International Journal of Cyber-Security and Digital Forensics (IJCSDF)

A Peer Reviewed, Refereed, Indexed and Leading Journal in Cyber Security and Digital Forensics

Published by The Society of Digital Information and Wireless Communications

20/F, TOWER 5, CHINA HONG KONG CITY, 33 CANTON ROAD, TSIM SHA TSUI, KOWLOON, HONG KONG

Previous Issue (Vol. 1, No. 3), 2012

PDF Icon
PDF Icon

A NEW SHIFTCOLUMN TRANSFORMATION: AN ENHANCEMENT OF RIJNDAEL KEY SCHEDULING

Author/s:  Salasiah Sulaiman, Zaiton Muda, Julia Juremi, Ramlan Mahmod, Sharifah Md. Yasin
Pages:  160-166
PDF Icon

SOPHISTICATION TECHNIQUES OF FOURTH GENERATIONS IN NEOTERIC MOBILE LTE AND LTE-ADVANCED

Author/s:  A. Z. Yonis, M. F. L. Abdullah
Pages:  167-176
PDF Icon

EFFICIENT FOREGROUND EXTRACTION BASED ON OPTICAL FLOW AND SMED FOR ROAD TRAFFIC ANALYSIS

Author/s:  K SuganyaDevi, N Malmurugan, R Sivakumar
Pages:  177-182
PDF Icon

ENHANCING ADVANCED ENCRYPTION STANDARD S-BOX GENERATION BASED ON ROUND KEY

Author/s:  Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman, Jazrin Ramli
Pages:  183-188
PDF Icon

RUNTIME MONITORING TECHNIQUE TO HANDLE TAUTOLOGY BASED SQL INJECTION ATTACKS

Author/s:  Ramya Dharam, Sajjan G. Shiva
Pages:  189-203
PDF Icon

MITIGATING MAN-IN-THE-BROWSER ATTACKS WITH HARDWARE-BASED AUTHENTICATION SCHEME

Author/s:   Fazli Bin Mat Nor, Kamarularifin Abd Jalil, Jamalul-lail Ab Manan
Pages:  204-210
PDF Icon

SECURITY MEASUREMENT BASED ON GQM TO IMPROVE APPLICATION SECURITY DURING REQUIREMENTS STAGE

Author/s:  Ala A. Abdulrazeg, Norita Md Norwawi, Nurlida Basir
Pages:  211-220
PDF Icon
PDF Icon

DATA LEAK, CRITICAL INFORMATION INFRASTRUCTURE AND THE LEGAL OPTIONS: WHAT DOES WIKILEAKS TEACH US?

Author/s:  Ida Madieha Abdul Ghani Azmi , Sonny Zulhuda, Sigit Puspito Wigati Jarot
Pages:  226-231
PDF Icon
PDF Icon

TOWARDS QUANTITATIVE MEASURES OF INFORMATION SECURITY: A CLOUD COMPUTING CASE STUDY

Author/s:  Mouna Jouini, Anis Ben Aissa, Latifa Ben Arfa Rabai, Ali Mili
Pages:  248-262