Printer Friendly

Articles from International Journal of Cyber-Security and Digital Forensics (January 1, 2018)

1-11 out of 11 article(s)
Title Author Type Words
A Mathematical Model for Resolving Minimum Password Length Controversy. Agholor, S.; Sodiya, A.S.; Aborisade, D.O. Report 4268
A Virtual Environment Forensic Tool. Chaus, Danish K.; Pathak, Aayush; Boramani, Akshay J.; Rajguru, Shagufta; Kalantri, Rakhi Report 2348
Audio Steganography via Cloud Services: Integrity Analysis of Hidden File. Neyaz, Ashar; Varol, Cihan Report 3962
Critical Analysis of Hash Based Signature Schemes. Gagnidze, A.; Iavich, M.; Inasaridze, N.; Iashvili, G.; Vyalkova, V. Report 3150
Cyber Autoimmune Disease When the Virtual Life Imitates the Real Life. Winter, Rogerio; Ruiz, Rodrigo Report 4077
Cyber Intelligence & OSINT: Developing Mitigation Techniques Against Cybercrime Threats on Social Media A Systematic Review July 2017. Yeboah-Ofori, Abel; Brimicombe, Allan Report 5585
Empirical Survey on Advances of Network Forensics in the Emerging Networks. Jayakrishnan, A.R.; Vasanthi, V. Report 4963
Implication of Cyber Warfare on the Financial Sector. An Exploratory Study. Khan, Sohail Razi Case study 3863
Improvement the Wireless Network Security by Requiring the News Cryptographic Primitives. Asimi, Younes; Asimi, Ahmed; Tbatou, Zakariae; Guezzaz, Azidine; Sadqi, Yassine Report 3328
Knowledge Management as a Strategic Asset in Digital Forensic Investigations. Karie, Nickson M.; Kebande, Victor R. Author abstract 5950
MALWARE ANALYSIS OF BACKDOOR CREATOR : FATRAT. Kunwar, Rakesh singh; Sharma, Priyanka; Kumar, K.V. Ravi Report 1364

Terms of use | Privacy policy | Copyright © 2022 Farlex, Inc. | Feedback | For webmasters |