Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Nanotechnologies in Construction: A Scientific Internet-Journal
International Journal of Media and Information Literacy
Animal Research International
European Journal of Molecular Biotechnology



Register Journal



Visitors Counter

TodayToday
1046
YesterdayYesterday
1511
This weekThis week
8296
Last WeekLast week
9403
This monthThis month
2557
Last monthLast month
42890
All daysAll days
5735483

International Journal of Cyber-Security and Digital Forensics

Number 3, 2014

  • 10
    Detecting Hidden Encrypted Volume Files via Statistical Analysis
    Authors: Mario Piccinelli, Paolo Gubian
    Number of views: 611

Number 2, 2013

  • 8
    EPSILON2: Utilizing Network Virtualization to Simulate an Information Security Testing Environment
    Authors: Lin G. De Luna , Patrick Kevin G. Detera, Samuel David F. Guerrero, Hiro R. Mejia, Miguel Alberto N. Gomez
    Number of views: 672
  • 8
    Proposal and Its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shift
    Authors: Yoshihiro Kita, Fumio Sugai, MiRang Park, Naonobu Okazaki
    Number of views: 684
  • 8
    The Improved 32nd-Order Differential Attack on 8 Rounds of Misty2 without FL Functions
    Authors: Yasutaka Igarashi, Toshinobu Kaneko, Yutaka Eguchi, Takahiro Murai, Ryutaro
    Number of views: 632
  • 9
    A Privacy-Preserving Approach for Collecting Evidence in Forensic Investigation
    Authors: Shuhui Hou, Siu-Ming Yiuy, Tetsutaro Ueharaz, Ryoichi Sasakix
    Number of views: 596
  • 9
    Investigating the Number of Users And Months to Make Tulungan Effective Against Self-Promoting Users
    Authors: Alexis V. Pantola, Susan Pancho-Festin, Florante Salvador
    Number of views: 574
  • 9
    An Authentication Middleware for Prevention of Information Theft
    Authors: S. Kami Makki, Md. Sadekur Rahman
    Number of views: 536
  • 9
    A Detailed Strategy for Managing Corporation Cyber War Security
    Authors: Walid Al-Ahmad
    Number of views: 588
  • 11
    Automated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes)
    Authors: Frances Bernadette C. De Ocampo, Trisha Mari L. Del Castillo, Miguel Alberto N. Gomez
    Number of views: 681
  • 11
    An Automated Malware Detection System for Android Using Behavior-Based Analysis AMDA
    Authors: Kevin Joshua Abela, Don Kristopher Angeles, Jan Raynier Delas Alas, Robert Joseph Tolentino, Miguel Alberto Gomez
    Number of views: 533
  • 11
    On Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomies
    Authors: Mohammad Rasool Sarrafi Aghdam, Noboru Sonehara
    Number of views: 577
  • 12
    A Framework for Good Corporate Governance and Organisational Learning – An Empirical Study
    Authors: WD Kearney, HA Kruger
    Number of views: 653
  • 12
    Domain Information Based Blacklisting Method for the Detection of Malicious Webpages
    Authors: Ralph Edem Agbefu, Yoshiaki Hori, Kouichi Sakurai
    Number of views: 604
  • 13
    The Mean Failure Cost Cybersecurity Model toward Security Measures and Associated Mechanisms
    Authors: Neila Rjaibi, Latifa Ben Arfa Rabai, Anis Ben Aissa
    Number of views: 598
  • 14
    A DRM Scheme Using File Physical Information
    Authors: Cheng Qu, Yinyan Yu, Zhi Tang, Xiaoyu Cui
    Number of views: 592
  • 16
    Computer Forensics between the Italian Legislation and Pragmatic Questions
    Authors: Gianni Fenu, Fabrizio Solinas
    Number of views: 567
  • 16
    Automating the Generation of Fake Documents to Detect Network Intruders
    Authors: Shuhui Hou, Siu-Ming Yiuy, Tetsutaro Ueharaz, Ryoichi Sasakix
    Number of views: 731
  • 17
    Assessing Database and Network Threats in Traditional and Cloud Computing
    Authors: Katerina Lourida, Antonis Mouhtaropoulos, Alex Vakaloudis
    Number of views: 576
  • 18
    A Review on Impacts of Cloud Computing on Digital Forensics
    Authors: Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida binti Mohd Sani, Solahuddin bin Shamsuddin
    Number of views: 606
  • 20
    A Survey on Malware Propagation, Analysis, and Detection
    Authors: Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud
    Number of views: 658
  • 29
    Digital Forensic Trends and Future
    Authors: Farhood Norouzizadeh Dezfoli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, Farid Daryabar
    Number of views: 857

Number 1, 2012

  • 5
    Application of New Classes of Mersenne Primes for Fast Modular Reduction for Large-Integer Multiplication
    Authors: Suhas Sreehari, Huapeng Wu, Majid Ahmadi
    Number of views: 592
  • 5
    Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2
    Authors: Somdip Dey
    Number of views: 602
  • 6
    Efficient Foreground Extraction Based on Optical Flow and SMED for Road Traffic Analysis
    Authors: K SuganyaDevi, N Malmurugan, R Sivakumar
    Number of views: 578
  • 6
    Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
    Authors: Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman, Jazrin Ramli
    Number of views: 609
  • 6
    Data Leak, Critical Information Infrastructure and the Legal Options: What does Wikileaks teach us?
    Authors: Ida Madieha Abdul Ghani Azmi , Sonny Zulhuda, Sigit Puspito Wigati Jarot
    Number of views: 618
  • 7
    Authenticating Devices in Ubiquitous Computing Environment
    Authors: Kamarularifin Abd Jalil, Qatrunnada Binti Abdul Rahman
    Number of views: 630
  • 7
    An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES
    Authors: Somdip Dey
    Number of views: 602
  • 7
    Certificate Revocation Management in VANET
    Authors: Ghassan Samara
    Number of views: 626
  • 7
    A New ShiftColumn Transformation: An Enhancement of Rijndael Key Scheduling
    Authors: Salasiah Sulaiman, Zaiton Muda, Julia Juremi, Ramlan Mahmod, Sharifah Md. Yasin
    Number of views: 718
  • 7
    Mitigating Man-In-The-Browser Attacks with Hardware-based Authentication Scheme
    Authors: Fazli Bin Mat Nor, Kamarularifin Abd Jalil, Jamalul-lail Ab Manan
    Number of views: 623
  • 7
    The Problem to Consent to the Collection, Use, and Disclosure of Personal Information in Cyberspace
    Authors: Thilla Rajaretnam
    Number of views: 604
  • 8
    Genetic Algorithm Approach for Risk Reduction of Information Security
    Authors: Alireza Tamjidyamcholo, Rawaa Dawoud Al-Dabbagh
    Number of views: 590
  • 8
    Responding to Identity Crime on the Internet
    Authors: Eric Holm
    Number of views: 565
  • 8
    Finite Field Arithmetic Architecture Based on Cellular Array
    Authors: Kee-Won Kim, Jun-Cheol Jeon
    Number of views: 557
  • 8
    A Formal Semantic Model for the Access Specification Language RASP
    Authors: Mark Evered
    Number of views: 609
  • 8
    An Analysis of Base Station Location Accuracy within Mobile-Cellular Networks
    Authors: Liam Smit, Adrie Stander, Jacques Ophoff
    Number of views: 627
  • 8
    Trusted Document Signing Based on Use of Biometric (Face) Keys
    Authors: Ahmed Elmadani
    Number of views: 578
  • 9
    Secure Model for Virtualization Layer in Cloud Infrastructure
    Authors: Sina Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah
    Number of views: 694
  • 9
    Privacy in Medical Data Publishing
    Authors: Lila Ghemri, Raji Kannah
    Number of views: 585
  • 9
    Game Theory: Trust Model for Common Criteria Certifications & Evaluations
    Authors: Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Nur Izura Udzir, Ali Dehghan Tanha, Mar Yah Said
    Number of views: 655
  • 9
    The Right to Consent and Control Personal Information Processing in Cyberspace
    Authors: Thilla Rajaretnam
    Number of views: 695
  • 9
    Secure Network Communication Based on Text-to-Image Encryption
    Authors: Ahmad Abusukhon, Mohamad Talib, Issa Ottoum
    Number of views: 592
  • 9
    Technical Security Metrics Model in Compliance with ISO/IEC 27001 Standard
    Authors: M. Azuwa, Rabiah Ahmad, Shahrin Sahib, Solahuddin Shamsuddin
    Number of views: 1332
  • 10
    Measuring Security of Web Services in Requirement Engineering Phase
    Authors: Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman, Mohammad Moein Almasi
    Number of views: 536
  • 10
    An AIS Inspired Alert Reduction Model
    Authors: Mohammad Mahboubian, Nur Izura Udzir, Shamala Subramaniam, Nor Asila Wati Abdul Hamid
    Number of views: 695
  • 10
    Sophistication Techniques of Fourth Generations in Neoteric Mobile LTE and LTE-Advanced
    Authors: A. Z. Yonis, M. F. L. Abdullah
    Number of views: 619
  • 10
    Security Measurement Based On GQM To Improve Application Security During Requirements Stage
    Authors: Ala A. Abdulrazeg, Norita Md Norwawi, Nurlida Basir
    Number of views: 840
  • 12
    Feature Fusion Approach on Keystroke Dynamics Efficiency Enhancement
    Authors: Pin Shen Teh, Shigang Yue, Andrew B.J. Teoh
    Number of views: 548
  • 12
    Trust Measurements Yeld Distributed Decision Support in Cloud Computing
    Authors: Edna Dias Canedo, Rafael Timóteo de Sousa Junior, Rhandy Rafhael de Carvalho and Robson de Oliveira Albuquerque
    Number of views: 549
  • 13
    A Survey on Privacy Issues in Digital Forensics
    Authors: Asou Aminnezhad, Ali Dehghantanha, Mohd Taufik Abdullah
    Number of views: 607
  • 14
    Rationale and Design of the Access Specification Language RASP
    Authors: Mark Evered
    Number of views: 565
  • 14
    A Comparative Study of the Perceptions of End Users in the Eastern, Western, Central, Southern and Northern Regions of Saudi Arabia About Email Spam and Dealing with it
    Authors: Hasan Alkahtani, Robert Goodwin, Paul Gardner-Stephen
    Number of views: 572
  • 15
    Runtime Monitoring Technique to handle Tautology based SQL Injection Attacks
    Authors: Ramya Dharam, Sajjan G. Shiva
    Number of views: 636
  • 15
    Towards quantitative measures of Information Security: A Cloud Computing case study
    Authors: Mouna Jouini, Anis Ben Aissa, Latifa Ben Arfa Rabai, Ali Mili
    Number of views: 652
  • 16
    Power Amount Analysis: An efficient Means to Reveal the Secrets in Cryptosystems
    Authors: Qizhi Tian, Sorin A. Huss
    Number of views: 553
  • 17
    Modelling Based Approach for Reconstructing Evidence of VOIP Malicious Attacks
    Authors: Mohammed Ibrahim, Mohd Taufik Abdullah, Ali Dehghantanha
    Number of views: 573


1
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us