


default search action
International Journal of Electronic Security and Digital Forensics, Volume 2
Volume 2, Number 1, 2009
- Malte Hesse, Norbert Pohlmann:

European internet early warning system. 1-17 - Rosamaria Berte, Fabio Dellutri, Antonio Grillo, Alessandro Lentini, Gianluigi Me

, Vittorio Ottaviani:
Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm. 18-28 - Jan Seedorf, Kristian Beckers, Felipe Huici:

Single-message denial-of-service attacks against voice-over-internet protocol terminals. 29-34 - Martin Rehák, Michal Pechoucek

, Martin Grill, Karel Bartos, Vojtech Krmicek, Pavel Celeda
:
Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes. 35-48 - Hamid R. Alipour, Mostafa Esmaeili, Kashefi Kia:

Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic. 49-57 - Rabia Sirhindi, Mehreen Afzal

, Saeed Murtaza:
An extended secret sharing scheme for colour images with fixed pixel expansion. 58-67 - Marjan Khatir, Seyed Mahmood Hejazi:

How to find exculpatory and inculpatory evidence using a circular digital forensics process model. 68-76 - Clive Blackwell:

A reasoning agent for credit card fraud using the event calculus. 77-91 - Iain Moir, George R. S. Weir:

Contact centres and identity theft. 92-100 - Debajyoti Konar, Chandan Mazumdar:

A generalised model of e-trading for gradual secret release fair exchange protocol. 101-111
Volume 2, Number 2, 2009
- Nigel Jones:

IT forensics: 22 years on. 116-131 - Richard E. Overill:

Development of masters modules in computer forensics and cybercrime for computer science and forensic science students. 132-140 - Gary C. Kessler, Robert Simpson, James Fry:

Multidisciplinary learning using mock trials. 141-155 - Stuart J. Gibson, Christopher J. Solomon, Matthew I. S. Maylin, Clifford Clark:

New methodology in facial composite construction: from theory to practice. 156-168 - Abhaya Induruwa:

Mobile phone forensics: an overview of technical and legal aspects. 169-181 - Dave Childs, Paul Stephens

:
An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl. 182-198 - David Collins:

XFT: a forensic toolkit for the original Xbox game console. 199-205 - Lynne Norris-Jones, Steve Marsh:

An investigation into the technical, legal and ethical issues associated with biometrics in the UK (application to biometrics module for computing programmes). 206-218 - Man Qi, Yongquan Wang, Rongsheng Xu:

Fighting cybercrime: legislation in China. 219-227 - Margaret Ross, Geoff Staples, Mark Udall:

Cybercrime - raising awareness for future professionals. 228-238
Volume 2, Number 3, 2009
- Elias Pimenidis, Christos K. Georgiadis

:
Web services security evaluation considerations. 239-252 - David J. Boyd:

A pragmatic approach to temporary payment card numbers. 253-268 - Bobby L. Tait

, Sebastiaan H. von Solms:
BioVault: biometrically based encryption. 269-279 - Amirhossein Taherinia

, Mansour Jamzad:
A robust spread spectrum watermarking method using two levels DCT. 280-305 - Cyril Onwubiko

, Andrew P. Lenaghan:
Challenges and complexities of managing information security. 306-321 - Alan Davidson, Rein Oja, Louise Yngström:

A Swedish IT forensics course - expert opinions. 322-333
Volume 2, Number 4, 2009
- Athanasios Karantjias, Nineta Polemi:

An innovative platform architecture for complex secure e/m-governmental services. 338-354 - Miltiades E. Anagnostou

, Maria A. Lambrou:
Privacy now and in the age of ambient intelligence. 355-364 - Charalampos Z. Patrikakis

, Dimitris M. Kyriazanos
, Athanasios Voulodimos, Ioannis G. Nikolakopoulos:
Trust and security in Personal Network environments. 365-376 - Vasilios Zorkadis, Dimitrios A. Karras

:
On privacy-enhancing architectures for distribution of real time performance demanding mobile services. 377-386 - Hamid Jahankhani:

Criminal investigation and forensic tools for smartphones. 387-406 - Maria Ntaliani, Constantina I. Costopoulou, Nikos Manouselis, Sotiris Karetsos

:
M-government services for rural SMEs. 407-423 - Elias Pimenidis, Alexander B. Sideridis, Eleni Antonopoulou:

Mobile devices and services: bridging the digital divide in rural areas. 424-434

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














