International Journal of Electronic Security and Digital Forensics最新文献

筛选
英文 中文
Using a DNA tape as a key for encrypt images 用DNA磁带作为加密图像的钥匙
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.123868
M. A. F. Al-Husainy, H. A. Al-Sewadi, S. Masadeh
{"title":"Using a DNA tape as a key for encrypt images","authors":"M. A. F. Al-Husainy, H. A. Al-Sewadi, S. Masadeh","doi":"10.1504/ijesdf.2022.123868","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.123868","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"519 1","pages":"373-387"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77181523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Features of the conclusion of a civil transaction on the Internet 互联网民事交易订立的特点
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10042952
S. Tynybekov, Z. Adanbekova, A. B. Omarova, S. Yermukhametova, Gulnura A. Khudaiberdina
{"title":"Features of the conclusion of a civil transaction on the Internet","authors":"S. Tynybekov, Z. Adanbekova, A. B. Omarova, S. Yermukhametova, Gulnura A. Khudaiberdina","doi":"10.1504/ijesdf.2022.10042952","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10042952","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"7 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit card fraud detection using moth-flame earth worm optimisation algorithm-based deep belief neural network 基于蛾焰土蠕虫优化算法的信用卡诈骗检测深度信念神经网络
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10041476
Deepika S, S. S
{"title":"Credit card fraud detection using moth-flame earth worm optimisation algorithm-based deep belief neural network","authors":"Deepika S, S. S","doi":"10.1504/ijesdf.2022.10041476","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10041476","url":null,"abstract":": Nowadays, credit card fraud actions happen commonly, which results in vast financial losses. Fraudulent transactions can take place in a variety of ways and can be put into various categories. Hence, financial institutions and banks put forward credit card fraud detection applications. To detect fraudulent activities, this paper proposes a credit card fraud detection system. The proposed system uses the database with the credit card transaction information and sends it to the pre-processing. The log transformation is applied over the database for data regulation in the pre-processing step. After, the appropriate features are selected by the information gain criterion, and the selected features are utilised to train the classifier. Here, a novel classifier, namely moth-flame earth worm optimisation-based deep belief network (MF-EWA-based DBN) is proposed for the fraud detection. The weights for the classifier are selected by the newly developed moth-flame earth worm optimisation algorithm (MF-EWA). The proposed classifier carries out the training and detects the fraud transactions in the database. The proposed MF-EWA-based DBN classifier has improved detection performance and outclassed other existing models with 85.89% accuracy.","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"3 1","pages":"53-75"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82912988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Child Pornography through Cyberspace - A Comparative Analysis of Laws and Criminal Justice Responses in India with USA, UK and Japan. 网络空间中的儿童色情——印度与美国、英国和日本法律和刑事司法反应的比较分析。
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10043944
Paromita Chattoraj, Rupashree Sahoo
{"title":"Child Pornography through Cyberspace - A Comparative Analysis of Laws and Criminal Justice Responses in India with USA, UK and Japan.","authors":"Paromita Chattoraj, Rupashree Sahoo","doi":"10.1504/ijesdf.2022.10043944","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10043944","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer and network security: intrusion detection system using mobile agent 计算机与网络安全:利用移动代理的入侵检测系统
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.123843
Samir Bourekkache, O. Kazar, Ahmed Aloui, Ghazali Hamouda
{"title":"Computer and network security: intrusion detection system using mobile agent","authors":"Samir Bourekkache, O. Kazar, Ahmed Aloui, Ghazali Hamouda","doi":"10.1504/ijesdf.2022.123843","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.123843","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"14 1","pages":"318-340"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big data analysis and forensics 大数据分析和取证
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10044312
A. Aljahdali, Ghalia Alluhaib, Rasha Alqarni, Majdah Alsharef, Amal Alsaqqaf
{"title":"Big data analysis and forensics","authors":"A. Aljahdali, Ghalia Alluhaib, Rasha Alqarni, Majdah Alsharef, Amal Alsaqqaf","doi":"10.1504/ijesdf.2022.10044312","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10044312","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"160 1","pages":"579-593"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80111034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of injections in API requests using recurrent neural networks and transformers 使用递归神经网络和变压器检测API请求中的注入
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10043818
A. S. Reddy, Bhawana Rudra
{"title":"Detection of injections in API requests using recurrent neural networks and transformers","authors":"A. S. Reddy, Bhawana Rudra","doi":"10.1504/ijesdf.2022.10043818","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10043818","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"13 1","pages":"638-658"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78377077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues 移动自组织网络中路由协议的安全挑战:系统回顾和开放研究问题
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2021-03-05 DOI: 10.1504/IJESDF.2021.114963
Mitha Rachel Jose, J. Singh
{"title":"Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues","authors":"Mitha Rachel Jose, J. Singh","doi":"10.1504/IJESDF.2021.114963","DOIUrl":"https://doi.org/10.1504/IJESDF.2021.114963","url":null,"abstract":"Various targeted attacks are focused on MANET exploiting these vulnerabilities and disrupting their operations. Therefore, network optimisation can be accomplished through the maximal use of resources available and deploying proper security measures. In this study, various MANET protocols namely geographical, topology-based, hybrid, hierarchical, power-aware and multicast routing protocols, were investigated based on performance parameters (routing overhead, caching overhead, and packet delivery ratio) along with the security challenges they face. In addition to this, comparative analysis among various routing protocols and their performances were evaluated. Several topological issues namely high power consumption, low bandwidth, and high error rate, were taken into account.","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"41 1","pages":"268-297"},"PeriodicalIF":0.8,"publicationDate":"2021-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90197611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Technique to Detect Slow Rate DDoS Attack from Private Tor Network 一种检测专用Tor网络慢速DDoS攻击的有效方法
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2021-01-01 DOI: 10.1504/ijesdf.2021.10030839
Y. Mane, U. Khot
{"title":"An Efficient Technique to Detect Slow Rate DDoS Attack from Private Tor Network","authors":"Y. Mane, U. Khot","doi":"10.1504/ijesdf.2021.10030839","DOIUrl":"https://doi.org/10.1504/ijesdf.2021.10030839","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"13 1","pages":"1"},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66714264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
International and interstate aspects of ensuring the rights of the suspect and the accused in the proceedings of forensic investigation 确保犯罪嫌疑人和被告在法医调查程序中权利的国际和州际方面
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2021-01-01 DOI: 10.1504/ijesdf.2021.113386
A. Aryn, Sagyngaliy Aidarbayev, A. Sharipova, A. Zhanibekov, A. Otarbayeva
{"title":"International and interstate aspects of ensuring the rights of the suspect and the accused in the proceedings of forensic investigation","authors":"A. Aryn, Sagyngaliy Aidarbayev, A. Sharipova, A. Zhanibekov, A. Otarbayeva","doi":"10.1504/ijesdf.2021.113386","DOIUrl":"https://doi.org/10.1504/ijesdf.2021.113386","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"175 1","pages":"155-179"},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78455483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信