International Journal of Cyber-Security and Digital Forensics (IJCSDF)

A Peer Reviewed, Refereed, Indexed and Leading Journal in Cyber Security and Digital Forensics

Published by The Society of Digital Information and Wireless Communications

20/F, TOWER 5, CHINA HONG KONG CITY, 33 CANTON ROAD, TSIM SHA TSUI, KOWLOON, HONG KONG

Coming Issue (Vol. 7, No. 1), 2018

PDF Icon

A Mathematical Model for Resolving Minimum Password Length Controversy

Author/s:  S. Agholor, A. S. Sodiya and D. O. Aborisade
Pages:  1-9   /   DOI:  http://dx.doi.org/10.17781/P002310
PDF Icon

Knowledge Management as a Strategic Asset in Digital Forensic Investigations

Author/s:  Nickson M. Karie, Victor R. Kebande
Pages:  10-20   /   DOI:  http://dx.doi.org/10.17781/P002311
PDF Icon

Cyber Autoimmune Disease When the Virtual Life Imitates the Real Life

Author/s:  RogĂ©rio Winter, Rodrigo Ruiz
Pages:  21-30   /   DOI:  http://dx.doi.org/10.17781/P002318
PDF Icon

Implication of Cyber Warfare on the Financial Sector. An Exploratory Study

Author/s:  Sohail Razi Khan
Pages:  31-37   /   DOI:  http://dx.doi.org/10.17781/P002319
PDF Icon

Empirical Survey on Advances of Network Forensics in the Emerging Networks

Author/s:  A R Jayakrishnan, V. Vasanthi
Pages:  38-46   /   DOI:  http://dx.doi.org/10.17781/P002320
PDF Icon

Critical Analysis of Hash Based Signature Schemes

Author/s:  A. Gagnidze, M. Iavich, N. Inasaridze, G. Iashvili, V.Vyalkova
Pages:  47-55   /   DOI:  http://dx.doi.org/10.17781/P002321
PDF Icon

Improvement the Wireless Network Security by Requiring the News Cryptographic Primitives

Author/s:  Younes ASIMI, Ahmed ASIMI, Zakariae TBATOU, Azidine GUEZZAZ and Yassine SADQI
Pages:  56-62   /   DOI:  http://dx.doi.org/10.17781/P002331
PDF Icon

A Virtual Environment Forensic Tool

Author/s:  Danish K. Chaus, Aayush Pathak, Akshay J. Boramani, Shagufta Rajguru, Rakhi Kalantri
Pages:  63-71   /   DOI:  http://dx.doi.org/10.17781/P002333
PDF Icon

MALWARE ANALYSIS OF BACKDOOR CREATOR : FATRAT

Author/s:  Rakesh Singh Kunwar, Priyanka sharma, K. V. Ravi kumar
Pages:  72-79   /   DOI:  http://dx.doi.org/10.17781/P002362
PDF Icon

Audio Steganography via Cloud Services: Integrity Analysis of Hidden File

Author/s:  Ashar Neyaz, Cihan Varol
Pages:  80-86   /   DOI:  http://dx.doi.org/10.17781/P002368
PDF Icon

Cyber Intelligence and OSINT: Developing Mitigation Techniques Against Cybercrime Threats on Social Media

Author/s:  Abel Yeboah-Ofori, Allan Brimicombe
Pages:  87-98   /   DOI:  http://dx.doi.org/10.17781/P002378