Home
SDIWC
Digital Library
IJNCAA
IJDIWC
IJEETDM
Contact Us
ISSN 2305-0012 (online)
International Journal of Cyber-Security and Digital Forensics (IJCSDF)
A Peer Reviewed, Refereed, Indexed and Leading Journal in Cyber Security and Digital Forensics
Published by The Society of Digital Information and Wireless Communications
20/F, TOWER 5, CHINA HONG KONG CITY, 33 CANTON ROAD, TSIM SHA TSUI, KOWLOON, HONG KONG
About this Journal
Editorial Board
Aims & Scope
Indexing
Impact Factor
Paper Review System
Previous Issue (Vol. 9, No. 3)
Current Issue (Vol. 9, No. 4)
Coming Issue (Vol. 10, No. 1)
Submit a Manuscript
Paper Archive
Search for Papers
Become a Reviewer
Code of Ethics
Author Guidelines
Contact Information
Publication Info
SDIWC
Previous Issue (Vol. 8, No. 4), 2019
A Comparative Study of the Performance of Open-Source and Proprietary Disk Forensic Tools in Recovery of Anti-Forensically Doctored Data
Author/s: Sonu Mandecha, Kumarshankar Raychaudhuri, M. George Christopher
Pages: 250-261
/
DOI:
http://dx.doi.org/10.17781/P002624
Vol. 8 Issue 4
A Digital Forensic Approach for Examination and Analysis of Frozen Hard Disk of Virtual Machine
Author/s: M. George Christopher, Kumarshankar Raychaudhuri
Pages: 262-272
/
DOI:
http://dx.doi.org/10.17781/P002625
Network Attack Detection Method Based on Their Time - Frequency Decomposition
Author/s: Dimitris Sklavounos, Spiros Chountasis, Aloysius Edoh
Pages: 273-278
/
DOI:
http://dx.doi.org/10.17781/P002630
Recognizing Illegitimate Access Points Based on Static Features: a Case Study in a Campus Wifi Network
Author/s: Franklin Tchakounte, Michael Nakoe, Blaise Omer Yenke, Kalum Priyanath Udagepola
Pages: 279-291
/
DOI:
http://dx.doi.org/10.17781/P002632
Forensic Analysis in Cloud Storage with Live Forensics in Windows (Adrive Case Study)
Author/s: Tri Rochmadi, Dadang Heksaputra
Pages: 292-297
/
DOI:
http://dx.doi.org/10.17781/P002637
A Study on Metasploit Payloads
Author/s: Afrozulla Khan Z, Balajinarayan B
Pages: 298-307
/
DOI:
http://dx.doi.org/10.17781/P002640