首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Cyber-Security and Digital Forensics
ISSN Print: 2305-0012
ISSN Online:
主页:
http://sdiwc.net/security-journal/
分享:
Go
AUTOMATED SIGNATURE CREATOR FOR A SIGNATURE BASED INTRUSION DETECTION SYSTEM WITH NETWORK ATTACK DETECTION CAPABILITIES (PANCAKES)
Frances Bernadette C. De Ocampo
,
Trisha Mari L. Del Castillo
,
Miguel Alberto N. Gomez
A FRAMEWORK FOR GOOD CORPORATE GOVERNANCE AND ORGANISATIONAL LEARNING a€“ AN EMPIRICAL STUDY
WD Kearney
,
HA Kruger
DOMAIN INFORMATION BASED BLACKLISTING METHOD FOR THE DETECTION OF MALICIOUS WEBPAGES
Ralph Edem Agbefu
,
Yoshiaki Hori
,
Kouichi Sakurai
INVESTIGATING THE NUMBER OF USERS AND MONTHS TO MAKE TULUNGAN EFFECTIVE AGAINST SELF-PROMOTING USERS
Alexis V. Pantola
,
Susan Pancho-Festin
,
Florante Salvador
PROPOSAL AND ITS EVALUATION OF A SHOULDER-SURFING ATTACK RESISTANT AUTHENTICATION METHOD:SECRET TAP WITH DOUBLE SHIFT
Yoshihiro Kita
,
Fumio Sugai
,
MiRang Park
,
Naonobu Okazaki
A PRIVACY-PRESERVING APPROACH FOR COLLECTING EVIDENCE IN FORENSIC INVESTIGATION
Shuhui Hou
,
Siu-Ming Yiuy
,
Tetsutaro Ueharaz
,
Ryoichi Sasakix
EPSILON2: UTILIZING NETWORK VIRTUALIZATION TO SIMULATE AN INFORMATION SECURITY TESTING ENVIRONMENT
Lin G. De Luna
,
Patrick Kevin G. Detera
,
Samuel David F. Guerrero
,
Hiro R. Mejia
ASSESSING DATABASE AND NETWORK THREATS IN TRADITIONAL AND CLOUD COMPUTING
Katerina Lourida
,
Antonis Mouhtaropoulos
,
Alex Vakaloudis
THE MEAN FAILURE COST CYBERSECURITY MODEL TOWARD SECURITY MEASURES AND ASSOCIATED MECHANISMS
Neila Rjaibi
,
Latifa Ben Arfa Rabai
,
Anis Ben Aissa
ON ENHANCING DATA UTILITY IN K-ANONYMIZATION FOR DATA WITHOUT HIERARCHICAL TAXONOMIES
Mohammad Rasool Sarrafi Aghdam
,
Noboru Sonehara
PRODUCT PIRACY PREVENTION: PRODUCT COUNTERFEIT DETECTION WITHOUT SECURITY LABELS
Christian Horn
,
Matthias Blankenburg
,
Maximilian Fechteler
,
Jorg Kruger
A DRM SCHEME USING FILE PHYSICAL INFORMATION
Cheng Qu
,
Yinyan Yu
,
Zhi Tang
,
Xiaoyu Cui
COMPUTER FORENSICS BETWEEN THE ITALIAN LEGISLATION AND PRAGMATIC QUESTIONS
Gianni Fenu
,
Fabrizio Solinas
AN AUTOMATED MALWARE DETECTION SYSTEM FOR ANDROID USING BEHAVIOR-BASED ANALYSIS AMDA
Kevin Joshua Abela
,
Don Kristopher Angeles
,
Jan Raynier Delas Alas
,
Robert Joseph Tolentino
AUTOMATING THE GENERATION OF FAKE DOCUMENTS TO DETECT NETWORK INTRUDERS
Ben Whitham
DIGITAL FORENSIC TRENDS AND FUTURE
Farhood Norouzizadeh Dezfoli
,
Ali Dehghantanha
,
Ramlan Mahmoud
,
Nor Fazlida Binti Mohd Sani
A REVIEW ON IMPACTS OF CLOUD COMPUTING ON DIGITAL FORENSICS
Farid Daryabar
,
Ali Dehghantanha
,
Nur Izura Udzir
,
Nor Fazlida binti Mohd Sani
POWER AMOUNT ANALYSIS: AN EFFICIENT MEANS TO REVEAL THE SECRETS IN CRYPTOSYSTEMS
Qizhi Tian
,
Sorin A. Huss
TRUSTED DOCUMENT SIGNING BASED ON USE OF BIOMETRIC (FACE) KEYS
Ahmed Elmadani
A FORMAL SEMANTIC MODEL FOR THE ACCESS SPECIFICATION LANGUAGE RASP
Mark Evered
APPLICATION OF NEW CLASSES OF MERSENNE PRIMES FOR FAST MODULAR REDUCTION FOR LARGE-INTEGER MULTIPLICATION
Suhas Sreehari
,
Huapeng Wu
,
Majid Ahmadi
A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS
Asou Aminnezhad
,
Ali Dehghantanha
,
Mohd Taufik Abdullah
MODELLING BASED APPROACH FOR RECONSTRUCTING EVIDENCE OF VOIP MALICIOUS ATTACKS
Mohammed Ibrahim
,
Mohd Taufik Abdullah
,
Ali Dehghantanha
SOPHISTICATION TECHNIQUES OF FOURTH GENERATIONS IN NEOTERIC MOBILE LTE AND LTE-ADVANCED
A. Z. Yonis
,
M. F. L. Abdullah
GENETIC ALGORITHM APPROACH FOR RISK REDUCTION OF INFORMATION SECURITY
Alireza Tamjidyamcholo
,
Rawaa Dawoud Al-Dabbagh
RATIONALE AND DESIGN OF THE ACCESS SPECIFICATION LANGUAGE RASP
Mark Evered
DATA LEAK, CRITICAL INFORMATION INFRASTRUCTURE AND THE LEGAL OPTIONS: WHAT DOES WIKILEAKS TEACH US?
Ida Madieha Abdul Ghani Azmi
,
Sonny Zulhuda
,
Sigit Puspito Wigati Jarot
FEATURE FUSION APPROACH ON KEYSTROKE DYNAMICS EFFICIENCY ENHANCEMENT
Pin Shen Teh
,
Shigang Yue
,
Andrew B.J. Teoh
FINITE FIELD ARITHMETIC ARCHITECTURE BASED ON CELLULAR ARRAY
Kee-Won Kim
,
Jun-Cheol Jeon
A COMPARATIVE STUDY OF THE PERCEPTIONS OF END USERS IN THE EASTERN, WESTERN, CENTRAL, SOUTHERN AND NORTHERN REGIONS OF SAUDI ARABIA ABOUT EMAIL SPAM AND DEALING WITH IT
Hasan Alkahtani
,
Robert Goodwin
,
Paul Gardner-Stephen
THE RIGHT TO CONSENT AND CONTROL PERSONAL INFORMATION PROCESSING IN CYBERSPACE
Thilla Rajaretnam
TOWARDS QUANTITATIVE MEASURES OF INFORMATION SECURITY: A CLOUD COMPUTING CASE STUDY
Mouna Jouini
,
Anis Ben Aissa
,
Latifa Ben Arfa Rabai
,
Ali Mili
EFFICIENT FOREGROUND EXTRACTION BASED ON OPTICAL FLOW AND SMED FOR ROAD TRAFFIC ANALYSIS
K SuganyaDevi
,
N Malmurugan
,
R Sivakumar
TRUST MEASUREMENTS YELD DISTRIBUTED DECISION SUPPORT IN CLOUD COMPUTING
Edna Dias Canedo
,
Rafael Tim?3teo de Sousa Junior
,
Rhandy Rafhael de Carvalho and Robson de Oliveira Albuquerque
AMALGAMATION OF CYCLIC BIT OPERATION IN SD-EI IMAGE ENCRYPTION METHOD: AN ADVANCED VERSION OF SD-EI METHOD: SD-EI VER-2
Somdip Dey
CERTIFICATE REVOCATION MANAGEMENT IN VANET
Ghassan Samara
A NEW SHIFTCOLUMN TRANSFORMATION: AN ENHANCEMENT OF RIJNDAEL KEY SCHEDULING
Salasiah Sulaiman
,
Zaiton Muda
,
Julia Juremi
,
Ramlan Mahmod
RESPONDING TO IDENTITY CRIME ON THE INTERNET
Eric Holm
THE PROBLEM TO CONSENT TO THE COLLECTION, USE, AND DISCLOSURE OF PERSONAL INFORMATION IN CYBERSPACE
Thilla Rajaretnam
TECHNICAL SECURITY METRICS MODEL IN COMPLIANCE WITH ISO/IEC 27001 STANDARD
M. Azuwa
,
Rabiah Ahmad
,
Shahrin Sahib
,
Solahuddin Shamsuddin
AN AIS INSPIRED ALERT REDUCTION MODEL
Mohammad Mahboubian
,
Nur Izura Udzir
,
Shamala Subramaniam
,
Nor Asila Wati Abdul Hamid
AN IMAGE ENCRYPTION METHOD: SD-ADVANCED IMAGE ENCRYPTION STANDARD: SD-AIES
Somdip Dey
SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION
Ahmad Abusukhon
,
Mohamad Talib
,
Issa Ottoum
MEASURING SECURITY OF WEB SERVICES IN REQUIREMENT ENGINEERING PHASE
Davoud Mougouei
,
Wan Nurhayati Wan Ab. Rahman
,
Mohammad Moein Almasi
PRIVACY IN MEDICAL DATA PUBLISHING
Lila Ghemri
,
Raji Kannah
MITIGATING MAN-IN-THE-BROWSER ATTACKS WITH HARDWARE-BASED AUTHENTICATION SCHEME
Fazli Bin Mat Nor
,
Kamarularifin Abd Jalil
,
Jamalul-lail Ab Manan
AN ANALYSIS OF BASE STATION LOCATION ACCURACY WITHIN MOBILE-CELLULAR NETWORKS
Liam Smit
,
Adrie Stander
,
Jacques Ophoff
GAME THEORY: TRUST MODEL FOR COMMON CRITERIA CERTIFICATIONS & EVALUATIONS
Mohd Anuar Mat Isa
,
Jamalul-lail Ab Manan
,
Ramlan Mahmod
,
Habibah Hashim
SECURITY MEASUREMENT BASED ON GQM TO IMPROVE APPLICATION SECURITY DURING REQUIREMENTS STAGE
Ala A. Abdulrazeg
,
Norita Md Norwawi
,
Nurlida Basir
ENHANCING ADVANCED ENCRYPTION STANDARD S-BOX GENERATION BASED ON ROUND KEY
Julia Juremi
,
Ramlan Mahmod
,
Salasiah Sulaiman
,
Jazrin Ramli
Go