International Journal of Cyber-Security and Digital Forensics (IJCSDF)

A Peer Reviewed, Refereed, Indexed and Leading Journal in Cyber Security and Digital Forensics

Published by The Society of Digital Information and Wireless Communications

20/F, TOWER 5, CHINA HONG KONG CITY, 33 CANTON ROAD, TSIM SHA TSUI, KOWLOON, HONG KONG

Coming Issue (Vol. 8, No. 1), 2019

PDF Icon

ANALYSIS AND EVALUATION DIGITAL FORENSIC INVESTIGATION FRAMEWORK USING ISO 27037:2012

Author/s:  Didik Sudyana, Yudi Prayudi, Bambang Sugiantoro
Pages:  1-14   /   DOI:  http://dx.doi.org/10.17781/P002464
PDF Icon

Discovering P2P Botnets Behaviors in Skype Application using Machine Learning Approach

Author/s:  Raihana Syahirah Abdullah, Faizal M.A., Anis Farhani
Pages:  15-22   /   DOI:  http://dx.doi.org/10.17781/P002536
PDF Icon

A Behaviour Profiling Based Technique for Network Access Control Systems

Author/s:  Musa Abubakar Muhammad, Aladdin Ayesh
Pages:  23-30   /   DOI:  http://dx.doi.org/10.17781/P002537
PDF Icon

Computer Forensics: A Linux Case Study Applied to Pedophilia Crime Investigation in Brazil

Author/s:  Jeferson dos Santos Almeida, Leonardo de Santana Nascimento, Diógenes Antonio Marques José
Pages:  31-42   /   DOI:  http://dx.doi.org/10.17781/P002543
PDF Icon

Cybercrime and Risks for Cyber Physical Systems

Author/s:  Abel Yeboah-Ofori, Jamal-Deen Abdulai, Ferdinand Katsriku
Pages:  43-57   /   DOI:  http://dx.doi.org/10.17781/P002556
PDF Icon

Analysis of Security Virtual Private Network (VPN) Using OpenVPN

Author/s:  Muhammad Iqbal, Imam Riadi
Pages:  58-65   /   DOI:  http://dx.doi.org/10.17781/P002557
PDF Icon

Network Forensics Analysis of Man in the Middle Attack Using Live Forensics Method

Author/s:  Dedy Saputra, Imam Riadi
Pages:  66-73   /   DOI:  http://dx.doi.org/10.17781/P002558
PDF Icon

Forensics Analysis of Router On Computer Networks Using Live Forensics Method

Author/s:  Nita Hildayanti, Imam Riadi
Pages:  74-81   /   DOI:  http://dx.doi.org/10.17781/P002559
PDF Icon

Statistical Process Control Method for Cyber Intrusion Detection (DDoS, U2R, R2L, Probe)

Author/s:  Dimitris Sklavounos, Alexandros Leondakianakos, Aloysius Edoh
Pages:  82-88   /   DOI:  http://dx.doi.org/10.17781/P002560
PDF Icon

Forensic Analysis of Android-based WhatsApp Messenger Against Fraud Crime Using The National Institute of Standard and Technology Framework

Author/s:  Helmy Trisnasenjaya, Imam Riadi
Pages:  89-97   /   DOI:  http://dx.doi.org/10.17781/P002567