default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2021
- Danish Ahamad, Md. Mobin Akhtar, Shabi Alam Hameed, Mahmoud Mohammad Mahmoud Al Qerom:
Provably secure authentication approach for data security in the cloud using hashing, encryption, and Chebyshev-based authentication. Int. J. Electron. Secur. Digit. Forensics 13(5): 475-497 (2021) - Hazim S. Al-Sibai, Theyab Alrubaie, Wael M. Elmedany:
IoT cybersecurity threats mitigation via integrated technical and non-technical solutions. Int. J. Electron. Secur. Digit. Forensics 13(3): 298-333 (2021) - Nawal Alsaffar, Wael M. El-Medany, Hayat Ali:
Low complexity cybersecurity architecture for the development of ITS in smart cities. Int. J. Electron. Secur. Digit. Forensics 13(6): 571-599 (2021) - Serik M. Apenov, Nurbol S. Jetibayev, Mariyash K. Makisheva, Guldana A. Kuanalieva, Sergazy Kussainov:
International crime as a threat to global socio-economic security. Int. J. Electron. Secur. Digit. Forensics 13(2): 133-154 (2021) - Serik M. Apenov, Almagul Zh. Tusupova, Natalya V. Gileva, Dina M. Baimakhanova, Mariyash K. Makisheva:
Methods of ensuring the principle of adversary of the parties during the pre-trial stage of the criminal process. Int. J. Electron. Secur. Digit. Forensics 13(4): 359-372 (2021) - Aizhan Aryn, Sagyngaliy Aidarbayev, Assel Sharipova, Akynkozha Zhanibekov, Aina Otarbayeva:
International and interstate aspects of ensuring the rights of the suspect and the accused in the proceedings of forensic investigation. Int. J. Electron. Secur. Digit. Forensics 13(2): 155-179 (2021) - Kudrat-E.-Khuda Babu, Md. Ahsan Ullah:
Cyber legislation and cyber-related legal issues in Bangladesh: inadequacies and challenges. Int. J. Electron. Secur. Digit. Forensics 13(2): 180-196 (2021) - A. Vyasa Bharadwaja, V. Ganesan:
A novel hybrid image hiding technique using elliptic curve cryptography and DNA computing technique. Int. J. Electron. Secur. Digit. Forensics 13(4): 460-473 (2021) - Asgarali Bouyer, Mojtaba Zirak:
Digital forensics in private Seafile cloud storage from both client and server side. Int. J. Electron. Secur. Digit. Forensics 13(3): 233-267 (2021) - Alicia Francois, Alastair Nisbet:
Forensic analysis and data recovery from water-submerged hard drives. Int. J. Electron. Secur. Digit. Forensics 13(2): 219-231 (2021) - Ronghai Gao, Jiwen Zeng:
Forward secure certificateless proxy multi-signature scheme. Int. J. Electron. Secur. Digit. Forensics 13(1): 1-27 (2021) - Mitha Rachel Jose, J. Amar Pratap Singh:
Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues. Int. J. Electron. Secur. Digit. Forensics 13(3): 268-297 (2021) - A. Shakeela Joy, R. Ravi:
Smart card authentication model based on elliptic curve cryptography in IoT networks. Int. J. Electron. Secur. Digit. Forensics 13(5): 548-569 (2021) - Abdullah Ayub Khan, Syed Asif Ali:
Network forensics investigation: behaviour analysis of distinct operating systems to detect and identify the host in IPv6 network. Int. J. Electron. Secur. Digit. Forensics 13(6): 600-611 (2021) - Valery A. Konyavsky, Gennady V. Ross, Artem M. Sychev, Viktor N. Kvasnitsky, Tamara B. Zhuravleva:
The upgrade of security of automated process control systems. Int. J. Electron. Secur. Digit. Forensics 13(5): 515-527 (2021) - Manish Kumar:
Mobile phone forensics - a systematic approach, tools, techniques and challenges. Int. J. Electron. Secur. Digit. Forensics 13(1): 64-87 (2021) - Piotr Lewulis:
Digital forensic standards and digital evidence in Polish criminal proceedings. An updated definition of digital evidence in forensic science. Int. J. Electron. Secur. Digit. Forensics 13(4): 403-417 (2021) - Valeriia V. Loiko, Olena S. Aleksandrova, Nataliia N. Vinnikova, Vitaliy N. Zavadskyi, Daria N. Loiko:
Methodical tools for security level diagnostics of the modern university's activity. Int. J. Electron. Secur. Digit. Forensics 13(2): 115-132 (2021) - Yogita Deepak Mane, Uday Pandit Khot:
An efficient technique to detect slow rate DDoS attack from a private Tor network. Int. J. Electron. Secur. Digit. Forensics 13(1): 88-104 (2021) - Nilay R. Mistry, Sampada Kanitkar, S. O. Junare:
Volatile memory forensics of privacy-aware operating systems. Int. J. Electron. Secur. Digit. Forensics 13(6): 671-684 (2021) - Nilay R. Mistry, Hitesh P. Sanghvi:
Drone forensics: investigative guide for law enforcement agencies. Int. J. Electron. Secur. Digit. Forensics 13(3): 334-345 (2021) - Reza Montasari, Stuart Macdonald, Amin Hosseinian Far, Fiona Carroll, Alireza Daneshkhah:
Network and hypervisor-based attacks in cloud computing environments. Int. J. Electron. Secur. Digit. Forensics 13(6): 630-651 (2021) - Bijay Kumar Paikaray, Debabala Swain, Sujata Chakravarty:
Reversible selective embedding for DICOM image security and integrity using visual cryptography. Int. J. Electron. Secur. Digit. Forensics 13(5): 498-514 (2021) - Konstantin A. Polovchenko:
Constitutional foundations of the security system in a modern state. Int. J. Electron. Secur. Digit. Forensics 13(4): 390-402 (2021) - Punam Sunil Raskar, Sanjeevani Kiran Shah:
Methods for forgery detection in digital forensics. Int. J. Electron. Secur. Digit. Forensics 13(5): 528-547 (2021) - Anjana Rodrigues, Archana Bhise:
Digital watermarking of compressed videos using larger dimension 2D error correcting codes for higher embedding capacity. Int. J. Electron. Secur. Digit. Forensics 13(6): 652-670 (2021) - Volodymyr I. Rozvadovsky, Liubomyr V. Zinych, Andriy A. Albu:
Post-Soviet Estonia's information safety: lessons for Ukraine. Int. J. Electron. Secur. Digit. Forensics 13(1): 53-63 (2021) - P. N. R. L. Chandra Sekhar, T. N. Shankar:
Splicing forgery localisation using colour illumination inconsistencies. Int. J. Electron. Secur. Digit. Forensics 13(3): 346-358 (2021) - Brajesh Kumar Singh, Ravinder Kumar, R. Rama Kishore:
LB and LT feature approach to personal identification using finger knuckle image biological trait. Int. J. Electron. Secur. Digit. Forensics 13(4): 445-459 (2021) - Maya Sitsinska, Anatoliy Sitsinskiy, Nataliia Kravtsova, Svitlana Khadzhyradieva, Yurii Baiun:
Threats to the state security of Ukraine in the humanitarian sphere: sociological dimension. Int. J. Electron. Secur. Digit. Forensics 13(4): 373-389 (2021)
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-19 19:48 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint