International Journal of Electronic Security and Digital Forensics
2022 Vol.14 No.6
Pages | Title and author(s) |
547-564 | A comparative analysis of copy-move forgery detection algorithmsMohassin Ahmad; Farida Khursheed DOI: 10.1504/IJESDF.2022.126447 |
565-578 | Electronic administrative contract: a comparative studyNoor Issa Al-Hendi DOI: 10.1504/IJESDF.2022.126482 |
579-593 | Big data analysis and forensicsAsia Othman Aljahdali; Ghalia Alluhaib; Rasha Alqarni; Majdah Alsharef; Amal Alsaqqaf DOI: 10.1504/IJESDF.2022.126454 |
594-615 | A framework for evaluating cyber forensic toolsSunil Gupta; Pradeep Kumar Arya; Sri Vemuri Dwijesh Sai; Sri Sai Bhargav Nagandla DOI: 10.1504/IJESDF.2022.126459 |
616-637 | Extracted rule-based technique for anomaly detection in a global networkNureni A. Azeez; Ogunlusi E. Victor; Sanjay Misra; Robertas Damaševičius; Rytis Maskeliunas DOI: 10.1504/IJESDF.2022.126460 |
638-658 | Detection of injections in API requests using recurrent neural networks and transformersA. Sujan Reddy; Bhawana Rudra DOI: 10.1504/IJESDF.2022.126451 |