International Journal of Electronic Security and Digital Forensics (IJESDF)

International Journal of Electronic Security and Digital Forensics

2025 Vol.17 No.5


Pages Title and author(s)
563-581DarkExtract: tool for extracting and analysing Tor Browser host-based activities
Ngaira Mandela; Amir Aboubakr Shaker Mahmoud; Animesh Kumar Agrawal; Nilay R. Mistry
DOI: 10.1504/IJESDF.2025.148210
582-592A model for detecting cyber security intrusions using machine learning techniques
Leo John Baptist; Janani Selvam; Divya Midhun Chakkaravarthy
DOI: 10.1504/IJESDF.2025.148217
593-603The shifting landscape: a comprehensive examination of the top five emerging cybersecurity threats
Muhammad Ibrar; Muhammad Fahim Khan; Jing Yu; Hang Li; Wei Zhang; Shoulin Yin; Shahid Karim; Kausar Khan
DOI: 10.1504/IJESDF.2025.148290
604-615Cloud computing's multi-key privacy-preserving deep learning system
A. Mani; M. Shanmuganathan; R. Babitha Lincy; J. Jency Rubia
DOI: 10.1504/IJESDF.2025.148237
616-630Image encryption and decryption using graph theory
Selva Kumar; Saravanakumar Chandrasekaran; Nalini Manogaran; Bhadmavadhi Krishna
DOI: 10.1504/IJESDF.2025.148224
631-645Enhancing network security: a deep learning-based method to detect and diminish attacks
R.E. Franklin Jino; Arockia Mary Paulsamy; Gobinath Shanmugam; Rajesh Kumar Vishwakarma
DOI: 10.1504/IJESDF.2025.148225
646-656Image encryption using artificial intelligence algorithms for secure communication
S. Kumarganesh; D. Jennifer; B. Ramesh; S. Elango; A. Gopalakrishnan
DOI: 10.1504/IJESDF.2025.148231
657-665Improving reliability with wormhole detection for mobile routing to enhance network security
V. Vidya Lakshmi; B. Akash; M. Manesh; A. Praveen; V.G. Rohith
DOI: 10.1504/IJESDF.2025.148233
666-687Application of audio-video data embedding approach to increase imperceptibility and robustness using forensic detection
Sunil K. Moon
DOI: 10.1504/IJESDF.2025.148235