Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Cyber-Security and Digital Forensics

ISSN: 2305--0012
Publisher: The Society of Digital Information and Wireless Communication


ADD TO MY LIST
 
MODELLING BASED APPROACH FOR RECONSTRUCTING EVIDENCE OF VOIP MALICIOUS ATTACKS PDF available

Author(s): Mohammed Ibrahim | Mohd Taufik Abdullah | Ali Dehghantanha
Volume: 1
Issue: 4
Year: 2012
A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS PDF available

Author(s): Asou Aminnezhad | Ali Dehghantanha | Mohd Taufik Abdullah
Volume: 1
Issue: 4
Year: 2012
TECHNICAL SECURITY METRICS MODEL IN COMPLIANCE WITH ISO/IEC 27001 STANDARD PDF available

Author(s): M. Azuwa | Rabiah Ahmad | Shahrin Sahib | Solahuddin Shamsuddin
Volume: 1
Issue: 4
Year: 2012
AN ANALYSIS OF BASE STATION LOCATION ACCURACY WITHIN MOBILE-CELLULAR NETWORKS PDF available

Author(s): Liam Smit | Adrie Stander | Jacques Ophoff
Volume: 1
Issue: 4
Year: 2012
SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION PDF available

Author(s): Ahmad Abusukhon | Mohamad Talib | Issa Ottoum
Volume: 1
Issue: 4
Year: 2012
TRUSTED DOCUMENT SIGNING BASED ON USE OF BIOMETRIC (FACE) KEYS PDF available

Author(s): Ahmed Elmadani
Volume: 1
Issue: 4
Year: 2012
DATA LEAK, CRITICAL INFORMATION INFRASTRUCTURE AND THE LEGAL OPTIONS: WHAT DOES WIKILEAKS TEACH US? PDF available

Author(s): Ida Madieha Abdul Ghani Azmi | Sonny Zulhuda | Sigit Puspito Wigati Jarot
Volume: 1
Issue: 3
Year: 2012
SECURITY MEASUREMENT BASED ON GQM TO IMPROVE APPLICATION SECURITY DURING REQUIREMENTS STAGE PDF available

Author(s): Ala A. Abdulrazeg | Norita Md Norwawi | Nurlida Basir
Volume: 1
Issue: 3
Year: 2012
MITIGATING MAN-IN-THE-BROWSER ATTACKS WITH HARDWARE-BASED AUTHENTICATION SCHEME PDF available

Author(s): Fazli Bin Mat Nor | Kamarularifin Abd Jalil | Jamalul-lail Ab Manan
Volume: 1
Issue: 3
Year: 2012
RUNTIME MONITORING TECHNIQUE TO HANDLE TAUTOLOGY BASED SQL INJECTION ATTACKS PDF available

Author(s): Ramya Dharam | Sajjan G. Shiva
Volume: 1
Issue: 3
Year: 2012
ENHANCING ADVANCED ENCRYPTION STANDARD S-BOX GENERATION BASED ON ROUND KEY PDF available

Author(s): Julia Juremi | Ramlan Mahmod | Salasiah Sulaiman | Jazrin Ramli
Volume: 1
Issue: 3
Year: 2012
EFFICIENT FOREGROUND EXTRACTION BASED ON OPTICAL FLOW AND SMED FOR ROAD TRAFFIC ANALYSIS PDF available

Author(s): K SuganyaDevi | N Malmurugan | R Sivakumar
Volume: 1
Issue: 3
Year: 2012
SOPHISTICATION TECHNIQUES OF FOURTH GENERATIONS IN NEOTERIC MOBILE LTE AND LTE-ADVANCED PDF available

Author(s): A. Z. Yonis | M. F. L. Abdullah
Volume: 1
Issue: 3
Year: 2012
A NEW SHIFTCOLUMN TRANSFORMATION: AN ENHANCEMENT OF RIJNDAEL KEY SCHEDULING PDF available

Author(s): Salasiah Sulaiman | Zaiton Muda | Julia Juremi | Ramlan Mahmod | Sharifah Md. Yasin
Volume: 1
Issue: 3
Year: 2012
THE RIGHT TO CONSENT AND CONTROL PERSONAL INFORMATION PROCESSING IN CYBERSPACE PDF available

Author(s): Thilla Rajaretnam
Volume: 1
Issue: 3
Year: 2012
ASSESSING DATABASE AND NETWORK THREATS IN TRADITIONAL AND CLOUD COMPUTING PDF available

Author(s): Katerina Lourida | Antonis Mouhtaropoulos | Alex Vakaloudis
Volume: 2
Issue: 3
Year: 2013
TOWARDS QUANTITATIVE MEASURES OF INFORMATION SECURITY: A CLOUD COMPUTING CASE STUDY PDF available

Author(s): Mouna Jouini | Anis Ben Aissa | Latifa Ben Arfa Rabai | Ali Mili
Volume: 1
Issue: 3
Year: 2012
DIGITAL FORENSIC TRENDS AND FUTURE PDF available

Author(s): Farhood Norouzizadeh Dezfoli | Ali Dehghantanha | Ramlan Mahmoud | Nor Fazlida Binti Mohd Sani | Farid Daryabar
Volume: 2
Issue: 2
Year: 2013
DOMAIN INFORMATION BASED BLACKLISTING METHOD FOR THE DETECTION OF MALICIOUS WEBPAGES PDF available

Author(s): Ralph Edem Agbefu | Yoshiaki Hori | Kouichi Sakurai
Volume: 2
Issue: 2
Year: 2013
THE MEAN FAILURE COST CYBERSECURITY MODEL TOWARD SECURITY MEASURES AND ASSOCIATED MECHANISMS PDF available

Author(s): Neila Rjaibi | Latifa Ben Arfa Rabai | Anis Ben Aissa
Volume: 2
Issue: 2
Year: 2013
ON ENHANCING DATA UTILITY IN K-ANONYMIZATION FOR DATA WITHOUT HIERARCHICAL TAXONOMIES PDF available

Author(s): Mohammad Rasool Sarrafi Aghdam | Noboru Sonehara
Volume: 2
Issue: 2
Year: 2013
AN AUTOMATED MALWARE DETECTION SYSTEM FOR ANDROID USING BEHAVIOR-BASED ANALYSIS AMDA PDF available

Author(s): Kevin Joshua Abela | Don Kristopher Angeles | Jan Raynier Delas Alas | Robert Joseph Tolentino | Miguel Alberto Gomez
Volume: 2
Issue: 2
Year: 2013
TRUST MEASUREMENTS YELD DISTRIBUTED DECISION SUPPORT IN CLOUD COMPUTING PDF available

Author(s): Edna Dias Canedo | Rafael Timóteo de Sousa Junior | Rhandy Rafhael de Carvalho and Robson de Oliveira Albuquerque
Volume: 1
Issue: 2
Year: 2012
AN AIS INSPIRED ALERT REDUCTION MODEL PDF available

Author(s): Mohammad Mahboubian | Nur Izura Udzir | Shamala Subramaniam | Nor Asila Wati Abdul Hamid
Volume: 1
Issue: 2
Year: 2012
POWER AMOUNT ANALYSIS: AN EFFICIENT MEANS TO REVEAL THE SECRETS IN CRYPTOSYSTEMS PDF available

Author(s): Qizhi Tian | Sorin A. Huss
Volume: 1
Issue: 2
Year: 2012
MEASURING SECURITY OF WEB SERVICES IN REQUIREMENT ENGINEERING PHASE PDF available

Author(s): Davoud Mougouei | Wan Nurhayati Wan Ab. Rahman | Mohammad Moein Almasi
Volume: 1
Issue: 2
Year: 2012
A REVIEW ON IMPACTS OF CLOUD COMPUTING ON DIGITAL FORENSICS PDF available

Author(s): Farid Daryabar | Ali Dehghantanha | Nur Izura Udzir | Nor Fazlida binti Mohd Sani | Solahuddin bin Shamsuddin
Volume: 2
Issue: 2
Year: 2013
A FORMAL SEMANTIC MODEL FOR THE ACCESS SPECIFICATION LANGUAGE RASP PDF available

Author(s): Mark Evered
Volume: 1
Issue: 2
Year: 2012
CERTIFICATE REVOCATION MANAGEMENT IN VANET PDF available

Author(s): Ghassan Samara
Volume: 1
Issue: 2
Year: 2012
FINITE FIELD ARITHMETIC ARCHITECTURE BASED ON CELLULAR ARRAY PDF available

Author(s): Kee-Won Kim | Jun-Cheol Jeon
Volume: 1
Issue: 2
Year: 2012
AN IMAGE ENCRYPTION METHOD: SD-ADVANCED IMAGE ENCRYPTION STANDARD: SD-AIES PDF available

Author(s): Somdip Dey
Volume: 1
Issue: 2
Year: 2012
AUTHENTICATING DEVICES IN UBIQUITOUS COMPUTING ENVIRONMENT PDF available

Author(s): Kamarularifin Abd Jalil | Qatrunnada Binti Abdul Rahman
Volume: 1
Issue: 2
Year: 2012
RESPONDING TO IDENTITY CRIME ON THE INTERNET PDF available

Author(s): Eric Holm
Volume: 1
Issue: 2
Year: 2012
PRODUCT PIRACY PREVENTION: PRODUCT COUNTERFEIT DETECTION WITHOUT SECURITY LABELS PDF available

Author(s): Christian Horn | Matthias Blankenburg | Maximilian Fechteler | Jorg Kruger
Volume: 2
Issue: 1
Year: 2013
INVESTIGATING THE NUMBER OF USERS AND MONTHS TO MAKE TULUNGAN EFFECTIVE AGAINST SELF-PROMOTING USERS PDF available

Author(s): Alexis V. Pantola | Susan Pancho-Festin | Florante Salvador
Volume: 2
Issue: 1
Year: 2013
A PRIVACY-PRESERVING APPROACH FOR COLLECTING EVIDENCE IN FORENSIC INVESTIGATION PDF available

Author(s): Shuhui Hou | Siu-Ming Yiuy | Tetsutaro Ueharaz | Ryoichi Sasakix
Volume: 2
Issue: 1
Year: 2013
A DRM SCHEME USING FILE PHYSICAL INFORMATION PDF available

Author(s): Cheng Qu | Yinyan Yu | Zhi Tang | Xiaoyu Cui
Volume: 2
Issue: 1
Year: 2013
PROPOSAL AND ITS EVALUATION OF A SHOULDER-SURFING ATTACK RESISTANT AUTHENTICATION METHOD:SECRET TAP WITH DOUBLE SHIFT PDF available

Author(s): Yoshihiro Kita | Fumio Sugai | MiRang Park | Naonobu Okazaki
Volume: 2
Issue: 1
Year: 2013
AUTOMATED SIGNATURE CREATOR FOR A SIGNATURE BASED INTRUSION DETECTION SYSTEM WITH NETWORK ATTACK DETECTION CAPABILITIES (PANCAKES) PDF available

Author(s): Frances Bernadette C. De Ocampo | Trisha Mari L. Del Castillo | Miguel Alberto N. Gomez
Volume: 2
Issue: 1
Year: 2013
COMPUTER FORENSICS BETWEEN THE ITALIAN LEGISLATION AND PRAGMATIC QUESTIONS PDF available

Author(s): Gianni Fenu | Fabrizio Solinas
Volume: 2
Issue: 1
Year: 2013
EPSILON2: UTILIZING NETWORK VIRTUALIZATION TO SIMULATE AN INFORMATION SECURITY TESTING ENVIRONMENT PDF available

Author(s): Lin G. De Luna | Patrick Kevin G. Detera | Samuel David F. Guerrero | Hiro R. Mejia | Miguel Alberto N. Gomez
Volume: 2
Issue: 1
Year: 2013
GAME THEORY: TRUST MODEL FOR COMMON CRITERIA CERTIFICATIONS & EVALUATIONS PDF available

Author(s): Mohd Anuar Mat Isa | Jamalul-lail Ab Manan | Ramlan Mahmod | Habibah Hashim | Nur Izura Udzir | Ali Dehghan Tanha | Mar Yah Said
Volume: 1
Issue: 1
Year: 2012
GENETIC ALGORITHM APPROACH FOR RISK REDUCTION OF INFORMATION SECURITY PDF available

Author(s): Alireza Tamjidyamcholo | Rawaa Dawoud Al-Dabbagh
Volume: 1
Issue: 1
Year: 2012
GAME THEORY: TRUST MODEL FOR COMMON CRITERIA CERTIFICATIONS & EVALUATIONS PDF available

Author(s): Mohd Anuar Mat Isa | Jamalul-lail Ab Manan | Ramlan Mahmod | Habibah Hashim | Nur Izura Udzir | Ali Dehghan Tanha | Mar Yah Said
Volume: 1
Issue: 1
Year: 2012
PRIVACY IN MEDICAL DATA PUBLISHING PDF available

Author(s): Lila Ghemri | Raji Kannah
Volume: 1
Issue: 1
Year: 2012
SECURE MODEL FOR VIRTUALIZATION LAYER IN CLOUD INFRASTRUCTURE PDF available

Author(s): Sina Manavi | Sadra Mohammadalian | Nur Izura Udzir | Azizol Abdullah
Volume: 1
Issue: 1
Year: 2012
FEATURE FUSION APPROACH ON KEYSTROKE DYNAMICS EFFICIENCY ENHANCEMENT PDF available

Author(s): Pin Shen Teh | Shigang Yue | Andrew B.J. Teoh
Volume: 1
Issue: 1
Year: 2012
APPLICATION OF NEW CLASSES OF MERSENNE PRIMES FOR FAST MODULAR REDUCTION FOR LARGE-INTEGER MULTIPLICATION PDF available

Author(s): Suhas Sreehari | Huapeng Wu | Majid Ahmadi
Volume: 1
Issue: 1
Year: 2012
RATIONALE AND DESIGN OF THE ACCESS SPECIFICATION LANGUAGE RASP PDF available

Author(s): Mark Evered
Volume: 1
Issue: 1
Year: 2012
AUTOMATING THE GENERATION OF FAKE DOCUMENTS TO DETECT NETWORK INTRUDERS PDF available

Author(s): Ben Whitham
Volume: 2
Issue: 1
Year: 2013
A FRAMEWORK FOR GOOD CORPORATE GOVERNANCE AND ORGANISATIONAL LEARNING – AN EMPIRICAL STUDY PDF available

Author(s): WD Kearney | HA Kruger
Volume: 2
Issue: 1
Year: 2013
Why do you need a reservation system?      Save time & money - Smart Internet Solutions