default search action
International Journal of Electronic Security and Digital Forensics, Volume 17
Volume 17, Numbers 1/2, 2025
- Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Tanaka Laura Makonese, Vladlena Benson, Samiya Khan, Usman Javed Butt:
Feature-driven anomalous behaviour detection and incident classification model for ICS in water treatment plants. 1-29 - Ramya Shah, Digvijaysinh Rathod:
An approach towards development of a supervisory control and data acquisition system forensics framework: concerns and challenges. 30-44 - Rabia Nazir, Ahsan Hussain, Syed Zubair Ahmad Shah:
Blockchain as an indispensable asset for educational institutions: a systematic review. 45-59 - Jing Li, Mohd Shahizan Othman, Hewan Chen, Lizawati Mi Yusuf:
IoT security: a systematic literature review of feature selection methods for machine learning-based attack classification. 60-107 - Neetu Sharma, Rajesh Rohilla:
A novel scalable and cost efficient blockchain solution for managing lifetime vaccination records based on patient preference. 108-137 - Irfan Ali Kandhro, Ali Orangzeb Panhwar, Shafique Ahmed Awan, Raja Sohail Ahmed Larik, Abdul Ahad Abro:
Network security attack classification: leveraging machine learning methods for enhanced detection and defence. 138-148 - Meghana Solanki, Sangita Chaudhari:
VLMDALP: design of an efficient VARMA LSTM-based model for identification of DDoS attacks using application-level packet analysis. 149-168 - Frank Fiadufe, Krishna Modi, Kapil Shukla, Felix O. Etyang:
Forensic investigation and analysis of malware in Windows OS. 169-182 - Pratik S. Patel, Pooja Panchal:
Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defences. 183-193 - Raghav Modi, Ananjay Singh Jammoria, Akshat Pattiwar, Arnav Agrawal, S. P. Raja:
Secure system to secure crime data using hybrid: RSA-AES and hybrid: Blowfish-Triple DES. 194-232 - Rohit Deval, Nachiket Gupte, Johann Kyle Pinto, Adwaita Raj Modak, Akshat Verma, Anirudh Sharma, S. P. Raja:
Exploring advanced steganography techniques for secure digital image communication: a comparative analysis and performance evaluation. 233-266 - Lana Al-Khalaileh, Tareq Al-Billeh, Ali Al-Hammouri:
The legal authority of the electronic authentication certificate and its role in proving e-commerce transactions. 267-282 - Abitha V. K. Lija, R. Shobana, J. Caroline Misbha, S. Chandrakala:
IoT security using deep learning algorithm: intrusion detection model using LSTM. 283-293
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.