Journal: IJESDF

Volume 12, Issue 4

337 -- 356Djamel Herbadji, Nadir Derouiche, Aïssa Belmeguenaï, Nedal Tahat, Selma Boumerdassi. A new colour image encryption approach using a combination of two 1D chaotic map
357 -- 385Anas AlMajali, Yatin Wadhawan, Mahmood S. Saadeh, Laith Shalalfeh, Clifford Neuman. Risk assessment of smart grids under cyber-physical attacks using Bayesian networks
386 -- 396V. Joseph Raymond, R. Jeberson Retna Raj. Reversing and auditing of android malicious applications using sandboxing environment
397 -- 411Reza Montasari, Richard Hill, Simon Parkinson, Alireza Daneshkhah, Amin Hosseinian Far. Hardware-based cyber threats: attack vectors and defence techniques
412 -- 423Kanat S. Lakbayev, Gulnara M. Rysmagambetova, Alizhan U. Umetov, Askar K. Sysoyev. The crimes in the field of high technology: concept, problems and methods of counteraction in Kazakhstan
424 -- 436Reza Montasari, Richard Hill, Farshad Montaseri, Hamid Jahankhani, Amin Hosseinian Far. Internet of things devices: digital forensic process and data reduction

Volume 12, Issue 3

243 -- 261Massoud Masoumi, Ali Dehghan 0001. Design and implementation of a ring oscillator-based physically unclonable function on field programmable gate array to enhance electronic security
262 -- 278Puneet Sharma, Deepak Arora, T. Sakthivel. UML-based process model for mobile cloud forensic application framework - a preliminary study
279 -- 292Kalpana Chauhan, Rajeev Kumar Chauhan. Design and development of two levels electronic security and safety system for buildings
293 -- 301Konstantinos Kardaras, George I. Lambrou, Dimitrios D. Koutsouris. Security efficient command control communication and integration with digital television
302 -- 322Ainur K. Kussainova, Aiman B. Omarova, Djamilya A. Ospanova, Duman O. Kussainov, Rysgul Abilsheyeva. Problems of legal regulations of relations in the sphere of the electronic document flow
323 -- 335Oluwasefunmi 'Tale Arogundade, Temitope Elizabeth Abioye, Sanjay Misra. An ontological approach to threats pattern collection and classification: a preliminary study to security management

Volume 12, Issue 2

139 -- 153Xiaojun Zhang, Ziyu Zhou, Jingwei Zhang, Chunxiang Xu, Xinpeng Zhang. Efficient light-weight private auditing scheme for cloud-based wireless body area networks
154 -- 173Harmeet Kaur Khanuja, Dattatraya S. Adane. Monitor and detect suspicious transactions with database forensics and Dempster-Shafer theory of evidence
174 -- 199Barnali Gupta Banik, Abhinandan Banik. Robust, imperceptible and blind video steganography using RGB secret, maximum likelihood estimation and Fibonacci encryption
200 -- 213Nureni Ayofe Azeez, Balikis Bolanle Salaudeen, Sanjay Misra, Robertas Damasevicius, Rytis Maskeliunas. Identifying phishing attacks in communication networks using URL consistency features
214 -- 228Mustapha Sadi, Mourad Amad, Nadjib Badache. Improving performance overhead of a trust-clustering key management protocol in ad hoc networks
229 -- 242Seyyed-Mohammad Javadi-Moghaddam, Mohammad Golami. Detecting phishing pages using the relief feature selection and multiple classifiers

Volume 12, Issue 1

1 -- 15Jayanta Mondal, Debabala Swain. A 3-layer RDH method in encrypted domain for medical information security
16 -- 42Mahesh Gangarde, Shruti Oza, Janardhan Chitode. Authenticate audio video-crypto invisible watermarking approach for enhancing hidden information security and robustness
43 -- 76Manar Wasif Abu Talib, Reem Alnanih, Adel Khelifi. Application of quality in use model to assess the user experience of open source digital forensics tools
77 -- 98Muhammad Azeem, Jingsha He, Allah Ditta, Faheem Akhtar, Sher Muhammad Daudpota. A novel approach to secret data concealment with high cover text capacity and security
99 -- 117Utkarsh Saxena, J. S. Sodhi, Rajneesh Tanwar. Augmenting smart home network security using blockchain technology
118 -- 137Animesh Kumar Agrawal, Aman Sharma, Sumitra Ranjan Sinha, Pallavi Khatri. Forensic of an unrooted mobile device