Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Revista de Letras (UFC)
Pamukkale University Journal of Engineering Sciences
INMATEH - Agricultural Engineering
Animal Research International



Register Journal



Visitors Counter

TodayToday
1610
YesterdayYesterday
2099
This weekThis week
10545
Last WeekLast week
9202
This monthThis month
31437
Last monthLast month
43360
All daysAll days
5807723

International Journal of Cyber-Security and Digital Forensics

Number 1, 2012

  • 5
    Application of New Classes of Mersenne Primes for Fast Modular Reduction for Large-Integer Multiplication
    Authors: Suhas Sreehari, Huapeng Wu, Majid Ahmadi
    Number of views: 595
  • 5
    Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2
    Authors: Somdip Dey
    Number of views: 604
  • 6
    Efficient Foreground Extraction Based on Optical Flow and SMED for Road Traffic Analysis
    Authors: K SuganyaDevi, N Malmurugan, R Sivakumar
    Number of views: 580
  • 6
    Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
    Authors: Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman, Jazrin Ramli
    Number of views: 612
  • 6
    Data Leak, Critical Information Infrastructure and the Legal Options: What does Wikileaks teach us?
    Authors: Ida Madieha Abdul Ghani Azmi , Sonny Zulhuda, Sigit Puspito Wigati Jarot
    Number of views: 620
  • 7
    Authenticating Devices in Ubiquitous Computing Environment
    Authors: Kamarularifin Abd Jalil, Qatrunnada Binti Abdul Rahman
    Number of views: 632
  • 7
    An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES
    Authors: Somdip Dey
    Number of views: 605
  • 7
    Certificate Revocation Management in VANET
    Authors: Ghassan Samara
    Number of views: 630
  • 7
    A New ShiftColumn Transformation: An Enhancement of Rijndael Key Scheduling
    Authors: Salasiah Sulaiman, Zaiton Muda, Julia Juremi, Ramlan Mahmod, Sharifah Md. Yasin
    Number of views: 720
  • 7
    Mitigating Man-In-The-Browser Attacks with Hardware-based Authentication Scheme
    Authors: Fazli Bin Mat Nor, Kamarularifin Abd Jalil, Jamalul-lail Ab Manan
    Number of views: 625
  • 7
    The Problem to Consent to the Collection, Use, and Disclosure of Personal Information in Cyberspace
    Authors: Thilla Rajaretnam
    Number of views: 607
  • 8
    Genetic Algorithm Approach for Risk Reduction of Information Security
    Authors: Alireza Tamjidyamcholo, Rawaa Dawoud Al-Dabbagh
    Number of views: 592
  • 8
    Responding to Identity Crime on the Internet
    Authors: Eric Holm
    Number of views: 567
  • 8
    Finite Field Arithmetic Architecture Based on Cellular Array
    Authors: Kee-Won Kim, Jun-Cheol Jeon
    Number of views: 560
  • 8
    A Formal Semantic Model for the Access Specification Language RASP
    Authors: Mark Evered
    Number of views: 613
  • 8
    An Analysis of Base Station Location Accuracy within Mobile-Cellular Networks
    Authors: Liam Smit, Adrie Stander, Jacques Ophoff
    Number of views: 631
  • 8
    Trusted Document Signing Based on Use of Biometric (Face) Keys
    Authors: Ahmed Elmadani
    Number of views: 581
  • 9
    Secure Model for Virtualization Layer in Cloud Infrastructure
    Authors: Sina Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah
    Number of views: 697
  • 9
    Privacy in Medical Data Publishing
    Authors: Lila Ghemri, Raji Kannah
    Number of views: 587
  • 9
    Game Theory: Trust Model for Common Criteria Certifications & Evaluations
    Authors: Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Nur Izura Udzir, Ali Dehghan Tanha, Mar Yah Said
    Number of views: 658
  • 9
    The Right to Consent and Control Personal Information Processing in Cyberspace
    Authors: Thilla Rajaretnam
    Number of views: 698
  • 9
    Secure Network Communication Based on Text-to-Image Encryption
    Authors: Ahmad Abusukhon, Mohamad Talib, Issa Ottoum
    Number of views: 596
  • 9
    Technical Security Metrics Model in Compliance with ISO/IEC 27001 Standard
    Authors: M. Azuwa, Rabiah Ahmad, Shahrin Sahib, Solahuddin Shamsuddin
    Number of views: 1338
  • 10
    Measuring Security of Web Services in Requirement Engineering Phase
    Authors: Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman, Mohammad Moein Almasi
    Number of views: 539
  • 10
    An AIS Inspired Alert Reduction Model
    Authors: Mohammad Mahboubian, Nur Izura Udzir, Shamala Subramaniam, Nor Asila Wati Abdul Hamid
    Number of views: 698
  • 10
    Sophistication Techniques of Fourth Generations in Neoteric Mobile LTE and LTE-Advanced
    Authors: A. Z. Yonis, M. F. L. Abdullah
    Number of views: 622
  • 10
    Security Measurement Based On GQM To Improve Application Security During Requirements Stage
    Authors: Ala A. Abdulrazeg, Norita Md Norwawi, Nurlida Basir
    Number of views: 843
  • 12
    Feature Fusion Approach on Keystroke Dynamics Efficiency Enhancement
    Authors: Pin Shen Teh, Shigang Yue, Andrew B.J. Teoh
    Number of views: 551
  • 12
    Trust Measurements Yeld Distributed Decision Support in Cloud Computing
    Authors: Edna Dias Canedo, Rafael Timóteo de Sousa Junior, Rhandy Rafhael de Carvalho and Robson de Oliveira Albuquerque
    Number of views: 551
  • 13
    A Survey on Privacy Issues in Digital Forensics
    Authors: Asou Aminnezhad, Ali Dehghantanha, Mohd Taufik Abdullah
    Number of views: 609
  • 14
    Rationale and Design of the Access Specification Language RASP
    Authors: Mark Evered
    Number of views: 567
  • 14
    A Comparative Study of the Perceptions of End Users in the Eastern, Western, Central, Southern and Northern Regions of Saudi Arabia About Email Spam and Dealing with it
    Authors: Hasan Alkahtani, Robert Goodwin, Paul Gardner-Stephen
    Number of views: 574
  • 15
    Runtime Monitoring Technique to handle Tautology based SQL Injection Attacks
    Authors: Ramya Dharam, Sajjan G. Shiva
    Number of views: 639
  • 15
    Towards quantitative measures of Information Security: A Cloud Computing case study
    Authors: Mouna Jouini, Anis Ben Aissa, Latifa Ben Arfa Rabai, Ali Mili
    Number of views: 654
  • 16
    Power Amount Analysis: An efficient Means to Reveal the Secrets in Cryptosystems
    Authors: Qizhi Tian, Sorin A. Huss
    Number of views: 555
  • 17
    Modelling Based Approach for Reconstructing Evidence of VOIP Malicious Attacks
    Authors: Mohammed Ibrahim, Mohd Taufik Abdullah, Ali Dehghantanha
    Number of views: 577


1
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us