Syed Wajid Ali Shah, A. Laghari, M. Shakir, Geng Tong, Shahid Karim
{"title":"Infrared and visible image fusion based on improved NSCT and NSST","authors":"Syed Wajid Ali Shah, A. Laghari, M. Shakir, Geng Tong, Shahid Karim","doi":"10.1504/ijesdf.2024.10054426","DOIUrl":"https://doi.org/10.1504/ijesdf.2024.10054426","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"49 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66719094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Aryn, Gulzhan N. Mukhamadiyeva, A. Sharipova, A. Zhanibekov, Y. Alimkulov
{"title":"Private detective activity of the law enforcement system of Kazakhstan on the experience of foreign countries","authors":"A. Aryn, Gulzhan N. Mukhamadiyeva, A. Sharipova, A. Zhanibekov, Y. Alimkulov","doi":"10.1504/ijesdf.2023.10052564","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10052564","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Ravichandran, Ravi Kumar, T. S. Kumar, R. Veluri
{"title":"Security enhancement in wireless sensors using blockchain technology","authors":"C. Ravichandran, Ravi Kumar, T. S. Kumar, R. Veluri","doi":"10.1504/ijesdf.2023.133194","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133194","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"15 1","pages":"516-531"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66717900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Private detective activity of the law enforcement system of Kazakhstan on the experience of foreign countries","authors":"Yerbol Alimkulov, Assel Sharipova, Akynkozha Zhanibekov, Gulzhan Mukhamadiyeva, Aizhan Aryn","doi":"10.1504/ijesdf.2023.133964","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133964","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136054135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face recognition challenges due to aging: a review","authors":"Vernika Mehta, S. Mathur","doi":"10.1504/ijesdf.2023.10050098","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10050098","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"15 1","pages":"184-194"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Pernebekova, Galiya Akseit, G. Ashirbekova, A. Abylkhanova, B. Serdali
{"title":"Image of the country: problems of information security","authors":"A. Pernebekova, Galiya Akseit, G. Ashirbekova, A. Abylkhanova, B. Serdali","doi":"10.1504/ijesdf.2023.10052419","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10052419","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic administrative decisions and discretionary authority of public administration","authors":"N. Alhendi","doi":"10.1504/ijesdf.2023.130677","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.130677","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"30 1","pages":"240-251"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66717381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. S. Kumar, Leo John Baptist Andrews, M. Madhini, K. Hemalatha
{"title":"Utilising blockchain technology to provide safety for smart home networks","authors":"T. S. Kumar, Leo John Baptist Andrews, M. Madhini, K. Hemalatha","doi":"10.1504/ijesdf.2023.133193","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133193","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"15 1","pages":"532-540"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66717829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Boumerdassi, A. Belmeguenai, Djamel Herbadji, Ismail Haddad
{"title":"Colour image encryption based on an improved fractional-order logistic map","authors":"S. Boumerdassi, A. Belmeguenai, Djamel Herbadji, Ismail Haddad","doi":"10.1504/ijesdf.2023.127747","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.127747","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"12 1","pages":"66-87"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79088508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Forensics and Digital Ledger Investigation: A New Era of Forensics Investigation","authors":"A. Laghari, M. M. Rind, A. Khan, A. Shaikh","doi":"10.1504/ijesdf.2023.10045851","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10045851","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"95 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}