International Journal of Cyber-Security and Digital Forensics (IJCSDF)

A Peer Reviewed, Refereed, Indexed and Leading Journal in Cyber Security and Digital Forensics

Published by The Society of Digital Information and Wireless Communications

20/F, TOWER 5, CHINA HONG KONG CITY, 33 CANTON ROAD, TSIM SHA TSUI, KOWLOON, HONG KONG

Previous Issue (Vol. 8, No. 1), 2019

PDF Icon

ANALYSIS AND EVALUATION DIGITAL FORENSIC INVESTIGATION FRAMEWORK USING ISO 27037:2012

Author/s:  Didik Sudyana, Yudi Prayudi, Bambang Sugiantoro
Pages:  1-14   /   DOI:  http://dx.doi.org/10.17781/P002464
Download IJCSDF PDF vol 8 iss 1
Vol. 8 Issue 1
PDF Icon

Discovering P2P Botnets Behaviors in Skype Application using Machine Learning Approach

Author/s:  Raihana Syahirah Abdullah, Faizal M.A., Anis Farhani
Pages:  15-22   /   DOI:  http://dx.doi.org/10.17781/P002536
PDF Icon

A Behaviour Profiling Based Technique for Network Access Control Systems

Author/s:  Musa Abubakar Muhammad, Aladdin Ayesh
Pages:  23-30   /   DOI:  http://dx.doi.org/10.17781/P002537
PDF Icon

Computer Forensics: A Linux Case Study Applied to Pedophilia Crime Investigation in Brazil

Author/s:  Jeferson dos Santos Almeida, Leonardo de Santana Nascimento, Diógenes Antonio Marques José
Pages:  31-42   /   DOI:  http://dx.doi.org/10.17781/P002543
PDF Icon

Cybercrime and Risks for Cyber Physical Systems

Author/s:  Abel Yeboah-Ofori, Jamal-Deen Abdulai, Ferdinand Katsriku
Pages:  43-57   /   DOI:  http://dx.doi.org/10.17781/P002556
PDF Icon

Analysis of Security Virtual Private Network (VPN) Using OpenVPN

Author/s:  Muhammad Iqbal, Imam Riadi
Pages:  58-65   /   DOI:  http://dx.doi.org/10.17781/P002557
PDF Icon
PDF Icon
PDF Icon

Statistical Process Control Method for Cyber Intrusion Detection (DDoS, U2R, R2L, Probe)

Author/s:  Dimitris Sklavounos, Alexandros Leondakianakos, Aloysius Edoh
Pages:  82-88   /   DOI:  http://dx.doi.org/10.17781/P002560
PDF Icon