A survey on malware propagation, analysis, and detection M Damshenas, A Dehghantanha, R Mahmoud International Journal of Cyber-Security and Digital Forensics 2 (4), 10-30, 2013 | 88 | 2013 |
A survey about impacts of cloud computing on digital forensics F Daryabar, A Dehghantanha, NI Udzir, S bin Shamsuddin, ... International Journal of Cyber-Security and Digital Forensics 2 (2), 77-95, 2013 | 79* | 2013 |
Digital forensic trends and future FN Dezfoli, A Dehghantanha, R Mahmoud, NFBM Sani, F Daryabar International Journal of Cyber-Security and Digital Forensics 2 (2), 48-77, 2013 | 72 | 2013 |
Towards quantitative measures of Information Security: A Cloud Computing case study M Jouini, AB Aissa, LBA Rabai, A Mili International Journal of cyber-security and digital forensics (IJCSDF) 1 (3 …, 2012 | 55 | 2012 |
Enhancing advanced encryption standard S-box generation based on round key JJRMS Sulaiman, J Ramli International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (3 …, 2012 | 49 | 2012 |
A survey on digital forensics trends M Damshenas, A Dehghantanha, R Mahmoud International Journal of Cyber-Security and Digital Forensics 3 (4), 209-235, 2014 | 45 | 2014 |
An image encryption method: SD-advanced image encryption standard: SD-AIES S Dey International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (2 …, 2012 | 35 | 2012 |
Feature fusion approach on keystroke dynamics efficiency enhancement PS Teh, S Yue, ABJ Teoh International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (1 …, 2012 | 33 | 2012 |
Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors T Nagunwa International Journal of Cyber-Security and Digital Forensics (IJCSDF) 3 (1 …, 2014 | 32 | 2014 |
Online handwritten signature recognition by length normalization using up-sampling and down-sampling FL Malallah, SMS Ahmad, WAW Adnan, OA Arigbabu, V Iranmanesh, ... International Journal of Cyber-Security and Digital Forensics (IJCSDF) 4 (1 …, 2015 | 29 | 2015 |
An automated malware detection system for android using behavior-based analysis AMDA KJ Abela, DK Angeles, JRD Alas, RJ Tolentino, MA Gomez International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (2 …, 2013 | 29 | 2013 |
Secure network communication based on text-to-image encryption A Abusukhon, M Talib, I Ottoum International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (4 …, 2012 | 28 | 2012 |
Analysis of slow read DoS attack and countermeasures on web servers J Park, K Iwai, H Tanaka, T Kurokawa International Journal of Cyber-Security and Digital Forensics 4 (2), 339-353, 2015 | 26 | 2015 |
Text-based age and gender prediction for online safety monitoring J van de Loo, G De Pauw, W Daelemans International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5 (1 …, 2016 | 25 | 2016 |
Building ontologies for digital forensic terminologies NM Karie, VR Kebande International Journal of Cyber-Security and Digital Forensics 5 (2), 75-83, 2016 | 25 | 2016 |
Amalgamation of cyclic bit operation in sd-ei image encryption method: An advanced version of sd-ei method: Sd-ei ver-2 S Dey International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (3 …, 2012 | 24 | 2012 |
Genetic algorithm approach for risk reduction of information security A Tamjidyamcholo, RD Al-Dabbagh International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (1 …, 2012 | 23 | 2012 |
A privacy-preserving approach for collecting evidence in forensic investigation S Hou, SM Yiu, T Uehara, R Sasaki International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (1 …, 2013 | 22 | 2013 |
Detection and protection against intrusions on smart grid systems A Arvani, VS Rao International Journal of Cyber-Security and Digital Forensics (IJCSDF) 3 (1 …, 2014 | 21 | 2014 |
Proposal and its evaluation of a shoulder-surfing attack resistant authentication method: Secret tap with double shift Y Kita, F Sugai, MR Park, N Okazaki Int. J. Cyber Security and Digital Forensics (IJCSDF) 2 (1), 48-55, 2013 | 20 | 2013 |