Sample articles
You can read all of these full-text articles free of charge - click
International Journal of Electronic Security and Digital Forensics
Title | Author(s) | Vol. and Issue nos. | Page nos. | Full-text article |
Management of electronic ledger: a constraint programming approach for solving curricula scheduling problems | Aftab Ahmed Shaikh; Abdullah Ayub Khan | Vol.15 No.1 | 88-99 | |
Colour image encryption based on an improved fractional-order logistic map | Ismail Haddad; Djamel Herbadji; Aissa Belmeguenai; Selma Boumerdassi | Vol.15 No.1 | 66-87 | |
A new encryption system for IoT devices using embedded key cryptosystem | Shadi R. Masadeh | Vol.15 No.1 | 56-65 | |
Intelligence sharing in big data forensics | Oteng Tabona; Thabiso M. Maupong; Kopo M. Ramokapane; Thabo Semong | Vol.15 No.1 | 33-55 | |
Cyber terrorism and its role in the outbreak of international crisis | Abedalrzag Aldalbeeh; Ahmad Alsharqawi | Vol.15 No.1 | 24-32 | |
Cloud forensics and digital ledger investigation: a new era of forensics investigation | Abdullah Ayub Khan; Aftab Ahmed Shaikh; Asif Ali Laghari; M. Malook Rind | Vol.15 No.1 | 1-23 |