{"title":"Intrusion detection method for GPS based on deep learning for autonomous vehicle","authors":"Boughanja Manale, T. Mazri","doi":"10.1504/ijesdf.2022.10043326","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10043326","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"15 1","pages":"37-52"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89799797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Azeez, Ogunlusi E. Victor, S. Misra, R. Damaševičius, R. Maskeliūnas
{"title":"Extracted rule-based technique for anomaly detection in a global network","authors":"N. Azeez, Ogunlusi E. Victor, S. Misra, R. Damaševičius, R. Maskeliūnas","doi":"10.1504/ijesdf.2022.10046539","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10046539","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"34 1","pages":"616-637"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79177462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantitative impact analysis of application-level attacks on a robotic platform","authors":"K. M. Yousef, Anas AlMajali, B. Mohd, S. Ghalyon","doi":"10.1504/ijesdf.2022.10041008","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10041008","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"11 1","pages":"388-412"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87871685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative analysis of copy-move forgery detection algorithms","authors":"Mohassin Ahmad, F. Khursheed","doi":"10.1504/ijesdf.2022.10043405","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10043405","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":"547-564"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82589809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tay Xin Hui, Kamaruddin Malik Bin Mohamad, N. H. A. Rahman
{"title":"myEntropy: a file type identification tool using entropy scoring","authors":"Tay Xin Hui, Kamaruddin Malik Bin Mohamad, N. H. A. Rahman","doi":"10.1504/ijesdf.2022.120008","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.120008","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"41 1","pages":"76-95"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76233757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey and analysis of different lightweight block cipher techniques for resource-constrained devices","authors":"G. Madhu, P. V. Kumar","doi":"10.1504/ijesdf.2022.120011","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.120011","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"10 1","pages":"96-110"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78357011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Awan, M. M. Rind, Mazhar Ali Dootio, A. Khan, A. Shaikh, A. Laghari
{"title":"Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction","authors":"S. Awan, M. M. Rind, Mazhar Ali Dootio, A. Khan, A. Shaikh, A. Laghari","doi":"10.1504/IJESDF.2022.10037882","DOIUrl":"https://doi.org/10.1504/IJESDF.2022.10037882","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"176 1","pages":"124-150"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75466132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and privacy issues in fog computing environment","authors":"M. Lata, Vikas Kumar","doi":"10.1504/ijesdf.2022.10041390","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10041390","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"696 1","pages":"289-307"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80916264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gani Seitzhanuly, S. Bachurin, Alfiya B. Aituarova, Aivazkhan A. Gassanov, Aleksandr V. Syrbu
{"title":"Confidentiality in the activities of law enforcement agencies and the court during covert investigative activities","authors":"Gani Seitzhanuly, S. Bachurin, Alfiya B. Aituarova, Aivazkhan A. Gassanov, Aleksandr V. Syrbu","doi":"10.1504/ijesdf.2022.10041161","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10041161","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"20 4 1","pages":"151-164"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89540893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Kassymzhanova, G. Usseinova, D. Baimakhanova, A. Ibrayeva, N. Ibrayev
{"title":"Legal framework for external security of the Republic of Kazakhstan","authors":"A. Kassymzhanova, G. Usseinova, D. Baimakhanova, A. Ibrayeva, N. Ibrayev","doi":"10.1504/IJESDF.2022.10039097","DOIUrl":"https://doi.org/10.1504/IJESDF.2022.10039097","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"85 1","pages":"209-222"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80938401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}