International Journal of Electronic Security and Digital Forensics (IJESDF)

International Journal of Electronic Security and Digital Forensics

2025 Vol.17 No.1/2

Special Issue on: Information Security in the Industry 5.0 Era

Guest Editors: Dr. Sina Pournouri, Dr. Ebenezer Laryea and Prof. Amin Hosseinian-Far


Pages Title and author(s)
1-29Feature-driven anomalous behaviour detection and incident classification model for ICS in water treatment plants
Gabriela Ahmadi-Assalemi; Haider Al-Khateeb; Tanaka Laura Makonese; Vladlena Benson; Samiya Khan; Usman Javed Butt
DOI: 10.1504/IJESDF.2025.143470
30-44An approach towards development of a supervisory control and data acquisition system forensics framework: concerns and challenges
Ramya Shah; Digvijaysinh Rathod
DOI: 10.1504/IJESDF.2025.143474
45-59Blockchain as an indispensable asset for educational institutions: a systematic review
Rabia Nazir; Ahsan Hussain; Syed Zubair Ahmad Shah
DOI: 10.1504/IJESDF.2025.143473
60-107IoT security: a systematic literature review of feature selection methods for machine learning-based attack classification
Jing Li; Mohd Shahizan Othman; Chen Hewan; Lizawati Mi Yusuf
DOI: 10.1504/IJESDF.2025.143475
108-137A novel scalable and cost efficient blockchain solution for managing lifetime vaccination records based on patient preference
Neetu Sharma; Rajesh Rohilla
DOI: 10.1504/IJESDF.2025.143480
138-148Network security attack classification: leveraging machine learning methods for enhanced detection and defence
Irfan Ali Kandhro; Ali Orangzeb Panhwar; Shafique Ahmed Awan; Raja Sohail Ahmed Larik; Abdul Ahad Abro
DOI: 10.1504/IJESDF.2025.143478
149-168VLMDALP: design of an efficient VARMA LSTM-based model for identification of DDoS attacks using application-level packet analysis
Meghana Solanki; Sangita Chaudhari
DOI: 10.1504/IJESDF.2025.143476
169-182Forensic investigation and analysis of malware in Windows OS
Frank Fiadufe; Krishna Modi; Kapil Shukla; Felix O. Etyang
DOI: 10.1504/IJESDF.2025.143477
183-193Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defences
Pratik S. Patel; Pooja Panchal
DOI: 10.1504/IJESDF.2025.143481

Additional Papers

194-232Secure system to secure crime data using hybrid: RSA-AES and hybrid: Blowfish-Triple DES
Raghav Modi; Ananjay Singh Jammoria; Akshat Pattiwar; Arnav Agrawal; S.P. Raja
DOI: 10.1504/IJESDF.2025.143472
233-266Exploring advanced steganography techniques for secure digital image communication: a comparative analysis and performance evaluation
Rohit Deval; Nachiket Gupte; Johann Kyle Pinto; Adwaita Raj Modak; Akshat Verma; Anirudh Sharma; S.P. Raja
DOI: 10.1504/IJESDF.2025.143471
267-282The legal authority of the electronic authentication certificate and its role in proving e-commerce transactions
Lana Al-Khalaileh; Tareq Al-Billeh; Ali Al-Hammouri
DOI: 10.1504/IJESDF.2025.143469
283-293IoT security using deep learning algorithm: intrusion detection model using LSTM
Abitha V.K. Lija; R. Shobana; J. Caroline Misbha; S. Chandrakala
DOI: 10.1504/IJESDF.2025.143479