{"title":"Recovery of stolen assets from abroad","authors":"R. Balashov, O. Filipets, S. Baimoldina","doi":"10.1504/ijesdf.2023.10052308","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10052308","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"41 1","pages":"456-467"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Kalaichelvi, Sulakshana Mane, K.M. Dhanalakshmi, S. N. Prasad
{"title":"The detection of phishing attempts in communications systems","authors":"T. Kalaichelvi, Sulakshana Mane, K.M. Dhanalakshmi, S. N. Prasad","doi":"10.1504/ijesdf.2023.133192","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133192","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"61 1","pages":"541-553"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66717221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ravi Kumar, Kiran S. Kakade, M. Priscilla, B.V. Santhosh Krishna
{"title":"An effective digital forensic paradigm for cloud computing criminal investigation","authors":"Ravi Kumar, Kiran S. Kakade, M. Priscilla, B.V. Santhosh Krishna","doi":"10.1504/ijesdf.2023.133966","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133966","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136054103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Narkes Zhexembayeva, Arailym K. Jangabulova, Guldana A. Kuanalieva, Makhabbat K. Nakisheva, Bahytkul M. Konysbai
{"title":"Human rights information in the context of digitalisation","authors":"Narkes Zhexembayeva, Arailym K. Jangabulova, Guldana A. Kuanalieva, Makhabbat K. Nakisheva, Bahytkul M. Konysbai","doi":"10.1504/ijesdf.2023.133963","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133963","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136054105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opensource intelligence and dark web user de-anonymisation","authors":"T. Wangchuk, D. Rathod","doi":"10.1504/ijesdf.2023.10047389","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10047389","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"15 1","pages":"143-157"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Debabala Swain, Dr. Bijay Paikaray, S. Chakravarty
{"title":"An improved region-based embedding technique for data hiding and image recovery using multiple ROI and RONI","authors":"Debabala Swain, Dr. Bijay Paikaray, S. Chakravarty","doi":"10.1504/ijesdf.2023.10046536","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10046536","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"15 1","pages":"101-113"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danella Patrick, A. Khan, F. Ali, Irfan Ali Kandhro, Mahnoor Anwar, Asadullah Kehar, Anwar Ali Sanjrani
{"title":"A novel comparison of data analytics and business intelligence tools: an information preservation and ledger management solution","authors":"Danella Patrick, A. Khan, F. Ali, Irfan Ali Kandhro, Mahnoor Anwar, Asadullah Kehar, Anwar Ali Sanjrani","doi":"10.1504/ijesdf.2023.10052136","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10052136","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"15 1","pages":"387-412"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aliya S. Nurzhanova, B. Amanzholova, A. Kizdarbekova, Sayan Yesmaganbetov, N. Akhmetova
{"title":"Specific Features of Legal Regulation of Relations under the Licence Agreement","authors":"Aliya S. Nurzhanova, B. Amanzholova, A. Kizdarbekova, Sayan Yesmaganbetov, N. Akhmetova","doi":"10.1504/ijesdf.2023.10056467","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10056467","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66717183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new encryption system for IoT devices using embedded key cryptosystem","authors":"S. Masadeh","doi":"10.1504/ijesdf.2023.10046009","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10046009","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"124 1","pages":"56-65"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88715019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}