Follow
International Journal of Cyber-Security and Digital Forensics (IJCSDF)
International Journal of Cyber-Security and Digital Forensics (IJCSDF)
The Society of Digital Information and Wireless Communications (SDIWC)
Verified email at sdiwc.net - Homepage
Title
Cited by
Cited by
Year
A survey on malware propagation, analysis, and detection
M Damshenas, A Dehghantanha, R Mahmoud
International Journal of Cyber-Security and Digital Forensics 2 (4), 10-30, 2013
882013
A survey about impacts of cloud computing on digital forensics
F Daryabar, A Dehghantanha, NI Udzir, S bin Shamsuddin, ...
International Journal of Cyber-Security and Digital Forensics 2 (2), 77-95, 2013
79*2013
Digital forensic trends and future
FN Dezfoli, A Dehghantanha, R Mahmoud, NFBM Sani, F Daryabar
International Journal of Cyber-Security and Digital Forensics 2 (2), 48-77, 2013
722013
Towards quantitative measures of Information Security: A Cloud Computing case study
M Jouini, AB Aissa, LBA Rabai, A Mili
International Journal of cyber-security and digital forensics (IJCSDF) 1 (3 …, 2012
552012
Enhancing advanced encryption standard S-box generation based on round key
JJRMS Sulaiman, J Ramli
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (3 …, 2012
492012
A survey on digital forensics trends
M Damshenas, A Dehghantanha, R Mahmoud
International Journal of Cyber-Security and Digital Forensics 3 (4), 209-235, 2014
452014
An image encryption method: SD-advanced image encryption standard: SD-AIES
S Dey
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (2 …, 2012
352012
Feature fusion approach on keystroke dynamics efficiency enhancement
PS Teh, S Yue, ABJ Teoh
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (1 …, 2012
332012
Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors
T Nagunwa
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 3 (1 …, 2014
322014
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
FL Malallah, SMS Ahmad, WAW Adnan, OA Arigbabu, V Iranmanesh, ...
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 4 (1 …, 2015
292015
An automated malware detection system for android using behavior-based analysis AMDA
KJ Abela, DK Angeles, JRD Alas, RJ Tolentino, MA Gomez
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (2 …, 2013
292013
Secure network communication based on text-to-image encryption
A Abusukhon, M Talib, I Ottoum
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (4 …, 2012
282012
Analysis of slow read DoS attack and countermeasures on web servers
J Park, K Iwai, H Tanaka, T Kurokawa
International Journal of Cyber-Security and Digital Forensics 4 (2), 339-353, 2015
262015
Text-based age and gender prediction for online safety monitoring
J van de Loo, G De Pauw, W Daelemans
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5 (1 …, 2016
252016
Building ontologies for digital forensic terminologies
NM Karie, VR Kebande
International Journal of Cyber-Security and Digital Forensics 5 (2), 75-83, 2016
252016
Amalgamation of cyclic bit operation in sd-ei image encryption method: An advanced version of sd-ei method: Sd-ei ver-2
S Dey
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (3 …, 2012
242012
Genetic algorithm approach for risk reduction of information security
A Tamjidyamcholo, RD Al-Dabbagh
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (1 …, 2012
232012
A privacy-preserving approach for collecting evidence in forensic investigation
S Hou, SM Yiu, T Uehara, R Sasaki
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (1 …, 2013
222013
Detection and protection against intrusions on smart grid systems
A Arvani, VS Rao
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 3 (1 …, 2014
212014
Proposal and its evaluation of a shoulder-surfing attack resistant authentication method: Secret tap with double shift
Y Kita, F Sugai, MR Park, N Okazaki
Int. J. Cyber Security and Digital Forensics (IJCSDF) 2 (1), 48-55, 2013
202013
The system can't perform the operation now. Try again later.
Articles 1–20