
International Journal of Electronic Security and Digital Forensics
2022 Vol.14 No.6
Pages | Title and author(s) |
547-564 | A comparative analysis of copy-move forgery detection algorithmsMohassin Ahmad; Farida Khursheed DOI: 10.1504/IJESDF.2022.10043405 |
565-578 | Electronic administrative contract: a comparative studyNoor Issa Al-Hendi DOI: 10.1504/IJESDF.2022.10048444 |
579-593 | Big data analysis and forensicsAsia Othman Aljahdali; Ghalia Alluhaib; Rasha Alqarni; Majdah Alsharef; Amal Alsaqqaf DOI: 10.1504/IJESDF.2022.10044312 |
594-615 | A framework for evaluating cyber forensic toolsSunil Gupta; Pradeep Kumar Arya; Sri Vemuri Dwijesh Sai; Sri Sai Bhargav Nagandla DOI: 10.1504/IJESDF.2023.10046537 |
616-637 | Extracted rule-based technique for anomaly detection in a global networkNureni A. Azeez; Ogunlusi E. Victor; Sanjay Misra; Robertas Damaševičius; Rytis Maskeliunas DOI: 10.1504/IJESDF.2022.10046539 |
638-658 | Detection of injections in API requests using recurrent neural networks and transformersA. Sujan Reddy; Bhawana Rudra DOI: 10.1504/IJESDF.2022.10043818 |