. Int. J. Electron. Secur. Digit. Forensics 15(5): 468-481 (2023) - Rakhmatulla Balashov, Oxana Filipets, Svetlana Baimoldina:
Recovery of stolen assets from abroad. Int. J. Electron. Secur. Digit. Forensics 15(5): 456-467 (2023) - A. Sai Charan, S. M. Srinivasavarma Vegesna, Rajesh Eswarawaka:
RecomAlly: dynamic ally recommendation on Twitter based on rhetorical structure theory and valence shifters. Int. J. Electron. Secur. Digit. Forensics 15(4): 348-358 (2023) - Muhammad Ameen Chhajro, Asharib Ahmed, Muhammad Ahmed Raza, Abdullah Ayub Khan, Asif Ali Wagan, Asif Ali Laghari:
A survey on electronic natural language applications: current challenges and limitations. Int. J. Electron. Secur. Digit. Forensics 15(2): 211-223 (2023) - Nishant Doshi:
An enhanced constant length traceable CP-ABE in IoT paradigm. Int. J. Electron. Secur. Digit. Forensics 15(3): 315-321 (2023) - Ismail Haddad, Djamel Herbadji, Aïssa Belmeguenaï, Selma Boumerdassi:
Colour image encryption based on an improved fractional-order logistic map. Int. J. Electron. Secur. Digit. Forensics 15(1): 66-87 (2023) - T. Kalaichelvi, Sulakshana B. Mane, K. M. Dhanalakshmi, S. Narasimha Prasad:
The detection of phishing attempts in communications systems. Int. J. Electron. Secur. Digit. Forensics 15(5): 541-553 (2023) - Irfan Ali Kandhro, Fayyaz Ali, Asif Ali Wagan, Iqra Tabassum M. Ali, Farhan Afzal:
Safe and secure: an automated library management system for monitoring book rotation using face recognition. Int. J. Electron. Secur. Digit. Forensics 15(3): 225-239 (2023) - Irfan Ali Kandhro, Umer Khan, Shahrukh Memon, Mohammad Yasir:
Discover and safe: an automated security management system for educational institutions. Int. J. Electron. Secur. Digit. Forensics 15(2): 158-176 (2023) - Abdullah Ayub Khan, Asif Ali Laghari, Anil Kumar, Zaffar Ahmed Shaikh, Umair Baig, Abdul Ahad Abro:
Cloud forensics-enabled chain of custody: a novel and secure modular architecture using Blockchain Hyperledger Sawtooth. Int. J. Electron. Secur. Digit. Forensics 15(4): 413-423 (2023) - Abdullah Ayub Khan, Aftab Ahmed Shaikh, Asif Ali Laghari, Muhammad Malook Rind:
Cloud forensics and digital ledger investigation: a new era of forensics investigation. Int. J. Electron. Secur. Digit. Forensics 15(1): 1-23 (2023) - T. Senthil Kumar, Leo John Baptist Andrews, M. Madhini, K. Hemalatha:
Utilising blockchain technology to provide safety for smart home networks. Int. J. Electron. Secur. Digit. Forensics 15(5): 532-540 (2023) - Ravi Kumar, Kiran Shrimant Kakade, M. Priscilla, B. V. Santhosh Krishna:
An effective digital forensic paradigm for cloud computing criminal investigation. Int. J. Electron. Secur. Digit. Forensics 15(6): 655-664 (2023) - Shadi Rasheed Masadeh:
A new encryption system for IoT devices using embedded key cryptosystem. Int. J. Electron. Secur. Digit. Forensics 15(1): 56-65 (2023) - Surbhi Mathur, Krittika Sood:
Policing perspective on pre-emptive and probative value of CCTV architecture in the security of the smart city - Gandhinagar, Gujarat. Int. J. Electron. Secur. Digit. Forensics 15(3): 252-258 (2023) - Vernika Mehta, Surbhi Mathur:
Face recognition challenges due to aging: a review. Int. J. Electron. Secur. Digit. Forensics 15(2): 184-194 (2023) - Sonam Mittal, K. R. Ramkumar:
Comparative evaluation of fully homomorphic encryption algorithms in cloud environment. Int. J. Electron. Secur. Digit. Forensics 15(4): 333-347 (2023) - Bijay Kumar Paikaray, Debabala Swain, Sujata Chakravarty:
An improved region-based embedding technique for data hiding and image recovery using multiple ROI and RONI. Int. J. Electron. Secur. Digit. Forensics 15(2): 101-113 (2023) - Danella Patrick, Abdullah Ayub Khan, Fayyaz Ali, Irfan Ali Kandhro, Mahnoor Anwar, Asadullah Kehar, Anwar Ali Sanjrani:
A novel comparison of data analytics and business intelligence tools: an information preservation and ledger management solution. Int. J. Electron. Secur. Digit. Forensics 15(4): 387-412 (2023) - Sundaresan Ramachandran, Jeet Rami, Abhinav Shah, Kyounggon Kim, Digvijaysinh Rathod:
Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection. Int. J. Electron. Secur. Digit. Forensics 15(4): 424-442 (2023) - C. Ravichandran, Ravi Kumar, T. Senthil Kumar, Ravi Kishore Veluri:
Security enhancement in wireless sensors using blockchain technology. Int. J. Electron. Secur. Digit. Forensics 15(5): 516-531 (2023) - Yaman Salem, Majdi Owda, Amani Yousef Owda:
An experimental approach for locating WhatsApp digital forensics artefacts on Windows 10 and the cloud. Int. J. Electron. Secur. Digit. Forensics 15(3): 281-300 (2023)
skipping 15 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-17 11:32 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint