International Journal of Cyber-Security and Digital Forensics (IJCSDF)

A Peer Reviewed, Refereed, Indexed and Leading Journal in Cyber Security and Digital Forensics

Published by The Society of Digital Information and Wireless Communications

20/F, TOWER 5, CHINA HONG KONG CITY, 33 CANTON ROAD, TSIM SHA TSUI, KOWLOON, HONG KONG

Previous Issue (Vol. 2, No. 1), 2013

PDF Icon

EPSILON2: UTILIZING NETWORK VIRTUALIZATION TO SIMULATE AN INFORMATION SECURITY TESTING ENVIRONMENT

Author/s:  Lin G. De Luna , Patrick Kevin G. Detera, Samuel David F. Guerrero, Hiro R. Mejia, Miguel Alberto N. Gomez
Pages:  1-8
PDF Icon

COMPUTER FORENSICS BETWEEN THE ITALIAN LEGISLATION AND PRAGMATIC QUESTIONS

Author/s:  Gianni Fenu, Fabrizio Solinas
Pages:  9-24
PDF Icon

AUTOMATED SIGNATURE CREATOR FOR A SIGNATURE BASED INTRUSION DETECTION SYSTEM WITH NETWORK ATTACK DETECTION CAPABILITIES (PANCAKES)

Author/s:  Frances Bernadette C. De Ocampo, Trisha Mari L. Del Castillo, Miguel Alberto N. Gomez
Pages:  25-35
PDF Icon
PDF Icon

PROPOSAL AND ITS EVALUATION OF A SHOULDER-SURFING ATTACK RESISTANT AUTHENTICATION METHOD:SECRET TAP WITH DOUBLE SHIFT

Author/s:  Yoshihiro Kita, Fumio Sugai, MiRang Park, Naonobu Okazaki
Pages:  48-55
PDF Icon

A DRM SCHEME USING FILE PHYSICAL INFORMATION

Author/s:  Cheng Qu, Yinyan Yu, Zhi Tang, Xiaoyu Cui
Pages:  56-69
PDF Icon

A PRIVACY-PRESERVING APPROACH FOR COLLECTING EVIDENCE IN FORENSIC INVESTIGATION

Author/s:  Shuhui Hou, Siu-Ming Yiuy, Tetsutaro Ueharaz, Ryoichi Sasakix
Pages:  70-78
PDF Icon

INVESTIGATING THE NUMBER OF USERS AND MONTHS TO MAKE TULUNGAN EFFECTIVE AGAINST SELF-PROMOTING USERS

Author/s:  Alexis V. Pantola, Susan Pancho-Festin, Florante Salvador
Pages:  79-87
PDF Icon

PRODUCT PIRACY PREVENTION: PRODUCT COUNTERFEIT DETECTION WITHOUT SECURITY LABELS

Author/s:  Christian Horn, Matthias Blankenburg, Maximilian Fechteler, Jorg Kruger
Pages:  88-102
PDF Icon