- Ramesh Balasubramani, Kumarganesh Sengottaiyan, Thillaikkarasi Rangasamy, Susaritha Muthusamy, Elango Sellamuthu, Mahaboob Basha Shaik. Secure sensing and computing techniques based on fuzzy in 5G. IJESDF, 17(3):379-390, 2025.
- Tareq Al-Billeh, Ali Al-Hammouri, Lana Al-Khalaileh. Methods of teaching electronic administration legislation by using artificial intelligence techniques. IJESDF, 17(3):351-362, 2025.
- Rohit Deval, Nachiket Gupte, Johann Kyle Pinto, Adwaita Raj Modak, Akshat Verma, Anirudh Sharma, S. P. Raja. Exploring advanced steganography techniques for secure digital image communication: a comparative analysis and performance evaluation. IJESDF, 17(1/2):233-266, 2025.
- Lana Al-Khalaileh, Tareq Al-Billeh, Ali Al-Hammouri. The legal authority of the electronic authentication certificate and its role in proving e-commerce transactions. IJESDF, 17(1/2):267-282, 2025.
- Frank Fiadufe, Krishna Modi, Kapil Shukla, Felix O. Etyang. Forensic investigation and analysis of malware in Windows OS. IJESDF, 17(1/2):169-182, 2025.
- Meghana Solanki, Sangita Chaudhari. VLMDALP: design of an efficient VARMA LSTM-based model for identification of DDoS attacks using application-level packet analysis. IJESDF, 17(1/2):149-168, 2025.
- Pratik S. Patel, Pooja Panchal. Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defences. IJESDF, 17(1/2):183-193, 2025.
- Abitha V. K. Lija, R. Shobana, J. Caroline Misbha, S. Chandrakala. IoT security using deep learning algorithm: intrusion detection model using LSTM. IJESDF, 17(1/2):283-293, 2025.
- Usman Ali, Irfan Ali Kandhro, Raja Sohail Ahmed Larik, Abdullah Ayub Khan, Muhammad Huzaifa Shahbaz, Muhammad Osama. The future of third web: a role of blockchain and Web 3.0. IJESDF, 17(3):391-403, 2025.
- Radha Ramesh Murapaka, A. V. S. Pavan Kumar, Aditya Kumar Sahu. Pixel recurrence based image watermarking for block based integrity verification. IJESDF, 17(3):307-326, 2025.