default search action
International Journal of Electronic Security and Digital Forensics, Volume 15
Volume 15, Number 1, 2023
- Abdullah Ayub Khan, Aftab Ahmed Shaikh, Asif Ali Laghari, Muhammad Malook Rind:
Cloud forensics and digital ledger investigation: a new era of forensics investigation. 1-23 - Abedalrzag Aldalbeeh, Ahmad Alsharqawi:
Cyber terrorism and its role in the outbreak of international crisis. 24-32 - Oteng Tabona, Thabiso M. Maupong, Kopo M. Ramokapane, Thabo Semong:
Intelligence sharing in big data forensics. 33-55 - Shadi Rasheed Masadeh:
A new encryption system for IoT devices using embedded key cryptosystem. 56-65 - Ismail Haddad, Djamel Herbadji, Aïssa Belmeguenaï, Selma Boumerdassi:
Colour image encryption based on an improved fractional-order logistic map. 66-87 - Aftab Ahmed Shaikh, Abdullah Ayub Khan:
Management of electronic ledger: a constraint programming approach for solving curricula scheduling problems. 88-99
Volume 15, Number 2, 2023
- Bijay Kumar Paikaray, Debabala Swain, Sujata Chakravarty:
An improved region-based embedding technique for data hiding and image recovery using multiple ROI and RONI. 101-113 - Safwan Muhammad Al-Shdaifat:
The criminal confrontation of the cryptocurrency (Bitcoin) and its illegal use. 114-123 - Ahmed Landry Sankara, Ramya Shah, Digvijaysinh Rathod:
Forensics of a rogue base transceiver station. 124-142 - Tashi Wangchuk, Digvijaysinh Rathod:
Opensource intelligence and dark web user de-anonymisation. 143-157 - Irfan Ali Kandhro, Umer Khan, Shahrukh Memon, Mohammad Yasir:
Discover and safe: an automated security management system for educational institutions. 158-176 - Palak Aneja, Sumit Kumar Choudhary, Surbhi Mathur:
Aural-acoustic analysis and gender identification of morphed male and female audios. 177-183 - Vernika Mehta, Surbhi Mathur:
Face recognition challenges due to aging: a review. 184-194 - Rohit Saxena, Deepak Arora, Vishal Nagar:
Efficient blockchain addresses classification through cascading ensemble learning approach. 195-210 - Muhammad Ameen Chhajro, Asharib Ahmed, Muhammad Ahmed Raza, Abdullah Ayub Khan, Asif Ali Wagan, Asif Ali Laghari:
A survey on electronic natural language applications: current challenges and limitations. 211-223
Volume 15, Number 3, 2023
- Irfan Ali Kandhro, Fayyaz Ali, Asif Ali Wagan, Iqra Tabassum M. Ali, Farhan Afzal:
Safe and secure: an automated library management system for monitoring book rotation using face recognition. 225-239 - Noor Issa Al-Hendi:
Electronic administrative decisions and discretionary authority of public administration. 240-251 - Surbhi Mathur, Krittika Sood:
Policing perspective on pre-emptive and probative value of CCTV architecture in the security of the smart city - Gandhinagar, Gujarat. 252-258 - Aritro Sengupta, Amit Prakash Singh, B. M. Vinjit:
A platform independent and forensically sound method to extract WhatsApp data from mobile phones. 259-280 - Yaman Salem, Majdi Owda, Amani Yousef Owda:
An experimental approach for locating WhatsApp digital forensics artefacts on Windows 10 and the cloud. 281-300 - Xiaoxu Zhong:
Study on noise control of digital circuit signal transmission under strong magnetic field interference. 301-314 - Nishant Doshi:
An enhanced constant length traceable CP-ABE in IoT paradigm. 315-321 - Raheel Siddiqi, Syeda Nazia Ahraf, Irfan Ali Kandhro:
Susceptibility of paediatric pneumonia detection model under projected gradient descent adversarial attacks. 322-331
Volume 15, Number 4, 2023
- Sonam Mittal, K. R. Ramkumar:
Comparative evaluation of fully homomorphic encryption algorithms in cloud environment. 333-347 - A. Sai Charan, S. M. Srinivasavarma Vegesna, Rajesh Eswarawaka:
RecomAlly: dynamic ally recommendation on Twitter based on rhetorical structure theory and valence shifters. 348-358 - Soni Singh, K. R. Ramkumar, Ashima Kukkar:
Pandemic outbreak prediction with an enhanced parameter optimisation algorithm using machine learning models. 359-386 - Danella Patrick, Abdullah Ayub Khan, Fayyaz Ali, Irfan Ali Kandhro, Mahnoor Anwar, Asadullah Kehar, Anwar Ali Sanjrani:
A novel comparison of data analytics and business intelligence tools: an information preservation and ledger management solution. 387-412 - Abdullah Ayub Khan, Asif Ali Laghari, Anil Kumar, Zaffar Ahmed Shaikh, Umair Baig, Abdul Ahad Abro:
Cloud forensics-enabled chain of custody: a novel and secure modular architecture using Blockchain Hyperledger Sawtooth. 413-423 - Sundaresan Ramachandran, Jeet Rami, Abhinav Shah, Kyounggon Kim, Digvijaysinh Rathod:
Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection. 424-442
Volume 15, Number 5, 2023
- Indrajeet Singh, Naveen Kumar Chaudhary:
A study on methodology on VoIP-based communication investigation through network packet analysis. 443-455 - Rakhmatulla Balashov, Oxana Filipets, Svetlana Baimoldina:
Recovery of stolen assets from abroad. 456-467 - Nurlan Z. Apakhayev, Ainur S. Ramazanova, Dina B. Bugybay, Kultay A. Adilova, Duman Z. Kopbayev:
Adoption of the administrative procedural code as the implementation of Kazakhstan's legal policy concept. 468-481 - Assel Abylkhanova, Gulmira Ashirbekova, Galiya Akseit, Aizhan Pernebekova, Bekzhigit Serdali:
Image of the country: problems of information security. 482-494 - Abylaikhan Aben:
State immunity as an obstacle in civil proceedings. 495-515 - C. Ravichandran, Ravi Kumar, T. Senthil Kumar, Ravi Kishore Veluri:
Security enhancement in wireless sensors using blockchain technology. 516-531 - T. Senthil Kumar, Leo John Baptist Andrews, M. Madhini, K. Hemalatha:
Utilising blockchain technology to provide safety for smart home networks. 532-540 - T. Kalaichelvi, Sulakshana B. Mane, K. M. Dhanalakshmi, S. Narasimha Prasad:
The detection of phishing attempts in communications systems. 541-553
Volume 15, Number 6, 2023
- Narkes Zhexembayeva, Arailym K. Jangabulova, Guldana A. Kuanalieva, Makhabbat K. Nakisheva, Bahytkul M. Konysbai:
Human rights information in the context of digitalisation. 555-566 - Muhammad Shakir, Shahid Karim, Shahnawaz Ali, Shahzor Memon, Halar Mustafa, Rabia Shaikh:
Denim enumeration and tabulation solution for the garments manufacturing environment. 567-577 - Ermek Abdrasulov, Akmaral Saktaganova, Indira Saktaganova, Sayash Zhenissov, Zhassulan Toleuov:
Legal awareness and its significance when determining the nature of a person's legal behaviour. 578-590 - Hitesh Sanghvi, Digvijaysinh Rathod, Salem Yahya Altaleedi, Abdulaziz Saleh AlThani, Mohammed Abd Alrhman Alkhawaldeh, Abdulrazaq Almorjan, Ramya Shah, Tanveer A. Zia:
Google chrome forensics. 591-619 - Sayan Yesmaganbetov, Antonina Kizdarbekova, Botagoz Amanzholova, Aliya Nurzhanova, Nailya Akhmetova:
Specific features of legal regulation of relations under the licence agreement. 620-631 - Swagata Sarkar, R. Babitha Lincy, P. Sasireka, Sonam Mittal:
Monitor and detect suspicious online transactions. 632-643 - Yerbol Alimkulov, Assel Sharipova, Akynkozha Zhanibekov, Gulzhan Mukhamadiyeva, Aizhan Aryn:
Private detective activity of the law enforcement system of Kazakhstan on the experience of foreign countries. 644-654 - Ravi Kumar, Kiran Shrimant Kakade, M. Priscilla, B. V. Santhosh Krishna:
An effective digital forensic paradigm for cloud computing criminal investigation. 655-664
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.