Open Academic Journals Index
Advanced search
Open Academic Journals Index

Recently Added Issues

Revista de Letras (UFC)
Pamukkale University Journal of Engineering Sciences
INMATEH - Agricultural Engineering
Animal Research International

Register Journal

Visitors Counter

This weekThis week
Last WeekLast week
This monthThis month
Last monthLast month
All daysAll days

International Journal of Cyber-Security and Digital Forensics

Number 1, 2012

  • 5
    Application of New Classes of Mersenne Primes for Fast Modular Reduction for Large-Integer Multiplication
    Authors: Suhas Sreehari, Huapeng Wu, Majid Ahmadi
    Number of views: 595
  • 5
    Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2
    Authors: Somdip Dey
    Number of views: 604
  • 6
    Efficient Foreground Extraction Based on Optical Flow and SMED for Road Traffic Analysis
    Authors: K SuganyaDevi, N Malmurugan, R Sivakumar
    Number of views: 580
  • 6
    Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
    Authors: Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman, Jazrin Ramli
    Number of views: 612
  • 6
    Data Leak, Critical Information Infrastructure and the Legal Options: What does Wikileaks teach us?
    Authors: Ida Madieha Abdul Ghani Azmi , Sonny Zulhuda, Sigit Puspito Wigati Jarot
    Number of views: 620
  • 7
    Authenticating Devices in Ubiquitous Computing Environment
    Authors: Kamarularifin Abd Jalil, Qatrunnada Binti Abdul Rahman
    Number of views: 632
  • 7
    An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES
    Authors: Somdip Dey
    Number of views: 605
  • 7
    Certificate Revocation Management in VANET
    Authors: Ghassan Samara
    Number of views: 630
  • 7
    A New ShiftColumn Transformation: An Enhancement of Rijndael Key Scheduling
    Authors: Salasiah Sulaiman, Zaiton Muda, Julia Juremi, Ramlan Mahmod, Sharifah Md. Yasin
    Number of views: 720
  • 7
    Mitigating Man-In-The-Browser Attacks with Hardware-based Authentication Scheme
    Authors: Fazli Bin Mat Nor, Kamarularifin Abd Jalil, Jamalul-lail Ab Manan
    Number of views: 625
  • 7
    The Problem to Consent to the Collection, Use, and Disclosure of Personal Information in Cyberspace
    Authors: Thilla Rajaretnam
    Number of views: 607
  • 8
    Genetic Algorithm Approach for Risk Reduction of Information Security
    Authors: Alireza Tamjidyamcholo, Rawaa Dawoud Al-Dabbagh
    Number of views: 592
  • 8
    Responding to Identity Crime on the Internet
    Authors: Eric Holm
    Number of views: 567
  • 8
    Finite Field Arithmetic Architecture Based on Cellular Array
    Authors: Kee-Won Kim, Jun-Cheol Jeon
    Number of views: 560
  • 8
    A Formal Semantic Model for the Access Specification Language RASP
    Authors: Mark Evered
    Number of views: 613
  • 8
    An Analysis of Base Station Location Accuracy within Mobile-Cellular Networks
    Authors: Liam Smit, Adrie Stander, Jacques Ophoff
    Number of views: 631
  • 8
    Trusted Document Signing Based on Use of Biometric (Face) Keys
    Authors: Ahmed Elmadani
    Number of views: 581
  • 9
    Secure Model for Virtualization Layer in Cloud Infrastructure
    Authors: Sina Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah
    Number of views: 697
  • 9
    Privacy in Medical Data Publishing
    Authors: Lila Ghemri, Raji Kannah
    Number of views: 587
  • 9
    Game Theory: Trust Model for Common Criteria Certifications & Evaluations
    Authors: Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Nur Izura Udzir, Ali Dehghan Tanha, Mar Yah Said
    Number of views: 658
  • 9
    The Right to Consent and Control Personal Information Processing in Cyberspace
    Authors: Thilla Rajaretnam
    Number of views: 698
  • 9
    Secure Network Communication Based on Text-to-Image Encryption
    Authors: Ahmad Abusukhon, Mohamad Talib, Issa Ottoum
    Number of views: 596
  • 9
    Technical Security Metrics Model in Compliance with ISO/IEC 27001 Standard
    Authors: M. Azuwa, Rabiah Ahmad, Shahrin Sahib, Solahuddin Shamsuddin
    Number of views: 1338
  • 10
    Measuring Security of Web Services in Requirement Engineering Phase
    Authors: Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman, Mohammad Moein Almasi
    Number of views: 539
  • 10
    An AIS Inspired Alert Reduction Model
    Authors: Mohammad Mahboubian, Nur Izura Udzir, Shamala Subramaniam, Nor Asila Wati Abdul Hamid
    Number of views: 698
  • 10
    Sophistication Techniques of Fourth Generations in Neoteric Mobile LTE and LTE-Advanced
    Authors: A. Z. Yonis, M. F. L. Abdullah
    Number of views: 622
  • 10
    Security Measurement Based On GQM To Improve Application Security During Requirements Stage
    Authors: Ala A. Abdulrazeg, Norita Md Norwawi, Nurlida Basir
    Number of views: 843
  • 12
    Feature Fusion Approach on Keystroke Dynamics Efficiency Enhancement
    Authors: Pin Shen Teh, Shigang Yue, Andrew B.J. Teoh
    Number of views: 551
  • 12
    Trust Measurements Yeld Distributed Decision Support in Cloud Computing
    Authors: Edna Dias Canedo, Rafael Timóteo de Sousa Junior, Rhandy Rafhael de Carvalho and Robson de Oliveira Albuquerque
    Number of views: 551
  • 13
    A Survey on Privacy Issues in Digital Forensics
    Authors: Asou Aminnezhad, Ali Dehghantanha, Mohd Taufik Abdullah
    Number of views: 609
  • 14
    Rationale and Design of the Access Specification Language RASP
    Authors: Mark Evered
    Number of views: 567
  • 14
    A Comparative Study of the Perceptions of End Users in the Eastern, Western, Central, Southern and Northern Regions of Saudi Arabia About Email Spam and Dealing with it
    Authors: Hasan Alkahtani, Robert Goodwin, Paul Gardner-Stephen
    Number of views: 574
  • 15
    Runtime Monitoring Technique to handle Tautology based SQL Injection Attacks
    Authors: Ramya Dharam, Sajjan G. Shiva
    Number of views: 639
  • 15
    Towards quantitative measures of Information Security: A Cloud Computing case study
    Authors: Mouna Jouini, Anis Ben Aissa, Latifa Ben Arfa Rabai, Ali Mili
    Number of views: 654
  • 16
    Power Amount Analysis: An efficient Means to Reveal the Secrets in Cryptosystems
    Authors: Qizhi Tian, Sorin A. Huss
    Number of views: 555
  • 17
    Modelling Based Approach for Reconstructing Evidence of VOIP Malicious Attacks
    Authors: Mohammed Ibrahim, Mohd Taufik Abdullah, Ali Dehghantanha
    Number of views: 577

© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us