International Journal of Cyber-Security and Digital Forensics (IJCSDF)

A Peer Reviewed, Refereed, Indexed and Leading Journal in Cyber Security and Digital Forensics

Published by The Society of Digital Information and Wireless Communications


Previous Issue (Vol. 7, No. 3), 2018

PDF Icon

Survey and Analysis of Regional Characteristics of Unmanaged Stray IoT devices

Author/s:  Yuki Nakazawa , Ryoichi Sasaki, Atsuo Inomata
Pages:  200-208   /   DOI:
Download IJCSDF PDF vol 7 iss 3
Vol. 7 Issue 3
PDF Icon

Cloud Computing Service Level Agreement Issues and Challenges: A Bibliographic Review

Author/s:  Sohail Razi Khan , Luis Borges Gouveia
Pages:  209-229   /   DOI:
PDF Icon

Application of RC4 Cryptography Method to Support XML Security on Digital Chain of Custody Data Storage

Author/s:  Krisna Widatama, Yudi Prayudi, Bambang Sugiantoro
Pages:  230-237   /   DOI:
PDF Icon

Data Mining Classification Approaches for Malicious Executable File Detection

Author/s:  Hassan Najadat, Assem Alhawari, Huthifh Al_Rushdan
Pages:  238-242   /   DOI:
PDF Icon

A Study of the Effects of Heartbleed Vulnerability in Bangladesh

Author/s:  Moniruz Zaman, Delwar Alam, Touhid Bhuiyan Tanjila Farah
Pages:  243-247   /   DOI:
PDF Icon

An Approach to Authenticate Magnetic Stripe Bank Card Transactions at POS terminals

Author/s:  Kishor Krishnan Nair, Albert Helberg, Johannes van der Merwe
Pages:  248-255   /   DOI:
PDF Icon

Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks

Author/s:  Vincent Omollo Nyangaresi, Silvance O. Abeka and Anthony Rodgrigues
Pages:  256-274   /   DOI:
PDF Icon

Comparison of Attribute Based Access Control (ABAC) Model and Rule Based Access (RBAC) to Digital Evidence Storage (DES)

Author/s:  Moh Fadly Panende , Yudi Prayudi, Imam Riadi
Pages:  275-282   /   DOI:
PDF Icon

Encryption and Tokenization-Based System for Credit Card Information Security

Author/s:  Gabriel Babatunde Iwasokun, Taiwo Gabriel Omomule, Raphael Olufemi Akinyede
Pages:  283-293   /   DOI:
PDF Icon

Digital Forensics Workflow as A Mapping Model for People, Evidence, and Process in Digital Investigation

Author/s:  Subekti Ningsih, Yudi Prayudi, Imam Riadi
Pages:  294-304   /   DOI:
PDF Icon

WhatsApp Messenger Forensic Analysis Based on Android Using Text Mining Method

Author/s:  Anang Marfianto, Imam Riadi
Pages:  319-327   /   DOI:
PDF Icon

Analysis of Forensic Video in Storage Data Using Tampering Method

Author/s:  Amirul Putra Justicia, Imam Riadi
Pages:  328-335   /   DOI:
PDF Icon

Examination of Digital Evidence on Android-based LINE Messenger

Author/s:  Imam Riadi, Sunardi, Ammar Fauzan
Pages:  336-343   /   DOI:
PDF Icon

Identity-Based Encryption Technique with Ranking for Multi-Keywords Search in Cloud (IDERMKS)

Author/s:  Regina Esi Turkson, Yongjian Liao, Edward Yeallakuor
Pages:  305-316   /   DOI: