default search action
International Journal of Digital Crime and Forensics, Volume 12
Volume 12, Number 1, 2020
- Áine MacDermott, Thar Baker, Paul Buck, Farkhund Iqbal, Qi Shi:
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics. 1-13 - Chee Cheun Huang, Chien Eao Lee, Vrizlynn L. L. Thing:
A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification. 14-34 - Hana Bouafif, Faouzi Kamoun, Farkhund Iqbal:
Towards a Better Understanding of Drone Forensics: A Case Study of Parrot AR Drone 2.0. 35-57 - Ahmed Almutairi, Behzad Shoarian Satari, Carlos Rivas, Cristian Florin Stanciu, Mozhdeh Yamani, Zahra Zohoorsaadat, Serguei A. Mokhov:
Evaluation of Autopsy and Volatility for Cybercrime Investigation: A Forensic Lucid Case Study. 58-89 - Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal:
A Deep Learning Framework for Malware Classification. 90-108 - Chao Wu, Yuan'an Liu, Fan Wu, Feng Liu, Hui Lu, Wenhao Fan, Bihua Tang:
A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources. 109-130 - Yufei Wang, Yongjian Hu, Alan Wee-Chung Liew, Chang-Tsun Li:
ENF Based Video Forgery Detection Algorithm. 131-156 - Dan Huang, Fangjun Huang:
Reversible Data Hiding Based on Adaptive Block Selection Strategy. 157-168
Volume 12, Number 2, 2020
- Jinsheng Xiao, Wenxin Xiong, Yuan Yao, Liang Li, Reinhard Klette:
Lane Detection Algorithm Based on Road Structure and Extended Kalman Filter. 1-20 - Xinguo Yu, Wu Song, Xiaopan Lyu, Bin He, Nan Ye:
Reading Both Single and Multiple Digital Video Clocks Using Context-Aware Pixel Periodicity and Deep Learning. 21-39 - Raouia Mokni, Hassen Drira, Monji Kherallah:
Deep-Analysis of Palmprint Representation Based on Correlation Concept for Human Biometrics Identification. 40-58 - Wenjun Huang, Chao Liang, Chunxia Xiao, Zhen Han:
Video-Based Person Re-Identification With Unregulated Sequences. 59-76
Volume 12, Number 3, 2020
- Jingyuan Rao, Min Tu, Xuanjin Yang:
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks. 1-14 - Yi Zhang:
User Identity Hiding Method of Android. 15-26 - Gulivindala Suresh, Chanamallu Srinivasarao:
Copy Move Forgery Detection Through Differential Excitation Component-Based Texture Features. 27-44 - Biaoli Tao, Rangding Wang, Diqun Yan, Chao Jin:
Anti-Forensics of Double Compressed MP3 Audio. 45-57 - Puneet Sharma, Deepak Arora, T. Sakthivel:
Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications. 58-76 - Amar B. Deshmukh, N. Usha Rani:
Optimization-Driven Kernel and Deep Convolutional Neural Network for Multi-View Face Video Super Resolution. 77-95 - Xuehu Yan, Yuliang Lu, Lintao Liu:
A Common General Access Structure Construction Approach in Secret Image Sharing. 96-110 - Jin Du, Liping Ding, Guangxuan Chen:
Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings. 111-121
Volume 12, Number 4, 2020
- Prathap Rudra Boppuru, Ramesha Kenchappa:
Spatio-Temporal Crime Analysis Using KDE and ARIMA Models in the Indian Context. 1-19 - Yang Zhao, Yaqin Fan, Mingrui Yin, Cheng Fang:
Research on the Construction of a Student Model of an Adaptive Learning System Based on Cognitive Diagnosis Theory. 20-31 - Xin Liu, RuiHua Qi, Lin Shao:
Joint Model-Based Attention for Spoken Language Understanding Task. 32-43 - Xi Chen, Fangming Ruan, Lvyang Zhang, Yang Zhao:
Design of Cyberspace Security Talents Training System Based on Knowledge Graph. 44-53 - Lili Du, Yaqin Fan, Lvyang Zhang, Lianying Wang, Tianhang Sun:
A Summary of the Development of Cyber Security Threat Intelligence Sharing. 54-67 - Xin Zheng, Jun Li, Qingrong Wu:
A Light Recommendation Algorithm of We-Media Articles Based on Content. 68-81
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.