International Journal of Cyber-Security and Digital Forensics (IJCSDF)

A Peer Reviewed, Refereed, Indexed and Leading Journal in Cyber Security and Digital Forensics

Published by The Society of Digital Information and Wireless Communications

20/F, TOWER 5, CHINA HONG KONG CITY, 33 CANTON ROAD, TSIM SHA TSUI, KOWLOON, HONG KONG

Previous Issue (Vol. 7, No. 3), 2018

PDF Icon

Survey and Analysis of Regional Characteristics of Unmanaged Stray IoT devices

Author/s:  Yuki Nakazawa , Ryoichi Sasaki, Atsuo Inomata
Pages:  200-208   /   DOI:  http://dx.doi.org/10.17781/P002397
Download IJCSDF PDF vol 7 iss 3
Vol. 7 Issue 3
PDF Icon

Cloud Computing Service Level Agreement Issues and Challenges: A Bibliographic Review

Author/s:  Sohail Razi Khan , Luis Borges Gouveia
Pages:  209-229   /   DOI:  http://dx.doi.org/10.17781/P002398
PDF Icon

Application of RC4 Cryptography Method to Support XML Security on Digital Chain of Custody Data Storage

Author/s:  Krisna Widatama, Yudi Prayudi, Bambang Sugiantoro
Pages:  230-237   /   DOI:  http://dx.doi.org/10.17781/P002400
PDF Icon

Data Mining Classification Approaches for Malicious Executable File Detection

Author/s:  Hassan Najadat, Assem Alhawari, Huthifh Al_Rushdan
Pages:  238-242   /   DOI:  http://dx.doi.org/10.17781/P002422
PDF Icon

A Study of the Effects of Heartbleed Vulnerability in Bangladesh

Author/s:  Moniruz Zaman, Delwar Alam, Touhid Bhuiyan Tanjila Farah
Pages:  243-247   /   DOI:  http://dx.doi.org/10.17781/P002432
PDF Icon

An Approach to Authenticate Magnetic Stripe Bank Card Transactions at POS terminals

Author/s:  Kishor Krishnan Nair, Albert Helberg, Johannes van der Merwe
Pages:  248-255   /   DOI:  http://dx.doi.org/10.17781/P002434
PDF Icon

Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks

Author/s:  Vincent Omollo Nyangaresi, Silvance O. Abeka and Anthony Rodgrigues
Pages:  256-274   /   DOI:  http://dx.doi.org/10.17781/P002450
PDF Icon

Comparison of Attribute Based Access Control (ABAC) Model and Rule Based Access (RBAC) to Digital Evidence Storage (DES)

Author/s:  Moh Fadly Panende , Yudi Prayudi, Imam Riadi
Pages:  275-282   /   DOI:  http://dx.doi.org/10.17781/P002451
PDF Icon

Encryption and Tokenization-Based System for Credit Card Information Security

Author/s:  Gabriel Babatunde Iwasokun, Taiwo Gabriel Omomule, Raphael Olufemi Akinyede
Pages:  283-293   /   DOI:  http://dx.doi.org/10.17781/P002462
PDF Icon

Digital Forensics Workflow as A Mapping Model for People, Evidence, and Process in Digital Investigation

Author/s:  Subekti Ningsih, Yudi Prayudi, Imam Riadi
Pages:  294-304   /   DOI:  http://dx.doi.org/10.17781/P002463
PDF Icon

WhatsApp Messenger Forensic Analysis Based on Android Using Text Mining Method

Author/s:  Anang Marfianto, Imam Riadi
Pages:  319-327   /   DOI:  http://dx.doi.org/10.17781/P002470
PDF Icon

Analysis of Forensic Video in Storage Data Using Tampering Method

Author/s:  Amirul Putra Justicia, Imam Riadi
Pages:  328-335   /   DOI:  http://dx.doi.org/10.17781/P002471
PDF Icon

Examination of Digital Evidence on Android-based LINE Messenger

Author/s:  Imam Riadi, Sunardi, Ammar Fauzan
Pages:  336-343   /   DOI:  http://dx.doi.org/10.17781/P002472
PDF Icon

Identity-Based Encryption Technique with Ranking for Multi-Keywords Search in Cloud (IDERMKS)

Author/s:  Regina Esi Turkson, Yongjian Liao, Edward Yeallakuor
Pages:  305-316   /   DOI:  http://dx.doi.org/10.17781/P002490