Journal cover image

Browse issues

Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Electronic Security and Digital Forensics

2007 Vol. 1 No. 2


PagesTitle and authors
125-130Report examining the weaknesses in the fight against cyber-crime from within
Aminata Taal
DOI: 10.1504/IJESDF.2007.016862

131-145Detection of e-mail concerning criminal activities using association rule-based decision tree
S. Appavu, R. Rajaram
DOI: 10.1504/IJESDF.2007.016863

146-155A web transaction security scheme based on disposable credit card numbers
Mohammed Assora, James Kadirire, Ayoub Shirvani
DOI: 10.1504/IJESDF.2007.016864

156-168Opcodes as predictor for malware
Daniel Bilar
DOI: 10.1504/IJESDF.2007.016865

169-179E-identification technologies for e-government interoperability in the EU
Elias Pimenidis, Ioannis Savvas
DOI: 10.1504/IJESDF.2007.016866

180-193Exploiting error control in network traffic for robust, high rate covert channels
William K. Geissler, John C. McEachen
DOI: 10.1504/IJESDF.2007.016867

194-205Timing considerations in detecting resource starvation attacks using statistical profiles
Colin Pattinson, Kemal Hajdarevic
DOI: 10.1504/IJESDF.2007.016868

206-217Unauthorised person recognition using gait biometry and information analysis: integration and transparency of security operations in a centralised intelligence environment
Konstantinos Kardaras, Zacharias Kamarianakis, Andrew Chanerley, Dimitris Koutsouris
DOI: 10.1504/IJESDF.2007.016869

218-231Detection and surveillance technologies: privacy-related requirements and protection schemes
Vasilios Zorkadis
DOI: 10.1504/IJESDF.2007.016870