


default search action
International Journal of Electronic Security and Digital Forensics, Volume 17
Volume 17, Numbers 1/2, 2025
- Gabriela Ahmadi-Assalemi

, Haider M. Al-Khateeb
, Tanaka Laura Makonese, Vladlena Benson
, Samiya Khan, Usman Javed Butt:
Feature-driven anomalous behaviour detection and incident classification model for ICS in water treatment plants. 1-29 - Ramya Shah, Digvijaysinh Rathod:

An approach towards development of a supervisory control and data acquisition system forensics framework: concerns and challenges. 30-44 - Rabia Nazir

, Ahsan Hussain, Syed Zubair Ahmad Shah:
Blockchain as an indispensable asset for educational institutions: a systematic review. 45-59 - Jing Li, Mohd Shahizan Othman, Hewan Chen, Lizawati Mi Yusuf

:
IoT security: a systematic literature review of feature selection methods for machine learning-based attack classification. 60-107 - Neetu Sharma, Rajesh Rohilla:

A novel scalable and cost efficient blockchain solution for managing lifetime vaccination records based on patient preference. 108-137 - Irfan Ali Kandhro, Ali Orangzeb Panhwar, Shafique Ahmed Awan, Raja Sohail Ahmed Larik, Abdul Ahad Abro:

Network security attack classification: leveraging machine learning methods for enhanced detection and defence. 138-148 - Meghana Solanki, Sangita Chaudhari:

VLMDALP: design of an efficient VARMA LSTM-based model for identification of DDoS attacks using application-level packet analysis. 149-168 - Frank Fiadufe

, Krishna Modi
, Kapil Shukla
, Felix O. Etyang
:
Forensic investigation and analysis of malware in Windows OS. 169-182 - Pratik S. Patel, Pooja Panchal:

Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defences. 183-193 - Raghav Modi, Ananjay Singh Jammoria, Akshat Pattiwar, Arnav Agrawal, S. P. Raja:

Secure system to secure crime data using hybrid: RSA-AES and hybrid: Blowfish-Triple DES. 194-232 - Rohit Deval, Nachiket Gupte, Johann Kyle Pinto, Adwaita Raj Modak, Akshat Verma, Anirudh Sharma, S. P. Raja:

Exploring advanced steganography techniques for secure digital image communication: a comparative analysis and performance evaluation. 233-266 - Lana Al-Khalaileh

, Tareq Al-Billeh, Ali Al-Hammouri:
The legal authority of the electronic authentication certificate and its role in proving e-commerce transactions. 267-282 - Abitha V. K. Lija

, R. Shobana
, J. Caroline Misbha, S. Chandrakala:
IoT security using deep learning algorithm: intrusion detection model using LSTM. 283-293
Volume 17, Number 3, 2025
- Mohammad Alshible

, Hamzeh Abu Issa
:
Criminal protection to the digital right to be forgotten in Jordan. 295-306 - Radha Ramesh Murapaka, A. V. S. Pavan Kumar, Aditya Kumar Sahu:

Pixel recurrence based image watermarking for block based integrity verification. 307-326 - Awais Khan Jumani, Jinglun Shi, Asif Ali Laghari, Aftab ul Nabi:

A proposed model for security of quality of experience data in the cloud gaming environment. 327-350 - Tareq Al-Billeh, Ali Al-Hammouri, Lana Al-Khalaileh

:
Methods of teaching electronic administration legislation by using artificial intelligence techniques. 351-362 - Mohammad Al-Freihat, Abdullah Khsellat, Talal Aleissa, Galb Shamailah, Ziad Alwahshat

, Hashim Balas:
Dispute rules applicable to electronic commerce contracts. 363-378 - Ramesh Balasubramani, Kumarganesh Sengottaiyan, Thillaikkarasi Rangasamy, Susaritha Muthusamy

, Elango Sellamuthu, Mahaboob Basha Shaik:
Secure sensing and computing techniques based on fuzzy in 5G. 379-390 - Usman Ali, Irfan Ali Kandhro, Raja Sohail Ahmed Larik, Abdullah Ayub Khan, Muhammad Huzaifa Shahbaz, Muhammad Osama:

The future of third web: a role of blockchain and Web 3.0. 391-403 - Prachee Dewangan, Debabala Swain, Monalisa Swain:

A DWT-DCT-SVD-based robust watermark method for image copyright protection. 404-418 - A. Rajasekar, R. Ramamoorthi, M. Ramya, Vinod Arunachalam

:
A novel method to increase the security in 5G networks using deep learning. 419-431
Volume 17, Number 4, 2025
- Kiran Shrimant Kakade, O. M. Ashtankar, Anjali M. Kulkarni, Jayant Brahmane, Sulakshana B. Mane, Poonam Pratap Nathani:

Analysis of cyber delinquency among 'generation Z' in India. 433-447 - Muhammad Abbas, Sarmad Ahmed Shaikh, Rumsia Tahir, Abdullah Ayub Khan, Asif Ali Laghari:

Secure SEO techniques for improving the website ranking: an efficient approach. 448-459 - Amir Aboubakr Shaker Mahmoud, Ngaira Mandela

, Nilay R. Mistry, Animesh Kumar Agrawal
:
A hybrid approach for social media forensics. 460-483 - Nahed Alhammouri, Ali Al-Hammouri, Tareq Al-Billeh, Abdulaziz Almamari:

Legal regulation of payment using virtual currency: a comparative study. 484-499 - Federico Fusco

:
Artificial intelligence and security: some reflections concerning the freedom of expression, information and democracy. 500-509 - Swagata Sarkar, B. V. Santhosh Krishna

, D. Chithra, Sheshang Degadwala
:
Deep neural network for the purpose of developing an intrusion detection system for wireless sensor networks. 510-521 - C. Rajesh, B. R. Tapas Bapu, S. Asha, Ravi Kishore Veluri:

Deep learning-based anomaly detection in video surveillance. 522-534 - Rohit Saxena, Deepak Arora, Vishal Nagar:

A supervised machine learning-based framework for deanonymisation of Blockchain transactions. 535-561
Volume 17, Number 5, 2025
- Ngaira Mandela

, Amir Aboubakr Shaker Mahmoud, Animesh Kumar Agrawal
, Nilay R. Mistry:
DarkExtract: tool for extracting and analysing Tor Browser host-based activities. 563-581 - Leo John Baptist, Janani Selvam, Divya Midhun Chakkaravarthy:

A model for detecting cyber security intrusions using machine learning techniques. 582-592 - Muhammad Ibrar, Muhammad Khan, Jing Yu, Hang Li, Wei Zhang, Shoulin Yin, Shahid Karim, Kausar Khan:

The shifting landscape: a comprehensive examination of the top five emerging cybersecurity threats. 593-603 - A. Mani, M. Shanmuganathan, R. Babitha Lincy, Jency Rubia J:

Cloud computing's multi-key privacy-preserving deep learning system. 604-615 - Selva Kumar

, Saravanakumar Chandrasekaran, Nalini Manogaran, Bhadmavadhi Krishna:
Image encryption and decryption using graph theory. 616-630 - R. E. Franklin Jino, Arockia Mary Paulsamy, Gobinath Shanmugam, Rajesh Kumar Vishwakarma:

Enhancing network security: a deep learning-based method to detect and diminish attacks. 631-645 - S. Kumarganesh, D. Jennifer, B. Ramesh, S. Elango, A. Gopalakrishnan:

Image encryption using artificial intelligence algorithms for secure communication. 646-656 - V. Vidya Lakshmi, B. Akash, M. Manesh, A. Praveen, V. G. Rohith:

Improving reliability with wormhole detection for mobile routing to enhance network security. 657-665 - Sunil K. Moon:

Application of audio-video data embedding approach to increase imperceptibility and robustness using forensic detection. 666-687

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














