


default search action
International Journal of Electronic Security and Digital Forensics, Volume 15
Volume 15, Number 1, 2023
- Abdullah Ayub Khan

, Aftab Ahmed Shaikh
, Asif Ali Laghari, Muhammad Malook Rind:
Cloud forensics and digital ledger investigation: a new era of forensics investigation. 1-23 - Abedalrzag Aldalbeeh

, Ahmad Alsharqawi:
Cyber terrorism and its role in the outbreak of international crisis. 24-32 - Oteng Tabona

, Thabiso M. Maupong, Kopo M. Ramokapane, Thabo Semong:
Intelligence sharing in big data forensics. 33-55 - Shadi Rasheed Masadeh:

A new encryption system for IoT devices using embedded key cryptosystem. 56-65 - Ismail Haddad, Djamel Herbadji, Aïssa Belmeguenaï

, Selma Boumerdassi:
Colour image encryption based on an improved fractional-order logistic map. 66-87 - Aftab Ahmed Shaikh

, Abdullah Ayub Khan
:
Management of electronic ledger: a constraint programming approach for solving curricula scheduling problems. 88-99
Volume 15, Number 2, 2023
- Bijay Kumar Paikaray, Debabala Swain, Sujata Chakravarty

:
An improved region-based embedding technique for data hiding and image recovery using multiple ROI and RONI. 101-113 - Safwan Muhammad Al-Shdaifat:

The criminal confrontation of the cryptocurrency (Bitcoin) and its illegal use. 114-123 - Ahmed Landry Sankara, Ramya Shah

, Digvijaysinh Rathod:
Forensics of a rogue base transceiver station. 124-142 - Tashi Wangchuk, Digvijaysinh Rathod:

Opensource intelligence and dark web user de-anonymisation. 143-157 - Irfan Ali Kandhro, Umer Khan, Shahrukh Memon, Mohammad Yasir:

Discover and safe: an automated security management system for educational institutions. 158-176 - Palak Aneja, Sumit Kumar Choudhary

, Surbhi Mathur:
Aural-acoustic analysis and gender identification of morphed male and female audios. 177-183 - Vernika Mehta, Surbhi Mathur

:
Face recognition challenges due to aging: a review. 184-194 - Rohit Saxena

, Deepak Arora, Vishal Nagar:
Efficient blockchain addresses classification through cascading ensemble learning approach. 195-210 - Muhammad Ameen Chhajro, Asharib Ahmed, Muhammad Ahmed Raza, Abdullah Ayub Khan

, Asif Ali Wagan, Asif Ali Laghari:
A survey on electronic natural language applications: current challenges and limitations. 211-223
Volume 15, Number 3, 2023
- Irfan Ali Kandhro, Fayyaz Ali, Asif Ali Wagan

, Iqra Tabassum M. Ali, Farhan Afzal:
Safe and secure: an automated library management system for monitoring book rotation using face recognition. 225-239 - Noor Issa Al-Hendi:

Electronic administrative decisions and discretionary authority of public administration. 240-251 - Surbhi Mathur

, Krittika Sood:
Policing perspective on pre-emptive and probative value of CCTV architecture in the security of the smart city - Gandhinagar, Gujarat. 252-258 - Aritro Sengupta, Amit Prakash Singh, B. M. Vinjit:

A platform independent and forensically sound method to extract WhatsApp data from mobile phones. 259-280 - Yaman Salem, Majdi Owda

, Amani Yousef Owda:
An experimental approach for locating WhatsApp digital forensics artefacts on Windows 10 and the cloud. 281-300 - Xiaoxu Zhong:

Study on noise control of digital circuit signal transmission under strong magnetic field interference. 301-314 - Nishant Doshi

:
An enhanced constant length traceable CP-ABE in IoT paradigm. 315-321 - Raheel Siddiqi, Syeda Nazia Ahraf, Irfan Ali Kandhro:

Susceptibility of paediatric pneumonia detection model under projected gradient descent adversarial attacks. 322-331
Volume 15, Number 4, 2023
- Sonam Mittal

, K. R. Ramkumar:
Comparative evaluation of fully homomorphic encryption algorithms in cloud environment. 333-347 - A. Sai Charan, S. M. Srinivasavarma Vegesna, Rajesh Eswarawaka:

RecomAlly: dynamic ally recommendation on Twitter based on rhetorical structure theory and valence shifters. 348-358 - Soni Singh

, K. R. Ramkumar, Ashima Kukkar:
Pandemic outbreak prediction with an enhanced parameter optimisation algorithm using machine learning models. 359-386 - Danella Patrick, Abdullah Ayub Khan

, Fayyaz Ali, Irfan Ali Kandhro, Mahnoor Anwar, Asadullah Kehar
, Anwar Ali Sanjrani:
A novel comparison of data analytics and business intelligence tools: an information preservation and ledger management solution. 387-412 - Abdullah Ayub Khan

, Asif Ali Laghari
, Anil Kumar, Zaffar Ahmed Shaikh
, Umair Baig, Abdul Ahad Abro
:
Cloud forensics-enabled chain of custody: a novel and secure modular architecture using Blockchain Hyperledger Sawtooth. 413-423 - Sundaresan Ramachandran, Jeet Rami, Abhinav Shah, Kyounggon Kim

, Digvijaysinh Rathod:
Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection. 424-442
Volume 15, Number 5, 2023
- Indrajeet Singh, Naveen Kumar Chaudhary:

A study on methodology on VoIP-based communication investigation through network packet analysis. 443-455 - Rakhmatulla Balashov, Oxana Filipets, Svetlana Baimoldina:

Recovery of stolen assets from abroad. 456-467 - Nurlan Z. Apakhayev, Ainur S. Ramazanova, Dina B. Bugybay, Kultay A. Adilova, Duman Z. Kopbayev:

Adoption of the administrative procedural code as the implementation of Kazakhstan's legal policy concept. 468-481 - Assel Abylkhanova, Gulmira Ashirbekova

, Galiya Akseit
, Aizhan Pernebekova
, Bekzhigit Serdali:
Image of the country: problems of information security. 482-494 - Abylaikhan Aben:

State immunity as an obstacle in civil proceedings. 495-515 - C. Ravichandran, Ravi Kumar, T. Senthil Kumar, Ravi Kishore Veluri

:
Security enhancement in wireless sensors using blockchain technology. 516-531 - T. Senthil Kumar, Leo John Baptist Andrews, M. Madhini

, K. Hemalatha:
Utilising blockchain technology to provide safety for smart home networks. 532-540 - T. Kalaichelvi, Sulakshana B. Mane

, K. M. Dhanalakshmi, S. Narasimha Prasad:
The detection of phishing attempts in communications systems. 541-553
Volume 15, Number 6, 2023
- Narkes Zhexembayeva, Arailym K. Jangabulova, Guldana A. Kuanalieva, Makhabbat K. Nakisheva, Bahytkul M. Konysbai:

Human rights information in the context of digitalisation. 555-566 - Muhammad Shakir, Shahid Karim, Shahnawaz Ali, Shahzor Memon

, Halar Mustafa, Rabia Shaikh:
Denim enumeration and tabulation solution for the garments manufacturing environment. 567-577 - Ermek Abdrasulov

, Akmaral Saktaganova
, Indira Saktaganova, Sayash Zhenissov, Zhassulan Toleuov
:
Legal awareness and its significance when determining the nature of a person's legal behaviour. 578-590 - Hitesh Sanghvi, Digvijaysinh Rathod, Salem Yahya Altaleedi, Abdulaziz Saleh AlThani, Mohammed Abd Alrhman Alkhawaldeh, Abdulrazaq Almorjan, Ramya Shah

, Tanveer A. Zia:
Google chrome forensics. 591-619 - Sayan Yesmaganbetov, Antonina Kizdarbekova, Botagoz Amanzholova, Aliya Nurzhanova, Nailya Akhmetova:

Specific features of legal regulation of relations under the licence agreement. 620-631 - Swagata Sarkar, R. Babitha Lincy, P. Sasireka, Sonam Mittal

:
Monitor and detect suspicious online transactions. 632-643 - Yerbol Alimkulov

, Assel Sharipova
, Akynkozha Zhanibekov, Gulzhan Mukhamadiyeva, Aizhan Aryn:
Private detective activity of the law enforcement system of Kazakhstan on the experience of foreign countries. 644-654 - Ravi Kumar

, Kiran Shrimant Kakade, M. Priscilla, B. V. Santhosh Krishna
:
An effective digital forensic paradigm for cloud computing criminal investigation. 655-664

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














