International Journal of Cyber-Security and Digital Forensics (IJCSDF)

A Peer Reviewed, Refereed, Indexed and Leading Journal in Cyber Security and Digital Forensics

Published by The Society of Digital Information and Wireless Communications

20/F, TOWER 5, CHINA HONG KONG CITY, 33 CANTON ROAD, TSIM SHA TSUI, KOWLOON, HONG KONG

Current Issue (Vol. 7, No. 2), 2018

PDF Icon

Digital Forensic Analysis of Hard Disk for Evidence Collection

Author/s:  Bandu B. Meshram, Dinesh N. Patil
Pages:  100-110   /   DOI:  http://dx.doi.org/10.17781/P002372
Download IJCSDF PDF vol 7 iss 2
Vol. 7 Issue 2
PDF Icon

A research study: Usage of RC4 stream cipher in SSL configurations of web servers used by Sri Lankan Financial Institutes

Author/s:  Tharindu D.B Weerasinghe, Chamara Disanayake
Pages:  111-118   /   DOI:  http://dx.doi.org/10.17781/P002375
PDF Icon

Forensics Analysis of Skype, Viber and WhatsApp Messenger on Android Platform

Author/s:  Peter E. Onovakpuri
Pages:  119-131   /   DOI:  http://dx.doi.org/10.17781/P002369
PDF Icon

The process of recovering image and web page artifacts from the GPU

Author/s:  Yazeed Albabtain , Baijian Yang
Pages:  132-141   /   DOI:  http://dx.doi.org/10.17781/P002380
PDF Icon
PDF Icon

PRINCIPAL COMPONENT ANALYSIS-BASED INVESTIGATION INTO THE CAUSAL FACTORS OF FINANCIAL CRIME

Author/s:  Gabriel Babatunde Iwasokun, Raphael Olufemi Akinyede, Catherine Folake Fadamiro
Pages:  155-165   /   DOI:  http://dx.doi.org/10.17781/P002389
PDF Icon

Utilization of Statistical Control Charts for DoS Network Intrusion Detection

Author/s:  Dimitris Sklavounos , Aloysius Edoh, George Paraskevopoulos
Pages:  166-174   /   DOI:  http://dx.doi.org/10.17781/P002391
PDF Icon

Acquisition of Browser Artifacts from Android Devices

Author/s:  Emrah Sariboz , Cihan Varol
Pages:  175-182   /   DOI:  http://dx.doi.org/10.17781/P002392
PDF Icon

A New Scheme to Secure Communication and Data, based on the Integration of Cryptography and Steganography

Author/s:  Massoud Hadian Dehkordi, Amin Asgari, Ali Moradian
Pages:  183-188   /   DOI:  http://dx.doi.org/10.17781/P002393
PDF Icon

A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack

Author/s:  Morufu Olalere, Raji Abdullahi Egigogo, Ojeniyi Joseph A., Ismaila Idris, Rasheed Gbenga Jimoh
Pages:  189-199   /   DOI:  http://dx.doi.org/10.17781/P002396