Home
SDIWC
Digital Library
IJNCAA
IJDIWC
IJEETDM
Contact Us
ISSN 2305-0012 (online)
International Journal of Cyber-Security and Digital Forensics (IJCSDF)
A Peer Reviewed, Refereed, Indexed and Leading Journal in Cyber Security and Digital Forensics
Published by The Society of Digital Information and Wireless Communications
20/F, TOWER 5, CHINA HONG KONG CITY, 33 CANTON ROAD, TSIM SHA TSUI, KOWLOON, HONG KONG
About this Journal
Editorial Board
Aims & Scope
Indexing
Impact Factor
Paper Review System
Previous Issue (Vol. 9, No. 3)
Current Issue (Vol. 9, No. 4)
Coming Issue (Vol. 10, No. 1)
Submit a Manuscript
Paper Archive
Search for Papers
Become a Reviewer
Code of Ethics
Author Guidelines
Contact Information
Publication Info
SDIWC
Previous Issue (Vol. 1, No. 3), 2012
THE RIGHT TO CONSENT AND CONTROL PERSONAL INFORMATION PROCESSING IN CYBERSPACE
Author/s: Thilla Rajaretnam
Pages: 232-240
A NEW SHIFTCOLUMN TRANSFORMATION: AN ENHANCEMENT OF RIJNDAEL KEY SCHEDULING
Author/s: Salasiah Sulaiman, Zaiton Muda, Julia Juremi, Ramlan Mahmod, Sharifah Md. Yasin
Pages: 160-166
SOPHISTICATION TECHNIQUES OF FOURTH GENERATIONS IN NEOTERIC MOBILE LTE AND LTE-ADVANCED
Author/s: A. Z. Yonis, M. F. L. Abdullah
Pages: 167-176
EFFICIENT FOREGROUND EXTRACTION BASED ON OPTICAL FLOW AND SMED FOR ROAD TRAFFIC ANALYSIS
Author/s: K SuganyaDevi, N Malmurugan, R Sivakumar
Pages: 177-182
ENHANCING ADVANCED ENCRYPTION STANDARD S-BOX GENERATION BASED ON ROUND KEY
Author/s: Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman, Jazrin Ramli
Pages: 183-188
RUNTIME MONITORING TECHNIQUE TO HANDLE TAUTOLOGY BASED SQL INJECTION ATTACKS
Author/s: Ramya Dharam, Sajjan G. Shiva
Pages: 189-203
MITIGATING MAN-IN-THE-BROWSER ATTACKS WITH HARDWARE-BASED AUTHENTICATION SCHEME
Author/s: Fazli Bin Mat Nor, Kamarularifin Abd Jalil, Jamalul-lail Ab Manan
Pages: 204-210
SECURITY MEASUREMENT BASED ON GQM TO IMPROVE APPLICATION SECURITY DURING REQUIREMENTS STAGE
Author/s: Ala A. Abdulrazeg, Norita Md Norwawi, Nurlida Basir
Pages: 211-220
AMALGAMATION OF CYCLIC BIT OPERATION IN SD-EI IMAGE ENCRYPTION METHOD: AN ADVANCED VERSION OF SD-EI METHOD: SD-EI VER-2
Author/s: Somdip Dey
Pages: 221-225
DATA LEAK, CRITICAL INFORMATION INFRASTRUCTURE AND THE LEGAL OPTIONS: WHAT DOES WIKILEAKS TEACH US?
Author/s: Ida Madieha Abdul Ghani Azmi , Sonny Zulhuda, Sigit Puspito Wigati Jarot
Pages: 226-231
THE PROBLEM TO CONSENT TO THE COLLECTION, USE, AND DISCLOSURE OF PERSONAL INFORMATION IN CYBERSPACE
Author/s: Thilla Rajaretnam
Pages: 241-247
TOWARDS QUANTITATIVE MEASURES OF INFORMATION SECURITY: A CLOUD COMPUTING CASE STUDY
Author/s: Mouna Jouini, Anis Ben Aissa, Latifa Ben Arfa Rabai, Ali Mili
Pages: 248-262