Sample articles
You can read all of these full-text articles free of charge - click ![]()

International Journal of Electronic Security and Digital Forensics
| Title | Author(s) | Vol. and Issue nos. | Page nos. | Full-text article |
| Security in database management system using machine learning | M. Deepa; J. Dhilipan | Vol.16 No.1 | 124-133 | |
| Data hiding using video steganography | C. Ravichandran; Ashok Vajravelu; Sankarsan Panda; Sheshang Dipakkumar Degadwala | Vol.16 No.1 | 112-123 | |
| Image encryption based on 3D Arnold and elementary cellular automata method | Rui Yang; Lijuan Feng; Jiangjiang Li | Vol.16 No.1 | 97-111 | |
| Analysis of smart grid-based intrusion detection system through machine learning methods | D. Ravikumar; K. Sasikala; R.S. Vijayashanthi; S. Narasimha Prasad | Vol.16 No.1 | 84-96 | |
| An original data encryption technique for communication networks | A. Rajasekar; A. Karunakaran; C. Sivakumaran; Sheshang Dipakkumar Degadwala | Vol.16 No.1 | 73-83 | |
| Formulation of a two-level electronic security and protection system for malls | T. Thirumurugan; Leena Bojaraj; R. Lavanya; T.J. Nagalakshmi | Vol.16 No.1 | 63-72 | |
| Internet of things-based virtual private social networks on a text messaging strategy on mobile platforms | Alagappan Annamalai; Ramesh Chandra Poonia; Suresh Shanmugasundaram | Vol.16 No.1 | 40-62 | |
| Security of internet of things based on cryptographic algorithm | Sonam Mittal; Soni Singh; D. Balakumaran; K. Hemalatha | Vol.16 No.1 | 28-39 | |
| Legal mechanism for regulating responsibilities in the information sphere | Aigerim Issakhankyzy; Gulnar A. Alibayeva; Ainur A. Sabitova; Serik K. Zhetpisov; Botakoz S. Shansharbayeva | Vol.16 No.1 | 14-27 | |
| Essence, concept, and types of national legislation in the field of information technology | Sergey Manin; Salahiden Sabikenov; Yelena Manina | Vol.16 No.1 | 1-13 |