default search action
International Journal of Digital Crime and Forensics, Volume 3
Volume 3, Number 1, 2011
- Ahmad Ryad Soobhany, Richard Leary, K. P. Lam:
On the Performance of Li's Unsupervised Image Classifier and the Optimal Cropping Position of Images for Forensic Investigations. 1-13 - Antonis Michalas, Nikos Komninos, Neeli R. Prasad:
Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks. 14-36 - Rajesh Kumar Tiwari, G. Sahoo Mesra:
Microsoft Excel File: A Steganographic Carrier File. 37-52 - Fei Peng, Yu-Zhou Lei:
An Effective Reversible Watermarking for 2D CAD Engineering Graphics Based on Improved QIM. 53-69
Volume 3, Number 2, 2011
- Devanur S. Guru, K. B. Nagasundara, S. Manjunath, R. Dinesh:
An Approach for Hand Vein Representation and Indexing. 1-15 - Sarabjot Singh Anand, Arshad Jhumka, Kimberley Wade:
Towards the Ordering of Events from Multiple Textual Evidence Sources. 16-34 - Fei Peng, Honglin Li:
A Steganalysis Method for 2D Engineering Graphics Based on the Statistic of Geometric Features. 35-40 - Nasser Abouzakhar, Huankai Chen, Bruce Christianson:
An Enhanced Fuzzy ARM Approach for Intrusion Detection. 41-61
Volume 3, Number 3, 2011
- John Haggerty, Alexander John Karran, David J. Lamb, Mark John Taylor:
A Framework for the Forensic Investigation of Unstructured Email Relationship Data. 1-18 - Theodoros Spyridopoulos, Vasilios Katos:
Requirements for a Forensically Ready Cloud Storage Service. 19-36 - George Magklaras, Steven Furnell, Maria Papadaki:
LUARM: An Audit Engine for Insider Misuse Detection. 37-49 - Kenan Kalajdzic, Ahmed Patel, Mona Taghavi:
Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs. 50-60
Volume 3, Number 4, 2011
- Yongjian Hu, Chang-Tsun Li, Changhui Zhou, Xufeng Lin:
Source Camera Identification Issues: Forensic Features Selection and Robustness. 1-15 - Rajesh Kumar Tiwari, G. Sahoo Mesra:
Microsoft Power Point Files: A Secure Steganographic Carrier. 16-28 - Alexandros Zaharis, Adamantini Martini, Theo Tryfonas, Christos Ilioudis, George Pangalos:
Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis. 29-41 - Chun-Ning Yang, Zhe-Ming Lu:
A Blind Image Watermarking Scheme Utilizing BTC Bitplanes. 42-53
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.