Sample articles

You can read all of these full-text articles free of charge - click Free access

International Journal of Electronic Security and Digital Forensics (IJESDF)

International Journal of Electronic Security and Digital Forensics


Title Author(s) Vol. and Issue nos. Page nos. Full-text article
IoT security using deep learning algorithm: intrusion detection model using LSTMAbitha V.K. Lija; R. Shobana; J. Caroline Misbha; S. ChandrakalaVol.17 No.1/2283-293Free access
The legal authority of the electronic authentication certificate and its role in proving e-commerce transactionsLana Al-Khalaileh; Tareq Al-Billeh; Ali Al-HammouriVol.17 No.1/2267-282Free access
Exploring advanced steganography techniques for secure digital image communication: a comparative analysis and performance evaluationRohit Deval; Nachiket Gupte; Johann Kyle Pinto; Adwaita Raj Modak; Akshat Verma; Anirudh Sharma; S.P. RajaVol.17 No.1/2233-266Free access
Secure system to secure crime data using hybrid: RSA-AES and hybrid: Blowfish-Triple DESRaghav Modi; Ananjay Singh Jammoria; Akshat Pattiwar; Arnav Agrawal; S.P. RajaVol.17 No.1/2194-232Free access
Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defencesPratik S. Patel; Pooja PanchalVol.17 No.1/2183-193Free access
Forensic investigation and analysis of malware in Windows OSFrank Fiadufe; Krishna Modi; Kapil Shukla; Felix O. EtyangVol.17 No.1/2169-182Free access
VLMDALP: design of an efficient VARMA LSTM-based model for identification of DDoS attacks using application-level packet analysisMeghana Solanki; Sangita ChaudhariVol.17 No.1/2149-168Free access
Network security attack classification: leveraging machine learning methods for enhanced detection and defenceIrfan Ali Kandhro; Ali Orangzeb Panhwar; Shafique Ahmed Awan; Raja Sohail Ahmed Larik; Abdul Ahad AbroVol.17 No.1/2138-148Free access
A novel scalable and cost efficient blockchain solution for managing lifetime vaccination records based on patient preferenceNeetu Sharma; Rajesh RohillaVol.17 No.1/2108-137Free access
IoT security: a systematic literature review of feature selection methods for machine learning-based attack classificationJing Li; Mohd Shahizan Othman; Chen Hewan; Lizawati Mi YusufVol.17 No.1/260-107Free access
Blockchain as an indispensable asset for educational institutions: a systematic reviewRabia Nazir; Ahsan Hussain; Syed Zubair Ahmad ShahVol.17 No.1/245-59Free access
An approach towards development of a supervisory control and data acquisition system forensics framework: concerns and challengesRamya Shah; Digvijaysinh RathodVol.17 No.1/230-44Free access
Feature-driven anomalous behaviour detection and incident classification model for ICS in water treatment plantsGabriela Ahmadi-Assalemi; Haider Al-Khateeb; Tanaka Laura Makonese; Vladlena Benson; Samiya Khan; Usman Javed ButtVol.17 No.1/21-29Free access