Printer Friendly

Articles from International Journal of Cyber-Security and Digital Forensics (September 1, 2018)

1-14 out of 14 article(s)
Title Author Type Words
A Study of the Effects of Heartbleed Vulnerability in Bangladesh. Zaman, Moniruz; Alam, Delwar; Bhuiyan, Touhid; Farah, Tanjila Case study 3215
An Approach to Authenticate Magnetic Stripe Bank Card Transactions at POS terminals. Nair, Kishor Krishnan; Helberg, Albert; van der Merwe, Johannes Report 6090
Analysis of Forensic Video in Storage Data Using Tampering Method. Justicia, Amirul Putra; Riadi, Imam Report 4462
Application of RC4 Cryptography Method to Support XML Security on Digital Chain of Custody Data Storage. Widatama, Krisna; Prayudi, Yudi; Sugiantoro, Bambang Report 3271
Cloud Computing Service Level Agreement Issues and Challenges: A Bibliographic Review. Khan, Sohail Razi; Gouveia, Luis Borges Report 10230
Comparison of Attribute Based Access Control (ABAC) Model and Rule Based Access (RBAC) to Digital Evidence Storage (DES). Panende, Moh Fadly; Prayudi, Yudi; Riadi, Imam Report 3882
Data Mining Classification Approaches for Malicious Executable File Detection. Najadat, Hassan; Alhawari, Assem; Al_Rushdan, Huthifh Report 2547
Digital Forensics Workflow as A Mapping Model for People, Evidence, and Process in Digital Investigation. Subektiningsih; Prayudi, Yudi; Riadi, Imam Report 7878
Encryption and Tokenization-Based System for Credit Card Information Security. Iwasokun, Gabriel Babatunde; Omomule, Taiwo Gabriel; Akinyede, Raphael Olufemi Report 5239
Examination of Digital Evidence on Android-based LINE Messenger. Riadi, Imam; Sunardi; Fauzan, Ammar Case study 2685
Identity-Based Encryption Technique with Ranking for Multi-Keywords Search in Cloud (IDERMKS). Turkson, Regina Esi; Liao, Yongjian; Baagyere, Edward Yeallakuor Report 9146
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks. Nyangaresi, Vincent Omollo; Abeka, Silvance O.; Rodgrigues, Anthony Report 8017
Survey and Analysis of Regional Characteristics of Unmanaged Stray IoT devices. Nakazawa, Yuki; Sasaki, Ryoichi; Inomata, Atsuo Report 4058
WhatsApp Messenger Forensic Analysis Based on Android Using Text Mining Method. Marfianto, Anang; Riadi, Imam Report 3894

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters