首页 > 最新文献

International Journal of Electronic Security and Digital Forensics最新文献

英文 中文
Using a DNA tape as a key for encrypt images 用DNA磁带作为加密图像的钥匙
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.123868
M. A. F. Al-Husainy, H. A. Al-Sewadi, S. Masadeh
{"title":"Using a DNA tape as a key for encrypt images","authors":"M. A. F. Al-Husainy, H. A. Al-Sewadi, S. Masadeh","doi":"10.1504/ijesdf.2022.123868","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.123868","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"519 1","pages":"373-387"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77181523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Features of the conclusion of a civil transaction on the Internet 互联网民事交易订立的特点
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10042952
S. Tynybekov, Z. Adanbekova, A. B. Omarova, S. Yermukhametova, Gulnura A. Khudaiberdina
{"title":"Features of the conclusion of a civil transaction on the Internet","authors":"S. Tynybekov, Z. Adanbekova, A. B. Omarova, S. Yermukhametova, Gulnura A. Khudaiberdina","doi":"10.1504/ijesdf.2022.10042952","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10042952","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"7 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit card fraud detection using moth-flame earth worm optimisation algorithm-based deep belief neural network 基于蛾焰土蠕虫优化算法的信用卡诈骗检测深度信念神经网络
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10041476
Deepika S, S. S
: Nowadays, credit card fraud actions happen commonly, which results in vast financial losses. Fraudulent transactions can take place in a variety of ways and can be put into various categories. Hence, financial institutions and banks put forward credit card fraud detection applications. To detect fraudulent activities, this paper proposes a credit card fraud detection system. The proposed system uses the database with the credit card transaction information and sends it to the pre-processing. The log transformation is applied over the database for data regulation in the pre-processing step. After, the appropriate features are selected by the information gain criterion, and the selected features are utilised to train the classifier. Here, a novel classifier, namely moth-flame earth worm optimisation-based deep belief network (MF-EWA-based DBN) is proposed for the fraud detection. The weights for the classifier are selected by the newly developed moth-flame earth worm optimisation algorithm (MF-EWA). The proposed classifier carries out the training and detects the fraud transactions in the database. The proposed MF-EWA-based DBN classifier has improved detection performance and outclassed other existing models with 85.89% accuracy.
当前,信用卡诈骗行为屡见不鲜,造成了巨大的经济损失。欺诈性交易可以以多种方式发生,可以分为不同的类别。因此,金融机构和银行纷纷提出信用卡欺诈检测应用。为了检测欺诈行为,本文提出了一种信用卡欺诈检测系统。该系统利用信用卡交易信息数据库,并将其发送到预处理系统。在预处理步骤中,对数据库应用日志转换进行数据调节。然后,根据信息增益准则选择合适的特征,并利用所选特征训练分类器。本文提出了一种新的分类器,即基于蛾焰蚯蚓优化的深度信念网络(MF-EWA-based DBN)用于欺诈检测。采用新开发的蛾-焰蚯蚓优化算法(MF-EWA)选择分类器的权重。该分类器对数据库中的欺诈交易进行训练和检测。本文提出的基于mf - ewa的DBN分类器提高了检测性能,准确率达到85.89%,超过了其他现有模型。
{"title":"Credit card fraud detection using moth-flame earth worm optimisation algorithm-based deep belief neural network","authors":"Deepika S, S. S","doi":"10.1504/ijesdf.2022.10041476","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10041476","url":null,"abstract":": Nowadays, credit card fraud actions happen commonly, which results in vast financial losses. Fraudulent transactions can take place in a variety of ways and can be put into various categories. Hence, financial institutions and banks put forward credit card fraud detection applications. To detect fraudulent activities, this paper proposes a credit card fraud detection system. The proposed system uses the database with the credit card transaction information and sends it to the pre-processing. The log transformation is applied over the database for data regulation in the pre-processing step. After, the appropriate features are selected by the information gain criterion, and the selected features are utilised to train the classifier. Here, a novel classifier, namely moth-flame earth worm optimisation-based deep belief network (MF-EWA-based DBN) is proposed for the fraud detection. The weights for the classifier are selected by the newly developed moth-flame earth worm optimisation algorithm (MF-EWA). The proposed classifier carries out the training and detects the fraud transactions in the database. The proposed MF-EWA-based DBN classifier has improved detection performance and outclassed other existing models with 85.89% accuracy.","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"3 1","pages":"53-75"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82912988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Child Pornography through Cyberspace - A Comparative Analysis of Laws and Criminal Justice Responses in India with USA, UK and Japan. 网络空间中的儿童色情——印度与美国、英国和日本法律和刑事司法反应的比较分析。
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10043944
Paromita Chattoraj, Rupashree Sahoo
{"title":"Child Pornography through Cyberspace - A Comparative Analysis of Laws and Criminal Justice Responses in India with USA, UK and Japan.","authors":"Paromita Chattoraj, Rupashree Sahoo","doi":"10.1504/ijesdf.2022.10043944","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10043944","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer and network security: intrusion detection system using mobile agent 计算机与网络安全:利用移动代理的入侵检测系统
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.123843
Samir Bourekkache, O. Kazar, Ahmed Aloui, Ghazali Hamouda
{"title":"Computer and network security: intrusion detection system using mobile agent","authors":"Samir Bourekkache, O. Kazar, Ahmed Aloui, Ghazali Hamouda","doi":"10.1504/ijesdf.2022.123843","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.123843","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"14 1","pages":"318-340"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big data analysis and forensics 大数据分析和取证
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10044312
A. Aljahdali, Ghalia Alluhaib, Rasha Alqarni, Majdah Alsharef, Amal Alsaqqaf
{"title":"Big data analysis and forensics","authors":"A. Aljahdali, Ghalia Alluhaib, Rasha Alqarni, Majdah Alsharef, Amal Alsaqqaf","doi":"10.1504/ijesdf.2022.10044312","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10044312","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"160 1","pages":"579-593"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80111034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of injections in API requests using recurrent neural networks and transformers 使用递归神经网络和变压器检测API请求中的注入
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.1504/ijesdf.2022.10043818
A. S. Reddy, Bhawana Rudra
{"title":"Detection of injections in API requests using recurrent neural networks and transformers","authors":"A. S. Reddy, Bhawana Rudra","doi":"10.1504/ijesdf.2022.10043818","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10043818","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"13 1","pages":"638-658"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78377077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues 移动自组织网络中路由协议的安全挑战:系统回顾和开放研究问题
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-03-05 DOI: 10.1504/IJESDF.2021.114963
Mitha Rachel Jose, J. Singh
Various targeted attacks are focused on MANET exploiting these vulnerabilities and disrupting their operations. Therefore, network optimisation can be accomplished through the maximal use of resources available and deploying proper security measures. In this study, various MANET protocols namely geographical, topology-based, hybrid, hierarchical, power-aware and multicast routing protocols, were investigated based on performance parameters (routing overhead, caching overhead, and packet delivery ratio) along with the security challenges they face. In addition to this, comparative analysis among various routing protocols and their performances were evaluated. Several topological issues namely high power consumption, low bandwidth, and high error rate, were taken into account.
各种有针对性的攻击集中在利用这些漏洞并破坏其操作的MANET上。因此,可以通过最大限度地利用可用资源和部署适当的安全措施来实现网络优化。在本研究中,基于性能参数(路由开销、缓存开销和数据包传送率)以及它们所面临的安全挑战,研究了各种MANET协议,即地理、基于拓扑、混合、分层、功率感知和多播路由协议。此外,还对各种路由协议进行了比较分析,并对其性能进行了评价。同时考虑了高功耗、低带宽和高错误率等拓扑问题。
{"title":"Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues","authors":"Mitha Rachel Jose, J. Singh","doi":"10.1504/IJESDF.2021.114963","DOIUrl":"https://doi.org/10.1504/IJESDF.2021.114963","url":null,"abstract":"Various targeted attacks are focused on MANET exploiting these vulnerabilities and disrupting their operations. Therefore, network optimisation can be accomplished through the maximal use of resources available and deploying proper security measures. In this study, various MANET protocols namely geographical, topology-based, hybrid, hierarchical, power-aware and multicast routing protocols, were investigated based on performance parameters (routing overhead, caching overhead, and packet delivery ratio) along with the security challenges they face. In addition to this, comparative analysis among various routing protocols and their performances were evaluated. Several topological issues namely high power consumption, low bandwidth, and high error rate, were taken into account.","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"41 1","pages":"268-297"},"PeriodicalIF":0.8,"publicationDate":"2021-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90197611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Technique to Detect Slow Rate DDoS Attack from Private Tor Network 一种检测专用Tor网络慢速DDoS攻击的有效方法
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.1504/ijesdf.2021.10030839
Y. Mane, U. Khot
{"title":"An Efficient Technique to Detect Slow Rate DDoS Attack from Private Tor Network","authors":"Y. Mane, U. Khot","doi":"10.1504/ijesdf.2021.10030839","DOIUrl":"https://doi.org/10.1504/ijesdf.2021.10030839","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"13 1","pages":"1"},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66714264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
International and interstate aspects of ensuring the rights of the suspect and the accused in the proceedings of forensic investigation 确保犯罪嫌疑人和被告在法医调查程序中权利的国际和州际方面
IF 0.8 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.1504/ijesdf.2021.113386
A. Aryn, Sagyngaliy Aidarbayev, A. Sharipova, A. Zhanibekov, A. Otarbayeva
{"title":"International and interstate aspects of ensuring the rights of the suspect and the accused in the proceedings of forensic investigation","authors":"A. Aryn, Sagyngaliy Aidarbayev, A. Sharipova, A. Zhanibekov, A. Otarbayeva","doi":"10.1504/ijesdf.2021.113386","DOIUrl":"https://doi.org/10.1504/ijesdf.2021.113386","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"175 1","pages":"155-179"},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78455483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Electronic Security and Digital Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1