International Journal of Cyber-Security and Digital Forensics (IJCSDF)

A Peer Reviewed, Refereed, Indexed and Leading Journal in Cyber Security and Digital Forensics

Published by The Society of Digital Information and Wireless Communications

20/F, TOWER 5, CHINA HONG KONG CITY, 33 CANTON ROAD, TSIM SHA TSUI, KOWLOON, HONG KONG

Current Issue (Vol. 7, No. 4), 2018

PDF Icon

Development and Evaluation of Intelligent Network Forensic System LIFT Using Bayesian Network for Targeted Attack Detection and Prevention

Author/s:  Ryoichi Sasaki, Hiroshi Yamaki, Yoshio Kakizaki, Kazuki Shimazaki, Masato Terada, Tetsutaro Uehara
Pages:  344-353   /   DOI:  http://dx.doi.org/10.17781/P002473
Download IJCSDF PDF vol 7 iss 4
Vol. 7 Issue 4
PDF Icon

A UML-Based Approach for Analysing Potential Digital Forensic Evidence

Author/s:  Victor R. Kebande, Nickson M. Karie
Pages:  354-362   /   DOI:  http://dx.doi.org/10.17781/P002474
PDF Icon

Using Multiple Profiles to Protect Privacy in Web-Based Social Networks

Author/s:  Lila Ghemri, Sabrina Shahnaj, Emma Hamilton
Pages:  363-372   /   DOI:  http://dx.doi.org/10.17781/P002475
PDF Icon

Analysis of Secure Hash Algorithm (SHA) 512 for Encryption Process on Web Based Application

Author/s:  Meiliana Sumagita, Imam Riadi
Pages:  373-381   /   DOI:  http://dx.doi.org/10.17781/P002476
PDF Icon

Network Forensics for Detecting Flooding Attack on Internet of Things (IoT) Device

Author/s:  Randi Rizal, Imam Riadi, Yudi Prayudi
Pages:  382-390   /   DOI:  http://dx.doi.org/10.17781/P002477
PDF Icon

Critical Thinking Skills and Best Practices for Cyber Security

Author/s:  Srinivas Nowduri
Pages:  391-409   /   DOI:  http://dx.doi.org/10.17781/P002479
PDF Icon

Forensic Investigation on Whatsapp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2

Author/s:  Bery Actoriano, Imam Riadi
Pages:  410-419   /   DOI:  http://dx.doi.org/10.17781/P002480
PDF Icon

Cryptocurrency and the Blockchain: A Discussion of Forensic Needs

Author/s:  Douglas A. Orr, Drew M. Lancaster
Pages:  420-435   /   DOI:  http://dx.doi.org/10.17781/P002494
PDF Icon

Network Forensics for Detecting SQL Injection Attacks Using NIST Method

Author/s:  Arif Roid Caesarano, Imam Riadi
Pages:  436-443   /   DOI:  http://dx.doi.org/10.17781/P002496
PDF Icon

Survey on Intrusion Detection System Types

Author/s:  Suad Mohammed Othman, Nabeel T.Alsohybe, Fadl Mutaher Ba-Alwi, Ammar Thabit Zahary
Pages:  444-462   /   DOI:  http://dx.doi.org/10.17781/P002525
PDF Icon

Privacy protection of Users’ Data in Social Network Systems based on Homomorphic Cryptography Techniques

Author/s:  Kosmas Kapis, Maduhu Mshangi
Pages:  463-479   /   DOI:  http://dx.doi.org/10.17781/P002533
PDF Icon

A Peer Pressure Method for Helping End-Users Generate Strong Passwords

Author/s:  S. Agholor, I. O. Akinyemi
Pages:  480-487   /   DOI:  http://dx.doi.org/10.17781/P002534