首页 > 最新文献

International Journal of Electronic Security and Digital Forensics最新文献

英文 中文
Using a DNA tape as a key for encrypt images 用DNA磁带作为加密图像的钥匙
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.123868
M. A. F. Al-Husainy, H. A. Al-Sewadi, S. Masadeh
{"title":"Using a DNA tape as a key for encrypt images","authors":"M. A. F. Al-Husainy, H. A. Al-Sewadi, S. Masadeh","doi":"10.1504/ijesdf.2022.123868","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.123868","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"519 1","pages":"373-387"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77181523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Legal framework for external security of the Republic of Kazakhstan 哈萨克斯坦共和国对外安全的法律框架
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/IJESDF.2022.10039097
A. Kassymzhanova, G. Usseinova, D. Baimakhanova, A. Ibrayeva, N. Ibrayev
{"title":"Legal framework for external security of the Republic of Kazakhstan","authors":"A. Kassymzhanova, G. Usseinova, D. Baimakhanova, A. Ibrayeva, N. Ibrayev","doi":"10.1504/IJESDF.2022.10039097","DOIUrl":"https://doi.org/10.1504/IJESDF.2022.10039097","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"85 1","pages":"209-222"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80938401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit card fraud detection using moth-flame earth worm optimisation algorithm-based deep belief neural network 基于蛾焰土蠕虫优化算法的信用卡诈骗检测深度信念神经网络
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10041476
Deepika S, S. S
: Nowadays, credit card fraud actions happen commonly, which results in vast financial losses. Fraudulent transactions can take place in a variety of ways and can be put into various categories. Hence, financial institutions and banks put forward credit card fraud detection applications. To detect fraudulent activities, this paper proposes a credit card fraud detection system. The proposed system uses the database with the credit card transaction information and sends it to the pre-processing. The log transformation is applied over the database for data regulation in the pre-processing step. After, the appropriate features are selected by the information gain criterion, and the selected features are utilised to train the classifier. Here, a novel classifier, namely moth-flame earth worm optimisation-based deep belief network (MF-EWA-based DBN) is proposed for the fraud detection. The weights for the classifier are selected by the newly developed moth-flame earth worm optimisation algorithm (MF-EWA). The proposed classifier carries out the training and detects the fraud transactions in the database. The proposed MF-EWA-based DBN classifier has improved detection performance and outclassed other existing models with 85.89% accuracy.
当前,信用卡诈骗行为屡见不鲜,造成了巨大的经济损失。欺诈性交易可以以多种方式发生,可以分为不同的类别。因此,金融机构和银行纷纷提出信用卡欺诈检测应用。为了检测欺诈行为,本文提出了一种信用卡欺诈检测系统。该系统利用信用卡交易信息数据库,并将其发送到预处理系统。在预处理步骤中,对数据库应用日志转换进行数据调节。然后,根据信息增益准则选择合适的特征,并利用所选特征训练分类器。本文提出了一种新的分类器,即基于蛾焰蚯蚓优化的深度信念网络(MF-EWA-based DBN)用于欺诈检测。采用新开发的蛾-焰蚯蚓优化算法(MF-EWA)选择分类器的权重。该分类器对数据库中的欺诈交易进行训练和检测。本文提出的基于mf - ewa的DBN分类器提高了检测性能,准确率达到85.89%,超过了其他现有模型。
{"title":"Credit card fraud detection using moth-flame earth worm optimisation algorithm-based deep belief neural network","authors":"Deepika S, S. S","doi":"10.1504/ijesdf.2022.10041476","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10041476","url":null,"abstract":": Nowadays, credit card fraud actions happen commonly, which results in vast financial losses. Fraudulent transactions can take place in a variety of ways and can be put into various categories. Hence, financial institutions and banks put forward credit card fraud detection applications. To detect fraudulent activities, this paper proposes a credit card fraud detection system. The proposed system uses the database with the credit card transaction information and sends it to the pre-processing. The log transformation is applied over the database for data regulation in the pre-processing step. After, the appropriate features are selected by the information gain criterion, and the selected features are utilised to train the classifier. Here, a novel classifier, namely moth-flame earth worm optimisation-based deep belief network (MF-EWA-based DBN) is proposed for the fraud detection. The weights for the classifier are selected by the newly developed moth-flame earth worm optimisation algorithm (MF-EWA). The proposed classifier carries out the training and detects the fraud transactions in the database. The proposed MF-EWA-based DBN classifier has improved detection performance and outclassed other existing models with 85.89% accuracy.","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"3 1","pages":"53-75"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82912988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Child Pornography through Cyberspace - A Comparative Analysis of Laws and Criminal Justice Responses in India with USA, UK and Japan. 网络空间中的儿童色情——印度与美国、英国和日本法律和刑事司法反应的比较分析。
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10043944
Paromita Chattoraj, Rupashree Sahoo
{"title":"Child Pornography through Cyberspace - A Comparative Analysis of Laws and Criminal Justice Responses in India with USA, UK and Japan.","authors":"Paromita Chattoraj, Rupashree Sahoo","doi":"10.1504/ijesdf.2022.10043944","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10043944","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer and network security: intrusion detection system using mobile agent 计算机与网络安全:利用移动代理的入侵检测系统
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.123843
Samir Bourekkache, O. Kazar, Ahmed Aloui, Ghazali Hamouda
{"title":"Computer and network security: intrusion detection system using mobile agent","authors":"Samir Bourekkache, O. Kazar, Ahmed Aloui, Ghazali Hamouda","doi":"10.1504/ijesdf.2022.123843","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.123843","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"14 1","pages":"318-340"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big data analysis and forensics 大数据分析和取证
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10044312
A. Aljahdali, Ghalia Alluhaib, Rasha Alqarni, Majdah Alsharef, Amal Alsaqqaf
{"title":"Big data analysis and forensics","authors":"A. Aljahdali, Ghalia Alluhaib, Rasha Alqarni, Majdah Alsharef, Amal Alsaqqaf","doi":"10.1504/ijesdf.2022.10044312","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10044312","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"160 1","pages":"579-593"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80111034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of injections in API requests using recurrent neural networks and transformers 使用递归神经网络和变压器检测API请求中的注入
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10043818
A. S. Reddy, Bhawana Rudra
{"title":"Detection of injections in API requests using recurrent neural networks and transformers","authors":"A. S. Reddy, Bhawana Rudra","doi":"10.1504/ijesdf.2022.10043818","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10043818","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"13 1","pages":"638-658"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78377077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues 移动自组织网络中路由协议的安全挑战:系统回顾和开放研究问题
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-03-05 DOI: 10.1504/IJESDF.2021.114963
Mitha Rachel Jose, J. Singh
Various targeted attacks are focused on MANET exploiting these vulnerabilities and disrupting their operations. Therefore, network optimisation can be accomplished through the maximal use of resources available and deploying proper security measures. In this study, various MANET protocols namely geographical, topology-based, hybrid, hierarchical, power-aware and multicast routing protocols, were investigated based on performance parameters (routing overhead, caching overhead, and packet delivery ratio) along with the security challenges they face. In addition to this, comparative analysis among various routing protocols and their performances were evaluated. Several topological issues namely high power consumption, low bandwidth, and high error rate, were taken into account.
各种有针对性的攻击集中在利用这些漏洞并破坏其操作的MANET上。因此,可以通过最大限度地利用可用资源和部署适当的安全措施来实现网络优化。在本研究中,基于性能参数(路由开销、缓存开销和数据包传送率)以及它们所面临的安全挑战,研究了各种MANET协议,即地理、基于拓扑、混合、分层、功率感知和多播路由协议。此外,还对各种路由协议进行了比较分析,并对其性能进行了评价。同时考虑了高功耗、低带宽和高错误率等拓扑问题。
{"title":"Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues","authors":"Mitha Rachel Jose, J. Singh","doi":"10.1504/IJESDF.2021.114963","DOIUrl":"https://doi.org/10.1504/IJESDF.2021.114963","url":null,"abstract":"Various targeted attacks are focused on MANET exploiting these vulnerabilities and disrupting their operations. Therefore, network optimisation can be accomplished through the maximal use of resources available and deploying proper security measures. In this study, various MANET protocols namely geographical, topology-based, hybrid, hierarchical, power-aware and multicast routing protocols, were investigated based on performance parameters (routing overhead, caching overhead, and packet delivery ratio) along with the security challenges they face. In addition to this, comparative analysis among various routing protocols and their performances were evaluated. Several topological issues namely high power consumption, low bandwidth, and high error rate, were taken into account.","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"41 1","pages":"268-297"},"PeriodicalIF":0.8,"publicationDate":"2021-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90197611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital forensics in private Seafile cloud storage from both client and server side 客户端和服务器端的私有Seafile云存储中的数字取证
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.1504/ijesdf.2021.10031878
Asgarali Bouyer, Mojtaba Zirak
{"title":"Digital forensics in private Seafile cloud storage from both client and server side","authors":"Asgarali Bouyer, Mojtaba Zirak","doi":"10.1504/ijesdf.2021.10031878","DOIUrl":"https://doi.org/10.1504/ijesdf.2021.10031878","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"42 1","pages":"233-267"},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90944906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forensic analysis and data recovery from water-submerged hard drives 法医分析和水浸硬盘数据恢复
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.1504/ijesdf.2021.10034240
Alicia Francois, Alastair Nisbet
{"title":"Forensic analysis and data recovery from water-submerged hard drives","authors":"Alicia Francois, Alastair Nisbet","doi":"10.1504/ijesdf.2021.10034240","DOIUrl":"https://doi.org/10.1504/ijesdf.2021.10034240","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"95 1","pages":"219-231"},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88701338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Electronic Security and Digital Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1