Stop the war!
Остановите войну!
for scientists:
default search action
International Journal of Electronic Security and Digital Forensics, Volume 16
Volume 16, Number 1, 2024
- Sergey Manin, Salahiden Sabikenov, Yelena Manina:
Essence, concept, and types of national legislation in the field of information technology. 1-13 - Aigerim Issakhankyzy, Gulnar A. Alibayeva, Ainur A. Sabitova, Serik K. Zhetpisov, Botakoz S. Shansharbayeva:
Legal mechanism for regulating responsibilities in the information sphere. 14-27 - Sonam Mittal, Soni Singh, D. Balakumaran, K. Hemalatha:
Security of internet of things based on cryptographic algorithm. 28-39 - Alagappan Annamalai, Ramesh Chandra Poonia, Suresh Shanmugasundaram:
Internet of things-based virtual private social networks on a text messaging strategy on mobile platforms. 40-62 - T. Thirumurugan, Bojaraj Leena, R. Lavanya, T. J. Nagalakshmi:
Formulation of a two-level electronic security and protection system for malls. 63-72 - A. Rajasekar, A. Karunakaran, C. Sivakumaran, Sheshang Dipakkumar Degadwala:
An original data encryption technique for communication networks. 73-83 - D. Ravikumar, K. Sasikala, R. S. Vijayashanthi, S. Narasimha Prasad:
Analysis of smart grid-based intrusion detection system through machine learning methods. 84-96 - Rui Yang, Lijuan Feng, Jiangjiang Li:
Image encryption based on 3D Arnold and elementary cellular automata method. 97-111 - C. Ravichandran, Ashok Vajravelu, Sankarsan Panda, Sheshang Dipakkumar Degadwala:
Data hiding using video steganography. 112-123 - M. Deepa, J. Dhilipan:
Security in database management system using machine learning. 124-133
Volume 16, Number 2, 2024
- Chenghua Tang, Min Hu, Mengmeng Yang, Baohua Qiang:
Malicious program ontology rule set based on association decision and linear discriminant. 135-159 - Helina Rajini Suresh, M. Shanmuganathan, T. Senthilkumar, B. S. Vidhyasagar:
Deep learning-based image forgery detection system. 160-172 - Bassam Al-Shargabi, Rame Jamil Al-Dwairi, Mohammed Abbas Fadhil Al-Husainy:
Using DNA to develop a lightweight symmetric encryption method to encrypt the data of IoT devices. 173-189 - Kiran Shrimant Kakade, T. J. Nagalakshmi, S. Pradeep, B. R. Tapas Bapu:
Network intrusion detection: systematic evaluation using deep learning. 190-201 - P. J. Sathish Kumar, Jency Rubia J, R. Anitha, Sheshang Degadwala:
Dark web data classification using deep neural network. 202-212 - A. Sivakumar, Jency Rubia J, Hima Vijayan, C. Sivakumaran:
Detection of Botnet using deep learning algorithm: application of machine learning in cyber-security. 213-222 - Sonam Mittal, K. R. Ramkumar:
A retrospective analysis on fully homomorphic encryption scheme. 223-254 - Kiran Shrimant Kakade, Swagata Sarkar, S. Asha, C. Sivakumaran:
A novel colour image encryption algorithm using S-box technique. 255-266
Volume 16, Number 3, 2024
- Faleh Alshameri, Katrina Khanta, Stephen Boyce:
A comparison study to analyse the data acquisitions of iOS and android smartphones using multiple forensic tools. 267-283 - Shahid Karim, Geng Tong, Muhammad Shakir, Asif Ali Laghari, Syed Wajid Ali Shah:
Infrared and visible image fusion based on improved NSCT and NSST. 284-303 - Abhinav Shah, Digvijaysinh Rathod, Yash Mehta:
A comparative study of covert channel attacks in Android with different parameters and detection tools. 304-316 - D. Kalaiyarasi, S. Leopauline, S. Krishnaveni, Ashok Vajravelu:
Cloud computing-based computer forensics: a deep learning technique. 317-328 - Sulakshana B. Mane, Kiran Shrimant Kakade, S. Shibu, Sundar Suvitha:
Functional encryption implementation to protect storage data in the cloud. 329-343 - Kiran Shrimant Kakade, C. Rajesh, T. Veena, P. Sivakumar:
Security challenges for routing protocols in mobile ad hoc network. 344-356 - Priya Sharma, Om Prakash Jasuja:
Forensic examination of digitally captured handwriting - a review of contemporary tools and techniques. 357-371 - Suraj Harsha Kamtam, Harjinder Singh Lallie, Muhammad Ajmal Azad:
The application of AI techniques for firearm detection in digital forensic investigation. 372-396
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.