首页
OALib 期刊
OALib 预印
快速投稿通道
排名
新闻
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Cyber-Security and Digital Forensics
ISSN Print: 2305-0012
ISSN Online:
主页:
http://sdiwc.net/security-journal/
分享:
Go
AUTOMATED SIGNATURE CREATOR FOR A SIGNATURE BASED INTRUSION DETECTION SYSTEM WITH NETWORK ATTACK DETECTION CAPABILITIES (PANCAKES)
Frances Bernadette C. De Ocampo
,
Trisha Mari L. Del Castillo
,
Miguel Alberto N. Gomez
A FRAMEWORK FOR GOOD CORPORATE GOVERNANCE AND ORGANISATIONAL LEARNING a€“ AN EMPIRICAL STUDY
WD Kearney
,
HA Kruger
DOMAIN INFORMATION BASED BLACKLISTING METHOD FOR THE DETECTION OF MALICIOUS WEBPAGES
Ralph Edem Agbefu
,
Yoshiaki Hori
,
Kouichi Sakurai
INVESTIGATING THE NUMBER OF USERS AND MONTHS TO MAKE TULUNGAN EFFECTIVE AGAINST SELF-PROMOTING USERS
Alexis V. Pantola
,
Susan Pancho-Festin
,
Florante Salvador
THE MEAN FAILURE COST CYBERSECURITY MODEL TOWARD SECURITY MEASURES AND ASSOCIATED MECHANISMS
Neila Rjaibi
,
Latifa Ben Arfa Rabai
,
Anis Ben Aissa
ON ENHANCING DATA UTILITY IN K-ANONYMIZATION FOR DATA WITHOUT HIERARCHICAL TAXONOMIES
Mohammad Rasool Sarrafi Aghdam
,
Noboru Sonehara
A PRIVACY-PRESERVING APPROACH FOR COLLECTING EVIDENCE IN FORENSIC INVESTIGATION
Shuhui Hou
,
Siu-Ming Yiuy
,
Tetsutaro Ueharaz
,
Ryoichi Sasakix
PRODUCT PIRACY PREVENTION: PRODUCT COUNTERFEIT DETECTION WITHOUT SECURITY LABELS
Christian Horn
,
Matthias Blankenburg
,
Maximilian Fechteler
,
Jorg Kruger
PROPOSAL AND ITS EVALUATION OF A SHOULDER-SURFING ATTACK RESISTANT AUTHENTICATION METHOD:SECRET TAP WITH DOUBLE SHIFT
Yoshihiro Kita
,
Fumio Sugai
,
MiRang Park
,
Naonobu Okazaki
EPSILON2: UTILIZING NETWORK VIRTUALIZATION TO SIMULATE AN INFORMATION SECURITY TESTING ENVIRONMENT
Lin G. De Luna
,
Patrick Kevin G. Detera
,
Samuel David F. Guerrero
,
Hiro R. Mejia
A DRM SCHEME USING FILE PHYSICAL INFORMATION
Cheng Qu
,
Yinyan Yu
,
Zhi Tang
,
Xiaoyu Cui
AN AUTOMATED MALWARE DETECTION SYSTEM FOR ANDROID USING BEHAVIOR-BASED ANALYSIS AMDA
Kevin Joshua Abela
,
Don Kristopher Angeles
,
Jan Raynier Delas Alas
,
Robert Joseph Tolentino
ASSESSING DATABASE AND NETWORK THREATS IN TRADITIONAL AND CLOUD COMPUTING
Katerina Lourida
,
Antonis Mouhtaropoulos
,
Alex Vakaloudis
COMPUTER FORENSICS BETWEEN THE ITALIAN LEGISLATION AND PRAGMATIC QUESTIONS
Gianni Fenu
,
Fabrizio Solinas
AUTOMATING THE GENERATION OF FAKE DOCUMENTS TO DETECT NETWORK INTRUDERS
Ben Whitham
DIGITAL FORENSIC TRENDS AND FUTURE
Farhood Norouzizadeh Dezfoli
,
Ali Dehghantanha
,
Ramlan Mahmoud
,
Nor Fazlida Binti Mohd Sani
A REVIEW ON IMPACTS OF CLOUD COMPUTING ON DIGITAL FORENSICS
Farid Daryabar
,
Ali Dehghantanha
,
Nur Izura Udzir
,
Nor Fazlida binti Mohd Sani
POWER AMOUNT ANALYSIS: AN EFFICIENT MEANS TO REVEAL THE SECRETS IN CRYPTOSYSTEMS
Qizhi Tian
,
Sorin A. Huss
TRUSTED DOCUMENT SIGNING BASED ON USE OF BIOMETRIC (FACE) KEYS
Ahmed Elmadani
A FORMAL SEMANTIC MODEL FOR THE ACCESS SPECIFICATION LANGUAGE RASP
Mark Evered
APPLICATION OF NEW CLASSES OF MERSENNE PRIMES FOR FAST MODULAR REDUCTION FOR LARGE-INTEGER MULTIPLICATION
Suhas Sreehari
,
Huapeng Wu
,
Majid Ahmadi
RATIONALE AND DESIGN OF THE ACCESS SPECIFICATION LANGUAGE RASP
Mark Evered
MODELLING BASED APPROACH FOR RECONSTRUCTING EVIDENCE OF VOIP MALICIOUS ATTACKS
Mohammed Ibrahim
,
Mohd Taufik Abdullah
,
Ali Dehghantanha
AN AIS INSPIRED ALERT REDUCTION MODEL
Mohammad Mahboubian
,
Nur Izura Udzir
,
Shamala Subramaniam
,
Nor Asila Wati Abdul Hamid
THE RIGHT TO CONSENT AND CONTROL PERSONAL INFORMATION PROCESSING IN CYBERSPACE
Thilla Rajaretnam
A NEW SHIFTCOLUMN TRANSFORMATION: AN ENHANCEMENT OF RIJNDAEL KEY SCHEDULING
Salasiah Sulaiman
,
Zaiton Muda
,
Julia Juremi
,
Ramlan Mahmod
AMALGAMATION OF CYCLIC BIT OPERATION IN SD-EI IMAGE ENCRYPTION METHOD: AN ADVANCED VERSION OF SD-EI METHOD: SD-EI VER-2
Somdip Dey
TRUST MEASUREMENTS YELD DISTRIBUTED DECISION SUPPORT IN CLOUD COMPUTING
Edna Dias Canedo
,
Rafael Tim?3teo de Sousa Junior
,
Rhandy Rafhael de Carvalho and Robson de Oliveira Albuquerque
DATA LEAK, CRITICAL INFORMATION INFRASTRUCTURE AND THE LEGAL OPTIONS: WHAT DOES WIKILEAKS TEACH US?
Ida Madieha Abdul Ghani Azmi
,
Sonny Zulhuda
,
Sigit Puspito Wigati Jarot
EFFICIENT FOREGROUND EXTRACTION BASED ON OPTICAL FLOW AND SMED FOR ROAD TRAFFIC ANALYSIS
K SuganyaDevi
,
N Malmurugan
,
R Sivakumar
CERTIFICATE REVOCATION MANAGEMENT IN VANET
Ghassan Samara
TOWARDS QUANTITATIVE MEASURES OF INFORMATION SECURITY: A CLOUD COMPUTING CASE STUDY
Mouna Jouini
,
Anis Ben Aissa
,
Latifa Ben Arfa Rabai
,
Ali Mili
FINITE FIELD ARITHMETIC ARCHITECTURE BASED ON CELLULAR ARRAY
Kee-Won Kim
,
Jun-Cheol Jeon
FEATURE FUSION APPROACH ON KEYSTROKE DYNAMICS EFFICIENCY ENHANCEMENT
Pin Shen Teh
,
Shigang Yue
,
Andrew B.J. Teoh
GENETIC ALGORITHM APPROACH FOR RISK REDUCTION OF INFORMATION SECURITY
Alireza Tamjidyamcholo
,
Rawaa Dawoud Al-Dabbagh
SOPHISTICATION TECHNIQUES OF FOURTH GENERATIONS IN NEOTERIC MOBILE LTE AND LTE-ADVANCED
A. Z. Yonis
,
M. F. L. Abdullah
A COMPARATIVE STUDY OF THE PERCEPTIONS OF END USERS IN THE EASTERN, WESTERN, CENTRAL, SOUTHERN AND NORTHERN REGIONS OF SAUDI ARABIA ABOUT EMAIL SPAM AND DEALING WITH IT
Hasan Alkahtani
,
Robert Goodwin
,
Paul Gardner-Stephen
A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS
Asou Aminnezhad
,
Ali Dehghantanha
,
Mohd Taufik Abdullah
THE PROBLEM TO CONSENT TO THE COLLECTION, USE, AND DISCLOSURE OF PERSONAL INFORMATION IN CYBERSPACE
Thilla Rajaretnam
TECHNICAL SECURITY METRICS MODEL IN COMPLIANCE WITH ISO/IEC 27001 STANDARD
M. Azuwa
,
Rabiah Ahmad
,
Shahrin Sahib
,
Solahuddin Shamsuddin
RESPONDING TO IDENTITY CRIME ON THE INTERNET
Eric Holm
AN ANALYSIS OF BASE STATION LOCATION ACCURACY WITHIN MOBILE-CELLULAR NETWORKS
Liam Smit
,
Adrie Stander
,
Jacques Ophoff
ENHANCING ADVANCED ENCRYPTION STANDARD S-BOX GENERATION BASED ON ROUND KEY
Julia Juremi
,
Ramlan Mahmod
,
Salasiah Sulaiman
,
Jazrin Ramli
SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION
Ahmad Abusukhon
,
Mohamad Talib
,
Issa Ottoum
AN IMAGE ENCRYPTION METHOD: SD-ADVANCED IMAGE ENCRYPTION STANDARD: SD-AIES
Somdip Dey
MEASURING SECURITY OF WEB SERVICES IN REQUIREMENT ENGINEERING PHASE
Davoud Mougouei
,
Wan Nurhayati Wan Ab. Rahman
,
Mohammad Moein Almasi
MITIGATING MAN-IN-THE-BROWSER ATTACKS WITH HARDWARE-BASED AUTHENTICATION SCHEME
Fazli Bin Mat Nor
,
Kamarularifin Abd Jalil
,
Jamalul-lail Ab Manan
PRIVACY IN MEDICAL DATA PUBLISHING
Lila Ghemri
,
Raji Kannah
SECURITY MEASUREMENT BASED ON GQM TO IMPROVE APPLICATION SECURITY DURING REQUIREMENTS STAGE
Ala A. Abdulrazeg
,
Norita Md Norwawi
,
Nurlida Basir
GAME THEORY: TRUST MODEL FOR COMMON CRITERIA CERTIFICATIONS & EVALUATIONS
Mohd Anuar Mat Isa
,
Jamalul-lail Ab Manan
,
Ramlan Mahmod
,
Habibah Hashim
Go