
International Journal of Electronic Security and Digital Forensics
2014 Vol.6 No.1
Intelligence Management to Combat Cybercrime
Pages | Title and author(s) |
1-17 | Towards a model for the integration of knowledge management in law enforcement agenciesBen Brewster; Babak Akhgar; Andrew Staniforth; David Waddington; Simon Andrews; Sarah Johnson Mitchell; Kayleigh Johnson DOI: 10.1504/IJESDF.2014.060169 |
18-24 | Enrolment time as a requirement for biometric fingerprint recognitionVítor J. Sá; Sérgio T. Magalhães; Henrique D. Santos DOI: 10.1504/IJESDF.2014.060172 |
25-37 | Anomaly detection using fuzzy association rulesM. Dolores Ruiz; Maria J. Martin-Bautista; Daniel Sánchez; Maria-Amparo Vila; Miguel Delgado DOI: 10.1504/IJESDF.2014.060171 |
38-51 | Security challenges in the distributed cloud computingIkechukwu Nwobodo; Hossein Jahankhani; Aloysius Edoh DOI: 10.1504/IJESDF.2014.060168 |
52-61 | Secure cloud-based biometric authentication utilising smart devices for electronic transactionsBobby L. Tait DOI: 10.1504/IJESDF.2014.060170 |
62-80 | New tackle to catch a phisherBrad Wardman; Jason Britt; Gary Warner DOI: 10.1504/IJESDF.2014.060178 |