International Journal of Electronic Security and Digital Forensics最新文献

筛选
英文 中文
Cyber terrorism and its role in the outbreak of international crisis 网络恐怖主义及其在国际危机爆发中的作用
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2023-01-01 DOI: 10.1504/ijesdf.2023.10045743
Ahmad Alsharqawi, Abedalrzag Aldalbeeh
{"title":"Cyber terrorism and its role in the outbreak of international crisis","authors":"Ahmad Alsharqawi, Abedalrzag Aldalbeeh","doi":"10.1504/ijesdf.2023.10045743","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10045743","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"2 1","pages":"24-32"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82076632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Forensics-Enabled Chain of Custody: A Novel and Secure Modular Architecture Using Blockchain Hyperledger Sawtooth 云取证支持的监管链:一种使用区块链超级账本锯齿状的新型安全模块化架构
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2023-01-01 DOI: 10.1504/ijesdf.2023.10052381
Z. A. Shaikh, Umair Baig, Abdul Ahad Abro, Adarsh Kumar, A. Laghari, A. Khan
{"title":"Cloud Forensics-Enabled Chain of Custody: A Novel and Secure Modular Architecture Using Blockchain Hyperledger Sawtooth","authors":"Z. A. Shaikh, Umair Baig, Abdul Ahad Abro, Adarsh Kumar, A. Laghari, A. Khan","doi":"10.1504/ijesdf.2023.10052381","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10052381","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on methodology on VoIP-based communication investigation through network packet analysis 基于网络数据包分析的voip通信调查方法研究
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2023-01-01 DOI: 10.1504/ijesdf.2023.10052265
Indrajeet Singh, N. Chaudhary
{"title":"A study on methodology on VoIP-based communication investigation through network packet analysis","authors":"Indrajeet Singh, N. Chaudhary","doi":"10.1504/ijesdf.2023.10052265","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10052265","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"15 1","pages":"443-455"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
"The Electronic administrative decision and discretion authority of public administration" 《电子行政决策与公共行政自由裁量权》
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2023-01-01 DOI: 10.1504/ijesdf.2023.10054062
N. Alhendi
{"title":"\"The Electronic administrative decision and discretion authority of public administration\"","authors":"N. Alhendi","doi":"10.1504/ijesdf.2023.10054062","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10054062","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66717133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovery of stolen assets from abroad 从国外追回被盗资产
International Journal of Electronic Security and Digital Forensics Pub Date : 2023-01-01 DOI: 10.1504/ijesdf.2023.133188
Rakhmatulla Balashov, Oxana Filipets, Svetlana Baimoldina
{"title":"Recovery of stolen assets from abroad","authors":"Rakhmatulla Balashov, Oxana Filipets, Svetlana Baimoldina","doi":"10.1504/ijesdf.2023.133188","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133188","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134888694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligence sharing in big data forensics 大数据取证中的情报共享
International Journal of Electronic Security and Digital Forensics Pub Date : 2023-01-01 DOI: 10.1504/ijesdf.2023.127755
Oteng Tabona, Thabiso M. Maupong, Kopo M. Ramokapane, Thabo Semong
{"title":"Intelligence sharing in big data forensics","authors":"Oteng Tabona, Thabiso M. Maupong, Kopo M. Ramokapane, Thabo Semong","doi":"10.1504/ijesdf.2023.127755","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.127755","url":null,"abstract":"With the high prevalence of digital crimes, forensic investigators rely on traditional desktop tools to conduct investigations. Most of these tools are device-specific and majority of them are desktop-based therefore they suffer from limited storage and fail to process big data. These tools also lack the analytical ability to link evidence between cases or share information between cases. Therefore, inter-links can exist between cases without being detected. The poor ability to detect links between cases may result in investigators: taking a long time to complete investigations and failing to establish organised crimes. In this paper, we propose a novel solution that can cross-link evidence between cases. Our solution is not desktop-based, nor is it restricted by the evidence source. Using real-world data for evaluation, we demonstrate that our solution is capable of uncovering evidence common between cases that could otherwise be missed.","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134955778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligence sharing in big data forensics 大数据取证中的情报共享
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2023-01-01 DOI: 10.1504/ijesdf.2023.10051337
Oteng Tabona, Thabiso M. Maupong, K. Ramokapane, Thabo Semong
{"title":"Intelligence sharing in big data forensics","authors":"Oteng Tabona, Thabiso M. Maupong, K. Ramokapane, Thabo Semong","doi":"10.1504/ijesdf.2023.10051337","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10051337","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"10 1","pages":"33-55"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89581011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A platform independent and forensically sound method to extract WhatsApp data from mobile phones 一个平台独立和法医健全的方法,从手机中提取WhatsApp数据
International Journal of Electronic Security and Digital Forensics Pub Date : 2023-01-01 DOI: 10.1504/ijesdf.2023.130657
Aritro Sengupta, Amit Singh, B.M. Vinjit
{"title":"A platform independent and forensically sound method to extract WhatsApp data from mobile phones","authors":"Aritro Sengupta, Amit Singh, B.M. Vinjit","doi":"10.1504/ijesdf.2023.130657","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.130657","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135637198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Denim enumeration and tabulation solution for the garments manufacturing environment 服装制造环境的牛仔枚举和制表解决方案
International Journal of Electronic Security and Digital Forensics Pub Date : 2023-01-01 DOI: 10.1504/ijesdf.2023.133965
Muhammad Shakir, Shahid Karim, Shahnawaz Ali, Shahzor Memon, Halar Mustafa, Rabia Shaikh
{"title":"Denim enumeration and tabulation solution for the garments manufacturing environment","authors":"Muhammad Shakir, Shahid Karim, Shahnawaz Ali, Shahzor Memon, Halar Mustafa, Rabia Shaikh","doi":"10.1504/ijesdf.2023.133965","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133965","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136054115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A platform independent and forensically sound method to extract WhatsApp data from mobile phones 一个平台独立和法医健全的方法,从手机中提取WhatsApp数据
IF 0.8
International Journal of Electronic Security and Digital Forensics Pub Date : 2023-01-01 DOI: 10.1504/ijesdf.2023.10050124
Ashutosh Kumar Singh, Aritro Sengupta, B.M. Vinjit
{"title":"A platform independent and forensically sound method to extract WhatsApp data from mobile phones","authors":"Ashutosh Kumar Singh, Aritro Sengupta, B.M. Vinjit","doi":"10.1504/ijesdf.2023.10050124","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10050124","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"15 1","pages":"259-280"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信