- Abhinav Shah, Digvijaysinh Rathod, Yash Mehta. A comparative study of covert channel attacks in Android with different parameters and detection tools. IJESDF, 16(3):304-316, 2024.
- Suraj Harsha Kamtam, Harjinder Singh Lallie 0001, Muhammad Ajmal Azad. The application of AI techniques for firearm detection in digital forensic investigation. IJESDF, 16(3):372-396, 2024.
- Sonam Mittal, K. R. Ramkumar. A retrospective analysis on fully homomorphic encryption scheme. IJESDF, 16(2):223-254, 2024.
- M. Deepa, J. Dhilipan. Security in database management system using machine learning. IJESDF, 16(1):124-133, 2024.
- Rui Yang, Lijuan Feng, Jiangjiang Li. Image encryption based on 3D Arnold and elementary cellular automata method. IJESDF, 16(1):97-111, 2024.
- Priya Sharma, Om Prakash Jasuja. Forensic examination of digitally captured handwriting - a review of contemporary tools and techniques. IJESDF, 16(3):357-371, 2024.
- D. Kalaiyarasi, S. Leopauline, S. Krishnaveni, Ashok Vajravelu. Cloud computing-based computer forensics: a deep learning technique. IJESDF, 16(3):317-328, 2024.
- Sergey Manin, Salahiden Sabikenov, Yelena Manina. Essence, concept, and types of national legislation in the field of information technology. IJESDF, 16(1):1-13, 2024.
- Kiran Shrimant Kakade, T. J. Nagalakshmi, S. Pradeep, B. R. Tapas Bapu. Network intrusion detection: systematic evaluation using deep learning. IJESDF, 16(2):190-201, 2024.
- Chenghua Tang, Min Hu, Mengmeng Yang, Baohua Qiang. Malicious program ontology rule set based on association decision and linear discriminant. IJESDF, 16(2):135-159, 2024.