Printer Friendly

Articles from International Journal of Cyber-Security and Digital Forensics (October 1, 2018)

1-12 out of 12 article(s)
Title Author Type Words
A Peer Pressure Method for Helping End-Users Generate Strong Passwords. Agholor, S.; Akinyemi, I. O. 3677
A UML-Based Approach for Analysing Potential Digital Forensic Evidence. Kebande, Victor R.; Karie, Nickson M. 4040
Analysis of Secure Hash Algorithm (SHA) 512 for Encryption Process on Web Based Application. Sumagita, Meiliana; Riadi, Imam 4158
Critical Thinking Skills and Best Practices for Cyber Security. Nowduri, Srinivas 7114
Cryptocurrency and the Blockchain: A Discussion of Forensic Needs. Orr, Douglas A.; Lancaster, Drew M. 9422
Development and Evaluation of Intelligent Network Forensic System LIFT Using Bayesian Network for Targeted Attack Detection and Prevention. Sasaki, Ryoichi; Yamaki, Hiroshi; Kakizaki, Yoshio; Shimazaki, Kazuki; Terada, Masato; Uehara, Tetsu 4632
Forensic Investigation on Whatsapp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2. Actoriano, Bery; Riadi, Imam 4842
Network Forensics for Detecting Flooding Attack on Internet of Things (IoT) Device. Rizal, Randi; Riadi, Imam; Prayudi, Yudi 4651
Network Forensics for Detecting SQL Injection Attacks Using NIST Method. Caesarano, Arif Roid; Riadi, Imam 3927
Privacy protection of Users' Data in Social Network Systems based on Homomorphic Cryptography Techniques. Kapis, Kosmas; Mshangi, Maduhu 7970
Survey on Intrusion Detection System Types. Othman, Suad Mohammed; Alsohybe, Nabeel T.; Ba-Alwi, Fadl Mutaher; Zahary, Ammar Thabit 6792
Using Multiple Profiles to Protect Privacy in Web-Based Social Networks. Ghemri, Lila; Sabrina, Shahnaj; Hamilton, Emma; Medicine, Stanford 5077

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters