


default search action
International Journal of Electronic Security and Digital Forensics, Volume 2
Volume 2, Number 1, 2009
- Malte Hesse, Norbert Pohlmann:
European internet early warning system. 1-17 - Rosamaria Berte, Fabio Dellutri, Antonio Grillo, Alessandro Lentini, Gianluigi Me
, Vittorio Ottaviani:
Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm. 18-28 - Jan Seedorf, Kristian Beckers, Felipe Huici:
Single-message denial-of-service attacks against voice-over-internet protocol terminals. 29-34 - Martin Rehák, Michal Pechoucek
, Martin Grill, Karel Bartos, Vojtech Krmicek, Pavel Celeda
:
Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes. 35-48 - Hamid R. Alipour, Mostafa Esmaeili, Kashefi Kia:
Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic. 49-57 - Rabia Sirhindi, Mehreen Afzal
, Saeed Murtaza:
An extended secret sharing scheme for colour images with fixed pixel expansion. 58-67 - Marjan Khatir, Seyed Mahmood Hejazi:
How to find exculpatory and inculpatory evidence using a circular digital forensics process model. 68-76 - Clive Blackwell:
A reasoning agent for credit card fraud using the event calculus. 77-91 - Iain Moir, George R. S. Weir:
Contact centres and identity theft. 92-100 - Debajyoti Konar, Chandan Mazumdar:
A generalised model of e-trading for gradual secret release fair exchange protocol. 101-111
Volume 2, Number 2, 2009
- Nigel Jones:
IT forensics: 22 years on. 116-131 - Richard E. Overill:
Development of masters modules in computer forensics and cybercrime for computer science and forensic science students. 132-140 - Gary C. Kessler, Robert Simpson, James Fry:
Multidisciplinary learning using mock trials. 141-155 - Stuart J. Gibson, Christopher J. Solomon, Matthew I. S. Maylin, Clifford Clark:
New methodology in facial composite construction: from theory to practice. 156-168 - Abhaya Induruwa:
Mobile phone forensics: an overview of technical and legal aspects. 169-181 - Dave Childs, Paul Stephens:
An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl. 182-198 - David Collins:
XFT: a forensic toolkit for the original Xbox game console. 199-205 - Lynne Norris-Jones, Steve Marsh:
An investigation into the technical, legal and ethical issues associated with biometrics in the UK (application to biometrics module for computing programmes). 206-218 - Man Qi, Yongquan Wang, Rongsheng Xu:
Fighting cybercrime: legislation in China. 219-227 - Margaret Ross, Geoff Staples, Mark Udall:
Cybercrime - raising awareness for future professionals. 228-238
Volume 2, Number 3, 2009
- Elias Pimenidis, Christos K. Georgiadis
:
Web services security evaluation considerations. 239-252 - David J. Boyd:
A pragmatic approach to temporary payment card numbers. 253-268 - Bobby L. Tait
, Sebastiaan H. von Solms:
BioVault: biometrically based encryption. 269-279 - Amirhossein Taherinia
, Mansour Jamzad:
A robust spread spectrum watermarking method using two levels DCT. 280-305 - Cyril Onwubiko
, Andrew P. Lenaghan:
Challenges and complexities of managing information security. 306-321 - Alan Davidson, Rein Oja, Louise Yngström:
A Swedish IT forensics course - expert opinions. 322-333
Volume 2, Number 4, 2009
- Athanasios Karantjias, Nineta Polemi:
An innovative platform architecture for complex secure e/m-governmental services. 338-354 - Miltiades E. Anagnostou
, Maria A. Lambrou:
Privacy now and in the age of ambient intelligence. 355-364 - Charalampos Z. Patrikakis
, Dimitris M. Kyriazanos
, Athanasios Voulodimos, Ioannis G. Nikolakopoulos:
Trust and security in Personal Network environments. 365-376 - Vasilios Zorkadis, Dimitrios A. Karras
:
On privacy-enhancing architectures for distribution of real time performance demanding mobile services. 377-386 - Hamid Jahankhani:
Criminal investigation and forensic tools for smartphones. 387-406 - Maria Ntaliani, Constantina I. Costopoulou, Nikos Manouselis, Sotiris Karetsos
:
M-government services for rural SMEs. 407-423 - Elias Pimenidis, Alexander B. Sideridis, Eleni Antonopoulou:
Mobile devices and services: bridging the digital divide in rural areas. 424-434

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.