- SELVA KUMAR, Saravanakumar Chandrasekaran, Nalini Manogaran, Bhadmavadhi Krishna. Image encryption and decryption using graph theory. IJESDF, 17(5):616-630, 2025.
- Sunil K. Moon. Application of audio-video data embedding approach to increase imperceptibility and robustness using forensic detection. IJESDF, 17(5):666-687, 2025.
- Ramesh Balasubramani, Kumarganesh Sengottaiyan, Thillaikkarasi Rangasamy, Susaritha Muthusamy, Elango Sellamuthu, Mahaboob Basha Shaik. Secure sensing and computing techniques based on fuzzy in 5G. IJESDF, 17(3):379-390, 2025.
- Tareq Al-Billeh, Ali Al-Hammouri, Lana Al-Khalaileh. Methods of teaching electronic administration legislation by using artificial intelligence techniques. IJESDF, 17(3):351-362, 2025.
- Rohit Deval, Nachiket Gupte, Johann Kyle Pinto, Adwaita Raj Modak, Akshat Verma, Anirudh Sharma, S. P. Raja. Exploring advanced steganography techniques for secure digital image communication: a comparative analysis and performance evaluation. IJESDF, 17(1/2):233-266, 2025.
- Lana Al-Khalaileh, Tareq Al-Billeh, Ali Al-Hammouri. The legal authority of the electronic authentication certificate and its role in proving e-commerce transactions. IJESDF, 17(1/2):267-282, 2025.
- Frank Fiadufe, Krishna Modi, Kapil Shukla, Felix O. Etyang. Forensic investigation and analysis of malware in Windows OS. IJESDF, 17(1/2):169-182, 2025.
- Meghana Solanki, Sangita Chaudhari. VLMDALP: design of an efficient VARMA LSTM-based model for identification of DDoS attacks using application-level packet analysis. IJESDF, 17(1/2):149-168, 2025.
- Pratik S. Patel, Pooja Panchal. Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defences. IJESDF, 17(1/2):183-193, 2025.
- Abitha V. K. Lija, R. Shobana, J. Caroline Misbha, S. Chandrakala. IoT security using deep learning algorithm: intrusion detection model using LSTM. IJESDF, 17(1/2):283-293, 2025.